Security/Features/Content Hashing/Spec: Difference between revisions

no edit summary
No edit summary
No edit summary
Line 5: Line 5:


=Use cases=
=Use cases=
= Technical issues =
== External elements update ==
=Potential security issues=
== Second image collision attack ==
An attacker can potentially create a hash collision between a specially crafted file and a well known file if the hashing algorithm is weak.
MD5 must be avoided at all cost.
== Integrity ==
Using the hash as an integrity mechanism is tricky because it can be delivered over HTTP. In this case a Man in the Middle attack can be performed.
Communicate this limitations to user and developer is tricky. 
= Previous work ==
Previous work on the subject:
* http://wiki.whatwg.org/wiki/Link_Hashes
* http://www.gerv.net/security/link-fingerprints/
5

edits