TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

HTTPS Certificates Show Where Their Key Comes From

66 pointsby dc352over 8 years ago

7 comments

rgbrennerover 8 years ago
If you follow the links, you&#x27;ll end up here: <a href="https:&#x2F;&#x2F;www.usenix.org&#x2F;conference&#x2F;usenixsecurity16&#x2F;technical-sessions&#x2F;presentation&#x2F;svenda" rel="nofollow">https:&#x2F;&#x2F;www.usenix.org&#x2F;conference&#x2F;usenixsecurity16&#x2F;technical...</a><p><i>Can bits of an RSA public key leak information about design and implementation choices such as the prime generation algorithm? We analysed over 60 million freshly generated key pairs from 22 open- and closedsource libraries and from 16 different smartcards, revealing significant leakage. The bias introduced by different choices is sufficiently large to classify a probable library or smartcard with high accuracy based only on the values of public keys. Such a classification can be used to decrease the anonymity set of users of anonymous mailers or operators of linked Tor hidden services, to quickly detect keys from the same vulnerable library or to verify a claim of use of secure hardware by a remote party.</i>
评论 #12860933 未加载
评论 #12862881 未加载
评论 #12862678 未加载
评论 #12863747 未加载
评论 #12862676 未加载
voltagex_over 8 years ago
&gt;To help solve this serious issue, Enigma Bridge is proud to have developed a cost-effective, ground-breaking hardware security service which is based in the cloud.<p>Uh huh.<p>So <a href="https:&#x2F;&#x2F;dan.enigmabridge.com&#x2F;re-investigating-the-origins-of-rsa-public-keys&#x2F;" rel="nofollow">https:&#x2F;&#x2F;dan.enigmabridge.com&#x2F;re-investigating-the-origins-of...</a> has some more details, and the paper is at <a href="https:&#x2F;&#x2F;www.usenix.org&#x2F;conference&#x2F;usenixsecurity16&#x2F;technical-sessions&#x2F;presentation&#x2F;svenda" rel="nofollow">https:&#x2F;&#x2F;www.usenix.org&#x2F;conference&#x2F;usenixsecurity16&#x2F;technical...</a><p>It took me a couple of reads through the article to work out they&#x27;re not necessarily talking about key strength, but fingerprinting the software &#x2F; hardware that created the key in the first place.
评论 #12862276 未加载
评论 #12861901 未加载
ryan-cover 8 years ago
The tool this seems to be based on is here: <a href="http:&#x2F;&#x2F;www.fi.muni.cz&#x2F;~xsekan&#x2F;" rel="nofollow">http:&#x2F;&#x2F;www.fi.muni.cz&#x2F;~xsekan&#x2F;</a>
评论 #12861486 未加载
peterwwillisover 8 years ago
In other news, it is less likely that an SSL key was generated using IIS if the platform it is running on is AIX.<p>I mean, it&#x27;s a useful tip when targeting a relatively dark target, but at the same time it isn&#x27;t an absolute indicator of anything other than what generated the key (which nobody was really surprised at before, since everything from the prng to implementation differences could result in unique signatures for keys).<p>This will be useful when someone finds an implementation-specific hole in a key gen and someone wants to sweep the internet for servers with bad keys.
d33over 8 years ago
I flicked through the article and couldn&#x27;t see it written quickly - what information could be extracted from my SSH public key and how?
评论 #12860870 未加载
评论 #12860911 未加载
rurbanover 8 years ago
It didn&#x27;t detect my old gnupg rsa-1024 key, even if it has lots of attachments and subkeys. So call me sceptical.
0xmohitover 8 years ago
Amusing that a <i>security blog</i> has more than half a dozen trackers.
评论 #12862020 未加载