[e-privacy] Debian flaw causes weak identity keys
Marco A. Calamari
marcoc1 at dada.it
Tue May 13 21:46:52 CEST 2008
Chiunque abbia qualcosa di crypto su debian o derivate.
Non andate a letto prima di aver finito di sistemare tutto!
-------- Forwarded Message --------
From: Roger Dingledine <arma at mit.edu>
To: or-announce at freehaven.net, or-talk at freehaven.net
Subject: Tor security advisory: Debian flaw causes weak identity keys
Date: Tue, 13 May 2008 11:55:35 -0400
SUMMARY:
This is a critical security announcement.
A bug in the Debian GNU/Linux distribution's OpenSSL package was
announced today. This bug would allow an attacker to figure out private
keys generated by these buggy versions of the OpenSSL library. Thus,
all private keys generated by affected versions of OpenSSL must be
considered to be compromised.
Tor uses OpenSSL, so Tor users and admins need to take action in order
to remain secure in response to this problem.
If you are running Debian, Ubuntu, or any Debian-based GNU/Linux
distribution, first follow the instructions at
http://lists.debian.org/debian-security-announce/2008/msg00152.html
to upgrade your OpenSSL package to a safe version. If you're running a
Tor server or a Tor hidden service, then also follow the instructions
below to replace your Tor identity keys.
Also, if you are running Tor 0.2.0.x, you must upgrade to Tor
0.2.0.26-rc.
WHO IS AFFECTED:
This advisory applies to Tor 0.2.0.x and/or any Debian/Ubuntu/related
system running _any_ Tor version. Tor clients and servers that are
running 0.1.2.x and that are not using Debian/Ubuntu/etc don't need
to do anything.
Specific versions affected: All Tor 0.2.0.x development versions up
through 0.2.0.25-rc, and most Debian/Ubuntu/related users regardless of
Tor version.
IMPACT:
A local attacker or malicious directory cache may be able to trick
a client running 0.2.0.x into believing a false directory consensus, thus
(e.g.) causing the client to create a path wholly owned by the attacker.
Further, relay identity keys or hidden service secret keys that were
generated on most versions of Debian, Ubuntu, or other Debian-derived OS
are also weak (regardless of your Tor version):
http://lists.debian.org/debian-security-announce/2008/msg00152.html
WHAT TO DO:
First, all affected Debian/Ubuntu/similar users (regardless
of Tor version) should apt-get upgrade to the latest (i.e. today's)
OpenSSL package.
Second, all Tor clients and servers running 0.2.0.x should upgrade to
0.2.0.26-rc. (Again: Tor clients and servers that are running 0.1.2.x
and aren't using Debian/Ubuntu/related don't need to do anything.)
Third, Tor servers and hidden services running on Debian/Ubuntu/related
(regardless of Tor version) should discard their identity keys and
generate fresh ones. To discard your Tor server's keys, delete
the "keys/secret_*" files in your datadirectory (often it is
/var/lib/tor/). To discard your hidden service secret key, delete
the "private_key" file from the hidden service directory that you
configured in your torrc. [This will change the .onion address of your
hidden service.]
DETAILS:
Due to a bug in Debian's modified version of OpenSSL 0.9.8, all
generated keys (and other cryptographic material!) have a stunningly
small amount of entropy. This flaw means that brute force attacks which
are very hard against the unmodified OpenSSL library (e.g. breaking RSA
keys) are very practical against these keys. See the URL above for
more information about the flaw in Debian's OpenSSL packages.
While we believe the v2 authority keys (used in Tor 0.1.2.x) were
generated correctly, at least three of the six v3 authority keys (used
in Tor 0.2.0.x) are known to be weak. This fraction is uncomfortably
close to the majority vote needed to create a networkstatus consensus,
so the Tor 0.2.0.26-rc release changes these three affected keys.
Relay identity keys and hidden service secret keys generated in this
flawed way are also breakable. That is, any encryption operations with
respect to a weak-key relay (including link encryption and onion
encryption) can be easily broken, and their descriptors can be easily
forged. Soon we will begin identifying weak-key relays and cutting them
out of the network. (We will likely put out another release in a few
days with a new identity key for our bridge authority; we apologize for
the inconvenience to our bridge users.)
Finally, while we don't know of any attacks that will reveal the
location of a weak-key hidden service, an attacker could derive its
secret key and then pretend to be the hidden service.
--
+--------------- http://www.winstonsmith.info ---------------+
| il Progetto Winston Smith: scolleghiamo il Grande Fratello |
| the Winston Smith Project: unplug the Big Brother |
| Marco A. Calamari marcoc at marcoc.it http://www.marcoc.it |
| DSS/DH: 8F3E 5BAE 906F B416 9242 1C10 8661 24A9 BFCE 822B |
+ PGP RSA: ED84 3839 6C4D 3FFE 389F 209E 3128 5698 ----------+
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 307 bytes
Desc: This is a digitally signed message part
URL: <http://lists.winstonsmith.org/pipermail/e-privacy/attachments/20080513/c0af97d9/attachment.pgp>
More information about the E-privacy
mailing list