Linode Forum
Linode Community Forums
 FAQFAQ    SearchSearch    MembersMembers      Register Register 
 LoginLogin [ Anonymous ] 
Post new topic  Reply to topic
Author Message
PostPosted: Tue May 13, 2008 12:20 pm 
Offline
Junior Member

Joined: Tue Sep 25, 2007 9:00 am
Posts: 26
Slashdot is discussing a bug in SSH key generation which was introduced into the Debian source tree in late 2006 that has just been uncovered. Essentially someone removed the random seeding from key generation making keys guessable. See:

http://it.slashdot.org/it/08/05/13/1533212.shtml

Now, what do we need to do with our linodes to correct for this?


Top
   
 Post subject:
PostPosted: Tue May 13, 2008 12:29 pm 
Offline
Senior Member

Joined: Mon Jul 30, 2007 9:55 pm
Posts: 80
Switch to Gentoo :-)


Top
   
PostPosted: Tue May 13, 2008 2:02 pm 
Offline
Senior Member
User avatar

Joined: Fri Oct 24, 2003 3:51 pm
Posts: 965
Location: Netherlands
vca wrote:
Now, what do we need to do with our linodes to correct for this?

Upgrade OpenSSL and re-generate all your SSH and SSL keys.

_________________
/ Peter


Top
   
 Post subject:
PostPosted: Tue May 13, 2008 2:16 pm 
Offline
Senior Member
User avatar

Joined: Mon Dec 10, 2007 4:30 pm
Posts: 341
Website: http://markwalling.org
dfelicia wrote:
Switch to Gentoo :-)

or slackware, or centos, or arch, or fedora, or suse, or mandrake...


Top
   
 Post subject:
PostPosted: Tue May 13, 2008 4:31 pm 
Offline
Senior Member

Joined: Sun Nov 30, 2003 2:28 pm
Posts: 245
It may be worth noting that the error was introduced in September 2006, and keys older than that should be fine.

_________________
The irony is that Bill Gates claims to be making a stable operating system and Linus Torvalds claims to be trying to take over the world.
-- seen on the net


Top
   
 Post subject:
PostPosted: Tue May 13, 2008 6:22 pm 
Offline
Senior Member

Joined: Tue Jan 22, 2008 2:10 am
Posts: 103
Does this apply to gnupg keys as well?


Top
   
 Post subject:
PostPosted: Tue May 13, 2008 6:56 pm 
Offline
Junior Member

Joined: Tue Sep 25, 2007 9:00 am
Posts: 26
bdonlan wrote:
Does this apply to gnupg keys as well?


No, in the Debian announcement:

http://lists.debian.org/debian-security ... 00152.html

they said:

"Keys generated with GnuPG or GNUTLS are not affected"

---


Stephen


Top
   
 Post subject:
PostPosted: Tue May 13, 2008 9:25 pm 
Offline
Senior Member

Joined: Mon Jul 30, 2007 9:55 pm
Posts: 80
Quote:
or slackware, or centos, or arch, or fedora, or suse, or mandrake...


Heh. Reminds me of a comment I enjoyed at the top of efudd's script from this thread:

Code:
# Installation Tips:
# gentoo: emerge XML-LibXML ....
# debian: install gentoo OR apt-get install libxml-libxml-perl
# redhat: install windows
# slackware: rock on!


Top
   
 Post subject:
PostPosted: Tue May 13, 2008 10:36 pm 
Offline

Joined: Tue May 13, 2008 10:36 pm
Posts: 1
apt-get update
apt-get upgrade

http://www.us.debian.org/security/2008/dsa-1571

:)


Top
   
 Post subject:
PostPosted: Tue May 13, 2008 10:52 pm 
Offline
Senior Member

Joined: Sun Nov 30, 2003 2:28 pm
Posts: 245
CoreDuo wrote:
apt-get update
apt-get upgrade
:)


That gives you the fixed software. That doesn't fix the existing weak keys (including host keys) or certificates that may have been generated. What fun!

_________________
The irony is that Bill Gates claims to be making a stable operating system and Linus Torvalds claims to be trying to take over the world.

-- seen on the net


Top
   
 Post subject:
PostPosted: Tue May 13, 2008 11:41 pm 
Offline
Senior Member

Joined: Tue Jan 22, 2008 2:10 am
Posts: 103
Updating SSH host keys:
Code:
rm /etc/ssh/ssh_host_*
dpkg-reconfigure openssh-server
/etc/init.d/ssh restart # might not be necessary


Obviously you will receive host key mismatch warnings after this. Replace the relevant key(s) in ~/.ssh/known_hosts with the key in /etc/ssh/ssh_host_rsa_key.pub on the server (copy down the value using your existing session).

Don't forget to update lish keys as well, if you're using debian/ubuntu locally![/code]


Top
   
 Post subject: Web SSL certs
PostPosted: Wed May 14, 2008 12:50 am 
Offline
Senior Member
User avatar

Joined: Sun Feb 08, 2004 7:18 pm
Posts: 562
Location: Austin
Don't forget that if you generated a certificate request with a compromised Debian-based distro, you'll need to replace your certificate. Hopefully that won't mean having to pay again...


Top
   
 Post subject:
PostPosted: Wed May 14, 2008 8:12 am 
Offline
Junior Member

Joined: Fri Mar 28, 2008 8:20 pm
Posts: 20
Website: http://pathennessy.org/
Location: Delaware
SteveG wrote:
CoreDuo wrote:
apt-get update
apt-get upgrade
:)


That gives you the fixed software. That doesn't fix the existing weak keys (including host keys) or certificates that may have been generated. What fun!


This will fix the keys on Ubuntu. They added on an "openssh-blacklist" package that comes with the upgrade. It will check and offer to regenerate keys during the upgrade action. It also provides a "ssh-vulnkey" utility to allow users to check their individual keys. Not sure if Debian has the same thing, but I wouldn't be surprised if that's where it came from.


Top
   
 Post subject:
PostPosted: Wed May 14, 2008 11:06 am 
Offline
Senior Member
User avatar

Joined: Sun Feb 08, 2004 7:18 pm
Posts: 562
Location: Austin
http://wiki.debian.org/SSLkeys

This is the best page I've seen on the matter. It describes how this issue affects different packages you might be running, the use of ssh-vulnkey and dowkd.pl for testing keys, how to test SSL certificates, etc etc.

And you don't have to be running Debian at all to be affected. Basically if you've used a good key to talk to a machine with a bad key, your key may have been compromised.

Quote:
* key generated with broken openssl = bad
* key generated with good openssl and used to ssh from a machine with bad ssl = bad
* key generated with good openssl and used to ssh from a machine with good ssl = good


Top
   
 Post subject:
PostPosted: Tue May 20, 2008 1:15 am 
Offline
Senior Member

Joined: Sat Dec 04, 2004 5:36 pm
Posts: 145
path wrote:
SteveG wrote:
CoreDuo wrote:
apt-get update
apt-get upgrade
:)


That gives you the fixed software. That doesn't fix the existing weak keys (including host keys) or certificates that may have been generated. What fun!


This will fix the keys on Ubuntu. They added on an "openssh-blacklist" package that comes with the upgrade. It will check and offer to regenerate keys during the upgrade action. It also provides a "ssh-vulnkey" utility to allow users to check their individual keys. Not sure if Debian has the same thing, but I wouldn't be surprised if that's where it came from.


I had to do 'sudo apt-get update && sudo apt-get dist-upgrade' to get the full set of updated openssh packages since a few were held back otherwise.


Top
   
Display posts from previous:  Sort by  
Post new topic  Reply to topic


Who is online

Users browsing this forum: apkehoe and 5 guests


You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum

Search for:
Jump to:  
RSS

Powered by phpBB® Forum Software © phpBB Group