SSL certificates are one of the most common ways for firms to prove that their web sites are secure and authentic. By creating false certificates, hackers could deter online shoppers and possibly undermine consumer faith in e-commerce.
The so-called 'collision attack' flaw, first published by researchers at the Chaos Communication Congress last week, was aimed at the MD5 hashing algorithm of certificates issued by the RapidSSL authority, according to VeriSign.
"This presentation showed how to combine MD5 collision attacks with some other clever bits of hacking to create a false certificate," Tim Callan, VeriSign's vice president of SSL product marketing, said in a blog posting.
"We have discontinued using MD5 when we issue RapidSSL certificates, and we've confirmed that all other SSL certificates we sell are not vulnerable to this attack."
VeriSign has now transitioned to the SHA-1 algorithm on new RapidSSL brand certificates, and said that it will replace MD5 certificates for existing customers free of charge.
Callan added that the company aims to discontinue MD5 in "all end entity certificates" by the end of this month.
Matthew Tyler, director of consultancy firm Evolution Security Systems, explained that the MD5 flaw highlights why certificate authorities must "keep up to speed" with the latest security threats.
"As computing power increases there is a need to keep algorithms in pace with this change. MD5 was created over 18 years ago and had issues even before it went live in 1996 over 12 years ago," he said.
"MD5 is an old and debunked hashing algorithm and should have been phased out by the slightly more secure SHA-1/2, with SHA-3 due for 2012."
Extended Validation SSL Certificates, which VeriSign has been promoting vigorously since their launch in late 2006, are not affected by the flaw.
VeriSign addresses SSL certificate flaw
By Phil Muncaster on Jan 6, 2009 6:32AM