Skip to content

Insecure MD5 usage in Multiprocessing.connection #100755

Closed as not planned
Closed as not planned
@bdrodes

Description

@bdrodes

Feature or enhancement

Remove insecure use of md5 in Multiprocessing.connection

Pitch

We discovered uses off the md5 hash, which has been proven insecure for more than a decade, in the Multiprocessing.connection library in the methods deliver_challenge and answer_challenge. This usage was apparently added in 2013 since the default implicit hashing mode for hmac.new was deprecated at that time. hmac.new previously defaulted to MD5 if a hashing algorithm was not specified. The 2013 change brings to code back to consistency with its prior use, but that use is insecure. It should be trivial to change the two uses in this library to a SHA2/3 secure hashing function (e.g., SHA512).

Failure to update the hashing algorithm may require organizations to fully cease use of the Multiprocessing library or components of the library to meet industry security standards with respect to acceptable uses of hashing algorithms.

Linked PRs

Metadata

Metadata

Assignees

No one assigned

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions