Re: [Dcrup] rsa-sha1 usage
Scott Kitterman <sklist@kitterman.com> Tue, 13 June 2017 15:54 UTC
Return-Path: <sklist@kitterman.com>
X-Original-To: dcrup@ietfa.amsl.com
Delivered-To: dcrup@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D8E1A131C2E for <dcrup@ietfa.amsl.com>; Tue, 13 Jun 2017 08:54:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.001
X-Spam-Level:
X-Spam-Status: No, score=-2.001 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=kitterman.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vbqLcVd_kg90 for <dcrup@ietfa.amsl.com>; Tue, 13 Jun 2017 08:54:30 -0700 (PDT)
Received: from mailout03.controlledmail.com (mailout03.controlledmail.com [208.43.65.50]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AD37713192E for <dcrup@ietf.org>; Tue, 13 Jun 2017 08:43:29 -0700 (PDT)
Received: from [10.220.112.173] (mobile-166-171-56-130.mycingular.net [166.171.56.130]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mailout03.controlledmail.com (Postfix) with ESMTPSA id 4C63BC40349; Tue, 13 Jun 2017 10:43:28 -0500 (CDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=kitterman.com; s=201409; t=1497368608; bh=p6Mnf/XUMLfzo8tPAYmXz+JK4PAsNFx32y9L5UzHEBY=; h=Date:In-Reply-To:References:Subject:To:From:From; b=woLgCIPR9iaGL5P3m0I7MpQLnBcEe7aJSIlPsxfNtAmbFm0j9tXDSCrzwAV1W4QYL BKdXLecllQIRM0H+oschNOHlISfw7cy7wmRTLLbHq9zuImsdeU6ULbC9c/E31LSCOk ZJR4Cgz2YEgow9eRyzEE0uF+PFeq/EWJ6THLa25k=
Date: Tue, 13 Jun 2017 15:43:25 +0000
In-Reply-To: <aa52134a-ac20-bd70-8834-1598a8eaa536@bluepopcorn.net>
References: <m38tkw53bd.fsf@carbon.jhcloos.org> <CABa8R6s6rzc+Ky8sLWcK7NtforSksEhNRkWVeF=k1v8GC80knw@mail.gmail.com> <m3wp8gpx20.fsf@carbon.jhcloos.org> <CAOj=BA2O+Hf2VGOtbmnqY2M5J9u8uJ7wm7SxEW551SXBwDdanw@mail.gmail.com> <5bf52517591d4950aec335d31bcf3631@usma1ex-dag1mb1.msg.corp.akamai.com> <aa52134a-ac20-bd70-8834-1598a8eaa536@bluepopcorn.net>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
To: dcrup@ietf.org
From: Scott Kitterman <sklist@kitterman.com>
Message-ID: <29B74569-6BB3-43F8-9549-566DA405B1FF@kitterman.com>
Archived-At: <https://mailarchive.ietf.org/arch/msg/dcrup/55Bdia72yEA9LAdBFZOGefYy55Q>
Subject: Re: [Dcrup] rsa-sha1 usage
X-BeenThere: dcrup@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: DKIM Crypto Update <dcrup.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dcrup>, <mailto:dcrup-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dcrup/>
List-Post: <mailto:dcrup@ietf.org>
List-Help: <mailto:dcrup-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dcrup>, <mailto:dcrup-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 13 Jun 2017 15:54:33 -0000
On June 13, 2017 10:41:42 AM EDT, Jim Fenton <fenton@bluepopcorn.net> wrote: >On 6/13/17 5:05 AM, Salz, Rich wrote: >> >> As a newcomer to DKIM (I come from the crypto side of things) I am a >> bit confused. >> >> >> >> Certificates last for a couple of years, and so there was a strong >> motivation to move off MD5 and then SHA1, because of the concern that >> someone would find a collision and create a bogus certificate during >> the original cert’s lifetime. >> >> >> >> But I’ve heard that DKIM “trust lifetime” is much shorter. Is it? >> What is the expected lifetime for relying on a DKIM signature? >> > >The expected lifetime is on the order of a week (message delivery >timeout). But the signature doesn't have an expiration time, so if >someone can construct a second message with the same hash, they could >replay the signature, potentially much later if the public key is still >in DNS. > >IMO it seems very unlikely, even with the known weaknesses in SHA-1, >that in the near future someone would be able to construct such a >message that would be exploitable by an attacker (e.g., spam or a >phishing attack). That will likely change in the future, so we should >tell signers to stop using SHA-1 ASAP and tell verifiers to stop >accepting those signatures sometime later. > >If anyone knows something yet more serious about exploitability of >rsa-sha1, please set me straight. > >-Jim I'm not an expert at all, but at least to the degree I understand it, I think your understanding of the rsa-sha1 situation is correct. I think your proposed remedy is too mild though. Given the degree to which the SHOULD NOT sign rsa-sha1 has been ignored for the last decade, I don't believe anything other than MUST NOT sign/MUST NOT verify rsa-sha1 is very useful. The thing about weaknesses in cryptographic algorithms is that the timeline for their discovery isn't predictable. I believe that most cryptographic experts anticipate that such weaknesses exist and will be found, we just don't know when. Given that we have rsa-sha256 available, I think it would be irresponsible not to remove rsa-sha1 from the DKIM protocol. Operational practice isn't closely coupled with standards changes. Killing off rsa-sha1 now is the best thing we can do to minimizethe panic when a problem does become known. To the extent standards changes matter, engineering resources don't get assigned beyond the minimum needed. I imagine a manager dropping our RFC on the (metaphorical) desk of one of their engineers and asking what's the minimum change required by the RFC. If the answer leaves rsa-sha1 in use, I think it's a mistake. Scott K
- [Dcrup] rsa-sha1 usage James Cloos
- Re: [Dcrup] rsa-sha1 usage Brandon Long
- Re: [Dcrup] rsa-sha1 usage Brandon Long
- Re: [Dcrup] rsa-sha1 usage Murray S. Kucherawy
- Re: [Dcrup] rsa-sha1 usage Brandon Long
- Re: [Dcrup] rsa-sha1 usage Scott Kitterman
- Re: [Dcrup] rsa-sha1 usage James Cloos
- Re: [Dcrup] rsa-sha1 usage Peter Goldstein
- Re: [Dcrup] rsa-sha1 usage Salz, Rich
- Re: [Dcrup] rsa-sha1 usage Murray S. Kucherawy
- Re: [Dcrup] rsa-sha1 usage Jim Fenton
- Re: [Dcrup] rsa-sha1 usage Eric Rescorla
- Re: [Dcrup] rsa-sha1 usage Phillip Hallam-Baker
- Re: [Dcrup] rsa-sha1 usage Scott Kitterman
- Re: [Dcrup] rsa-sha1 usage James Cloos
- Re: [Dcrup] rsa-sha1 usage Murray S. Kucherawy
- Re: [Dcrup] rsa-sha1 usage Jim Fenton
- Re: [Dcrup] rsa-sha1 usage Phillip Hallam-Baker
- Re: [Dcrup] rsa-sha1 usage Murray S. Kucherawy
- Re: [Dcrup] rsa-sha1 usage Jim Fenton
- Re: [Dcrup] rsa-sha1 usage Scott Kitterman
- Re: [Dcrup] rsa-sha1 usage Murray S. Kucherawy
- Re: [Dcrup] rsa-sha1 usage Scott Kitterman
- Re: [Dcrup] rsa-sha1 usage Jim Fenton
- Re: [Dcrup] rsa-sha1 usage Phillip Hallam-Baker
- Re: [Dcrup] rsa-sha1 usage denis bider
- Re: [Dcrup] rsa-sha1 usage Seth Blank
- Re: [Dcrup] rsa-sha1 usage Murray S. Kucherawy
- Re: [Dcrup] rsa-sha1 usage Scott Kitterman
- Re: [Dcrup] rsa-sha1 usage Murray S. Kucherawy
- Re: [Dcrup] rsa-sha1 usage Salz, Rich
- Re: [Dcrup] rsa-sha1 usage Phillip Hallam-Baker
- Re: [Dcrup] rsa-sha1 usage Peter Goldstein
- Re: [Dcrup] rsa-sha1 usage John Levine
- Re: [Dcrup] rsa-sha1 usage Hector Santos