Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <54330024.4010608@reactos.org>
Date: Mon, 06 Oct 2014 22:48:36 +0200
From: Pierre Schweitzer <pierre@...ctos.org>
To: oss-security@...ts.openwall.com
Subject: Re: OpenSSL RSA 1024 bits implementation broken?

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Thanks for your feedback Dave.
Then, some naive question: are we sure that OpenSSL as shipped in
distributions is tested against such regressions (if such test
actually exists)? It's indeed something that a compiler might break
(be it due to a bug or due to an optimization).
He might be using OpenSSL as shipped in his distribution. This would
be quite damaging.

Reproducibility in behavior is kinda critical here to make sure we're
always cryptosecure.

On 06/10/2014 17:30, Dave Horsfall wrote:
> On Mon, 6 Oct 2014, Pierre Schweitzer wrote:
> 
>> There appear to have some noise on the Internet regarding a
>> possible flaw in the 1024 bits RSA implementation in OpenSSL
>> which would allow bruteforcing the private key in ~20 minutes.
>> 
>> Does anyone has any information about this? The associated
>> pastebin to the said information is: http://pastebin.com/D8itq6Ff
>> Is this serious?
> 
> On the moderated crypto list where I hang out, it's receiving much
>  attention.  The consensus is that it's likely a buggy compiler or
>  optimiser that rounded integer division upwards instead of
> truncating it as required by the C standard, and that the
> "discoverer", by refusing to provide further details, is full of
> it.
> 
> You may be able to search the archives at
> cryptography@...zdowd.com; as I said it's a moderated list, but
> full of techie people who really know their onions.
> 
> -- Dave
> 


- -- 
Pierre Schweitzer <pierre at reactos.org>
System & Network Administrator
Senior Kernel Developer
ReactOS Deutschland e.V.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIcBAEBAgAGBQJUMwAkAAoJEHVFVWw9WFsLlxYQAJTvHKnVPcLzs8LPHwmn68oV
lpLeHfMXLICAO8z/xRURIi9VFryg6uMyzRwBfVVvCYxsfMy1y1TxDZR+txxV3bl4
GICcrggLj8w0xy9m81mBcy8mTH3GRGzY4rOZT/+cUr6vx9Ab0ISzkvBLZge9ashh
3jSFBu9lXKUWk3oswZiVmGCIEJOYLvGYTEY8vA3OnIv6Cu0DSufTFP44a7r63LTz
7XRPS+4JjD3YTJu3iZZqvKzHXM3rZ4fK6qXbzzokBudLGaXO8WkKbMmOjTKl1Rep
eujZ8CBvlbv29/z07ziiQ2/dlZGsYhEvn7+qhIY9gWwcKgndQcw+ERzOroUQvONP
URbPn52+b2vwrM0hFhah7N0iCvWsLsWqH8M38EMK4HS/wMGqBVI+nWIW+gdKM40/
stK2eVXwKofyGagEXiPkCeqTxCvU5Rte41skXyWAKrRZQOBI/i7LP309pV+/e1V+
jRsbtTHsMRvWEYRr2zTiKmtRPOriTZ9HBcguYDUXAV5seDDLIkWfVIEpH7AmPW23
j4eQib+gmS2Og0RxNFv46mj7KG1NVcnLOSRcScXAyctNBE/HPyqdbzyyDxGK5mfU
9nIf2mAR4jcW2+iBbS7xQVs0OOEY7HO5dJRRD5MKUdUGcR+HZKu/TwJcswEDTDG9
ZRjrlEpGLcrB2qBdXCUW
=ABev
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.