Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Re:The sky is not falling. (Score 1) 300

There are lots of differences. The important one is the impact for dealing with the problem. If the signature for any cert in the world signed by MD5 could be stolen, then you couldn't trust anything with an MD5 signture and we'd therefore have to treat every web site serving up an MD5 cert as bad, which would cost lots of people time and money. With this attack, there's a very good chance that no bad guy will ever use the attack in real life, and even if they do, it is not too hard to identify and blacklist the few rogue CAs that will exist, which will automatically invalidate any fake certificates. Most web site certs out there today that were signed by MD5 are perfectly fine (probably through their entire validity period), and there is no need to incur the cost to have people replace them.

Comment Re:The sky is not falling. (Score 1) 300

Actually, they should do both. Whether true or not, I have visions of the CA being written by one guy n years ago, and it's been on autopilot ever since. I can imagine that he's got a hardcoded 16 byte value somewhere, and it's easier for him to randomize a sequence number than to make sure he got hardcoded values right across his code base. If it were me, I'd have abandoned MD5 in 2004, when most other people did. But, with a large random value, it is a "good enough" solution until MD5 is fully broken. I'm not sure which will happen first, a full break on MD5, or the same kind of collision attack on SHA1 that the researchers used here. I actually suspect the answer is that SHA1 is more vulnerable to this kind of attack than MD5 is to a full break. SHA1 has the same structural weaknesses. The only thing saving it is the bit length. As the complexity of this attack on MD5 comes down from brute force (O(2^64)) we can expect it's coming down on SHA1 as well. Maybe this same kind of attack is feasible given a year of time on a much bigger cluster, or something like that. Yes, people here are going to misread this to think I mean MD5 is stronger than SHA1 (which it certainly isn't), but that's slashdot for you.

Comment Re:The sky is not falling. (Score 1) 300

That's an entirely different thing. If you look at my article, I do explain this. But you can easily revoke them all by revoking the rogue CA's credentials. And, once the hole is plugged at the few CAs signing w/ MD5, that is all you have to do (tho it is best done in the browser, not through CRLs or OCSP). The Internet is not going to die. This is not a big deal.

Comment Re:The sky is not falling. (Score 1) 300

I was talking about finding a new cert where the signature matches any arbitrary web site cert. That is, you can't take Citibank's cert and produce a new cert that says citibank that also has the same signature. I was mentioning this because most people seem to think that this is what the attack involves. The actual attack involves getting your own rogue CA by tricking an existing CA that signs using MD5 to sign a carefully crafted certificate. The actual attack does indeed work. It's been assumed this was approaching possible for a while, which is why most CAs long since moved to abandon MD5.

Comment Re:The sky is not falling. (Score 1) 300

No, you misunderstand their attack. A CA definitely needs to be involved. You trick them into signing a web site cert, but then that signature can be pasted on to your other cert, which is a CA cert. You thus mint your OWN CA cert that a Thawte or whoever has accidentally endorsed, due to the collision you have generated. Note that this dependency on an existing valid CA is why there is a long section about how to anticipate the CA's serial numbers and validity periods.

Comment Re:The sky is not falling. (Score 1) 300

You're wrong. Read the attack author's write-up here: http://www.win.tue.nl/hashclash/rogue-ca/ You will see that they absolutely need to get the CA to endorse the data they produce. They come up with two certificates in advance that, under the right conditions, will both validate when one of them is signed via MD5. That means, you cannot take an arbitrary cert on the internet and feasibly come up with an identical cert that is malicious, where the same signature applies.

Comment Re:The sky is not falling. (Score 1) 300

Read the article carefully. Just because something is signed by MD5 doesn't make it broken. Signing future things with MD5 without proper randomization is bad, but I don't expect anyone other than the third tier CAs to do that kind of thing after this. I will also say that the attack will leave a pretty distinctive signature in CA logs. Plus, nobody would say "revoke Thawte's cert retroactively", but it should probably not be used anymore, and no CA certs issued with it should be accepted anymore. In fact, those issued over the last year, Thawte should publish which ones it issued separately. If browsers respected that list (a one-time thing), it would close the remaining hole (for Thawte... each CA affected would need to do the same thing).
Games

Activision Blizzard Announces Guitar Hero 5, New Call of Duty 85

MTV's Multiplayer Blog reports on recent announcements from Activision Blizzard which confirm that sequels to several popular franchises are on the way. The games include a new Guitar Hero, Call of Duty: Modern Warfare 2, and a new Tony Hawk, which will use some kind of non-standard controller. "At the meeting, Activision Blizzard showcased new games that would make sense for in-game ads, including the vaguely titled "Guitar Hero 5," which included a screen shot of gameplay with a Burger King ad to the right of the note highway."
It's funny.  Laugh.

Unix Dict/grep Solves Left-Side-of-Keyboard Puzzle 423

destinyland writes "For decades, people have been asking this brain teaser: 'What's the longest word you can type with only the left-hand letters on a keyboard?' The answer is supposed to be 'stewardesses,' but grepping the standard dictionary that ships with Unix reveals a much better answer. There's nearly 2,000 shorter words that can typed with only the left hand — including one word that's even longer. (The article also quotes a failed novel attempt using nothing but words typed on the keyboard's left side.)"
Image

"Stayin Alive" Helps You Stay Alive 31

In a small study conducted at the University of Illinois medical school, doctors and students maintained close to the ideal number of chest compressions doing CPR while listening to the Bee Gees hit, "Stayin' Alive." At 103 beats per minute, the old disco song has almost the perfect rhythm to help keep accurate time while doing chest compressions. The study showed the song helped people who already know how to do CPR, and the results were promising enough to warrant larger, more definitive studies with real patients or untrained people. I wonder what intrinsic power is contained in "How Can You Mend A Broken Heart?"
Security

FBI Says Dark Market Sting Netted 56 Arrests 130

narramissic writes "A two-year undercover FBI sting operation targeting online 'carder' forums hosted on the DarkMarket.ws Web site has netted 56 arrests and prevented about $70 million in fraud losses, the FBI said Thursday. DarkMarket.ws was widely used by online scammers to buy and sell stolen credit card numbers, other financial information, and even the devices used to make fake banking cards. Before it was shut down earlier this month, the Web site had registered more than 2,500 members. Although Dark Market was thought to have been administered by a criminal going by the name Master Splyntr, German Public Radio reported on Monday that the FBI had been running a sting operation on the site since late 2006, and that Master Splyntr was actually an FBI agent named J. Keith Mularski." Of course, they say it in German; non-German speakers may want to consult the Babelfish.
Communications

Cisco Demos Public Rooms For Telepresence 65

CWmike writes "Matt Hamblen reports that Cisco Systems Inc. has announced the first telepresence videoconferencing rooms available for public use. It demonstrated the technology simultaneously in four locations in India, the US and the UK Three of the four demonstration sites were retrofitted rooms in Taj Hotels in London, Bangalore, India and Boston. The luxury hotel chain will build the videoconferencing rooms for business and guest use at rates starting at $400 an hour in the Boston location. Cisco said prices will vary from $299 to $899 an hour at various locations globally, depending on the number of users. The rooms can accommodate from one to 18 people."
Sony

Future Sony MMOs Will Be On Consoles 144

The MTV Multiplayer Blog interviewed John Smedley, President of Sony Online Entertainment, about the future of MMOs. He discusses some of SOE's current projects and comments that they'll be focusing on consoles for all of their upcoming MMOs. "I would say that we would be one of the early adopters on [bringing MMOs to consoles], and we plan on becoming one of the dominant players in the MMO space on consoles." Sony's plans may include games for their hand-held console, the PSP. Smedley goes on to talk about bringing existing, popular franchises into MMO development, and remarks, "It's pretty safe to say that 'EverQuest' has not seen its last game."

Slashdot Top Deals

"No matter where you go, there you are..." -- Buckaroo Banzai

Working...