At 9:25 AM -0400 4/26/07, Robert Relyea wrote:
>Now technically KMail MUST implement RC2-40 (is the implementers 
>confusing RC2 with RC5?) according to the S/MIME spec (all 
>implementations must support RC2-40. All strong implementations must 
>support 3DES).
. . .
>4. The S/MIME spec requires accepting RC2-40 by all S/MIME implementations.

Not true. RFC 3851 is very, very careful about this. [[ Disclaimer: I 
helped write a lot of the language in this part of the spec. ]]

Section 2.7 says:

    Sending and receiving agents MUST support encryption and decryption
    with DES EDE3 CBC, hereinafter called "tripleDES" [CMSALG].
    Receiving agents SHOULD support encryption and decryption using the
    RC2 [CMSALG] or a compatible algorithm at a key size of 40 bits,
    hereinafter called "RC2/40".  Sending and receiving agents SHOULD
    support encryption and decryption with AES [CMSAES] at a key size of
    128, 192, and 256 bits.

SHOULD != MUST.

Further, section 2.7.2 says:

2.7.2.  Choosing Weak Encryption

    Like all algorithms that use 40 bit keys, RC2/40 is considered by
    many to be weak encryption.  A sending agent that is controlled by a
    human SHOULD allow a human sender to determine the risks of sending
    data using RC2/40 or a similarly weak encryption algorithm before
    sending the data, and possibly allow the human to use a stronger
    encryption method such as tripleDES.


>In practice the number of weak implementations out there has 
>declined, so we may want to rethink our defaults in NSS to be 3DES 
>unless we have some hint the recipient is a weak client.

Let's start that rethinking now. The only reason to support RC2/40 
for encryption is to send to a receiver that does not support any of 
the strong algorithms you know. There are essentially zero 
applications for which this is true.

Proposal:
a) Completely turn off the ability to encrypt with RC2/40 unless 
there is no strong algorithm.
b) Every time you are about to encrypt with RC2/40, warn the user, 
including an explanation of how Tb got to this point in the logic 
chain.

_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to