Re: [secdir] SecDir review of draft-ietf-csi-hash-threat-09

Paul Hoffman <phoffman@imc.org> Wed, 10 March 2010 18:55 UTC

Return-Path: <phoffman@imc.org>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 343AF3A698A; Wed, 10 Mar 2010 10:55:07 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.046
X-Spam-Level:
X-Spam-Status: No, score=-6.046 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HELO_MISMATCH_COM=0.553, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ya-r4UiSjstx; Wed, 10 Mar 2010 10:55:05 -0800 (PST)
Received: from balder-227.proper.com (Balder-227.Proper.COM [192.245.12.227]) by core3.amsl.com (Postfix) with ESMTP id 1D3583A6978; Wed, 10 Mar 2010 10:54:38 -0800 (PST)
Received: from [10.20.30.158] (75-101-30-90.dsl.dynamic.sonic.net [75.101.30.90]) (authenticated bits=0) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id o2AIsfqW067089 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 10 Mar 2010 11:54:42 -0700 (MST) (envelope-from phoffman@imc.org)
Mime-Version: 1.0
Message-Id: <p06240804c7bd964b880f@[10.20.30.158]>
In-Reply-To: <BF345F63074F8040B58C00A186FCA57F1C6A8C4581@NALASEXMB04.na.qualcomm.com>
References: <BF345F63074F8040B58C00A186FCA57F1C6A8C4581@NALASEXMB04.na.qualcomm.com>
Date: Wed, 10 Mar 2010 10:54:39 -0800
To: "secdir@ietf.org" <secdir@ietf.org>, "draft-ietf-csi-hash-threat@tools.ietf.org" <draft-ietf-csi-hash-threat@tools.ietf.org>, "iesg@ietf.org" <iesg@ietf.org>, "csi-chairs@tools.ietf.org" <csi-chairs@tools.ietf.org>
From: Paul Hoffman <phoffman@imc.org>
Content-Type: text/plain; charset="us-ascii"
Subject: Re: [secdir] SecDir review of draft-ietf-csi-hash-threat-09
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 10 Mar 2010 18:55:07 -0000

At 9:23 AM -0800 3/10/10, Laganier, Julien wrote:
>- Section 3 explains what is a first-preimage attack, a second preimage attack, a collision attacks, etc. I do no think this document is the right place to do this. A simple reference to the definition of the attacks could be added if necessary, e.g. "For a definition of the various attacks against hash function properties, see [HAC] [...] [HAC] Handbook of Applied Cryptography, Alfred J. Menezes et al., 2001, http://www.cacr.math.uwaterloo.ca/hac/"

Or just shorten it to a two-sentence reference to RFC 4270, which is repeatedly referred to in this section.

>- Section 3.1. explains that the "impacts of collision attacks on current uses of CGAs and the CGA hash agility are analyzed in the update of the CGA specification [rfc4982]", yet it goes on with explaining what is the purpose of a CGA etc. If RFC4982 has done the analysis already, simply cite it, and state the result, e.g. "impacts of collision attacks on current uses of CGAs and the CGA hash agility are analyzed in the update of the CGA specification [rfc4982] which concludes that no current hash vulnerability impacts the security properties afforded by the use of CGAs".

Quite right.

>- Section 3.2 similarly goes on musing on attacks against X.509 certificates. Again, I'd rather have the section refer to an analysis of the vulnerabilities introduced by the use of hashes by X.509 certificates, and simply state the conclusion of the analysis in this document. If no proper analysis has been done, then it could be done in this document, but this section as is doesn't seem to do that in an appropriate way.

Fully agree. The quality of collision-based attacks on PKIX certificates continues to improve every few years. Arjen Lenstra and Benne de Weger have no problem finding grad students (and even undergraduates) who want to make their name in this area, often with success.

>- Section 3.3. has a similar problem as above. It muses on non-repudiation etc. but does not say what I'm interested in. If security of SEND does not rely on non-repudiation property of the signature, state it and explain why. I am not interested in how to attack the non-repudiation property of a signature using a hash vulnerability, I am interested in how can (or can't) I attack SEND using a non-repudiation vulnerability...

Non-repudiation is one of the best-known ratholes in the PKIX space.

I apologize for not reading this document sooner, but it is really a mess and should not be published even as an Informational RFC. In addition to the problems listed above, the document is also riddled with factual problems:

- It says that it "analyzes the hash usage in SEND following the recommended approach [rfc4270] [new-hashes]" but does not deal with the methods in [new-hashes] (which has an under-specified reference) at all.

- It says that RFC 4270 says many things that absolutely are not in RFC 4270.

- It says that there have been SHA-1 collisions, which are still likely but still completely theoretical.

- There are numerous context-free statements like "The strength of Internet protocol does not have to be necessarily affected by the weakness of the underlaying hash function".

- The CGA-specific discussion of if preimage attacks were feasible ignores the fact that CGA is the least of anyone's worries if preimage attacks were feasible: there would be a systemwide security meltdown, of which CGA would be a tiny whiff.

Please strongly consider killing off this document, given that RFCs 4270 and 4982 already cover the material completely. If RFC 4982 does not cover every aspect relevant to SEND, a two-paragraph update to RC 4982 would be much better than this document.