30 July 2024
Feisty Duck’s Cryptography & Security Newsletter is a periodic dispatch bringing you commentary and news surrounding cryptography, security, privacy, SSL/TLS, and PKI. It's designed to keep you informed about the latest developments in this space. Enjoyed every month by more than 50,000 subscribers. Written by Ivan Ristić.
Despite being broken since 2004—yes, that’s twenty years ago exactly—the MD5 hash algorithm remains in use in both some obscure and some widely used protocols. One such protocol is RADIUS, which was very popular in the past for authentication of dial-up users, but remains in use today with assorted networking equipment.
Unsurprisingly, protocols that continue to rely on MD5 are not secure, as explained in the research paper that declares RADIUS/UDP to be considered harmful. Or, if you prefer a fancy name, the paper discusses the Blast-RADIUS vulnerability.
The actual approach is a chosen-prefix attack, pioneered by Marc Stevens et al. in 2007. The name of the paper is a reference to a successful chosen-prefix attack in 2008 (discussed in “MD5 Considered Harmful Today”) that exploited MD5 to exploit a certification authority and obtain a CA certificate.
This subscription is just for the newsletter; we won't send you anything else.
When, in our previous newsletter, we wrote that Entrust was in trouble, we didn’t know that Google was going to distrust the company, but the writing was on the wall. Google’s announcement happened mere hours after our newsletter went out. What has happened since?
Entrust’s customers started to worry about the forthcoming distrust event as well as the potential availability impact. Entrust’s competitors and vendors in adjacent spaces started to use the situation as a talking point to drum up more revenue. Entrust itself started to look for ways to get out of its predicament. The company’s first response was largely just a formality, but the second response, which came a week later, outlined some specific improvements. Among other measures, the company retained Ryan Hurst, a PKI industry veteran who was recently critical of Entrust’s past activities, to advise the company on the transition.
Finally, a mere two weeks later, Entrust announced that it will continue to provide X.509 certificates via a partnership with SSL.com. This arrangement will help the company continue to serve its customer base while it works on potentially regaining its trusted status.
Here are some things that caught our attention since the previous newsletter:
Designed by Ivan Ristić, the author of SSL Labs, Bulletproof TLS and PKI, and Hardenize, our course covers everything you need to know to deploy secure servers and encrypted web applications.
Remote and trainer-led, with small classes and a choice of timezones.
Join over 2,000 students who have benefited from more than a decade of deep TLS and PKI expertise.