[DUG] Sending a file and verifying the data

John Bird johnkbird at paradise.net.nz
Wed Jan 28 16:03:45 NZDT 2009


Looks like MD5 hashes are deprecated now....there has been security papers 
about possible generation of any MD5 hashed data using large 
computation.....(they used 200 networked PS3's if I recall) sometime around 
Xmas.

It caused a bit of a scare in the browser communities (IE/Firefox etc) as 
some of the SSL certificate authorities such as Comodo or a subsidiary 
thereof rely on MD5, although most have now switched to using SHA hashes. 
The worry was that while some recognised certificate vendors were still 
using MD5 there was the posssibility they could validate any site 
certificate even if they were using other hashes by supplying a valid MD5 
verifification I understand.

see

http://www.heise-online.co.uk/security/25C3-MD5-collisions-crack-CA-certificate--/news/112327


"The infrastructure of Certification Authorities is meant to prevent this 
kind of attack, but despite warnings, some root CAs are still using MD5, 
leaving people potentially exposed to the possibility of forged 
certificates. The team found the following CAs still using MD5; RapidSSL, 
FreeSSL, TC TrustCenter AG, RSA Data Security, Thawte and verisign.co.jp. 
They collected 30,000 certificates and found 9,000 of them were signed with 
MD5 and of them, 97 per cent were issued by RapidSSL. Because of this and 
other attributes of RapidSSL's procedures, such as use of sequential serial 
numbers in issued certificates, the researchers examined RapidSSL's 
certificates in greater depth.

By purchasing a certificate and then getting it reissued a number of times, 
data allowing prediction of the serial number was obtained, allowing the 
researchers to generate the certificate data to be signed over the course of 
just a few days. The predicted serial number was then passed to the 
Playstation 3 cluster which was asked to calculate both legitimate 
certificate data and bogus certificate data, which when MD5 hashed, would 
collide. When it came to the time the predicted serial number would be used 
by the CA, the researchers purchased a new legitimate certificate, hoping to 
get a certificate with the same serial number as they had predicted. It took 
four attempts to get the methodology to work and actually get a certificate 
with the same serial number, but the signature of the issued certificate was 
now valid on the bogus colliding certificate because of the MD5 collision."

I understand RapidSSL hurriedly switched in January...

I presume this means for Delphi its a good idea to use something 
else.....what do others use?

John

> This popped up on DelphiFeeds.com today
> http://delphi.about.com/od/objectpascalide/a/delphi-md5-hash.htm
>



More information about the Delphi mailing list