9fans - fans of the OS Plan 9 from Bell Labs
 help / color / mirror / Atom feed
* [9fans] In case anyone worries about block hash collision in venti
@ 2010-02-06 18:47 maht
  2010-02-06 23:42 ` Tim Newsham
  0 siblings, 1 reply; 19+ messages in thread
From: maht @ 2010-02-06 18:47 UTC (permalink / raw)
  To: 9fans >> Fans of the OS Plan 9 from Bell Labs

http://www.c0t0d0s0.org/archives/6349-Perceived-Risk.html



^ permalink raw reply	[flat|nested] 19+ messages in thread

* Re: [9fans] In case anyone worries about block hash collision in venti
  2010-02-06 18:47 [9fans] In case anyone worries about block hash collision in venti maht
@ 2010-02-06 23:42 ` Tim Newsham
  2010-02-07  4:47   ` erik quanstrom
  2010-02-07 20:21   ` [9fans] In case anyone worries about block hash collision in Lyndon Nerenberg (VE6BBM/VE7TFX)
  0 siblings, 2 replies; 19+ messages in thread
From: Tim Newsham @ 2010-02-06 23:42 UTC (permalink / raw)
  To: Fans of the OS Plan 9 from Bell Labs

> http://www.c0t0d0s0.org/archives/6349-Perceived-Risk.html

Sorry, this is all bunk.  You shouldn't be worried about
an accidental collision.  You should be worried about
an intentional collision.  Especially if your filesystem
stores data that is under the attackers control such as
email messages, web page caches, etc.  So what you need
to analyze isn't how often an accidental collision happens
but how hard it is to create an intentional collision.
All the popular hash algorithms have been losing ground to
attackers lately.

The simple solution is to use a keyed hash rather than
an unkeyed one and keep the key secret from potential
attackers.

Tim Newsham | www.thenewsh.com/~newsham | thenewsh.blogspot.com



^ permalink raw reply	[flat|nested] 19+ messages in thread

* Re: [9fans] In case anyone worries about block hash collision in venti
  2010-02-06 23:42 ` Tim Newsham
@ 2010-02-07  4:47   ` erik quanstrom
  2010-02-07 16:54     ` Tim Newsham
  2010-02-07 20:21   ` [9fans] In case anyone worries about block hash collision in Lyndon Nerenberg (VE6BBM/VE7TFX)
  1 sibling, 1 reply; 19+ messages in thread
From: erik quanstrom @ 2010-02-07  4:47 UTC (permalink / raw)
  To: 9fans

> Sorry, this is all bunk.  You shouldn't be worried about
> an accidental collision.  You should be worried about
> an intentional collision.  Especially if your filesystem
> stores data that is under the attackers control such as
> email messages, web page caches, etc.  So what you need
> to analyze isn't how often an accidental collision happens
> but how hard it is to create an intentional collision.
> All the popular hash algorithms have been losing ground to
> attackers lately.

can you make this a little more concrete?  i'm having trouble
understanding how a email that an attacker controls is
a problem.  assuming the attacker can predict the headers
add well enough, this implies that the attacker, given access to
your venti, can retrieve an email said attacker sent.  where's
the problem?  i don't see it yet.

- erik



^ permalink raw reply	[flat|nested] 19+ messages in thread

* Re: [9fans] In case anyone worries about block hash collision in venti
  2010-02-07  4:47   ` erik quanstrom
@ 2010-02-07 16:54     ` Tim Newsham
  2010-02-07 17:44       ` erik quanstrom
  0 siblings, 1 reply; 19+ messages in thread
From: Tim Newsham @ 2010-02-07 16:54 UTC (permalink / raw)
  To: Fans of the OS Plan 9 from Bell Labs

>> Sorry, this is all bunk.  You shouldn't be worried about
>> an accidental collision.  You should be worried about
>> an intentional collision.  Especially if your filesystem
>> stores data that is under the attackers control such as
>> email messages, web page caches, etc.  So what you need
>> to analyze isn't how often an accidental collision happens
>> but how hard it is to create an intentional collision.
>> All the popular hash algorithms have been losing ground to
>> attackers lately.
>
> can you make this a little more concrete?  i'm having trouble
> understanding how a email that an attacker controls is
> a problem.  assuming the attacker can predict the headers
> add well enough, this implies that the attacker, given access to
> your venti, can retrieve an email said attacker sent.  where's
> the problem?  i don't see it yet.

OK, lets assume that the attacker has the most powerful attack
against a hash available in which he can construct a garbage
block of data (perhaps with some control of its content) that
hashes to a value of his choosing.  Now he predicts some data
that is likely to be written to your filesystem soon (say a
brand knew pull update that you havent pulled yet), makes
an email that has a data block in it that collides with that
block, sends that email to you.  Your filesystem stores it.
Later you do a pull and venti notices that you don't have to
store one of the blocks because it already has a block stored
with that same hash.  Now one of your files is corrupt.

Now in actuality an attacker probably doesn't have this strong
of an attack against your hash right now.  But he might have
much weaker attacks that he can use creatively to cause some
collisions that lead to corruption of data. These attacks would
be much harder, but with enough creativity you can do some
intersting things.  For example, see:
http://www.win.tue.nl/hashclash/rogue-ca/

> - erik

Tim Newsham | www.thenewsh.com/~newsham | thenewsh.blogspot.com



^ permalink raw reply	[flat|nested] 19+ messages in thread

* Re: [9fans] In case anyone worries about block hash collision in venti
  2010-02-07 16:54     ` Tim Newsham
@ 2010-02-07 17:44       ` erik quanstrom
  2010-02-07 19:12         ` Don Bailey
                           ` (2 more replies)
  0 siblings, 3 replies; 19+ messages in thread
From: erik quanstrom @ 2010-02-07 17:44 UTC (permalink / raw)
  To: 9fans

> OK, lets assume that the attacker has the most powerful attack
> against a hash available in which he can construct a garbage
> block of data (perhaps with some control of its content) that
> hashes to a value of his choosing.  Now he predicts some data
> that is likely to be written to your filesystem soon (say a
> brand knew pull update that you havent pulled yet), makes
> an email that has a data block in it that collides with that
> block, sends that email to you.  Your filesystem stores it.
> Later you do a pull and venti notices that you don't have to
> store one of the blocks because it already has a block stored
> with that same hash.  Now one of your files is corrupt.

small problems with this:

1.  the sender can't control email headers.  many
transfer agents add a random transfer-id which
would confound this attack.

2.  if the rcpt uses mbox format, the sender can't
control how your message is fit into venti blocks.
the sender would need to control the entire
mail box.

3.  http://en.wikipedia.org/wiki/SHA_hash_functions
says that there have been no SHA1 collisions found.

- erik



^ permalink raw reply	[flat|nested] 19+ messages in thread

* Re: [9fans] In case anyone worries about block hash collision in venti
  2010-02-07 17:44       ` erik quanstrom
@ 2010-02-07 19:12         ` Don Bailey
  2010-02-07 19:24         ` Nathaniel W Filardo
  2010-02-07 20:03         ` Tim Newsham
  2 siblings, 0 replies; 19+ messages in thread
From: Don Bailey @ 2010-02-07 19:12 UTC (permalink / raw)
  To: Fans of the OS Plan 9 from Bell Labs

The e-mail trick is just an example, but the scenario is still valid.
Consider an alternative scenario where an attacker is able to upload
files to your server (perhaps jpg, gif, etc) via a web application or
FTP server. Or perhaps, if someone were able to contribute source or a
tarball by uploading it to your server, this would be an issue.

Also, if a Postfix/etc server is misconfigured (or one were to be set
up by the attacker) they would have far more control of the SMTP
headers than you may realize. This would give them the ability to
reliably predict the rest of the headers stored on disk. Especially if
they've been able to see the headers from an e-mail you've previously
sent through the same network.

D

On Sun, Feb 7, 2010 at 10:44 AM, erik quanstrom <quanstro@quanstro.net> wrote:
>> OK, lets assume that the attacker has the most powerful attack
>> against a hash available in which he can construct a garbage
>> block of data (perhaps with some control of its content) that
>> hashes to a value of his choosing.  Now he predicts some data
>> that is likely to be written to your filesystem soon (say a
>> brand knew pull update that you havent pulled yet), makes
>> an email that has a data block in it that collides with that
>> block, sends that email to you.  Your filesystem stores it.
>> Later you do a pull and venti notices that you don't have to
>> store one of the blocks because it already has a block stored
>> with that same hash.  Now one of your files is corrupt.
>
> small problems with this:
>
> 1.  the sender can't control email headers.  many
> transfer agents add a random transfer-id which
> would confound this attack.
>
> 2.  if the rcpt uses mbox format, the sender can't
> control how your message is fit into venti blocks.
> the sender would need to control the entire
> mail box.
>
> 3.  http://en.wikipedia.org/wiki/SHA_hash_functions
> says that there have been no SHA1 collisions found.
>
> - erik
>
>



^ permalink raw reply	[flat|nested] 19+ messages in thread

* Re: [9fans] In case anyone worries about block hash collision in venti
  2010-02-07 17:44       ` erik quanstrom
  2010-02-07 19:12         ` Don Bailey
@ 2010-02-07 19:24         ` Nathaniel W Filardo
  2010-02-07 22:08           ` matt
  2010-02-07 20:03         ` Tim Newsham
  2 siblings, 1 reply; 19+ messages in thread
From: Nathaniel W Filardo @ 2010-02-07 19:24 UTC (permalink / raw)
  To: Fans of the OS Plan 9 from Bell Labs

[-- Attachment #1: Type: text/plain, Size: 759 bytes --]

On Sun, Feb 07, 2010 at 12:44:52PM -0500, erik quanstrom wrote:
> 1.  the sender can't control email headers.  many
> transfer agents add a random transfer-id which
> would confound this attack.
> 
> 2.  if the rcpt uses mbox format, the sender can't
> control how your message is fit into venti blocks.
> the sender would need to control the entire
> mail box.

Fine, so he sends the evil document as a MIME attachment and you decode it
into its own file to see what it is, just as fossil takes its nightly
snapshot and flings data off to venti.
 
> 3.  http://en.wikipedia.org/wiki/SHA_hash_functions
> says that there have been no SHA1 collisions found.

Up until relatively recently, that would have been true for MD5 as well.

--nwf;

[-- Attachment #2: Type: application/pgp-signature, Size: 204 bytes --]

^ permalink raw reply	[flat|nested] 19+ messages in thread

* Re: [9fans] In case anyone worries about block hash collision in venti
  2010-02-07 17:44       ` erik quanstrom
  2010-02-07 19:12         ` Don Bailey
  2010-02-07 19:24         ` Nathaniel W Filardo
@ 2010-02-07 20:03         ` Tim Newsham
  2010-02-08 21:58           ` Georg Lehner
  2 siblings, 1 reply; 19+ messages in thread
From: Tim Newsham @ 2010-02-07 20:03 UTC (permalink / raw)
  To: Fans of the OS Plan 9 from Bell Labs

> 1.  the sender can't control email headers.  many
> transfer agents add a random transfer-id which
> would confound this attack.

If you know the size of the transfer id, you can pad out
to the next full block size.

> 2.  if the rcpt uses mbox format, the sender can't
> control how your message is fit into venti blocks.
> the sender would need to control the entire
> mail box.

I'm ignorant on this front.

> 3.  http://en.wikipedia.org/wiki/SHA_hash_functions
> says that there have been no SHA1 collisions found.

IIUC there has been significant progress in attacking
all major hash functions and the cryptographic community
has low confidence in all major hash functions at the
moment.  Some hash algorithms have more serious attacks
than others, but once a few weaknesses are found its
usually an indication that the algorithm will fall soon.

Re: SHA1, it looks like the strenght has been whittled
down to around 2^52 operations:
http://www.schneier.com/blog/archives/2009/06/ever_better_cry.html

I'm not saying that there is a viable attack against
your SHA-indexed venti right now.  I'm saying that its
bunk to evaluate the storage system simply on how likely
it is for a random collision to occur.  The proper analysis
is how hard it is for a malicious attacker to cause a
collision now and in the near future.

> - erik

Tim Newsham | www.thenewsh.com/~newsham | thenewsh.blogspot.com



^ permalink raw reply	[flat|nested] 19+ messages in thread

* Re: [9fans] In case anyone worries about block hash collision in
  2010-02-06 23:42 ` Tim Newsham
  2010-02-07  4:47   ` erik quanstrom
@ 2010-02-07 20:21   ` Lyndon Nerenberg (VE6BBM/VE7TFX)
  2010-02-07 20:31     ` erik quanstrom
  1 sibling, 1 reply; 19+ messages in thread
From: Lyndon Nerenberg (VE6BBM/VE7TFX) @ 2010-02-07 20:21 UTC (permalink / raw)
  To: 9fans

>  You shouldn't be worried about
> an accidental collision.  You should be worried about
> an intentional collision.

Seems to me you should be worried about both.




^ permalink raw reply	[flat|nested] 19+ messages in thread

* Re: [9fans] In case anyone worries about block hash collision in
  2010-02-07 20:21   ` [9fans] In case anyone worries about block hash collision in Lyndon Nerenberg (VE6BBM/VE7TFX)
@ 2010-02-07 20:31     ` erik quanstrom
  2010-02-07 20:57       ` Lyndon Nerenberg (VE6BBM/VE7TFX)
  0 siblings, 1 reply; 19+ messages in thread
From: erik quanstrom @ 2010-02-07 20:31 UTC (permalink / raw)
  To: 9fans

On Sun Feb  7 15:22:57 EST 2010, lyndon@orthanc.ca wrote:
> >  You shouldn't be worried about
> > an accidental collision.  You should be worried about
> > an intentional collision.
>
> Seems to me you should be worried about both.

let's not get carried away.  the odds of accidental
collision are 1 2^80.

- erik



^ permalink raw reply	[flat|nested] 19+ messages in thread

* Re: [9fans] In case anyone worries about block hash collision in
  2010-02-07 20:31     ` erik quanstrom
@ 2010-02-07 20:57       ` Lyndon Nerenberg (VE6BBM/VE7TFX)
  2010-02-07 23:25         ` Akshat Kumar
  0 siblings, 1 reply; 19+ messages in thread
From: Lyndon Nerenberg (VE6BBM/VE7TFX) @ 2010-02-07 20:57 UTC (permalink / raw)
  To: 9fans

>> Seems to me you should be worried about both.
>
> let's not get carried away.  the odds of accidental
> collision are 1 2^80.

And being worried about both leads to the choice of SHA-1 as a suitable
algorithm. If we weren't worried about it I'm sure some bright light would
have picked ROT-13 for performance reasons.




^ permalink raw reply	[flat|nested] 19+ messages in thread

* Re: [9fans] In case anyone worries about block hash collision in venti
  2010-02-07 19:24         ` Nathaniel W Filardo
@ 2010-02-07 22:08           ` matt
  2010-02-08 23:37             ` Nathaniel W Filardo
  0 siblings, 1 reply; 19+ messages in thread
From: matt @ 2010-02-07 22:08 UTC (permalink / raw)
  To: Fans of the OS Plan 9 from Bell Labs

not only has someone got to find a collision during a tiny timeframe,
they also have to fit it in 8k



^ permalink raw reply	[flat|nested] 19+ messages in thread

* Re: [9fans] In case anyone worries about block hash collision in
  2010-02-07 20:57       ` Lyndon Nerenberg (VE6BBM/VE7TFX)
@ 2010-02-07 23:25         ` Akshat Kumar
  2010-02-08  0:37           ` Russ Cox
  0 siblings, 1 reply; 19+ messages in thread
From: Akshat Kumar @ 2010-02-07 23:25 UTC (permalink / raw)
  To: Fans of the OS Plan 9 from Bell Labs

The case of intentional collisions is stronger
than that of accidental collisions. If one were
to worry about the former with regards to
ROT-13, then the idea would be discarded
before the latter ever became an issue.

On Sun, Feb 7, 2010 at 12:57 PM, Lyndon Nerenberg (VE6BBM/VE7TFX)
<lyndon@orthanc.ca> wrote:
>>> Seems to me you should be worried about both.
>>
>> let's not get carried away.  the odds of accidental
>> collision are 1 2^80.
>
> And being worried about both leads to the choice of SHA-1 as a suitable
> algorithm. If we weren't worried about it I'm sure some bright light would
> have picked ROT-13 for performance reasons.
>
>
>



^ permalink raw reply	[flat|nested] 19+ messages in thread

* Re: [9fans] In case anyone worries about block hash collision in
  2010-02-07 23:25         ` Akshat Kumar
@ 2010-02-08  0:37           ` Russ Cox
  0 siblings, 0 replies; 19+ messages in thread
From: Russ Cox @ 2010-02-08  0:37 UTC (permalink / raw)
  To: Fans of the OS Plan 9 from Bell Labs

[-- Attachment #1: Type: text/plain, Size: 383 bytes --]

On Sun, Feb 7, 2010 at 3:25 PM, Akshat Kumar <akumar@mail.nanosouffle.net>wrote:

> The case of intentional collisions is stronger
> than that of accidental collisions. If one were
> to worry about the former with regards to
> ROT-13, then the idea would be discarded
> before the latter ever became an issue.
>

Especially since ROT-13 is provably collision free.

Russ

[-- Attachment #2: Type: text/html, Size: 684 bytes --]

^ permalink raw reply	[flat|nested] 19+ messages in thread

* Re: [9fans] In case anyone worries about block hash collision in venti
  2010-02-07 20:03         ` Tim Newsham
@ 2010-02-08 21:58           ` Georg Lehner
  0 siblings, 0 replies; 19+ messages in thread
From: Georg Lehner @ 2010-02-08 21:58 UTC (permalink / raw)
  To: Fans of the OS Plan 9 from Bell Labs

About a year ago i wrote a (kind of vapourware) backup system called Baccus,
based on content addressed storage. Most ideas are stolen from Plan9/venti,
but for the here discussed reasons i used the Salsa family of hashes
from Dan
Bernstein:

http://cr.yp.to/chacha.html

Respectively the Rumba-"compression":

http://cr.yp.to/rumba20.html

I combined hashing and encryption with Salsa/Rumba into one step.

The hash function in Baccus is pluggable, so the user could decide which to use
and would be able to upgrade to a stronger hash.

Maybe pluggability of the hash function would be a nice addition to venti
(if it is not there anyways).  Also Salsa should be considered a valuable addition
to Plan9.

Regards,

	Jorge-Le�n

P.S.: Here is the link to Baccus: http://wiki.tcl.tk/23064, but beware: it is in a bad
state and style.  Didn't have time to improve since then.  If you still want to look
at it, start with reading the CREDITS file.

PS2: You need at least eight rounds, else you get lots of hash-collisions.


Tim Newsham wrote:
>> 1.  the sender can't control email headers.  many
>> transfer agents add a random transfer-id which
>> would confound this attack.
>
> If you know the size of the transfer id, you can pad out
> to the next full block size.
>
>> 2.  if the rcpt uses mbox format, the sender can't
>> control how your message is fit into venti blocks.
>> the sender would need to control the entire
>> mail box.
>
> I'm ignorant on this front.
>
>> 3.  http://en.wikipedia.org/wiki/SHA_hash_functions
>> says that there have been no SHA1 collisions found.
>
> IIUC there has been significant progress in attacking
> all major hash functions and the cryptographic community
> has low confidence in all major hash functions at the
> moment.  Some hash algorithms have more serious attacks
> than others, but once a few weaknesses are found its
> usually an indication that the algorithm will fall soon.
>
> Re: SHA1, it looks like the strenght has been whittled
> down to around 2^52 operations:
> http://www.schneier.com/blog/archives/2009/06/ever_better_cry.html
>
> I'm not saying that there is a viable attack against
> your SHA-indexed venti right now.  I'm saying that its
> bunk to evaluate the storage system simply on how likely
> it is for a random collision to occur.  The proper analysis
> is how hard it is for a malicious attacker to cause a
> collision now and in the near future.
>
>> - erik
>
> Tim Newsham | www.thenewsh.com/~newsham | thenewsh.blogspot.com
>




^ permalink raw reply	[flat|nested] 19+ messages in thread

* Re: [9fans] In case anyone worries about block hash collision in venti
  2010-02-07 22:08           ` matt
@ 2010-02-08 23:37             ` Nathaniel W Filardo
  2010-02-09 13:13               ` hiro
  0 siblings, 1 reply; 19+ messages in thread
From: Nathaniel W Filardo @ 2010-02-08 23:37 UTC (permalink / raw)
  To: Fans of the OS Plan 9 from Bell Labs

[-- Attachment #1: Type: text/plain, Size: 2660 bytes --]

On Sun, Feb 07, 2010 at 10:08:39PM +0000, matt wrote:
> not only has someone got to find a collision during a tiny timeframe,  
> they also have to fit it in 8k

MD5 collisions can, apparently, be constructed in 24 hours on a laptop these
days.  Yes, it's a constraint, but.

Venti supports larger blocks than 8K, and even if it didn't, the exhibited
MD5 collisions to date are short strings and would fit.  Working with larger
data feels like it would be unlikely to be advantageous to the collision
search -- 8K is much more than 20 bytes, and so there should be plenty of
pidgeons to cram into holes.

In any case, I fear that the point has been lost in details.  Something
about forests and trees.  So:

The point was not to say that you shouldn't be using venti; it's a lovely
idea and the code does its job somewhat well, bugs aside.  The point was to
object to the kind of analysis which postulates that you need to store 2^98
blocks with a 256 bit hash (or 2^50 for 160-bit hashes) before collisions
start be meaningful.

If you're storing iid uniformly-selected-at-random blocks of iid uniform
noise then yes, that's true, but you're not and besides the instantiation of
the random oracle model you're using (SHA-1) isn't perfect.  As such, we
should expect to see collisions after many fewer blocks stored -- strictly,
the iid uniform-at-random selection criterion yields an upper bound.

One way to demonstrate this upper-bound nature is to exhibit work on hash
collisions and the reduction in estimated security margins.  To take an
extreme case, the Fletcher checksum or your favorite CRC polynomial can be
extended to be perfectly valid 160 bit hash, but the lack of cryptographic
security makes it laughably easy to collide blocks.  Surely you'd be dubious
of a Venti where I replaced SHA-1 with such an extended Fletcher?  (It'd be
faster, too!)  Why?  Selection of blocks iid uniformly-at-random should mean
that it will take exactly as many blocks as before, before you see a
problem...  SHA-1 is not laughably easy to break by any stretch of the
imagination, but it also isn't the "impossibly hard" you'd get in the random
oracle model either.

(While nitpicking about the analysis, I feel compelled to add that hardware
uncorrectable bitflips are still reported as erasures, whereas venti
collisions are reported as success and only caught if somebody's doing
checksumming at larger granularity.  So at least in the one case you know
you're in trouble.  Collisions in venti act as if the disk corrupted so many
bits that we move into the correctable region for a different codeword.)

--nwf;

[-- Attachment #2: Type: application/pgp-signature, Size: 204 bytes --]

^ permalink raw reply	[flat|nested] 19+ messages in thread

* Re: [9fans] In case anyone worries about block hash collision in venti
  2010-02-08 23:37             ` Nathaniel W Filardo
@ 2010-02-09 13:13               ` hiro
  2010-02-09 13:50                 ` ron minnich
  0 siblings, 1 reply; 19+ messages in thread
From: hiro @ 2010-02-09 13:13 UTC (permalink / raw)
  To: Fans of the OS Plan 9 from Bell Labs

>I feel compelled to add that hardware
>uncorrectable bitflips are still reported as erasures, whereas venti
>collisions are reported as success and only caught if somebody's doing
>checksumming at larger granularity.

Uncorrectable bitflips can also be unreported.

If you are really paranoid and don't want any collisions in the next
10 years: don't let strangers in your venti.

On 2/9/10, Nathaniel W Filardo <nwf@cs.jhu.edu> wrote:
> On Sun, Feb 07, 2010 at 10:08:39PM +0000, matt wrote:
>> not only has someone got to find a collision during a tiny timeframe,
>> they also have to fit it in 8k
>
> MD5 collisions can, apparently, be constructed in 24 hours on a laptop these
> days.  Yes, it's a constraint, but.
>
> Venti supports larger blocks than 8K, and even if it didn't, the exhibited
> MD5 collisions to date are short strings and would fit.  Working with larger
> data feels like it would be unlikely to be advantageous to the collision
> search -- 8K is much more than 20 bytes, and so there should be plenty of
> pidgeons to cram into holes.
>
> In any case, I fear that the point has been lost in details.  Something
> about forests and trees.  So:
>
> The point was not to say that you shouldn't be using venti; it's a lovely
> idea and the code does its job somewhat well, bugs aside.  The point was to
> object to the kind of analysis which postulates that you need to store 2^98
> blocks with a 256 bit hash (or 2^50 for 160-bit hashes) before collisions
> start be meaningful.
>
> If you're storing iid uniformly-selected-at-random blocks of iid uniform
> noise then yes, that's true, but you're not and besides the instantiation of
> the random oracle model you're using (SHA-1) isn't perfect.  As such, we
> should expect to see collisions after many fewer blocks stored -- strictly,
> the iid uniform-at-random selection criterion yields an upper bound.
>
> One way to demonstrate this upper-bound nature is to exhibit work on hash
> collisions and the reduction in estimated security margins.  To take an
> extreme case, the Fletcher checksum or your favorite CRC polynomial can be
> extended to be perfectly valid 160 bit hash, but the lack of cryptographic
> security makes it laughably easy to collide blocks.  Surely you'd be dubious
> of a Venti where I replaced SHA-1 with such an extended Fletcher?  (It'd be
> faster, too!)  Why?  Selection of blocks iid uniformly-at-random should mean
> that it will take exactly as many blocks as before, before you see a
> problem...  SHA-1 is not laughably easy to break by any stretch of the
> imagination, but it also isn't the "impossibly hard" you'd get in the random
> oracle model either.
>
> (While nitpicking about the analysis, I feel compelled to add that hardware
> uncorrectable bitflips are still reported as erasures, whereas venti
> collisions are reported as success and only caught if somebody's doing
> checksumming at larger granularity.  So at least in the one case you know
> you're in trouble.  Collisions in venti act as if the disk corrupted so many
> bits that we move into the correctable region for a different codeword.)
>
> --nwf;
>



^ permalink raw reply	[flat|nested] 19+ messages in thread

* Re: [9fans] In case anyone worries about block hash collision in venti
  2010-02-09 13:13               ` hiro
@ 2010-02-09 13:50                 ` ron minnich
  2010-02-09 14:54                   ` erik quanstrom
  0 siblings, 1 reply; 19+ messages in thread
From: ron minnich @ 2010-02-09 13:50 UTC (permalink / raw)
  To: Fans of the OS Plan 9 from Bell Labs

On Tue, Feb 9, 2010 at 5:13 AM, hiro <23hiro@googlemail.com> wrote:

> If you are really paranoid and don't want any collisions in the next
> 10 years: don't let strangers in your venti.

Which, to close the circle, as Tim points out, you are always doing,
each time you receive an email :-)

ron



^ permalink raw reply	[flat|nested] 19+ messages in thread

* Re: [9fans] In case anyone worries about block hash collision in venti
  2010-02-09 13:50                 ` ron minnich
@ 2010-02-09 14:54                   ` erik quanstrom
  0 siblings, 0 replies; 19+ messages in thread
From: erik quanstrom @ 2010-02-09 14:54 UTC (permalink / raw)
  To: 9fans

> > If you are really paranoid and don't want any collisions in the next
> > 10 years: don't let strangers in your venti.
>
> Which, to close the circle, as Tim points out, you are always doing,
> each time you receive an email :-)

not all email is from strangers.

in mbox format, messages are concatinated.  for a block
size of b, the size of the existing mailbox is 0 ... b-1 mod b.
therefore, there is a 1/b chance of the attack succeeding, even
if the attacker knows the block size and pads to the next
block.  i suppose that this is a fair assumption, since we're
given that the attacker is attacking venti.

this is esentially the same reason that mbox format will eat alot
of storage, even if you're using venti.

- erik



^ permalink raw reply	[flat|nested] 19+ messages in thread

end of thread, other threads:[~2010-02-09 14:54 UTC | newest]

Thread overview: 19+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2010-02-06 18:47 [9fans] In case anyone worries about block hash collision in venti maht
2010-02-06 23:42 ` Tim Newsham
2010-02-07  4:47   ` erik quanstrom
2010-02-07 16:54     ` Tim Newsham
2010-02-07 17:44       ` erik quanstrom
2010-02-07 19:12         ` Don Bailey
2010-02-07 19:24         ` Nathaniel W Filardo
2010-02-07 22:08           ` matt
2010-02-08 23:37             ` Nathaniel W Filardo
2010-02-09 13:13               ` hiro
2010-02-09 13:50                 ` ron minnich
2010-02-09 14:54                   ` erik quanstrom
2010-02-07 20:03         ` Tim Newsham
2010-02-08 21:58           ` Georg Lehner
2010-02-07 20:21   ` [9fans] In case anyone worries about block hash collision in Lyndon Nerenberg (VE6BBM/VE7TFX)
2010-02-07 20:31     ` erik quanstrom
2010-02-07 20:57       ` Lyndon Nerenberg (VE6BBM/VE7TFX)
2010-02-07 23:25         ` Akshat Kumar
2010-02-08  0:37           ` Russ Cox

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).