Re: [saag] AD review of draft-iab-crypto-alg-agility-06

Eliot Lear <lear@cisco.com> Thu, 03 September 2015 21:02 UTC

Return-Path: <lear@cisco.com>
X-Original-To: saag@ietfa.amsl.com
Delivered-To: saag@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 859E71B47F0 for <saag@ietfa.amsl.com>; Thu, 3 Sep 2015 14:02:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.511
X-Spam-Level:
X-Spam-Status: No, score=-14.511 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mMbHgfJbeOJJ for <saag@ietfa.amsl.com>; Thu, 3 Sep 2015 14:02:01 -0700 (PDT)
Received: from aer-iport-3.cisco.com (aer-iport-3.cisco.com [173.38.203.53]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B14981A1BD7 for <saag@ietf.org>; Thu, 3 Sep 2015 14:02:00 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=4376; q=dns/txt; s=iport; t=1441314120; x=1442523720; h=subject:to:references:cc:from:message-id:date: mime-version:in-reply-to; bh=0yrPXH2ebWfxtZdCz2JWsg+K+dtQQ1jBBJ27ugUj3/A=; b=jLBkeAaD5A/GSI5lC+9jEZABi2LZ4ZKHZCdqYcBDNR8GttTS58VEyrh9 KY1fwqRFjgnMpHC3Hnbl1wY5Pj6tRGo8UZ/7li4hpTBhFdu1o3FxckvKF 2Rme/Hxispl4PqXGHMD0jhCDapCJ2zErtzH1p6AV0Bv6iu0z4bbjFzyr4 s=;
X-Files: signature.asc : 481
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0AOBwCetOhV/xbLJq1dh3y+a4M4AoIIAQEBAQEBgQuEJAEBBCNVARALGAkWCwICCQMCAQIBRQYNCAEBiCq3H5RVAQEBAQEBAQMBAQEBAQEBG4ppgQWEQEsHgmmBQwEEkjKDH4JBgVyDV4UDiHiRdyaCCwQdgVY8iX8BAQE
X-IronPort-AV: E=Sophos;i="5.17,464,1437436800"; d="asc'?scan'208";a="604889874"
Received: from aer-iport-nat.cisco.com (HELO aer-core-4.cisco.com) ([173.38.203.22]) by aer-iport-3.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 03 Sep 2015 21:01:58 +0000
Received: from [10.61.222.22] ([10.61.222.22]) by aer-core-4.cisco.com (8.14.5/8.14.5) with ESMTP id t83L1wpV023927; Thu, 3 Sep 2015 21:01:58 GMT
To: Russ Housley <housley@vigilsec.com>
References: <55A938F1.9090404@cs.tcd.ie> <20150720044849.GY28047@mournblade.imrryr.org> <B866063D-C1A8-4286-83E1-9EBAE7994297@vigilsec.com> <55E83554.6010808@cisco.com> <62CBD9E2-2DB4-4D3D-93E5-ADEB0F3D3C12@vigilsec.com>
From: Eliot Lear <lear@cisco.com>
Message-ID: <55E8B547.4040707@cisco.com>
Date: Thu, 03 Sep 2015 23:01:59 +0200
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:38.0) Gecko/20100101 Thunderbird/38.2.0
MIME-Version: 1.0
In-Reply-To: <62CBD9E2-2DB4-4D3D-93E5-ADEB0F3D3C12@vigilsec.com>
Content-Type: multipart/signed; micalg="pgp-sha256"; protocol="application/pgp-signature"; boundary="oIHH72nfJFCbeSCFOSHCj84j6GU2m3Dh8"
Archived-At: <http://mailarchive.ietf.org/arch/msg/saag/sw9BkHd0eeDgZdA41YC24ihKTGo>
Cc: saag@ietf.org
Subject: Re: [saag] AD review of draft-iab-crypto-alg-agility-06
X-BeenThere: saag@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Security Area Advisory Group <saag.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/saag>, <mailto:saag-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/saag/>
List-Post: <mailto:saag@ietf.org>
List-Help: <mailto:saag-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/saag>, <mailto:saag-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 03 Sep 2015 21:02:02 -0000

Much better.

Eliot


On 9/3/15 10:30 PM, Russ Housley wrote:
> Eliot:
>
> We are talking about section 2.6...
>
>>>   Without clear mechanisms for algorithm and suite transition,
>>>   preserving interoperability becomes a difficult social problem.  For
>>>   example, consider web browsers.  Dropping support for an algorithm
>>>   suite can break connectivity to some web sites, and the browser
>>>   vendor will lose users by doing so.  This situation creates
>>>   incentives to support algorithm suites that would otherwise be
>>>   deprecated in order to preserve interoperability.
>> Honestly this paragraph is confusing.  It's opaque because it's not
>> clear whether you're aiming at a strawman of where TLS doesn't support
>> agility or the case of long lived root or intermediate certificates.  If
>> it's the former, can you find a more current example?  And the last
>> sentence is just flat out ambiguous, although in an amusing sort of way
>> (who deprecates in order to preserve interoperability?).
> Kathleen also had a comment on this part of the document in her IESG ballot.
>
> I'm trying to address both comments with this proposal:
>
> 2.6.  Preserving Interoperability
>
>    Cryptographic algorithm deprecation is very difficult.  People do not
>    like to introduce interoperability problems, even to preserve
>    security.  As a result, flawed algorithms are supported for far too
>    long.  The impact of legacy software and long support tails on
>    security can be reduced by making it easy to transition from old
>    algorithms and suites to new ones.  Social pressure is often needed
>    to cause the transition to happen.
>
>    Implementers have been reluctant to remove deprecated algorithms or
>    suites from server software, and server administrators have been
>    reluctant to diable them over concerns that some party will no longer
>    have the ability to connect to their server.  Implementers and
>    administrators want to improve security by using the best supported
>    algorithms, but their actions are tempered by the desire to preserve
>    connectivity.  Recently, some browser vendors have started to provide
>    visual warnings when a deprecated algorithm or suite is used.  These
>    visual warnings provide a new incentive to transition away from
>    deprecated algorithms and suites.
>
>    Transition in Internet infrastructure is particularly difficult.  The
>    digital signature on the certificate for an intermediate
>    certification authority (CA) [RFC5280] is often expected to last
>    decades, which hinders the transition away from a weak signature
>    algorithm or short key length.  Once a long-lived certificate is
>    issued with a particular signature algorithm, that algorithm will be
>    used by many relying parties, and none of them can stop supporting it
>    without invalidating all of the subordinate certificates.  In a
>    hierarchical system, many subordinate certificates could be impacted
>    by the decision to drop support for a weak signature algorithm or an
>    associated hash function.
>
>    Institutions, being large or dominant users within a large user base,
>    can assist by coordinating the demise of an algorithm suite, making
>    the transition easier for their own users as well as others.
>
> Russ
>
>