Hackers completely break SSL using 200 PS3s


Recommended Posts

now isnt this interesting :)

http://hackaday.com/2008/12/30/25c3-hacker...using-200-ps3s/

=================================

A team of security researchers and academics has broken a core piece of internet technology. They made their work public at the 25th Chaos Communication Congress in Berlin today. The team was able to create a rogue certificate authority and use it to issue valid SSL certificates for any site they want. The user would have no indication that their HTTPS connection was being monitored/modified.

This attack is possible because of a flaw in MD5. MD5 is a hashing algorithm; each unique file has a unique hash. In 2004, a team of Chinese researchers demonstrated creating two different files that had the same MD5 hash. In 2007, another team showed theoretical attacks that took advantage of these collisions. The team focused on SSL certificates signed with MD5 for their exploit.

The first step was doing some broad scans to see what certificate authorities (CA) were issuing MD5 signed certs. They collected 30K certs from Firefox trusted CAs. 9K of them were MD5 signed. 97% of those came from RapidSSL.

Having selected their target, the team needed to generate their rogue certificate to transfer the signature to. They employed the processing power of 200 Playstation 3s to get the job done. For this task, it?s the equivalent of 8000 standard CPU cores or $20K of Amazon EC2 time. The task takes ~1-2 days to calculate. The tricky part was knowing the content of the certificate that would be issued by RapidSSL. They needed to predict two variables: the serial number and the timestamp. RapidSSL?s serial numbers were all sequential. From testing, they knew that RapidSSL would always sign six seconds after the order was acknowledged. Knowing these two facts they were able to generate a certificate in advance and then purchase the exact certificate they wanted. They?d purchase certificates to advance the serial number and then buy on the exact time they calculated.

The cert was issued to their particular domain, but since they controlled the content, they changed the flags to make themselves an intermediate certificate authority. That gave them authority to issue any certificate they wanted. All of these ?valid? certs were signed using SHA-1.

If you set your clock back to before August 2004, you can try out their live demo site. This time is just a security measure for the example and this would work identically with a certificate that hasn?t expired. There?s a project site and a much more detailed writeup than this.

To fix this vulnerability, all CAs are now using SHA-1 for signing and Microsoft and Firefox will be blacklisting the team?s rogue CA in their browser products.

=============================================

post-12634-1230699441.jpg

  mohan_168 said:
^ This issue cant be addressed or fixed. This is a limitation in MD5 itself.

I rarely see any corporate firm use MD5 for hashing purpose. SHA-1 is the way forward.

MD5 would just remain for theoretical knowledge in the books.

There's lots of different hash functions, like Whirlpool

  Mystic said:
What a waste of money.

how is it a waste?

this is something most people won't be able to do they are kind of peeking into the future of computer technologies and saying "yep this algorithm has a flaw in it"

best to find out now then later on when everyone else is capable of doing it this is like the big push away from md5 in terms of security

  DDStriker said:
how is it a waste?

this is something most people won't be able to do they are kind of peeking into the future of computer technologies and saying "yep this algorithm has a flaw in it"

best to find out now then later on when everyone else is capable of doing it this is like the big push away from md5 in terms of security

I just figured there was a better way to spend $80,000...

I know they were able to do it quicker this way, but either it was save time (do it on a smaller scale) or spend $80,000....

Interesting feat, regardless of what the hackers use to do their thing.

It's just funny when it's consoles, as people still have a bit of the "console war" kicking about inside of them when they reply :laugh:

I couldn't care less if 8,000,000 mobile phones are used :p

If a more secure product comes from this, great, if nothing comes from it at least whoever headed the project carried it through till the end.

MD5 pff... using the technology my company developed not even a million PS3 could break it. :shifty:

This reminded me of the Steven Wright joke: Everywhere is within walking distance if you have the time.

There's an analogy to be made with this situation but I'm too lazy right now to do it. :$

  Audioboxer said:
If a more secure product comes from this, great, if nothing comes from it at least whoever headed the project carried it through till the end.

agree, its a good thing that people do these kinds of experiments. It will show what technology needs improvement when better hardware is developed.

  Audioboxer said:
Interesting feat, regardless of what the hackers use to do their thing.

It's just funny when it's consoles, as people still have a bit of the "console war" kicking about inside of them when they reply :laugh:

I couldn't care less if 8,000,000 mobile phones are used :p

If a more secure product comes from this, great, if nothing comes from it at least whoever headed the project carried it through till the end.

Exactly. You know you have a Sony fanboy when the title of an article such as this tries to make it all about the PS3.

Uhhh, not the point...

  _dandy_ said:
Exactly. You know you have a Sony fanboy when the title of an article such as this tries to make it all about the PS3.

Uhhh, not the point...

And you know when the topic officially derails when posters start flinging "fanboy" comments around. :rolleyes:

This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
  • Posts

    • I am saying if they put MC outside compute tile, it is DOA for gaming, in other words will be a failure like 285k unless they do some magic with MC, but I doubt it. It is that simple.
    • One of the reasons Windows is in use is because of compatibility with hardware and software, but it isn't perfect and there are gaps. This software can help maintain compatibility with older hardware and software the way DOSBox helps us now.
    • This can help with compatibility the way DOSBox helps us now. There are a lot of old drivers, software, and hardware that don't work in current Windows. This could also help older hardware still be relevant because you can install it directly on devices where current Windows versions are no longer supported.
    • Nexus Mods owner steps down citing toll on personal wellbeing by Usama Jawad If you've ever been involved in the gaming landscape, there is a good chance that you have heard of Nexus Mods. It's one of the largest websites offering game modifications online with millions of registered members. The site hosts mods for numerous popular titles including The Witcher 3, The Elder Scrolls, Elden Ring, Dark Souls, and Fallout, among others. Now, the creator of the site has announced that ownership of Nexus Mods is changing hands, 24 years after its inception. In a blog post, the site's creator, Robin Scott - also known as "Dark0ne" in the community -, has announced that he is stepping down from managing the site on a daily basis and is actually handing over Nexus Mods to a new owner. Interestingly, this owner has not been named yet, but it seems like the community will be seeing a lot more of Foledinho (Victor) and Rapsak (Marinus) in daily operations. Scott says that ever since starting the site back in 2001, his adult life has been pretty much consumed by running Nexus Mods and managing its "major social network". This has almost been an on-call position, which has taken a toll on his personal wellbeing and health due to the accompanying stress and anxiety. As such, Scott has decided to step down from his executive role to avoid further burnout. Although Scott has not revealed the identity of the new owners, he says that his exit is purely for personal reasons and not some corporate backdoor deal. The site's creator will still be around in the forums and Mod Author Discord, providing direction when needed without taking responsibility. Scott's announcement has been mostly met with praise and thanks from the community. Though, as may be expected from a rather diverse and often polarized audience, the discussion did recently veer off-course and has now been locked from further engagement by community mods.
    • Watch out Microsoft! Take That closed source greedy megacorps! Now with comboboxes and fullscreen apps!
  • Recent Achievements

    • Enthusiast
      Motoman26 went up a rank
      Enthusiast
    • Mentor
      M. Murcek went up a rank
      Mentor
    • Explorer
      treker_ed went up a rank
      Explorer
    • Apprentice
      CHUNWEI went up a rank
      Apprentice
    • Veteran
      1337ish went up a rank
      Veteran
  • Popular Contributors

    1. 1
      +primortal
      672
    2. 2
      ATLien_0
      269
    3. 3
      +FloatingFatMan
      176
    4. 4
      Michael Scrip
      173
    5. 5
      Steven P.
      139
  • Tell a friend

    Love Neowin? Tell a friend!