Mirror of the gdb mailing list
 help / color / mirror / Atom feed
* Release Signing Keys are Susceptible to Attack
@ 2017-08-17  2:23 R0b0t1
  2017-08-17  8:39 ` Richard Biener
  0 siblings, 1 reply; 3+ messages in thread
From: R0b0t1 @ 2017-08-17  2:23 UTC (permalink / raw)
  To: binutils, GCC Development, gdb

After downloading and verifying the releases on
ftp://ftp.gnu.org/gnu/, I found that the maintainers used 1024 bit DSA
keys with SHA1 content digests. 1024 bit keys are considered to be
susceptible to realistic attacks, and SHA1 has been considered broken
for some time.

http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-131Ar1.pdf, p17
https://shattered.io/

SHA1 is weak enough that a team of researchers was able to mount a
realistic attack at no great cost.

As compilers and their utilities are a high value target I would
appreciate it if the maintainers move to more secure verification
schemes.

Respectfully,
     R0b0t1.


^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2017-08-17 13:09 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2017-08-17  2:23 Release Signing Keys are Susceptible to Attack R0b0t1
2017-08-17  8:39 ` Richard Biener
2017-08-17 13:09   ` Paul.Koning

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox