Re: [openpgp] RSA-PSS and RSA-OAEP for v5

Peter Gutmann <pgut001@cs.auckland.ac.nz> Sun, 28 February 2021 03:50 UTC

Return-Path: <pgut001@cs.auckland.ac.nz>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6DF923A099F for <openpgp@ietfa.amsl.com>; Sat, 27 Feb 2021 19:50:02 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.894
X-Spam-Level:
X-Spam-Status: No, score=-1.894 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H4=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cKnBzWkepvjn for <openpgp@ietfa.amsl.com>; Sat, 27 Feb 2021 19:50:00 -0800 (PST)
Received: from au-smtp-delivery-117.mimecast.com (au-smtp-delivery-117.mimecast.com [124.47.189.117]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 692183A0930 for <openpgp@ietf.org>; Sat, 27 Feb 2021 19:49:59 -0800 (PST)
Received: from AUS01-SY4-obe.outbound.protection.outlook.com (mail-sy4aus01lp2168.outbound.protection.outlook.com [104.47.71.168]) (Using TLS) by relay.mimecast.com with ESMTP id au-mta-58-t6jNQPi1NFuz3Jd1iH6Fvw-1; Sun, 28 Feb 2021 14:49:56 +1100
X-MC-Unique: t6jNQPi1NFuz3Jd1iH6Fvw-1
Received: from SG2PR06CA0190.apcprd06.prod.outlook.com (2603:1096:4:1::22) by MEAPR01MB5174.ausprd01.prod.outlook.com (2603:10c6:220:6d::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.31; Sun, 28 Feb 2021 03:49:53 +0000
Received: from SG2APC01FT040.eop-APC01.prod.protection.outlook.com (2603:1096:4:1:cafe::b1) by SG2PR06CA0190.outlook.office365.com (2603:1096:4:1::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3890.20 via Frontend Transport; Sun, 28 Feb 2021 03:49:52 +0000
X-MS-Exchange-Authentication-Results: spf=none (sender IP is 130.216.95.208) smtp.mailfrom=cs.auckland.ac.nz; crustytoothpaste.net; dkim=none (message not signed) header.d=none;crustytoothpaste.net; dmarc=none action=none header.from=cs.auckland.ac.nz
Received: from uxcn13-tdc-d.UoA.auckland.ac.nz (130.216.95.208) by SG2APC01FT040.mail.protection.outlook.com (10.152.250.243) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.20.3890.19 via Frontend Transport; Sun, 28 Feb 2021 03:49:46 +0000
Received: from uxcn13-ogg-d.UoA.auckland.ac.nz (10.6.2.5) by uxcn13-tdc-d.UoA.auckland.ac.nz (10.6.3.5) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Sun, 28 Feb 2021 16:49:45 +1300
Received: from uxcn13-ogg-d.UoA.auckland.ac.nz ([10.6.2.5]) by uxcn13-ogg-d.UoA.auckland.ac.nz ([10.6.2.5]) with mapi id 15.00.1497.010; Sun, 28 Feb 2021 16:49:45 +1300
From: Peter Gutmann <pgut001@cs.auckland.ac.nz>
To: "brian m. carlson" <sandals@crustytoothpaste.net>, "openpgp@ietf.org" <openpgp@ietf.org>
Thread-Topic: [openpgp] RSA-PSS and RSA-OAEP for v5
Thread-Index: AQHXDWPcH6D7hziraEeY3WgYIFAhT6ps7lom
Date: Sun, 28 Feb 2021 03:49:45 +0000
Message-ID: <1614484185733.72813@cs.auckland.ac.nz>
References: <YDrbaRiQ34MstP30@camp.crustytoothpaste.net>
In-Reply-To: <YDrbaRiQ34MstP30@camp.crustytoothpaste.net>
Accept-Language: en-NZ, en-GB, en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [130.216.158.4]
MIME-Version: 1.0
X-EOPAttributedMessage: 0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: a5201b89-3058-438f-173b-08d8db9be46d
X-MS-TrafficTypeDiagnostic: MEAPR01MB5174:
X-Microsoft-Antispam-PRVS: <MEAPR01MB51745937417CFAE6EA16FE21EE9B9@MEAPR01MB5174.ausprd01.prod.outlook.com>
X-MS-Oob-TLC-OOBClassifiers: OLM:8882
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam: BCL:0
X-Microsoft-Antispam-Message-Info: DM2f1d8pSs08y6dUsv8F9pshxOqsPvSJiR7zrIyZe3nXWFkYAuMyDl68YaXZ4akHIhchZT80/7im2B+vTY9ADzTac9fdDthIiRRCrKWykCoDMKak49p8210Jd2OK8tHOndqjqTN78gMk91SBhVUHDbvkqiaL99SRnSA34cG6JmY/Fu8lWw6ixG2cVzGFT9+vMyu4Ji0hl0mO2EV3iNn+yTKAqOKRdI4YWln81pYDqFuJUiAM2TXGNx06ovFMHbisjxBAKHMcSjnqmwP8g1Nv0sa6KwWhCaRteUccJvq+99N5T6NJ6ttLQGcO3tPZs5T7QB68LNpmLf7Zx0lREd1FSOsEWnteJuAftu1IokhUl6TZLyfC+oJk5WemsV8R7ilyfwy4LjlVUKzNBC/1VpSf2jhTy2jMcr52xoIUegIZevCRXLSyFGc33SSsx6LHoztKaSoXKlPWxmP+LXsI/Q/+0mBOiCD08JcwU65VkhGrL1Cv1cS4pHtIxKdQNnk8KMkEApIvkglZ/fsuj18e0UvyEhK+tcDeBBl34rxQ4ZilXlC+52KOwTkREnRxTBzK18u7qxDu9S0/f0n4+jVG8T9711JQx9ebQcT/kDvuOsCxskKoKPEvg6U5Xm2qkKL+L8ZRhqUB1lVQquDQtYQDIrhsYQ==
X-Forefront-Antispam-Report: CIP:130.216.95.208; CTRY:NZ; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:uxcn13-tdc-d.UoA.auckland.ac.nz; PTR:natgate1-1.auckland.ac.nz; CAT:NONE; SFS:(4636009)(39860400002)(376002)(346002)(136003)(396003)(36840700001)(46966006)(70206006)(8676002)(86362001)(336012)(7636003)(2616005)(83380400001)(356005)(478600001)(26005)(82740400003)(186003)(8936002)(36860700001)(786003)(316002)(82310400003)(36906005)(47076005)(110136005)(70586007)(2906002)(4744005)(5660300002); DIR:OUT; SFP:1101
X-OriginatorOrg: cs.auckland.ac.nz
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 28 Feb 2021 03:49:46.8805 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: a5201b89-3058-438f-173b-08d8db9be46d
X-MS-Exchange-CrossTenant-Id: d1b36e95-0d50-42e9-958f-b63fa906beaa
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=d1b36e95-0d50-42e9-958f-b63fa906beaa; Ip=[130.216.95.208]; Helo=[uxcn13-tdc-d.UoA.auckland.ac.nz]
X-MS-Exchange-CrossTenant-AuthSource: SG2APC01FT040.eop-APC01.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MEAPR01MB5174
Authentication-Results: relay.mimecast.com; auth=pass smtp.auth=CAU17A13 smtp.mailfrom=pgut001@cs.auckland.ac.nz
X-Mimecast-Spam-Score: 0
X-Mimecast-Originator: cs.auckland.ac.nz
Content-Language: en-NZ
Content-Type: text/plain; charset="WINDOWS-1252"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/openpgp/nKpSSG86R9vDfD1AV6e-zhjh3Mo>
Subject: Re: [openpgp] RSA-PSS and RSA-OAEP for v5
X-BeenThere: openpgp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/openpgp>, <mailto:openpgp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/openpgp/>
List-Post: <mailto:openpgp@ietf.org>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/openpgp>, <mailto:openpgp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 28 Feb 2021 03:50:02 -0000

brian m. carlson <sandals@crustytoothpaste.net> writes:

>I'm interested in seeing if we can require v5 SKESK packets with RSA use RSA-
>OAEP with SHA-256 and MGF1-SHA-256 and require that v5 signatures with RSA
>use RSA-PSS, with the MGF using the same digest as the signature.

Apart from adding a huge amount of complexity and potential interop problems,
you're not really gaining anything by this that isn't already addressed by
"MUST use encode-them-memcmp() for signatures".  PKCS #1 signing is perfectly
secure if you do that, and PKCS #1 encryption doesn't matter much because PGP
isn't likely to be used in situations where it acts as an online million-
message oracle.

See also my post to the cryptography list last year about all the games an
attacker can play with OAEP because the parameters aren't authenticated and
therefore attacker-controlled.

Peter.