Category Archives: Information

General news/information to the CAcert community or about security in general

Warning on weak keys and random numbers

Regarding the recently discovered random number vulnerability:

CAcert’s root keys are not affected, since they were created before the bug existed.
CAcert’s internal systems were affected, and are currently being cleaned up.
A lot of our users are affected.
We are currently working on improved methods to detect the vulnerabilities and inform the affected users about them.
In general, digital signatures and certificates are only affected in the case the any of the underlying keys are compromised. Signatures and certificates do not contain any additional random numbers, so they can’t be affected on their own, if the keys are not compromised.

We currently think that the articles in the media hasn’t informed everyone about the whole impact of the problem yet.

The affected distributions contain Debian, Ubuntu, Kubuntu, Knoppix, Grml, and various other Debian based distributions.
Also various embedded systems that are based on Debian are likely affected.

Regarding the applications, OpenSSL, OpenVPN, OpenXPKI, OpenCA, OpenSSH (especially client authorisation keys!), boxbackup and various other software packages are affected.

All systems that are relying on keys that were generated on affected systems are affected.
This means that you should scan all your SuSE, Fedora, Redhat, BSD, … SSH-servers for compromised keys in the authorized keys files of all users, and blacklist the compromised keys accordingly. (And the same for any other services that might rely on the compromised keys.)

If you want to assess the quality of your own random number generator, you can use our free service here:
http://www.cacert.at/random/

We are currently developing a X.509 vulnerability detection system, which will be available for all CA’s, to discover similarly compromised keys as early as possible. If you want to participate and help there, please contact us.
http://wiki.cacert.org/wiki/HashServer

Message to all non-Debian-derived vendors: Please ship blacklists and blacklist-detection software in your security updates. (Port ssh-vuln to your distribution, …) And warn your users too, not to rely on compromised keys anymore.

General information about the vulnerability:

http://wiki.debian.org/SSLkeys
http://www.debian.org/security/key-rollover/
http://www.debian.org/security/2008/dsa-1571

CAcert wieder auf dem Linuxtag 2008 in Berlin

der Linuxtag 2008 vom 28.Mai bis 31.Mai in Berlin steht vor der Tür.
CAcert wird hier auch wieder mit einem Stand vertreten sein an dem sich Interressierte Besucher informieren und assuren lassen können.

Assurer und Interressierte, die gerne helfen wollen sollten sich bitte schnellstmöglich unter http://wiki.cacert.org/wiki/LinuxTag2008 erintragen, damit der Stand und ggf. Eintrittskarten geplant werden kann.

CAcert Assurances on the Penguicon Convention, USA, Michigan, Detroit(Troy)

At the Penguin Convention in Michigan there will be a keysigning party for Michigan and the
surrounding cities (Flint, Lansing etc.). Penguicon is open to the public, but registration is now at the door only for this year.  Penguicon will take place next weekend, April 18-20. in Michigan, US and the details can be found on the official website.  The keysigning portion will take place on Saturday.
More information on the Penguicon Website (http://www.penguicon.org/).

CAcert Association Special General Meeting 4th April 2008 (reminder)

CAcert Inc. as association, will have a Special General Meeting on two by-laws issues to be voted upon:

  1. Rules defining non-profit (a prerequisite for tax reasons);
  2. Enable to vote via email by CAcert association members (needed to get an easier influence from membership).

The SGM is on 4th of April 2008 11 pm MET, via CAcert irc channel. The details are in the SGM agenda.

CAcert association members are called to attend this meeting. The minimum quorum for a formal meeting is five attendees. Even if these voting topics are not much of a discussion the SGM is important and minimizes the costs of operation.

Audit Report 20080321

As promised, there is now a current report posted on the wiki from Audit. Highlights:

  • CAcert is in the process of rolling out its new CAcert Community Agreement. The website now refers to it.
  • Soon, expect to see checkboxes to tick with statements like “I agree to the CAcert Community Agreement”.
  • The Assurance Policy is the next policy that the Audit needs tied down. Currently, it is at an advanced stage. Debate is going on as to whether to drop the requirement for Dates of Birth, as these are considered useful for fraud in some places. Unfortunately, the system does use this as an internal discriminator, so there are pros and cons.
  • Pat Wilson is now working on the Security Manual. Thanks, and welcome Pat!
  • The critical systems are the critical path for audit! Evaldo has been tasked to build the sysadm team, move the systems and implement dual control. See other blog entries!
  • Have you met the Assurer Challenge yet? CATS is in place, and some time soon, assurances will be blocked for those who have not as yet met the challenge.
  • If you are interested in the Audit work, there is a ToDo list on the wiki, and I have put the audit criteria online with the working commentary and (wip) conformance. See the main report for that location and the secret password!

That’s it from the Audit side. Now over to you!