git-annex/doc/devblog/day_449__SHA1_break_day.mdwn

22 lines
1.1 KiB
Text
Raw Normal View History

2017-02-23 20:43:15 +00:00
[The first SHA1 collision](https://shattered.io/) was announced today,
produced by an identical-prefix collision attack.
After looking into it all day, it does not appear to impact git's security
2017-02-23 21:11:46 +00:00
immediately, except for targeted attacks against specific projects by
very wealthy attackers. But we're well past the time when it seemed ok that git
2017-02-23 20:43:15 +00:00
uses SHA1. If this gets improved into a chosen-prefix collision
attack, git will start to be rather insecure.
2017-02-23 23:06:06 +00:00
Projects that store binary files in git, that might be worth $100k for an
attacker to backdoor **should** be concerned by the SHA1 collisions.
A good example of such a project is
<git://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git>.
2017-02-24 04:28:15 +00:00
2017-02-23 23:06:06 +00:00
Using git-annex (with a suitable backend like SHA256) and signed commits
2017-02-24 04:28:15 +00:00
together is a good way to secure such repositories.
2017-02-23 23:06:06 +00:00
2017-02-24 04:28:15 +00:00
Update 12:25 am: However, there are some ways to embed SHA1-colliding data
in the names of git-annex keys. That makes git-annex with signed
commits be no more secure than git with signed commits. I am working
to fix git-annex to not use keys that have such problems.