[NTLUG:Discuss] Critical crypto bug
Carl Haddick
sysmail at glade.net
Mon Apr 7 15:10:05 CDT 2014
I'm not very well read in cryptography, which is thorough ignorance on my
part.
Maybe as more people learn about crypto the world will get safer.
For instance, I didn't know until recently that every normal https dialog
with a given server always uses the same encryption key. I thought there was
a session key involved, but it's trivial - once you get the server's
certificate - to use Wireshark to review a decrypted https session from
anywhere you can capture the packets.
I had no idea it was that easy.
Probably time for me to learn a little more, and see how the things I trust
(ssh, for example) work. The details might be good to know.
Mode 600 for certs is pretty good advice, I guess. :-)
Carl
> -----Original Message-----
> From: Discuss [mailto:discuss-bounces at ntlug.org] On Behalf Of Greg Edwards
> Sent: Monday, April 07, 2014 11:25 AM
> To: NTLUG Discussion List
> Subject: Re: [NTLUG:Discuss] Critical crypto bug
>
> Big time OOPS!!
>
> Note to all programmers, NEVER use goto!! IMHO "goto" should be removed
> from every programming language known man.
>
> Greg
> http://greg.edwards-tx.us
>
>
> Fred wrote:
> > http://arstechnica.com/security/2014/03/critical-crypto-bug-leaves-lin
> > ux-hundreds-of-apps-open-to-eavesdropping/
> >
> > by Dan Goodin - Mar 4 2014
> >
> > Hundreds of open source packages, including the Red Hat, Ubuntu, and
> > Debian distributions of Linux, are susceptible to attacks that
> > circumvent the most widely used technology to prevent eavesdropping on
> > the Internet, thanks to an extremely critical vulnerability in a
> > widely used cryptographic code library.
> >
> > The bug in the GnuTLS library makes it trivial for attackers to bypass
> > secure sockets layer (SSL) and Transport Layer Security (TLS)
> > protections available on websites that depend on the open source
> > package. Initial estimates included in Internet discussions such as
> > this one indicate that more than 200 different operating systems or
> > applications rely on GnuTLS to implement crucial SSL and TLS
> > operations, but it wouldn't be surprising if the actual number is much
> > higher. Web applications, e-mail programs, and other code that use the
> > library are vulnerable to exploits that allow attackers monitoring
> > connections to silently decode encrypted traffic passing between end
> > users and servers.
> >
> > Read the rest at the link above
> >
> > _______________________________________________
> > http://www.ntlug.org/mailman/listinfo/discuss
> >
>
> _______________________________________________
> http://www.ntlug.org/mailman/listinfo/discuss
More information about the Discuss
mailing list