[freenet-dev] SHA-1 broken at the Crypto 2006

2006-09-06 Thread Matthew Toseland
On Tue, Sep 05, 2006 at 12:20:57PM -0400, Evan Daniel wrote: > On 9/5/06, Michael Rogers wrote: > >-BEGIN PGP SIGNED MESSAGE- > >Hash: SHA1 > > > >Matthew Toseland wrote: > >> We will be using STS, at least initially. Which means checking a > >> signature. > > > >Cool, IANAC but I think

Re: [freenet-dev] SHA-1 broken at the Crypto 2006

2006-09-06 Thread Matthew Toseland
On Tue, Sep 05, 2006 at 12:20:57PM -0400, Evan Daniel wrote: On 9/5/06, Michael Rogers [EMAIL PROTECTED] wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Matthew Toseland wrote: We will be using STS, at least initially. Which means checking a signature. Cool, IANAC but I think we

[freenet-dev] SHA-1 broken at the Crypto 2006

2006-09-05 Thread Michael Rogers
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Matthew Toseland wrote: > We will be using STS, at least initially. Which means checking a > signature. Cool, IANAC but I think we should be OK. Cheers, Michael -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.5 (GNU/Linux)

[freenet-dev] SHA-1 broken at the Crypto 2006

2006-09-05 Thread Evan Daniel
On 9/5/06, Michael Rogers wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > Matthew Toseland wrote: > > We will be using STS, at least initially. Which means checking a > > signature. > > Cool, IANAC but I think we should be OK. As long as we're signing the data, not its hash; in

Re: [freenet-dev] SHA-1 broken at the Crypto 2006

2006-09-05 Thread Michael Rogers
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Matthew Toseland wrote: We will be using STS, at least initially. Which means checking a signature. Cool, IANAC but I think we should be OK. Cheers, Michael -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.5 (GNU/Linux)

Re: [freenet-dev] SHA-1 broken at the Crypto 2006

2006-09-05 Thread Evan Daniel
On 9/5/06, Michael Rogers [EMAIL PROTECTED] wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Matthew Toseland wrote: We will be using STS, at least initially. Which means checking a signature. Cool, IANAC but I think we should be OK. As long as we're signing the data, not its hash; in

[freenet-dev] SHA-1 broken at the Crypto 2006

2006-09-02 Thread Matthew Toseland
We will be using STS, at least initially. Which means checking a signature. On Fri, Sep 01, 2006 at 07:25:14PM +0100, Michael Rogers wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > Matthew Toseland wrote: > > What about in session setup? > > To be honest I don't know enough about

Re: [freenet-dev] SHA-1 broken at the Crypto 2006

2006-09-02 Thread Matthew Toseland
We will be using STS, at least initially. Which means checking a signature. On Fri, Sep 01, 2006 at 07:25:14PM +0100, Michael Rogers wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Matthew Toseland wrote: What about in session setup? To be honest I don't know enough about the key

[freenet-dev] SHA-1 broken at the Crypto 2006

2006-09-01 Thread Michael Rogers
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Matthew Toseland wrote: > What about in session setup? To be honest I don't know enough about the key exchange protocol to give an informed answer. If it's just a question of checking that a hash matches a public key, we only need second preimage

Re: [freenet-dev] SHA-1 broken at the Crypto 2006

2006-09-01 Thread Michael Rogers
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Matthew Toseland wrote: What about in session setup? To be honest I don't know enough about the key exchange protocol to give an informed answer. If it's just a question of checking that a hash matches a public key, we only need second preimage

[freenet-dev] SHA-1 broken at the Crypto 2006

2006-08-30 Thread Matthew Toseland
What about in session setup? On Sun, Aug 27, 2006 at 12:49:23PM +0100, Michael Rogers wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > freenetwork at web.de wrote: > > Hash function SHA-1 in distress > > As worrying as this is, I don't think it affects Freenet yet. The attack >

Re: [freenet-dev] SHA-1 broken at the Crypto 2006

2006-08-30 Thread Matthew Toseland
What about in session setup? On Sun, Aug 27, 2006 at 12:49:23PM +0100, Michael Rogers wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 [EMAIL PROTECTED] wrote: Hash function SHA-1 in distress As worrying as this is, I don't think it affects Freenet yet. The attack undermines the

[freenet-dev] SHA-1 broken at the Crypto 2006

2006-08-27 Thread Marco Gruss
On Sun, Aug 27, 2006 at 12:19:01PM +0200, freenetwork at web.de wrote: > German text: > > http://www.heise.de/newsticker/meldung/77235 > > Babelfish-translated to english: There's a better version at http://www.heise-security.co.uk/news/77244 rgds Marco

[freenet-dev] SHA-1 broken at the Crypto 2006

2006-08-27 Thread Yongqian Li
I believe that Freenet uses SHA-256 which hasn't been broken (yet). --- Michael Rogers wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > freenetwork at web.de wrote: > > Hash function SHA-1 in distress > > As worrying as this is, I don't think it affects > Freenet yet. The attack >

[freenet-dev] SHA-1 broken at the Crypto 2006

2006-08-27 Thread Michael Rogers
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 freenetwork at web.de wrote: > Hash function SHA-1 in distress As worrying as this is, I don't think it affects Freenet yet. The attack undermines the collision-resistance of the hash function, but as far as I know Freenet only makes use of

[freenet-dev] SHA-1 broken at the Crypto 2006

2006-08-27 Thread freenetw...@web.de
German text: http://www.heise.de/newsticker/meldung/77235 Babelfish-translated to english: Hash function SHA-1 in distress Kryptoexperten demonstrated an extended attack method to the conference Crypto 2006 against a reduced variant of the hash algorithm SHA-1. With the new method it

[freenet-dev] SHA-1 broken at the Crypto 2006

2006-08-27 Thread [EMAIL PROTECTED]
German text: http://www.heise.de/newsticker/meldung/77235 Babelfish-translated to english: Hash function SHA-1 in distress Kryptoexperten demonstrated an extended attack method to the conference Crypto 2006 against a reduced variant of the hash algorithm SHA-1. With the new method it

Re: [freenet-dev] SHA-1 broken at the Crypto 2006

2006-08-27 Thread Michael Rogers
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 [EMAIL PROTECTED] wrote: Hash function SHA-1 in distress As worrying as this is, I don't think it affects Freenet yet. The attack undermines the collision-resistance of the hash function, but as far as I know Freenet only makes use of

Re: [freenet-dev] SHA-1 broken at the Crypto 2006

2006-08-27 Thread Yongqian Li
I believe that Freenet uses SHA-256 which hasn't been broken (yet). --- Michael Rogers [EMAIL PROTECTED] wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 [EMAIL PROTECTED] wrote: Hash function SHA-1 in distress As worrying as this is, I don't think it affects Freenet yet. The