[Pkg-openssl-devel] Bug#639744: Compromised certificates for *.google.com issued by DigiNotar Root CA
Raphael Geissert
geissert at debian.org
Wed Sep 7 15:57:51 UTC 2011
[Kurt, please CC me on your replies. The BTS' -subscribe functionality doesn't
seem to be working]
[CC'ing ubuntu sec, in case Kees or Jamie or whoever is taking care of the
issue is also working on something to completely block DigiNotar]
On Monday 05 September 2011 14:55:50 Kurt Roeckx wrote:
> On Mon, Sep 05, 2011 at 02:15:31PM -0500, Raphael Geissert wrote:
> > The only currently supported methods are OCSP and CRL, but none would do
> > the trick in this case.
>
> I guess OCSP/CRL is only called for the top most certificate, and all
> the CAs in the chain aren't checked in most applications. I thought
> I read Entrust revoked their signature, and in theory that should
> be enough.
As long as the client becomes aware of that revocation, yes.
DigiNotar's PKIOverheid CA also needs to be blocked. I don't remember reading
any report of the gov already revoking it.
> At least the openssl "verify" util has a "-crl_check", and
> "-crl_check_all", but it doesn't do OCSP.
Yes, there's X509_V_FLAG_CRL_CHECK and X509_V_FLAG_CRL_CHECK_ALL.
OCSP can be checked with openssl ocsp, IIRC.
> > I was thinking about hard-coding a check for CN=* DigiNotar * most likely
> > in libcrypto's X.509 support, but so far my lack of knowledge of
> > OpenSSL's internals has me a bit lost.
> > Hard-coding it is suboptimal, but I think it is the only reasonable
> > solution for the time being. We can't wait weeks or months for a better
> > solution.
> >
> > What do you think about making such change?
>
> So you're basicly saying that X509_verify_cert() should give an
> error in case it finds DigiNotar somewhere in the chain?
>
> I'm not opposed to such a change, but would like to see a better
> option in the future.
Yes. I will try to spend some time with a debugger later today to find the
right place to implement such check. Or do you have any hint? (the cn
validation functions didn't seem to be executed in one case I tried)
Cheers,
--
Raphael Geissert - Debian Developer
www.debian.org - get.debian.net
More information about the Pkg-openssl-devel
mailing list