by pgn674 on 2/26/23, 3:09 PM with 25 comments
by hannob on 2/27/23, 8:39 AM
Some notable things I learned:
* This affects both OpenSSL and OpenSSH, but the keys are different. I.e. you have a set of vulnerable OpenSSH keys and a set of vulnerable OpenSSL keys. But the key format is the same, yet most of the tools to detect just look for either of these. I found a TLS certificate created with a vulnerable key generated by OpenSSH.
* It was "conventional wisdom" that ECDSA was unaffected because some sources said that OpenSSL version did not support ECDSA. However that was wrong, you can generate ECDSA keys with that old version.
Generally it seems a lot of the detection tools are incomplete. E.g. github seems to block some vulnerable keys, but only a subset.
by bombolo on 2/27/23, 12:22 PM
But here we have all the proponents of "distributions should never do any patch (and thus leave all the security issues open)". But they live in a fantasy world where all upstream authors reply within 3 minutes, fix issues within 30 minutes and of course backport the fix.
by dang on 2/26/23, 7:59 PM
Lessons from the Debian/OpenSSL Fiasco - https://news.ycombinator.com/item?id=196035 - May 2008 (2 comments)
by jmclnx on 2/27/23, 1:31 PM
Decades ago someone wrote an empty loop to do "something" and it looped for a fixed number of times. No one knew why. But seemed that loop depended upon the frequency of the CPU. It was kind of a sleep (I forgot most of the details) that was needed for some reason. When the system was upgraded, things stated breaking.
That statement should be a tattoo on everyone's hand :)
by javier_e06 on 2/27/23, 1:20 PM
by PufPufPuf on 2/27/23, 12:03 PM
by jeffrallen on 2/27/23, 7:06 AM