> On Feb 7, 2017, at 7:39 AM, no...@null.net wrote:
> 
> Nice to see a sha1 extension included with SQLite now.

… Just in time for SHA-1 to be declared officially broken: there’s now an 
effective mechanism to generate collisions (it only takes 100 GPU-years), and 
at least two colliding files are in the wild and have already wreaked havoc on 
SVN repositories they’ve been checked into:
        https://shattered.io
        
https://arstechnica.com/security/2017/02/watershed-sha1-collision-just-broke-the-webkit-repository-others-may-follow/

It may be too late for 3.17, but it would be a good idea to add SHA-256 and/or 
SHA-3 ASAP.
Also, there is a ‘hardened’ implementation of SHA-1, a drop-in replacement that 
detects and rejects input data that shows the hallmarks of the collision 
attack. It would be great to use this for SQLite’s SHA1 function:
        https://github.com/cr-marcstevens/sha1collisiondetection

(I don’t want to reopen the argument about whether it’s reasonable to treat any 
digest as a unique identifier! The fact is that, like it or not, cryptographic 
digests are very commonly used for this purpose, and most (but not all) 
security professionals think it’s reasonable to, as long as the algorithm is 
strong enough. SHA-1 is now definitely too weak, so it would be good for SQLite 
to offer an alternative that’s still safe(r).)

—Jens
_______________________________________________
sqlite-users mailing list
sqlite-users@mailinglists.sqlite.org
http://mailinglists.sqlite.org/cgi-bin/mailman/listinfo/sqlite-users

Reply via email to