4. Why caused?Codes for generating random seed (md_rand.c) in OpenSSL was commented out by DD at May.2 2006.Because purify complains these line.As results, random numbers are generated from PID (≦ 65,535)!http://svn.debian.org/viewsvn/pkg-openssl/openssl/trunk/rand/md_rand.c?rev=141&view=diff&r1=141&r2=140&p1=openssl/trunk/rand/md_rand.c&p2=/openssl/trunk/rand/md_rand.c
5. Action!Update OpenSSL (Debian-based system).Find weak keysDebian OpenSSL Weak Key Detector (dowkd) http://security.debian.org/project/extra/dowkd/dowkd.pl.gzStop to use and remove weak keys.Make new keys (and re-certificate)日本ベリサイン、Linux OSの脆弱性による影響を受けたお客様に、電子証明書を再発行
6. OpenSSHOpenSSH is serious!$ ssh-vulnkey -a COMPROMISED: 2048 46:73:25:26:26:96:0e:e0:c9:20:15:2f:b5:ef:e1:bc ishida@mnsdebianCOMPROMISED: 2048 68:f5:6c:e0:f3:e8:73:39:1f:b7:fd:09:e9:64:dd:27 ishida@mnsdebianCOMPROMISED: 1024 db:bf:40:1a:71:e7:89:d6:a3:f8:b9:72:a9:6c:74:d2 svn@mnsdebianCOMPROMISED: 2048 f9:cf:61:ad:21:4c:bd:c2:9a:4a:da:cf:53:bc:a4:07 /user/morito/.ssh/id_rsa.pub COMPROMISED: 1024 52:b0:1d:3a:84:9c:1d:d3:ea:fc:f9:3a:ff:d3:3a:5d jun@jubuntuCOMPROMISED: 1024 d6:fa:67:0f:df:dPrincipal of user self-responsibilityNO CA. NO Key revoke system. Weak key infected through ssh user keyIf vulnerable keys are listed in the ~.ssh/authorized_keys in ANY SSHD RUNNING SERVERS, these servers are possibly takeover.