Re: Why are manager session tokens generated with MD5 by default?

2009-01-06 Thread Tim Funk
Just turning the random number into a session id should sufficient and we can forget the MD5 altogether. But if someone figures out the seed and can guess future subsequent numbers, then they can guess future session ids. By using a hashing algorithm - it makes it impossible to guess what

Re: Why are manager session tokens generated with MD5 by default?

2009-01-06 Thread Preston L. Bannister
First, note that any session-id provides only the flimsiest sort of security. Proper authentication was described a long time ago: Needham, Roger; Schroeder, Michael (December 1978), Using encryption for authentication in large networks of computers., *Communications of the ACM* *21* (12):

Re: Why are manager session tokens generated with MD5 by default?

2009-01-05 Thread Minoo Hamilton
I'd like to re-raise an issue, since I didn't get too much of a response, originally. Who can I talk to to lobby to get the default behavior of using MD5 session token hashes to change? If you weren't aware of it, there has been a recent and highly-publicized breaking of SSL, by creating a

Re: Why are manager session tokens generated with MD5 by default?

2009-01-05 Thread Filip Hanik - Dev Lists
you don't need to lobby, simply create a patch in Bugzilla Minoo Hamilton wrote: I'd like to re-raise an issue, since I didn't get too much of a response, originally. Who can I talk to to lobby to get the default behavior of using MD5 session token hashes to change? If you weren't aware of

Re: Why are manager session tokens generated with MD5 by default?

2009-01-05 Thread Mark Thomas
Filip Hanik - Dev Lists wrote: you don't need to lobby, simply create a patch in Bugzilla Although it is likely to get ignored / end up as WONTFIX. I don't see what the security issue is here. How does an MD5 collisions affect the security of the session ID? Mark Minoo Hamilton wrote: I'd

Re: Why are manager session tokens generated with MD5 by default?

2009-01-05 Thread Preston L. Bannister
How would you reverse a session-id from an MD5 hash? The exploit used to forge an SSL certificate will not help you. The MD5 exploit is irrelevant to this particular usage. Lots of links and discussion: http://www.schneier.com/blog/archives/2008/12/forging_ssl_cer.html If you are connecting to

Re: Why are manager session tokens generated with MD5 by default?

2009-01-05 Thread Minoo Hamilton
Perhaps, I am making a big deal over a small theoretical issue, but I don't think I am. In my mind, if you're ever in a situation to guess/predict/brute force a valid and current session token, there are a range of session hijacking possibilities that are all potentially bad. If you'd really

Re: Why are manager session tokens generated with MD5 by default?

2009-01-05 Thread Minoo Hamilton
Preston L. Bannister wrote: How would you reverse a session-id from an MD5 hash? The exploit used to forge an SSL certificate will not help you. The MD5 exploit is irrelevant to this particular usage. Lots of links and discussion:

Re: Why are manager session tokens generated with MD5 by default?

2009-01-05 Thread William A. Rowe, Jr.
Mark Thomas wrote: Filip Hanik - Dev Lists wrote: you don't need to lobby, simply create a patch in Bugzilla Although it is likely to get ignored / end up as WONTFIX. I don't see what the security issue is here. How does an MD5 collisions affect the security of the session ID? The only

Re: Why are manager session tokens generated with MD5 by default?

2008-08-28 Thread Tim Funk
It is probably due to old code which works just fine when SHA might not have been easily available in all JVM's. (back in 2002?) So a quick recap for folks ... a session id is generated by 1) Getting a random number 2) Hashing it 3) Converting the hashed bytes to something text [base64] so they