“Abundance of Caution” is C-suite lingo for “Oopsie, oh flying squirrel”
https://www.phoronix.com/news/OpenSSL-1-November-2022
CVE-2022-37786 and CVE-2022-3602
Second-ever OpenSSL critical vulnerability teased, 10 years after Heartbleed
downgraded from critical to merely high; but still important.
Jill (NatickFOSS) notes that this makes things harder on Executors. It requires both physiology and BT devices.
How do you change phones securely but prevent *jacking a phone change?
(Bob (NatickFOSS) says Fido alliance can provide a backup dongle for executors that overrides eyeball+phone in range?)
Changes for libgmpxx4ldbl versions: Installed version: None Available version: 2:6.2.0+dfsg-4ubuntu0.1 Version 2:6.2.0+dfsg-4ubuntu0.1:
Version 2:6.2.0+dfsg-4:
[ Steve Robbins ] * Add breaks for packages known to be broken by GMP 6.2.0. Closes: #950608.
[2022.12.26] Last August, LastPass reported a security breach, saying that no customer information—or passwords—were compromised. Turns out the full story is worse https://www.schneier.com/blog/archives/2022/12/lastpass-breach.html
possibly exploited to steal Craptocoyns ?!
Did victims have a weak passphrase, or were they actually victims of a Wallet breach and blaming it on LastPass ?
“Zenbleed” bug affects all Zen 2-based Ryzen, Threadripper, and EPYC CPUs.
July: <Ars>;
<CVE-2023-20593>;
all Zen 2 products in shared use. Fix has up-to 15% performance impact
except gaming? (Your gaming system ought not be running others’ work
anyway!)
<Cloudflare
analysis + remediation>
& August: <HN: Collide+Power, Downfall, Inception>; <Google Security Blog: Downfall + Zenbleed>
80-bit commercial export-semi-restricted TEA1 key has far less than 80 bits entropy, deemed intentional backdoor – one of 5 CVEs resulting from reverse engineering.
The also found inadequate entropy in IV, using spoof-able network
time, in the protocol, so applies to all TEA{1..4}
levels.
Incompetence or backdoor? Unclear.
Tired: don’t implement your own cryptographic stack
Wired: have Chat-GPT write it for you
If you want greater efficiency in writing bugs …
Similarly, reports seen that AutoPilot etc will cough up someone else’s secret key in suggested source code for a secret-key encryption module. Because it memorizes whatever it sees, and regurgitates on command.
Fernet is Python recipe for symmetric encryption with authentication, using AES-128 CBC, SHA-256, PKCS#7 - so if competently implemented and application key mgt is likewise competent, could be better than Fernet/Malört simile might imply.
Fernet also supported in Scala, Rust, Perl.
Malware has started using Fernet for their payloads!
Should Fernet-using Malware be called Malörtware ?
<SANS ISC>
<2023-08>
Expired Microsoft signing key exfiltrated, use to sign
code then accepted by Azure! Spin-off of Solar Winds network management
vulnerabilities, compounded by not checking for key expiry.
as usual, a bad fail is a chain of bugs and vulnerabilities that
amplify one another.
Micro-Star International Signing Key Stolen <2023.05.15> aka MSI—had its UEFI signing key stolen last month.
Github ssh fiasco
and q.v. Prime Trust below
It’s Ponzi all the way down.
Bitcoin - the most successful bug bounty program ever
… continued …
“Craptocoyn startup loses wallet key”
<2023-09>
The cryptocurrency fintech startup Prime Trust lost the encryption key to its hardware wallet—and the recovery key—and therefore $38.9 million. It is now in bankruptcy.
ironic name!
I can’t understand why anyone thinks these technologies are a good idea.
agree totally.
More Dunning-Kruger crapto? or intentional backdoor to facilitate thefts?
Low entropy, non-random seed (clock) renders a secure PRNG insecure;
lib docs supposedly have caveat not to use the bx seed
but
general Bitcoin docs recommend using it for wallet generation.
“Never attribute to malice that which is adequately explained by incompetence.”
But … as a scam it looks pretty smooth.
See last year’s status
Quantum Superposition when used for computing.
Yes !
Quantum Cryptanalysis
Classical “Forward Secrecy” - old messages not broken by later loss of host key
Generalized: old saved messages not broken by breakthroughs either.
Realistic threat?
The goal of post-quantum cryptography (also called quantum-resistant cryptography) is to develop cryptographic systems that are secure against both quantum and classical computers, and can interoperate with existing communications protocols and networks. – NIST
National Institute of Standards & Technology started a multi-round competition, similar to with AES and SHA3 competitions
RSA2048 in play or not? - Chinese academic paper claiming 2k bit RSA within range of current gen NON-fault-tolerant QC, no great surprise given Qubits available and theoretical algorithm size. Schor and Schneier unconvinced - does it actually converge w/o FT? <Schneier 2023-01>
[2023.02.28] CRYSTALS-Kyber is one of the public-key algorithms currently recommended by NIST as part of its post-quantum cryptography standardization process. Researchers have just published a side-channel attack—using power consumption—against an implementation of the algorithm that was supposed to be resistant against that sort of attack. The algorithm is not “broken” or “cracked”—despite headlines to the contrary—this is just a side-channel attack. What makes this work really interesting is that the researchers used a machine-learning model to train the system to exploit the side channel.
OTOH as seen in TETRA:BURST, a side-channel attack can be used to extract key or algorithm from a piece of equipment that falls into opponent lab.
FIPS Allowed
.FIPS Approved
.https://www.nist.gov/programs-projects/post-quantum-cryptography
No. It’s happened.
random
2 which compromised many
SSH keys.The YouTube of this presentation will be linked on <BLU.org> along with these slides and extended notes etc as <2023-sep> as per usual.
Prior talks in
this series - most talks have slides &/or YouTube
attached, sometimes extras.
Alas the YouTube audio pre-pandemic wasn’t great, BLU will need a
donation of a wireless clip-on mike if we ever return to
Hybrid/In-Person meetings. Or we all need to wear a wired or BT headset
while presenting in person?
News and Focus sections have embedded links.
Good security news streams to either research history or to follow
year round are https://www.schneier.com/crypto-gram/ and https://isc.sans.edu/, the
latter being less cryptologic and more operational in focus – but both
cover the wide span of vulnerabilities, tools, remediations, etc, not
just the cryptologic that I’m cherry-picking here.
Highly recommended.
Start your day with the 5 minute SANS Internet Storm Center
StormCast pod-cast; the Red Team is, so, so should you.
See our prior discussions of GEE, VENONA for breaks of One Time Pad↩︎
DSA-1571-1 openssl
predictable random
number generator <CVE-2008-0166>
<Schneier>
↩︎