Bug#514807: Regression in libgnutls security update

Edward Allcutt emallcut at gleim.com
Wed Feb 11 21:54:13 UTC 2009


Simon Josefsson wrote:
> The CVE-2008-4989 problem was that parts of the chain validation
> algorithm was not executed properly.  Rejecting V1 CA's is one of those
> parts, so I believe this is the intended consequence of the
> CVE-2008-4989 fix.
I understood the primary problem to be that if the last (root) cert was 
self-signed then its signature of the next-to-last cert would not be 
checked. The other checks on the last cert would also not occur but 
these were relatively minor.

>> This change actually brings gnutls in line with its documentation, 
>> however it is still a change in behavior that I think is unsuitable for 
>> a stable security update.
This is my main emphasis. Whatever happens with lenny, changing this 
behavior in etch breaks existing setups.

>> This also affects the same set of packages in lenny. I suppose the 
>> "right" way to solve it in lenny would be to patch all the libgnutls 
>> users which assume v1 CAs should be trusted. However I'm not sure of the 
>> reaction to filing several possibly RC bugs at this point.
> 
> This would leave users exposed to the security problems inherent with V1
> CAs, which seems like a bad thing.  The proper fix is for users to move
> away from all V1 CAs.
What are the other significant problems with v1 CAs? Trusting a CA in a 
list of certs which is provided with the understanding that they are to 
be trusted doesn't seem a huge problem. (That being my interpretation of 
the semantics of the configuration of nss_ldap etc.)

> What can be done here is to produce better documentation, perhaps in
> release notes.  People must be aware that trusting X.509 certificate
> chains containing RSA-MD5 signatures or V1 CAs is insecure.
I don't disagree, but breaking working configurations, not all of which 
are as insecure as you fear, doesn't seem like the best plan, especially 
since there was no advance warning.

-- 
Edward Allcutt
Network Operations





More information about the Pkg-gnutls-maint mailing list