* [gentoo-security] Regeneration of gpg keys after HeartBleed
@ 2014-04-09 16:39 Jo
2014-04-09 17:01 ` Luis Ressel
2014-04-14 21:54 ` Alex Legler
0 siblings, 2 replies; 6+ messages in thread
From: Jo @ 2014-04-09 16:39 UTC (permalink / raw
To: gentoo-security
Hi all, this is my first post in this list, so again Hi all!
I'm a bit concerned about the signing keys of the portage tree releases,
I know that gpg is not the same as openssl but keeping in mind that SSH,
VPN, HTTPS keys might be compromised for two years, don't you think it's
a healthy measure to generate a new pair of keys?
Thank you
^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: [gentoo-security] Regeneration of gpg keys after HeartBleed
2014-04-09 16:39 [gentoo-security] Regeneration of gpg keys after HeartBleed Jo
@ 2014-04-09 17:01 ` Luis Ressel
2014-04-09 19:21 ` Chris Frederick
2014-04-14 21:54 ` Alex Legler
1 sibling, 1 reply; 6+ messages in thread
From: Luis Ressel @ 2014-04-09 17:01 UTC (permalink / raw
To: gentoo-security
[-- Attachment #1: Type: text/plain, Size: 786 bytes --]
On Wed, 09 Apr 2014 18:39:41 +0200
Jo <saos@riseup.net> wrote:
> I'm a bit concerned about the signing keys of the portage tree
> releases, I know that gpg is not the same as openssl but keeping in
> mind that SSH, VPN, HTTPS keys might be compromised for two years,
> don't you think it's a healthy measure to generate a new pair of keys?
It seems highly unlikely that GPG keys got compromised. This could only
have happened if either private GPG keys were transmitted via an
OpenSSL encrypted connection, or if the information leak created a
secondary attack vector.
SSL certifcates and credentials transmitted via SSL on affected servers
should be renewed, but other than that, there's not that much to worry
about as some people think.
Regards,
Luis Ressel
[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 966 bytes --]
^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: [gentoo-security] Regeneration of gpg keys after HeartBleed
2014-04-09 17:01 ` Luis Ressel
@ 2014-04-09 19:21 ` Chris Frederick
2014-04-10 23:45 ` Matthias Niethammer
0 siblings, 1 reply; 6+ messages in thread
From: Chris Frederick @ 2014-04-09 19:21 UTC (permalink / raw
To: gentoo-security
On 04/09/14 12:01, Luis Ressel wrote:
> On Wed, 09 Apr 2014 18:39:41 +0200
> Jo <saos@riseup.net> wrote:
>
>> I'm a bit concerned about the signing keys of the portage tree
>> releases, I know that gpg is not the same as openssl but keeping in
>> mind that SSH, VPN, HTTPS keys might be compromised for two years,
>> don't you think it's a healthy measure to generate a new pair of keys?
>
> SSL certifcates and credentials transmitted via SSL on affected servers
> should be renewed, but other than that, there's not that much to worry
> about as some people think.
It's worth a trip to http://blog.erratasec.com/2014/04/why-heartbleed-doesnt-leak-private-key.html
It's not impossible that ssl keys could be compromised, but in most cases it shouldn't happen.
Chris
^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: [gentoo-security] Regeneration of gpg keys after HeartBleed
2014-04-09 19:21 ` Chris Frederick
@ 2014-04-10 23:45 ` Matthias Niethammer
0 siblings, 0 replies; 6+ messages in thread
From: Matthias Niethammer @ 2014-04-10 23:45 UTC (permalink / raw
To: gentoo-security
[-- Attachment #1: Type: text/plain, Size: 1057 bytes --]
Hi Chris & List,
f.y.i.: the post you linked got retracted by the author because as he
states missread the code interpreted it in a wrong way.
Best regards,
Matthias Niethammer
2014-04-09 21:21 GMT+02:00 Chris Frederick <cdf123@cdf123.net>:
> On 04/09/14 12:01, Luis Ressel wrote:
>
>> On Wed, 09 Apr 2014 18:39:41 +0200
>> Jo <saos@riseup.net> wrote:
>>
>> I'm a bit concerned about the signing keys of the portage tree
>>> releases, I know that gpg is not the same as openssl but keeping in
>>> mind that SSH, VPN, HTTPS keys might be compromised for two years,
>>> don't you think it's a healthy measure to generate a new pair of keys?
>>>
>>
>> SSL certifcates and credentials transmitted via SSL on affected servers
>> should be renewed, but other than that, there's not that much to worry
>> about as some people think.
>>
>
> It's worth a trip to http://blog.erratasec.com/
> 2014/04/why-heartbleed-doesnt-leak-private-key.html
>
> It's not impossible that ssl keys could be compromised, but in most cases
> it shouldn't happen.
>
> Chris
>
>
[-- Attachment #2: Type: text/html, Size: 1966 bytes --]
^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: [gentoo-security] Regeneration of gpg keys after HeartBleed
2014-04-09 16:39 [gentoo-security] Regeneration of gpg keys after HeartBleed Jo
2014-04-09 17:01 ` Luis Ressel
@ 2014-04-14 21:54 ` Alex Legler
2014-04-15 13:28 ` Rich Freeman
1 sibling, 1 reply; 6+ messages in thread
From: Alex Legler @ 2014-04-14 21:54 UTC (permalink / raw
To: gentoo-security
[-- Attachment #1: Type: text/plain, Size: 643 bytes --]
On 09.04.2014 18:39, Jo wrote:
> Hi all, this is my first post in this list, so again Hi all!
>
> I'm a bit concerned about the signing keys of the portage tree releases,
> I know that gpg is not the same as openssl but keeping in mind that SSH,
> VPN, HTTPS keys might be compromised for two years, don't you think it's
> a healthy measure to generate a new pair of keys?
GPG private keys are kept and used nowhere near any server processes,
not transferred via HTTPS or any VPNs, and SSH is not affected. I don't
see an immediate need to rotate them.
--
Alex Legler <a3li@gentoo.org>
Gentoo Security/Ruby/Infrastructure
[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 901 bytes --]
^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: [gentoo-security] Regeneration of gpg keys after HeartBleed
2014-04-14 21:54 ` Alex Legler
@ 2014-04-15 13:28 ` Rich Freeman
0 siblings, 0 replies; 6+ messages in thread
From: Rich Freeman @ 2014-04-15 13:28 UTC (permalink / raw
To: gentoo-security
On Mon, Apr 14, 2014 at 5:54 PM, Alex Legler <a3li@gentoo.org> wrote:
> On 09.04.2014 18:39, Jo wrote:
>> Hi all, this is my first post in this list, so again Hi all!
>>
>> I'm a bit concerned about the signing keys of the portage tree releases,
>> I know that gpg is not the same as openssl but keeping in mind that SSH,
>> VPN, HTTPS keys might be compromised for two years, don't you think it's
>> a healthy measure to generate a new pair of keys?
>
> GPG private keys are kept and used nowhere near any server processes,
> not transferred via HTTPS or any VPNs, and SSH is not affected. I don't
> see an immediate need to rotate them.
Agree. Also, in a few months whenever the new GPG policy GLEP is
implemented I suspect that many keys will be regenerated anyway.
Rich
^ permalink raw reply [flat|nested] 6+ messages in thread
end of thread, other threads:[~2014-04-15 13:28 UTC | newest]
Thread overview: 6+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2014-04-09 16:39 [gentoo-security] Regeneration of gpg keys after HeartBleed Jo
2014-04-09 17:01 ` Luis Ressel
2014-04-09 19:21 ` Chris Frederick
2014-04-10 23:45 ` Matthias Niethammer
2014-04-14 21:54 ` Alex Legler
2014-04-15 13:28 ` Rich Freeman
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox