Project

General

Profile

Changing Keep hash algorithm » History » Version 1

Tom Clegg, 03/08/2017 03:57 PM

1 1 Tom Clegg
h1. Changing Keep hash algorithm
2
3
(notes moved from #4424)
4
5
The md5 algorithm is well known to be insecure.  Attackers can force hash collisions on arbitrary data, for example http://natmchugh.blogspot.com/2014/10/how-i-created-two-images-with-same-md5.html?m=1
6
7
In the case of Keep, this exposes an obvious vulnerability.  If an attacker known the hash of a block, he or she could subvert the permission system this way:
8
9
# Generate a block that collides with the desired hash
10
# Upload the collision block and receive a signed token
11
# Use the signed token to request the block
12
13
(We may be able to tighten Keep's behavior to make this attack more difficult, such as doing a byte-for-byte check that the uploaded block matches a known block.)
14
15
This is a general vulnerability that attacks the assumptions of content-based addressing, so it seems very likely that there are other more subtle attack vectors.  Another possible attack would be a denial-of-service attack by uploading bogus blocks with specific content hashes and garbage content, preventing a user from uploading legitimate data.
16
17
We need to start thinking about moving to a best practices cryptographic hash.  The first obvious choice would be SHA-1 (used by git), but it is already considered vulnerable so we should look at SHA-2 or SHA-3.
18
19
Fixing this is likely to be somewhat difficult and disruptive, since there is already a lot of code that makes assumptions about the format and length of content hashes used by Keep, which would become longer with a stronger hash function.