RE: Last Call: <draft-turner-md5-seccon-update-07.txt> (Updated Security Considerations for the MD5 Message-Digest and the HMAC-MD5 Algorithms) to Informational RFC

"Eddy, Wesley M. (GRC-MS00)[ASRC AEROSPACE CORP]" <wesley.m.eddy@nasa.gov> Thu, 09 December 2010 03:00 UTC

Return-Path: <wesley.m.eddy@nasa.gov>
X-Original-To: ietf@core3.amsl.com
Delivered-To: ietf@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 7CB073A6816; Wed, 8 Dec 2010 19:00:04 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.197
X-Spam-Level:
X-Spam-Status: No, score=-106.197 tagged_above=-999 required=5 tests=[AWL=0.402, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hOf6dmbf4QTt; Wed, 8 Dec 2010 19:00:03 -0800 (PST)
Received: from ndjsnpf02.ndc.nasa.gov (ndjsnpf02.ndc.nasa.gov [198.117.1.122]) by core3.amsl.com (Postfix) with ESMTP id 99B5B3A69AD; Wed, 8 Dec 2010 19:00:03 -0800 (PST)
Received: from ndjsppt03.ndc.nasa.gov (ndjsppt03.ndc.nasa.gov [198.117.1.102]) by ndjsnpf02.ndc.nasa.gov (Postfix) with ESMTP id 338C5A8010; Wed, 8 Dec 2010 21:01:32 -0600 (CST)
Received: from ndjshub04.ndc.nasa.gov (ndjshub04-pub.ndc.nasa.gov [198.117.1.34]) by ndjsppt03.ndc.nasa.gov (8.14.3/8.14.3) with ESMTP id oB931WLa031539; Wed, 8 Dec 2010 21:01:32 -0600
Received: from NDJSSCC01.ndc.nasa.gov ([198.117.4.166]) by ndjshub04.ndc.nasa.gov ([10.202.202.163]) with mapi; Wed, 8 Dec 2010 21:01:31 -0600
From: "Eddy, Wesley M. (GRC-MS00)[ASRC AEROSPACE CORP]" <wesley.m.eddy@nasa.gov>
To: Francis Dupont <Francis.Dupont@fdupont.fr>
Date: Wed, 08 Dec 2010 21:01:32 -0600
Subject: RE: Last Call: <draft-turner-md5-seccon-update-07.txt> (Updated Security Considerations for the MD5 Message-Digest and the HMAC-MD5 Algorithms) to Informational RFC
Thread-Topic: Last Call: <draft-turner-md5-seccon-update-07.txt> (Updated Security Considerations for the MD5 Message-Digest and the HMAC-MD5 Algorithms) to Informational RFC
Thread-Index: AcuXMF3bv2g4uQumTcWXMNJDeLH4fgAGWK13
Message-ID: <C304DB494AC0C04C87C6A6E2FF5603DB482335838B@NDJSSCC01.ndc.nasa.gov>
References: Your message of Wed, 08 Dec 2010 14:08:03 CST. <C304DB494AC0C04C87C6A6E2FF5603DB4823358384@NDJSSCC01.ndc.nasa.gov> , <201012082333.oB8NXhhe067090@givry.fdupont.fr>
In-Reply-To: <201012082333.oB8NXhhe067090@givry.fdupont.fr>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:5.2.15, 1.0.148, 0.0.0000 definitions=2010-12-09_02:2010-12-08, 2010-12-09, 1970-01-01 signatures=0
Cc: "wes@mti-systems.com" <wes@mti-systems.com>, "iesg@ietf.org" <iesg@ietf.org>, "L.Wood@surrey.ac.uk" <L.Wood@surrey.ac.uk>, "ietf@ietf.org" <ietf@ietf.org>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 Dec 2010 03:00:04 -0000

I think a published update to MD5 security considerations should clearly say what it's still fine to do with MD5, in addition to what it's not safe to do.  This would mean adding a couple sentences, and that's about all it would really take to be clear on the issue:

"Since RFC 1321 was published, MD5 found popular use in checksuming large file transfers.  This use of MD5 is still reasonable, as the level of collision resistance is of less importance in this application and MD5 may be significantly more efficient than cryptographically stronger algorithms.  Communications, networking, and storage systems prone to errors (e.g. due to faulty hardware, drivers, bit-errors, faulty NAT/ALG algorithms, etc) do not implement the known MD5 collision-finding algorithms, and MD5 remains highly effective at detecting such errors."


________________________________________
From: Francis.Dupont@fdupont.fr [Francis.Dupont@fdupont.fr]
Sent: Wednesday, December 08, 2010 6:33 PM
To: Eddy, Wesley M. (GRC-MS00)[ASRC AEROSPACE CORP]
Cc: L.Wood@surrey.ac.uk; wes@mti-systems.com; iesg@ietf.org; ietf@ietf.org
Subject: Re: Last Call: <draft-turner-md5-seccon-update-07.txt> (Updated Security Considerations for the MD5 Message-Digest and the HMAC-MD5 Algorithms) to Informational RFC

 In your previous mail you wrote:

   The logic doesn't make sense in this position.  "Crypto modules
   can't use MD5, thus no protocols at all should use MD5."

=> this is a silly/bad/... consequence of the crypto label
attached to the MD5 name. I understand you are not happy with
this but what do you propose?

Regards

Francis.Dupont@fdupont.fr

PS: BTW I'd like to apply the argument only to *new* protocols.