After reading the announcement on blocking RSA key sizes because one can’t be sure if they were made with the old buggy OpenSSL from Debian, it got me curious on something that I couldn’t readily find an answer to in my web searching:
Is it possible for somebody to make an ECDSA private key with the buggy OpenSSL version? I know that ECDSA wasn’t nearly as popular in 2008 (and I don’t know if it existed in any version of OpenSSL from that era), but my (limited) understanding of the bug was that it affected all random number generation from it. So I thought it wouldn’t hurt to ask, and worst case I’d just look as silly as if I asked why NASA didn’t use the Space Shuttle to help save the astronauts on Apollo 13.
(And also, I assume the new key block applies to account keys as well as to leaf certificates? Again, I assume it doesn’t really matter for most users, but I don’t know if account keys currently allow for one of the less-standard sizes.)
Yes, I know ECDSA is different from RSA, I’m asking if in addition to all oddball-sized RSA keys being unknown if it was made with an insecure OpenSSL, if it might somehow be possible for there to be ECDSA keys that we don’t know if they were made with an insecure OpenSSL.
From memory, I think ECDSA support was added to OpenSSL somewhere around 0.9.8 (haven’t actually verified), and the weak key bug was somwhat around 0.9.8c, so ECDSA support was highly new back then. The old posts from the time say that RSA and DSA keys are affected. If the OpenSSL version used was capable of generating ECDSA keys, it was probably affected too, since the EC key also needs a random number on which the curve point(s) is/are calculated.
I forgot to answer this. The block won't apply to account keys yet. We've done the analysis for leaf certificates to know what the impact will be, but we don't know what the impact will be for account keys. We want to double check that before applying a similar mitigation (which we would do mainly for consistency, since in general all our key quality checks are applied to both account keys and leaf keys).
Interesting… I’m not very experienced with the pragmatic side of EC. I definitely feel like it’s time to learn though. At some point I’ll have to read up on exactly why they chose that size.