[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Analyzing dumps (Was: 6 million)
From: |
Kiss Gabor (Bitman) |
Subject: |
Analyzing dumps (Was: 6 million) |
Date: |
Sun, 3 May 2020 11:15:56 +0200 (CEST) |
User-agent: |
Alpine 2.11 (DEB 23 2013-08-11) |
On Sat, 2 May 2020, Wiktor Kwapisiewicz wrote:
> On 02.05.2020 07:55, Gabor Kiss wrote:
> > I would create such a programs from the scratch but I cannot
> > find even the format description of the dump file. :-(
>
> Last time I checked dumps where just packet piles so any OpenPGP tool
> could read it.
Thanks again for the hint.
I wrote a small Perl script to see what is in dump files
at http://keys.niif.hu/keydump/. (Server is managed by me.)
I found broken dumps. Certain RFC-4880 packets are truncated. For example
let's see signatures of key 0x7cec0e7c93115f7e:
00483ad0 89 01 22 04 10 01 02 00 0c 05 02 44 cf db 85 |..."........D...|
00483ae0 05 03 00 93 89 01 22 04 10 01 02 00 0c 05 02 4d |......"........M|
We can see a signature packet starting at 00483ad1.
(89 01 22 is a typical old style packet header.) Its length should be
0x122 octets however it breaks in middle of the second subpacket starting
at 00483ae0. A new packet starts at 00483ae4 but my simple parser cannot
detect this and gets confused.
(Unfortunately such a truncated packet may block the import procedure
also on a newly set up key server, I guess.)
I cannot imagine how this dump could be created.
Could the attacker upload broken packets or is it "sks dump"
who garbled the dump file? Or file became bad during
compression/decompression?
Another observation: some keys have enermous amount of signatures.
"Yegor Timoshenko <address@hidden>" may be a recorder
with 174612 sigs. This is one of the poisoned keys, isn't it?
Gabor
--
No smoke, no drugs, no vindoze.
- Analyzing dumps (Was: 6 million),
Kiss Gabor (Bitman) <=