[144770] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: SHA-1 and Git (was Re: [tahoe-dev] Tahoe-LAFS key management,

daemon@ATHENA.MIT.EDU (Jonathan Thornburg)
Tue Aug 25 12:07:59 2009

Date: Tue, 25 Aug 2009 11:32:39 -0400 (EDT)
From: Jonathan Thornburg <jthorn@astro.indiana.edu>
To: Ben Laurie <ben@links.org>
cc: "Perry E. Metzger" <perry@piermont.com>, jamesd@echeque.com,
        Cryptography List <cryptography@metzdowd.com>
In-Reply-To: <4A93CEB9.4010206@links.org>

On Tue, 25 Aug 2009, Ben Laurie wrote:
> In order to roll out a new crypto algorithm, you have to roll out new
> software. So, why is anything needed for "pluggability" beyond versioning?

If active attackers are part of the threat model, then you need to
worry about version-rollback attacks for as long as in-the-field software
still groks the old (now-insecure) versions, so "versioning" is actually
more like "Byzantine versioning".

-- 
-- Jonathan Thornburg <jthorn@astro.indiana.edu>
   Dept of Astronomy, Indiana University, Bloomington, Indiana, USA
   "Washing one's hands of the conflict between the powerful and the
    powerless means to side with the powerful, not to be neutral."
                                      -- quote by Freire / poster by Oxfam

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post