All,

I've been having a look at how OpenVAS currently does crypto (primarily around 
the client/server SSL and plugin validation) and it strikes me that we have a 
significant over reliance on MD5 both for validating certificates and for 
validating plugins.  For those of you that may not be aware MD5 is subject to 
significant collision attacks[1] that make it unsuitable for such purposes.

Changing how we validate plugins may require changes to the protocol and 
should therefore be formalised in a change request, however in the mean time,  
I would like to change how certificates are handled as soon as can reasonably 
be done and am interested in your opinions on this.

Tim

[1] http://www.win.tue.nl/hashclash/rogue-ca/
-- 
Tim Brown
<mailto:t...@openvas.org>
<http://www.openvas.org/>
_______________________________________________
Openvas-devel mailing list
Openvas-devel@wald.intevation.org
http://lists.wald.intevation.org/mailman/listinfo/openvas-devel

Reply via email to