<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40"><head><meta http-equiv=Content-Type content="text/html; charset=us-ascii"><meta name=Generator content="Microsoft Word 14 (filtered medium)"><!--[if !mso]><style>v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style><![endif]--><style><!--
/* Font Definitions */
@font-face
        {font-family:Calibri;
        panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
        {font-family:Tahoma;
        panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
        {font-family:Verdana;
        panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
        {margin:0in;
        margin-bottom:.0001pt;
        font-size:12.0pt;
        font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
        {mso-style-priority:99;
        color:blue;
        text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
        {mso-style-priority:99;
        color:purple;
        text-decoration:underline;}
p
        {mso-style-priority:99;
        margin:0in;
        margin-bottom:.0001pt;
        font-size:12.0pt;
        font-family:"Times New Roman","serif";}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
        {mso-style-priority:99;
        mso-style-link:"Balloon Text Char";
        margin:0in;
        margin-bottom:.0001pt;
        font-size:8.0pt;
        font-family:"Tahoma","sans-serif";}
p.msochpdefault, li.msochpdefault, div.msochpdefault
        {mso-style-name:msochpdefault;
        margin:0in;
        margin-bottom:.0001pt;
        font-size:10.0pt;
        font-family:"Times New Roman","serif";}
span.emailstyle18
        {mso-style-name:emailstyle18;
        font-family:"Calibri","sans-serif";
        color:#1F497D;}
span.BalloonTextChar
        {mso-style-name:"Balloon Text Char";
        mso-style-priority:99;
        mso-style-link:"Balloon Text";
        font-family:"Tahoma","sans-serif";}
span.EmailStyle22
        {mso-style-type:personal-reply;
        font-family:"Calibri","sans-serif";
        color:#1F497D;}
.MsoChpDefault
        {mso-style-type:export-only;
        font-size:10.0pt;}
@page WordSection1
        {size:8.5in 11.0in;
        margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
        {page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]--></head><body lang=EN-US link=blue vlink=purple><div class=WordSection1><p class=MsoNormal><span style='font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>I (naively?) thought most systems generated their own keys the first time you started them up.&nbsp; I&#8217;m a bit disappointed to find out about this.<o:p></o:p></span></p><p class=MsoNormal><span style='font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=MsoNormal><span style='font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>I&#8217;m hoping there is a demarcation in there somewhere between the D-link, Linksys and Netgear stuff and the Juniper, Cisco, etc. equipment where this is not the case.<o:p></o:p></span></p><p class=MsoNormal><span style='font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=MsoNormal><span style='font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>-Nate<o:p></o:p></span></p><p class=MsoNormal><span style='font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'><o:p>&nbsp;</o:p></span></p><div><div style='border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in 0in 0in'><p class=MsoNormal><b><span style='font-size:10.0pt;font-family:"Tahoma","sans-serif"'>From:</span></b><span style='font-size:10.0pt;font-family:"Tahoma","sans-serif"'> cialug-bounces@cialug.org [mailto:cialug-bounces@cialug.org] <b>On Behalf Of </b>Josh More<br><b>Sent:</b> Thursday, December 23, 2010 10:27 AM<br><b>To:</b> Central Iowa Linux Users Group<br><b>Subject:</b> Re: [Cialug] DD-WRT (and others) Risk<o:p></o:p></span></p></div></div><p class=MsoNormal><o:p>&nbsp;</o:p></p><div><div><p class=MsoNormal><span style='font-size:10.0pt;font-family:"Verdana","sans-serif";color:black'>Nate,<br><br>Not that I know of.&nbsp; I'm just starting to look into it myself.&nbsp; Fundamentally, though, what we're seeing is the other end of asymmetric cryptography.&nbsp; It's great for cases when you have to cross a trust boundary, but the instant the security of the private key is breached, the cryptosystem fails.<br><br>The lesson here is that open source projects should make it easy for you to roll your own keys.&nbsp; Closed source products should make use of revocation lists, engage in frequent key rotation, and code the updates into the products themselves (or allow you to roll your own keys).<br><br>Otherwise all someone has to do is start collecting leaked keys and being patient.<br><br>The rule of thumb to follow is that if you think your organization can protect private keys better than your vendor can, you should probably replace their keys with your own.<o:p></o:p></span></p></div><div><p class=MsoNormal><span style='font-size:10.0pt;font-family:"Verdana","sans-serif";color:black'><o:p>&nbsp;</o:p></span></p><div><div><div><div><div><div><div><div><div><div><div><div><p class=MsoNormal><b><span style='font-family:"Arial","sans-serif";color:black'>Josh More</span></b><span style='font-size:10.0pt;font-family:"Arial","sans-serif";color:black'> | Senior Security Consultant - CISSP, GIAC-GSLC, GIAC-GCIH<br><b>Alliance Technologies</b> | <a href="http://www.alliancetechnologies.net"><span style='color:red'>www.AllianceTechnologies.net</span></a><br>400 Locust St., Suite 840 | Des Moines, IA 50309<br>515.245.7701 | 888.387.5670 x7701<br><br>Santa is Secure.&nbsp; Are you?&nbsp; <br><a href="http://www.alliancetechnologies.net/security/santa-2010">http://www.alliancetechnologies.net/security/santa-2010</a><br><br>How are we doing? Let us know here:<br><a href="http://www.alliancetechnologies.net/forms/alliance-technologies-feedback-survey">http://www.alliancetechnologies.net/forms/alliance-technologies-feedback-survey</a><o:p></o:p></span></p></div></div></div></div></div></div></div></div></div></div></div></div></div><div><div class=MsoNormal align=center style='text-align:center'><span style='color:black'><hr size=2 width="100%" align=center></span></div><div id=divRpF696598><p class=MsoNormal style='margin-bottom:12.0pt'><b><span style='font-size:10.0pt;font-family:"Tahoma","sans-serif";color:black'>From:</span></b><span style='font-size:10.0pt;font-family:"Tahoma","sans-serif";color:black'> cialug-bounces@cialug.org [cialug-bounces@cialug.org] on behalf of Nathan C. Smith [nathan.smith@ipmvs.com]<br><b>Sent:</b> Thursday, December 23, 2010 10:24<br><b>To:</b> 'Central Iowa Linux Users Group'<br><b>Subject:</b> Re: [Cialug] DD-WRT (and others) Risk</span><span style='color:black'><o:p></o:p></span></p></div><div><div><p class=MsoNormal><span style='font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>Josh,</span><span style='color:black'><o:p></o:p></span></p><p class=MsoNormal><span style='font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>&nbsp;</span><span style='color:black'><o:p></o:p></span></p><p class=MsoNormal><span style='font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>thanks for pointing this out.&nbsp; Is there a plain listing of suspect manufacturers/devices somewhere?</span><span style='color:black'><o:p></o:p></span></p><p class=MsoNormal><span style='font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>&nbsp;</span><span style='color:black'><o:p></o:p></span></p><p class=MsoNormal><span style='font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>-Nate</span><span style='color:black'><o:p></o:p></span></p><p class=MsoNormal><span style='font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>&nbsp;</span><span style='color:black'><o:p></o:p></span></p><div><div style='border:none;border-top:solid windowtext 1.0pt;padding:3.0pt 0in 0in 0in;border-color:-moz-use-text-color -moz-use-text-color'><p class=MsoNormal><b><span style='font-size:10.0pt;font-family:"Tahoma","sans-serif";color:black'>From:</span></b><span style='font-size:10.0pt;font-family:"Tahoma","sans-serif";color:black'> cialug-bounces@cialug.org [mailto:cialug-bounces@cialug.org] <b>On Behalf Of </b>Josh More<br><b>Sent:</b> Thursday, December 23, 2010 10:09 AM<br><b>To:</b> cialug@cialug.org<br><b>Subject:</b> [Cialug] DD-WRT (and others) Risk</span><span style='color:black'><o:p></o:p></span></p></div></div><p class=MsoNormal><span style='color:black'>&nbsp;<o:p></o:p></span></p><div><div><p class=MsoNormal style='margin-bottom:12.0pt'><span style='font-size:10.0pt;font-family:"Verdana","sans-serif";color:black'>Since we still have a list right now, and since I know that tomorrow is a down day for everyone with no obligations other than reading and responding to security threats, I thought I'd share this link:&nbsp; <a href="http://seclists.org/fulldisclosure/2010/Dec/492" target="_blank">http://seclists.org/fulldisclosure/2010/Dec/492</a><br><br>Nutshell version:&nbsp; If you're running DD-WRT, you might want to roll your own self-signed cert.&nbsp; If you're running one of the others in the DB, you're probably out of luck.&nbsp; If you typically have to analyze SSL traffic for fun or profit, merry Christmas.</span><span style='color:black'><o:p></o:p></span></p></div><div><p class=MsoNormal><span style='font-size:10.0pt;font-family:"Verdana","sans-serif";color:black'>&nbsp;</span><span style='color:black'><o:p></o:p></span></p><div><div><div><div><div><div><div><div><div><div><div><div><p class=MsoNormal><b><span style='font-family:"Arial","sans-serif";color:black'>Josh More</span></b><span style='font-size:10.0pt;font-family:"Arial","sans-serif";color:black'> | Senior Security Consultant - CISSP, GIAC-GSLC, GIAC-GCIH<br><b>Alliance Technologies</b> | <a href="http://www.alliancetechnologies.net" target="_blank"><span style='color:red'>www.AllianceTechnologies.net</span></a><br>400 Locust St., Suite 840 | Des Moines, IA 50309<br>515.245.7701 | 888.387.5670 x7701<br><br>Santa is Secure.&nbsp; Are you?&nbsp; <br><a href="http://www.alliancetechnologies.net/security/santa-2010" target="_blank">http://www.alliancetechnologies.net/security/santa-2010</a><br><br>How are we doing? Let us know here:<br><a href="http://www.alliancetechnologies.net/forms/alliance-technologies-feedback-survey" target="_blank">http://www.alliancetechnologies.net/forms/alliance-technologies-feedback-survey</a></span><span style='color:black'><o:p></o:p></span></p></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></body></html>