TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

About the supposed factoring of a 4096 bit RSA key

231 pointsby hachiyaabout 10 years ago

6 comments

diafygiabout 10 years ago
It is highly likely that this is the work of a troll.<p>The RSA subkey that was factored has an invalid self-signature in hpa&#x27;s public key[1], which means that it wasn&#x27;t really hpa who added the subkey. Since the sks-keyserver pool doesn&#x27;t verify signatures[2], anyone could have inserted that subkey. So anyone could have purposefully picked an exploitable RSA subkey, added a fake signature to it, and uploaded it to the sks-keyserver pool.<p>Luckily, GPG will drop the subkey when retrieving hpa&#x27;s public key since it doesn&#x27;t have a valid self-signature. But for anyone scanning all the public keys without verifying signatures (for research, etc.), this key might get recognized and cause a shitstorm. Which is exactly what has happened.<p>So far, there&#x27;s no evidence that there is a conspiracy to weaken RSA keys. There is only evidence that someone inserted a bogus subkey into hpa&#x27;s public key. There will be evidence of a conspiracy if we find a weak RSA key in the strongset that has a valid self-signature.<p>[1]: <a href="https:&#x2F;&#x2F;gist.github.com&#x2F;anonymous&#x2F;ba23ca66d2ca249e6f84#file-hpa-pub-json-L490" rel="nofollow">https:&#x2F;&#x2F;gist.github.com&#x2F;anonymous&#x2F;ba23ca66d2ca249e6f84#file-...</a><p>[2]: <a href="https:&#x2F;&#x2F;lists.gnupg.org&#x2F;pipermail&#x2F;gnupg-devel&#x2F;2015-March&#x2F;029606.html" rel="nofollow">https:&#x2F;&#x2F;lists.gnupg.org&#x2F;pipermail&#x2F;gnupg-devel&#x2F;2015-March&#x2F;029...</a>
lawnchair_larryabout 10 years ago
I feel like everyone is being quick to write this off as &quot;some random, harmless error&quot;, probably because the focus is that RSA is not broken, rather than asking what this was really about.<p><i>&quot;The only case where this could matter would be a broken implementation of the OpenPGP key protocol that does not check if subkeys really belong to a master key.&quot;</i><p>I&#x27;d be curious to explore that further.<p>This kernel developer has been targeted in the past:<p><a href="http:&#x2F;&#x2F;arstechnica.com&#x2F;security&#x2F;2013&#x2F;09&#x2F;who-rooted-kernel-org-servers-two-years-ago-how-did-it-happen-and-why&#x2F;" rel="nofollow">http:&#x2F;&#x2F;arstechnica.com&#x2F;security&#x2F;2013&#x2F;09&#x2F;who-rooted-kernel-or...</a><p><i>&quot;During that time, attackers were able to monitor the activities of anyone using the kernel.org servers known as Hera and Odin1, as well as personal computers belonging to senior Linux developer H. Peter Anvin. The self-injecting rootkit known as Phalanx had access to a wealth of sensitive data, possibly including private keys used to sign and decrypt e-mails and remotely log in to servers. A follow-up advisory a few weeks later opened the possibility that still other developers may have fallen prey to the attackers.&quot;</i><p>Edit: The key in question was created <i>the day before</i> this post by HPA regarding the compromise:<p><a href="https:&#x2F;&#x2F;lwn.net&#x2F;Articles&#x2F;460376&#x2F;" rel="nofollow">https:&#x2F;&#x2F;lwn.net&#x2F;Articles&#x2F;460376&#x2F;</a>
评论 #9562249 未加载
评论 #9562590 未加载
评论 #9563864 未加载
acqqabout 10 years ago
For anybody who wants to think about how such entry happened, it seems that the difference among the two presented numbers is in exactly 32 bytes (256 bits):<p><pre><code> 913ff626efddfb f8ae8f1d40da8d13 a90138686884bad1 9db776bb4812f7e3 b2 c37b8cca2eb4ac 1e889d1027bc1ed6 664f3877cd7052c6 db5567a3365cf7e2 c6 </code></pre> starting from the 162nd byte if I counted correctly, which means the first 5 * 32+1 (or 2 * 80+1) bytes are the same, then 32 bytes differ.<p>(The &quot;easily factorable&quot; number has two bytes which are represented as &quot;bad1&quot; in hex).<p>But thinking about the 256 bits, that&#x27;s exactly the size of a block on which a typical symmetrical cypher can operate, which suggests some kind of a bug, although the offset of 161 byte is a bit strange.<p>The human would probably just change a few bits to achieve the same effect, not 256, unless he wanted to encode some message, and it doesn&#x27;t look so. But see also the post of lawnchair_larry here.
评论 #9563590 未加载
评论 #9562385 未加载
Dylan16807about 10 years ago
Or the much simpler counter, anything with a factor of three ain&#x27;t a &#x27;real&#x27; 4096 bit RSA key. Even if it was in use, it would say nothing about RSA. Referring to it as a &quot;4096 bit RSA key&quot; is a red herring.
评论 #9562070 未加载
评论 #9562258 未加载
undataabout 10 years ago
<a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=9560790" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=9560790</a>
timothyaabout 10 years ago
Meanwhile, on the original post, the author is acting like HN was tampering with the ranking of the article because it started doing poorly after people realized that a real key wasn&#x27;t factored:<p>&gt; <i>&quot;Update II : Amusingly enough, it seems Hacker News hand-diddled their story list to remove this discussion. Way to go Ydumbinator crew!&quot;</i> [0]<p>[0]: <a href="http:&#x2F;&#x2F;trilema.com&#x2F;2015&#x2F;full-disclosure-4096-rsa-key-in-the-strongset-factored&#x2F;" rel="nofollow">http:&#x2F;&#x2F;trilema.com&#x2F;2015&#x2F;full-disclosure-4096-rsa-key-in-the-...</a>
评论 #9562594 未加载
评论 #9562284 未加载