home tags events about login
one honk maybe more

dangoodin@infosec.ex.. posted 15 Apr 2024 20:56 +0000

Every version of PuTTY released over the past 7 years contains a critical vulnerability that allows for the recovery of certain types of secret encryption keys, specifically 521-bit ECDSA. An adversary in possession of a “few dozen signed messages” and the public key can recover the private key. I’m curious to know how widely this vulnerability is likely to be felt. I’m guessing most people have already replaced keys with only 512 bits, which I’m further guessing are already susceptible to factorization. Can anyone confirm or disabuse me of these guesses?

https://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-p521-bias.html

benjojo replied 15 Apr 2024 22:50 +0000
in reply to: https://infosec.exchange/users/malwaretech/statuses/112277613039708137

@malwaretech @filippo @dangoodin so I pulled the github keys of 1.4k people who follow me on github, and:

$ cat keys | awk '{print $1}' | sort | uniq -c 
     50 ecdsa-sha2-nistp256
      1 ecdsa-sha2-nistp384
      8 ecdsa-sha2-nistp521
      3 sk-ecdsa-sha2-nistp256@openssh.com
     14 sk-ssh-ed25519@openssh.com
    828 ssh-ed25519
    875 ssh-rsa

P521 is used more than P384, but it's all tiny volumes compared to the actually correct option of ed25519.

I don't think P521 (or, in general ECDSA) keys are that widely used, either that or my followers are smarter or dumber than the average