delorie.com/archives/browse.cgi   search  
Mail Archives: cygwin/2015/03/09/11:34:41

X-Recipient: archive-cygwin AT delorie DOT com
DomainKey-Signature: a=rsa-sha1; c=nofws; d=sourceware.org; h=list-id
:list-unsubscribe:list-subscribe:list-archive:list-post
:list-help:sender:content-type:content-transfer-encoding
:mime-version:from:reply-to:to:subject:date:in-reply-to
:message-id; q=dns; s=default; b=MgGtsm0GzGFs7ysZ7+oI1y+aToffTHm
wPKoWkZRMshdZlKjpRnDUoNk+AHOgublkBdRRUppI+ACg3yMJLfpdjtMb5Fd7b/g
5J331EQKxi9YldNImJ8KNIsAmFbDmOwwiZGtypQVzpMGQJm5SQ+tCrdByvtIh3Dk
jlvAbW9zua0E=
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=sourceware.org; h=list-id
:list-unsubscribe:list-subscribe:list-archive:list-post
:list-help:sender:content-type:content-transfer-encoding
:mime-version:from:reply-to:to:subject:date:in-reply-to
:message-id; s=default; bh=0J8DOopeup1C5AgqasY5+znwj3k=; b=Zlmwk
dbgA0dIWHtVOwO619E1p8uyKO+jiy273i3f7Qj+ySA+ZljAXEiRI/DHpP9fAErYC
kN4axfjBPxZExDGa+PmBau8IgHVs9LskSPVcpqP1AUCClsCY3UJWFkxZPvkSYaQ8
a4fw36xyx9LJAhAZLlm9uLl7iYx8K77QSRxLqA=
Mailing-List: contact cygwin-help AT cygwin DOT com; run by ezmlm
List-Id: <cygwin.cygwin.com>
List-Subscribe: <mailto:cygwin-subscribe AT cygwin DOT com>
List-Archive: <http://sourceware.org/ml/cygwin/>
List-Post: <mailto:cygwin AT cygwin DOT com>
List-Help: <mailto:cygwin-help AT cygwin DOT com>, <http://sourceware.org/ml/#faqs>
Sender: cygwin-owner AT cygwin DOT com
Mail-Followup-To: cygwin AT cygwin DOT com
Delivered-To: mailing list cygwin AT cygwin DOT com
Authentication-Results: sourceware.org; auth=none
X-Virus-Found: No
X-Spam-SWARE-Status: No, score=-1.6 required=5.0 tests=AWL,BAYES_00,SPF_PASS,UNPARSEABLE_RELAY autolearn=ham version=3.3.2
X-HELO: aibo.runbox.com
MIME-Version: 1.0
From: "David A. Wheeler" <dwheeler AT dwheeler DOT com>
Reply-To: dwheeler AT dwheeler DOT com
To: "cygwin" <cygwin AT cygwin DOT com>, "Stromeko" <Stromeko AT nexgo DOT de>
Subject: Re: How Cygwin counters man-in-the-middle (MITM) attacks
Date: Mon, 09 Mar 2015 11:34:15 -0400 (EDT)
In-Reply-To: <874mpvqnoh.fsf@Rainer.invalid>
Message-Id: <E1YUzh9-0001y1-J6@rmm6prod02.runbox.com>
X-IsSubscribed: yes
X-MIME-Autoconverted: from quoted-printable to 8bit by delorie.com id t29FYckX013379

On Sun, 08 Mar 2015 20:44:30 +0100, Achim Gratz <Stromeko AT nexgo DOT de> wrote:
> Setup.ini also records the file size, so a successful attack would need
> to pack a malicous payload into a valid archive of the same size and the
> same MD5 checksum.  I think that is a much taller order than simply
> creating a hash collision.

That is harder, but I wouldn't trust it.

In 2004 it was shown that MD5 is not collision resistant, and the attacks just keep getting worse.  A quick check at the Wikipedia page about MD5 shows the sorry state of MD5.  The Software Engineering Institute (SEI) puts it pretty baldly: MD5 "should be considered cryptographically broken and unsuitable for further use".  You want to use known-strong crypto, not known-busted crypto.

Besides, there are easily-available, much-stronger alternatives, in particular SHA-2 (SHA-512 is part of SHA-2). It's already supported in the current Cygwin installer.

I recommend that Cygwin switch to SHA-512 soon.  It'll require that everyone update their installer to do future updates, but the installer download has been secured.  Then Cygwin can include in their FAQ a reasonable justification that its download and update process is secure.

--- David A. Wheeler

--
Problem reports:       http://cygwin.com/problems.html
FAQ:                   http://cygwin.com/faq/
Documentation:         http://cygwin.com/docs.html
Unsubscribe info:      http://cygwin.com/ml/#unsubscribe-simple


- Raw text -


  webmaster     delorie software   privacy  
  Copyright © 2019   by DJ Delorie     Updated Jul 2019