Re: [pkix] I-D Action:draft-ietf-pkix-rfc3161-update-08.txt

Stefan Santesson <stefan@aaa-sec.com> Fri, 23 October 2009 09:58 UTC

Return-Path: <stefan@aaa-sec.com>
X-Original-To: pkix@core3.amsl.com
Delivered-To: pkix@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 14D613A6782 for <pkix@core3.amsl.com>; Fri, 23 Oct 2009 02:58:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.096
X-Spam-Level:
X-Spam-Status: No, score=-1.096 tagged_above=-999 required=5 tests=[AWL=1.153, BAYES_00=-2.599, HELO_EQ_SE=0.35]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LVIJ2wHOrogs for <pkix@core3.amsl.com>; Fri, 23 Oct 2009 02:58:05 -0700 (PDT)
Received: from s87.loopia.se (s87.loopia.se [194.9.94.111]) by core3.amsl.com (Postfix) with ESMTP id D3F753A6407 for <pkix@ietf.org>; Fri, 23 Oct 2009 02:58:04 -0700 (PDT)
Received: from s24.loopia.se (s34.loopia.se [194.9.94.70]) by s87.loopia.se (Postfix) with ESMTP id CB41A28A9DD for <pkix@ietf.org>; Fri, 23 Oct 2009 11:58:16 +0200 (CEST)
Received: (qmail 75972 invoked from network); 23 Oct 2009 09:58:12 -0000
Received: from 213-64-142-247-no153.business.telia.com (HELO [192.168.1.3]) (stefan@fiddler.nu@[213.64.142.247]) (envelope-sender <stefan@aaa-sec.com>) by s24.loopia.se (qmail-ldap-1.03) with DES-CBC3-SHA encrypted SMTP for <julien.stern@cryptolog.com>; 23 Oct 2009 09:58:12 -0000
User-Agent: Microsoft-Entourage/12.20.0.090605
Date: Fri, 23 Oct 2009 11:58:02 +0200
From: Stefan Santesson <stefan@aaa-sec.com>
To: Julien Stern <julien.stern@cryptolog.com>, pkix@ietf.org
Message-ID: <C7074ACA.5810%stefan@aaa-sec.com>
Thread-Topic: [pkix] I-D Action:draft-ietf-pkix-rfc3161-update-08.txt
Thread-Index: AcpTx07aGCnZEhbw8kyjlzNC9IOhYw==
In-Reply-To: <4AE076D4.2080704@cryptolog.com>
Mime-version: 1.0
Content-type: text/plain; charset="US-ASCII"
Content-transfer-encoding: 7bit
Cc: ESI@LISTS.ETSI.ORG
Subject: Re: [pkix] I-D Action:draft-ietf-pkix-rfc3161-update-08.txt
X-BeenThere: pkix@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: PKIX Working Group <pkix.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/pkix>, <mailto:pkix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/pkix>
List-Post: <mailto:pkix@ietf.org>
List-Help: <mailto:pkix-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/pkix>, <mailto:pkix-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 23 Oct 2009 09:58:06 -0000

Julien,

The body of this draft has been done and agreed upon for quite some time
now. The document is hold back only because we have not manage to agree on
one security considerations section.

Removing the security considerations section is not an option. All RFC
documents must have one.

We are NOT trying to say that ESSCertID serves no security purpose.
The original security considerations section was trying to say that the
motivation for allow algorithm agility (through ESSCertIDv2) is to allow
migration to other hash algorithm rather than reasons of security.

This approach did however receive serious pushback from Denis. We have since
then tried to find a text that is both acceptable and accurate. So far
unsuccessfully.

In the effort to describe the particular threat that a stronger hash would
protect against, it turns out that this threat requires a malicious trusted
CA. This is however something that breaks the fundamental security
assumptions of PKI. If you trust a bad CA, you are smoked.. No matter how
good your protocol is. As BCP 72 requires us to tell (in the security
considerations) what threats are in, or out, of scope of the specified
protocol. Thus, describing this threat also requires us to tell the reader
that threats caused by a trusted malicious CA in general are out of scope
for a protocol to solve.

Failing to do so may cause a reader to believe that he needs to migrate to
ESSCertIDv2 to avoid serious security threats. This is not a desired outcome
and could cause both confusion and interoperability issues trough premature
and unmotivated migrations to ESSCertIDv2.

You are free to propose text here that meets the requirements of BCP 72
section 5.

I personally would be happy with a short note saying what we originally
wanted to say.. That is:


   This draft incorporates the security considerations of RFC 5035
   [ESSV2] with further explanations in this section.

   ESSCertID provides a means based on the SHA-1 hash algorithm for
   identifying the certificate used to verify the signature on a time
   stamp. The use of ESSCertIDv2 aims to enable implementers to comply
   with policies that require phasing out all uses of the SHA-1
   algorithm.

   The update provided by this draft is motivated by reasons of
   interoperability and migration to other hash algorithms rather than
   mitigating known security issues.


... And delete the rest.

/Stefan



On 09-10-22 5:14 PM, "Julien Stern" <julien.stern@cryptolog.com> wrote:

> Internet-Drafts@ietf.org wrote:
>> A New Internet-Draft is available from the on-line Internet-Drafts
>> directories.
>> This draft is a work item of the Public-Key Infrastructure (X.509) Working
>> Group of the IETF.
>> 
>> 
>> Title           : ESSCertIDv2 update for RFC 3161
>> Author(s)       : S. Santesson, N. Pope
>> Filename        : draft-ietf-pkix-rfc3161-update-08.txt
>> Pages           : 8
>> Date            : 2009-10-14
> 
> 
> Dear all,
> 
> Sorry for jumping in late in the discussion.
> 
> I disagree with the current proposed addition to the security
> considerations section.
> 
> In the various email exchanges on this list as well as on the ESTI ESI
> list, it appears that what is currently under debate is whether the
> ESSCertID is useful from a security standpoint. So people are trying to
> argue about the feasability or the infeasability, as well as the
> practicality and the real-life impact of various certificate
> substitution attacks.
> 
> I do not think that this is the point. The point of this update is to
> allow the usage of the ESSCertID v2 (defined in RFC 5035) instead of the
> ESSCertID v1.
> 
> I do not think that adding a security consideration that is essentially
> saying "oh, by the way, ESSCertID v2 is essentially useless
> security-wise" when it is meant to be used in S/MIME, PKIX (3161, 5126),
> CAdES, XAdES, PAdES, ECOM, etc fits in such an update. I'm not sure
> either that such an update reflects the largest view of the community...
> 
> People are free to believe that ESSCertID (v1 or v2) serves no security
> purpose. Others are free to believe otherwise.
> 
> But if the authors truly believe that the ONLY possible attack scenario
> is the one roughly described in the security consideration section, then
> let them prove it. Otherwise, remove the security consideration section.
> (In my humble opinion, it is not correct anyway).
> 
> Regards,
> 
> --
> Julien
> _______________________________________________
> pkix mailing list
> pkix@ietf.org
> https://www.ietf.org/mailman/listinfo/pkix