I believe that Freenet uses SHA-256 which hasn't been broken (yet). --- Michael Rogers <m.rogers at cs.ucl.ac.uk> wrote:
> -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > freenetwork at web.de wrote: > > Hash function SHA-1 in distress > > As worrying as this is, I don't think it affects > Freenet yet. The attack > undermines the collision-resistance of the hash > function, but as far as > I know Freenet only makes use of > second-preimage-resistance. > > Collision-resistance means it's hard to find two > messages x and y such > that h(x) == h(y), whereas > second-preimage-resistance means that given a > message x or a hash h(x), it's hard to find a second > message y such that > h(x) == h(y). The difference is that in the first > case the attacker can > manipulate both messages until the hashes match, > which is how this > attack seems to work, whereas in the second case the > attacker can only > manipulate one of the messages. > > If collision-resistance is broken, an attacker can: > > * Generate two different CHK blocks with the same > key > * Generate two different SSK keypairs with the same > hash > * Generate two different KSK names with the same > keypair > > As far as I can tell, none of these attacks would > allow the attacker to > delete or modify existing data... can anyone think > of any others? > > Cheers, > Michael > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v1.4.5 (GNU/Linux) > > iD8DBQFE8YbDyua14OQlJ3sRAjgYAKCsBVHtRyMRtlUnIw3w+Xgp1Ke0VwCgrE66 > 3iNSTHEEiG8SbpB7Mmw1i9k= > =xuRd > -----END PGP SIGNATURE----- > _______________________________________________ > Devl mailing list > Devl at freenetproject.org > http://emu.freenetproject.org/cgi-bin/mailman/listinfo/devl > __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com