LinuxQuestions.org
Review your favorite Linux distribution.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 05-14-2008, 07:59 PM   #1
rickh
Senior Member
 
Registered: May 2004
Location: Albuquerque, NM USA
Distribution: Debian-Lenny/Sid 32/64 Desktop: Generic AMD64-EVGA 680i Laptop: Generic Intel SIS-AC97
Posts: 4,250

Rep: Reputation: 62
Debian OpenSSL Vulnerability may affect other distro servers as well


From DD, Erich Schubert:

http://blog.drinsama.de/erich

Quote:
Now the weakness is 'distributed' by the users, it's not just a server-side vulnerability. If your server is running e.g. RedHat, it doesn't mean it is secure!.

In fact, if your server is running Debian and you installed the Debian security update for openssh, it will be much more secure than the RedHat server. Because the Debian server has a blacklist of keys that are too common. The other-Linux server who doesn't have this blacklist doesn't know that a certain 'weak' key is not trustworthy.
If any of you Security experts believe this overstates the danger, please say so. I'm no expert, but what he says sounds sane to me.
 
Old 05-14-2008, 08:41 PM   #2
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
I'm not a security expert and I don't know if this was posted elsewhere but H.D. Moore explains the damage "better" for my tastes:
Quote:
All SSL and SSH keys generated on a Debian-based systems (Ubuntu, Kubuntu, etc) between September 2006 and May 13th, 2008 may be affected. (..) This flaw is ugly because even systems that do not use the Debian software need to be audited in case any key is being used that was created on a Debian system.
http://metasploit.com/users/hdm/tools/debian-openssl/
 
Old 05-16-2008, 07:22 AM   #3
jayjwa
Member
 
Registered: Jul 2003
Location: NY
Distribution: Slackware, Termux
Posts: 802

Rep: Reputation: 257Reputation: 257Reputation: 257
I think what the author is try to get at is this bit here:

Quote:
Any Linux/Unix/*BSD system is vulnerable that grants access to a key that was generated on an affected Debian or Ubuntu system.
He makes it sound like anyone running OpenSSH is vuln, which isn't exactly true. On my systems, both my OpenSSL and OpenSSH are built by me and have been for years now, so I've not turned out any of the keys that are potentially knowable. Say I have a user, john, home is /home/john, and he is a Debian user. He made a SSH key, sent it to me (root), and I put it in /home/john/.ssh/authorized_keys. Now john can login to my system. We find out Debian's OpenSSL is hosed, and so john replaces all his stuff. I am safe, and so I let /home/john/.ssh/authorized_keys stand, not thinking about it. Now Mr. Evil Hacker has all those weak keys in his Weak-Debian-Key kit (bet one is released real soon, if not already!) He connects to my system, and starts running thru keys to the john account, which he would hit (if not for several other security measures in place on my system). Debian has a tool to find those keys, I think it's called dowkd.pl. When I run this on my user's .ssh directory, it does in fact flag key 3, but it gives an odd message about no blacklist suitable. I'm guessing it's telling me it is a weak key? Anyway, I know it to be potentially, because while "john" isn't the user's real name, there is such a real user here, and I know he uses Debian, and generated that key only about a year ago. The solution would be 'cat /dev/null > /home/john/.ssh/authorized_keys' and notify john to re-send a properly created key.

That's my take on this without viewing the metasploit link [1]

Quote:
Nobody noticed the severity of this change for more than 2 years.
...that reported it




[1] I'm sorry, but I will not visit HDM's site, nor look at his work after his misguided attempt to filter Tor traffic by keyword on sniffed exit nodes. He has lost all credibility to me.

http://blog.vulnerableminds.com/2007...than-good.html
 
Old 05-16-2008, 08:25 AM   #4
unixfool
Member
 
Registered: May 2005
Location: Northern VA
Distribution: Slackware, Ubuntu, FreeBSD, OpenBSD, OS X
Posts: 782
Blog Entries: 8

Rep: Reputation: 158Reputation: 158
More info here:

http://isc.sans.org/diary.html?storyid=4421
http://isc.sans.org/diary.html?storyid=4420

Both entries are showing at http://isc.sans.org/diary.html at this moment in time, although that could change later today. Note that the threatcon is yellow.
 
Old 05-16-2008, 08:57 AM   #5
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Quote:
Originally Posted by jayjwa View Post
That's my take on this without viewing the metasploit link(..) He has lost all credibility to me.
With all due respect but your self-inflicted refusal to read that information harms nobody but you and leads to IMHO unnecessary rehashing. Regardless of how utterly misguided his attempts may have been, the TOR/HDM argument has no bearing on this subject unless you want to point out what he wrote is dead wrong (again). BMG, but then you would have to actually read the text, wouldn't you?..
 
Old 05-16-2008, 10:35 AM   #6
introuble
Member
 
Registered: Apr 2004
Distribution: Debian -unstable
Posts: 700

Rep: Reputation: 31
Quote:
Originally Posted by jayjwa View Post
The solution would be 'cat /dev/null > /home/john/.ssh/authorized_keys' and notify john to re-send a properly created key.
Haha, have him upload it to your server via scp
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
WARN: OpenSSL (Debian and Debian-based distros) win32sux Linux - Security 6 05-28-2008 07:05 PM
cannot find -lcrypto in debian when using openssl library simon_qwl Programming 2 03-31-2007 01:50 PM
nessus scan - openssl vulnerability neocontrol Linux - Security 1 02-25-2007 03:25 PM
Openssl with MySQL on Debian geekmungus Debian 2 03-26-2005 06:20 AM
WARN: OpenSSL NULL Pointer Assignment vulnerability unSpawn Linux - Security 1 03-18-2004 12:11 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 06:21 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration