TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Lessons from the Debian/OpenSSL Fiasco (2008)

59 pointsby pgn674about 2 years ago

7 comments

hannobabout 2 years ago
I recently spend some time looking into this bug again, because I develop a tool to detect known cryptographic vulnerabilities in public keys called badkeys - <a href="https:&#x2F;&#x2F;badkeys.info&#x2F;" rel="nofollow">https:&#x2F;&#x2F;badkeys.info&#x2F;</a> if you&#x27;re interested.<p>Some notable things I learned:<p>* This affects both OpenSSL and OpenSSH, but the keys are different. I.e. you have a set of vulnerable OpenSSH keys and a set of vulnerable OpenSSL keys. But the key format is the same, yet most of the tools to detect just look for either of these. I found a TLS certificate created with a vulnerable key generated by OpenSSH.<p>* It was &quot;conventional wisdom&quot; that ECDSA was unaffected because some sources said that OpenSSL version did not support ECDSA. However that was wrong, you can generate ECDSA keys with that old version.<p>Generally it seems a lot of the detection tools are incomplete. E.g. github seems to block some vulnerable keys, but only a subset.
评论 #34955426 未加载
bomboloabout 2 years ago
Every time this gets brought up, people forget that the patch had been sent to the openssl mailing list and someone said that it looked fine.<p>But here we have all the proponents of &quot;distributions should never do any patch (and thus leave all the security issues open)&quot;. But they live in a fantasy world where all upstream authors reply within 3 minutes, fix issues within 30 minutes and of course backport the fix.
评论 #34957950 未加载
评论 #34957942 未加载
dangabout 2 years ago
Discussed at the time:<p><i>Lessons from the Debian&#x2F;OpenSSL Fiasco</i> - <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=196035" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=196035</a> - May 2008 (2 comments)
jmclnxabout 2 years ago
&gt; Try not to write clever code. Try to write well-organized code.<p>Decades ago someone wrote an empty loop to do &quot;something&quot; and it looped for a fixed number of times. No one knew why. But seemed that loop depended upon the frequency of the CPU. It was kind of a sleep (I forgot most of the details) that was needed for some reason. When the system was upgraded, things stated breaking.<p>That statement should be a tattoo on everyone&#x27;s hand :)
评论 #34957910 未加载
javier_e06about 2 years ago
I looked at the list of take-aways and one big important take away was missing. Testing. If a SSL depends on generating millions of unique keys then there should be an existing test somewhere the ensures that SSL does this before the release into production. The test would have caught the initialization and send the code back for re-work, clarification.
评论 #34956413 未加载
PufPufPufabout 2 years ago
I don&#x27;t quite understand why would Debian keep their own forks of software and don&#x27;t even attempt to upstream the changes. Is it just security backports to ensure &quot;stability&quot; by not actually updating the packages, or do they have other reasons for the changes?
评论 #34955679 未加载
jeffrallenabout 2 years ago
Wonder if any of the lessons got learned? We, as an industry, are absolutely terrible at this, but hope springs eternal...
评论 #34957855 未加载
评论 #34954829 未加载
评论 #34954606 未加载
评论 #34955227 未加载