{"id":626,"date":"2008-05-14T12:47:49","date_gmt":"2008-05-14T11:47:49","guid":{"rendered":"http:\/\/www.itwriting.com\/blog\/?p=626"},"modified":"2008-05-14T12:47:49","modified_gmt":"2008-05-14T11:47:49","slug":"painful-debian-ubuntu-ssl-bug","status":"publish","type":"post","link":"https:\/\/www.itwriting.com\/blog\/626-painful-debian-ubuntu-ssl-bug.html","title":{"rendered":"Painful Debian \/ Ubuntu SSL bug"},"content":{"rendered":"<p>A bug in the Debian-modified version of OpenSSL (also used by Ubuntu) means that cryptographic keys generated on Debian systems for the last couple of years may be insecure. Instead of being well randomized, they are easily guessable.<\/p>\n<p>More information about the vulnerability is <a href=\"http:\/\/lists.debian.org\/debian-security-announce\/2008\/msg00152.html\" target=\"_blank\">here<\/a>; how to fix it <a href=\"http:\/\/wiki.debian.org\/SSLkeys\" target=\"_blank\">here<\/a>.<\/p>\n<p>How much does this matter? The full scope has not emerged yet; but as I understand it, it affects self-generated keys. <strike>Those who purchased certificates from a third-party certificate authority are not affected, unless one of those authorities turns out to have been using the broken version which is unlikely.<\/strike> Even if you purchased certificates from a third-party certificate authority, you would still be affected if you generated the certificate request on a system with the broken OpenSSL library (thanks to Nico for the correction below).<\/p>\n<p>This means that a large number of supposedly secure SSH connections or SSL connections to web sites and servers over the last couple of years were actually not very secure at all.<\/p>\n<p>If nothing else, it shows how easy it is to be falsely reassured, to think you are secure when you are not.<\/p>\n<p>It also shows the risks of modifying security code. The problem is not with OpenSSL, but with changes made by a Debian coder who thought he was fixing something when in fact he was breaking it.<\/p>\n<p>This site runs on Debian and I&#8217;ve spent some time today checking it for vulnerability and regenerating keys.<\/p>\n<div class=\"wlWriterSmartContent\" id=\"scid:0767317B-992E-4b12-91E0-4F059A8CECA8:5c20fd32-1a86-4a37-a532-5357fa0b9111\" style=\"padding-right: 0px; display: inline; padding-left: 0px; padding-bottom: 0px; margin: 0px; padding-top: 0px\">Technorati tags: <a href=\"http:\/\/technorati.com\/tags\/debian\" rel=\"tag\">debian<\/a>, <a href=\"http:\/\/technorati.com\/tags\/security\" rel=\"tag\">security<\/a>, <a href=\"http:\/\/technorati.com\/tags\/ssl\" rel=\"tag\">ssl<\/a>, <a href=\"http:\/\/technorati.com\/tags\/ubuntu\" rel=\"tag\">ubuntu<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>A bug in the Debian-modified version of OpenSSL (also used by Ubuntu) means that cryptographic keys generated on Debian systems for the last couple of years may be insecure. Instead of being well randomized, they are easily guessable. More information about the vulnerability is here; how to fix it here. How much does this matter? &hellip; <a href=\"https:\/\/www.itwriting.com\/blog\/626-painful-debian-ubuntu-ssl-bug.html\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Painful Debian \/ Ubuntu SSL bug<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[62,75,96],"tags":[],"class_list":["post-626","post","type-post","status-publish","format-standard","hentry","category-open-source","category-security","category-web-authoring"],"_links":{"self":[{"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/posts\/626","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/comments?post=626"}],"version-history":[{"count":0,"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/posts\/626\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/media?parent=626"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/categories?post=626"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/tags?post=626"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}