SHA1 collisions found

http://public-inbox.org/git/20170226004657.zowlojdzqrrcalsm@sigill.intra.peff.net/T/#t

My takeaway from all that – the git project is internally taking steps to mitigate vulnerabilities from this particular attack (making it harder to insert the arbitrary binary data necessary into git metadata), but a) is just throwing up their hands at the problem of projects that store binary blobs like image data in their repos, and b) is not taking this as a signal that more serious sha-1 attacks are on the horizon and they should speed up their hash-replacement efforts.

This latter leads into the problems with Linus’ positions in particular. In that thread, does not take seriously the threats that this poses to the broader git userbase, because he only seems to care about the kernel use-case: trusted hosting infrastructure at kernel.org (itself an iffy assumption, given previous hacks and the use of mirrors), and the exclusive storage of human-readable text in the repo which makes binary garbage harder to sneak in. These do not apply to most users of git. His rather extreme public position (paraphrased, “our security doesn’t depend on SHA1”) is even more troubling – it absolutely does depend on SHA1, this just isn’t (yet) a strong enough attack to absolutely screw over the kernel. A stronger collision attack (eg a chosen-prefix as opposed to identical-prefix, or godforbid a pre-image attack) would absolutely invalidate the whole git security model.

Related Posts

  • Yeeowitch!November 6, 2001 Yeeowitch! The cost of living in a high-tech world.... Last night, while cleaning up, I stepped on […]
  • September 30, 2007 S6300342 (via Photos from scottobear)
  • May 24, 2009 S6303500
  • Check In: Deathgasm (2015)December 26, 2016 Check In: Deathgasm (2015) Check In: Deathgasm (2015) http://imdb.com/rg/an_share/title/title/tt3705412/
  • April 5, 2008 S6301819

Leave a Reply