Re: MD5 considered harmful today

2008-12-30 Thread Eric Rescorla
At Tue, 30 Dec 2008 11:51:06 -0800 (PST), "Hal Finney" wrote: > Therefore the highest priority should be for the six bad CAs to change > their procedures, at least start using random serial numbers and move > rapidly to SHA1. As long as this happens before Eurocrypt or whenever > the results end up

Re: MD5 considered harmful today

2008-12-30 Thread "Hal Finney"
Re: http://www.win.tue.nl/hashclash/rogue-ca/ Key facts: - 6 CAs were found still using MD5 in 2008: RapidSSL, FreeSSL, TC TrustCenter AG, RSA Data Security, Thawte, verisign.co.jp. "Out of the 30,000 certificates we collected, about 9,000 were signed using MD5, and 97% of those were is

Re: very high speed hardware RNG

2008-12-30 Thread Jon Callas
On Dec 30, 2008, at 2:11 PM, Jerry Leichter wrote: On Dec 30, 2008, at 4:40 PM, Jon Callas wrote: We don't have a formal definition of what we mean by random. My definition is that it needs to be unguessable. If I have a random number and the work factor for you to guess it is more or less

Re: very high speed hardware RNG

2008-12-30 Thread Jerry Leichter
On Dec 30, 2008, at 4:40 PM, Jon Callas wrote: We don't have a formal definition of what we mean by random. My definition is that it needs to be unguessable. If I have a random number and the work factor for you to guess it is more or less its randomness. It's a Shannonesque way of looking t

Re: very high speed hardware RNG

2008-12-30 Thread Jon Callas
The thing that bothers me about this description is the too-easy jump between "chaotic" and "random". They're different concepts, and chaotic doesn't imply random in a cryptographic sense: It may be possible to induce bias or even some degree of predictability in a chaotic system by man

Re: Security by asking the drunk whether he's drunk

2008-12-30 Thread Sidney Markowitz
Sidney Markowitz wrote, On 31/12/08 10:08 AM: > or that CA root certs that use MD5 for their hash are > still in use and have now been cracked? I should remember -- morning coffee first, then post. The CA root certs themselves have not been cracked -- It is the digital signatures created by some

Steve Bellovin on the MD5 Collision attacks, more on Wired

2008-12-30 Thread David G. Koontz
http://www.cs.columbia.edu/~smb/blog//2008-12/2008-12-30.html Steve mentions the social pressures involved in disclosing the vulnerability: Verisign, in particular, appears to have been caught short. One of the CAs they operate still uses MD5. They said: The RapidSSL certificates are current

Researchers Use PlayStation Cluster to Forge a Web Skeleton Key

2008-12-30 Thread David G. Koontz
http://blog.wired.com/27bstroke6/2008/12/berlin.html More coverage on the MD5 collisions. - The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majord...@metzdowd.com

Researchers Show How to Forge Site Certificates |

2008-12-30 Thread David G. Koontz
http://www.freedom-to-tinker.com/blog/felten/researchers-show-how-forge-site-certificates By Ed Felten - Posted on December 30th, 2008 at 11:18 am Today at the Chaos Computing Congress, a group of researchers (Alex Sotirov, Marc Stevens, Jake Appelbaum, Arjen Lenstra, Benne de Weger, and David M

Re: very high speed hardware RNG

2008-12-30 Thread Jack Lloyd
On Tue, Dec 30, 2008 at 11:45:27AM -0500, Steven M. Bellovin wrote: > Of course, every time a manufacturer has tried it, assorted people > (including many on this list) complain that it's been sabotaged by the > NSA or by alien space bats or some such. Well, maybe it has. Or maybe it was just not

MD5 considered harmful today

2008-12-30 Thread Jacob Appelbaum
Hello, I wanted to chime in more during the previous x509 discussions but I was delayed by some research. I thought that I'd like to chime in that this new research about attacking x509 is now released. We gave a talk about it at the 25c3 about an hour or two ago. MD5 considered harmful today: C

Re: very high speed hardware RNG

2008-12-30 Thread Steven M. Bellovin
On Sun, 28 Dec 2008 23:49:06 -0500 Jack Lloyd wrote: > On Sun, Dec 28, 2008 at 08:12:09PM -0500, Perry E. Metzger wrote: > > > > Semiconductor laser based RNG with rates in the gigabits per second. > > > > http://www.physorg.com/news148660964.html > > > > My take: neat, but not as important as

Fw: [saag] Further MD5 breaks: Creating a rogue CA certificate

2008-12-30 Thread Steven M. Bellovin
Begin forwarded message: Date: Tue, 30 Dec 2008 11:05:28 -0500 From: Russ Housley To: ietf-p...@imc.org, ietf-sm...@imc.org, s...@ietf.org, c...@irtf.org Subject: [saag] Further MD5 breaks: Creating a rogue CA certificate http://www.win.tue.nl/hashclash/rogue-ca/ MD5 considered harmful today

Short announcement: MD5 considered harmful today - Creating a rogue CA certificate

2008-12-30 Thread Weger, B.M.M. de
Hi all, Today, 30 December 2008, at the 25th Annual Chaos Communication Congress in Berlin, we announced that we are currently in possession of a rogue Certification Authority certificate. This certificate will be accepted as valid and trusted by all common browsers, because it appears to be si

FBI "code"-cracking contest

2008-12-30 Thread Steven M. Bellovin
http://www.networkworld.com/community/node/36704 --Steve Bellovin, http://www.cs.columbia.edu/~smb - The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majord...@metzdowd.com

Re: Security by asking the drunk whether he's drunk

2008-12-30 Thread Ben Laurie
On Tue, Dec 30, 2008 at 4:25 AM, Peter Gutmann wrote: > Ben Laurie writes: > >>what happens when the cert rolls? If the key also changes (which would seem >>to me to be good practice), then the site looks suspect for a while. > > I'm not aware of any absolute figures for this but there's a lot of

Re: Security by asking the drunk whether he's drunk

2008-12-30 Thread Peter Gutmann
Ben Laurie writes: >what happens when the cert rolls? If the key also changes (which would seem >to me to be good practice), then the site looks suspect for a while. I'm not aware of any absolute figures for this but there's a lot of anecdotal evidence that many cert renewals just re-certify the

Re: Security by asking the drunk whether he's drunk

2008-12-30 Thread Ben Laurie
On Mon, Dec 29, 2008 at 10:10 AM, Peter Gutmann wrote: > David Molnar writes: > >>Service from a group at CMU that uses semi-trusted "notary" servers to >>periodically probe a web site to see which public key it uses. The notaries >>provide the list of keys used to you, so you can attempt to dete

Re: Security by asking the drunk whether he's drunk

2008-12-30 Thread Peter Gutmann
David Molnar writes: >Service from a group at CMU that uses semi-trusted "notary" servers to >periodically probe a web site to see which public key it uses. The notaries >provide the list of keys used to you, so you can attempt to detect things >like a site that has a different key for you than p

Re: very high speed hardware RNG

2008-12-30 Thread Jack Lloyd
On Sun, Dec 28, 2008 at 08:12:09PM -0500, Perry E. Metzger wrote: > > Semiconductor laser based RNG with rates in the gigabits per second. > > http://www.physorg.com/news148660964.html > > My take: neat, but not as important as simply including a decent > hardware RNG (even a slow one) in all PC

Re: very high speed hardware RNG

2008-12-30 Thread Jerry Leichter
On Dec 28, 2008, at 8:12 PM, Perry E. Metzger wrote: Semiconductor laser based RNG with rates in the gigabits per second. http://www.physorg.com/news148660964.html My take: neat, but not as important as simply including a decent hardware RNG (even a slow one) in all PC chipsets would be. Tru