On Feb 25, 2017, at 17:44, Jimmy Hess <mysi...@gmail.com> wrote:
>> On Thu, Feb 23, 2017 at 2:03 PM, Patrick W. Gilmore <patr...@ianai.net> 
>> wrote:
>> 
>> For instance, someone cannot take Verisign’s root cert and create a cert 
>> which collides
>> on SHA-1. Or at least we do not think they can. We’ll know in 90 days when
>> Google releases the code.
> 
> Maybe.   If you assume that no SHA attack was known to anybody at the
> time the Verisign
> cert was originally created,  And that the process used to originally
> create Verisign's root cert
> was not tainted  to leverage such attack.
> 
> If it was tainted,  then  maybe there's another version of the
> certificate that was constructed
> with a different Subject name and Subject public key,  but the same
> SHA1 hash, and same Issuer Name and same Issuer Public Key.

I repeat something I've said a couple times in this thread: If I can somehow 
create two docs with the same hash, and somehow con someone into using one of 
them, chances are there are bigger problems than a SHA1 hash collision.

If you assume I could somehow get Verisign to use a cert I created to match 
another cert with the same hash, why in the hell would that matter? I HAVE THE 
ONE VERISIGN IS USING. Game over.

Valdis came up with a possible use of such documents. While I do not think 
there is zero utility in those instances, they are pretty small vectors 
compared to, say, having a root cert at a major CA.

-- 
TTFN,
patrick

Reply via email to