Your message dated Wed, 22 Jun 2005 14:20:51 +0200 with message-id <[EMAIL PROTECTED]> has caused the Debian Bug report #314465, regarding CA.pl and openssl.cnf default to insecure MD5 digest to be marked as having been forwarded to the upstream software author(s) [EMAIL PROTECTED]
(NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) --------------------------------------- Received: (at 314465-forwarded) by bugs.debian.org; 22 Jun 2005 12:21:24 +0000 >From [EMAIL PROTECTED] Wed Jun 22 05:21:24 2005 Return-path: <[EMAIL PROTECTED]> Received: from mailgate1.verwaltung.uni-mainz.de (patty.verwaltung.uni-mainz.de) [134.93.144.165] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1Dl4EO-0004y0-00; Wed, 22 Jun 2005 05:21:24 -0700 Received: from charlie.verwaltung.uni-mainz.de (charlie.verwaltung.uni-mainz.de [134.93.226.11]) by patty.verwaltung.uni-mainz.de (8.13.4/8.13.4/Debian-3) with ESMTP id j5MCKvNK010502 (version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=NOT); Wed, 22 Jun 2005 14:20:57 +0200 Received: from [134.93.226.8] (woodstock.verwaltung.uni-mainz.de [134.93.226.8]) (authenticated bits=0) by charlie.verwaltung.uni-mainz.de (8.12.3/8.12.3/Debian-7.1) with ESMTP id j5MCKvbQ016859 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=NO); Wed, 22 Jun 2005 14:20:57 +0200 Message-ID: <[EMAIL PROTECTED]> Date: Wed, 22 Jun 2005 14:20:51 +0200 From: Christoph Martin <[EMAIL PROTECTED]> User-Agent: Mozilla/5.0 (X11; U; Linux i686; de-DE; rv:1.7.6) Gecko/20050331 Thunderbird/1.0.2 Mnenhy/0.7.2.0 X-Accept-Language: de-DE, de, en-us, en MIME-Version: 1.0 To: openssl-bugs@openssl.org CC: [EMAIL PROTECTED] Subject: [Fwd: Bug#314465: CA.pl and openssl.cnf default to insecure MD5 digest] X-Enigmail-Version: 0.91.0.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="------------enigAC5FE4DF5083A6A17B776F12" X-Virus-Scanned-From: mailgate1.verwaltung.uni-mainz.de X-Spam-Scanned-From: mailgate1.verwaltung.uni-mainz.de X-Scanned-By: MIMEDefang 2.51 on 134.93.226.4 Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enigAC5FE4DF5083A6A17B776F12 Content-Type: multipart/mixed; boundary="------------030205020607040602040209" This is a multi-part message in MIME format. --------------030205020607040602040209 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Hi folks, can you please comment on this bug report I got via the Debian bug-tracking system. This is the first time, that I heard someone saying that the theoretical weekness of md5 is a real security hole. Christoph -- ============================================================================ Christoph Martin, EDV der Verwaltung, Uni-Mainz, Germany Internet-Mail: [EMAIL PROTECTED] Telefon: +49-6131-3926337 Fax: +49-6131-3922856 --------------030205020607040602040209 Content-Type: message/rfc822; name="Bug#314465: CA.pl and openssl.cnf default to insecure MD5 digest" Content-Transfer-Encoding: 7bit Content-Disposition: inline; filename="Bug#314465: CA.pl and openssl.cnf default to insecure MD5 digest" Return-Path: <[EMAIL PROTECTED]> Received: from mailgate1.zdv.Uni-Mainz.DE (mailgate1.zdv.Uni-Mainz.DE [134.93.178.129]) by wintermute.verwaltung.uni-mainz.de (8.12.3/8.12.3/Debian-7.1) with ESMTP id j5GDNEi5009442 for <[EMAIL PROTECTED]>; Thu, 16 Jun 2005 15:23:14 +0200 Received: from exfront01.zdv.uni-mainz.de (exfront01.zdv.Uni-Mainz.DE [134.93.176.49]) by mailgate1.zdv.Uni-Mainz.DE (Postfix) with ESMTP id 97F81300085F for <[EMAIL PROTECTED]>; Thu, 16 Jun 2005 15:23:14 +0200 (CEST) Received: from spamgate1.zdv.Uni-Mainz.DE ([134.93.177.65]) by exfront01.zdv.uni-mainz.de with Microsoft SMTPSVC(6.0.3790.211); Thu, 16 Jun 2005 15:23:14 +0200 Received: from mailgate2.zdv.Uni-Mainz.DE (mailgate2.zdv.Uni-Mainz.DE [134.93.178.130]) by spamgate1.zdv.Uni-Mainz.DE (8.12.10/8.12.2) with ESMTP id j5GDN7gQ012238 for <[EMAIL PROTECTED]>; Thu, 16 Jun 2005 15:23:08 +0200 (MEST) Received: from spohr.debian.org (spohr.debian.org [140.211.166.43]) by mailgate2.zdv.Uni-Mainz.DE (Postfix) with ESMTP id 6D8833000393 for <[EMAIL PROTECTED]>; Thu, 16 Jun 2005 15:23:07 +0200 (CEST) Received: from debbugs by spohr.debian.org with local (Exim 3.35 1 (Debian)) id 1DiuFu-00070o-00; Thu, 16 Jun 2005 06:18:02 -0700 X-Loop: [EMAIL PROTECTED] Subject: Bug#314465: CA.pl and openssl.cnf default to insecure MD5 digest Reply-To: Andreas Bogk <[EMAIL PROTECTED]>, [EMAIL PROTECTED] Resent-From: Andreas Bogk <[EMAIL PROTECTED]> Resent-To: debian-bugs-dist@lists.debian.org Resent-CC: Christoph Martin <[EMAIL PROTECTED]> Resent-Date: Thu, 16 Jun 2005 13:18:01 UTC Resent-Message-ID: <[EMAIL PROTECTED]> X-Debian-PR-Message: report 314465 X-Debian-PR-Package: openssl X-Debian-PR-Keywords: security Received: via spool by [EMAIL PROTECTED] id=B.111892713712913 (code B ref -1); Thu, 16 Jun 2005 13:18:01 UTC Received: (at submit) by bugs.debian.org; 16 Jun 2005 13:05:37 +0000 Received: from (homer.berlin.jpk.com) [212.222.128.18] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1Diu3t-0003Fv-00; Thu, 16 Jun 2005 06:05:37 -0700 Received: from root by homer.berlin.jpk.com with local (Exim 4.50) id 1Diu2n-0007e3-Rn for [EMAIL PROTECTED]; Thu, 16 Jun 2005 15:04:29 +0200 Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit From: Andreas Bogk <[EMAIL PROTECTED]> To: Debian Bug Tracking System <[EMAIL PROTECTED]> X-Mailer: reportbug 3.8 Date: Thu, 16 Jun 2005 15:04:29 +0200 Message-Id: <[EMAIL PROTECTED]> Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-2.599 required=5 tests=BAYES_00 version=3.0.3 X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: X-Spam-Level: Resent-Sender: Debian BTS <[EMAIL PROTECTED]> X-Virus-Scanned: by amavisd-new at uni-mainz.de X-OriginalArrivalTime: 16 Jun 2005 13:23:14.0312 (UTC) FILETIME=[8CC16880:01C57276] X-Virus-Scanned: by amavisd-new at uni-mainz.de X-Scanned-By: MIMEDefang 2.51 on 134.93.225.251 X-UID: 6996 X-Keywords: NonJunk Package: openssl Version: 0.9.7e-3 Severity: grave Tags: security Justification: user security hole openssl.cnf defaults to usage of MD5 as digest algorithm for generation of certificates and CAs. MD5 must be considered broken beyond hope, we're not just talking about theoretical attacks, but attacks feasible for everybody. X.509 keys with colliding checksums (and thus false certificates) have been shown. See: http://www.cits.rub.de/MD5Collisions/ for another example. Unfortunately, there seem to be problems with RIPEMD160 in practice (e.g. the Debian Thunderbird package doesn't understand RIPEMD160). So the only reasonable choice at the moment is SHA-1, even though SHA-1 has been theoretically weakend already, and RIPEMD160 would be preferable. I suggest adding default_md: sha-1 in the req and ca sections of openssl.cnf, and talking the upstream maintainers into supporting SHA-384 or SHA-512. -- System Information: Debian Release: 3.1 Architecture: i386 (i686) Kernel: Linux 2.6.8-2-686 Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8) Versions of packages openssl depends on: ii libc6 2.3.2.ds1-22 GNU C Library: Shared libraries an ii libssl0.9.7 0.9.7e-3 SSL shared libraries -- no debconf information --------------030205020607040602040209-- --------------enigAC5FE4DF5083A6A17B776F12 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.1 (GNU/Linux) Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org iD8DBQFCuVepgeVih7XOVJcRAlV9AJ9ohMryrdoavtk/DXFpShpajSScyQCeJz5d QVGiZ35XqEjb/nirqixIv+A= =m1aX -----END PGP SIGNATURE----- --------------enigAC5FE4DF5083A6A17B776F12-- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]