public inbox for gentoo-security@lists.gentoo.org
 help / color / mirror / Atom feed
* [gentoo-security] Regeneration of gpg keys after HeartBleed
@ 2014-04-09 16:39 Jo
  2014-04-09 17:01 ` Luis Ressel
  2014-04-14 21:54 ` Alex Legler
  0 siblings, 2 replies; 6+ messages in thread
From: Jo @ 2014-04-09 16:39 UTC (permalink / raw
  To: gentoo-security

Hi all, this is my first post in this list, so again Hi all!

I'm a bit concerned about the signing keys of the portage tree releases,
I know that gpg is not the same as openssl but keeping in mind that SSH,
VPN, HTTPS keys might be compromised for two years, don't you think it's
a healthy measure to generate a new pair of keys?

Thank you


^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: [gentoo-security] Regeneration of gpg keys after HeartBleed
  2014-04-09 16:39 [gentoo-security] Regeneration of gpg keys after HeartBleed Jo
@ 2014-04-09 17:01 ` Luis Ressel
  2014-04-09 19:21   ` Chris Frederick
  2014-04-14 21:54 ` Alex Legler
  1 sibling, 1 reply; 6+ messages in thread
From: Luis Ressel @ 2014-04-09 17:01 UTC (permalink / raw
  To: gentoo-security

[-- Attachment #1: Type: text/plain, Size: 786 bytes --]

On Wed, 09 Apr 2014 18:39:41 +0200
Jo <saos@riseup.net> wrote:

> I'm a bit concerned about the signing keys of the portage tree
> releases, I know that gpg is not the same as openssl but keeping in
> mind that SSH, VPN, HTTPS keys might be compromised for two years,
> don't you think it's a healthy measure to generate a new pair of keys?

It seems highly unlikely that GPG keys got compromised. This could only
have happened if either private GPG keys were transmitted via an
OpenSSL encrypted connection, or if the information leak created a
secondary attack vector.

SSL certifcates and credentials transmitted via SSL on affected servers
should be renewed, but other than that, there's not that much to worry
about as some people think.


Regards,
Luis Ressel

[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 966 bytes --]

^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: [gentoo-security] Regeneration of gpg keys after HeartBleed
  2014-04-09 17:01 ` Luis Ressel
@ 2014-04-09 19:21   ` Chris Frederick
  2014-04-10 23:45     ` Matthias Niethammer
  0 siblings, 1 reply; 6+ messages in thread
From: Chris Frederick @ 2014-04-09 19:21 UTC (permalink / raw
  To: gentoo-security

On 04/09/14 12:01, Luis Ressel wrote:
> On Wed, 09 Apr 2014 18:39:41 +0200
> Jo <saos@riseup.net> wrote:
>
>> I'm a bit concerned about the signing keys of the portage tree
>> releases, I know that gpg is not the same as openssl but keeping in
>> mind that SSH, VPN, HTTPS keys might be compromised for two years,
>> don't you think it's a healthy measure to generate a new pair of keys?
>
> SSL certifcates and credentials transmitted via SSL on affected servers
> should be renewed, but other than that, there's not that much to worry
> about as some people think.

It's worth a trip to http://blog.erratasec.com/2014/04/why-heartbleed-doesnt-leak-private-key.html

It's not impossible that ssl keys could be compromised, but in most cases it shouldn't happen.

Chris


^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: [gentoo-security] Regeneration of gpg keys after HeartBleed
  2014-04-09 19:21   ` Chris Frederick
@ 2014-04-10 23:45     ` Matthias Niethammer
  0 siblings, 0 replies; 6+ messages in thread
From: Matthias Niethammer @ 2014-04-10 23:45 UTC (permalink / raw
  To: gentoo-security

[-- Attachment #1: Type: text/plain, Size: 1057 bytes --]

Hi Chris & List,

f.y.i.: the post you linked got retracted by the author because as he
states missread the code interpreted it in a wrong way.

Best regards,
Matthias Niethammer



2014-04-09 21:21 GMT+02:00 Chris Frederick <cdf123@cdf123.net>:

> On 04/09/14 12:01, Luis Ressel wrote:
>
>> On Wed, 09 Apr 2014 18:39:41 +0200
>> Jo <saos@riseup.net> wrote:
>>
>>  I'm a bit concerned about the signing keys of the portage tree
>>> releases, I know that gpg is not the same as openssl but keeping in
>>> mind that SSH, VPN, HTTPS keys might be compromised for two years,
>>> don't you think it's a healthy measure to generate a new pair of keys?
>>>
>>
>> SSL certifcates and credentials transmitted via SSL on affected servers
>> should be renewed, but other than that, there's not that much to worry
>> about as some people think.
>>
>
> It's worth a trip to http://blog.erratasec.com/
> 2014/04/why-heartbleed-doesnt-leak-private-key.html
>
> It's not impossible that ssl keys could be compromised, but in most cases
> it shouldn't happen.
>
> Chris
>
>

[-- Attachment #2: Type: text/html, Size: 1966 bytes --]

^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: [gentoo-security] Regeneration of gpg keys after HeartBleed
  2014-04-09 16:39 [gentoo-security] Regeneration of gpg keys after HeartBleed Jo
  2014-04-09 17:01 ` Luis Ressel
@ 2014-04-14 21:54 ` Alex Legler
  2014-04-15 13:28   ` Rich Freeman
  1 sibling, 1 reply; 6+ messages in thread
From: Alex Legler @ 2014-04-14 21:54 UTC (permalink / raw
  To: gentoo-security

[-- Attachment #1: Type: text/plain, Size: 643 bytes --]

On 09.04.2014 18:39, Jo wrote:
> Hi all, this is my first post in this list, so again Hi all!
> 
> I'm a bit concerned about the signing keys of the portage tree releases,
> I know that gpg is not the same as openssl but keeping in mind that SSH,
> VPN, HTTPS keys might be compromised for two years, don't you think it's
> a healthy measure to generate a new pair of keys?

GPG private keys are kept and used nowhere near any server processes,
not transferred via HTTPS or any VPNs, and SSH is not affected. I don't
see an immediate need to rotate them.

-- 
Alex Legler <a3li@gentoo.org>
Gentoo Security/Ruby/Infrastructure


[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 901 bytes --]

^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: [gentoo-security] Regeneration of gpg keys after HeartBleed
  2014-04-14 21:54 ` Alex Legler
@ 2014-04-15 13:28   ` Rich Freeman
  0 siblings, 0 replies; 6+ messages in thread
From: Rich Freeman @ 2014-04-15 13:28 UTC (permalink / raw
  To: gentoo-security

On Mon, Apr 14, 2014 at 5:54 PM, Alex Legler <a3li@gentoo.org> wrote:
> On 09.04.2014 18:39, Jo wrote:
>> Hi all, this is my first post in this list, so again Hi all!
>>
>> I'm a bit concerned about the signing keys of the portage tree releases,
>> I know that gpg is not the same as openssl but keeping in mind that SSH,
>> VPN, HTTPS keys might be compromised for two years, don't you think it's
>> a healthy measure to generate a new pair of keys?
>
> GPG private keys are kept and used nowhere near any server processes,
> not transferred via HTTPS or any VPNs, and SSH is not affected. I don't
> see an immediate need to rotate them.

Agree.  Also, in a few months whenever the new GPG policy GLEP is
implemented I suspect that many keys will be regenerated anyway.

Rich


^ permalink raw reply	[flat|nested] 6+ messages in thread

end of thread, other threads:[~2014-04-15 13:28 UTC | newest]

Thread overview: 6+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2014-04-09 16:39 [gentoo-security] Regeneration of gpg keys after HeartBleed Jo
2014-04-09 17:01 ` Luis Ressel
2014-04-09 19:21   ` Chris Frederick
2014-04-10 23:45     ` Matthias Niethammer
2014-04-14 21:54 ` Alex Legler
2014-04-15 13:28   ` Rich Freeman

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox