Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Security Debian Encryption Software Linux

Debian Bug Leaves Private SSL/SSH Keys Guessable 670

SecurityBob writes "Debian package maintainers tend to very often modify the source code of the package they are maintaining so that it better fits into the distribution itself. However, most of the time, their changes are not sent back to upstream for validation, which might cause some tension between upstream developers and Debian packagers. Today, a critical security advisory has been released: a Debian packager modified the source code of OpenSSL back in 2006 so as to remove the seeding of OpenSSL random number generator, which in turns makes cryptographic key material generated on a Debian system guessable. The solution? Upgrade OpenSSL and re-generate all your SSH and SSL keys. This problem not only affects Debian, but also all its derivatives, such as Ubuntu." Reader RichiH also points to Debian's announcement and Ubuntu's announcement.
This discussion has been archived. No new comments can be posted.

Debian Bug Leaves Private SSL/SSH Keys Guessable

Comments Filter:
  • by spikedvodka ( 188722 ) on Tuesday May 13, 2008 @12:05PM (#23391870)
    Who did this? You don't remove the seeding... stupid

    did I mention stupid?

    this is how some of the old video games were "broken" despite using "random" numbers, the seed was always the same... leading to the same sequence of events
  • by Idaho ( 12907 ) on Tuesday May 13, 2008 @12:11PM (#23391928)
    whether this can possibly be claimed to be an accident *dons tinfoil hat*.

    But seriously, removing the code that seeds a random number generator? I can hardly imagine making such a change by accident. I may just lack a sufficiently colorful imagination, though.

    (or, before resorting to conspiracy theories, we should probably ask ourselves first, "can this possibly be explained by simple stupidity?"
  • Who did this? You don't remove the seeding... stupid

    That's what I was thinking too. What kind of idiot makes that sort of change?

  • by gQuigs ( 913879 ) on Tuesday May 13, 2008 @12:11PM (#23391934) Homepage
    This problem isn't something you can just update your system to fix. This means the basis for all remote authentication on your Debian/Ubuntu machines is compromised until you go and fix it manually.
  • by psyopper ( 1135153 ) on Tuesday May 13, 2008 @12:12PM (#23391942)
    Got up this morning, booted the machine and got a software update first thing: OpenSSH (et al) updates for my Ubuntu Gutsy install. Then I show up over here and see why. Presumably Feisty and Hardy got them as well - they are listed on the Ubuntu announcement.
  • by MosesJones ( 55544 ) on Tuesday May 13, 2008 @12:12PM (#23391944) Homepage
    First off I'm a big OSS supporter, yada, yada

    But the point here is that the freedom that OSS gives you does require you to trust the whole distribution chain. In this case there was an added muppet who did something they shouldn't have thus rendering everything downstream insecure. OSS is great but it required great developers, given that it has take well over a year to get the advisory out it shows that the many eyes piece didn't work here, mainly because the eyes were looking at the original source not the botched packaging job.

    The "easy to use" Linux box in the house uses Ubuntu and has this issue and like many people I didn't even think to check that the OpenSSL wasn't the REAL OpenSSL it was OpenSSL with muppet extensions. Maybe there needs to be some form of extension that warns that a package has been modified from its original source code and that the modification was done by "K. Frog" so you can determine whether to trust that package or look back to the source.

    Or some sort of voting system on contributors (how very Web 2.0) so you can see how the people who touched your package were rated with the biggest weighting being given to the last person through the code (hand edited by Linus = 5 stars, hand edited by James Gosling = 5 stars, hand edited by the bloke who wrote clippy = 2 stars, hand edited by a bloke who removed a seed generator = 0 stars).

    Having the code is great, but this makes me want to know much more about who last edited that code.

  • by sterwill ( 972 ) on Tuesday May 13, 2008 @12:12PM (#23391954) Homepage
    Who told you that? Why did you believe it? Please cite your sources.
  • by Archangel Michael ( 180766 ) on Tuesday May 13, 2008 @12:16PM (#23391992) Journal
    It shouldn't need fixing in the first place.

    Debian people screwed up. This leaves a huge distaste in my mouth for Debian (and Ubuntu).

  • by rhavenn ( 97211 ) on Tuesday May 13, 2008 @12:16PM (#23391994)

    I'm sure the problem will be fixed if the developers acknowledge that the problem exists. Not a big worry.
    No, but it shouldn't have been changed in the first place. Debian needs to stick their ego up their ass sometimes and just let the people who wrote the software do the coding vs. sticking their own code in in places they don't fully understand. This and their attitude of licensing and not reporting changes back upstream is a stupidly annoying habit.

    note: When I have to run Linux instead of a BSD it's Debian and/or Kubuntu all the way since the benefits outweigh the negatives, but it's still an annoying habit of theirs.
  • by clang_jangle ( 975789 ) on Tuesday May 13, 2008 @12:17PM (#23392014) Journal

    Windows here I come. At least someone would be accountable for shit work like this.


    Yeah, like all those times when MS cut checks for all their customers whose computers were compromised! Oh, wait...
  • by rhavenn ( 97211 ) on Tuesday May 13, 2008 @12:18PM (#23392016)

    (or, before resorting to conspiracy theories, we should probably ask ourselves first, "can this possibly be explained by simple stupidity?"
    Very easily. Some coder who didn't understand what he was doing and couldn't figure out the code decided to just remove it.
  • Re:Of course... (Score:5, Insightful)

    by Oxy the moron ( 770724 ) on Tuesday May 13, 2008 @12:22PM (#23392072)

    Quit being a cry baby and run 'apt-get upgrade' already. It would have taken you less time than to come in here complain.

    ... and regenerate all the keys, yes? It isn't quite as simple as you suggest...

    "All OpenSSH and X.509 keys generated on such systems must be considered untrustworthy, regardless of the system on which they are used, even after the update has been applied."

  • who was it? (Score:1, Insightful)

    by Anonymous Coward on Tuesday May 13, 2008 @12:31PM (#23392174)
    Who was the member of the security services who acted as package maintainer?

    I cannot believe that such a change would have gone by unnoticed if it had been properly documented, and I cannot believe anyone given the trust of the OpenSSL distribution would make such a mistake.

    This was an intentional act of sabotage.
  • by 2short ( 466733 ) on Tuesday May 13, 2008 @12:32PM (#23392184)
    Basic cryptographic services have been compromised for a year and your analysis is to assume on faith that it's open source so it will be fixed, so no problem?

    If someone stole your crypto keys and has had them for a year...

    How thoroughly might they have compromised your system by now?
    How many passwords might they have stolen that you use on other systems?
    What else might they have done that will give them access in the future even after you fix this?

    Just regenerate your keys and no problem? The problem that guessable keys are generated will undoubtably be fixed asap, if not already. The problem that this has been the case for the last year will not be, and is a big worry.
  • by peragrin ( 659227 ) on Tuesday May 13, 2008 @12:40PM (#23392280)
    Ah so if the same thing happened from MSFT but no one noticed it does that mean closed source is better.

    No software is perfect. when F/OSS screws up everything including the exact versions of the software where the bug began, until it is fixed is known. You know what/where/when/how, and most of the time why it happened.

    With closed source software your considered lucky if you get a patch in a timely fashion.

    Personally i would rather know what happened and when too.

  • A great filter (Score:5, Insightful)

    by Free the Cowards ( 1280296 ) on Tuesday May 13, 2008 @12:44PM (#23392336)
    Anyone who posts to this story saying that this is no big deal or telling other people to stop whining should simply be banned from Slashdot for life. If you cannot be bothered to read the article and you cannot be bothered to understand just what a serious vulnerability this is but you insist on insulting those who do, why should you be allowed to continue to post your ignorant bleating?
  • by Anonymous Coward on Tuesday May 13, 2008 @12:45PM (#23392352)
    If it was reading from "un"initialized memory, then OpenSSH was "crusin' for a bruisin'" as my father would say. How long before some OS decides "hey, to prevent process B from 'inheriting' key material, passwords, and other random goodies from process A simply by alloc()ing the space process A used to take up, let's zero out the block of memory that we allocate for each process"? A seed of nothing but zeros, every single time!

    If the memory was initialized, then it wouldn't be an issue for valgrind, and the seed would still be whatever the memory had been initialized to.
  • by Sun.Jedi ( 1280674 ) on Tuesday May 13, 2008 @12:46PM (#23392356) Journal

    This is on the SSH server side. If you are a casual desktop user, you don't have to do anything.
    Yes, a good observation for IM/Email/Youtube/Facebook crowd... but how many others ssh into their home machine? I'd wager the ability to ssh into a home box is one of the better perks to running linux@home.
  • by Hatta ( 162192 ) on Tuesday May 13, 2008 @12:50PM (#23392400) Journal
    It's debian. ALL your packages have been patched for debian. It's pretty much the only thing I don't like about debian, all the patching. You can get the original source, and you can get the patches, but yeah it would be nice if it were a little more transparent.
  • by Anonymous Coward on Tuesday May 13, 2008 @12:51PM (#23392414)
    Hmm... no, it shouldn't have been changed. There is absolutely no excuse for touching crypto code when you don't *fully* understand it.

    But the fact that changing the use of NON-INITIALISED memory causes most of the seed of a RNG to go away really is worrisome... unless that memory is actually initialized with a seed BUT in a way Valgrind and others can't track. Which means it is sloppy coding on OpenSSL.

    You cannot trust unitialized memory, PERIOD. And it will take looking deep into OpenSSL code for me to tell if it was intialized in a way valgrind couldn't see, or that OpenSSL was working due to just plain blind luck (or lack of an attacker).

    Either way, upstream prepared the trap, and a debian maintainer sprung it.

    Why do YOU think we are not calling for blood on the guy who did the change? Because code that breaks like that is a travesty by itself.
  • by MSG ( 12810 ) on Tuesday May 13, 2008 @12:56PM (#23392470)
    I think the point was that if the Debian maintainer had submitted his patch upstream, he'd have been told exactly how stupid it was.
  • by pavon ( 30274 ) on Tuesday May 13, 2008 @01:03PM (#23392568)
    This is just strange. From the bug report it sounds like the only thing they did was remove the code which read into uninitialized memory, and fed the value into the random number generator. If this really was the only seed used by the RNG that seems like a pretty poor design decision on the part of OpenSSL developers to begin with.

    On the other hand it is possible that the Debian maintainer didn't understand what he was doing, and his changes did more than remove that read into uninitialized memory. In either case it I can't imagine why someone would modify a RNG or any other cryptographic code without checking with the original author first before distributing it. That is just unacceptable.
  • by zooblethorpe ( 686757 ) on Tuesday May 13, 2008 @01:04PM (#23392572)

    If some coder did this at a company at least I'm pretty confident they'd get their ass fired, but with open source it's basically "whoops, my bad."

    I, on the other hand, strongly suspect that any similar mistake at a major software corporation would in all probability be quietly ignored, if it were even noticed at all -- and if it were instead deemed enough of a public relations risk to warrant dealing with, the company would likely just silently push an update to correct the problem for future users, leaving anyone using extant keys with their arses hanging in the breeze.

    But maybe I'm just being overly cynical. :-\

    Cheers,

  • Re:interdiff (Score:2, Insightful)

    by lukas84 ( 912874 ) on Tuesday May 13, 2008 @01:08PM (#23392614) Homepage
    Never attribute to malice that which can be adequately explained by stupidity.
  • by Archangel Michael ( 180766 ) on Tuesday May 13, 2008 @01:11PM (#23392644) Journal
    As the other guys have stated, but stating it myself for clarity:

    1) They shouldn't have messed with the NON-BROKEN Source (which every other distro uses), without testing it better.

    2) I use whatever works, currently I have Ubuntu on my kids computers, Windows and SUSE and Mac OS and BSD at work. I'm more of a utilitarian; computers are nothing more than tools. Right tool for the job, makes all the difference in the world.

    3) Reputations are hard to come by. Good ones are hard to maintain. I'm sorry for Debian, because they lost a tad bit of credibility on this one, in my book.
  • You are funny (Score:3, Insightful)

    by FranTaylor ( 164577 ) on Tuesday May 13, 2008 @01:11PM (#23392650)
    Read the end-user agreements for your commercial software and you will see that you have no right to sue them for anything beyond the purchase price of the software.
  • by zooblethorpe ( 686757 ) on Tuesday May 13, 2008 @01:13PM (#23392678)

    And we were told this sort of bug could NEVER happen in an open source operating system. Seriously, this is a major cockup.

    First off, we were not told any such thing -- or at least I've never run across any such claims myself. Secondly, this would actually seem to substantiate the many-eyes theory, as the bug was found and summarily corrected, rather than never found, or found and swept under the rug, or found first by black-hats and exploited, all of which seem quite common in the proprietary software world.

    The many-eyes model does not guarantee zero bugs, nor does it guarantee speedy bug hunting. However, it would seem to guarantee that bugs will be found eventually, and also that they will be dealt with in some productive way once they are found. This model aims for the opposite of security through obscurity, that hoary old chestnut of proprietary development, by instead ensuring security by knowing exactly what things do. That also means that folks need to go through all changes -- i.e., many eyes actually need to go over the code. Open source ensures that this is possible, but actual people still need to put in the time and effort.

    Cheers,

  • I think you are completely correct and that this is exactly what would happen in most cases with software that came out of a corporation. I don't think you're being cynical at all, just realistic.

  • The great thing about the rpm package management system on Fedora and Red Hat is, that the source rpms always include the pristine, original sourcecode as provided by upstream.
    Yeah, source debs have that too.
  • by Animats ( 122034 ) on Tuesday May 13, 2008 @01:27PM (#23392852) Homepage

    Has someone actually checked the random output for cryptographic soundness?

    The proper source of cryptographic-quality random bits in Linux is "/dev/random". Reading uninitialized memory is not a good source of entropy - it might be initialized to some constant value, especially if you're compiling with a debug allocator or running under a virtual machine monitor.

    OpenSSL makes substantial efforts to get a good random starter. [openssl.org] Unless someone did something so stupid that OpenSSL didn't use /dev/random, it should still work. OpenSSL is supposed to have a check for bad random seeds. Was that bypassed, or doesn't it work, or what?

    Obtaining a good source of randomness is hard. Computers are rather deterministic. Historically, there have been major failures in this area. See "Venona" [wikipedia.org] where the USSR was generating "one-time pads" by having people type random digits on typewriters. Arlington Hall, NSA's predecessor, cracked that. Humans aren't random enough. True random number generation requires special hardware [fourmilab.ch], like a noise diode or a radiation source.

    "Any one who considers arithmetical methods of producing random digits is, of course, in a state of sin." -- John von Neumann

  • by Kent Recal ( 714863 ) on Tuesday May 13, 2008 @01:32PM (#23392918)
    Can someone explain what "guessable" means in this context?

    Does that mean someone can now generate a "master-key" and ssh into root@any-debian-box that allows public key authentication?
    What does a realistic attack scenario look like?
  • by profplump ( 309017 ) <zach-slashjunk@kotlarek.com> on Tuesday May 13, 2008 @01:36PM (#23392968)
    It's not arrogance. Or it's at least not arrogance alone. As a distro maintainer I can tell you that upstream providers generally do not care about distro-specific patches. Even if you have a patch that would be useful on more than on distro, there's often a reluctance to inherit code to support any installation method other than source tarballs.

    That's not to say that upstream providers are unduly arrogant either -- if you're happy with the way your build/install system works, why would you want to maintain patches for some other system that you don't even use? It's extra code to keep up, and requires more testing on more platforms, and it it doesn't make your core package any better.
  • by Beat The Odds ( 1109173 ) on Tuesday May 13, 2008 @01:38PM (#23393022)

    Interestingly, another source of compromised security is seeding too often. http://lists.debian.org/debian-security-announce/2008/msg00152.html [debian.org] is an example of a vulnerability caused by seeding the random number generator with the current time right before use.

    That's not a case of seeding too often, that's a case of using a crappy seed

  • by 0xABADC0DA ( 867955 ) on Tuesday May 13, 2008 @01:45PM (#23393110)
    Actually it looks like valgrind was just confused about whether the buffer was initialized. The openssl code for the edg swaps a pointer to be an uninitialized buffer right before calling read with it... maybe this kind of code confused valgrind.

    It isn't easy to find where the function they changed is actually called... it gets added to an array of function pointers and then a static variable is set to it, and then there are various macros that can obtain it. I can see how valgrind could be confused, but in any case there is a function that takes a buffer and adds it as randomness and they nuked it. They totally screwed up because they assumed that valgrind was perfect at figuring out what memory was initialized.

    There is no simple excuse like 'it was uninitialized wanyway', the debian openssl team just blew it, big time.
  • by Graftweed ( 742763 ) on Tuesday May 13, 2008 @01:51PM (#23393198)

    Agreed.

    The parent asked how can we be sure we're using the real OpenSSL? Simple, just use a distro that maintains a policy of minimal interference with upstream code. Slackware comes to mind, and not much else unfortunately.

    Any distro that's liberal about patching upstream code is liable to suffer from security issues, as just exemplified by this story, and also to reduce the value of bug reports to the upstream projects, since they have to go through an extra triage to make sure the bug isn't specific to that distro.

  • Re:A great filter (Score:5, Insightful)

    by Free the Cowards ( 1280296 ) on Tuesday May 13, 2008 @02:07PM (#23393432)
    Your SSL-enabled web sites spent two years being vulnerable to masquerade or man-in-the-middle attacks. Your SSH servers spent two years being vulnerable to same. Your SSH key pairs spent two years being easily crackable by anyone who happened to notice this vulnerability but didn't tell the world. I'm not entirely sure, but I think that SSL and SSH sessions either to or from the affected OSes may be crackable, and if so this would include traffic that was recorded at any time during the vulnerable period and can now be analyzed using knowledge of this bug to find out what data they carried.

    This is a big deal. Maybe it doesn't affect you very much. It doesn't affect me at all, I've never run these distros. But you can bet right now that there are a lot of heavy Linux users out there going through a lot of trouble. This is going to be a bonanza for certificate authorities as everyone who generated SSL keys with these distros is going to need to purchase a new cert.
  • by mmontour ( 2208 ) <mail@mmontour.net> on Tuesday May 13, 2008 @02:16PM (#23393588)

    Why not just use /dev/random and stop the stupid games with reinventing the wheel?
    Probably because the rate at which it dribbles out random bits is too slow for most real-world applications (unless you happen to have it hooked up to a hardware RNG).
  • by fwarren ( 579763 ) on Tuesday May 13, 2008 @02:21PM (#23393668) Homepage
    I guess the real question is how many compromised keys are out there?

    Most users do not generate nor use ssh/ssl keys or certificates.

    The real questions are

    • How many clueless users are actively using these keys/ceritificates?
    • How many cluefull users are using these keys and think they are not an issue or that their keys are ok and won't fix it?
    • How many cluefull users are going to fix their keys/certificates?
    • Is someone able to develop a workable exploit?
    • Will it be worth anyones time with a working exploit to scan the internet for compressible systems?
  • by soliptic ( 665417 ) on Tuesday May 13, 2008 @02:26PM (#23393738) Journal

    One of the OpenSSL developers [links.org] (or at least, that's what I infer) puts it in even more general terms:

    never fix a bug you don't understand.

    However, I can't help wondering if some fault may arguably lie with the OpenSSL coders. I mean... by his own admission:

    Usually it is bad to have any kind of dependency on uninitialised memory, but OpenSSL happens to include a rare case when its OK...

    (Emphasis mine)

    So, since it's unusually doing something that looks an awful lot like a Cardinal Sin, did this block of code include a prominent:

    /*
    NB: Yes, we are reading unitialised memory
    This is deliberate, NOT A BUG!
    <explanation here>
    */

    I mean, if you're going to write code that basically looks like a duck, walks like a duck and quacks like a duck, and which you know is going to head downstream toward a huge bunch of duck-hunters, it's really a good idea to add a big visible note saying THIS IS NOT A DUCK.

  • Re:2 years? (Score:4, Insightful)

    by Free the Cowards ( 1280296 ) on Tuesday May 13, 2008 @02:26PM (#23393742)
    Bugs with differing severities have different priorities, though.

    If 99.9% of client code works, then an obscure bug in BSD directory traversal code is pretty unimportant. It won't affect most people, so it won't be found by most people.

    This kind of bug, on the other hand, severely harms the security of everyone using this distro. It's tricky because it's hard to tell the difference between good crypto and crypto which has a critical flaw at the beginning which makes it insecure, which is why it lasted for so long before being found. But still, one would think that crypto software would get more attention and that someone would have noticed that every affected machine is spitting out nearly identical keys.
  • by Anonymous Coward on Tuesday May 13, 2008 @02:38PM (#23393874)
    Lesson#1: It's best to not change code you do not understand without getting it reviewed by people who (are supposed to) understand the code.

    Lesson#2: If you write code that deliberately does weird things like wanting to read unitialised memory, PUT A COMMENT so that people other than you have a fighting chance with your code.
  • The uninitialised memory there isn't the only source they use, they just use it if it is there because it doesn't matter, and at worst doesn't make the data less random.

    Yes, I get that, you're just restating what I quoted in slightly different words. My point is that it looks to me that at best it doesn't matter because it's not a good source of randomness.

    They then call a randomisation routine. The broken patch commented out both calls.

    Both calls were to the same routine, MD_Update, that added part of the uninitialized buffer to the message digest being built in two different places.

    Don't mess with code you don't understand, especially when it is so important.

    I'm not messing with it, I'm questioning it. If that code is important, then I'd like an explanation of why they think this is a good sort of randomness to depend on.

    If they don't want to use /dev/random, and they don't want to make the user stop and enter some random text (I always faithfully enter gibberish for OpenSSH initialization, don't you?), then they could pick a better fallback than a chunk of data whose randomness depends unpredictably on the execution environment.

    Heck, you can do a lot better by deliberately taking advantage of known variations in the environment: they'd do better hashing /var/log/messages, particularly as soon after a boot as this seems likely to happen, because then at least they'd get a buffer that actually depends on the details of the hardware installation, the IP address, the speed of the processor, the amount of memory, the distro, the enumeration of the PCI bus, the file systems, programs installed, the time and date, and so on... not predictable or reproducible (even if you cloned the hardware and faked the time and IP address network load will change the contents of timestamps unpredictably).
  • by IamTheRealMike ( 537420 ) on Tuesday May 13, 2008 @02:49PM (#23394022)
    The problem is that the email is rather misleading, from what I understand. It talks about two places causing the problem even though only one of them actually was making valgrind complain (and you can see, purify already picked up on the problem some time before). The trick is that his patch, not included in the email, removed both calls. Which was busted. So if he'd actually sent a full patch, proposed it for inclusion and had it properly code reviewed, the mistake would probably have been caught.
  • by Minwee ( 522556 ) <dcr@neverwhen.org> on Tuesday May 13, 2008 @02:54PM (#23394088) Homepage

    It's a bit like asking Microsoft to accept responsibility for your pirate copy of Windows, then, isn't it?

    Or a bit like asking Microsoft to accept responsibility for the copy of Windows that you paid for.

    Look through the Windows license agreement some time and see how many times phrases like "THERE IS NO WARRANTY OR CONDITION OF ANY KIND", "YOU ARE NOT ENTITLED TO ANY DAMAGES" and "IN NO EVENT SHALL MICROSOFT OR ITS SUPPLIERS BE LIABLE" show up.

    The only difference with Microsoft is that if Windows breaks you don't get to keep both pieces.

  • by Chris Burke ( 6130 ) on Tuesday May 13, 2008 @03:02PM (#23394194) Homepage
    Uninitialised data doesn't seem to be a good source of randomness to depend on, since depending on where it happens you may consistently end up with a buffer that previously contained all zeroes (or some default memory test pattern), the same part of the same shared library header, or a series of stack frames that for whatever reason happen to be the same frames on every run.

    Well yeah, especially because a byte of "uninitialized" memory, like all memory regardless of how many times it has been initialized, is much more likely to contain the value zero than any other. That'd be like using a 6-sided die as a source of randomness when the '1' side was ten times the area of the '6' side.

    However as mentioned, that's not the only or main source of randomness, and getting rid of that randomness was not the bug. It was getting rid of other sources of randomness in the process, because they -resembled- the function that used uninitialized memory.
  • by IamTheRealMike ( 537420 ) on Tuesday May 13, 2008 @03:43PM (#23394796)

    No, he posted a question openssl-dev, which is a mailing list for people writing software that uses OpenSSL. This OpenSSL developer doesn't read it [links.org] and that's similar with most open source project - developers often don't read mailing lists for end users.

    What's more, that mail doesn't contain a patch. It contains a misleading question with two lines posted in isolation. An actual patch, submitted for an actual code review, would almost certainly have revealed the problem via context.

    You don't change crypto code of all things based on an idle question on a mailing list populated mostly by users. What's next, changing the kernel scheduler based on a conversation in #kernel-newbies?

  • by IamTheRealMike ( 537420 ) on Tuesday May 13, 2008 @03:45PM (#23394810)
    Right, that's why Debian renames Firefox. I remember them not being very happy about being forced to do that at the time. But seriously, are all open source projects supposed to use trademarks to force distributors hands? It seems like a bad precedent.
  • by metamatic ( 202216 ) on Tuesday May 13, 2008 @04:47PM (#23395634) Homepage Journal

    But the implementor made a mistake, and also commented out another similar usage, in a different function, ssleay_rand_add. This was a huge mistake, as the purpose of ssleay_rand_add is to add randomness into the random state.

    Given that the code is so shoddily written that neither of the functions has a comment to say what it's supposed to do, I think I can forgive him for that.

  • by dissy ( 172727 ) on Tuesday May 13, 2008 @07:47PM (#23397634)

    I'm not trolling, but maybe open source isn't ready for the enterprise.
    Well, if you want 'enterprise' you should be using real enterprise software, like a solution from IBM, Sun Microsystems, or RedHat Linux.
    These companys will sell you a contract that DOES give your business recourse when something goes wrong.

    Most businesses don't need enterprise software though, so they stick with linux, bsd, windows, and mac os.

    Great... just when I had mostly convinced the PHBs in management that yes, open source software was trustworthy, and that yes, good developers write Linux, and snip
    Also it's worth pointing out, this one bug has zero to do with linux or opensource. OpenSSL IS secure. One guy broke the package and introduced this problem.
    It is still a bad problem, and there are alot of debian users, but just compared to all the linux distros out there, it is still only a percentage and under 100% (by Far under 100)

    What you are saying is basically that because I personally can download an opensource program, change (aka break) it, and give it to someone, that opensource in whole is broken, untrustworthy, and bad.

    Clearly that is just stupid.

    I suppose if you don't trust openssl anymore, for a problem that effects only debian users, compared to MS's bugs that give admin access to anyone on the internet from win NT4 up to Vista SP1, then that is your call. (I am curious how you might justify that to your PHB though)
    http://www.microsoft.com/technet/security/bulletin/MS08-001.mspx [microsoft.com]

    Thats akin to saying "I no longer trust the guy at the store since he shorted me $0.03 in change, so i'm gunna just trust the crackwhore at the corner to by the same stuff from."

  • by makomk ( 752139 ) on Tuesday May 13, 2008 @08:24PM (#23397874) Journal
    Nope, that's not quite right. Basically, there were two separate bits of code with two nearly-identical lines, one of which stirred in uninitialised data, and another which was used to add actual randomness. The Debian maintainers incorrectly commented out both lines, rather than just the one they needed to.
  • by Chuck Chunder ( 21021 ) on Tuesday May 13, 2008 @08:56PM (#23398056) Journal
    Frankly the guy probably doesn't need ragging on (in fact people should be checking he's ok).

    A small coding mistake has had rather nasty and rather public consequences.

    What does bear scrutiny is the process. In such a critical package should it really come down to just one guy? On such a critical package should Ubuntu not have their own man double checking everything rather than just accepting changes from Debian.

    You can't make people infallible, but you improve the system to better mitigate such fallibility.
  • by Anonymous Coward on Tuesday May 13, 2008 @09:42PM (#23398318)

    If you know those keys, this is a 5-minute brute force attack.
    We do know the keys, so it's not a 5-minute brute force attack.

    It's a 5-microsecond table lookup.

An Ada exception is when a routine gets in trouble and says 'Beam me up, Scotty'.

Working...