DiscoverChaos Computer Club - archive feed (high quality)The Debian OpenSSL bug and other Public Private Keys (god2024)
The Debian OpenSSL bug and other Public Private Keys (god2024)

The Debian OpenSSL bug and other Public Private Keys (god2024)

Update: 2024-11-13
Share

Description

In early 2024, hundreds of DKIM setups still used cryptographic keys vulnerable to a bug from 2008 in Debian's OpenSSL package. Vulnerable hosts included prominent names like Cisco, Oracle, Skype, and Github.

In 2022, it was discovered that printers generated TLS keys that could be trivially broken with an over 300-year-old algorithm by Pierre de Fermat.

Vulnerabilities in public/private key generation are amongst the most severe ones in cryptographic software. The speaker has developed the open-source tool badkeys, a tool to check cryptographic keys for known vulnerabilities. The talk will cover some of the findings and plans for future improvements in badkeys.

Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/
about this event: https://c3voc.de
Comments 
In Channel
Closing (god2024)

Closing (god2024)

2024-11-1304:01

Begrüßung (god2024)

Begrüßung (god2024)

2024-11-1304:16

loading
00:00
00:00
x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

The Debian OpenSSL bug and other Public Private Keys (god2024)

The Debian OpenSSL bug and other Public Private Keys (god2024)

Hanno Böck