Re: [Dcrup] rsa-sha1 usage

Scott Kitterman <sklist@kitterman.com> Wed, 14 June 2017 12:15 UTC

Return-Path: <sklist@kitterman.com>
X-Original-To: dcrup@ietfa.amsl.com
Delivered-To: dcrup@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A1C6C12EBD0 for <dcrup@ietfa.amsl.com>; Wed, 14 Jun 2017 05:15:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.002
X-Spam-Level:
X-Spam-Status: No, score=-2.002 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=kitterman.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fQgiDOE2UqWy for <dcrup@ietfa.amsl.com>; Wed, 14 Jun 2017 05:15:25 -0700 (PDT)
Received: from mailout03.controlledmail.com (mailout03.controlledmail.com [IPv6:2607:f0d0:3001:aa::2]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 12B8C129B35 for <dcrup@ietf.org>; Wed, 14 Jun 2017 05:15:25 -0700 (PDT)
Received: from kitterma-e6430.localnet (static-72-81-252-22.bltmmd.fios.verizon.net [72.81.252.22]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mailout03.controlledmail.com (Postfix) with ESMTPSA id 27A0EC402AE for <dcrup@ietf.org>; Wed, 14 Jun 2017 07:15:24 -0500 (CDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=kitterman.com; s=201409; t=1497442524; bh=XTrwhwYBdh5ZilJ3mWZpq4OoiNH03O+js8dcynyVDXA=; h=From:To:Subject:Date:In-Reply-To:References:From; b=qnkxsYoswyKbddp8Gr9PvrATTkHQvLhVf1pR3jsqDgajL1eoJSa7NKDNZ6qDoPb9g L2HtDRc8ticZzjTXeie69WLKvDTXmG5qdj332OARzQJrZVzG1FXXHRvQW5CAWu/j5K +bAMHrd8OT5Ya/UZUD3ZpNLP9RlZuPvtssOSxC2I=
From: Scott Kitterman <sklist@kitterman.com>
To: dcrup@ietf.org
Date: Wed, 14 Jun 2017 08:15:23 -0400
Message-ID: <4405396.8sPtXljfs2@kitterma-e6430>
User-Agent: KMail/4.13.3 (Linux/3.13.0-119-generic; KDE/4.13.3; x86_64; ; )
In-Reply-To: <CAL0qLwYtKrHrfcpt-pF95nNh2gvH36JKBSOJ8XqSeS8P+W=FAw@mail.gmail.com>
References: <m38tkw53bd.fsf@carbon.jhcloos.org> <58b8da69-353a-fadb-76bc-649def47a618@bluepopcorn.net> <CAL0qLwYtKrHrfcpt-pF95nNh2gvH36JKBSOJ8XqSeS8P+W=FAw@mail.gmail.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dcrup/f1W-TbbNjcP1xlH3LH0SIXMu_0U>
Subject: Re: [Dcrup] rsa-sha1 usage
X-BeenThere: dcrup@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: DKIM Crypto Update <dcrup.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dcrup>, <mailto:dcrup-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dcrup/>
List-Post: <mailto:dcrup@ietf.org>
List-Help: <mailto:dcrup-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dcrup>, <mailto:dcrup-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 14 Jun 2017 12:15:27 -0000

On Wednesday, June 14, 2017 04:53:37 AM Murray S. Kucherawy wrote:
> On Tue, Jun 13, 2017 at 9:18 PM, Jim Fenton <fenton@bluepopcorn.net> wrote:
> > As Pete Resnick loves to point out, RFC prose can be normative without
> > using RFC2119 words.
> > 
> > The text of RFC2119 counsels against unnecessary use of the words it
> > defines.  It also contains this language: "...actually required for
> > interoperation" (which use of rsa-sha1 clearly does not impede) "or to
> > limit behavior which has potential for causing harm".  I suppose this
> > latter is the key issue.
> > 
> > 
> > With respect to whether you need to include the MUST NOT (a point you made
> > earlier), I'll defer to whatever the accepted practices are on the
> > wording.
> > 
> > But WRT the potential to cause harm, I refer to ekr's comment:
> > 
> > Well, this would require a second preimage. My sense is that nobody is
> > close to that at all with SHA-1....
> > 
> > which I interpret as little potential for causing harm in the near future.
> 
> This actually leads me to believe that there's no urgency to deprecate
> rsa-sha1 at all.

The thing about surprises is that they don't show up when expected.  Given we 
have rsa-sha256 and want to add another algorithm, taking the MUST NOT sign 
step now for rsa-sha1 so it's a short putt to remove it entirely when such a 
weakness is unearthed is a prudent step forward.

Scott K