[110316] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Security team successfully cracks SSL using 200 PS3's and MD5

daemon@ATHENA.MIT.EDU (Florian Weimer)
Fri Jan 2 17:38:18 2009

From: Florian Weimer <fw@deneb.enyo.de>
To: Joe Greco <jgreco@ns.sol.net>
Date: Fri, 02 Jan 2009 23:37:56 +0100
In-Reply-To: <200901021733.n02HXnAN047547@aurora.sol.net> (Joe Greco's message
	of "Fri, 2 Jan 2009 11:33:48 -0600 (CST)")
Cc: "nanog@nanog.org" <nanog@nanog.org>
Errors-To: nanog-bounces@nanog.org

* Joe Greco:

> It seems that part of the proposed solution is to get people to move from
> MD5-signed to SHA1-signed.  There will be a certain amount of resistance.
> What I was suggesting was the use of the revocation mechanism as part of
> the "stick" (think carrot-and-stick) in a campaign to replace MD5-based
> certs.  If there is a credible threat to MD5-signed certs, then forcing
> their retirement would seem to be a reasonable reaction, but everyone here
> knows how successful "voluntary" conversion strategies typically are.

A CA statement that they won't issue MD5-signed certificates in the
future should be sufficient.  There's no need to reissue old
certificates, unless the CA thinks other customers have attacked it.

> Either we take the potential for transparent MitM attacks seriously, or 
> we do not.  I'm sure the NSA would prefer "not."  :-)

I doubt the NSA is interested in MITM attacks which can be spotted by
comparing key material. 8-)


home help back first fref pref prev next nref lref last post