Re: [lamps] [CMP Updates] Hash algorithm to us for calculating certHash

"Brockhaus, Hendrik" <hendrik.brockhaus@siemens.com> Tue, 08 June 2021 16:04 UTC

Return-Path: <hendrik.brockhaus@siemens.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 45A1F3A3502 for <spasm@ietfa.amsl.com>; Tue, 8 Jun 2021 09:04:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.797
X-Spam-Level:
X-Spam-Status: No, score=-1.797 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=siemens.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FIfv2vlPDGeu for <spasm@ietfa.amsl.com>; Tue, 8 Jun 2021 09:03:57 -0700 (PDT)
Received: from EUR04-DB3-obe.outbound.protection.outlook.com (mail-eopbgr60088.outbound.protection.outlook.com [40.107.6.88]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F370A3A34FF for <spasm@ietf.org>; Tue, 8 Jun 2021 09:03:56 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Amqka9OTM8bTvmyIgOPugp/ZNGIlmn9OzZ+4mfCjlUcrHxL/BrFi0r/4kleRNVPSZ2H6Zci498b7jJ5ugcVVrkhHadqsntc/syrunGvscQt+YDMR3pLJHEZmiIlALeOrXsbAiYzPa13BC/TwSTYecE9eQYsms6x6UpwdusRmvkM0DkAs+7pny7xX0gxnP0IrD/3NsLhIExQB6+zBysWcot7NRRusG2SBA135HsfoU8vPZi/euoB/ekV2JCtILepBxDq8xFKC6BtX0T8w/hzPlBQxehTPsr9EVcnm9lfs8JVzk8Cw6ZxjVCV7cjLUCXwDSJh9KxgLuyTR7BcVctgo4Q==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=LcOg/giU/TdZROLDJx4l2fm6pvtTLNqTQkB3U1wAGyY=; b=XTVfrQEdatTTv4cThYG2Q3Bcaojrm+OW0kpG7DgHkhP4utKUK+YhBwlNk293oPHtRMw3qK+UmITiZdLorqumDNvKEu6vJhUXOxe9LUYRJYtal58B/z9WDqvn7ZPu/oMSbqwRIMxxDTksuM/CgPOi9Qzbf7CHUN0PWQTKyF0PkXHaUIo8qURhYm2CZHqwJYq1jOQ+qSDcSJCqM/w1UYsIwQaqlNSak4c7pgyf5AInu8GsJoYqYE2Schh4MzuBAs3xgX+wvBzGRHRpxnJenmUAMjz3+Lqe8OvgBpNqwQniaNgrjokgBtGCTIWvHjl9vEc5FkYdYoY+hxVwB5/E6dVKug==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=siemens.com; dmarc=pass action=none header.from=siemens.com; dkim=pass header.d=siemens.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=siemens.onmicrosoft.com; s=selector1-siemens-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=LcOg/giU/TdZROLDJx4l2fm6pvtTLNqTQkB3U1wAGyY=; b=kvzxeZTyNmkyqbxV+J92hIf/SME1yc7a/fe8BCvUqI4RIi0tuu/4AR5SAcpUOsRBtuf4cYhxAe1LOcJoUOg81FpKkPsFYm3Uw++D0hp5/IVGPqotKT/JqowMD7HP1N3hkbTUNatNmJfwAU0usMh/JUIqSL3vhLCK4/8ii7efP40=
Received: from AM0PR10MB2418.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:208:dd::17) by AM9PR10MB4213.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:20b:1cd::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4195.20; Tue, 8 Jun 2021 16:03:54 +0000
Received: from AM0PR10MB2418.EURPRD10.PROD.OUTLOOK.COM ([fe80::d10f:2627:bd2d:f3b4]) by AM0PR10MB2418.EURPRD10.PROD.OUTLOOK.COM ([fe80::d10f:2627:bd2d:f3b4%6]) with mapi id 15.20.4195.030; Tue, 8 Jun 2021 16:03:54 +0000
From: "Brockhaus, Hendrik" <hendrik.brockhaus@siemens.com>
To: Lijun Liao <lijun.liao@gmail.com>
CC: LAMPS WG <spasm@ietf.org>, "david.von.oheimb@siemens.com" <david.von.oheimb@siemens.com>
Thread-Topic: [lamps] [CMP Updates] Hash algorithm to us for calculating certHash
Thread-Index: AddceUVg9PxwdNejS6OabHeKscwR6QAA5A4AAACZINA=
Date: Tue, 08 Jun 2021 16:03:54 +0000
Message-ID: <AM0PR10MB2418C293533C1D081411D53DFE379@AM0PR10MB2418.EURPRD10.PROD.OUTLOOK.COM>
References: <AM0PR10MB24188C86D787842B2C7D9DD6FE379@AM0PR10MB2418.EURPRD10.PROD.OUTLOOK.COM> <CANNx7D91544=ihPo_2kkAMK4wu3K12aqFkOkQ+V_kfVFPiAC1g@mail.gmail.com>
In-Reply-To: <CANNx7D91544=ihPo_2kkAMK4wu3K12aqFkOkQ+V_kfVFPiAC1g@mail.gmail.com>
Accept-Language: de-DE, en-US
Content-Language: de-DE
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_a59b6cd5-d141-4a33-8bf1-0ca04484304f_Enabled=true; MSIP_Label_a59b6cd5-d141-4a33-8bf1-0ca04484304f_SetDate=2021-06-08T16:03:53Z; MSIP_Label_a59b6cd5-d141-4a33-8bf1-0ca04484304f_Method=Standard; MSIP_Label_a59b6cd5-d141-4a33-8bf1-0ca04484304f_Name=restricted-default; MSIP_Label_a59b6cd5-d141-4a33-8bf1-0ca04484304f_SiteId=38ae3bcd-9579-4fd4-adda-b42e1495d55a; MSIP_Label_a59b6cd5-d141-4a33-8bf1-0ca04484304f_ActionId=ef927dde-eaa5-4f3d-90fa-5a072745085a; MSIP_Label_a59b6cd5-d141-4a33-8bf1-0ca04484304f_ContentBits=0
document_confidentiality: Restricted
authentication-results: gmail.com; dkim=none (message not signed) header.d=none;gmail.com; dmarc=none action=none header.from=siemens.com;
x-originating-ip: [147.161.171.14]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: b5a743cc-4acd-4849-55f2-08d92a970422
x-ms-traffictypediagnostic: AM9PR10MB4213:
x-ld-processed: 38ae3bcd-9579-4fd4-adda-b42e1495d55a,ExtAddr
x-ms-exchange-transport-forked: True
x-microsoft-antispam-prvs: <AM9PR10MB421316EF1DC6B779A10A5B4CFE379@AM9PR10MB4213.EURPRD10.PROD.OUTLOOK.COM>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AM0PR10MB2418.EURPRD10.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(4636009)(366004)(52536014)(2906002)(6916009)(71200400001)(5660300002)(53546011)(966005)(498600001)(54906003)(66476007)(107886003)(66556008)(26005)(166002)(66946007)(83380400001)(6506007)(76116006)(64756008)(4326008)(38100700002)(122000001)(7696005)(186003)(86362001)(8936002)(66446008)(9686003)(55016002)(33656002)(8676002)(15650500001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: c/EMiY4ka1CcM62p6g72VOgoc01q1k1ya4J5k5O7au08fHeFv+ocIuWQGglbnaGuLeTTeUl6WIAEzvIwXwrDSPGRMgwUYFh8KiooEAy+vaug3UiwvWOFBC3rYvFvpjVR2Kj6/QQveyzd+IOAcexqDiCeGNGqu+qqDN/Kv8swtn1d83evV2pJBd4s1pjAzJnTj6iAnQBFy+ZDssTzeEC/OErkoMTaVKjPkfZ++LWvd3ks40j+w9wrUBa848INIY+9dx6v8ewifBHADRihvmTZzgGtTb49PBeuJHgJ5Cmz33A8Zotg8yi3gV3NIeQfQ0TkUlK5jQq5HEt8DNTyb0V9KHShrldINNhF2weOpbNh5bVPuO78UH74FhURL0L8pt2GSY9FO4YRXDg9UbfSgpdI0qQvXx2J5s00B9LC/fI4PfQsW//0sf81wBStH6oRTzHcREMO4j0pOYJ6G5Zq4ypmbkkdMdfLP+bttwHqXKinvNYnYwv+q6S2uSr3tI7eFydgaFuW+Ucj1nMO69LYXcRX6fK3CBEWA5/kGHnr35wejCLWIx2YNLKv0OPgYr+3JJKMl+WWJSOqZldr1K4tA03HYuJeOFhhaU/2b+pT+30T8Y4i909PUFpvbew9pgmM3zew8LfOtTzoVp4s6LeArGfcu6uDXDul0UjufzXPjswJT8ynMkhVUFXxH1mw9O0cT2LkFqnaXrflyyCbUqhrFN1mC8Y4Z8l/szYYOTr+w+YfrX5iWSMyClnJJnHdVsvpd6/3LY9OVbVIEDPv6CAqyoMh6D6NuboW/5/f9iuKI15xJZrwxI47NopeF262kIZ9DXzpQcPSdxho7yUNtNpmnFrOnP+8nykJOfHGrMwuTM1aNTHfjDlzRioV7lGKTR6lXiUlnR1hT6gD5JakChPs2Dvuy+agfqxrjMnpcBDOOkkx5RjBVN1jijdeO1hu3N8i1PLpCce3rOidi2h9Xc6ZSMRxz8u1E+Z0lCSivnf7xk5gYrh3GrSMSgJPkca+TPappdToBYil27ChxZtgGhbcCJbIXpqz0JyhTK+cj1W0+zLWQ6uV5550PGZyIqAKh2byUWINQih7JRqsYWnQeJNTvLDIUGmeDGeXGo/vtnUDC0CQxHjZfBs8cGdWenbjLnQoTJwqSrsa4MeAQU90JQq8wnWWoW2kgIz0uftDno2Bnmtiw0gk3ApHKIHO1uAslFHe2TxLaN8u4OUEgDSDjlVCU7QlgYJLDhzyfFXzD66n9brczp2tMcJcDqq1rW2uHN8cOVafHZl231jzZk+W4BVoTRqIjnL5gHkUTwbGFzIFBIDDyz2OYMN+XJ/XAD5XyYv5pUHZ
Content-Type: multipart/alternative; boundary="_000_AM0PR10MB2418C293533C1D081411D53DFE379AM0PR10MB2418EURP_"
MIME-Version: 1.0
X-OriginatorOrg: siemens.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: AM0PR10MB2418.EURPRD10.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-Network-Message-Id: b5a743cc-4acd-4849-55f2-08d92a970422
X-MS-Exchange-CrossTenant-originalarrivaltime: 08 Jun 2021 16:03:54.6263 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 38ae3bcd-9579-4fd4-adda-b42e1495d55a
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: BwJJN5JK+z4VBJ2oZSTkJ97a3eF2QJ5uK26E5ABq+LAUtiPmrYNrtVuNmO7WlKPVQ47Ym+GNgTMI+hzcK/DE8dfUzYRbYvox/12Stw6Y6t4=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM9PR10MB4213
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/7It2jth4orWdaHy0cBDvqeIx3Js>
Subject: Re: [lamps] [CMP Updates] Hash algorithm to us for calculating certHash
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 08 Jun 2021 16:04:01 -0000

Thanks Liao for pointing me to this section. This would solve the issue for EdDSA. But a similar solution would be needed for upcoming signature algorithms having the same issue.
Using solution (3), like Russ proposes, one could of explicitly specify these hashAlgs. This could as well be mentioned somewhere in CMP Algorithms.
What do you think?

Hendrik

Von: Lijun Liao <lijun.liao@gmail.com>
Gesendet: Dienstag, 8. Juni 2021 17:42
An: Brockhaus, Hendrik (T RDA CST SEA-DE) <hendrik.brockhaus@siemens.com>
Cc: LAMPS WG <spasm@ietf.org>; von Oheimb, David (T RDA CST SEA-DE) <david.von.oheimb@siemens.com>
Betreff: Re: [lamps] [CMP Updates] Hash algorithm to us for calculating certHash

I prefer to use SHA-512 for Ed25519 and SHAKE256(x, 64) for Ed448, as in RFC8419:

2.3<https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fhtml%2Frfc8419%23section-2.3&data=04%7C01%7Chendrik.brockhaus%40siemens.com%7Cb7df84886b3840ccf54b08d92a9400b5%7C38ae3bcd95794fd4addab42e1495d55a%7C1%7C0%7C637587638146409426%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=Y627fZeD%2BEQVX5f5qy4X%2BU0vQl0NLO329E%2Beqx0p0t4%3D&reserved=0>.  Message Digest Algorithm Identifiers



   When the signer includes signed attributes, a message digest

   algorithm is used to compute the message digest on the eContent

   value.  When signing with Ed25519, the message digest algorithm MUST

   be SHA-512 [FIPS180<https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fhtml%2Frfc8419%23ref-FIPS180&data=04%7C01%7Chendrik.brockhaus%40siemens.com%7Cb7df84886b3840ccf54b08d92a9400b5%7C38ae3bcd95794fd4addab42e1495d55a%7C1%7C0%7C637587638146409426%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=mnWxww79bLA1LOJcUAjuU72ofBd1SpZ%2FMPQngC2olgY%3D&reserved=0>].  Additional information on SHA-512 is available

   in [RFC6234<https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fhtml%2Frfc6234&data=04%7C01%7Chendrik.brockhaus%40siemens.com%7Cb7df84886b3840ccf54b08d92a9400b5%7C38ae3bcd95794fd4addab42e1495d55a%7C1%7C0%7C637587638146419422%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=6Z%2BYO8Z9WHBqo%2Flf2ptpZafEV9cp8nKdYFLebB1yo50%3D&reserved=0>].  When signing with Ed448, the message digest algorithm

   MUST be SHAKE256 [FIPS202<https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fhtml%2Frfc8419%23ref-FIPS202&data=04%7C01%7Chendrik.brockhaus%40siemens.com%7Cb7df84886b3840ccf54b08d92a9400b5%7C38ae3bcd95794fd4addab42e1495d55a%7C1%7C0%7C637587638146419422%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=ATwZyWcQVZQSlPAxY4U8sdOWFmRRQXivUtjTT%2BuOjjA%3D&reserved=0>] with a 512-bit output value.

On Tue, Jun 8, 2021 at 5:20 PM Brockhaus, Hendrik <hendrik.brockhaus@siemens.com<mailto:hendrik.brockhaus@siemens.com>> wrote:
In OpenSSL recently a problem has been identified on how to derive a hash algorithm from signatureAlgorithm OID when using EdDSA, see https://github.com/openssl/openssl/issues/15477<https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Fopenssl%2Fopenssl%2Fissues%2F15477&data=04%7C01%7Chendrik.brockhaus%40siemens.com%7Cb7df84886b3840ccf54b08d92a9400b5%7C38ae3bcd95794fd4addab42e1495d55a%7C1%7C0%7C637587638146429413%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=weix2JOonIy8FvoHb0rF8jZIsQPDMSd7ZOJiG8LXkXA%3D&reserved=0>

In CMP this implicitly defined hash algorithms is used to calculate the certHash in a certConf messages. This would fail when using EdDSA.
The CertStatus structure including certHash is defined as follows:
     CertStatus ::= SEQUENCE {
        certHash    OCTET STRING,
        -- the hash of the certificate, using the same hash algorithm
        -- as is used to create and verify the certificate signature
        certReqId   INTEGER,
        -- to match this confirmation with the corresponding req/rep
        statusInfo  PKIStatusInfo OPTIONAL
     }

Therefore, the hash algorithms to be used for computing the certHash must be determined in some other way.
I currently see the following options:
(1) Specify usage of SHA-1 for calculating certHash, similar to the definition of the keyIdentifier in RFC 5280 Section 4.2.1.2.
  This is the cheapest solution, but we explicitly removed SHA-1 from CMP Algorithms, see mail thread "Re: CMP Algorithms I-D".
(2) Specify a hash algorithm on a per signature algorithm basis.
   This is also quite simple to implement, but costly to maintain for upcoming algorithms.
(3) Extend the ASN.1 syntax of CertStatus to allow to specify an optional hashAlg OID for those cases where the hash algorithm cannot be determined automatically.
   This is probably the cleanest solution, but involves a change to the ASN.1 syntax.

Does anyone sees other, better solutions?
What solution is preferred by the WG?

- Hendrik

_______________________________________________
Spasm mailing list
Spasm@ietf.org<mailto:Spasm@ietf.org>
https://www.ietf.org/mailman/listinfo/spasm<https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Fspasm&data=04%7C01%7Chendrik.brockhaus%40siemens.com%7Cb7df84886b3840ccf54b08d92a9400b5%7C38ae3bcd95794fd4addab42e1495d55a%7C1%7C0%7C637587638146429413%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=gfBHS7RQse%2BFFf4Z2k75gy8Ywr%2FLc9xf%2FlwtT4IUUr8%3D&reserved=0>


--
Lijun Liao