Your message dated Sat, 14 Jun 2008 18:04:01 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#483500: fixed in openssl-blacklist 0.4
has caused the Debian Bug report #483500,
regarding OpenVPN using openssl-vulnkey instead of openvpn-vulnkey ?
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
483500: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=483500
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: openvpn
Version: 2.1~rc7-2
Severity: important


NB: this is discussed in Ubuntu bug #230197
https://bugs.launchpad.net/ubuntu/+source/network-manager/+bug/230197

When upgrading from 2.1~rc7-1 to 2.1~rc7-2, I noticed a change in the
way OpenVPN was handling my private key. Instead of asking once for
passphrase, it was asking it four times !

2.7~rc7-1
~$ sudo openvpn --config /etc/openvpn/myconfig
[...]
Thu May 29 05:14:08 2008 us=971390 OpenVPN 2.1_rc7 i486-pc-linux-gnu
[SSL] [LZO2] [EPOLL] built on Apr  7 2008
Enter Private Key Password:
[...]

2.7~rc7-2
~$ sudo openvpn --config /etc/openvpn/myconfig
[...]
Thu May 29 05:19:08 2008 us=535971 OpenVPN 2.1_rc7 i486-pc-linux-gnu
[SSL] [LZO2] [EPOLL] built on May 18 2008
Thu May 29 05:12:08 2008 us=536149 /usr/sbin/openssl-vulnkey -q
/etc/openvpn/cert.key
Enter pass phrase for /etc/openvpn/cert.key:
Enter pass phrase for /etc/openvpn/cert.key:
Enter pass phrase for /etc/openvpn/cert.key:
Enter Private Key Password:
[...]

Basically, we can see OpenVPN is invoking openssl-vulnkey which actually
requires checking the private key three times, asking for passphrase
each time:

~$ sudo openssl-vulnkey /etc/openvpn/cert.key 
Enter pass phrase for /etc/openvpn/cert.key:
Enter pass phrase for /etc/openvpn/cert.key:
Enter pass phrase for /etc/openvpn/cert.key:
Not blacklisted: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx /etc/openvpn/cert.key

If you use openvpn-vulnkey, no passphrase is asked:

~$ sudo openvpn-vulnkey /etc/openvpn/cert.key 
Not blacklisted: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx /etc/openvpn/cert.key


In addition to obvious usability impact, having to enter four times
your private key passphrase, openssl-vulnkey will ask for passphrase
again on reconnect, making openvpn unable to reconnect by itself when
persist options are set.


As we have a openvpn-blacklist package, should OpenVPN use
openvpn-vulnkey instead of openssl-vulnkey ? As a matter of fact,
I could not find any call to openvpn-vulnkey when launching OpenVPN.



This bug is related to bugs #482498 (network-manager-openvpn:
openssl-vulnkey passphrase dialog hangs) and #483020 (openssl-vulnkey
hangs on connecting), having network-manager-openvpn not being able to
launch connections anymore:
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=482498
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=483020




-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)

Kernel: Linux 2.6.25 (SMP w/2 CPU cores; PREEMPT)
Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-15)
Shell: /bin/sh linked to /bin/bash

Versions of packages openvpn depends on:
ii  debconf [debconf-2.0]         1.5.22     Debian configuration management sy
ii  libc6                         2.7-11     GNU C Library: Shared libraries
ii  liblzo2-2                     2.03-1     data compression library
ii  libpam0g                      0.99.7.1-6 Pluggable Authentication Modules l
ii  libssl0.9.8                   0.9.8g-10  SSL shared libraries
ii  openssl-blacklist             0.3        list of blacklisted OpenSSL RSA ke
ii  openvpn-blacklist             0.3        list of blacklisted OpenVPN RSA sh

openvpn recommends no packages.

-- debconf information:
* openvpn/vulnerable_prng:
  openvpn/change_init: false
  openvpn/stop2upgrade: false
  openvpn/default_port:
  openvpn/change_init2: true
  openvpn/create_tun: false



--- End Message ---
--- Begin Message ---
Source: openssl-blacklist
Source-Version: 0.4

We believe that the bug you reported is fixed in the latest version of
openssl-blacklist, which is due to be installed in the Debian FTP archive:

openssl-blacklist-extra_0.4_all.deb
  to pool/main/o/openssl-blacklist/openssl-blacklist-extra_0.4_all.deb
openssl-blacklist_0.4.dsc
  to pool/main/o/openssl-blacklist/openssl-blacklist_0.4.dsc
openssl-blacklist_0.4.tar.gz
  to pool/main/o/openssl-blacklist/openssl-blacklist_0.4.tar.gz
openssl-blacklist_0.4_all.deb
  to pool/main/o/openssl-blacklist/openssl-blacklist_0.4_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Jamie Strandboge <[EMAIL PROTECTED]> (supplier of updated openssl-blacklist 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Tue, 10 Jun 2008 09:09:48 -0400
Source: openssl-blacklist
Binary: openssl-blacklist openssl-blacklist-extra
Architecture: source all
Version: 0.4
Distribution: unstable
Urgency: low
Maintainer: Kees Cook <[EMAIL PROTECTED]>
Changed-By: Jamie Strandboge <[EMAIL PROTECTED]>
Description: 
 openssl-blacklist - list of blacklisted OpenSSL RSA keys
 openssl-blacklist-extra - list of non-default blacklisted OpenSSL RSA keys
Closes: 483500
Changes: 
 openssl-blacklist (0.4) unstable; urgency=low
 .
   * allow checking of certificate requests
   * only check moduli with an exponent of 65537 (the default on Debian/Ubuntu)
   * update gen_certs.sh for when ~/.rnd does not exist when openssl is run
     which can happen with openssl 0.9.8g and higher
   * update gen_certs.sh to use '0' (in case of PID randomization)
   * added more examples
   * only prompt once for password (Closes: #483500)
   * properly cache database reads when bits are same
   * added '-m' and '-b' arguments. This is helpful for applications calling
     openssl-vulnkey when the modulus and bits are known, such as openvpn.
   * man page updates
   * added test.sh
   * added blacklists for when ~/.rnd does not exist when openssl is run
     (LP: #232104)
   * added 512 bit and partial 4096 blacklists (need le64) (LP: #231014)
   * reorganized source databases, and ship the new gen_certs.sh format
   * debian/rules: updated to use new blacklist format and organization
   * create openssl-blacklist-extra package (but don't ship 4096 yet)
Checksums-Sha1: 
 185ddc8aa22b01e8f6f38bc933c73070871f9499 1081 openssl-blacklist_0.4.dsc
 45792725b913a5e843fb0ae4fbf89e9efd1a0c6f 30175858 openssl-blacklist_0.4.tar.gz
 41855263cb41ad89739eb038f50a86614c5a486f 6333310 openssl-blacklist_0.4_all.deb
 1ff6b5fee914bfa3995f4de7eca1a703bc6c44b0 3160374 
openssl-blacklist-extra_0.4_all.deb
Checksums-Sha256: 
 dbdbebb7319c4b4840de2c7b88128824148c6003a3b93019863a9395bca0acf3 1081 
openssl-blacklist_0.4.dsc
 2a9491dc1d3e4511307342217d58fb553699e1bbe51364fbc729d1b61c5adecf 30175858 
openssl-blacklist_0.4.tar.gz
 2880f46f22ad476d6f57c3599dd8abe35534cb1c4e9d1cf775b0e679fea444c1 6333310 
openssl-blacklist_0.4_all.deb
 505fb23ef8cf1554984bff70b55bc7b295aa968407e7ee33931ccdf049e5dd80 3160374 
openssl-blacklist-extra_0.4_all.deb
Files: 
 02f74893a2341c680ea8db1dc2b4a67c 1081 net optional openssl-blacklist_0.4.dsc
 ddaae8869033957fe1ae78214f846e2a 30175858 net optional 
openssl-blacklist_0.4.tar.gz
 92b0db2cd7e2171e23ea28cd546e3599 6333310 net optional 
openssl-blacklist_0.4_all.deb
 ee8d574037c937b481fa7bc55892d845 3160374 net optional 
openssl-blacklist-extra_0.4_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Kees Cook <[EMAIL PROTECTED]>

iEYEARECAAYFAkhQK/EACgkQH/9LqRcGPm0lYQCcDWjy/JcWTudXzFqLhuaM8Dtt
xHgAnjwpzAxGAgbuv/9Lf90eHt1QJkcn
=BXWL
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to