Monthly Archives: January 2009

CAcert-Parties im Rheinland und Ruhrgebiet

Im Rahmen der Vorträge der beiden Java-User-Groups rheinjug und ruhrjug wird es wieder die Möglichkeit geben, sich assuren zu lassen:

Die Vorträge selbst finden ab ca. 19:00 statt, Assurer werden ab ca. 18:30 vor Ort sein. Während den Vorträgen ist KEINE Assurance möglich, erst wieder ab ca. 21:00.

Rheinjug (15.1.2009), Thema: Was ist OpenESB?, Dozent: Christof Strack

> Institut für Informatik
> Heinrich-Heine-Universität Düsseldorf
> Gebäude 25.22
> Hörsaal 5D (oder 5F, je nach Resonanz)

Ruhrjug (22.1.2009), Thema: Erstellung hoch-performanter Websites, Dozent: Peter Roßbach

> Unperfekthaus
> Friedrich-Ebert-Strasse 19
> 45127 Essen

Bei beiden Gelegenheiten wird auch PGP-Keysigning möglich sein.

CAcert Assurance event Fosdem’09, Brussels, Sun 8 Febr 2009

At the upcoming Fosdem’09 Free and Open Source Developers’ European Meeting, 7-8 Febr 2009 in Brussels, Belgium there will be at Sunday 8th of Febr 2009 12-14 pm  a CAcert Assurance event as well a PGP signing party will be helt. During the two meeting days there will be enough assurers around to assure you also if you cannot make it on this party time.Be prepared and take the newest 2009 CAcert Assurance Programme form and for PGP your PGP fingerprint with you to the meeting. Make sure you agree to the CAcert Community Agreement and if you have at least 100 Assurance points you have passed the Assurer Challenge. For more details visit the Fosdem web pages and the Assurance Party pages.

Happy new attack!

A few days ago, a group of scientists and security specialists finally succeeded to create a rogue CA that was able to issue certificates that are accepted by all browsers:

http://www.win.tue.nl/hashclash/rogue-ca/ and http://www.phreedom.org/research/rogue-ca/ The problem underneath are weaknesses that were discovered in the MD5 hash-algorithm.

CAcert has switched from MD5 to SHA-1 for certificate-issueing a few years ago, when the first research results were made public that indicated that such an attack will become feasible. CAcert is currently still using an intermediate CA that was issued with an MD5 based signature 3 years ago. We are currently working to phase out this intermediate CA.

We suggest that all certificates (except for root certificates, which aren’t affected), regardless of which CA has issued them, that were still issued with MD5, be replaced with SHA-1 based certificates within the next 3 months. We also suggest that all company-internal or organisation internal CA’s be checked and switched from MD5 to SHA-1 where necessary. To detect, whether a webserver certificate or any of the intermediate certificates are MD5 based, you can use this Firefox extension: http://codefromthe70s.org/sslblacklist.aspx

Happy new year!