On 18/01/2017 01:12, Nick Lamb wrote:
On Tuesday, 17 January 2017 23:34:20 UTC, Jakob Bohm wrote:
How about "_and versions and strong (>= 256 bits) hashes_",
Frankly any _cryptographic_ hash should be adequate for this purpose. Even for
the most creaky crypto hashes I can think of (e.g. MD4) pre-image attacks are
theoretical rather than practical, so any colliding document must be produced
before the fact, not after. Even if a CA wants to pull the wool over our eyes
it seems far, far more likely they'll just straight up lie than concoct some
bizarre scheme with producing multiple documents that have identical hashes.
I seem to recall that early in the history of the current collision
vulnerabilities, one of the discoverers specifically published as
ready-to-use template for creating colliding PDF files.
Enjoy
Jakob
--
Jakob Bohm, CIO, Partner, WiseMo A/S. https://www.wisemo.com
Transformervej 29, 2860 Søborg, Denmark. Direct +45 31 13 16 10
This public discussion message is non-binding and may contain errors.
WiseMo - Remote Service Management for PCs, Phones and Embedded
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy