4.9 • 696 Ratings
🗓️ 22 August 2016
⏱️ 5 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Monday, August 22nd, 2016 edition, Sansonet Storm Center's Stormcast. |
0:07.6 | My name is Johannes Ulrich, and the Am recording from Jacksonville, Florida. |
0:11.3 | The Knew Privacy Guarder, Knew P project, fixed a buck in the way it is. |
0:18.2 | Random numbers to create keys. |
0:21.6 | Random numbers for key creation has always been sort of an detail of a lot of these encryption algorithms. |
0:27.4 | This bug apparently wasn't a software for 18 years. |
0:31.1 | What it means in a little bit more practical terms is that if an attacker can observe 4,640 bits of random numbers from the |
0:42.3 | PGP random number generator, then they can guess the next 160 bits. |
0:49.3 | So essentially these random number generators aren't really all that random. Now what does this mean for actual |
0:57.3 | practical weaknesses in PGP or better KnewPG? Well, where it really matters is the creation. |
1:06.0 | So one possible advice here is you to recreate your GPG keys with more recent versions. |
1:15.6 | However, the developers of Knoopi advise against a hasty replacement of your keys, first of all, this does not affect RSA keys. |
1:26.6 | So only DSA and El Jamal keys are actually affected by |
1:32.0 | this vulnerability. And secondly, in order to exploit the vulnerability, the attacker would |
1:38.2 | have to have access to 4,640 bits off your random generator right before you created your keys. |
1:47.0 | So I don't really see a practically attack scenario here, but again, it's best practice to occasionally |
1:53.0 | expire your PGP keys. So maybe do it over the next couple of months as you find |
2:00.0 | the time to do so correctly. Make |
2:02.3 | sure you are using a system that has been patched, of course. The update was released on August |
2:09.8 | 17th. It has been heavily discussed in the news that VickyLeaks published some large unfiltered email dumps recently. |
2:20.3 | If you are looking through these emails to explore what was being published here, be aware |
2:27.3 | that since these emails haven't been filtered, they also include the usual set of malicious emails that you tend to find in any kind of inbox. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.