SHA-1 vs. SHA-256 checksums (was: Different SHA1 Checksum using Microsoft file checksum integrity verifier)
Daniel Kahn Gillmor
dkg at fifthhorseman.net
Sun Jan 24 20:30:07 CET 2016
On Sun 2016-01-24 13:55:38 -0500, Werner Koch wrote:
> If you talk to people on how they verify SSH fingerprints (that is even
> MD5 for most installations)
SSH key fingerprints are a different thing than software distribution
checksums because the material digested in ssh originates entirely from
one party, whereas the software distribution checksums can potentially
be influenced by multiple parties.
> you will so often hear: “Oh, I look at the first and a few of the
> last digits only”.
right, this is not a cryptographically-strong verification :)
> We can assume that this won't be different for SHA-1 checksums - does
> anyone believe that by switching to SHA-256 they would check many more
> digits?
if they don't check more digits, then we can't help them. but it'd be
nice to offer a way for people to do a cryptographically-strong check if
they decide to do so.
but in general, i agree with you that published checksums are stopgap
measures at best, mainly fit for detecting corrupted downloads, and not
particularly useful against a targeted attack.
>> Also, the OpenPGP signature published at
>> https://files.gpg4win.org/gpg4win-2.3.0.exe.sig itself uses SHA1
>> internally. This is also a bad idea. signatures published today should
>
> Yes, that should be fixed because it is easy and not subject to the UX
> problems described above. FWIW, for GnuPG proper we switched to
> SHA-256 in 2012 (gnupg 1.4.12).
[...]
> [1] Right, the GnuPG speedo build script with its signed and published
> list of package versions also uses SHA-1 and that should be fixed
> before 2.2. (filed as bug at 2226)
great, thanks!
--dkg
More information about the Gnupg-users
mailing list