From: Radoslaw Szkodzinski <astralstorm@gorzow.mm.pl>
To: linux@horizon.com
Cc: git@vger.kernel.org, torvalds@osdl.org
Subject: Re: [Revctrl] colliding md5 hashes of human-meaningful
Date: Mon, 13 Jun 2005 22:52:02 +0200 [thread overview]
Message-ID: <42ADF1F2.1070008@gorzow.mm.pl> (raw)
In-Reply-To: <20050613195038.9191.qmail@science.horizon.com> (6eb06e09aa229a99680b3c9e55710050f05d13fe)
linux@horizon.com wrote:
>>So the problem is totally different from the way git uses a hash. In the
>>git model, an attacker by definition cannot control both versions of a
>>file, since if he controls just _one_ version, he doesn't need to do the
>>attack in the first place!
>>
>>
>
>You are insufficiently paranoid, Grasshopper.
>
>The basic attack goes like this:
>
>- I construct two .c files with identical hashes. One is something
> useful; perhaps a device driver for some piece of hardware that my
> desired target has. The other is similar, but includes a remote
> root explot.
>
> (With an n-bit hash and an automated way to make harmless changes
> to source files, I can generate 2^(n/2) variants of each and expect to
> get a match, even in the absence of a better attack.)
>
>
>
And you get lots of nonsense in the new file.
>- I submit the first one to the Linux kernel. It's valid and gets
> merged.
>
>
>
And funny as it is, when the hole is found you're busted. Or at least
the first person responsible.
You probably couldn't shadow yourself enough not to get caught.
>- A kernel release, including the "interesting" driver, gets made and
> sprinkled with holy penguin pee. Signatures, hashes, and all that.
>
>
>
Which mean that you can't change your name on the project. See above.
>- Through various means (possibly just running a kernel download mirror,
> or possibly by splicing into my target's upstream Internet connection),
> I substitute the malware file for the real source code.
>
>
>
If you can splice into the connection, you can put there anything you want,
including another kernel and any amount of exploits. Even with SSH.
Ever heard of man-in-the-middle attacks?
With high-grade security you won't be able to splice into the connection,
as it'll be fully encrypted (with HTH key exchange) and/or randomised using things like EFF's Tor.
Then they can check with kernel.org or any other mirror.
>- My target verifies all the hashes and signatures, decides that this "Linus"
> person signing it is trustworthy, and compiles and installs the kernel.
>
>
And they're so unforseeing that they don't check the sources of the
drivers they use.
Funny. And if they don't use it, you'll have a problem with enabling
your exploit.
Your best target would be a scheduler, but that's heavily scrutinised.
>- I walk in my back door and do suitable rude things.
>
>
>
Like going to jail.
>The point is, it *is* possible for an attacker to control both versions of
>a file. The reason he needs to do the attack is that one version looks
>legitimate and the other includes a Nasty Surprise.
>
>
It is in theory. Tell someone when you mount such an attack on anybody.
AstralStorm
prev parent reply other threads:[~2005-06-13 20:48 UTC|newest]
Thread overview: 9+ messages / expand[flat|nested] mbox.gz Atom feed top
2005-06-13 19:50 [zooko@zooko.com: [Revctrl] colliding md5 hashes of human-meaningful linux
2005-06-13 20:08 ` Linus Torvalds
2005-06-13 20:17 ` Jason McMullan
2005-06-13 21:03 ` linux
2005-06-13 21:39 ` Linus Torvalds
2005-06-13 23:03 ` linux
2005-06-14 1:49 ` Benjamin Herrenschmidt
2005-06-13 20:46 ` Junio C Hamano
2005-06-13 20:52 ` Radoslaw Szkodzinski [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=42ADF1F2.1070008@gorzow.mm.pl \
--to=astralstorm@gorzow.mm.pl \
--cc=git@vger.kernel.org \
--cc=linux@horizon.com \
--cc=torvalds@osdl.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).