看板FB_security
标 题Re: compare-by-hash (was Re: sharing /etc/passwd)
发信站NCTU CSIE FreeBSD Server (Mon Sep 27 19:53:22 2004)
转信站ptt!FreeBSD.csie.NCTU!not-for-mail
On 2004-09-26 17:25, Colin Percival <
[email protected]> wrote:
> Giorgos Keramidas wrote:
> >After reading a nice paper by Val Henson[1] I'm not so sure I'd trust
> >sensitive information like password data to rsync without making sure
> >that compare-by-hash is disabled if at all possible.
>
> If you're going to disable compare-by-hash, you might as well just use
> rcp; but there's no theoretical justification for disabling
> compare-by-hash. Henson's paper points out a number of cases where
> hashing causes problems, but none of these are issues with hashing
> itself; rather, the problems arise from using hashing with an
> insufficient number of bits.
Err, no.
Henson notes that since there's no absolutely guaranteed proof that
there are *no* collisions with a given hashing algorithm, comparing by
hash value might result in two data blocks treated as identical even
though they really are not.
Increasing the number of bits the hash key uses will decrease the
possibility of a collision but never eliminate it entirely, AFAICT.
What I pointed out was that when a non-zero possibility of two data
blocks comparing as equal (even though they are no) exists, the method
in question should not be used for password data or other sensitive bits
of information. A larger hash key will never yield a possibility of
zero, so it doesn't mean that you can sleep untroubled at night while
the rsync server overwrites /etc/*pwd.db files periodically.
_______________________________________________
[email protected] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "
[email protected]"