Joe Gordon asked:
________________________________

> Can SHA-1 collisions be generated?  If so can you point me to the article?

Check Wikipedia on cryptographic hashing and especially "preimage attack"

To summarize, SHA-256 is effectively immune from a pre image attack. Even MD5 
is effectiely immune from
co-incidental collisions until you have something on the order of 2**80 
fingerprinted items. Amazon S3 has a
mere 2**40.

> Also why compare hashes in the first place?  Linux 'Kenel Samepage Merging', 
> which does page deduplication for KVM, does a full
> compare to be safe [1].  Even if collisions can't be generated, what are the 
> odds of a collision (for SHA-1 and SHA-256) happening by
> chance when using Swift at scale?

The point of distributed reduplication is to avoid transfer of the data in the 
first place. If you did a safety check using a full compare
then you would have had to do the transfer first. A kernel looking for 
identical pages does not have that issue.

As for the chance of an accidental collision, you have to stop and think about 
how large a number 2**128 is (that's the
threshold for risking a birthday collision on a 256 bit key). Having multiple 
undetected network transmission errors back
to back is more likely.

Also I would recommend that SHA-256 be the *minimum* algorithm. Truly paranoid 
customers could select SHA-512.

ZFS has had SHA-256 for the purpose of detecting bit rot as the default for 
some time. It was a bit ambitious when ZFS
was designed, but with today's processors the computational overhead is 
neglible.






_______________________________________________
Mailing list: https://launchpad.net/~openstack
Post to     : openstack@lists.launchpad.net
Unsubscribe : https://launchpad.net/~openstack
More help   : https://help.launchpad.net/ListHelp

Reply via email to