On 14.11.2016 00:06, taii...@gmx.com wrote:
> Shouldn't we be using sha256 or sha512? I am not a crypto expert but
> AFIAK couldn't sha1 collisions could be easily generated with the type
> of resources available to someone who would want to attack coreboot?

AFAIK, there is no known attack on SHA-1 yet that could break security
in this scenario (the attacker wouldn't only have to find any collision
but a collision for a given hash which takes a power of 2 in time).

Anyway, there is a patch on review, that makes use of SHA-384 and should
make the checksum generation trustworthy:
https://review.coreboot.org/#/c/15170/

> 
> 
> On 11/06/2016 07:15 PM, Iru Cai wrote:
>> buildgcc can verify the SHA1 sum of the tarballs, and the checksum is
>> cloned from the git repository via HTTPS or SSH, so I think we don't need
>> to worry.

Alas, the current checksum is only verified for already downloaded
files.

Nico


-- 
coreboot mailing list: coreboot@coreboot.org
https://www.coreboot.org/mailman/listinfo/coreboot

Reply via email to