Discussion:
[Slackbuilds-users] MD5 hash sums
t***@airmail.cc
2018-08-21 11:32:32 UTC
Permalink
Hello.

I have a question about DOWNLOAD and MD5SUM variables in the
<package>.info files.
It is better to entirely avoid the MD5 algorithm and don't put any
value in signatures based on MD5.
Would that be a valid concern for the .info files?

A lot of DOWNLOAD links are plain http ones and thus are suspectible to
MITM tinkering on the ISP side...
_______________________________________________
SlackBuilds-users mailing list
SlackBuilds-***@slackbuilds.org
https://lists.slackbuilds.org/mailman/listinfo/slackbuilds-users
Archives - https://lists.slackbuilds.org/pipermail/slackbuilds-users/
FAQ - https://slackbuilds.org/faq/
David O'Shaughnessy
2018-08-22 04:09:17 UTC
Permalink
Post by t***@airmail.cc
Hello.
I have a question about DOWNLOAD and MD5SUM variables in the
<package>.info files.
It is better to entirely avoid the MD5 algorithm and don't put any
value in signatures based on MD5.
Would that be a valid concern for the .info files?
A lot of DOWNLOAD links are plain http ones and thus are suspectible to
MITM tinkering on the ISP side...
Each SlackBuild archive is signed by the SBo devs, so any modifications
on the server (or in-between) would fail subsequent verification. In
that case it's the GPG signature that you trust to verify the .info file
contents (and all the rest of the SlackBuild stuff), not the MD5 sum or
whatever else is inside it.

--
Dave
_______________________________________________
SlackBuilds-users mailing list
SlackBuilds-***@slackbuilds.org
https://lists.slackbuilds.org/mailman/listinfo/slackbuilds-users
Archives - https://lists.slackbuilds.org/pipermail/slackbuilds-users/
FAQ - https://slackbuilds.org/faq/
t***@airmail.cc
2018-08-22 14:55:54 UTC
Permalink
Post by David O'Shaughnessy
Each SlackBuild archive is signed by the SBo devs, so any modifications
on the server (or in-between) would fail subsequent verification. In
that case it's the GPG signature that you trust to verify the .info
file contents (and all the rest of the SlackBuild stuff), not the MD5
sum or whatever else is inside it.
Sorry, the question I had in mind was about MD5 sums inside it. Seems
kind of strange that SlackBuild archive is protected by GPG signature,
but the actual source tarball is not signed and is protected by
(obsolete) MD5 checksum. Aren't this situation an opportunity to MITM
the source tarball itself, since some DOWNLOAD links are provided trough
plain HTTP?
Post by David O'Shaughnessy
SHA-224, 256, 384, or 512: This is a massively-overhauled SHA-1 which
generates larger hashes (224, 256, 384, or 512 bits). Right now, these
are the strongest hashes in GnuPG.
vs
Post by David O'Shaughnessy
MD5 is a 128-bit cryptographic hash function invented by Ron Rivest
(the ‘R’ of ‘RSA’) in the early 1990s. For many years it was one of the
standard algorithms of the field, but is now completely obsolete. For
that reason, MD5 is not supported by GnuPG.
Wouldn't it be better to use, say, SHA512 instead?
_______________________________________________
SlackBuilds-users mailing list
SlackBuilds-***@slackbuilds.org
https://lists.slackbuilds.org/mailman/listinfo/slackbuilds-users
Archives - https://lists.slackbuilds.org/pipermail/slackbuilds-users/
FAQ - https://
Erik Hanson
2018-08-23 00:41:25 UTC
Permalink
Post by t***@airmail.cc
Post by David O'Shaughnessy
Each SlackBuild archive is signed by the SBo devs, so any
modifications on the server (or in-between) would fail subsequent
verification. In that case it's the GPG signature that you trust to
verify the .info file contents (and all the rest of the SlackBuild
stuff), not the MD5 sum or whatever else is inside it.
Sorry, the question I had in mind was about MD5 sums inside it. Seems
kind of strange that SlackBuild archive is protected by GPG signature,
but the actual source tarball is not signed and is protected by
(obsolete) MD5 checksum. Aren't this situation an opportunity to MITM
the source tarball itself, since some DOWNLOAD links are provided trough
plain HTTP?
Sources are not protected by us. We do not provide the MD5 sum as any
sort of security measure, it shouldn't be treated as one. We have no
agency over upstream sources, and we purposefully do not host them, so
we cannot provide any signature or sum that could be considered a token
of security.
--
Erik
t***@airmail.cc
2018-08-23 22:59:59 UTC
Permalink
Post by Erik Hanson
Post by t***@airmail.cc
Post by David O'Shaughnessy
Each SlackBuild archive is signed by the SBo devs, so any
modifications on the server (or in-between) would fail subsequent
verification. In that case it's the GPG signature that you trust to
verify the .info file contents (and all the rest of the SlackBuild
stuff), not the MD5 sum or whatever else is inside it.
Sorry, the question I had in mind was about MD5 sums inside it. Seems
kind of strange that SlackBuild archive is protected by GPG signature,
but the actual source tarball is not signed and is protected by
(obsolete) MD5 checksum. Aren't this situation an opportunity to MITM
the source tarball itself, since some DOWNLOAD links are provided trough
plain HTTP?
Sources are not protected by us. We do not provide the MD5 sum as any
sort of security measure, it shouldn't be treated as one. We have no
agency over upstream sources, and we purposefully do not host them, so
we cannot provide any signature or sum that could be considered a token
of security.
Thanks for the clarification. I'm still struggling getting the grasp of
it's effect though..

Quoting the FAQ from https://slackbuilds.org/faq/#asc
Post by Erik Hanson
What are all of those .asc files in the repository?
Those files are GPG signatures. They can be used to verify that the
SlackBuild script tarball is exactly the one that we placed on the
site.
So, one can verify the authenticity of the SlackBuild script, but the
authenticity of the source tarball itself used by the aforementioned
script is uncertain? If that's the case then why would one bother with
verifying authenticity at all? (Something authentic) x (Something that
may or may not be authentic) == (Something that may or may not be
authentic), right?
_______________________________________________
SlackBuilds-users mailing list
SlackBuilds-***@slackbuilds.org
https://lists.slackbuilds.org/mailman/listinfo/slackbuilds-users
Archives - https://lists.slackbuilds.org/pipermail/slackbuilds-users/
FAQ - https://slackbuilds.org/faq/
Brenton Earl
2018-08-23 23:17:25 UTC
Permalink
Post by t***@airmail.cc
Post by Erik Hanson
Post by t***@airmail.cc
Post by David O'Shaughnessy
Each SlackBuild archive is signed by the SBo devs, so any
modifications on the server (or in-between) would fail
subsequent
verification. In that case it's the GPG signature that you trust to
verify the .info file contents (and all the rest of the
SlackBuild
stuff), not the MD5 sum or whatever else is inside it.
Sorry, the question I had in mind was about MD5 sums inside it. Seems
kind of strange that SlackBuild archive is protected by GPG signature,
but the actual source tarball is not signed and is protected by
(obsolete) MD5 checksum. Aren't this situation an opportunity to MITM
the source tarball itself, since some DOWNLOAD links are
provided 
trough
plain HTTP?
Sources are not protected by us. We do not provide the MD5 sum as any
sort of security measure, it shouldn't be treated as one. We have no
agency over upstream sources, and we purposefully do not host them, so
we cannot provide any signature or sum that could be considered a token
of security.
Thanks for the clarification. I'm still struggling getting the grasp
of 
it's effect though..
Quoting the FAQ from https://slackbuilds.org/faq/#asc
Post by Erik Hanson
What are all of those .asc files in the repository?
Those files are GPG signatures. They can be used to verify that
the 
SlackBuild script tarball is exactly the one that we placed on the 
site.
So, one can verify the authenticity of the SlackBuild script, but
the 
authenticity of the source tarball itself used by the aforementioned 
script is uncertain? If that's the case then why would one bother
with 
verifying authenticity at all? (Something authentic) x (Something
that 
may or may not be authentic) == (Something that may or may not be 
authentic), right?
The maintainer is supposed to take the GPG signature, MD5 or SHA check
sum from the upstream developer and use it to authenticate the source
prior to uploading a new/updated SlackBuild. It is the maintainer's
job to verify the source before putting their own check sum into the
.info file.
--
Brenton Earl <***@exitstatusone.com>
Erik Hanson
2018-08-24 03:36:05 UTC
Permalink
Post by t***@airmail.cc
So, one can verify the authenticity of the SlackBuild script, but the
authenticity of the source tarball itself used by the aforementioned
script is uncertain? If that's the case then why would one bother with
verifying authenticity at all? (Something authentic) x (Something that
may or may not be authentic) == (Something that may or may not be
authentic), right?
It's been mentioned in this thread enough times that MD5 has not fallen
to the attack you think it has, so I won't repeat that talking point,
but I will try and clarify something..

The checksums are not there to verify authenticity. Everyone seems to be
putting far too much stock in the MD5 sums in the .info files. I can't
stress this enough: they're not there for security.

You could almost think of it as a version number. If the file you
download matches the MD5 sum provided, then you know it's the same file
the maintainer used, and the same file the SlackBuild was tested against
by a SlackBuilds.org admin. This helps to ensure the SlackBuild will
work as intended, creating a valid package.

What the MD5 sum can, and does do on a regular basis, is raise a red
flag when it mismatches. Possibly the source has gone missing, or been
replaced by upstream without a change to the file name. These things
happen often enough that it's important we have a checksum, and that
people use it rather than complain that a SlackBuild is broken.

However, you absolutely cannot assume that because the MD5 sum matches
that the file is in any way "safe" or was not tampered with /before/ the
maintainer got to it. Auditing or policing upstream sources is far
beyond the scope of this project. We could use the strongest hashing
algorithm available, but telling people it's a mark of authenticity
would be nothing but theater.
--
Erik
Habs
2018-08-24 06:46:08 UTC
Permalink
Post by Erik Hanson
Post by t***@airmail.cc
So, one can verify the authenticity of the SlackBuild script, but the
authenticity of the source tarball itself used by the aforementioned
script is uncertain? If that's the case then why would one bother with
verifying authenticity at all? (Something authentic) x (Something that
may or may not be authentic) == (Something that may or may not be
authentic), right?
It's been mentioned in this thread enough times that MD5 has not fallen
to the attack you think it has, so I won't repeat that talking point,
but I will try and clarify something..
The checksums are not there to verify authenticity. Everyone seems to be
putting far too much stock in the MD5 sums in the .info files. I can't
stress this enough: they're not there for security.
You could almost think of it as a version number. If the file you
download matches the MD5 sum provided, then you know it's the same file
the maintainer used, and the same file the SlackBuild was tested against
by a SlackBuilds.org admin. This helps to ensure the SlackBuild will
work as intended, creating a valid package.
What the MD5 sum can, and does do on a regular basis, is raise a red
flag when it mismatches. Possibly the source has gone missing, or been
replaced by upstream without a change to the file name. These things
happen often enough that it's important we have a checksum, and that
people use it rather than complain that a SlackBuild is broken.
However, you absolutely cannot assume that because the MD5 sum matches
that the file is in any way "safe" or was not tampered with /before/ the
maintainer got to it. Auditing or policing upstream sources is far
beyond the scope of this project. We could use the strongest hashing
algorithm available, but telling people it's a mark of authenticity
would be nothing but theater.
--
Erik
It seems clear enough to me and has done since it was explained to me a
while back.

Effectively, if the maintainer unfortunately has used an 'unsafe' source,
created its checksum for that source and then uploaded the build package,
then all the checksum is doing when use it, is validating it was that
original unsafe source (assuming it hasn't again been altered); or more
preferably and likely the 'safe' source - as said, there is nothing SBo
can do about unsafe sources and updating to better checksums etc won't
help that it seems to me.

I think the current approach is 'safe enough' once one accepts the above
to prove nothing was tampered with when we get it - or at least will let
us know.

I stand to be corrected, however.

Habs

--- Sent using Alpine/Pine, a text based MUA ---
_______________________________________________
SlackBuilds-users mailing list
SlackBuilds-***@slackbuilds.org
https://lists.slackbuilds.org/mailman/listinfo/slackbuilds-users
Archives - https://lists.slackbuilds.org/pipermail/slackbuilds-users/
FAQ - https://slackbuilds.org/faq/
t***@airmail.cc
2018-08-24 11:03:26 UTC
Permalink
Post by Erik Hanson
However, you absolutely cannot assume that because the MD5 sum matches
that the file is in any way "safe" or was not tampered with /before/
the maintainer got to it.
Can I assume that because MD5 sum matches that the file was not tampered
after the maintainer got it? I believe this was the original scope of
the thread in the first place.

Quoting https://en.wikipedia.org/wiki/MD5#Preimage_vulnerability
Post by Erik Hanson
In April 2009, a preimage attack against MD5 was published that breaks
MD5's preimage resistance. This attack is only theoretical, ...
It was theoretical in 2009. The question is whether or not it was made
practical in the past nine years? There are two possible outcomes. One:
it was made practical and is not yet published. Two: it is still
theoretical. Do you really want to wait until it becomes practical *and*
published?
_______________________________________________
SlackBuilds-users mailing list
SlackBuilds-***@slackbuilds.org
https://lists.slackbuilds.org/mailman/listinfo/slackbuilds-users
Archives - https://lists.slackbuilds.org/pipermail/slackbuilds-users/
FAQ - https://slackbuilds.org/faq/
Μιχάλης Μιχαλούδης
2018-08-24 11:28:36 UTC
Permalink
Do you really want to wait until it becomes practical *and* published?
There is no ending to security measures. You stop to take measures when they’re is no threat, not possibility of threat.

1. Crackers are not stupid to waste time to tamper source code to match the same md5sum, it’s way too much complicated. And it’s very easy to notice. It’s easier for them to write a virus for autorun usb flash’s for other kind of users, not for slackers.

2. If the original coder can’t understand the difference in code after the tampering (I suppose will be huge) whatever measure is useless.

(Excuse my English)
_______________________________________________
SlackBuilds-users mailing list
SlackBuilds-***@slackbuilds.org
https://lists.slackbuilds.org/mailman/listinfo/slackbuilds-users
Archives - https://lists.slackbuilds.org/pipermail/slackbuilds-users/
FAQ - https://s
Konrad J Hambrick
2018-08-24 11:36:11 UTC
Permalink
All --

IMO ( and ITO of other SBo Customers ), The MD5SUM= field in the .info file
is to verify that the DOWNLOAD= files that you downloaded the same files
that the Maintainer downloaded.

Nothing more than that.

It is not for security -- the SBo Maintainer cannot guarantee that the
source files are secure -- that is the Upstream Developer's duty.

IOW, What Habs said.

-- kjh
Post by Erik Hanson
However, you absolutely cannot assume that because the MD5 sum matches
Post by Erik Hanson
that the file is in any way "safe" or was not tampered with /before/ the
maintainer got to it.
Can I assume that because MD5 sum matches that the file was not tampered
after the maintainer got it? I believe this was the original scope of the
thread in the first place.
Quoting https://en.wikipedia.org/wiki/MD5#Preimage_vulnerability
In April 2009, a preimage attack against MD5 was published that breaks
Post by Erik Hanson
MD5's preimage resistance. This attack is only theoretical, ...
It was theoretical in 2009. The question is whether or not it was made
practical in the past nine years? There are two possible outcomes. One: it
was made practical and is not yet published. Two: it is still theoretical.
Do you really want to wait until it becomes practical *and* published?
_______________________________________________
SlackBuilds-users mailing list
https://lists.slackbuilds.org/mailman/listinfo/slackbuilds-users
Archives - https://lists.slackbuilds.org/pipermail/slackbuilds-users/
FAQ - https://slackbuilds.org/faq/
David O'Shaughnessy
2018-08-23 03:15:14 UTC
Permalink
Post by t***@airmail.cc
Sorry, the question I had in mind was about MD5 sums inside it. Seems
kind of strange that SlackBuild archive is protected by GPG signature,
but the actual source tarball is not signed and is protected by
(obsolete) MD5 checksum. Aren't this situation an opportunity to MITM
the source tarball itself, since some DOWNLOAD links are provided trough
plain HTTP?
Let's say the user has a SlackBuild + .info file, both of which have
been signed by the SBo dev team and are authentic (thus including the
MD5). The assumption here is that the maintainer actually checks
signatures upon downloading (and that upstream devs even sign in the
first place), so the stuff in the .info is "safe".

Now the user goes to download the source listed in .info, and unbeknown
to them it has been maliciously tampered with (either on the server or
MITM, so either TLS or not, it doesn't matter). The MD5 of that altered
archive will not match the authentic MD5 found in the .info file. For an
attacker to change the upstream source archive without changing the MD5
requires a 2nd preimage attack, which as far as I understand is not
computationally feasible at present. This is different to a much simpler
collision attack, where the attacker generates two _new_ archives with
new (and matching) MD5s.

So, as long as SlackBuild maintainers are actually verifying the
signatures on source archives and not blindly trusting checksums (of any
variety) published on upstream websites, then using MD5 in this way
seems OK. That said, I do think that it would be safer practice to just
use a stronger hash function anyway (https://blake2.net/ ?), as things
can change suddenly (who knows what's around the corner).

--
Dave
_______________________________________________
SlackBuilds-users mailing list
SlackBuilds-***@slackbuilds.org
https://lists.slackbuilds.org/mailman/listinfo/slackbuilds-users
Archives - https://lists.slackbuilds.org/pipermail/slackbuilds-users/
FAQ - https://slackbuilds.org/faq/
T3 slider
2018-08-23 05:45:44 UTC
Permalink
Post by David O'Shaughnessy
For an
attacker to change the upstream source archive without changing the MD5
requires a 2nd preimage attack, which as far as I understand is not
computationally feasible at present. This is different to a much simpler
collision attack, where the attacker generates two _new_ archives with
new (and matching) MD5s.
The download files do not necessarily have to be tar archives, and in some
cases (generally those with multiple download files and therefore multiple
checksums), individual files can be included for download. Intentional PDF
collisions have been around for ages (see
https://www.mscs.dal.ca/~selinger/md5collision/ ), so if a SlackBuild
includes some documentation as a download link, and the upstream server has
since been compromised, a user could definitely be stuck with a malicious
file even if the SlackBuild maintainer did everything right and verified
upstream signatures. It is probably more difficult to generate tarballs
with collisions but I'm guessing it isn't quite as difficult as we're
pretending it is, and it's irrelevant since unzipped files can be passed as
download links.

Simply put, this is bad security. Anyone who disagrees doesn't understand
the problem. Can't we just add an optional sha256sum in the .info file and
maintainers can gradually add these checksums to their SlackBuilds,
targeting some point in the future that these fields will be required (and
possibly the md5s retired)?

-T3slider
David O'Shaughnessy
2018-08-23 07:07:22 UTC
Permalink
Post by T3 slider
The download files do not necessarily have to be tar archives, and in
some cases (generally those with multiple download files and therefore
multiple checksums), individual files can be included for download.
Intentional PDF collisions have been around for ages
(see https://www.mscs.dal.ca/~selinger/md5collision/
<https://www.mscs.dal.ca/%7Eselinger/md5collision/> ), so if a
SlackBuild includes some documentation as a download link, and the
upstream server has since been compromised, a user could definitely be
stuck with a malicious file even if the SlackBuild maintainer did
everything right and verified upstream signatures. It is probably more
difficult to generate tarballs with collisions but I'm guessing it isn't
quite as difficult as we're pretending it is, and it's irrelevant since
unzipped files can be passed as download links.
I don't see how this works if each individual download (either archive
or single uncompressed file) has its own MD5. My understanding of
collisions is that one can easily create two differing files with
matching MD5 sums (so the original innocuous file A plus a malicious new
file B), but that this necessarily creates a new (shared) MD5 sum. If
the target MD5 is given beforehand (i.e., the one(s) in the info file),
then a preimage attack is required which is impractical.
Post by T3 slider
Simply put, this is bad security. Anyone who disagrees doesn't
understand the problem. Can't we just add an optional sha256sum in the
.info file and maintainers can gradually add these checksums to their
SlackBuilds, targeting some point in the future that these fields will
be required (and possibly the md5s retired)?
An optional sha256sum field seems reasonable to me.

--
Dave
_______________________________________________
SlackBuilds-users mailing list
SlackBuilds-***@slackbuilds.org
https://lists.slackbuilds.org/mailman/listinfo/slackbuilds-users
Archives - https://lists.slackbuilds.org/pipermail/slackbuilds-users/
FAQ - https://sla
Gabriel Diaz
2018-08-23 12:41:36 UTC
Permalink
Hello,

I think this is not a big deal, changing to another hash function should be easy enough.

But I also think slackbuilds should stay away of the security discussion. Providing a secure distribution channel is in the hands of the code owner only. If the source is already weak there is no encryption in the world to protect you.

And even though I just mirrored sbosrcarch, I would say slackbuilds should stay away from being a third party code distributor.

Anyway I think there is nothing wrong adding SHA1 in the info file, tools can ignore or check it as they like. Just don't make it a requirement.

saludos,
gabi






‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐
Post by T3 slider
For an attacker to change the upstream source archive without
changing the MD5 requires a 2nd preimage attack, which as far as
I understand is not computationally feasible at present. This is
different to a much simpler collision attack, where the attacker
generates two new archives with new (and matching) MD5s.
The download files do not necessarily have to be tar archives, and
in some cases (generally those with multiple download files and
therefore multiple checksums), individual files can be included for
download. Intentional PDF collisions have been around for ages
(see https://www.mscs.dal.ca/~selinger/md5collision/ ), so if a
SlackBuild includes some documentation as a download link, and the
upstream server has since been compromised, a user could definitely
be stuck with a malicious file even if the SlackBuild maintainer
did everything right and verified upstream signatures.
The reason the slackbuild MD5's do not fall victim to the "pdf
collision" attack is a subtle distinction between what crytographers
define as a "collision" attack vs. a second pre-image attack.
The pdf attack you describe above is a "collision" attack. A
collision attack is defined by cryptographers as "find any two files,
A and B, which produce the same hash" [1]. That was how the PDF
attack worked, it was just constrained to "the A and B files need to
be valid PDF files". But, a collision attack does not allow an
attacker (MITM, etc.) to simply substitute the upstream file with a
new file that matches the same hash as the origional file.
In order for an attacker to substitute a different upstream file for
the origional file, the attacker has to find a new file that matches
the MD5 hash of the existing file. This attack is what
cryptographers define as a "second pre-image" attack. And it means
"given a file G, find another file C which has an identical hash"
[2]. This is the attack that a MITM ISP or a cracker breaking in to
an upstream repository has to perform to substitute a different file
that matches the MD5 in the SBO.
The reason is that the SBO files contain an MD5 sum of a known file G
(the origional). And the SBO file is then protected by a GPG
signature. If a user verifies that the downloaded SBO and GPG
signature are valid, then the user knows that the SBO has not been
altered. Therefore the user knows the MD5 sum within the SBO has
also not been altered (by a MITM or other attack).
Therefore, in order for the downloaded file (tar ball, zip, pdf,
whatever) to be altered, but still match the MD5 sum in the SBO, a
second pre-image attack is requred. This is because the valid MD5
sum in the SBO is now the sum of a single given file G, and the MITM
has to find a new file C which hashes to the same MD5 of the given
file G.
MD5 has not (yet) been shown to be vulnerable to this attack (second
pre-image) in any feasable timeframe [3][4]. Yes, a day is going to
arrive sometime in the future where it will likely fall to a second
pre-image attack, so upgrading to a stronger hash function is also a
good idea. But the MD5's are not (yet) a security risk.
Post by T3 slider
It is probably more difficult to generate tarballs
with collisions but I'm guessing it isn't quite as difficult as we're
pretending it is, and it's irrelevant since unzipped files can be passed as
download links.
Cryptographers don't care about what the stream of bytes represent.
The attack types are defined over the set of "all possible byte
combinations of inputs to the hash function".
Post by T3 slider
Simply put, this is bad security. Anyone who disagrees doesn't understand
the problem.
Well, anyone who confuses collision attacks (which have been shown
against MD5) with second pre-image attacks (which is what the GPG
protected MD5 hashes in the SBO force an attacker to achieve) is also
not fully up to speed on the meaning of the different attacks and the
security properties they provide and falls into the trap of
"criticis[ing] MD5 and SHA1 for the wrong reasons" [4].
Post by T3 slider
Can't we just add an optional sha256sum in the .info file and
maintainers can gradually add these checksums to their SlackBuilds,
targeting some point in the future that these fields will be required (and
possibly the md5s retired)?
Upgrading to sha256 is not a bad idea, but the MD5's do not yet
present a "the sky is falling" risk given the way they are verified
via the GPG signature protecting the SBO file.
[1] https://en.wikipedia.org/wiki/Collision_attack
[2] https://en.wikipedia.org/wiki/Preimage_attack
[3] http://www.cs.cmu.edu/~perspectives/md5.html (paragraph beginning
"To understand the implications" up through the paragraph ending
"Perspectives requires only second preimage resistance of MD5")
[4] https://en.wikibooks.org/wiki/Cryptography/Breaking_Hash_Algorithms
"The MD5 and SHA-1 hash functions, in applications that do not
actually require collision resistance, are still considered
adequate.
Many people criticise MD5 and SHA1 for the wrong reasons. [4]
There is no known practical or almost-practical preimage attack on
MD5 or SHA-1, much less second-preimage attacks, only collision
attacks.[5][6]
SlackBuilds-users mailing list
https://lists.slackbuilds.org/mailman/listinfo/slackbuilds-users
Archives - https://lists.slackbuilds.org/pipermail/slackbuilds-users/
FAQ - https://slackbuilds.org/faq/
Loading...