Re: Time to replace MD5?

2007-06-15 Thread Bernd Eckenfels
In article <[EMAIL PROTECTED]> you wrote:
> Then they can wget the Release.gpg file, Release file, Packages file
> and check each in turn. Their choice.

Which is much more complicated than checking a given fingerprint (which is
very usual for Advisories)

Gruss
Bernd


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Time to replace MD5?

2007-06-15 Thread Florian Weimer
* Steffen Schulz:

> If for whatever reason people get untrustworthy, it would be nice to
> know as soon as possible, no? Government, Money, ..

Well, in this case, you're barking up the wrong tree.  What you really
want is some kind of audit trail, which might increase confidence in
the integrity of the package creation process.  A chain of
cryptographic hashes which is put in place at the very end of that
process is *not* an audit trail.  It only secures distribution across
the mirror network, and MD5 is currently good enough for that.

Using SHA-384 for this purpose might even give a wrong sense of
security.

> And again, this is just one attack vector. To check the impact and
> list the mitigating factors sure is good for employment. Security
> design is something else.

Security design is mostly about risk analysis.  If you built security
in from the start, it's unlikely your system will ever make it to the
point where you see actual attacks (which means, in most systems:
fraud).


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Time to replace MD5?

2007-06-15 Thread Florian Weimer
* Steffen Schulz:

> On 070613 at 10:43, Florian Weimer wrote:
>> > AND the fact that it needs to be a valid .deb archive, they are
>> > probably more than strong enough.
>
> This is actually not much of a problem:
>
> http://www.cits.rub.de/MD5Collisions/
>
> One example how to create two files with same hash that act
> differently. Should work with most active content.

The problem is ambiguous content, not the collision.  This has been
thoroughly debunked, I don't know why they continue publishing this.

It's easy to exploit their fictional document signing process without
creating an MD5 collision, which strongly suggests ("proves") that the
process itself is flawed.

Since you are located at RUB, could you please make sure that they
correct their analysis?

> Kaminsky did the same with self-extracting executables:
>
> http://www.doxpara.com/md5_someday.pdf

Yeah, but the evil twins must be created *by* *the* *same* *party*.
In the Debian case, this party is already trusted, so the current
attacks make no difference.

>> That, and the "evil twin" package would have to be prepared by the
>> securty team as well, which isn't a relevant scenario (because they
>> could put a backdoor in the original without attacking the hash).

> So apt-get signatures use a secure hash function?

Secure against currently known attacks, yes.  And we can distribute a
new hash function to clients pretty easily (something which is quite
unusual).

> With the above results, it would be possible to officially distribute
> nice behaving software but present specific targets with modified
> packages that do evil.

Yeah, right.  Guess what?  Distributors can do this even without using
MD5 attacks.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: kernel-image-2.6.8-4-386 (2.6.8-16sarge7)

2007-06-15 Thread dann frazier
On Fri, Jun 15, 2007 at 07:16:00PM +0200, Willi Mann wrote:
> However, the advisory is still missing.

Yes, so are 3 archs - we're working on it :)
If you're curious, you can see the draft dsa text here:
 svn cat svn://svn.debian.org/svn/kernel-sec/dsa-texts/2.6.8-sarge7

-- 
dann frazier


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: kernel-image-2.6.8-4-386 (2.6.8-16sarge7)

2007-06-15 Thread Willi Mann

> [EMAIL PROTECTED]:~$ wget -O - \
>   http://security.debian.org/dists/sarge/updates/main/binary-i386/Packages.gz 
> \
>   2> /dev/null | gunzip | grep kernel-image-2.6-386
> Package: kernel-image-2.6-386
> Filename:
> pool/updates/main/k/kernel-latest-2.6-i386/kernel-image-2.6-386_101sarge2_i386.deb

It was my fault because I checked for kernel-image-2.4 accidently,
instead of kernel-image-2.6. Sorry.

However, the advisory is still missing.

Willi


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: kernel-image-2.6.8-4-386 (2.6.8-16sarge7)

2007-06-15 Thread dann frazier
On Fri, Jun 15, 2007 at 06:08:08PM +0200, Willi Mann wrote:
> Hi!
> 
> Since yesterday, a new kernel for sarge seems to be available. However,
> the kernel-image meta package 101sarge2 was only available yesterday.
> Today, it's no longer available.
> 
> What has happened here?

[EMAIL PROTECTED]:~$ wget -O - \
  http://security.debian.org/dists/sarge/updates/main/binary-i386/Packages.gz \
  2> /dev/null | gunzip | grep kernel-image-2.6-386
Package: kernel-image-2.6-386
Filename:
pool/updates/main/k/kernel-latest-2.6-i386/kernel-image-2.6-386_101sarge2_i386.deb

seems fine to me...

-- 
dann frazier


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: kernel-image-2.6.8-4-386 (2.6.8-16sarge7)

2007-06-15 Thread Jim Popovitch
On Fri, 2007-06-15 at 18:08 +0200, Willi Mann wrote:
> Hi!
> 
> Since yesterday, a new kernel for sarge seems to be available. However,
> the kernel-image meta package 101sarge2 was only available yesterday.
> Today, it's no longer available.
> 
> What has happened here?

Something strange is certainly afoot.  I noticed this a few days ago
too.  No official work or FD notice so I say wait until the package
maintainers have issued their notices.

-Jim P.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



kernel-image-2.6.8-4-386 (2.6.8-16sarge7)

2007-06-15 Thread Willi Mann
Hi!

Since yesterday, a new kernel for sarge seems to be available. However,
the kernel-image meta package 101sarge2 was only available yesterday.
Today, it's no longer available.

What has happened here?

Willi


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Packages being kept back after security notices

2007-06-15 Thread Dominic Hargreaves
On Thu, Jun 14, 2007 at 10:23:28PM +0100, Lesley wrote:

> I hope someone can help.  With no intervention from me I get the 
> following on an apt-get upgrade after an apt-get update
> 
> The following packages have been kept back:
>   icedove openoffice.org openoffice.org-base openoffice.org-calc 
> openoffice.org-core openoffice.org-draw openoffice.org-evolution 
> openoffice.org-gcj
>   openoffice.org-gtk openoffice.org-impress openoffice.org-java-common 
> openoffice.org-math openoffice.org-writer python-uno
> 
> after
> [DSA 1307-1] New OpenOffice.org packages fix arbitrary code execution
> and
> [DSA 1305-1] New icedove packages fix several vulnerabilities
> 
> 
> Why would these packages be kept back?

As per http://lists.debian.org/debian-security/2007/06/msg00042.html
you need to use apt-get dist-upgrade for this particular upgrade, as it
was necessary to change a library version OpenOffice.org depended on.

Dominic.

-- 
Dominic Hargreaves | http://www.larted.org.uk/~dom/
PGP key 5178E2A5 from the.earth.li (keyserver,web,email)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Time to replace MD5?

2007-06-15 Thread Goswin von Brederlow
Bernd Eckenfels <[EMAIL PROTECTED]> writes:

> In article <[EMAIL PROTECTED]> you wrote:
>> I don't understand why DSAs for etch include md5sums and manual upgrade
>> instructions at all. Apt can verify the checksum and gpg signature and
>> handle the upgrade after all, and probably more securely than the
>> average user following the manual instructions.
>
> Because open source is all about choice. There might be admins using dpkg -i
> or security officers who build their local mirrors manually.

Then they can wget the Release.gpg file, Release file, Packages file
and check each in turn. Their choice.

As for local mirrors: debmirror and reprepro already check the
Release.gpg file if wanted and anybody using something else to mirror
should do so too.

So both aren't really good arguments to complicate the mails.

> Gruss
> Bernd

MfG
Goswin


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]