Re: [websec] Key pinning for DSA keys with inherited domain params

Yoav Nir <ynir@checkpoint.com> Tue, 13 December 2011 06:11 UTC

Return-Path: <ynir@checkpoint.com>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2AC0921F8538 for <websec@ietfa.amsl.com>; Mon, 12 Dec 2011 22:11:55 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.28
X-Spam-Level:
X-Spam-Status: No, score=-10.28 tagged_above=-999 required=5 tests=[AWL=-0.281, BAYES_00=-2.599, J_CHICKENPOX_46=0.6, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id odtvCm43TahE for <websec@ietfa.amsl.com>; Mon, 12 Dec 2011 22:11:53 -0800 (PST)
Received: from michael.checkpoint.com (smtp.checkpoint.com [194.29.34.68]) by ietfa.amsl.com (Postfix) with ESMTP id 46C5321F84D2 for <websec@ietf.org>; Mon, 12 Dec 2011 22:11:53 -0800 (PST)
X-CheckPoint: {4EE6EB4B-0-1B221DC2-1FFFF}
Received: from il-ex01.ad.checkpoint.com (il-ex01.ad.checkpoint.com [194.29.34.26]) by michael.checkpoint.com (8.13.8/8.13.8) with ESMTP id pBD6BnX1030055; Tue, 13 Dec 2011 08:11:49 +0200
Received: from il-ex01.ad.checkpoint.com ([126.0.0.2]) by il-ex01.ad.checkpoint.com ([126.0.0.2]) with mapi; Tue, 13 Dec 2011 08:11:49 +0200
From: Yoav Nir <ynir@checkpoint.com>
To: Chris Palmer <palmer@google.com>
Date: Tue, 13 Dec 2011 08:11:39 +0200
Thread-Topic: [websec] Key pinning for DSA keys with inherited domain params
Thread-Index: Acy5Xhld5Y+196YyRvKZnr+G5tKZKg==
Message-ID: <D36CA259-5E25-41A4-A3BE-765636D7C491@checkpoint.com>
References: <76E2AAC7-2070-4C98-B0EE-08BE5D2B0CB9@team.telstra.com> <CAL9PXLz7fVbH5SC0X1G+uj_-BZKW=Gj5L1zQbxX8398e+e2t6g@mail.gmail.com> <CAOuvq213m-KNTenfNLi1nknj1KPa4O_m7yAXpDtX7NaDiMraWA@mail.gmail.com> <CAOuvq22Y0Ame2BGZuPM_YsYztQB0en=5+btQVg5C9p-Hk4V67g@mail.gmail.com>
In-Reply-To: <CAOuvq22Y0Ame2BGZuPM_YsYztQB0en=5+btQVg5C9p-Hk4V67g@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
x-kse-antivirus-interceptor-info: scan successful
x-kse-antivirus-info: Clean
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: "websec@ietf.org" <websec@ietf.org>
Subject: Re: [websec] Key pinning for DSA keys with inherited domain params
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 13 Dec 2011 06:11:55 -0000

True. I don't expect DSA to ever become viable enough to worry about.  I think if you ran the same select for ECDSA, you would come up with zero, but there is some expectation of that changing in the long run. 

By now all the major browsers except Opera support ECDSA, so we might be seeing some of those when websites feel it's safe to abandon the IE6-on-Windows-XP and old Macs.

On Dec 13, 2011, at 2:55 AM, Chris Palmer wrote:

> Of these, the handful that I spot-checked are all either down,
> expired, or have been replaced with certificates for RSA keys.
> 
> On Mon, Dec 12, 2011 at 4:37 PM, Chris Palmer <palmer@google.com> wrote:
>> Also, FWIW, from the EFF SSL Observatory:
>> 
>> mysql> select distinct `Subject Public Key Info:Public Key Algorithm`
>> from valid_certs;
>> +----------------------------------------------+
>> | Subject Public Key Info:Public Key Algorithm |
>> +----------------------------------------------+
>> |  rsaEncryption                               |
>> |  dsaEncryption                               |
>> +----------------------------------------------+
>> 2 rows in set (4.09 sec)
>> 
>> mysql> select count(*) from valid_certs where `Subject Public Key
>> Info:Public Key Algorithm` like '%dsa%';
>> +----------+
>> | count(*) |
>> +----------+
>> |       25 |
>> +----------+
>> 1 row in set (3.26 sec)