- Jun 30, 2000
- 5,885
- 8
- 81
Luciano Bello discovered that the random number generator in Debian's
openssl package is predictable. This is caused by an incorrect
Debian-specific change to the openssl package (CVE-2008-0166). As a
result, cryptographic key material may be guessable.
Here's a link to the Debian announcement: http://lists.debian.org/debian...nce/2008/msg00152.html and the Ubuntu announcement: http://www.ubuntu.com/usn/usn-612-2
From the Ubuntu advisory:
All OpenSSH and X.509 keys generated on such systems must be considered untrustworthy, regardless of the system on which they are used, even after the update has been applied.
From the Debian advisory:
A detector for known weak key material will be published at:
http://security.debian.org/pro...xtra/dowkd/dowkd.pl.gz
http://security.debian.org/pro.../dowkd/dowkd.pl.gz.asc
(OpenPGP signature)
Instructions how to implement key rollover for various packages will be
published at:
http://www.debian.org/security/key-rollover/
The last link still doesn't have any usefull information, so look at this article: http://wiki.debian.org/SSLkeys