[saag] SHA-1 to SHA-n transition

Stephen Kent <kent@bbn.com> Sat, 21 February 2009 16:10 UTC

Return-Path: <kent@bbn.com>
X-Original-To: saag@core3.amsl.com
Delivered-To: saag@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 301D93A685C for <saag@core3.amsl.com>; Sat, 21 Feb 2009 08:10:08 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.726
X-Spam-Level:
X-Spam-Status: No, score=-0.726 tagged_above=-999 required=5 tests=[AWL=-0.542, BAYES_40=-0.185, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TFnLi1OLbTMc for <saag@core3.amsl.com>; Sat, 21 Feb 2009 08:10:07 -0800 (PST)
Received: from mx11.bbn.com (mx11.bbn.com [128.33.0.80]) by core3.amsl.com (Postfix) with ESMTP id 0CD333A68CC for <saag@ietf.org>; Sat, 21 Feb 2009 08:10:07 -0800 (PST)
Received: from dommiel.bbn.com ([192.1.122.15] helo=[10.242.22.91]) by mx11.bbn.com with esmtp (Exim 4.60) (envelope-from <kent@bbn.com>) id 1LauQk-0005m3-DN; Sat, 21 Feb 2009 11:10:18 -0500
Mime-Version: 1.0
Message-Id: <p06240802c5c5c22d92f0@[128.89.89.88]>
Date: Sat, 21 Feb 2009 11:10:03 -0500
To: saag@ietf.org
From: Stephen Kent <kent@bbn.com>
Content-Type: multipart/alternative; boundary="============_-976889879==_ma============"
Subject: [saag] SHA-1 to SHA-n transition
X-BeenThere: saag@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Advisory Group <saag.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/saag>, <mailto:saag-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/saag>
List-Post: <mailto:saag@ietf.org>
List-Help: <mailto:saag-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/saag>, <mailto:saag-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 21 Feb 2009 16:10:08 -0000

I agree wit Phil's suggestion that we begin work on this topic sooner 
rather than later.  Solutions probably will require coordination 
between folks in both PKIX and TLS, plus some browser experts from 
the APP area.

However, Phil's comment (underling added by me)

If we start addressing the problem now we can lay ourselves an 
insurance policy. If we try to insist on the pristine principles of 
the PKIX infrastructure we are going to be in deep trouble in about 
five years time.

is offensive, at best. Moreover, unless Phil and his favorite browser 
vendors already have a solution in mind, and he anticipates that it 
will be objectionable to PKIX, this comment is gratuitous.

Since we're talking about how well browsers implement PKI mechanisms 
in the context of SSL/TLS, it is worth noting a presentation at last 
week's Black Hat conference in D.C. The presentation provided details 
on how several browsers remain vulnerable to attacks because they 
fails to check the Basic Constraints extension. This oversight of one 
of those pristine principles of PKIX ( we can use the acronym P3 
going forward) and allows a web sites to act as a CA, based o the EE 
cert issued to it by any of the trust anchors embedded in the browser.

Another vulnerability, and matching MITM attack, is enabled by the 
issuance of certs that contain wildcard DNS names. This is not, a 
violation of P3, because PKIX caved to pressure from the TLS WG, to 
accommodate web site operators who wanted to purchase one cert from a 
TTP that could be used to verify the EE certs for multiple web sites. 
I argued against this, but lost. The phrase "I told you so" comes to 
mind :-).

So, contrary to Phil's assertion that adherence to P3 will get us 
into deep trouble in five years (with regard to this transition 
issue), I believe that PKI shortcuts (hacks) in browsers have gotten 
us into deep trouble for many years, and are likely to persist.

Steve