Ross Boylan <[EMAIL PROTECTED]> writes:
>
> The recent security advisory for Debian's version of openssl says that
> you should regenerate all keys, and that DSA keys should be considered
> compromised.
>
> Does this mean that RSA keys for openssh should not be considered
> compromised?  If so, why the need to regenerate them?

To clarify, *all* SSH keys, whether DSA or RSA, generated using the
bad version of OpenSSL are garbage: they are easily guessable.

Furthermore, as I read the advisories and other sources, because of
the way DSA keys are used, even strong DSA keys (generated by good
versions of OpenSSL) are compromised if they were used locally with
the bad OpenSSL.

"Locally" here means that the strong DSA key was used on the same side
of the connection as the bad OpenSSL: if you used a user DSA key to
"ssh" to a remote server and your local OpenSSL library was bad, or if
a server DSA key was used by "sshd" to accept a remote connection and
the server's OpenSSL library was bad, then the respective key is
compromised (even if it was a strong key generated by a good OpenSSL
library).

"Compromised" means that anyone who intercepted and saved such an SSH
conversation can now use this new knowledge of the OpenSSL
vulnerability to recover the private DSA key from the connection data.

At least, that's how I've interpreted what I've heard.

-- 
Kevin Buhr <[EMAIL PROTECTED]>


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to