Re: [CGA-EXT] comments on draft-ietf-csi-hash-threat-03

Sheng Jiang <shengjiang@huawei.com> Tue, 22 September 2009 07:11 UTC

Return-Path: <shengjiang@huawei.com>
X-Original-To: cga-ext@core3.amsl.com
Delivered-To: cga-ext@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 1C9623A683D for <cga-ext@core3.amsl.com>; Tue, 22 Sep 2009 00:11:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.069
X-Spam-Level:
X-Spam-Status: No, score=-0.069 tagged_above=-999 required=5 tests=[AWL=-0.174, BAYES_00=-2.599, FH_RELAY_NODNS=1.451, HELO_MISMATCH_COM=0.553, J_CHICKENPOX_41=0.6, RDNS_NONE=0.1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aHkwfcDLmmTH for <cga-ext@core3.amsl.com>; Tue, 22 Sep 2009 00:11:17 -0700 (PDT)
Received: from szxga04-in.huawei.com (unknown [119.145.14.67]) by core3.amsl.com (Postfix) with ESMTP id 23C933A6858 for <cga-ext@ietf.org>; Tue, 22 Sep 2009 00:11:17 -0700 (PDT)
Received: from huawei.com (szxga04-in [172.24.2.12]) by szxga04-in.huawei.com (iPlanet Messaging Server 5.2 HotFix 2.14 (built Aug 8 2006)) with ESMTP id <0KQD00I9O2O9BD@szxga04-in.huawei.com> for cga-ext@ietf.org; Tue, 22 Sep 2009 15:12:09 +0800 (CST)
Received: from huawei.com ([172.24.1.33]) by szxga04-in.huawei.com (iPlanet Messaging Server 5.2 HotFix 2.14 (built Aug 8 2006)) with ESMTP id <0KQD005472O9CI@szxga04-in.huawei.com> for cga-ext@ietf.org; Tue, 22 Sep 2009 15:12:09 +0800 (CST)
Received: from j66104a ([10.111.12.58]) by szxml06-in.huawei.com (iPlanet Messaging Server 5.2 HotFix 2.14 (built Aug 8 2006)) with ESMTPA id <0KQD001YJ2O8LW@szxml06-in.huawei.com> for cga-ext@ietf.org; Tue, 22 Sep 2009 15:12:09 +0800 (CST)
Date: Tue, 22 Sep 2009 15:12:08 +0800
From: Sheng Jiang <shengjiang@huawei.com>
In-reply-to: <4AB72DC2.6040400@it.uc3m.es>
To: 'marcelo bagnulo braun' <marcelo@it.uc3m.es>, 'Ana Kukec' <anchie@fer.hr>, 'Suresh Krishnan' <suresh.krishnan@ericsson.com>, cga-ext@ietf.org
Message-id: <004801ca3b53$ffc538c0$3a0c6f0a@china.huawei.com>
MIME-version: 1.0
X-MIMEOLE: Produced By Microsoft MimeOLE V6.00.2900.3350
X-Mailer: Microsoft Office Outlook 11
Content-type: text/plain; charset="us-ascii"
Content-transfer-encoding: 7bit
Thread-index: Aco6k0ejIxpe3+InQG+I35zkGASvGwAwEOtA
Subject: Re: [CGA-EXT] comments on draft-ietf-csi-hash-threat-03
X-BeenThere: cga-ext@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: CGA and SeND Extensions <cga-ext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/cga-ext>, <mailto:cga-ext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/cga-ext>
List-Post: <mailto:cga-ext@ietf.org>
List-Help: <mailto:cga-ext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/cga-ext>, <mailto:cga-ext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 22 Sep 2009 07:11:18 -0000

Hi, Marcelo,

Thanks  so much for your comments. They are reasonable for me. They will be
reflected in the next version that we are working on now. Ana has the token
of editing now. She will modified this draft accordingly, then submit a new
update version soon.

Best regards,

Sheng

> -----Original Message-----
> From: marcelo bagnulo braun [mailto:marcelo@it.uc3m.es] 
> Sent: Monday, September 21, 2009 3:40 PM
> To: Ana Kukec; Suresh Krishnan; JiangSheng 66104; cga-ext@ietf.org
> Subject: comments on draft-ietf-csi-hash-threat-03
> 
> Hi,
> 
> I have reviewed this document and i have some comments:
> 
> Substantial:
> =============
> 
> Issue #1
> ---------
> 
> In section 3.3. Attacks against the Digital Signature in the 
> SEND Universal Signature option
> 
> I don't think the document should make an analysis of the 
> SEND universal signature option yet to be defined and for 
> whicht he WG has no consensus yet.
> I think the hash analysis required is to be performed about 
> the current
> rfc3971 spec.
> So I suggest to remove all the text referring to the 
> PK-agility and leave only the text about the signature option 
> as defined in rfc3971
> 
> Issue #2
> --------
> 
> Then in section 3.3. it reads:
> 
> The possible attack on such explicit digital signature is a
>    typical non-repudiation attack, i.e. the Digital Signature field is
>    vulnerable to the collision attack.  An attacker produces two
>    different messages, m and m', where hash(m) = hash(m').  
> He underlays
>    one of the messages to be signed with the key authorized through
>    CGAs, but uses another message afterwards.  However, as denoted in
>    [rfc4270], the structure of at least one of two messages in a
>    collision attack is strictly predefined.  The previous requirement
>    complicates the collision attack, but we have to take into account
>    that a variant of SHA-1 was already affected by recent collision
>    attacks and we have to prepare for future improved attacks.
> 
> I fail to understnad what is the impact of this attack. I 
> mean, it means that the attacker could manage to make a host 
> to sign one message and then present another one. I 
> understnad that. How this applies in the cntext of SeND? 
> could you make an more clear example of what can be done in 
> the actual send protocol?
> 
> Issue #3
> --------
> 
> In section 3.4. Attacks against the Key Hash in the SEND 
> Universal Signature option it covers the analysis for the 
> SeND universal signature option.
> Similarly, remove that part and only cover the fields defined 
> in rfc3971
> 
> Issue #4
> --------
> 
> In section 4.1. The negotiation approach for the SEND hash 
> agility it reads:
> 
>    None of the previous solutions supports the negotiation of the hash
>    function.  Therefore we propose the negotiation approach 
> for the SEND
> 
> I don't think this document proposes anything. I think this 
> should be rephrased as another possible option in order to 
> support hash agility (like the others that have been 
> described earlier in the section)
> 
> Issue #5
> --------
> 
> In section 3, the attacks against the one property are 
> described in detail but the one against the collision 
> property is not. Sionce the last one is the one we care the 
> most, i would suggest some text is added describing it with 
> the same level of detail.
> 
> regards, marcelo
> 
> 
> 
>