back to article After Debian's epic SSL blunder, a world of hurt for security pros

It's been more than a week since Debian patched a massive security hole in the library the operating system uses to create cryptographic keys for securing email, websites and administrative servers. Now the hard work begins, as legions of admins are saddled with the odious task of regenerating keys too numerous for anyone to …

COMMENTS

This topic is closed for new posts.

Page:

  1. Anonymous Coward
    Thumb Down

    Beware applying the patch on remote servers!

    How apt! Working with Ubuntu Gutsy 7.10 I am currently dealing with another after-effect of the patch which can lock administrators out of remote OpenVPN servers if not caught *before* the security updates are applied.

    When operating OpenVPN in the server and multiple-client configuration, if the clients (or the server) are allowed to apply the security updates ad-hoc then the existing tunnels will be broken and be unusable since as part of the (Ubuntu package) patch the openssl-vulnkey utility tests existing keys and refuses to use them if they are potentially compromised.

    The problem with that is when the OpenVPN tunnel is the only secure access method to remote systems (SSH 'public' access not enabled) then the only way to remotely manage the remote system is immediately lost.

    If you don't have some out-of-band fall-back method to access the remote system you've gone from bad to worse!

    If you have some form of access to an updated system in this situation the work-around is to temporarily replace openssl-vulnkey with a sym-link that tells openvpn the existing key is okay:

    $ sudo mv /usr/sbin/openssl-vulnkey /usr/sbin/openssl-vulnkey.bak

    $ sudo mv /usr/sbin/openvpn-vulnkey /usr/sbin/openvpn-vulnkey.bak

    $ sudo ln -s /bin/true /usr/sbin/openssl-vulnkey

    Now OpenVPN will start with the iffy keys and you can at least update the keys, which as well as the client certificates may include dh1024.pem, ca.{key,crt}, server.{key,crt,csr}, ta.key

    Useful reminder:

    http://openvpn.net/index.php/documentation/howto.html#pki

    Tip: Generate keys in a virtual machine image which is itself encrypted rather than on a regular system.

    Is anyone keeping track of which SSL issuing authorities are providing instructions and free (zero-cost) certificate re-issues for affected certificates which need new CSRs?

  2. Anonymous Coward
    Anonymous Coward

    Yeah not trivial

    The two year exposure is the big kicker really.

    In a way the many eyes argument has been severely weakened.

    Still such is the nature of opensource not too much repercussion for the person who made the patch, and anyone using the Debian packages shares if not a legal responsibility then an ethical responsibility for the vulnerability, I assume the patch in all its source code goodness was publicly available throughout.

    And whilst a system would probably have been vulnerable for a cuple of years, it doesn't look like exploits were active - but of course the cleanup is not simple, and quite fraught with locking yourself out of the box.

    It is actually prudent to keep and openssh connection to a remote system, whilst you do this.

    Whilst in no way do I guarantee your connection will not be dropped, I have noticed that sshd options can be changed and the daemon restarted with the ssh client still connected (to test you ssh in at another shell).

    Though, I do tend to have other options set to keepalive so that may be a factor.

  3. Chris Thomas
    Flame

    Public Lynching at 11pm

    There are some people on this planet who typed the code that did this, there is a group of people directly responsible.

    Who are there, I want to see them publically lynched, I want them kicked out of the debian project and humiliated on slashdot, total destruction of their online status and shown as an example for all to see.

    Who the f**k does something like "remove" a key component of the RNG in the first place, a dumbass, thats who, a total waste of space, do they even acknowledge the damage they have done?

    Just a good job that most of the people I know wouldnt touch debian with a 10 year, out of date bargepole that debian is.

    I know some people who are very angry about this and some people who are apologetic (freetards!!)

    This is a disaster.

  4. Anonymous Coward
    Anonymous Coward

    Extreme solution

    Our extreme, but effective solution, was to rebuild all our Debian servers with CentOS instead. My predecessors had decided to use Debian on a whim, as they were GNU fanatics (a number of poor quality GPL libraries and tools were chosen over those with BSD and ASF licenses for "political" reasons as well). We've had no end of trouble with the machines, and the OpenSSL mess was the final straw. In all, we had to rebuild 14 machines and decommission 2 more,

    The problem with the Debian project, is that a number of its package maintainers believe they know better than the the original authors of the software. They muck about not only with the configuration of the software, but the source code itself. OpenSSL is a classic example, and the dubious Firefox patches that resulted in them having to call their version "Iceweasel" at the insistence of the Mozilla Foundation is another.

  5. Herby

    Does this only effect Debian?

    What about other Linux distributions? RedHat, Fedora, etc...

    Yes, a public thrashing would be nice, so we know who the guilty are!

  6. Anonymous Coward
    Linux

    re: Does this only effect Debian?

    Only Debian and Debian based distributions, chiefly Ubuntu.

    Redhat, Fedora, Slackware, Gentoo, Mandriva etc aren't affected.

    Public humiliation would be too good for the Debian packager responsible, but all the same he/she should be stripped naked and placed in stocks in the centre of a local city where locals will be encouraged to shout abuse and throw objects.

    I'm sick and tired of packagers, whatever the distribution, who mess with code. Complaints and support requests just end up going to the original project who have enough to deal with without broken hacks added by idiots. The number of times I've seen packagers attempt to fix bugs without reporting them upstream where they might be fixed properly and for everyone. Equally there are a large number of bugs which can be traced directly to mistakes or bad decisions made when packaging occurs e.g. Wrong compile options, or non-standard install locations.

    Good packagers are appreciated for the work they do, bad packagers make life hard for users and developers alike.

  7. Anonymous Coward
    Boffin

    Well, that's weird...

    Go to http://metasploit.com/users/hdm/tools/debian-openssl/ then take the second link from the top saying 'removed' which brings up the diff, then look at the new version:

    #ifndef PURIFY

    /*

    * Don't add uninitialised data.

    MD_Update(&m,buf,j); /* purify complains */

    */

    #endif

    then you notice that this would not have compiled at all because of imbricated block comment just created. Do they always compile with -DPURIFY, thus killing the lats MD_Update anyway?

  8. Anonymous Coward
    Stop

    Here comes the lynch-mob

    My original comment was #1 here. Although annoyed about the extra workload the problem has required I'm amazed and somewhat disappointed at the small-minded responses attacking the Debian packager(s).

    If anyone cared to do even a cursory search they'd find out that the original intention of the Debian patch was to "...remove valgrind warnings related to the use of uninitialised memory within the openssl libraries. This was done to try to make it easier to debug C applications that use the openssl libraries which is a good thing to do."

    Also: "...that this was discussed with the !OpenSSL team and that no objections were raised at the time."

    It apparently comes down to "...the main culprit seems to be a misunderstanding about which is the right [mailing] list to ask this question on, followed by misleading answers from the list."

    For an overview see http://wiki.debian.org/SSLkeys#head-76415d1c2f25f12ebbcc99bb93959a97f18e3b88

    For the specifics of how and when the bug was introduced see

    http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=363516

  9. Neil Hunt
    Paris Hilton

    Thanks for the notification

    Quite some time ago, I stopped reading things like the Secunia mailing lists or Bugtraq, as I am only the TL and not the admins responsible for this sort of thing. I have too much to do in my day without needing to worry about this sort of thing. Perhaps I need to go back to reading these lists - or at least the weekly summaries - so that when my admins don't find out about such a critical bug, I can "let them know".

    I'm about to walk out of my office, and have a word with the "security" admin, and find out his plans for patching the 42 servers with multiple vulnerable certificates on each. Fortunately most are generated in house, but there are a few that will require new certs from the authorities.

    It's good to know that The Register is still an excellent site for pertinent info in this rapidly moving IT society.

    Paris, because well I think even she would know about this sort of vuln if it was her very well paying job to know about it.

    Oh Michael, can you please come in here, NOW?!

    ...........................................

  10. Steve Sorensen
    Unhappy

    re: re: Does this only effect Debian?

    > Only Debian and Debian based distributions, chiefly Ubuntu.

    Knoppix and Linspire too. There's a list of Debian-based distros at http://www.debian.org/misc/children-distros

  11. This post has been deleted by its author

  12. Anonymous Coward
    Anonymous Coward

    Re: Well, that's weird...

    > then you notice that this would not have compiled at all because of imbricated block comment just created. Do they always compile with -DPURIFY, thus killing the lats MD_Update anyway?

    The submitter is "kroeckx" (Kurt Roeckx). However, this is not necessarily the person who modified the code, only the person who reviewed and committed it. Given the poor job of modifying the code (it does not compile unless PURIFY is defined, as mentioned above), the person who did write it should be excluded from submitting patches in the future.

    A bigger problem is Debian allowing idiots to modify one of the most linked and most security-sensitive libraries.

  13. Anonymous Coward
    Flame

    Right let's get this over with now....

    "Ha ha! So called "secure" Linux is still open to serious problems."

    "The wonder of open source, you can at least find these problems."

    "MS/Apple/SUN/IBM/etc wouldn't have admitted to this."

    "A devout MS/Apple/etc zealot, I would never lower myself to use Linux."

    "Well Ubuntu has always been problematic, that's why I prefer to spend 16 weeks compiling my kernel in Gentoo, so I can be all smug."

    "At least MS/Apple/etc would have made the patching/correction/fixing this sort of thing easier to install."

    "Shareholders would want blood, if this had been MS/Apple/etc."

    "No wonder everyone thinks Linux is a joke."

    Feel free to add more....

  14. Anonymous Coward
    Flame

    lynch mob

    only 2 maybe 3 comments down there are calls or public floggings.

    Its a security issue, with a computer system, it conceivably could have and in the past has been any computer system.

    If such barbaric responses were made all and any indiscretion then no one would be programming computers and most the likely the person who suggested this course of action would be the most flogged.

  15. Karl Lattimer

    Quote that says it all

    "This is a bit of a nightmare for anybody who used Debian"

    past tense. USED debian... I doubt they'll be using it any more! This distribution (and ubuntu) will likely be black listed from all fortune 500ers simply because they have no legal recourse.

    This event has highlighted an important computer science mantra. Don't mess with other peoples cryptographic routines, you'll most likely break them.

  16. John Robson Silver badge
    Stop

    Not limited to debian based systems.

    This is an interesting bug as it affects anyone who has trusted anyone who used the affected OpenSSL library.

    So *everyone* needs to check *all* keys and certificates on *all* of their systems.

    It's a real bugger, fortunately we're small, and all our certs are signed by a self signed CA.

    It only took one late night, and that was because there was no warning on the OpenSSH package update that it would prevent affected keys from being used, so I locked myself out of the servers.

  17. Daniel Palmer
    Thumb Down

    Picking facts from the air.

    >It vastly reduces the amount of entropy used when programs like the Apache >webserver, Sendmail, Exim and some implementations of Kerberos use OpenSSL >to perform basic cryptographic functions.

    Exim uses GNUTLS in Debian[1],.. maybe before blowing your horn off you should do your research? Anyone that actually has "Sendmail" and not a wrapper around a real MTA installed should be shot anyhow.

    [1]

    libgnutls.so.26 => /usr/lib/libgnutls.so.26 (0x00002aaf7d373000)

  18. Chris Thomas
    Flame

    The real problem with debian

    As far as I see it, the biggest problem with debian is that they can't use software like everyone else, they "import" the official tree into debians tree, modify it so it runs better with debian and then thats their tree they use for the distribution.

    Anyone remember what retarded noise came from them when Mozilla's icon came up in the press a while back.

    paraphrasing "We are going to fork firefox to call it iceweasel because the icon is not free (as in speech)"

    They are the most retarded linux devs on the planet, and I am glad that they do very little in terms of developing linux compared to the bigger players like redhat and suse and novell (even if they are tainted by MS, they still do more work than debian)

    If you have a patch to stop valgrind making noises, why not just put the patch into the official tree, let it be audited by everyone and then pushed out through a normal release, why patch it in the debian tree and push it out from there, hardly anyone I know uses debian anyway, so the more eyes make bugs shallow argument doesnt necessarily fly (because with debian, there are not so many eyes)

    Can anyone remember the last time debian made something revolutionary for the linux ecosystem? Graphical installers? dbus? gnome? kde? firefox? x.org?

    Yeah, I am sure they "contributed" but by comparison, my take on this is that they are the poor family of the linux world who nobody really likes.

    I am glad they are spiralling around the cesspit of death, got no money? awwww, poor debian, maybe you should pay more money on developers and less on "committees". Ubuntu stealing the wheat from debians chaff and I'm glad of it.

  19. Andrew Oakley
    Alert

    Affects ALL distros, not just Debian/Ubuntu etc.

    This bug affects ALL Linux distributions and indeed all systems that use SSL keys, including MS-Windows and MacOS.

    Any user of your non-Debian system may have created their SSL keys on a Debian system.

    For example, if you're running SSH on a Red Hat or MS-Windows server, you need to check whether any users have uploaded weak Debian keys to their .ssh user directories.

  20. Anonymous Coward
    Anonymous Coward

    Analogies

    This brings the closed vs. open source argument sharply into focus. It seems to me that the situation is disturbingly like Brittanica vs Wikipedia. Brittanica is a lumbering, bloated dinosaur produced by a byzantine system of professionals that is full of information that was once correct, wherease Wikipedia is a dynamic collaborative project that is up-to-the-minute, but where any part of it can be wrecked by anyone, even if they have followed etiquette and asked on the Talk page about their changes first.

  21. Anonymous Coward
    Linux

    Re: Does this only effect Debian?

    No, any other system that uses Open SSH are also affected as a compromised key generated on a Debian host that uses trusted key logon to access a remote server makes that server vulnerable to a brute force attack - I think someone said the key combinations can be iterated in about 20 min. There is a python script doing the rounds that checks for compromised keys - it's linked from the Debian wiki article IIRC.

  22. Sam Hocevar
    Flame

    The irony

    (disclaimer: I am a Debian developer)

    I find it highly ironical that the people asking that only developers "who know what they are doing" be allowed to contribute are precisely the people who do not appear to know much about the issue.

    For instance, there is constant ignorance (or deliberate omission) that the Debian OpenSSL maintainer discussed the patch that was submitted to him with the original submitter, then discussed his proposal with the OpenSSL upstream (stating "I have no idea what effect this really has on the RNG") and getting what really looks like an OK from an OpenSSL developer ("If it helps with debugging, I'm in favor of removing them"). Yet I don't see anyone asking for that developer to be kicked from the OpenSSL project.

    To be honest, as a software developer I really wish distribution maintainers would tell me more about patches they apply. But this is certainly not specific to Debian: I can name patches for my software that I had to find myself in at least FreeBSD, Mandriva, Fedora, Ubuntu and ArchLinux and that the maintainers never bothered to tell me about. But in that regard, the Debian OpenSSL maintainer has been absolutely faultless and I wouldn't trade him for ten of the people who want his head.

  23. Mage Silver badge
    Coat

    Arguments

    It's nothing to do with open vs closed source or even Debian

    The Debian people brought their tool error problem to attention of OpenSSH, who ignored it. The Debian guy then did an incorrect fix.

    1) Because the code was C

    2) Because the lack of a comment in the source

    3) Because the design by OpenSSH of using allegedly uninitailised RAM to make it more random was flawed.

    4) The Debian guy didn't understand what OpenSSH had done (which creates a tool error when you compile.

    5) Because OpenShh ignored his requests for help resolving the issue.

    6) because a HW RNG is *STILL* not standard on all platforms. (Some old Intel chipsets, some VIA and some ARM have a HW RNG).

    There is quite a flame war between some OpenSSH, Debian and random other folk on the blog of one of the OpenSHH team.

    This was an unusual mix of issues not helped by the general crapness of C / C++ as a secure accurate programming language.

    Almost all buffer overflow vulnerabilities are also as much due to the nature of C / C++ stupid array bound checking (by default none) and stupid string handling as inept programming. Java and C# only slightly alleviate these issues.

    Mines the one with Modula-2, Ada, Occam and Oberon on the back

  24. Chris Thomas
    Flame

    Re: Does this only affect Debian?

    So basically, it affects everyone because people like to use debian to generate the keys, but if they generated the keys on fedora for example, or centos, there would be no problem.

    So yes, it does affect fedora, centos, suse, everyone, but ONLY if you generated the keys on debian.

    So there you have it, everyone stop using debian and use a better more up to date distro with it's head not stuck in the sands of time.

    Simple really, these guys are a joke, this just proves it, no wonder they are getting killed by ubuntu.

  25. Daniel Palmer

    @The real problem with debian

    >Can anyone remember the last time debian made something revolutionary

    >linux ecosystem? Graphical installers? dbus? gnome? kde? firefox? x.org?

    apt? dpkg? debian-installer has had a graphical option since Etch...

    Also your argument about Debian "importing trees" is total crap. The Debian packaging tools advise "against" creating native packages that depend on the Debian build tools, and actually create a complete trail of changes that have happened to the original source....

    It takes one slip up to bring out all the whiners and idiots... Debian isn't only vendor that patches software; I'm pretty sure Fedora patch their packages to put config files in really stupid places, maybe it's just magic?

    El Reg is populated by super-humans that never make mistakes apparently.

  26. Daniel Palmer
    Flame

    @Chris Thomas

    >Simple really, these guys are a joke, this just proves it, no wonder they are getting >killed by ubuntu.

    Ubuntu imported the exact same duff patch into their archive, which sort of proves how much auditing is happening on their packages. Which is ironic, we're being told "people that don't know what they are doing shouldn't get involved" but it's fine for Ubuntu to mass import packages with little or no knowledge of how those packages work?

    Flawed logic.

  27. This post has been deleted by its author

  28. Wayland Sothcott
    IT Angle

    Computers are deterministic

    They don't generate random numbers. Any number a computer generates is a function of it's programming and it's inputs. If you are smart enough you could recreate those inputs and get the same number. People say the real world is like this too but experiments only work under the simplist of controled conditions.

  29. Anonymous Coward
    Anonymous Coward

    @Sam

    What part of "helps with debugging" do you not understand ?

  30. Chris Thomas
    Flame

    @Daniel Palmer

    No, it's not flawed logic, I'll explain myself better.

    Right now, almost all the debian devs are leaving, or pi**ed at the project, ubuntu is creaming the crop from what I read and everyone who installs linux, either installs fedora, ubuntu or suse, only mega hardcore geeks who are more interested in playing with config files than use their computer use debian.

    The fact that a dumbass debian developer and NOT a ubuntu dev introduced this flaw wasnt particularly hard to foresee, when was the last time ubuntu devs screwed up in this way?

    Yes, they import debians tree wholesale, but thats an issue of trust, not stupidity, you think now that trust is intact? I wouldnt be surprised if you start to see the gulf between debian and ubuntu widen as a result, most of the interesting developments in ubuntu didnt originate in debian, they just base off it because it's free work and you can't blame them for NOT catching this problem, since the retarded debian devs didnt catch it for two years either.

    Then again, it would have been better if they didnt introduce it at the same time.

    The argument that the guy was "ignored" and basically went off to write his own fix I can't see how it has anything to do with it, the guy was ignored because at the end of the day, the "problem" he described was a valgrind warning, it wasnt a big red balloon with a siren saying "VULNERABILITY!"

    So, this guy fixed valgrinds warning! CONGRATULATIONS, you just fu*ked everyone in the ass! well done!! So lets all group hug and thank debian for thinking that valgrind warnings are worth solving, if it causes a major security hole and millions of SSL certs are now hackable.

    Phew!! I can't wait until the next valgrind warning! we're bound to win the desktop this way!!

    Expect to see ubuntu doing more work in the future, I can't see them relying on debian like they used to, if I was them, I'd start to leech devs who can be trusted and leave debian as a rusty old hulk.

  31. Anonymous Coward
    Stop

    Sorry, but the packager IS at fault and things need to change!

    Ok, so I've been called "small minded", "not worth ten of the packagers" and that "I don't understand the issue". None of these are true, I was the first one to correct the original story a few days ago when it appeared on The Register. I'm an open source developer and know first hand the problems caused by bad packagers.

    Packagers are put in a position of trust, users trust them to make their life easier by providing applications in an easy to install format and developers trust them to distribute their applications. Those who change code before distribution are a menace and rules need to change to stop the practice.

    This packager and all those like him that mess with software are at fault, not because he never asked about it, but because by his own admission he didn't know what he was doing*. His emails to the openssl list never gave context for the line in question and the packager went on to comment out an additional line which was NOT harmless. It isn't enough, especially in such a sensitive application to get permission, you need to understand the code before you touch it.

    My main point however, is that really doesn't matter who they spoke to or what they thought they knew. They still applied the patch locally instead of forwarding it upstream where the mistake would have been spotted. It's simply not good enough for packagers to change code without sending those changes upstream. It's bad practice and dangerous, if not to users of their own distro then to users of distros which never benefit from the good fixes.

    I know a lot of good packagers, but there are also many who took on the role because it gives them power to mess with code and applications used by thousands of people but without having to justify themselves to other developers. It's a loophole in the quality control system of open source. Developers on a project have to write code of a standard high enough to pass inspection by the other developers but packagers don't have anyone in an oversight position reviewing their changes. They don't have the original code authors to deal with and I've seen numerous patches rejected by developers make their way into packages downstream because the packager thinks they know better.

    * Packager said "I have no idea what effect this really has on the RNG".

  32. SImon Hobson Bronze badge

    Gentlemen (and ladies ?), please ...

    Right, first off, anyone who has never made a mistake can stand down - and now you can p**s off because you obviously have never done anything constructive in your life !

    As to the clueless f***wits slagging off Debian for making any change whatsoever to 'their' software - get a life. I use Debian and I have a good idea where to look for the config files for any package. Sometime I have to use a non-packaged app that hasn't made it into the repositories yet, and guess what, more often than not the various files are randomly scattered about the system according to the whim of the developer. Assuming I can find all the relevant files, I then have to sort out my own dependencies.

    Surely every mainstream distro makes changes to the packages to fit in with that distro's view of what the world should look like - Debian is not alone in that.

    Yes, it was a serious bug (and yes I've been busy making new keys), but having read some of the material available on the topic, it seems the openssl team must take a big chunk of the blame for not taking any interest in the query - and apparently not even being truthful about what the correct mailing list is !

  33. Mark S

    Computers are not necessarily deterministic

    ...because the world is really analog. Using the least significant bits of a voltage measurement taken at the thermal noise level (using an inexpensive 24 bit ADC measuring a voltage drop over a 5K resistor) would be one way to generate a non-repeatable and non-predictable starting value for a standard RNG. Don't know if that's been tried.

  34. Alan W. Rateliff, II
    Paris Hilton

    @Daniel Palmer

    > Anyone that actually has "Sendmail" and not a wrapper around a real MTA installed should be shot anyhow.

    Why is that?

    Paris, a wrapper around a real woman.

  35. Chris Thomas
    Flame

    Gentlemen (and ladies ?), please ...

    No, no way are you serious, the debian packager who doesnt know his RNG from his TNG is 100% to blame, he is the one writing the code, he is the one admitting he doesnt know what the code in question does, he is the one who should know that this is a critical security software and shouldnt be touched unless you're an old hand. Then he ships crap sandwiches to everyone and openssl are to blame????

    So, it's very simple Simon (pun?) did openssl team have anything to do with this patch and is the patch part of the official tree, if so, then yeah, they are partly to blame, if no, then debian is completely to blame.

    And you are correct in saying that distributions "repackage" software for their distribution, but the difference here is that they ONLY REPACKAGE, they don't ALTER THE SOURCE CODE AND COMPILE A NEW VERSION just for them, packaging up and cleaning up the file heirarchy is nothing similar to changing the source and redistributing that.

    It is simply not openssl team's job to respond to every mail on the mailing list, it's their job to look after their project and their code, if debian packagers decide to write an email and get ignored, it's not the fault of openssl that this guy then wandered off, dumped a whole world of hurt onto everyone and walked away, you're insane if you think that makes sense.

  36. Anonymous Coward
    Jobs Halo

    Just to flame

    And the advantage of open source, peer reviewed software over proprietary efforts is.....?

    This could have happened to Mac OS X, Microsoft Windows, even something like Juniper's JunOS - but the bottom line is that the OSS zealots have been spouting that proprietary software must be more insecure as there are less people reviewing it.

    Guess what.....

    <Karma is a beautiful thing don't you think...?>

    P.S. Not getting into the security debate - everything has holes. My point is that this issue has blown a massive argument for OSS out of the window.

  37. Daniel Palmer

    @Chris Thomas

    > Then he ships crap sandwiches to everyone and openssl are to blame????

    No one said that the person that did the change *isn't* to blame. The problem here is that your and other like minded peoples responses are totally irrational.

    People make mistakes.

    >And you are correct in saying that distributions "repackage" software for their >distribution, but the difference here is that they ONLY REPACKAGE

    All distributions patch the original source files to some degree. That could be something as simple as changing the location of the config files,.. and that could still introduce security problems that weren't present in the vanilla source.

    Are you saying we should change everything to DJB-style licenses?

    >It is simply not openssl team's job to respond to every mail on the mailing list, it's >their job to look after their project and their code,

    They did respond. There seems to have been some confusion over what their response meant; Yes comment it out, or maybe comment it out only for debugging. The fact remains the damage is done. No amount of being a tit on either side is going to fix that. Debian announced the problem publicly, and have/are putting in place measures to limit the damage. (i.e. openssh now depends on a package that blocks known weak keys)

    > it's not the fault of openssl

    Instead of telling people off maybe you could help? Debian is a community project and I'm sure they could do with more people like yourself that understand everything and never make cockups.

  38. Daniel Palmer

    @Alan W. Rateliff, II

    http://cr.yp.to/maildisasters/sendmail.html, aside from being historically insecure you simply don't need it. Exim, postfix etc all include sendmail wrappers.

  39. Chris Thomas
    Flame

    @Daniel Palmer

    Daniel,

    Irrational? ok, being in the software industry, if I caused this kind of damage, you think I'd be collecting a phat paycheck at the end of the month? or my P45?

    Seriously, this guy needs ejecting and find his fun somewhere else and yes, in this case, he isnt paid, but should he continue to work on the project?

    We are constantly living in a society where failure is tolerated at any level and while I agree that people make mistakes, they should also be shown that severe mistakes, are taken and fixed severely. There are some bugs you shrug off and others which you cannot and the only recourse is your head, sorry, but this guy was editing and compiling code which he isnt even remotely qualified to do.

    and as for helping, I am helping, by using fedora and telling everyone else to not use debian and the second fedora makes this mistake, I'll go hunting somewhere else too.

    Sorry, but for a decade I have had a hatred of debian because of it's idiotic mindset and looking upwards at some of the comments, I read I am not the only one.

  40. Adam Williamson
    Thumb Down

    Philosophy

    Note to all those clamouring for all distros to stop patching anything: if we actually did that, you'd all be running systems that were something between LFS and Slackware.

    not that I have anything against those projects. They fill a need. But come on, that is not what most Linux users want out of their desktops.

    Distro patching is, for most distros, an unfortunate necessity.

    I'm sure all the developers posting in this thread about how terrible it is that distros ever patch anything will swear that they've never broken a tarball release, stuck the fix in SVN or on a mailing list, and told people to 'just use that'. I'm sure they've never screwed up their autotools scripts so that their app won't install properly on a system which uses /usr/lib64 rather than /usr/lib . I'm sure they've never ignored bug reports from downstream distributors for months at a time. No, they're all fine, upstanding citizens, I'm sure.

    Unfortunately, such lowlife cads of software developers do exist. Upstream developers *do* make mistakes, and then they *do* ignore - or flat out reject, for their own reasons - fixes developed by distributors. In that situation, guess what? We have to patch it. And in umpteen other situations too, but you get the picture.

    Distro patching is going to happen. Pushing for all distros to stop patching stuff is just tilting at windmills. It isn't going to happen. It would be better to focus on a calmer and more rational discussion over exactly when it needs to happen and when it doesn't, and it'd be even more productive to go to your mailing list and/or Bugzilla and make sure you don't have any requests from downstream sitting around unattended to.

    In the current case, it's obvious that the Debian maintainer made a massive booboo. And it's certainly a good rule of thumb to say 'don't patch security-critical code'. But it's not a good reason to call for distros to stop patching everything, ever.

  41. Mike Banahan

    And if a closed-source developer made this kind of boo-boo

    ... how long would it be before we ever found out? And how many insecure keys would the world have by then?

  42. Anonymous Coward
    Anonymous Coward

    @mike Banahan

    but does close source just allow any yahoo to contribute to the code with out any vetting ??

  43. Daniel Palmer

    @Chris Thomas

    >Irrational? ok, being in the software industry, if I caused this kind of damage, you think >I'd be collecting a phat paycheck at the end of the month? or my P45?

    Your employer should have liability insurance and contracts et al. worded in such a way that you aren't directly liable.

    Read the first couple lines of *any* opensource license and you'll see the developers have nicely decoupled themselves from any responsibility. Many proprietary licenses shed as much responsibility as legally possible. Your's should too.

    Aside from that the employment laws in the UK would make it almost impossible to just sack you and withhold your salary.

    >Seriously, this guy needs ejecting and find his fun somewhere else and yes, in this >case, he isnt paid, but should he continue to work on the project?

    Not being part of the Debian community is that really for you to have say so on?

    It would be very easy to revoke this DD's rights within the project but that is for the project itself to decide not Random Internet Commentators (TM).

    >We are constantly living in a society where failure is tolerated at any level and while I >agree that people make mistakes, they should also be shown that severe mistakes, >are taken and fixed severely.

    Again, you're saying that instead of trying to limit the damage this has caused we should be telling people off. If someone gifts you a TV and it doesn't work do you go around their house and give them a mouth full of crap about it? You didn't pay for it, what right to you have to start a witch hunt against anyone? The licenses this stuff is distributed under actually forbids you any right to complain.

    >There are some bugs you shrug off and others which you cannot and the only >recourse is your head, sorry, but this guy was editing and compiling code which he >isnt even remotely qualified to do.

    More assumptions. Do you know anything of this guy's background? He could Schneier's genetic clone.

    >and as for helping, I am helping, by using fedora and telling everyone else to not use

    Well, even with Fedora you could have weak keys in your system; Keys created by debian users etch and beyond. Actually, with a Fedora system you are more vulnerable ssh-wise because you don't have the blacklist for weak keys. Maybe you should spend your time telling your sysadmin friends to watch out for keys generated on Debian boxes and to install blacklists where possible?

    >Sorry, but for a decade I have had a hatred of debian because of it's idiotic mindset

    So what you're basically saying is - I don't really care about this, I just don't like Debian and because of that I should decide the course of action taken in resolving the problem at hand. Is it possible you have been scorned by the Debian community for *your* lack of ability hence have this negative outlook towards them?

  44. E

    Have a Heart

    I spent today fixing a bunch of servers running Etch. It sucked, I don't like ssl, it's too much of a black box.

    But, really, if Debian were not a good distro nobody would use it. The package maintainer f**ked up, sure, but how many of you people suggesting terrible punishments have never made a serious programming or sysadmin mistake? How many of you admitted it publicly to the world, and went to great lengths to show people how to fix the mistake?

    Glass houses, I say. Stop being so bloodthirsty.

  45. Chris Thomas
    Flame

    @Daniel Palmer

    ok another post full of mistakes, here we go:

    1) if I was at a company and personally created a disaster that caused millions of pounds of damage, it doesnt matter ONE LITTLE BIT that they have insurance you dumbass, it has NO RELEVENCE WHATEVER on the fact that at the end of the day, I am collecting my P45, they are covered, thats true, but I AM OUT OF THERE.

    What world do you live in where that is not true? Are you seriously trying to call yourself an informed debater in this little conversation here? coming out with crap like that?

    2) it depends on whether you want to be taken seriously or not, if I had an employee who did this and basically if you work for "me" you're my employee, if you caused that much damage, I'd eject you like bad wood, you'd be on the scrapheap and don't call me for a reference, I have my companies image to look after and having you around, doesnt pull in clients, it pushes them away because they imagine you'll do the same with them too. This is pretty standard and simple stuff.

    3) If the TV was straight out of the box and then at night set fire to my house killing my wife and children, yeah I'd be around your house to find out what happened with that TV that made it do that and if you tell me it was standing in a puddle of water!! and THEN you give it to me, I'm gonna do something very nasty to you. So yeah, sometimes a gift CAN be complained about. Don't mistake free of money to be free of responsibility, they are not the same thing.

    4) but he obviously isnt, because if he was, he wouldnt make such a f**king n00b mistake would he.

    5) Since I learned that debian is for idiots, I pretty much stayed away from it and I have nothing to do with it, and I enforce that with everything I do, I dislike their entire band of brothers do much, I never run into this problem. However, some of my friends, have.

    6) Thankfully, I've never had to directly deal with idiots from debian, so I've been mostly free from having to interact with them and be "infected" with cool 1337 ideas like removing parts of RNG code.

    Seriously man, get a grip, millions of pounds of damage has been done and thousands of man hours wasted over a f**king valgrind fix, this shit does not happen to good developers. Stop protecting the weak, their death is SUPPOSED to happen. It's called nature.

  46. This post has been deleted by its author

  47. Daniel Palmer

    @Chris Thomas

    >1) if I was at a company and personally created a disaster that caused millions of >pounds of damage, it doesnt matter

    Millions of pounds of damage? Evidence? Even if some bigwigs lost "millions of pounds" because of this patch they have no legal grounds for complaint. They used the code under the license it was offered.

    RSA have sold console makers like Nintendo encryption and it hasn't worked,.. Nintendo haven't sued. Figure that out.

    >ONE LITTLE BIT that they have insurance you dumbass, it has NO RELEVENCE >WHATEVER on the fact that at the end of the day, I am collecting my P45, they are >covered, thats true, but I AM OUT OF THERE.

    You need something like 3 warnings of increasing severity to be fired unless your mistake can be considered "gross misconduct". I hope silly human mistakes aren't considered gross misconduct, I think that assumes intent to commit wrong doing.

    Companies actually give courses on how to fire people these days....

    >2) it depends on whether you want to be taken seriously or not, if I had an employee >who did this and basically if you work for "me" you're my employee

    Far be it for me to tell you how to run your business, but you should have code review, a peer should be checking for an obvious blunder. It's very easy to miss things. The DD that patched OpenSSL tried to get peer review from the OpenSSL developers.

    >3) If the TV was straight out of the box and then at night set fire to my house killing >my wife and children, yeah I'd be around your house to find out what happened with >that TV that made it do that and if you tell me it was standing in a puddle of water!!

    You didn't check it for signs of damage before plugging it in? I offered you no warranty of the fitness of the goods and you should have expected as much. If you don't have the common sense to protect what is important to you these things will happen. What if it was stolen? You'd be liable for handling stolen goods.

    >4) but he obviously isnt, because if he was, he wouldnt make such a f**king n00b >mistake would he.

    So your informed critique comes down to the DD being a "n00b". Pat on the back.

    >5) Since I learned that debian is for idiots, I pretty much stayed away from it and I >have nothing to do with it, and I enforce that with everything I do, I dislike their entire >band of brothers do much, I never run into this problem. However, some of my friends, >have.

    You will never run into this problem? Chances are you have communicated with a server running Debian that has been using weak keys. Everyone is affected.

    There must be billions and billions of pounds of damages outstanding from dodgy webservers, broken MTA's,... You'd think having to brute force thousands of keys would be a minor issue in comparison.

    >6) Thankfully, I've never had to directly deal with idiots from debian, so I've been >mostly free from having to interact with them and be "infected" with cool 1337 ideas >like removing parts of RNG code.

    So you don't actually understand what happened? The intent was to disable an almost unless part of the entropy generation process (uninitialised memory isn't a good source of entropy), but by mistake the DD managed to knock out a fundamental part of OpenSSL's entropy generating process.

    >Seriously man, get a grip, millions of pounds of damage has been done and >thousands of man hours wasted over a f**king valgrind fix, this shit does not happen >to good developers. Stop protecting the weak, their death is SUPPOSED to happen. >It's called nature.

    Earth quakes cause millions of pounds of damage, I think the damage this has caused is subjective at best. Maybe someone is replaying old SSL encrypted credit card transactions against the known weak keys in a hope of getting some usable data? Otherwise I'm totally lost as to where these $18.500.000 Million dollars (Eighteen Million Five Hundred  Thousand

    us dollars Only) have been lost. You would have thought all those big companies that rely on SSL to protect their loot would have to use encryption accelerators anyhow.

  48. Wolf
    Flame

    Methinks Chris Thomas protesteth too much

    First of all, don't be an ass.

    Second of all, if you're so outraged by this why didn't you fix it the second it happened? Oh, what's that? You didn't know? Seems to me this bit of code that everyone is screaming "noob mistake" about is seriously weird, probably not a good idea in the first place, and wasn't commented properly as to what it did.

    Yes, this was a serious problem. Yes it's caused open source a black eye. Yes, something like this was bound to happen sometime--and probably will again.

    Sounds to me like there's plenty of blame to go round. Fix the problem, fix the process, and move on. And don't spout when you're completely clueless.

  49. John Sanders
    Heart

    I like debian

    I Like debian, I think it is fantastic, I thank all the developers working on it.

    As per the problem, Linux boxes are being hacked by the thousands every day spreading malware to windows boxes every day anyway, and most of those are redhat/centos/suse/ubuntu/debian, no one seemed to find a good explanation. Could this be related?

    I do remember things like blaster/code red happening to windows 2000, I do not remember MS paying my company for the damages those caused to about a 1000 desktop boxes.

    No one asked to lock MS's coders on a box and throwing them to the Thames...

    So guys chill out please.

  50. This post has been deleted by its author

Page:

This topic is closed for new posts.

Other stories you might like