[Pkg-gnutls-commits] r764 - in /packages/gnutls26/branches/branch2.4.2-6lenny/debian: changelog libgnutls26.NEWS
ametzler at users.alioth.debian.org
ametzler at users.alioth.debian.org
Sat Aug 22 08:43:10 UTC 2009
Author: ametzler
Date: Sat Aug 22 08:43:10 2009
New Revision: 764
URL: http://svn.debian.org/wsvn/pkg-gnutls/?sc=1&rev=764
Log:
Document deprecation of RSA-MD2 and RSA-MD5 for signature verification.
Added:
packages/gnutls26/branches/branch2.4.2-6lenny/debian/libgnutls26.NEWS
Modified:
packages/gnutls26/branches/branch2.4.2-6lenny/debian/changelog
Modified: packages/gnutls26/branches/branch2.4.2-6lenny/debian/changelog
URL: http://svn.debian.org/wsvn/pkg-gnutls/packages/gnutls26/branches/branch2.4.2-6lenny/debian/changelog?rev=764&op=diff
==============================================================================
--- packages/gnutls26/branches/branch2.4.2-6lenny/debian/changelog (original)
+++ packages/gnutls26/branches/branch2.4.2-6lenny/debian/changelog Sat Aug 22 08:43:10 2009
@@ -4,6 +4,8 @@
to NUL bytes in X.509 certificate name fields. Closes: #541439
+ 26_CVE-2009-2730_2.4.1.patch.
+ 27_fix_opengpp.diff - Previous patch broke openpgp auth.
+ * Finally add an entry to the NEWS.Debian file concerning the deprecation of
+ RSA-MD2 and RSA-MD5 for signature verification. Closes: #514578
-- Andreas Metzler <ametzler at debian.org> Sat, 22 Aug 2009 08:56:57 +0200
Added: packages/gnutls26/branches/branch2.4.2-6lenny/debian/libgnutls26.NEWS
URL: http://svn.debian.org/wsvn/pkg-gnutls/packages/gnutls26/branches/branch2.4.2-6lenny/debian/libgnutls26.NEWS?rev=764&op=file
==============================================================================
--- packages/gnutls26/branches/branch2.4.2-6lenny/debian/libgnutls26.NEWS (added)
+++ packages/gnutls26/branches/branch2.4.2-6lenny/debian/libgnutls26.NEWS Sat Aug 22 08:43:10 2009
@@ -1,0 +1,20 @@
+gnutls26 (2.4.2-5) unstable; urgency=medium
+
+ * The gnutls certificate verification code has been changed to stop
+ trusting some weak algoritms. Verifying untrusted X.509 certificates
+ signed with RSA-MD2 or RSA-MD5 will now fail with a
+ GNUTLS_CERT_INSECURE_ALGORITHM verification output.
+
+ See <http://www.win.tue.nl/hashclash/rogue-ca/>,
+ <http://bugs.debian.org/514578> and
+ <http://www.gnu.org/software/gnutls/manual/gnutls.html#Digital-signatures>
+
+ "certtool -i < signature.pem" will inform about the algoritm used for
+ signing (Search for "Signature Algorithm" in its output.). The proper
+ fix is to re-issue the certificates with a more secure algoritm. As a
+ hotfix the respective certicate itself can be added to the list of
+ trusted certificates. Obviously this should only be done after
+ verifying the certificate by different means than relying on the weak
+ signature.
+
+ -- Andreas Metzler <ametzler at debian.org> Sat, 07 Feb 2009 12:58:51 +0100
More information about the Pkg-gnutls-commits
mailing list