Why openssl 1.0.1p accepts composite $q$ in DSA?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, Sep 09, 2015 at 03:17:01PM +0300, Georgi Guninski wrote:

> If I am CA and sign cert requests with vanilla openssl,
> will I sign a composite $q$?

The "openssl ca" command won't stop you from signing a non-prime
DSA $q$.  Real CAs need to do a lot more than is done in "openssl
ca".

No real public CAs issue DSA certificates.  Perhaps some internal
USG CAs issue DSA certificates.

What specific attack did you have in mind?  The MiTM obtains a weak
certificate from a trusted CA?  And then uses static DH_DSS with
a smooth $q$ allowing the attacker to recover the peer's ephemeral
DH private exponent?  What then?  The peer is now performing a
handshake with the authenticated MiTM, where's the attack against
a third party?

To make this interesting (not saying it is impossible, but no
evidence has been provided yet that anything interesting is afoot),
you need a more complete attack description than "OpenSSL accepts
non-prime $q$".

-- 
	Viktor.


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux