Re: [openpgp] Disadvantages of Salted Signatures

Andrew Gallagher <andrewg@andrewg.com> Mon, 11 December 2023 17:18 UTC

Return-Path: <andrewg@andrewg.com>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 86D30C14CF13 for <openpgp@ietfa.amsl.com>; Mon, 11 Dec 2023 09:18:19 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.106
X-Spam-Level:
X-Spam-Status: No, score=-2.106 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=andrewg.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4OxMtdFYmS54 for <openpgp@ietfa.amsl.com>; Mon, 11 Dec 2023 09:18:14 -0800 (PST)
Received: from fum.andrewg.com (fum.andrewg.com [135.181.198.78]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4D55CC14CF01 for <openpgp@ietf.org>; Mon, 11 Dec 2023 09:18:13 -0800 (PST)
Received: from smtpclient.apple (serenity [IPv6:fc93:5820:7349:eda2:99a7::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by fum.andrewg.com (Postfix) with ESMTPSA id B027A5ED7E; Mon, 11 Dec 2023 17:18:10 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=andrewg.com; s=andrewg-com; t=1702315090; bh=7gWafCPD/RZ2qoB7LljhCudnyI14D2kBvdEO50sXhT0=; h=From:Subject:Date:References:To:In-Reply-To:From; b=WOAUonagHJUzfUng2dn3ifHhtnqECdDsSlWb+ocWlhVsY3KNm4uc2UJI4n3LPuytE F20DGiOWB88OBsNt7g9PaTwd04g86ulp5/9aHt7CQss12VzVZ5ryuuNcl7iG8a+fbc SnbUbTVtjsHi+6dotV0WM9SdFLwjUKamW8npJKIY4cMkn0qXqa3Ts3ts3JzGtJp3Gj Y7Qiz9ix15KFl5rVGR27CqcRAuSH4tIiuTSTtbXMwk3SgDIH065pWofs6JXSK7qdsi 6yTmhZzjrFWuLSryBm6PX8KCZFopuYsFTE58bIxqPFWiE+ZZ24ASmSUShO7cUeb9rN YC46dHWwvjqug==
From: Andrew Gallagher <andrewg@andrewg.com>
Content-Type: multipart/signed; boundary="Apple-Mail=_2187FD11-F5EF-42C0-A687-6ED96680F656"; protocol="application/pgp-signature"; micalg="pgp-sha512"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3731.700.6\))
Date: Mon, 11 Dec 2023 17:17:52 +0000
References: <077dd27cef0c7d3968967fc4c3a880081b8bd9dd.camel@posteo.de> <87jzplrtfy.wl-neal@walfield.org> <87bd4895386b3a0cd0c62429b0b85df6f1860da2.camel@posteo.de>
To: Stephan Verbücheln <verbuecheln@posteo.de>, "openpgp\\\\@ietf.org" <openpgp@ietf.org>
In-Reply-To: <87bd4895386b3a0cd0c62429b0b85df6f1860da2.camel@posteo.de>
Message-Id: <131146DB-5BE3-485F-AF9B-94394972E97D@andrewg.com>
X-Mailer: Apple Mail (2.3731.700.6)
Archived-At: <https://mailarchive.ietf.org/arch/msg/openpgp/SeL3RuxuR22l23WEXFMRgYJLGgc>
Subject: Re: [openpgp] Disadvantages of Salted Signatures
X-BeenThere: openpgp@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/openpgp>, <mailto:openpgp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/openpgp/>
List-Post: <mailto:openpgp@ietf.org>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/openpgp>, <mailto:openpgp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 11 Dec 2023 17:18:19 -0000

On 11 Dec 2023, at 16:43, Stephan Verbücheln <verbuecheln@posteo.de> wrote:
> 
> I believe, the following two questions are still worth debating because
> the mandatory salt does not come at zero cost.
> 
> Is it practically relevant?
> Hash algorithms which are vulnerable to collisions should not be used
> anyway. SHA-1 was deprecated in 2011, a long time before that attack
> was demonstrated.

OpenPGP is a high-latency communications protocol with roundtrips often measured in decades. It currently supports artifacts generated in the 1990s, and will do so well into the foreseeable future. There is therefore value in insuring against speculative weaknesses no matter how remote they may currently appear.

> Does it make sense to have it mandatory or default?
> In most cases, PGP users sign their own data (e-mails, software
> tarballs etc.). It could nevertheless be default for “certify”
> operations.

IMO there is value in defing a single signature format for all use cases rather than one deterministic one and one nondeterministic one. If deterministic signatures are required in specialised applications, they could be achieved by other means, e.g. a verifiable-seed PRNG. This is currently out of scope and would need to be signalled via some novel or out-of-band mechanism, however there are other parts of the spec where verifiable-seed randomness may be useful (padding comes to mind) and we could potentially treat these as a general class of problem in a future document. Alternatively, as discussed previously, an application that requires determinism could allow the salt to be externally forced in the verification mode. I therefore don’t believe lack of determinism in the spec is a blocker.

A