On Mar 8, 2013, at 5:08 PM, PJ Eby <p...@telecommunity.com> wrote:

> On Fri, Mar 8, 2013 at 4:26 PM, Donald Stufft <don...@stufft.io> wrote:
>> On Mar 8, 2013, at 4:12 PM, PJ Eby <p...@telecommunity.com> wrote:
>> 
>>> On Fri, Mar 8, 2013 at 2:52 PM, Noah Kantrowitz <n...@coderanger.net> wrote:
>>>> MD5 is _not_ acceptable for anything security related and we shouldn't be 
>>>> adding anything that increases our dependence on it. MD5's only use in the 
>>>> packaging world is to make people who forget that TCP has its own 
>>>> checksums feel all warm and fuzzy that there hasn't been _accidental_ 
>>>> download corruption.
>>> 
>>> So, you're saying that someone has found a second-preimage attack
>>> against MD5 that's more efficient than the current 2**127 threshold
>>> established in 2009?
>>> 
>>> "Anything security related" is pretty broad.  Out of the many classes
>>> of attacks on hashes, AFAIK the only class that's relevant to PyPI is
>>> second preimage attacks,  i.e. one where the attacker has the original
>>> file and the hash, and must construct a new file that produces the
>>> same hash value.
>> 
>> Relevant to PyPI is pretty broad, and when you're developing a secure system 
>> you need to look past what is ok *today* and design for the next 5, 10, or 
>> 20 years. So even if there's no attack that can directly allow replacing the 
>> target file with a new one, continuing to utilize it is bad. It has a number 
>> of weaknesses which do not install confidence in its future security 
>> meanwhile there are a number of other hashes which _do_.
>> 
>> Unless you'd rather be trying to replace hashes everywhere once it's already 
>> completely broken.
> 
> We can replace it completely in a lot less than that many years, if
> the new PEP-based tools can be brought to pass.  Using new protocols
> (e.g. the embedded signatures in wheel files) will make most of this
> moot.
> 
> What I'm against is trying to patch over the existing protocol when
> what we really want is to replace it altogether.  Adding hashes and
> filesizes and whatnot is just gilding the existing lily, or more like
> gilding the pond scum, actually.  ;-)

Unless we are planning on removing the existing tooling this still matters even 
with the new system in place.

-----------------
Donald Stufft
PGP: 0x6E3CBCE93372DCFA // 7C6B 7C5D 5E2B 6356 A926 F04F 6E3C BCE9 3372 DCFA

Attachment: signature.asc
Description: Message signed with OpenPGP using GPGMail

_______________________________________________
Catalog-SIG mailing list
Catalog-SIG@python.org
http://mail.python.org/mailman/listinfo/catalog-sig

Reply via email to