/srv/irclogs.ubuntu.com/2022/05/04/#ubuntu-security.txt

agrosantkeeping the system up to date is the key for peace of mind these days02:48
Unit193...And keeping java off it. :>02:52
sarnold:)02:52
agrosantspecial situation with hacker group in greece03:33
agrosanthacker group from greece, the slightest sign of your evil existence near my close relatives and friends. watch your next steps dudes.03:46
tewardmdeslaur: if you want to make a note, on CVE-2021-3618 and ALPACA, in Debian we're prepping 1.20.2-2 (I usually let my changes sit a few days before I upload) to include NGINX's mitigation of max_errors directive in the Mail module.  This adds a new argument for max_errors in the Mail module, but it's the only way to make this workaround work.  So consider it a security backport of a 'new function' necessary for security.22:58
ubottuALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. A MiTM attacker having access to victim's traffic at the TCP/IP layer can redirect traffic from one subdomain to another, resulting in a valid TLS session. This breaks the auth... <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3618>22:58
tewardEventually the Server Team will be processing the nginx merge into Kinetic so it'd just need the security team to determine if a backport is worth being included that includes the new directive22:58
teward(Debian Unstable is a little more forgiving on this when it comes to 'new functionality' or such)22:59
mdeslaurteward: thanks23:07
tewardmdeslaur: yep.  got an OpenSSL question if you know it23:32
tewardgot a question on Ask Ubuntu about OpenSSL doing a "sha-1 deprecated" problem with a SHA-1 signed cert on wifi with wpa_supplicant23:32
tewardis that wpa-supplicant or openssl defaults in OPenSSL 3 in 22.04?23:33
sarnoldopenssl, "In particular, certificates using SHA1 or MD5 as hash algorithms are now invalid under the default security level."  from https://discourse.ubuntu.com/t/jammy-jellyfish-release-notes/2466823:34
sarnoldI think this is the bit you're tripping on "X509 certificates signed using SHA1 are no longer allowed at security level 1 and above"  https://www.openssl.org/docs/manmaster/man7/migration_guide.html23:38
sarnoldgive this a read and see if it looks about right https://askubuntu.com/a/1233456/3381223:39
=== tomreyn_ is now known as tomreyn

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!