[lamps] [CMP Updates] Hash algorithm to us for calculating certHash

"Brockhaus, Hendrik" <hendrik.brockhaus@siemens.com> Tue, 08 June 2021 15:20 UTC

Return-Path: <hendrik.brockhaus@siemens.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3DCAE3A33D2 for <spasm@ietfa.amsl.com>; Tue, 8 Jun 2021 08:20:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=siemens.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PYhe4kzpPkv0 for <spasm@ietfa.amsl.com>; Tue, 8 Jun 2021 08:19:55 -0700 (PDT)
Received: from EUR05-DB8-obe.outbound.protection.outlook.com (mail-db8eur05on2083.outbound.protection.outlook.com [40.107.20.83]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 155033A33CF for <spasm@ietf.org>; Tue, 8 Jun 2021 08:19:54 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=GQ4+uROixr+4oEiKmcCCh4qDy5grfT3bc9VIUXVEoGZBFX72nPDsqkFcblrZdyCW/gJHsdOZjrGhulvW1AeQBSbz7ZtYa8up2OxgIzlIwJDssas8Zd4v4cFHirGbjsUnJW5HRyf+/jCiTfmQADqKEHZq8iFZKyUs0w7nGmvQVQpnV8y6lk4ehmaAvsymeb9mp6aq0Ye71p5eFn9Oo2b6C8/92kEapf+OY3Lw1CC3UsCbuRdrwB7EFZwt1XI63uEKlcywOiFEZsd2MIiwHUKf1Dceo9cWPQPUkhAx2Xd05mT1JlPJkC2Zdnr4B9tRAwRPGTeObbFeKuSmzzohA2JHjw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=JLAMZghgJXNSZ/R3dTb5bNOQW8DJ2MNNzWgH2Xut2wc=; b=e4LYZGuK/w0hz3nmA9xsTvyvp5HZ5fI9lMoojOIn1AtB2yrt3G8TQVXY338zNd4MirJlWxP3nh1EPwuGCrOHzB1bg+XyNNMD0hU/4SK3M9ExyHYccDYJjKDqw1ytIeNmevm6fUJx6XR9zhtdIFqGy+d9Ak/d/jx+Cw7BnvvnryFfnIi+CrAxgbpw1HYsONuQob4CCpPdsAS1UGIZU///uDd12IghEeWgWnGBLgzGbw8FDsafLeKEhkriE9CpDMGZQlvG9s5ayelOv3gZY9LMpTQSNyshUuPYhUxcDelH3Y/t4xSJjimRoxlgAMvNyshSmW+VyzAtkYye+wBKH65bkQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=siemens.com; dmarc=pass action=none header.from=siemens.com; dkim=pass header.d=siemens.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=siemens.onmicrosoft.com; s=selector1-siemens-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=JLAMZghgJXNSZ/R3dTb5bNOQW8DJ2MNNzWgH2Xut2wc=; b=YPzWkCjcN4/EPvM89PU3WNU66zBAW5skM7GQ1qRDFrybg2VMYHuAjCG+py9DcDVrNjE24YqzomGxZAMEMNnUMbKTglazX9I9yBtYAqbPxkvDZWR4IA89cuG8M2npPW5eB3vbxbcTv9TCDxlgL3rFyuimxl8Nn76txm157qZyfAw=
Received: from AM0PR10MB2418.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:208:dd::17) by AM0PR10MB3153.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:208:184::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4195.22; Tue, 8 Jun 2021 15:19:53 +0000
Received: from AM0PR10MB2418.EURPRD10.PROD.OUTLOOK.COM ([fe80::d10f:2627:bd2d:f3b4]) by AM0PR10MB2418.EURPRD10.PROD.OUTLOOK.COM ([fe80::d10f:2627:bd2d:f3b4%6]) with mapi id 15.20.4195.030; Tue, 8 Jun 2021 15:19:52 +0000
From: "Brockhaus, Hendrik" <hendrik.brockhaus@siemens.com>
To: LAMPS WG <spasm@ietf.org>
CC: "david.von.oheimb@siemens.com" <david.von.oheimb@siemens.com>
Thread-Topic: [CMP Updates] Hash algorithm to us for calculating certHash
Thread-Index: AddceUVg9PxwdNejS6OabHeKscwR6Q==
Date: Tue, 08 Jun 2021 15:19:52 +0000
Message-ID: <AM0PR10MB24188C86D787842B2C7D9DD6FE379@AM0PR10MB2418.EURPRD10.PROD.OUTLOOK.COM>
Accept-Language: de-DE, en-US
Content-Language: de-DE
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_a59b6cd5-d141-4a33-8bf1-0ca04484304f_Enabled=true; MSIP_Label_a59b6cd5-d141-4a33-8bf1-0ca04484304f_SetDate=2021-06-08T15:19:51Z; MSIP_Label_a59b6cd5-d141-4a33-8bf1-0ca04484304f_Method=Standard; MSIP_Label_a59b6cd5-d141-4a33-8bf1-0ca04484304f_Name=restricted-default; MSIP_Label_a59b6cd5-d141-4a33-8bf1-0ca04484304f_SiteId=38ae3bcd-9579-4fd4-adda-b42e1495d55a; MSIP_Label_a59b6cd5-d141-4a33-8bf1-0ca04484304f_ActionId=f4c3fc39-372b-4661-93bb-8197818943fc; MSIP_Label_a59b6cd5-d141-4a33-8bf1-0ca04484304f_ContentBits=0
document_confidentiality: Restricted
authentication-results: ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=none action=none header.from=siemens.com;
x-originating-ip: [147.161.171.14]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: fd80fe0f-ab91-45a0-8813-08d92a90dd86
x-ms-traffictypediagnostic: AM0PR10MB3153:
x-ld-processed: 38ae3bcd-9579-4fd4-adda-b42e1495d55a,ExtAddr
x-ms-exchange-transport-forked: True
x-microsoft-antispam-prvs: <AM0PR10MB3153D27480F7000C53970C4CFE379@AM0PR10MB3153.EURPRD10.PROD.OUTLOOK.COM>
x-ms-oob-tlc-oobclassifiers: OLM:9508;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AM0PR10MB2418.EURPRD10.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(4636009)(366004)(64756008)(66476007)(66946007)(66556008)(66446008)(52536014)(8676002)(6916009)(33656002)(5660300002)(26005)(6506007)(107886003)(86362001)(15650500001)(83380400001)(186003)(8936002)(55016002)(4326008)(122000001)(9686003)(498600001)(76116006)(966005)(2906002)(38100700002)(7696005)(71200400001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: ikC5Gg1ARM8v87FyNSpPss9CE0eKATkqznLtjNH9C9GfQEu05CCF20rrLwXUuwlK00ZQ66iXl8vChWV7cGSdQ8VWp6eLa3dOE3tT3QYf8K8U7+FOdXuJNGzXlFRfhN3x7b9XdcInWlTL/J6AQ+nKWm3hhal1hxDnZf0AucvzqP+Z2+cb2qJcW7eRmBM/HNfSHYEpHvvhs4mpsFxqayKHlv0aGU8E+mkG+A9S5PvYQFkjmhg8rvhN33OPDpqok5VmsSy74FwahEg0/Dtb6qj55n4RI488dVNblqb2fGFr88cpTdOz9jsa9yQ9m5HugKOLyMfbrLZhbH2nx69nIHyhNzdu/Jbf22n4MK496GYJRi4s60+fEqRzhZyTp4nlh/742HtCzfK0+75rAhB+zt8oF98iMhE1t+HJvH5peFyWhMtWF3+YF/yP3oabByhIqMb2ELoZ/D0FfX9EoNW/SO+T/3OETcFFZSQ7GuU7nDsWUFQ45wL21A7lwrPOIVfHRXotaDR64ncwD6TI2RIErwS5iex9I2zJoxFDBLKhBWoK4Yhm5O0zIPaxlu66mKmfhQqee+AdXpGTLoI8C9FXNoUFlyMy09BthDwWdGTPlL3rO+3RHGB+ztZDxNESz5tDpfvJrhQM5R1HVGZmp0P611Eriacy3paPmGUBhTpBwMWKUW1z9T1uwFXcYFDQdt616zlsGyRFZlMQ9UOsU1VThKKs2pGTxmoPZz7higmVlND0A8YTTxR4KJCmRjBz3JuSg5JR0C0WGOu7MvsON8aY2clZ0hF9T5OlkVipHI+lp4C04dr9WHfZzu9mh1PXmSGbRDWsxem+NZB/JKDzKOR9pUMDXkbzRtU0flOaoU7mECtYvv3S9itUeEwuIL4mjzHK8jqxFriZ8IshOy6fgtholzlXJWj6X+CKT2UM5Pju9IEeWRqicRRZuaxUbQA0vlQGRHCa1aZgBkRaGpq3ctWDxU4GvGFnEUEDQyVTl0rF5/naHFxodbKmKv0ZSSWFHukSA2TaXtuAdrGTlWYyIzaYfDgsyDMTUkiig5oFAXPKKiSFnN649fIMIZITKnyiPUPvliLUuB9VnnobkCIFH4CudWECyxJ+FYQfAPyBTVAlo4CJJN+zT5UbfWUpBpWojqjGy7kxHcCxIUZxkhH3ne6rtYeJ1p94SYjR4KIaEaog7Jo/w9iVJ6OC/dj42DtZ8DzXRLJ7XmQEd+yaaMNeOB/McY5NhyPDAiTCT7oEm6mWOaSsec6X8tmH3cZYHp+5jAM+n+wwxS5jTq9Qofjr2OXlzNjrXqYL6jInxBGvjqIMb36vQNzxU9RoAKYxWdqldt2mWdrj
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: siemens.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: AM0PR10MB2418.EURPRD10.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-Network-Message-Id: fd80fe0f-ab91-45a0-8813-08d92a90dd86
X-MS-Exchange-CrossTenant-originalarrivaltime: 08 Jun 2021 15:19:52.8525 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 38ae3bcd-9579-4fd4-adda-b42e1495d55a
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: ibY0BLsC4FaYJkVyuPIhSgpQmMp+j5XiR4kfFA9uBmS540AcIhtp/fuFrEj0YpVmMMKzKKKSMES2xM/FU+lhgbF//ccLSg/6WL9P+h5qY+k=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR10MB3153
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/fEOurqdX8iH6QAxxfX4okNJTczA>
Subject: [lamps] [CMP Updates] Hash algorithm to us for calculating certHash
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 08 Jun 2021 15:20:01 -0000

In OpenSSL recently a problem has been identified on how to derive a hash algorithm from signatureAlgorithm OID when using EdDSA, see https://github.com/openssl/openssl/issues/15477

In CMP this implicitly defined hash algorithms is used to calculate the certHash in a certConf messages. This would fail when using EdDSA.
The CertStatus structure including certHash is defined as follows:
     CertStatus ::= SEQUENCE {
        certHash    OCTET STRING,
        -- the hash of the certificate, using the same hash algorithm
        -- as is used to create and verify the certificate signature
        certReqId   INTEGER,
        -- to match this confirmation with the corresponding req/rep
        statusInfo  PKIStatusInfo OPTIONAL
     }
 
Therefore, the hash algorithms to be used for computing the certHash must be determined in some other way.
I currently see the following options:
(1) Specify usage of SHA-1 for calculating certHash, similar to the definition of the keyIdentifier in RFC 5280 Section 4.2.1.2.
  This is the cheapest solution, but we explicitly removed SHA-1 from CMP Algorithms, see mail thread "Re: CMP Algorithms I-D".
(2) Specify a hash algorithm on a per signature algorithm basis.
   This is also quite simple to implement, but costly to maintain for upcoming algorithms.
(3) Extend the ASN.1 syntax of CertStatus to allow to specify an optional hashAlg OID for those cases where the hash algorithm cannot be determined automatically.
   This is probably the cleanest solution, but involves a change to the ASN.1 syntax.
 
Does anyone sees other, better solutions?
What solution is preferred by the WG?

- Hendrik