Hi all,

While the attack sequence presented is valid, in practice, given that
there are a lot of "Debian based" distributions out there, wouldn't this
be caught somewhere down the line?

Having said that, I fully agree that MD5 should no longer be recommended.

On 01/24/2011 09:42 AM, René Mayrhofer wrote:
> Am Sonntag, 23. Januar 2011, um 20:52:44 schrieb AK:
>> Regarding the MD5 sum example and certain released PoCs: producing two
>> "random" files with identical MD5 sums is one thing, introducing a
>> meaningful backdoor (which means deterministic change) or ten in a
>> Debian iso and generating an iso file which is similar in size to the
>> original one and has an identical MD5 sum might be a tad more
>> computationally difficult (this is my estimation), especially for
>> something as short-lived as a Linux CD image.
> With control over a single Debian package (read: when a Debian developer is 
> in on the attack), it could be easily done including plausible deniability 
> for the involved developer:
>
> 1. Place a random (but large enough) binary blob into a binary installed by a 
> package. The binary blob in the Debian package as uploaded to the archive is 
> competely harmless and may just look odd (if it was detected, that is).
>
> 2. Create a second binary blob with a collision (but with harmful content). 
> This is fairly easy to do if the two blobs are similar save for a small, 
> known-to-collide part.
>
> 3. Wait for the uploaded package to appear in an ISO and the MD5 sums to be 
> created
>
> 4. Replace the binary blob, the MD5 sum still matches.
>
> 5. Give somebody the changed ISO....
>
> So yes, MD5 should no longer be recommended.
>
> best regards,
> Rene


-- 
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4d3d5485.4050...@gmail.com

Reply via email to