Changing Keep hash algorithm » History » Version 1
Tom Clegg, 03/08/2017 03:57 PM
1 | 1 | Tom Clegg | h1. Changing Keep hash algorithm |
---|---|---|---|
2 | |||
3 | (notes moved from #4424) |
||
4 | |||
5 | The md5 algorithm is well known to be insecure. Attackers can force hash collisions on arbitrary data, for example http://natmchugh.blogspot.com/2014/10/how-i-created-two-images-with-same-md5.html?m=1 |
||
6 | |||
7 | In the case of Keep, this exposes an obvious vulnerability. If an attacker known the hash of a block, he or she could subvert the permission system this way: |
||
8 | |||
9 | # Generate a block that collides with the desired hash |
||
10 | # Upload the collision block and receive a signed token |
||
11 | # Use the signed token to request the block |
||
12 | |||
13 | (We may be able to tighten Keep's behavior to make this attack more difficult, such as doing a byte-for-byte check that the uploaded block matches a known block.) |
||
14 | |||
15 | This is a general vulnerability that attacks the assumptions of content-based addressing, so it seems very likely that there are other more subtle attack vectors. Another possible attack would be a denial-of-service attack by uploading bogus blocks with specific content hashes and garbage content, preventing a user from uploading legitimate data. |
||
16 | |||
17 | We need to start thinking about moving to a best practices cryptographic hash. The first obvious choice would be SHA-1 (used by git), but it is already considered vulnerable so we should look at SHA-2 or SHA-3. |
||
18 | |||
19 | Fixing this is likely to be somewhat difficult and disruptive, since there is already a lot of code that makes assumptions about the format and length of content hashes used by Keep, which would become longer with a stronger hash function. |