On Mar 8, 2013, at 4:12 PM, PJ Eby <p...@telecommunity.com> wrote:

> On Fri, Mar 8, 2013 at 2:52 PM, Noah Kantrowitz <n...@coderanger.net> wrote:
>> MD5 is _not_ acceptable for anything security related and we shouldn't be 
>> adding anything that increases our dependence on it. MD5's only use in the 
>> packaging world is to make people who forget that TCP has its own checksums 
>> feel all warm and fuzzy that there hasn't been _accidental_ download 
>> corruption.
> 
> So, you're saying that someone has found a second-preimage attack
> against MD5 that's more efficient than the current 2**127 threshold
> established in 2009?
> 
> "Anything security related" is pretty broad.  Out of the many classes
> of attacks on hashes, AFAIK the only class that's relevant to PyPI is
> second preimage attacks,  i.e. one where the attacker has the original
> file and the hash, and must construct a new file that produces the
> same hash value.
> 
> Did you have some other type of hash attack in mind?  And in either
> case, do you have a referent for the attack complexity?
> _______________________________________________
> Catalog-SIG mailing list
> Catalog-SIG@python.org
> http://mail.python.org/mailman/listinfo/catalog-sig

Here's some more information pulled straight from Wikiepdia:

However, it has since been shown that MD5 is not collision resistant;[3] as 
such, MD5 is not suitable for applications like SSL certificates or digital 
signatures that rely on this property. In 1996, a flaw was found with the 
design of MD5, and while it was not a clearly fatal weakness, cryptographers 
began recommending the use of other algorithms, such as SHA-1—which has since 
been found to be vulnerable as well. In 2004, more serious flaws were 
discovered in MD5, making further use of the algorithm for security purposes 
questionable—specifically, a group of researchers described how to create a 
pair of files that share the same MD5 checksum.[4][5] Further advances were 
made in breaking MD5 in 2005, 2006, and 2007.[6] In December 2008, a group of 
researchers used this technique to fake SSL certificate validity,[7][8] and CMU 
Software Engineering Institute now says that MD5 "should be considered 
cryptographically broken and unsuitable for further use",[9] and most U.S. 
government applications now require the SHA-2 family of hash functions.[10]

Here's the important highlights:

    - specifically, a group of researchers described how to create a pair of 
files that share the same MD5 checksum
    - MD5 "should be considered cryptographically broken and unsuitable for 
further use"


-----------------
Donald Stufft
PGP: 0x6E3CBCE93372DCFA // 7C6B 7C5D 5E2B 6356 A926 F04F 6E3C BCE9 3372 DCFA

Attachment: signature.asc
Description: Message signed with OpenPGP using GPGMail

_______________________________________________
Catalog-SIG mailing list
Catalog-SIG@python.org
http://mail.python.org/mailman/listinfo/catalog-sig

Reply via email to