You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Remove insecure use of md5 in Multiprocessing.connection
Pitch
We discovered uses off the md5 hash, which has been proven insecure for more than a decade, in the Multiprocessing.connection library in the methods deliver_challenge and answer_challenge. This usage was apparently added in 2013 since the default implicit hashing mode for hmac.new was deprecated at that time. hmac.new previously defaulted to MD5 if a hashing algorithm was not specified. The 2013 change brings to code back to consistency with its prior use, but that use is insecure. It should be trivial to change the two uses in this library to a SHA2/3 secure hashing function (e.g., SHA512).
Failure to update the hashing algorithm may require organizations to fully cease use of the Multiprocessing library or components of the library to meet industry security standards with respect to acceptable uses of hashing algorithms.
Thanks. To note, this is a duplicate of #61460 , and resolved will be resolved by either PR #20380 or #99425 .
Just to mention, #61460 (comment) notes that MD5 is being used as a HMAC here rather than for cryptographic signatures (the latter of which it is, of course, thoroughly broken), so while it should still be moved away from, it is not in practice an actual major security vulnerability at present.
Feature or enhancement
Remove insecure use of md5 in Multiprocessing.connection
Pitch
We discovered uses off the md5 hash, which has been proven insecure for more than a decade, in the Multiprocessing.connection library in the methods
deliver_challenge
andanswer_challenge
. This usage was apparently added in 2013 since the default implicit hashing mode forhmac.new
was deprecated at that time.hmac.new
previously defaulted to MD5 if a hashing algorithm was not specified. The 2013 change brings to code back to consistency with its prior use, but that use is insecure. It should be trivial to change the two uses in this library to a SHA2/3 secure hashing function (e.g., SHA512).Failure to update the hashing algorithm may require organizations to fully cease use of the Multiprocessing library or components of the library to meet industry security standards with respect to acceptable uses of hashing algorithms.
Linked PRs
The text was updated successfully, but these errors were encountered: