exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

CA-2000-09.pgp

CA-2000-09.pgp
Posted May 31, 2000

CERT Advisory CA-2000-09 - Flaw in PGP 5.0 Key Generation. UNIX systems having a /dev/random device running any version of PGP 5.0 are affected. When keys are generated non-interactively and without user-added randomness, on some systems PGP v5.0 generates keys that are not random enough, allowing an attacker to predict keys and therefore recover information encrypted with that key. Additionally, an attacker may be able to forge a digital signature corresponding to a vulnerable key. CERT homepage here.

systems | unix
SHA-256 | 666d2573e857d8eb04ebc9ba4aaf3ae4e08ea3110c54153867406d0110fb40d3

CA-2000-09.pgp

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

CERT Advisory CA-2000-09 Flaw in PGP 5.0 Key Generation

Original release date: May 30, 2000
Last Revised: --
Source: CERT/CC

A complete revision history is at the end of this file.

Systems Affected

* UNIX systems having a /dev/random device running any version of
PGP 5.0, including U.S. Commercial, U.S. Freeware, and
International versions
* Keys created non-interactively on such a system
* Documents encrypted with such a key
* Signatures generated with such a key

Overview

Under certain circumstances, PGP v5.0 generates keys that are not
sufficiently random, which may allow an attacker to predict keys and,
hence, recover information encrypted with that key.

I. Description

In order to generate cryptographically secure keys, PGP (and other
products) need to use random numbers as part of the input to the key
generation process. Generating truly random numbers is a difficult
problem. PGP has traditionally solved that problem by prompting the
user to type some random characters or to move the mouse in a random
manner, measuring the time between keystrokes and using this as a
source of random data. Additionally, PGP uses a file (usually called
randseed.bin) as a source of randomness. However, PGP also provides
the ability to generate keys non-interactively (useful, for example,
if you need to generate a large number of keys simultaneously or
provide a script to generate a key). When generating keys
non-interactively, PGP needs a source of random numbers; on some
systems PGP v5.0 uses the /dev/random device to provide the required
random numbers.

PGP v5.0, including U.S. Commercial, U.S. Freeware, and International
versions, contains a flaw in reading the information provided by
/dev/random. This is not a flaw in /dev/random but instead is the
result of a flaw in how PGP processes the information returned from
/dev/random. Thus, when a key is generated non-interactively using a
command such as

pgpk -g <DSS or RSA> <key-length> <user-id> <timeout> <pass-phrase>

it does not contain sufficient randomness to prevent an attacker from
guessing the key. If such a command were issued on a system with no
available randseed.bin file, then the resulting key may be
predictable.

This problem was discovered and analyzed by Germano Caronni
<gec@acm.org>, and verified by Thomas Roessler <roessler@guug.de> and
Marcel Waldvogel <mwa@arl.wustl.edu>. A copy of their analysis can be
found at

https://www.securityfocus.com/templates/
archive.pike?list=1&msg=20000523141323.A28431@olymp.org

II. Impact

Keys produced non-interactively with PGP v5.0 on a system with
a /dev/random device may be predictable, especially those
produced in an environment without a pre-existing randseed.bin
file.

Documents encrypted with a vulnerable key may recoverable by an
attacker. Additionally, an attacker may be able to forge a
digital signature corresponding to a vulnerable key.

Signatures produced using a vulnerable key, including
signatures in certificates, may be untrustworthy.

III. Solution

If your PGP key was generated non-interactively using any
version of PGP v5.0 on a system with a /dev/random device, you
may wish to revoke it.

Documents encrypted with a predictable key may need to be
re-encrypted with a non-vulnerable key, if your particular
circumstances warrant it; that is, if the information still
needs to be encrypted.

You may need to resign documents signed with a vulnerable key
if your circumstances warrant it.

Appendix A Vendor Information

Network Associates

Network Associates Security Advisory
Date: May 30, 2000
Author: PGP Engineering
Background:

A security issue has been discovered in the following PGP
products:

PGP 5.0 for Linux, US Commercial and Freeware editions

PGP 5.0 for Linux, Source code book (basis for PGP 5.0i for Linux)

The following PGP products are NOT affected by this issue:

+ PGP 1.x products
+ PGP 2.x products
+ PGP 4.x products
+ All other PGP 5.x products
+ PGP 6.x products
+ PGP 7.x products

Synopsis:

During a recent review of our published PGP 5.0 for Linux
source code, researchers discovered that under specific, rare
circumstances PGP 5.0 for Linux will generate weak, predictable
public/private keypairs. These keys can only be created under
the following circumstances:

+ Keys are generated using PGP's command line option for
unattended batch key generation, with no user interaction for
entropy (random data) collection
+ No keys were generated interactively on this system
previously (e.g., a PGP random seed file is not present on
this system prior to unattended batch key generation)
+ PGP is able to access the UNIX /dev/random service to gather
entropy during unattended batch key generation

PGP 5.0 for Linux does not process the data read from
/dev/random appropriately, and therefore does not gather enough
entropy required to generate strong public/private keypairs.
This issue affects both RSA and Diffie-Hellman public/private
keypairs, regardless of keysize. Network Associates has
verified that this issue does not exist in any other version of
PGP.

Solution:

Users who generated keys in the manner described above are
strongly urged to do the following:

+ Revoke and no longer use keys suspected to have this problem
+ Generate new public/private keypairs with entropy collected
from users' typing and/or mouse movements
+ Re-encrypt any data with the newly generated keypairs that is
currently encrypted with keys suspected to have this problem
+ Re-sign any data with the newly generated keypairs, if
required

Users are also urged to upgrade to the latest releases of PGP,
as PGP 5.0 products have not been officially supported by
Network Associates since early 1999, or distributed by Network
Associates since June 1998.

Additional Information:

US commercial and freeware versions of PGP 5.0 for Linux were
released in September 1997 by PGP, Inc., a company founded by
Phil Zimmermann. Source code for the PGP 5.0 product family was
published in September 1997. PGP, Inc. was acquired by Network
Associates in December 1997.

Acknowledgements:

PGP appreciates the efforts of Germano Caronni, Thomas Roessler
and Marcel Waldvogel in identifying this issue and bringing it
to our attention.

A pgp signed version of this statement is also available at

https://www.cert.org/advisories/CA-2000-09/pgp.asc
__________________________________________________________

The CERT Coordination Center thanks Germano Caronni, Thomas
Roessler, and Marcel Waldvogel for initially discovering and
reporting this vulnerability, and for their help in developing
this advisory. Additionally we thank Brett Thomas for his
insights.
__________________________________________________________

Shawn Hernan was the primary author of this document.
_______________________________________________________________

This document is available from:
https://www.cert.org/advisories/CA-2000-09.html
_______________________________________________________________

CERT/CC Contact Information

Email: cert@cert.org
Phone: +1 412-268-7090 (24-hour hotline)
Fax: +1 412-268-6989
Postal address:
CERT Coordination Center
Software Engineering Institute
Carnegie Mellon University
Pittsburgh PA 15213-3890
U.S.A.

CERT personnel answer the hotline 08:00-20:00 EST(GMT-5) /
EDT(GMT-4) Monday through Friday; they are on call for
emergencies during other hours, on U.S. holidays, and on
weekends.

Using encryption

We strongly urge you to encrypt sensitive information sent by
email. Our public PGP key is available from

https://www.cert.org/CERT_PGP.key

If you prefer to use DES, please call the CERT hotline for more
information.

Getting security information

CERT publications and other security information are available
from our web site

https://www.cert.org/

To be added to our mailing list for advisories and bulletins,
send email to cert-advisory-request@cert.org and include
SUBSCRIBE your-email-address in the subject of your message.

* "CERT" and "CERT Coordination Center" are registered in the
U.S. Patent and Trademark Office.
_______________________________________________________________

NO WARRANTY
Any material furnished by Carnegie Mellon University and the
Software Engineering Institute is furnished on an "as is"
basis. Carnegie Mellon University makes no warranties of any
kind, either expressed or implied as to any matter including,
but not limited to, warranty of fitness for a particular
purpose or merchantability, exclusivity or results obtained
from use of the material. Carnegie Mellon University does not
make any warranty of any kind with respect to freedom from
patent, trademark, or copyright infringement.
__________________________________________________________

Conditions for use, disclaimers, and sponsorship information

Copyright 2000 Carnegie Mellon University.

Revision History

May 30, 2000: initial release

-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQA/AwUBOTQ9WFr9kb5qlZHQEQLk0QCg47iGv73z/Oy8r+LG9HqUsfIW+IwAoIja
LVwc1xbEjhY6Kuxb5tD2bjqO
=FK5V
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    38 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close