Breaking DKIM and BIMI with the 2008 Debian OpenSSL Bug

Speaker: Hanno Böck

Track: MiniDebConf Berlin 2024

Type: Long talk

Room: c-base

Time: May 18 (Sat): 17:30

Duration: 0:45

In 2008, a severe security vulnerability was discovered in Debian’s OpenSSL package. Due to a bug, cryptographic keys generated with the affected OpenSSL packages used very limited entropy, effectively limiting the number of possible keys to a few ten thousands. This was 16 years ago, but it turns out that affected keys are still used in the wild.

The speaker has developed the tool badkeys, a free software tool to scan cryptographic public keys for known vulnerabilities. By scanning DKIM public keys, several keys affected by the 2008 Debian OpenSSL bug were discovered. This allowed creating valid DKIM signatures for several high-profile domains. In some cases, signed mails show up with a company Logo in popular email clients due to a mechanism called BIMI.

See also: https://badkeys.info/

https://16years.secvuln.info/

URLs