[110329] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Security team successfully cracks SSL using 200 PS3's and MD5

daemon@ATHENA.MIT.EDU (Gadi Evron)
Fri Jan 2 21:53:28 2009

Date: Fri, 2 Jan 2009 20:53:06 -0600 (CST)
From: Gadi Evron <ge@linuxbox.org>
To: Dragos Ruiu <dr@kyx.net>
In-Reply-To: <85140EB3-6CED-43ED-8340-493338E7BCCE@kyx.net>
Cc: "nanog@nanog.org" <nanog@nanog.org>
Errors-To: nanog-bounces@nanog.org

On Fri, 2 Jan 2009, Dragos Ruiu wrote:
> www.win.tue.nl/hashclash/rogue-ca/; classtype: policy-violation; 
> sid:1000001;)

You can't really use any snort rule to detect SHA-1 certs created by a 
fake authority created using the MD5 issue.

Yes, this is a serious matter, but it hardly has any operational impact to 
speak of for users and none for NSPs.

 	Gadi.


home help back first fref pref prev next nref lref last post