badkeys

Finding compromised crypotgraphic keys

https://badkeys.info/

Hanno Böck

badkeys.info

Tool and website to easily check cryptographic public keys for known vulnerabilities

badkeys detects

  • Debian OpenSSL bug
  • Known common prime factors ("Mining Ps and Qs")
  • Return of Coopersmith's attack (ROCA)
  • keypair / Gitkraken bug
  • Fermat Attack
  • Many "Public Private Keys"

Debian OpenSSL Bug (CVE-2008-0166)

Keys depended on a limited number of factors like the PID and the architecture, limiting the number of possible keys to a few ten thousand

Old bugs never die

Earlier this year

"I should test DKIM keys with badkeys"

Gmail with email logos

Public Private Keys

Private Key on Github

If your private key is on Github, it's not secure.

If your private key can be downloaded from your webpage, it's also not secure

https://example.com/example.com.key

Future of badkeys

Scale up detection of "public private keys"

(Example keys in Open Source Software, static keys in Firmware, Example keys in documentation, etc.)

Future of badkeys

Auto-Revocation Service

Submit a "public private key" you know or believe it is used in a publicly trusted WebPKI certificate, revocation will be taken care of

Thanks for listening!

https://badkeys.info/