The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[USN-612-9] openssl-blacklist update


<< Previous INDEX Search src / Print Next >>
Date: Thu, 12 Jun 2008 20:19:08 -0400
From: Jamie Strandboge <jamie@canonical.com.>
To: [email protected]
Subject: [USN-612-9] openssl-blacklist update
Message-ID: <20080613001908.GA6910@severus.strandboge.com.>
Reply-To: Jamie Strandboge <jamie@canonical.com.>
MIME-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
        protocol="application/pgp-signature"; boundary="2fHTh5uZTiUOsy+g"
Content-Disposition: inline
User-Agent: Mutt/1.5.17+20080114 (2008-01-14)
X-Virus-Scanned: antivirus-gw at tyumen.ru


--2fHTh5uZTiUOsy+g
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=20
Ubuntu Security Notice USN-612-9              June 12, 2008
openssl-blacklist update
http://www.ubuntu.com/usn/usn-612-1
http://www.ubuntu.com/usn/usn-612-3
http://www.ubuntu.com/usn/usn-612-8
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS
Ubuntu 7.04
Ubuntu 7.10
Ubuntu 8.04 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
  openssl-blacklist               0.3.3+0.4-0ubuntu0.6.06.1
  openssl-blacklist-extra         0.3.3+0.4-0ubuntu0.6.06.1

Ubuntu 7.04:
  openssl-blacklist               0.3.3+0.4-0ubuntu0.7.04.1
  openssl-blacklist-extra         0.3.3+0.4-0ubuntu0.7.04.1

Ubuntu 7.10:
  openssl-blacklist               0.3.3+0.4-0ubuntu0.7.10.1
  openssl-blacklist-extra         0.3.3+0.4-0ubuntu0.7.10.1

Ubuntu 8.04 LTS:
  openssl-blacklist               0.3.3+0.4-0ubuntu0.8.04.1
  openssl-blacklist-extra         0.3.3+0.4-0ubuntu0.8.04.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

USN-612-3 addressed a weakness in OpenSSL certificate and key
generation in OpenVPN by introducing openssl-blacklist to aid in
detecting vulnerable private keys. This update enhances the
openssl-vulnkey tool to check Certificate Signing Requests, accept
input from STDIN, and check moduli without a certificate.

It was also discovered that additional moduli are vulnerable if
generated with OpenSSL 0.9.8g or higher. While it is believed that
there are few of these vulnerable moduli in use, this update
includes updated RSA-1024 and RSA-2048 blacklists. RSA-512
blacklists are also included in the new openssl-blacklist-extra
package.

You can check for weak SSL/TLS certificates by installing
openssl-blacklist via your package manager, and using the
openssl-vulnkey command.

$ openssl-vulnkey /path/to/certificate_or_key
$ cat /path/to/certificate_or_key | openssl-vulnkey -

You can also check if a modulus is vulnerable by specifying the
modulus and number of bits.

$ openssl-vulnkey -b bits -m modulus

These commands can be used on public certificates, requests, and
private keys for any X.509 certificate, CSR, or RSA key, including
ones for web servers, mail servers, OpenVPN, and others. If in
doubt, destroy the certificate and key and generate new ones.
Please consult the documentation for your software when recreating
SSL/TLS certificates. Also, if certificates have been generated
for use on other systems, they must be found and replaced as well.

Original advisory details:
 A weakness has been discovered in the random number generator used
 by OpenSSL on Debian and Ubuntu systems. As a result of this
 weakness, certain encryption keys are much more common than they
 should be, such that an attacker could guess the key through a
 brute-force attack given minimal knowledge of the system. This
 particularly affects the use of encryption keys in OpenSSH, OpenVPN
 and SSL certificates.


Updated packages for Ubuntu 6.06 LTS:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/o/openssl-blacklist/openssl=
-blacklist_0.3.3+0.4-0ubuntu0.6.06.1.dsc
      Size/MD5:      676 89fb90524719b9111b4b53bd0bf2d444
    http://security.ubuntu.com/ubuntu/pool/main/o/openssl-blacklist/openssl=
-blacklist_0.3.3+0.4-0ubuntu0.6.06.1.tar.gz
      Size/MD5: 30176979 0fa961fefdb5d1d119d3d7ccd9d1fd9b

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/main/o/openssl-blacklist/openssl=
-blacklist-extra_0.3.3+0.4-0ubuntu0.6.06.1_all.deb
      Size/MD5:  3160598 f39ce3b4d6647ab1b42abda821db12b5
    http://security.ubuntu.com/ubuntu/pool/main/o/openssl-blacklist/openssl=
-blacklist_0.3.3+0.4-0ubuntu0.6.06.1_all.deb
      Size/MD5:  6332528 4f35adfa4e7bbda9ab60132822fe977f

Updated packages for Ubuntu 7.04:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/o/openssl-blacklist/openssl=
-blacklist_0.3.3+0.4-0ubuntu0.7.04.1.dsc
      Size/MD5:      812 7bf95a24470a17f32c6b452bd3b3c610
    http://security.ubuntu.com/ubuntu/pool/main/o/openssl-blacklist/openssl=
-blacklist_0.3.3+0.4-0ubuntu0.7.04.1.tar.gz
      Size/MD5: 30177088 b05d4fcc06963498a6e7d1e83c08601a

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/main/o/openssl-blacklist/openssl=
-blacklist-extra_0.3.3+0.4-0ubuntu0.7.04.1_all.deb
      Size/MD5:  3160688 a49caa8400b04a004278db7007a9dca8
    http://security.ubuntu.com/ubuntu/pool/main/o/openssl-blacklist/openssl=
-blacklist_0.3.3+0.4-0ubuntu0.7.04.1_all.deb
      Size/MD5:  6333040 20e73176c08fa030094422c6fd099115

Updated packages for Ubuntu 7.10:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/o/openssl-blacklist/openssl=
-blacklist_0.3.3+0.4-0ubuntu0.7.10.1.dsc
      Size/MD5:      812 83f92307d568d4e9c01f3577ceee55dc
    http://security.ubuntu.com/ubuntu/pool/main/o/openssl-blacklist/openssl=
-blacklist_0.3.3+0.4-0ubuntu0.7.10.1.tar.gz
      Size/MD5: 30177079 84ff53a584aefcf805055e0a4e1ba393

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/main/o/openssl-blacklist/openssl=
-blacklist-extra_0.3.3+0.4-0ubuntu0.7.10.1_all.deb
      Size/MD5:  3160544 2a79c504b1de43d28ab0742cf34ddf99
    http://security.ubuntu.com/ubuntu/pool/main/o/openssl-blacklist/openssl=
-blacklist_0.3.3+0.4-0ubuntu0.7.10.1_all.deb
      Size/MD5:  6333028 332186adc40b9397e2b2ab4b24c23ca8

Updated packages for Ubuntu 8.04 LTS:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/o/openssl-blacklist/openssl=
-blacklist_0.3.3+0.4-0ubuntu0.8.04.1.dsc
      Size/MD5:      943 e8a734fea0acf90b2832c55a99bd5c76
    http://security.ubuntu.com/ubuntu/pool/main/o/openssl-blacklist/openssl=
-blacklist_0.3.3+0.4-0ubuntu0.8.04.1.tar.gz
      Size/MD5: 30177076 f746269928a9ea1606f2230c7fcfa06f

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/main/o/openssl-blacklist/openssl=
-blacklist-extra_0.3.3+0.4-0ubuntu0.8.04.1_all.deb
      Size/MD5:  3160624 9e4bb8e514ced33b70bf2916dbb04334
    http://security.ubuntu.com/ubuntu/pool/main/o/openssl-blacklist/openssl=
-blacklist_0.3.3+0.4-0ubuntu0.8.04.1_all.deb
      Size/MD5:  6332980 4c7b0d4ee82baaa67f9bd7c282faa58b



--2fHTh5uZTiUOsy+g
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFIUbz8W0JvuRdL8BoRAshhAKCb2QJttgjbZsWFAzavAecA5PYN8wCfefgG
EtZfj3DYK22jF6R5iHq7tn0=
=18Ro
-----END PGP SIGNATURE-----

--2fHTh5uZTiUOsy+g--


<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру