[Pkg-openssl-devel] [SECURITY] [DSA 1571-1] New openssl packages fix predictable random number generator

Rene Mayrhofer rene.mayrhofer at gibraltar.at
Wed May 14 11:57:05 UTC 2008


Dear Thijs,

On Mittwoch, 14. Mai 2008, Thijs Kinkhorst wrote:
> > I also don't think it's
> > reasonable for all packages that somehow use(d) openssl to create keys to
> > do their own security fix as openssh-server did (for openssh, I think
> > that's a good thing because it's the primary entry point for additional,
> > potentially manual fixing). Fixing different packages should be able to
> > re-use code and would only bother the user/admin once.
>
> Since the commit was already publically made last week we had no choice as
> to delay the release not more than a few days. 

Please don't misunderstand me - I fully support the quick fix that already 
went out to minimize the problem for new keys. But I still think that, given 
a few more days, we can - and should - do better, e.g. with an additional 
security upload for libssl.

> Fixing certificates for an 
> ssl-using package is mostly a process specific to that package. I think
> we'll accept updated packages like the openssh one just as well for other
> ssl-using packages, but "somone has to do it". The maintainers of course
> being the most likely candidate since they know their package best.

I don't really agree with this, but think that bundling all the fixes together 
into one package will be less effort for all involved maintainers and - much 
more importantly - less hassle for our users/admins than already caused by 
the whole incident. I would highly appreciate if the openssl packaging team 
could co-ordinate these efforts and e.g. prepare template scriptlets where 
every maintainer of an affected package can provide "hooks" for automatic 
re-creation of keys and warning users appropriately. Just taking openssh and 
open/strongswan we see that they can be handled similarly, and I suspect the 
same to hold true for apache, openvpn, etc.

If we had 15 packages with critical security updates, each solving the issue 
differently _and at a different time_, then I think users/admins would 
(rightly) be a lot more annoyed than if we had one openssl-recreate-keys 
package that bundled together all the scriptlets and asked/warned the 
user/admin just once.
We need to think about the administrative pain for many people here.

> > As it stands now, I don't think this issue is fixed from a user point of
> > view (just thinking about user ssh keys, which are still wide open....).
>
> I'm not sure what that last part about user keys means, since the recent
> openssh update is designed to block weak user ssh keys. Or what do you
> mean?

Yes, if the user logs into a patched Debian box, but not if the user logs into 
_any_ other ssh server using insecure keys. I applaud the openssh package 
maintainers for such a quick solution for Debian servers, which is IMHO a 
very good thing to have as a first fix while dealing with the issue. But the 
current package does not care about user-generated keys on the client side, 
which is still a security issue as far as I understand the current problem.
So it's not even solved for openssh yet, let alone all the other packages.

I really think that having one "fixer" package pulled in by the libssl 
security update is the best solution right now, but I am certainly open to 
any suggestions on how else to deal with the problem and trying to minimize 
the hassle that users/admins have to go through.

best regards,
Rene

-- 
-------------------------------------------------
Gibraltar firewall       http://www.gibraltar.at/
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: This is a digitally signed message part.
Url : http://lists.alioth.debian.org/pipermail/pkg-openssl-devel/attachments/20080514/124423aa/attachment.pgp 


More information about the Pkg-openssl-devel mailing list