Security team successfully cracks SSL using 200 PS3's and MD5
William Warren
hescominsoon at emmanuelcomputerconsulting.com
Sat Jan 3 14:35:06 UTC 2009
Dragos Ruiu wrote:
>
> On 2-Jan-09, at 9:56 AM, Robert Mathews (OSIA) wrote:
>
>> Joe Greco wrote:
>>> [ .... ]
>>>
>>> Either we take the potential for transparent MitM attacks seriously, or
>>> we do not. I'm sure the NSA would prefer "not." :-)
>>>
>>> As for the points raised in your message, yes, there are additional
>>> problems with clients that have not taken this seriously. It is,
>>> however,
>>> one thing to have locks on your door that you do not lock, and another
>>> thing entirely not to have locks (and therefore completely lack the
>>> ability to lock). I hope that there is some serious thought going
>>> on in
>>> the browser groups about this sort of issue.
>>>
>>> [ ... ]
>>>
>>> ... JG
>>
>> F Y I, see:
>>
>> SSL Blacklist 4.0 - for a Firefox extension able to detect 'bad'
>> certificates @
>> http://www.codefromthe70s.org/sslblacklist.aspx
>>
>> Best.
>
> Snort rule to detect said...
>
> url: http://vrt-sourcefire.blogspot.com/2009/01/md5-actually-harmful.html
>
> alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"POLICY Weak
> SSL OSCP response -- MD5 usage"; content:"content-type:
> application/ocsp-response"; content:"2A 86 48 86 F7 0D 01 01 05";
> metadata: policy security-ips drop, service http; reference: url,
> www.win.tue.nl/hashclash/rogue-ca/; classtype: policy-violation;
> sid:1000001;)
>
> cheers,
> --dr
>
> --
> World Security Pros. Cutting Edge Training, Tools, and Techniques
> Vancouver, Canada March 16-20 2009 http://cansecwest.com
> London, U.K. May 27/28 2009 http://eusecwest.com
> pgpkey http://dragos.com/ kyxpgp
>
>
>
Everyone seems to be stampeding to SHA-1..yet it was broken in 2005. So
we trade MD5 for SHA-1? This makes no sense.
More information about the NANOG
mailing list