Voor de mensen die de afgelopen 24 uur onder een steen hebben geleefd: 
Kreeg net na de melding op slashdot nog een mail van een van mijn favoriete podcasts, dat men nu bezig is rainbow tables te maken voor de openssh bug in debian en ubuntu
Kreeg net na de melding op slashdot nog een mail van een van mijn favoriete podcasts, dat men nu bezig is rainbow tables te maken voor de openssh bug in debian en ubuntu
Dat wordt dus snel patchen als je gevoelige systemen aan het net hebt hangen..Newsflash at 4pm on Wednesday May 14. This is a Risky Business special
broadcast -- we have broken our regular programming schedule to bring you
this special report. Download it from:
http://itradio.com.au/security/
Most listeners would be aware that a serious bug in Debian's random number
generator has been patched overnight. Unfortunately, all keys generated by
Debian systems (and by the looks of things Ubuntu systems as well) are
completely useless and need to be regenerated.
That means you SSH and SSL content encryption AND authentication has been
rendered ineffective. Not only are your server generated keypairs
ineffective, any user-generated keypair made with a Debian or Ubuntu box
and accepted by an SSH server is vulnerable.
H D Moore is currently working on what sounds like a rainbow table-style
attack which will allow him to brute force authentication over SSH in 2.5
to 6 hours. Because of the rainbow table nature of the attack, it also
means he can decode intercepted packets in a matter of seconds.
Risky Business spoke to H D Moore via a VoIP line to his mobile phone in
Texas, where he's pulling a late night working on this...
Two advices for network troubleshooting.. learn to draw diagrams in Visio, and THINK IN LAYERS!