[110306] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Security team successfully cracks SSL using 200 PS3's and MD5

daemon@ATHENA.MIT.EDU (William Warren)
Fri Jan 2 16:04:29 2009

Date: Fri, 02 Jan 2009 16:09:32 -0500
From: William Warren <hescominsoon@emmanuelcomputerconsulting.com>
To: "nanog@nanog.org" <nanog@nanog.org>
In-Reply-To: <bb075cdf0901020604n388729e6w9c6da4e5b54f1b2b@mail.gmail.com>
Errors-To: nanog-bounces@nanog.org

Rodrick Brown wrote:
> A team of security researchers and academics has broken a core piece
> of Internet technology. They made their work public at the 25th Chaos
> Communication Congress in Berlin today. The team was able to create a
> rogue certificate authority and use it to issue valid SSL certificates
> for any site they want. The user would have no indication that their
> HTTPS connection was being monitored/modified.
>
> http://hackaday.com/2008/12/30/25c3-hackers-completely-break-ssl-using-200-ps3s/
> http://phreedom.org/research/rogue-ca/
>
>
> --
> [ Rodrick R. Brown ]
> http://www.rodrickbrown.com http://www.linkedin.com/in/rodrickbrown
>
>
>   
ssl itself wasn't cracked they simply exploited the known vulnerable md5 
hashing.  Another hashing method needs to be used.


home help back first fref pref prev next nref lref last post