Pre-patch, a cert can be used if the hash of the public key matches one in the cert root, after which the parameters of the new cert get used, enabling Vaudenay's attack. The patch requires the curve parameters to be the same, preventing this attack.
-
Prikaži ovu nit
-
This is ultimately similar to Pornin and Stern https://www.bolet.org/~pornin/2005-acns-pornin+stern.pdf … (2005). (Which we built on for https://ia.cr/2019/779 )
1 reply 2 proslijeđena tweeta 23 korisnika označavaju da im se sviđaPrikaži ovu nit -
Based on what I know now, I think the attack fits into a single tweet, including references:
1 reply 2 proslijeđena tweeta 11 korisnika označava da im se sviđaPrikaži ovu nit -
1. Find an ecc root cert C with pk 2. Apply Vaudenay|(Pornin&Stern) 2004 get C' with sk',params' for that pk 3. Create a normal code signing cert C'' with key pair (pk'',sk'') and sign software with sk'' 4. Sign C'' with sk' 5. Present software,C'',C' to windows' sigcheck64.exe
1 reply 33 proslijeđena tweeta 95 korisnika označava da im se sviđaPrikaži ovu nit -
0 proslijeđenih tweetova 3 korisnika označavaju da im se sviđaPrikaži ovu nit
-
Can someone please confirm/deny if this degenerate version works? (It is still Vaudenay 2004 but with d' the identity)
@kennwhite@saleemrash1d It would be easier to detect in logs of course.1 reply 1 proslijeđeni tweet 5 korisnika označava da im se sviđaPrikaži ovu nit -
1. Find an ecc root cert C 2. Create C' with the same public key and curve but set the generator to the public key of C 3. Create a normal signing cert C'' with key pair (pk'',sk'') and sign software/cert with sk'' 4. Sign C'' with sk=1 5. Ship software/cert with C'' and C'
68 proslijeđenih tweetova 156 korisnika označava da im se sviđaPrikaži ovu nit -
This degenerate case was just confirmed to work by
@reaperhulk , thank you! (@kennyog@kennwhite )7 proslijeđenih tweetova 31 korisnik označava da mu se sviđaPrikaži ovu nit -
@kennwhite Curve Validation Errorpic.twitter.com/8XEQc9JYwf
1 reply 0 proslijeđenih tweetova 9 korisnika označava da im se sviđaPrikaži ovu nit -
When comparing a received cert to cached root certs, windows only compared the public keys, but not the parameters, and would therefore assume that a received fake root cert C' with different parameters was the same as a cached root cert C, using C' to verify the cert chain.
3 proslijeđena tweeta 5 korisnika označava da im se sviđaPrikaži ovu nit
By choosing the right parameters for C', you can know the private key for C' -- even when you don't know the private key for C -- as Vaudenay noted in 2004.
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.