Security Basics mailing list archives

Re: CISCO MD5 encryption


From: Paul Johnston <paul.johnston () pentest co uk>
Date: Fri, 25 Feb 2011 14:33:52 +0000

Hi,

Since you can copy the running configuration text file to a virgin device
and it all works, I'd say that there's an excellent chance that any password
entered will be accepted if the hash matches -- that is, an engineered
collision is as good as recovery of the actual password.

I expect you're right, at least that if you found another password that
hashed to the same as the stored hash you'd get in.

But that is not what the collision attacks are about. They let you find
two strings, s1 and s2 where s1!=s2 but h(s1)==h(s2). They do not help
you find s1 when you already know h(s1). To use an engineered collision,
you'd have to be able to control the stored hash, or the administrator's
password. Clearly if you can do that, you have easier routes to take
control of the system that any cryptographic attack.

Paul

-- 
Pentest - When a tick in the box is not enough

Paul Johnston - IT Security Consultant / Tiger SST
Pentest Limited - ISO 9001 (cert 16055) / ISO 27001 (cert 558982)

Office: +44 (0) 161 233 0100
Mobile: +44 (0) 7817 219 072

Email policy: http://www.pentest.co.uk/legal.shtml#emailpolicy
Registered Number: 4217114 England & Wales
Registered Office: 26a The Downs, Altrincham, Cheshire, WA14 2PU, UK

------------------------------------------------------------------------
Securing Apache Web Server with thawte Digital Certificate
In this guide we examine the importance of Apache-SSL and who needs an SSL certificate.  We look at how SSL works, how 
it benefits your company and how your customers can tell if a site is secure. You will find out how to test, purchase, 
install and use a thawte Digital Certificate on your Apache web server. Throughout, best practices for set-up are 
highlighted to help you ensure efficient ongoing management of your encryption keys and digital certificates.

http://www.dinclinx.com/Redirect.aspx?36;4175;25;1371;0;5;946;e13b6be442f727d1
------------------------------------------------------------------------


Current thread: