Re: ssl problems: gpg affected?

2008-05-14 Thread Karl Goetz
On Thu, 2008-05-15 at 08:09 +0200, Norbert Preining wrote: > On Do, 15 Mai 2008, Steinar H. Gunderson wrote: > > No. Any key who had a single DSA signature created by the flawed version of > > OpenSSL should be considered compromised. DSA requires a secret, random > > Does this extend to gpg keys

ssl problems: gpg affected?

2008-05-14 Thread Norbert Preining
On Do, 15 Mai 2008, Steinar H. Gunderson wrote: > No. Any key who had a single DSA signature created by the flawed version of > OpenSSL should be considered compromised. DSA requires a secret, random Does this extend to gpg keys and its signatures? That would make quite an impact. Best wishes No

[DSA 1571-1] Heimdal

2008-05-14 Thread Brian May
Apparently, Heimdal in Debian also is affected. I am not aware of any solution other then to manually regenerate all keys. Brian May --- Begin Message --- I strongly advise all readers of this list that use Debian or might have users in your realm (or any realms for which cross-realm key exchan

openssh-blacklist for !Debian

2008-05-14 Thread Martin Langhoff
Hi Kees, Jamie, DDs, I am looking at hosts that are runing other linuxen that may have weak keys now, or see those weak keys uploaded inadvertently in the future. Is there a straightforward way to get hosts that are !(Debian|Ubuntu) to use that blacklist? PermitBlacklistedKeys support in openssh-

Re: SSH keys: DSA vs RSA

2008-05-14 Thread Goswin von Brederlow
Russ Allbery <[EMAIL PROTECTED]> writes: > Steve Greenland <[EMAIL PROTECTED]> writes: >> "brian m. carlson" <[EMAIL PROTECTED]> wrote: > >>> Therefore, anyone who had a DSA key has had it compromised... > >> Shouldn't that be "anyone who had a DSA key *created by the flawed >> version of openssl

Re: Is openssl actually safe now?

2008-05-14 Thread Goswin von Brederlow
Ivan Jager <[EMAIL PROTECTED]> writes: > On Wed, 14 May 2008, David Härdeman wrote: >> If the entropy pool is properly coded, there is no negative effect of >> adding data which may or may not be truly random to the pool (i.e. you >> cannot degrade the quality of the pool no matter what you add).

Re: SSH keys: DSA vs RSA (was: Alioth and SSH: restored)

2008-05-14 Thread brian m. carlson
On Thu, May 15, 2008 at 02:00:25AM +0200, Steinar H. Gunderson wrote: On Wed, May 14, 2008 at 11:12:26PM +, brian m. carlson wrote: If one can solve the Discrete Logarithm Problem, then one can factor, but the reverse is not true. This is the first time I've ever heard anyone claim this; I

Re: conglomeration packages (Re: Will nvidia-graphics-drivers ever transition to testing?)

2008-05-14 Thread Filipus Klutiero
Le May 14, 2008 09:41:02 am Lennart Sorensen, vous avez écrit : > On Tue, May 13, 2008 at 10:32:07PM -0400, Filipus Klutiero wrote: > > I don't follow you. iceweasel, for example, is not independent from, say, > > libnspr. > > If they come from one source package, then they all build together. If

Re: SSH keys: DSA vs RSA

2008-05-14 Thread Russ Allbery
Steve Greenland <[EMAIL PROTECTED]> writes: > "brian m. carlson" <[EMAIL PROTECTED]> wrote: >> Therefore, anyone who had a DSA key has had it compromised... > Shouldn't that be "anyone who had a DSA key *created by the flawed > version of openssl* has had it compromised..."? Or are you asserting

Re: SSH keys: DSA vs RSA (was: Alioth and SSH: restored)

2008-05-14 Thread Steinar H. Gunderson
On Wed, May 14, 2008 at 11:12:26PM +, brian m. carlson wrote: > If one can solve the Discrete Logarithm Problem, then one can > factor, but the reverse is not true. This is the first time I've ever heard anyone claim this; I've seen people and textbooks claim they're roughly equivalent, but no

Re: SSH keys: DSA vs RSA (was: Alioth and SSH: restored)

2008-05-14 Thread Steinar H. Gunderson
On Wed, May 14, 2008 at 06:22:37PM -0500, Steve Greenland wrote: >> Therefore, anyone who had a DSA key has had it compromised... > Shouldn't that be "anyone who had a DSA key *created by the flawed > version of openssl* has had it compromised..."? Or are you asserting > something stronger? No. An

Re: SSH keys: DSA vs RSA (was: Alioth and SSH: restored)

2008-05-14 Thread Steve Greenland
On 14-May-08, 18:12 (CDT), "brian m. carlson" <[EMAIL PROTECTED]> wrote: > Therefore, anyone who had a DSA key has had it compromised... Shouldn't that be "anyone who had a DSA key *created by the flawed version of openssl* has had it compromised..."? Or are you asserting something stronger? Ste

Re: SSH keys: DSA vs RSA (was: Alioth and SSH: restored)

2008-05-14 Thread brian m. carlson
On Wed, May 14, 2008 at 11:12:26PM +, brian m. carlson wrote: Also, DSA absolutely requires a good random number generator for every signature. If the nonce is not chosen randomly, it will leak bits of the key. This is true for all discrete logarithm algorithms. Therefore, anyone who had a

Re: SAGE packages for Debian

2008-05-14 Thread Ondrej Certik
On Wed, May 7, 2008 at 10:16 PM, Timothy G Abbott <[EMAIL PROTECTED]> wrote: > That's probably a good plan, especially since the sandbox is apparently > going to be eliminated eventually (and it sounds like arpack and delaunay > are on the list of things likely to be merged into mainline scipy) > >

Re: SSH keys: DSA vs RSA (was: Alioth and SSH: restored)

2008-05-14 Thread brian m. carlson
On Thu, May 15, 2008 at 08:09:12AM +1000, Ben Finney wrote: Roland Mas <[EMAIL PROTECTED]> writes: - Keys submitted through the web interface are now filtered, and only RSA keys end up in your authorized_keys file. Don't even try putting DSA keys in your authorized_keys2 file, the use of t

Re: SSH keys: DSA vs RSA (was: Alioth and SSH: restored)

2008-05-14 Thread The Fungi
On Thu, May 15, 2008 at 08:09:12AM +1000, Ben Finney wrote: > Could you explain the rationale for this? My impression was that DSA > was recommended over RSA. DSA was recommended over RSA in years gone by for reasons of freedom, until late 2000 when MIT's 17-year US patent (4405829) expired on the

Re: package for configuration - Some suggestions

2008-05-14 Thread Timothy G Abbott
You can make packages to do configuration, but there are tricky issues involved in making sure that the right thing happens when the packages you're configuring are upgraded. At MIT, we wrote a system of CDBS modules that automates a lot of the work involved in making configuration packages.

SSH keys: DSA vs RSA (was: Alioth and SSH: restored)

2008-05-14 Thread Ben Finney
Roland Mas <[EMAIL PROTECTED]> writes: > - Keys submitted through the web interface are now filtered, and only > RSA keys end up in your authorized_keys file. Don't even try > putting DSA keys in your authorized_keys2 file, the use of that file > has been disabled (and it'll be deleted anyw

Re: Is openssl actually safe now? (was: debian infrastructure ssh key logins disabled, passwords reset)

2008-05-14 Thread Steinar H. Gunderson
On Wed, May 14, 2008 at 03:33:52PM -0400, Ivan Jager wrote: > I think that might depend on how not truly random the data is. For > example, suppose the pool is coded to simply xor the new entropy with the > pool. It's not -- it's hashed in using a cryptographic hash function. /* Steinar */ --

Re: Is openssl actually safe now? (was: debian infrastructure ssh key logins disabled, passwords reset)

2008-05-14 Thread Ivan Jager
On Wed, 14 May 2008, David Härdeman wrote: If the entropy pool is properly coded, there is no negative effect of adding data which may or may not be truly random to the pool (i.e. you cannot degrade the quality of the pool no matter what you add). Therefore step b) might add some entropy or it mi

Re: db.debian.org/password.html : Why ~/.ssh/id_dsa.pub to setup OpenSSH for RSA

2008-05-14 Thread Adam D. Barratt
On Wed, 2008-05-14 at 19:50 +0200, Luk Claes wrote: > Osamu Aoki wrote: > > Hi, > > > > Recent openssl issue lead me to http://db.debian.org/password.html and > > made me wonder why script example uses DSA key while main text only > > talks about RSA key. > > The text talks about RSA keys as they

Re: db.debian.org/password.html : Why ~/.ssh/id_dsa.pub to setup OpenSSH for RSA

2008-05-14 Thread Luk Claes
Osamu Aoki wrote: > Hi, > > Recent openssl issue lead me to http://db.debian.org/password.html and > made me wonder why script example uses DSA key while main text only > talks about RSA key. The text talks about RSA keys as they are preferred over DSA keys. > | Alternatively, you can do without

Re: SAGE packages for Debian

2008-05-14 Thread Timothy G Abbott
Yes, I realize there is not much time left. I'm also quite busy for the next week or two, after which point I should have time to work on this again. The precise release timeline is very helpful. I won't be able to reasonably maintain this much software in Debian in the long term, but I will

db.debian.org/password.html : Why ~/.ssh/id_dsa.pub to setup OpenSSH for RSA

2008-05-14 Thread Osamu Aoki
Hi, Recent openssl issue lead me to http://db.debian.org/password.html and made me wonder why script example uses DSA key while main text only talks about RSA key. | Alternatively, you can do without a password and use PGP to manipulate your | LDAP information through the mail gateway and use SSH

Re: conglomeration packages (Re: Will nvidia-graphics-drivers ever transition to testing?)

2008-05-14 Thread Lennart Sorensen
On Tue, May 13, 2008 at 10:32:07PM -0400, Filipus Klutiero wrote: > I don't follow you. iceweasel, for example, is not independent from, say, > libnspr. If they come from one source package, then they all build together. If they do not, then it's a dynamicly linked library and each can be built

Re: Is openssl actually safe now? (was: debian infrastructure ssh key logins disabled, passwords reset)

2008-05-14 Thread David Härdeman
On Wed, May 14, 2008 10:21, BALLABIO GERARDO wrote: > Peter Palfrader wrote: >> Due to the weakness in our openssl's random number generator (see the >> Debian Security Advisory #1571 from a few minutes ago[1]) that affects >> among other things ssh keys we have disabled public key auth on all >> p

Re: Is openssl actually safe now? (was: debian infrastructure ssh key logins disabled, passwords reset)

2008-05-14 Thread Richard Kettlewell
BALLABIO GERARDO <[EMAIL PROTECTED]> writes: > if I understand correctly, the problem was that openssl used some > segment of uninitialized memory as a source of entropy, and the > offending patch cleared it. This is not correct. Clearing tmpbuf before reading /dev/urandom is harmless. The broke

Re: analyzing popcon data for bogus recommends

2008-05-14 Thread Enrico Zini
On Tue, May 13, 2008 at 10:51:37PM -0400, Joey Hess wrote: > It would be nice to have a list which Recommends are ignored/overridden > the most when installing packages, to identify Recommends that need to be > downgraded to Suggests. Could we derive such a list from popcon data? I > think it woul

Re: Is openssl actually safe now? (was: debian infrastructure ssh key logins disabled, passwords reset)

2008-05-14 Thread Steve Kemp
On Wed May 14, 2008 at 10:21:18 +0200, BALLABIO GERARDO wrote: > If so, and if that was the ONLY entropy source used in generating keys, > then upstream openssl is (and has always been) just as broken as the > patched Debian package. It wasn't. Steve -- Debian GNU/Linux System Administration

Re: Is openssl actually safe now? (was: debian infrastructure ssh key logins disabled, passwords reset)

2008-05-14 Thread Miriam Ruiz
2008/5/14 BALLABIO GERARDO <[EMAIL PROTECTED]>: > However I wonder, is the pristine behavior correct? As far as I know, it > is NOT justified at all to rely on the assumption that uninitialized > memory contains random data. I read that many architectures reset it to > some magic number, e.g.,

Is openssl actually safe now? (was: debian infrastructure ssh key logins disabled, passwords reset)

2008-05-14 Thread BALLABIO GERARDO
Peter Palfrader wrote: > Due to the weakness in our openssl's random number generator (see the > Debian Security Advisory #1571 from a few minutes ago[1]) that affects > among other things ssh keys we have disabled public key auth on all > project systems until further notice. Hi all, if I underst