Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <482DC363.4010506@chatspike.net>
Date: Fri, 16 May 2008 18:24:51 +0100
From: "Craig Edwards (Brain)" <brain@...tspike.net>
To: oss-security@...ts.openwall.com
Subject: Re: OpenSSH key blacklisting

Hi,

I havent been following this debacle too closely as i dont have much to 
do with debian, however, wouldnt such a system be vulnerable to false 
positives if you are just going to hash partial fingerprints rather than 
whole fingerprints?

-- Brain

Solar Designer wrote:
> Hi,
>
> Are any other distros, besides Debian, Ubuntu, and derived ones, going
> to implement key blacklisting in OpenSSH - or are considering it?
>
> We are considering it for Openwall GNU/*/Linux, and if our effort would
> be reused by others, or if others join us in developing and/or testing
> the patch, this would be a reason for us to go for it.
>
> I don't think we'll take the Debian/Ubuntu patch as-is.  Rather, we are
> likely to use a trivial binary encoding/compression method for the
> partial fingerprints.  We'd also use smaller partial fingerprints.  With
> the approach I have in mind, it'd take around 4.55 bytes per key to
> store 48-bit partial fingerprints, bringing the installed file size for
> 3 arch types and 2 key types/sizes in under 1 MB (or just over 1 MB for
> 3 key types/sizes).
>
> Please comment.
>
> Thanks,
>
> Alexander
>   

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.