Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Security Software Linux

LibreSSL PRNG Vulnerability Patched 151

msm1267 writes: The OpenBSD project late last night rushed out a patch for a vulnerability in the LibreSSL pseudo random number generator (PRNG). The flaw was disclosed two days ago by the founder of secure backup company Opsmate, Andrew Ayer, who said the vulnerability was a "catastrophic failure of the PRNG." OpenBSD founder Theo de Raadt and developer Bob Beck, however, countered saying that the issue is "overblown" because Ayer's test program is unrealistic. Ayer's test program, when linked to LibreSSL and made two different calls to the PRNG, returned the exact same data both times.

"It is actually only a problem with the author's contrived test program," Beck said. "While it's a real issue, it's actually a fairly minor one, because real applications don't work the way the author describes, both because the PID (process identification number) issue would be very difficult to have become a real issue in real software, and nobody writes real software with OpenSSL the way the author has set this test up in the article."
This discussion has been archived. No new comments can be posted.

LibreSSL PRNG Vulnerability Patched

Comments Filter:
  • by Jonathan C. Patschke ( 8016 ) on Wednesday July 16, 2014 @04:45PM (#47470147) Homepage
    Q: What do we call "contrived test programs" in the "real" word?
    A: Exploits.
  • by gnasher719 ( 869701 ) on Wednesday July 16, 2014 @04:54PM (#47470247)
    This is not a problem where an outside attacker can successfully attack the software. It is a problem where a malicious developer can attack his or her own software. So the vulnerability is not that an attacker can shoot at me with a gun, the vulnerability is that I can use my own gun to shoot myself in the foot. But only if I construct a clever framework that causes the anti-shoot-in-the-own-foot measures provided by the gun to be blocked.
  • by viperidaenz ( 2515578 ) on Wednesday July 16, 2014 @05:19PM (#47470455)

    Hang on, if you've already injected your own code on the system you want to exploit, why both trying to exploit the PRNG? You can do pretty much anything you want.

  • by Kardos ( 1348077 ) on Wednesday July 16, 2014 @05:22PM (#47470483)

    > The OpenBSD project late last night rushed out a patch ...

    Sensationalist introductory sentence. LibreSSL is is not used in any production environment, there is no "rush" here.

    It is an early version released to solicit feedback. Feedback was provided, resulting in a bug fix. This is *exactly* anticipated outcome.

  • by KiloByte ( 825081 ) on Wednesday July 16, 2014 @05:42PM (#47470613)

    In this case, the same seed was provided. Two copies of the same PRNG are supposed to provide exact same output, I don't see any issue here.

  • by maliqua ( 1316471 ) on Wednesday July 16, 2014 @06:17PM (#47470891)

    more like "I see your using the phone in a way we hadn't anticipated though we don't think thats the best way to use the phone we'll make the appropriate changes to ensure its safe for you to use in this manner"

  • by QuietLagoon ( 813062 ) on Wednesday July 16, 2014 @07:54PM (#47471503)
    The LibreSSL developers apparently agreed that it was a bug that should be fixed, and fix it they did.

    .
    The discussion seems to center more around whether or not this was a "catastrophic" bug, or a "minor" bug. A bug in a library that has not yet seen a production release. So one really should ask, why not just report the bug and have it fixed, instead of seeking headlines?

    There seem to be some people who would like to see the LibreSSL project fail. It makes one wonder why, as the OpenSSL near-monoculture has served the world so well.

  • by serviscope_minor ( 664417 ) on Thursday July 17, 2014 @05:17AM (#47473295) Journal

    I don't know about people wanting it to outright fail, but I do agree there are lots of people that don't see the point in forking it.

    At some point people are going to form opinions no matter what really and nothing will convince them that a fork is OK. In this case, the combination of bugs hanging around in RT for years (to the point where there were already unofficial distro forks with the bugs fixed) and the add-new-features-and-never-clean and the FIPS requirements meant that the OpenSSL end of things had reached the end of the line.

    Kind of like Xorg versus XFree86.

    I think this was one of the ver much "had to" cases.

    And in the intervening time, libreSSL has done substantial rewrites, cleaned many things and fixed many previously hidden bugs, got it working on OpenBSD and made it portable. Meanwhile over in OpenSSL land, the Linux foundation signed on a lot of corporate sponsors who splattered logos all over a page, made announcements and meybe even appointed someones, and the OpenSSL people fixed a couple of bugs and posted a roadmap.

    So, I would say this is one of the justified times.

"I've seen it. It's rubbish." -- Marvin the Paranoid Android

Working...