badkeys
Finding compromised crypotgraphic keys
Hanno Böck
badkeys.info
Tool and website to easily check cryptographic public keys for
known vulnerabilities
badkeys detects
- Debian OpenSSL bug
- Known common prime factors ("Mining Ps and Qs")
- Return of Coopersmith's attack (ROCA)
- keypair / Gitkraken bug
- Fermat Attack
- Many "Public Private Keys"
Debian OpenSSL Bug (CVE-2008-0166)
Keys depended on a limited number of factors like
the PID and the architecture, limiting the number of possible keys to a few ten
thousand
Earlier this year
"I should test DKIM keys with badkeys"
If your private key is on Github, it's not secure.
If your private key can be downloaded from your webpage, it's also not secure
https://example.com/example.com.key
Future of badkeys
Scale up detection of "public private keys"
(Example keys in Open Source Software, static keys in Firmware, Example keys in documentation, etc.)
Future of badkeys
Auto-Revocation Service
Submit a "public private key" you know or believe it is used in a publicly trusted WebPKI certificate,
revocation will be taken care of