On Thursday, October 25, 2012 09:38:36 AM Thijs Kinkhorst wrote:
> On Thu, October 25, 2012 07:18, Scott Kitterman wrote:
> > Package: opendkim
> > Version: 2.0.1+dfsg-1
> > Severity: grave
> > Tags: security upstream
> > Justification: user security hole
> > 
> > See http://www.kb.cert.org/vuls/id/268267, VU#268267
> > 
> > opendkim in squeeze, wheezy, sid offers no method to prevent use of keys
> > less than 1024 bits.  This is added in the new upstream release, 2.6.8,
> > that
> > was released just for this issue.
> 
> Thanks for your quick action on this. But is it really a user security
> hole? The responsibility is with users not to use unsafe key sizes. GnuPG
> works with small key sizes, I do not see that as a user security hole per
> se.
> 
> Of course this proactive measure can help to prevent mistakes, so if
> possible it would be good if we could still get this into wheezy.

I agree that on the sending end this is mostly an operational issue, but on 
the receiving side this is different.  Here's a description of the attack that 
the changes in opendkim 2.6.8 will prevent:

http://www.wired.com/threatlevel/2012/10/dkim-vulnerability-widespread/

With what's in Squeeze/Wheezy now, a Debian mail server would have validated 
the mail as well.  With 2.6.8, the signature would have been ignored (in the 
default configuration) because the key size is too small.

This is not something that can be dealt with operationally.  Unlike GPG, where 
keys are trusted based on signatures and web of trust (and people can decline 
to sign bad keys), in DKIM keys are trusted based on their being published in 
the sending domain's DNS and there is no human in the loop.

Scott K

Attachment: signature.asc
Description: This is a digitally signed message part.

Reply via email to