Re: Security team successfully cracks SSL using 200 PS3's and MD5

2009-01-05 Thread Mark Andrews
In message <4962e096.7070...@karnaugh.za.net>, Colin Alston writes: > On 2009/01/05 10:47 PM Randy Bush wrote: > > perhaps i am a bit slow. but could someone explain to me how trust in > > dns data transfers to trust in an http partner and other uses to which > > ssl is put? > > I must also be

Re: Security team successfully cracks SSL using 200 PS3's and MD5

2009-01-05 Thread Colin Alston
On 2009/01/05 10:47 PM Randy Bush wrote: perhaps i am a bit slow. but could someone explain to me how trust in dns data transfers to trust in an http partner and other uses to which ssl is put? I must also be slow. Can someone tell me how DNSSEC is supposed to encrypt my TCP/IP traffic?

Re: Security team successfully cracks SSL using 200 PS3's and MD5

2009-01-05 Thread Mark Andrews
In message <20090105201859.gc15...@ferrum.uhlenkott.net>, Jason Uhlenkott write s: > On Fri, Jan 02, 2009 at 15:33:05 -0600, Joe Greco wrote: > > This would seem to point out some critical shortcomings in the current SSL > > system; these shortcomings are not necessarily technological, but rather

Re: Security team successfully cracks SSL using 200 PS3's and MD5

2009-01-05 Thread Jason Uhlenkott
On Tue, Jan 06, 2009 at 06:09:34 +0900, Randy Bush wrote: > to use your example, the contractor who serves dns for www.bank.example > could insert a cert and then fake the web site having (a child of) that > cert. whereas, if the site had its cert a descendant of the ca for all > banks, this at

Re: Security team successfully cracks SSL using 200 PS3's and MD5

2009-01-05 Thread Michael Sinatra
On 01/05/09 12:47, Randy Bush wrote: > perhaps i am a bit slow. but could someone explain to me how trust in > dns data transfers to trust in an http partner and other uses to which > ssl is put? Because I have to trust the DNS anyway. If the DNS redirects my users to a bad site, they may not no

Re: Security team successfully cracks SSL using 200 PS3's and MD5

2009-01-05 Thread Matthew Kaufman
Randy Bush wrote: perhaps i am a bit slow. but could someone explain to me how trust in dns data transfers to trust in an http partner and other uses to which ssl is put? randy It wouldn't, which is why the original suggestion is a bad idea. They're different issues (finding the actual ad

Re: Security team successfully cracks SSL using 200 PS3's and MD5

2009-01-05 Thread Joe Greco
> On 09.01.06 05:59, Joe Abley wrote: > >> perhaps i am a bit slow. but could someone explain to me how trust in > >> dns data transfers to trust in an http partner and other uses to which > >> ssl is put? > > > > If I can get secure answers to "www.bank.example IN CERT?" and > > "www.bank.example

Re: Security team successfully cracks SSL using 200 PS3's and MD5

2009-01-05 Thread Valdis . Kletnieks
On Tue, 06 Jan 2009 06:09:34 +0900, Randy Bush said: > to use your example, the contractor who serves dns for www.bank.example > could insert a cert and then fake the web site having (a child of) that > cert. whereas, if the site had its cert a descendant of the ca for all > banks, this attack

Re: Security team successfully cracks SSL using 200 PS3's and MD5

2009-01-05 Thread Randy Bush
On 09.01.06 05:59, Joe Abley wrote: perhaps i am a bit slow. but could someone explain to me how trust in dns data transfers to trust in an http partner and other uses to which ssl is put? If I can get secure answers to "www.bank.example IN CERT?" and "www.bank.example IN A?" then perhaps when

Re: Security team successfully cracks SSL using 200 PS3's and MD5

2009-01-05 Thread Joe Abley
On 2009-01-05, at 15:47, Randy Bush wrote: perhaps i am a bit slow. but could someone explain to me how trust in dns data transfers to trust in an http partner and other uses to which ssl is put? If I can get secure answers to "www.bank.example IN CERT?" and "www.bank.example IN A?" the

Re: Security team successfully cracks SSL using 200 PS3's and MD5

2009-01-05 Thread Randy Bush
perhaps i am a bit slow. but could someone explain to me how trust in dns data transfers to trust in an http partner and other uses to which ssl is put? randy

Re: Security team successfully cracks SSL using 200 PS3's and MD5

2009-01-05 Thread Joe Abley
On 2009-01-05, at 15:18, Jason Uhlenkott wrote: If we had DNSSEC, we could do away with SSL CAs entirely. The owner of each domain or host could publish a self-signed cert in a TXT RR, ... or even in a CERT RR, as I heard various clever people talking about in some virtual hallway the othe

Re: Security team successfully cracks SSL using 200 PS3's and MD5

2009-01-05 Thread Jason Uhlenkott
On Fri, Jan 02, 2009 at 15:33:05 -0600, Joe Greco wrote: > This would seem to point out some critical shortcomings in the current SSL > system; these shortcomings are not necessarily technological, but rather > social/psychological. We need the ability for Tom, Dick, or Harry to be > able to crank

Re: Security team successfully cracks SSL using 200 PS3's and MD5

2009-01-04 Thread Valdis . Kletnieks
On Sun, 04 Jan 2009 15:58:34 CST, Joe Greco said: > > Technically the only thing necessary to prevent > > this attack has already been done, and that is to stop issuing certs > > signed with MD5 so that no one else can create a rogue CA via this > > means. > > Are we certain that existing

Re: Security team successfully cracks SSL using 200 PS3's and MD5

2009-01-04 Thread Joe Greco
> "SSL is cracked, VeriSign to blame!" was pretty much the top security > story for several days. They had to do something to turn around the > perception, despite accurate analysis and publications by > organizations such as Microsoft. Perception is reality, and > regardless of the techn

Re: Security team successfully cracks SSL using 200 PS3's and MD5

2009-01-04 Thread Brian Keefer
On Jan 4, 2009, at 12:05 PM, Joe Greco wrote: The opinions on whether or not it is necessary to replace certs seems to vary depending on whose opinion you're listening to, but a relatively safe rule of thumb for this sort of security issue is to take the path that is most likely to avoid r

Re: Security team successfully cracks SSL using 200 PS3's and MD5 flaw.

2009-01-04 Thread Kevin Oberman
> Date: Sun, 04 Jan 2009 09:22:06 +0200 > From: Hank Nussbacher > > At 06:44 PM 03-01-09 +0100, Mikael Abrahamsson wrote: > >On Sat, 3 Jan 2009, Hank Nussbacher wrote: > > > >>You mean like for BGP neighbors? Wanna suggest an alternative? :-) > > > >Well, most likely MD5 is better than the alter

Re: Security team successfully cracks SSL using 200 PS3's and MD5

2009-01-04 Thread Joe Greco
> * Brian Keefer: > > My apologies if you were commenting on some other aspect, or if my > > understand is in some way flawed. > > I don't think so. > > There's a rule of thumb which is easy to remembe: Never revoke > anything just because some weak algorithm is involved. The rationale > is that

Re: Security team successfully cracks SSL using 200 PS3's and MD5 flaw.

2009-01-04 Thread Christopher Morrow
On Sun, Jan 4, 2009 at 11:40 AM, Christopher Morrow wrote: > On Sun, Jan 4, 2009 at 9:37 AM, Marshall Eubanks > wrote: >> There is a discussion of this going on in CFRG. >> >> https://www.irtf.org/mailman/listinfo/cfrg >> > > sadly, and apropos I suppose, www.irtf.org is serving up a *.ietf.org

Re: Security team successfully cracks SSL using 200 PS3's and MD5 flaw.

2009-01-04 Thread Christopher Morrow
On Sun, Jan 4, 2009 at 9:37 AM, Marshall Eubanks wrote: > There is a discussion of this going on in CFRG. > > https://www.irtf.org/mailman/listinfo/cfrg > sadly, and apropos I suppose, www.irtf.org is serving up a *.ietf.org ssl cert :( and the archives require membership to view them. -chris

Re: Security team successfully cracks SSL using 200 PS3's and MD5 flaw.

2009-01-04 Thread Marshall Eubanks
There is a discussion of this going on in CFRG. https://www.irtf.org/mailman/listinfo/cfrg Regards Marshall On Jan 4, 2009, at 2:22 AM, Hank Nussbacher wrote: At 06:44 PM 03-01-09 +0100, Mikael Abrahamsson wrote: On Sat, 3 Jan 2009, Hank Nussbacher wrote: You mean like for BGP neighbors?

Re: Security team successfully cracks SSL using 200 PS3's and MD5 flaw.

2009-01-04 Thread Rubens Kuhl Jr.
Yeap: http://www.ietf.org/internet-drafts/draft-ietf-tcpm-tcp-auth-opt-02.txt TCPM WGJ. Touch Internet Draft USC/ISI Obsoletes: 2385 A. Mankin Inte

Re: Security team successfully cracks SSL using 200 PS3's and MD5 flaw.

2009-01-04 Thread Florian Weimer
* Hank Nussbacher: > Who is working on this? I don't find anything here: > http://www.ietf.org/html.charters/idr-charter.html I think this belongs to the tcpm WG or the btns WG.

Re: Security team successfully cracks SSL using 200 PS3's and MD5 flaw.

2009-01-03 Thread Hank Nussbacher
At 06:44 PM 03-01-09 +0100, Mikael Abrahamsson wrote: On Sat, 3 Jan 2009, Hank Nussbacher wrote: You mean like for BGP neighbors? Wanna suggest an alternative? :-) Well, most likely MD5 is better than the alterantive today which is to run no authentication/encryption at all. But we should

Re: Security team successfully cracks SSL using 200 PS3's and MD5 flaw.

2009-01-03 Thread Valdis . Kletnieks
On Sat, 03 Jan 2009 17:23:06 +0100, Florian Weimer said: > Our rationale is that in order to carry out currently known attacks on > MD5, you need to create a twin of documents, one evil and one > harmless. In Debian's case, we prepare the data we sign on our > trusted infrastructure. If someone c

Re: Security team successfully cracks SSL using 200 PS3's and MD5

2009-01-03 Thread Christopher Morrow
On Sat, Jan 3, 2009 at 1:41 PM, Nick Hilliard wrote: > Christopher Morrow wrote: >> This is a function of an upgrade (firefox3.5 coming 'soon!') for >> browsers, and for OS's as well, yes? So, given a future flag-day (18 >> months from today no more MD5, only SHA-232323 will be used!!) >> browsers

Re: Security team successfully cracks SSL using 200 PS3's and MD5 flaw.

2009-01-03 Thread Florian Weimer
> What's the cost to switching to something other than MD5 here, > though? Just the general risk of change (sometimes referred to as "bricking"). The changes on the generating side have already been implemented. Maybe we should include a dummy package entry at the beginning of the package list, w

Re: Security team successfully cracks SSL using 200 PS3's and MD5 flaw.

2009-01-03 Thread Florian Weimer
* Frank Bulk: > For me the MD5 hashes on file downloads are more valuable to ensure the > package is accurate to a byte rather than to verify its authenticity or > integrity. Indeed. I've experienced that first-hand: the hashes helped to isolate a case of faulty router memory at the ISP I used a

Re: Security team successfully cracks SSL using 200 PS3's and MD5

2009-01-03 Thread Florian Weimer
* Nick Hilliard: > I think you might be downplaying the size of the problem here. X.509 and > TLS/SSL isn't just used for browsers, but for a wide variety of places > where there is a requirement for PKI based security. So when you talk > about a flag day for dealing with SHA-X (where X != 1), h

Re: Security team successfully cracks SSL using 200 PS3's and MD5 flaw.

2009-01-03 Thread Florian Weimer
* Hank Nussbacher: > On Fri, 2 Jan 2009, Mikael Abrahamsson wrote: > >> MD5 is broken, don't use it for anything important. > > You mean like for BGP neighbors? Good point. However, as a defense against potential blind injection attacks, even an unhashed password in a TCP option would do the tri

Re: Security team successfully cracks SSL using 200 PS3's and MD5 flaw.

2009-01-03 Thread Marshall Eubanks
ian Weimer [mailto:f...@deneb.enyo.de] Sent: Saturday, January 03, 2009 10:23 AM To: Skywing Cc: NANOG Subject: Re: Security team successfully cracks SSL using 200 PS3's and MD5 flaw. Then again, I just got yet another Debian DSA mail which has plaintext download links for new binaries. T

Re: Security team successfully cracks SSL using 200 PS3's and MD5 flaw.

2009-01-03 Thread Nick Hilliard
Hank Nussbacher wrote: > You mean like for BGP neighbors? Wanna suggest an alternative? :-) tcp/md5 + gtsm (assuming directly connected peers) makes messing around with bgp sessions rather difficult. Filtering BGP packets at the edge and borders slightly more so. If you have CPU and sufficient

Re: Security team successfully cracks SSL using 200 PS3's and MD5

2009-01-03 Thread Nick Hilliard
Christopher Morrow wrote: > This is a function of an upgrade (firefox3.5 coming 'soon!') for > browsers, and for OS's as well, yes? So, given a future flag-day (18 > months from today no more MD5, only SHA-232323 will be used!!) > browsers for the majority of the market could be upgraded. Certainly

Re: Security team successfully cracks SSL using 200 PS3's and MD5

2009-01-03 Thread Steven M. Bellovin
On Sat, 3 Jan 2009 12:31:53 -0500 "Christopher Morrow" wrote: > On Sat, Jan 3, 2009 at 10:49 AM, Steven M. Bellovin > wrote: > > On Sat, 03 Jan 2009 09:35:06 -0500 > > William Warren wrote: > > > >> Everyone seems to be stampeding to SHA-1..yet it was broken in > >> 2005. So we trade MD5 for SH

RE: Security team successfully cracks SSL using 200 PS3's and MD5 flaw.

2009-01-03 Thread Skywing
er Sent: Saturday, January 03, 2009 08:23 To: Skywing Cc: Steven M. Bellovin ; NANOG Subject: Re: Security team successfully cracks SSL using 200 PS3's and MD5 flaw. > Then again, I just got yet another Debian DSA mail which has > plaintext download links for new binaries. The in

RE: Security team successfully cracks SSL using 200 PS3's and MD5 flaw.

2009-01-03 Thread Frank Bulk
urity team successfully cracks SSL using 200 PS3's and MD5 flaw. > Then again, I just got yet another Debian DSA mail which has > plaintext download links for new binaries. The integrity > verification mechanism for said binaries is, you guessed it: > PGP-signed md5sums. I c

Re: Security team successfully cracks SSL using 200 PS3's and MD5 flaw.

2009-01-03 Thread Mikael Abrahamsson
On Sat, 3 Jan 2009, Hank Nussbacher wrote: You mean like for BGP neighbors? Wanna suggest an alternative? :-) Well, most likely MD5 is better than the alterantive today which is to run no authentication/encryption at all. But we should push whoever is developing these standards to go for S

Re: Security team successfully cracks SSL using 200 PS3's and MD5

2009-01-03 Thread Christopher Morrow
On Sat, Jan 3, 2009 at 10:49 AM, Steven M. Bellovin wrote: > On Sat, 03 Jan 2009 09:35:06 -0500 > William Warren wrote: > >> Everyone seems to be stampeding to SHA-1..yet it was broken in 2005. >> So we trade MD5 for SHA-1? This makes no sense. >> > (a) SHA-1 was not broken as badly. The best

Re: Security team successfully cracks SSL using 200 PS3's and MD5 flaw.

2009-01-03 Thread Martin List-Petersen
Hank Nussbacher wrote: > On Fri, 2 Jan 2009, Mikael Abrahamsson wrote: > >> MD5 is broken, don't use it for anything important. > > You mean like for BGP neighbors? Wanna suggest an alternative? :-) > MD5 on BGP sessions has already been proven to not being that effective anyhow, for the purpo

Re: Security team successfully cracks SSL using 200 PS3's and MD5 flaw.

2009-01-03 Thread Hank Nussbacher
On Fri, 2 Jan 2009, Mikael Abrahamsson wrote: MD5 is broken, don't use it for anything important. You mean like for BGP neighbors? Wanna suggest an alternative? :-) -Hank

Re: Security team successfully cracks SSL using 200 PS3's and MD5 flaw.

2009-01-03 Thread Florian Weimer
> Then again, I just got yet another Debian DSA mail which has > plaintext download links for new binaries. The integrity > verification mechanism for said binaries is, you guessed it: > PGP-signed md5sums. I can assure you that you will continue to receive these messages for a while (unless you

Re: Security team successfully cracks SSL using 200 PS3's and MD5

2009-01-03 Thread Steven M. Bellovin
On Sat, 03 Jan 2009 09:35:06 -0500 William Warren wrote: > Everyone seems to be stampeding to SHA-1..yet it was broken in 2005. > So we trade MD5 for SHA-1? This makes no sense. > (a) SHA-1 was not broken as badly. The best attack is, as I recall, 2^63, which is computationally infeasible with

Re: Security team successfully cracks SSL using 200 PS3's and MD5

2009-01-03 Thread Florian Weimer
* Brian Keefer: > My apologies if you were commenting on some other aspect, or if my > understand is in some way flawed. I don't think so. There's a rule of thumb which is easy to remembe: Never revoke anything just because some weak algorithm is involved. The rationale is that that revocation

Re: Security team successfully cracks SSL using 200 PS3's and MD5

2009-01-03 Thread Marshall Eubanks
On Jan 3, 2009, at 9:38 AM, Dorn Hetzel wrote: Would using the combination of both MD5 and SHA-1 raise the computational bar enough for now, I have never seen this recommended (and I do try and follow this). or are there other good prospects for a harder to crack hash? The Federal Infor

Re: Security team successfully cracks SSL using 200 PS3's and MD5

2009-01-03 Thread Dorn Hetzel
Would using the combination of both MD5 and SHA-1 raise the computational bar enough for now, or are there other good prospects for a harder to crack hash? On Sat, Jan 3, 2009 at 9:35 AM, William Warren < hescomins...@emmanuelcomputerconsulting.com> wrote: > Dragos Ruiu wrote: > >> >> On 2-Jan-09

Re: Security team successfully cracks SSL using 200 PS3's and MD5

2009-01-03 Thread William Warren
Dragos Ruiu wrote: On 2-Jan-09, at 9:56 AM, Robert Mathews (OSIA) wrote: Joe Greco wrote: [ ] Either we take the potential for transparent MitM attacks seriously, or we do not. I'm sure the NSA would prefer "not." :-) As for the points raised in your message, yes, there are addition

Re: Security team successfully cracks SSL using 200 PS3's and MD5

2009-01-03 Thread Florian Weimer
* Joe Greco: >> A CA statement that they won't issue MD5-signed certificates in the >> future should be sufficient. There's no need to reissue old >> certificates, unless the CA thinks other customers have attacked it. > > That would seem to be at odds with what the people who documented this >

Re: Security team successfully cracks SSL using 200 PS3's and MD5

2009-01-02 Thread Brian Keefer
On Jan 2, 2009, at 3:29 PM, Joe Greco wrote: * Joe Greco: It seems that part of the proposed solution is to get people to move from MD5-signed to SHA1-signed. There will be a certain amount of resistance. What I was suggesting was the use of the revocation mechanism as part of the "stick

Re: Security team successfully cracks SSL using 200 PS3's and MD5

2009-01-02 Thread Christopher Morrow
On Fri, Jan 2, 2009 at 10:44 PM, Dragos Ruiu wrote: > > On 2-Jan-09, at 6:53 PM, Gadi Evron wrote: >> >> Yes, this is a serious matter, but it hardly has any operational impact to >> speak of for users and none for NSPs. > > Dunno. Last I checked NSPs had web servers too. :-P so, aside from 'get

Re: Security team successfully cracks SSL using 200 PS3's and MD5

2009-01-02 Thread Dragos Ruiu
On 2-Jan-09, at 6:53 PM, Gadi Evron wrote: Yes, this is a serious matter, but it hardly has any operational impact to speak of for users and none for NSPs. Dunno. Last I checked NSPs had web servers too. :-P cheers, --dr -- World Security Pros. Cutting Edge Training, Tools, and Techniques

Re: Security team successfully cracks SSL using 200 PS3's and MD5

2009-01-02 Thread Joe Greco
> Neil wrote: > > >>Do people here really so quickly forget things? There was a talk on > >>Carnivore given in 2000 at NANOG 20, IIRC, and I believe that one of the > >>instigating causes of that talk was problems that Earthlink had experienced > >>when the FBI had deployed Carnivore there. > >

Re: Security team successfully cracks SSL using 200 PS3's and MD5

2009-01-02 Thread Gadi Evron
On Fri, 2 Jan 2009, Dragos Ruiu wrote: www.win.tue.nl/hashclash/rogue-ca/; classtype: policy-violation; sid:101;) You can't really use any snort rule to detect SHA-1 certs created by a fake authority created using the MD5 issue. Yes, this is a serious matter, but it hardly has any operat

Re: Security team successfully cracks SSL using 200 PS3's and MD5

2009-01-02 Thread Dragos Ruiu
On 2-Jan-09, at 9:56 AM, Robert Mathews (OSIA) wrote: Joe Greco wrote: [ ] Either we take the potential for transparent MitM attacks seriously, or we do not. I'm sure the NSA would prefer "not." :-) As for the points raised in your message, yes, there are additional problems with

Re: Security team successfully cracks SSL using 200 PS3's and MD5

2009-01-02 Thread Etaoin Shrdlu
Neil wrote: Do people here really so quickly forget things? There was a talk on Carnivore given in 2000 at NANOG 20, IIRC, and I believe that one of the instigating causes of that talk was problems that Earthlink had experienced when the FBI had deployed Carnivore there. Naturally. The NSA

Re: Security team successfully cracks SSL using 200 PS3's and MD5

2009-01-02 Thread Neil
On Fri, Jan 2, 2009 at 3:29 PM, Joe Greco wrote: >> * Joe Greco: [snip >> > Either we take the potential for transparent MitM attacks seriously, or >> > we do not. I'm sure the NSA would prefer "not." :-) >> >> I doubt the NSA is interested in MITM attacks which can be spotted by >> comparing ke

Re: Security team successfully cracks SSL using 200 PS3's and MD5

2009-01-02 Thread Joe Greco
> * Joe Greco: > > It seems that part of the proposed solution is to get people to move from > > MD5-signed to SHA1-signed. There will be a certain amount of resistance. > > What I was suggesting was the use of the revocation mechanism as part of > > the "stick" (think carrot-and-stick) in a campa

RE: Security team successfully cracks SSL using 200 PS3's and MD5 flaw.

2009-01-02 Thread Deepak Jain
> If you use bad crypto, you lose no matter what. If you use good > crypto, 2,000,000,000 PS3s won't do the job. > Even if you use good crypto, and someone steals your key (say, a previously in-access person) you need a way to reliably, completely, revoke it. This has been a problem with SSL

RE: Security team successfully cracks SSL using 200 PS3's and MD5 flaw.

2009-01-02 Thread Skywing
it: PGP-signed md5sums. We still have a long way to go. :) – S -Original Message- From: Steven M. Bellovin Sent: Friday, January 02, 2009 15:07 To: Skywing Cc: Deepak Jain ; NANOG Subject: Re: Security team successfully cracks SSL using 200 PS3's and MD5 flaw. On Fri, 2 Jan 20

Re: Security team successfully cracks SSL using 200 PS3's and MD5 flaw.

2009-01-02 Thread Steven M. Bellovin
On Fri, 2 Jan 2009 16:51:53 -0600 Skywing wrote: > Of course, md5 *used* to be good crypto. > See http://www.cs.columbia.edu/~smb/blog/2008-12/2008-12-30.html for the links, but MD5 has been suspect for a very long time. Dobbertin found problems with it in 1996. The need for caution with it wa

RE: Security team successfully cracks SSL using 200 PS3's and MD5 flaw.

2009-01-02 Thread Skywing
Of course, md5 *used* to be good crypto. – S -Original Message- From: Steven M. Bellovin Sent: Friday, January 02, 2009 14:46 To: Deepak Jain Cc: NANOG Subject: Re: Security team successfully cracks SSL using 200 PS3's and MD5 flaw. On Fri, 2 Jan 2009 16:13:45 -0500 D

Re: Security team successfully cracks SSL using 200 PS3's and MD5 flaw.

2009-01-02 Thread Steven M. Bellovin
On Fri, 2 Jan 2009 16:13:45 -0500 Deepak Jain wrote: > > If done properly, that's actually an easier task: you build the > > update key into the browser. When it pulls in an update, it > > verifies that it was signed with the proper key. > > > > If you build it into the browser, how do you rev

Re: Security team successfully cracks SSL using 200 PS3's and MD5

2009-01-02 Thread Florian Weimer
* Joe Greco: > It seems that part of the proposed solution is to get people to move from > MD5-signed to SHA1-signed. There will be a certain amount of resistance. > What I was suggesting was the use of the revocation mechanism as part of > the "stick" (think carrot-and-stick) in a campaign to re

RE: Security team successfully cracks SSL using 200 PS3's and MD5

2009-01-02 Thread Stasiniewicz, Adam
a] Sent: Friday, January 02, 2009 11:40 AM To: Joe Greco Cc: nanog@nanog.org Subject: Re: Security team successfully cracks SSL using 200 PS3's and MD5 On 2 Jan 2009, at 12:33, Joe Greco wrote: > We cannot continue to justify security failure on the basis that a > significant

Re: Security team successfully cracks SSL using 200 PS3's and MD5

2009-01-02 Thread Joe Greco
> On 2 Jan 2009, at 12:33, Joe Greco wrote: > > > We cannot continue to justify security failure on the basis that a > > significant percentage of the clients don't support it, or are > > broken in > > their support. That's an argument for fixing the clients. > > At a more basic level, though,

RE: Security team successfully cracks SSL using 200 PS3's and MD5 flaw.

2009-01-02 Thread Skywing
anuary 02, 2009 4:14 PM To: Steven M. Bellovin Cc: NANOG Subject: RE: Security team successfully cracks SSL using 200 PS3's and MD5 flaw. > If done properly, that's actually an easier task: you build the update > key into the browser. When it pulls in an update, it verifies that

RE: Security team successfully cracks SSL using 200 PS3's and MD5 flaw.

2009-01-02 Thread Deepak Jain
> ssl itself wasn't cracked they simply exploited the known vulnerable > md5 > hashing. Another hashing method needs to be used. The encryption algorithm wasn't hacked. Correct. Another hashing method may help. Yup. My problem is with the chain-of-trust and a lack of reasonable or reasonably

RE: Security team successfully cracks SSL using 200 PS3's and MD5 flaw.

2009-01-02 Thread Deepak Jain
> If done properly, that's actually an easier task: you build the update > key into the browser. When it pulls in an update, it verifies that it > was signed with the proper key. > If you build it into the browser, how do you revoke it when someone throws 2000 PS3s to crack it, or your hash, or

Re: Security team successfully cracks SSL using 200 PS3's and MD5 flaw.

2009-01-02 Thread William Warren
Rodrick Brown wrote: A team of security researchers and academics has broken a core piece of Internet technology. They made their work public at the 25th Chaos Communication Congress in Berlin today. The team was able to create a rogue certificate authority and use it to issue valid SSL certifica

Re: Security team successfully cracks SSL using 200 PS3's and MD5 flaw.

2009-01-02 Thread Steven M. Bellovin
On Fri, 2 Jan 2009 15:49:24 -0500 Deepak Jain wrote: > > Of course, this will just make the browsers pop up dialog boxes > > which everyone will click OK on... > > > > And brings us to an even more interesting question, since everything > is trusting their in-browser root CAs and such. How trus

RE: Security team successfully cracks SSL using 200 PS3's and MD5 flaw.

2009-01-02 Thread Deepak Jain
> Of course, this will just make the browsers pop up dialog boxes which > everyone will click OK on... > And brings us to an even more interesting question, since everything is trusting their in-browser root CAs and such. How trustable is the auto-update process? If one does provoke a mass-revo

Re: Security team successfully cracks SSL using 200 PS3's and MD5 flaw.

2009-01-02 Thread Jasper Bryant-Greene
On 3/01/2009, at 6:06 AM, Steven M. Bellovin wrote: On Fri, 2 Jan 2009 17:53:55 +0100 "Terje Bless" wrote: On Fri, Jan 2, 2009 at 5:44 PM, wrote: Hmm... so basically all deployed FireFox and IE either don't even try to do a CRL, or they ask the dodgy certificate "Who can I ask if you're do

Re: Security team successfully cracks SSL using 200 PS3's and MD5

2009-01-02 Thread Robert Mathews (OSIA)
Joe Greco wrote: > [ ] > > Either we take the potential for transparent MitM attacks seriously, or > we do not. I'm sure the NSA would prefer "not." :-) > > As for the points raised in your message, yes, there are additional > problems with clients that have not taken this seriously. It

Re: Security team successfully cracks SSL using 200 PS3's and MD5

2009-01-02 Thread Joe Abley
On 2 Jan 2009, at 12:33, Joe Greco wrote: We cannot continue to justify security failure on the basis that a significant percentage of the clients don't support it, or are broken in their support. That's an argument for fixing the clients. At a more basic level, though, isn't failure guar

Re: Security team successfully cracks SSL using 200 PS3's and MD5

2009-01-02 Thread Joe Greco
> On Fri, 02 Jan 2009 09:58:05 CST, Joe Greco said: > > Anyways, I was under the impression that the whole purpose of the > > revocation capabilities of SSL was to deal with problems like this, and > > that a large part of the justification of the cost of an SSL certificate > > was the administrati

Re: Security team successfully cracks SSL using 200 PS3's and MD5 flaw.

2009-01-02 Thread Steven M. Bellovin
On Fri, 2 Jan 2009 17:53:55 +0100 "Terje Bless" wrote: > On Fri, Jan 2, 2009 at 5:44 PM, wrote: > > Hmm... so basically all deployed FireFox and IE either don't even > > try to do a CRL, or they ask the dodgy certificate "Who can I ask > > if you're dodgy?" > > Hmm. Don't the shipped-with-the-

Re: Security team successfully cracks SSL using 200 PS3's and MD5 flaw.

2009-01-02 Thread Terje Bless
On Fri, Jan 2, 2009 at 5:44 PM, wrote: > Hmm... so basically all deployed FireFox and IE either don't even try to do > a CRL, or they ask the dodgy certificate "Who can I ask if you're dodgy?" Hmm. Don't the shipped-with-the-browser trusted root certificates include a CRL URL?

Re: Security team successfully cracks SSL using 200 PS3's and MD5 flaw.

2009-01-02 Thread Valdis . Kletnieks
On Fri, 02 Jan 2009 09:58:05 CST, Joe Greco said: > Anyways, I was under the impression that the whole purpose of the > revocation capabilities of SSL was to deal with problems like this, and > that a large part of the justification of the cost of an SSL certificate > was the administrative burden

Re: Security team successfully cracks SSL using 200 PS3's and MD5 flaw.

2009-01-02 Thread Mikael Abrahamsson
On Fri, 2 Jan 2009, Joe Greco wrote: Anyways, I was under the impression that the whole purpose of the revocation capabilities of SSL was to deal with problems like this, and How to revoke the CA is actually in the file. The fake CA they created didn't have any revokation. MD5 is broken, do

Re: Security team successfully cracks SSL using 200 PS3's and MD5 flaw.

2009-01-02 Thread Gadi Evron
On Fri, 2 Jan 2009, Joe Abley wrote: On 2009-01-02, at 09:04, Rodrick Brown wrote: A team of security researchers and academics has broken a core piece of Internet technology. They made their work public at the 25th Chaos Communication Congress in Berlin today. The team was able to create a ro

Re: Security team successfully cracks SSL using 200 PS3's and MD5 flaw.

2009-01-02 Thread Martin List-Petersen
Joe Abley wrote: > > On 2009-01-02, at 09:04, Rodrick Brown wrote: > >> A team of security researchers and academics has broken a core piece >> of Internet technology. They made their work public at the 25th Chaos >> Communication Congress in Berlin today. The team was able to create a >> rogue c

Re: Security team successfully cracks SSL using 200 PS3's and MD5 flaw.

2009-01-02 Thread Joe Abley
On 2009-01-02, at 09:04, Rodrick Brown wrote: A team of security researchers and academics has broken a core piece of Internet technology. They made their work public at the 25th Chaos Communication Congress in Berlin today. The team was able to create a rogue certificate authority and use it t

Re: Security team successfully cracks SSL using 200 PS3's and MD5 flaw.

2009-01-02 Thread Joe Greco
> A team of security researchers and academics has broken a core piece > of Internet technology. They made their work public at the 25th Chaos > Communication Congress in Berlin today. The team was able to create a > rogue certificate authority and use it to issue valid SSL certificates > for any s