This may be news to some, but a repetition to those already in the know.
In the past there has been evidence to show how MD5 collision can lead to the abuse of signatures from a certicate of authority.
A post by Jürgen Schmidt covers some new tests by some rich hacker folks who have 200 PS3’s and use these to carry out some SSL MD5 hash collision attacks.
Excerpt –
Using a cluster of 200 Playstation 3 systems, it took the researchers two days to create two valid certificate requests with predetermined data fields that resulted in identical hash values. The researchers only modified the contents of unimportant fields, for example the Netscape comment extension. They got the RapidSSL Certification Authority to sign the first request, issued for a domain in their possession. Then they attached this digital signature to the second certificate that confirmed the identity of the fictitious “MD5 Collisions Inc.” Certification Authority. Since the second certificate’s hash value is identical to that of the signed original, no program can detect the forgery.
This approach is called a collision attack. Attackers can modify both the subsequently presented forged certificate and the pre-signature original, until two samples with the same hash value are produced.
This is all well and good and interesting, but what can you do about it? Well now there is a Firefox plugin aimed at helping to identify if the website you are visiting has suffered from this attack.
The Firefox extension that will alert you when visiting a potentially compromised site. The extension works a little magic in the background to determine if the SSL certificate you’re trusting to keep your transaction safe is one which could be dangerous, thus giving you a little added protection from the rough and ragged world of cybercrime.
You can download it here.