[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: Tor security advisory: Debian flaw causes weak identity keys
On Tue, May 13, 2008 at 11:55:35AM -0400, Roger Dingledine wrote:
> IMPACT:
> A local attacker or malicious directory cache may be able to trick
> a client running 0.2.0.x into believing a false directory consensus, thus
> (e.g.) causing the client to create a path wholly owned by the attacker.
>
> Further, relay identity keys or hidden service secret keys that were
> generated on most versions of Debian, Ubuntu, or other Debian-derived OS
> are also weak (regardless of your Tor version):
> http://lists.debian.org/debian-security-announce/2008/msg00152.html
Hi folks,
I wrote a few more details about the potential impact here:
https://blog.torproject.org/blog/debian-openssl-flaw%3A-what-does-it-mean-tor-clients%3F
(It glosses over a few tricky and more esoteric attacks that might
become possible, but I think it captures the main ones. I'll update
it tonight (in ~8 hours) if any more come to mind.)
--Roger