Re: [rtcweb] JSEP fingerprint hash requirements

Eric Rescorla <ekr@rtfm.com> Fri, 18 October 2013 01:39 UTC

Return-Path: <ekr@rtfm.com>
X-Original-To: rtcweb@ietfa.amsl.com
Delivered-To: rtcweb@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3B29911E819B for <rtcweb@ietfa.amsl.com>; Thu, 17 Oct 2013 18:39:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.376
X-Spam-Level:
X-Spam-Status: No, score=-102.376 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, J_CHICKENPOX_111=0.6, RCVD_IN_DNSWL_LOW=-1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Eb0Q6Ezk5vGe for <rtcweb@ietfa.amsl.com>; Thu, 17 Oct 2013 18:39:35 -0700 (PDT)
Received: from mail-qc0-f169.google.com (mail-qc0-f169.google.com [209.85.216.169]) by ietfa.amsl.com (Postfix) with ESMTP id 2F73711E812F for <rtcweb@ietf.org>; Thu, 17 Oct 2013 18:39:33 -0700 (PDT)
Received: by mail-qc0-f169.google.com with SMTP id x12so2178882qcv.14 for <rtcweb@ietf.org>; Thu, 17 Oct 2013 18:39:32 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc:content-type; bh=FYGkTtE4A6Y+RhckKXwaeTXEmKB50Ylx1RaguViJW4M=; b=NL6Ku45Eo+Ex3YGK7K/C5lnmjzeXd0BxmvLDeTF/6DeWkpox0cLuKd0i23ELnlhwxf OTpi6Dn8AsfLhnBPTy7Zb1PxsYh2qurQX+mR02mKedmgkySenCERKkJCtawIplE4U7iJ 2yIkO+S8sHZ8KIh5wq+RBaOwLgl7E8fZj1cGqX3UCLzSnDR7/RNCHN26nMoJL8DrSoot sHPXkOLJRlRjTeh9qJlaTOx/5thyp6tYR7/8OkJVo7XwUjHHMZbYg+Z5TIJEhM76c0Uz apGQFlTUX3lXkm0j2z/dbmH7NSAQDMs9Dxp8JKPh676kp3BA605ZEqwvywrDKQopQrjQ +GyQ==
X-Gm-Message-State: ALoCoQkTG+1i7VDc9OkzphPjIH0Mk+5hfVdwNw4zUAGStMGG7JwtC4cUpAJDgQJ2jdFasWxD66lt
X-Received: by 10.49.12.194 with SMTP id a2mr412213qec.95.1382060372649; Thu, 17 Oct 2013 18:39:32 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.49.120.69 with HTTP; Thu, 17 Oct 2013 18:38:52 -0700 (PDT)
X-Originating-IP: [220.136.6.174]
In-Reply-To: <CABkgnnXBdQOgs9OKYRrU4wYRghj3WH30=vo-q7iSVjUub1SKow@mail.gmail.com>
References: <CAMvTgcfvaUMWJaD5zX2rt6DWOWBgHEA-SqNtOqxs_bOqw_Ygbg@mail.gmail.com> <CABkgnnXBdQOgs9OKYRrU4wYRghj3WH30=vo-q7iSVjUub1SKow@mail.gmail.com>
From: Eric Rescorla <ekr@rtfm.com>
Date: Thu, 17 Oct 2013 18:38:52 -0700
Message-ID: <CABcZeBOGjsOTXPtAFh+KR9SDQv8tEtUDE3gLvSN+f5dZ2R2R1Q@mail.gmail.com>
To: Martin Thomson <martin.thomson@gmail.com>
Content-Type: multipart/alternative; boundary="047d7b6787d292177804e8fa0123"
Cc: "rtcweb@ietf.org" <rtcweb@ietf.org>
Subject: Re: [rtcweb] JSEP fingerprint hash requirements
X-BeenThere: rtcweb@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Real-Time Communication in WEB-browsers working group list <rtcweb.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtcweb>, <mailto:rtcweb-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/rtcweb>
List-Post: <mailto:rtcweb@ietf.org>
List-Help: <mailto:rtcweb-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtcweb>, <mailto:rtcweb-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 18 Oct 2013 01:39:46 -0000

On Thu, Oct 17, 2013 at 11:54 AM, Martin Thomson
<martin.thomson@gmail.com>wrote:

> On 17 October 2013 01:37, Kevin Dempsey <kevindempsey70@gmail.com> wrote:
> > 1) does the fingerprinh hash need to match the certificate
>
> Yes.  Without that, you've got no binding between signaling and media
> path, which is bad.
>
> > 2) do webrtc compatible endpoints need to handle hashes 'weaker' than
> > sha-256
>
> No.  RFC 4572 is clear:
>    A certificate fingerprint MUST be computed using the same one-way
>    hash function as is used in the certificate's signature algorithm.
>
> That means that you need to generate the certificate with a hash that
> is strong enough.


I'm not sure this was a sensible rule on 4572, but I don't think it's
particularly harmful. Here's my analysis: there are two kinds of
certs in play here:

- self-signed certs (most likely)
- CA-signed certs (less likely)

In the case of self-signed certs, you can control your digest. In the case
of
CA signed certs, someone is presumably going to verify the signature
and so we would expect the digest used to form that signature to be
reasonably strong.


 > 3) are there any rules for handling multiple fingerprints?
>
> RFC 4572 is silent on that, unless I missed something, which I
> probably did.  The only plausible choice given the above statement
> from 4572 is to suggest that multiple a=fingerprint values indicate
> alternative certificates.
>
> That should probably be written down, of course.
>

Agreed.

-Ekr