Re: [saag] SHA-1 to SHA-n transition

"Hallam-Baker, Phillip" <pbaker@verisign.com> Wed, 25 February 2009 17:37 UTC

Return-Path: <pbaker@verisign.com>
X-Original-To: saag@core3.amsl.com
Delivered-To: saag@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0439328C25E for <saag@core3.amsl.com>; Wed, 25 Feb 2009 09:37:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.991
X-Spam-Level:
X-Spam-Status: No, score=-4.991 tagged_above=-999 required=5 tests=[AWL=-1.029, BAYES_00=-2.599, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=1.396, RCVD_IN_DNSWL_MED=-4, SARE_LWSHORTT=1.24]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PF9UziXs39Bm for <saag@core3.amsl.com>; Wed, 25 Feb 2009 09:37:27 -0800 (PST)
Received: from robin.verisign.com (robin.verisign.com [65.205.251.75]) by core3.amsl.com (Postfix) with ESMTP id 8598C28C247 for <saag@ietf.org>; Wed, 25 Feb 2009 09:37:27 -0800 (PST)
Received: from mou1wnexcn01.vcorp.ad.vrsn.com (mailer1.verisign.com [65.205.251.34]) by robin.verisign.com (8.12.11/8.13.4) with ESMTP id n1PHbYEH010433; Wed, 25 Feb 2009 09:37:34 -0800
Received: from MOU1WNEXMB09.vcorp.ad.vrsn.com ([10.25.15.197]) by mou1wnexcn01.vcorp.ad.vrsn.com with Microsoft SMTPSVC(6.0.3790.3959); Wed, 25 Feb 2009 09:37:34 -0800
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C9976F.BD8EA0C2"
Date: Wed, 25 Feb 2009 09:37:33 -0800
Message-ID: <2788466ED3E31C418E9ACC5C3166155768B2C7@mou1wnexmb09.vcorp.ad.vrsn.com>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: [saag] SHA-1 to SHA-n transition
Thread-Index: AcmXZkIHNTtGqAcDRpSQz8zKbJ8T6AAA6ulY
References: <p06240802c5c5c22d92f0@[128.89.89.88]> <200902231914.n1NJEDA3011916@raisinbran.srv.cs.cmu.edu> <5A6509457B6F0F71878AA5D2@atlantis.pc.cs.cmu.edu>
From: "Hallam-Baker, Phillip" <pbaker@verisign.com>
To: Jeffrey Hutzelman <jhutz@cmu.edu>, Stephen Kent <kent@bbn.com>, saag@ietf.org
X-OriginalArrivalTime: 25 Feb 2009 17:37:34.0933 (UTC) FILETIME=[BE75E050:01C9976F]
Subject: Re: [saag] SHA-1 to SHA-n transition
X-BeenThere: saag@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Advisory Group <saag.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/saag>, <mailto:saag-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/saag>
List-Post: <mailto:saag@ietf.org>
List-Help: <mailto:saag-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/saag>, <mailto:saag-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 25 Feb 2009 17:37:29 -0000

As it happens, what I was referring to is that I do not like the look of this scheme. It is an ugly hack. However I dislike the consequences of not addressing this issue up front rather more and I really don't see how a less hackish solution will serve.
 
Now I did get offended by the implication that we should not consider technical issues if they might offend people. As with an earlier case where a past Security AD blocked a necessary protocol change because it 'gave him a bad gut feeling'. While making decisions based on the examination of intestines was all the rage in ancient Rome, it should be avoided.
 
 
On the points you raise.
 
1) If a device is not connected to a communications network, then why would it need to establish a cryptographic communication security context?
 
The offline PKI argument is seductive, but when you get down to case analysis, the real purpose of PKI is to communicate. The security guarantees that are possible in the offline case will always be lower than can be achieved in the online case.
 
If the device is not connected to a network realtime then issues such as certificate status are going to be have to be handled by something that is online and can pass a satisfactory proof of trustworthiness on.
 
But in any case, the issues are entirely addressed by OCSP token stapling which is possible in SSL and S/MIME and any XML signature based protocol.
 
 
2) 'that because certain conditions hold now, they always will'
 
I do not understand the relevance. What the claim amounts to is asserting that because my prediction of the future might be falible, no precidtion can be made, all outcomes are equally likely.
 
You base strategy on your best knowledge of the current situation and your best faith prediction of the consequences. If someone wants to challenge that analysis they should provide new facts and/or argue that different consequences are likely.
 
We have long experience of what the world does when we tell it our view of what the best thing is from a security perspective - they ignore us do what they think is in their best short term interests.
 
 
3)  'that it is OK for browser software to silently make configuration  changes based on external stimulus and without the user's consent.'

Here you might have a point. But I am not certain. In any case it is an implementation detail. What degree of control end users have is a policy matter. Most users are entirely happy for Microsoft or McAfee to control security on their PC.
 
Kill switches are unfortunately necessary at times. What is important is not so much the existence of the kill switch as who is in control.
 
In this particular case the whole purpose is to put enterprises and CAs on notice that a change is going to be necessary and that they have to start planning for it right now without setting a premature termination date. All an enterprise need do to plan for the transition is to upgrade their internal CA and their Web servers before SHA1 is actually broken. 
 
One option would be to allow the end user (or system manager) to over-ride the suicide note - provided that an equally secure mechanism was used for the control channel. Another would be to allow local configuration of the suicide note issuer.
 
I am not to sure about the consequences for your internal CA. If the roots are embedded in the browser then why not expect them to be handled according to current best practice? If the roots are not embedded then you might as well treat them as self signed certificates and allow a per-site exception.
 
I am not actually a fan of turning off certificates. An HTTP connection that is secured to an untrustworthy key is still better from a security point of view than one that is en-clair. My consistent suggestion has been that any browser should accept any key to start SSL unless the user types in https:// at the command line. The only difference being that the browser should not tell the user that SSL is in use in primary chrome.
 
 
 
 
________________________________

From: Jeffrey Hutzelman [mailto:jhutz@cmu.edu]
Sent: Wed 2/25/2009 11:29 AM
To: Hallam-Baker, Phillip; Stephen Kent; saag@ietf.org
Cc: jhutz@cmu.edu
Subject: Re: [saag] SHA-1 to SHA-n transition



--On Monday, February 23, 2009 11:13:55 AM -0800 "Hallam-Baker, Phillip"
<pbaker@verisign.com> wrote:

> Let us see, I suggest that we might need to slay a sacred PKIX cow or two
> in order to make the SHA-n transition work. Stephen:
> * Describes the suggestion as 'offensive'

Yes, this sort of crack is offensive and counterproductive.  Knock it off.

If you have a proposal to make, then fine, make it.
Don't start off by deliberately attacking people who you think will oppose
your proposal, on the basis of arguments that haven't yet been made and
probably won't be.  _That_ is offensive.

So, by the way, is the "sacred cow" comparsion, to some folks.


Your actual proposal makes a number of very large assumptions, such as...


- that interactive Web browsers with access to stable storage and
  nearly-continuous access to the connected Internet are the only
  problem worth solving.

  Possibly true for your company, and other CA's, and browser vendors.
  Definitely _not_ true for the IETF.

- that because certain conditions hold now, they always will

  Definitely not true for anyone, outside of an extremely tightly
  controlled environment, and maybe not even then.

- that it is OK for browser software to silently make configuration
  changes based on external stimulus and without the user's consent.

  This is definitely not true, and will actively screw people if the
  browser vendors ever implement your proposal.  Suppose you distribute
  your so-called "suicide note", causing my browser to reconfigure itself
  (silently and without my consent) to disallow SHA-1.  Unfortunately,
  my entire enterprise PKI was based on SHA-1 certificates, and you have
  just thrown my organization into chaos, potentially costing billions
  of dollars.  Can you imagine the lawsuits when Microsoft does this to
  a major financial institution?  Can you imagine the economic impact
  when Microsoft does this to _every_ major financial institution?


-- Jeff