On 9/1/09 20:00, Paul Hoffman wrote:

You're right, of course, that SHA-1 is heading that way as well,

I never said that. The current best attack on SHA-1 is theoretical because of 
the number of steps involved, which is approximately as many as would be needed 
for MD5 before the attacks. Attacks always get better, but that doesn't mean 
that they get good enough to be practical.


You don't have to ditch SHA1, just be ready to do so, and tell everyone.

(Thanks to Julien who thanks Nelson, this looks easy.)


and the decisions we make here will likely shape policy for SHA-1's eventual 
decommissioning as well.

That I agree with, although I believe NIST's decisions will be a lot more 
important. (Disclaimer: I sometimes consult for NIST.)


Ahhh... no, please! Mozilla needs to do its own analysis. If it can't make up its own mind about MDs, which are the simplest possible building block in all of crypto, then what hope is there?


.... Please remember that they had the opportunity to just start randomizing 
their serial numbers (or to do nothing, for that matter...).


That's today's situation. The problem is that it is very difficult to analyse all the attack possibilities in the future that burst from more advanced work in MD5 collisions. Do surveys, etc, all take time.

As an economic result, the practical thing for the vendor is to totally get rid of MD5, because that reduces the attack surface.

As a consequence, CAs should do the same, even though they can cover today's attack with randomisation.

Yes, we break some eggs in this omelette because CAs will have to re-issue some certs [1] ... but last time we checked, that's what they did for a business!


In a recent discussion with the members of the CABForum this topic came up and 
I said to them that the discussion in the mozilla community was still active 
(clearly) but that I would encourage CAs not to count on MD5 support long term, 
and that if I had to ballpark a timeline, I'd put it between 6-18 months, based 
very largely on our confidence that doing so doesn't damage a significant 
portion of the public web.


Jonathon, can we take this to the decision point?

IMHO, here is why I and everyone on the net needs this decision: Chatter and noise is mostly meaningless. Complex decisions are also difficult to interpret. Only decisions are worthwhile being reported to other agents.

Right now there are CAs all around the world wondering what to do [1]. Switch to SHA1? randomise? Write long posts about how this doesn't apply to them? Keep quiet and hope nobody notices?

We know it is going to happen, so the easiest thing to do right now is to move to drop all MD5, everywhere. But, while there is confusion of possibilities, there are endless arguments about what particular thing should be done. And there is then a divergence of results ... wheel spinning.

We can sweep all this away with a decision.

(Later on a timeline, but once the decision has been made, at least the direction becomes clear. Timelines are implementation details...)


...

- Mozilla changes its rules for CAs in the trust anchor pile to say that they 
must not issue certificates with RSA-MD5 starting on some date (it could even 
be this year), and to say that sub-CAs cannot have their identities assured by 
RSA-MD5. This is a retroactive change to its acceptance policy in the pile.


I would argue that is already covered in the policy, because it has a clause that says that CAs must follow the technical decisions of Mozilla. I don't think we want to get into the rabbit hole of documenting all those technicalities :)

(But certainly a non-policy decision is called for.)


- CAs in the pile are required to send Mozilla a letter saying that they comply 
with all Mozilla policies, including this one.


Sorry, what is the point of asking for them to say they will survive any switch-off?


- All CAs for which that letter has not been received by the date given in the 
new policy are removed from the pile.


Sorry, what's the point of invalidating all the CA's certs, as opposed to just invalidating the MD5 certs?


This puts the responsibility squarely where it belongs: on the CAs and on 
Mozilla's policy enforcement. No technical changes are needed, and it shows 
that Mozilla is willing to bring its policies up to date with modern security 
practice. It is also a test run for Mozilla updating its trust anchor policies 
in the future.


Well, maybe, but it also puts more weight on requiring the CAs to do business level steps such as getting the CEO to sign the letter, getting the auditor to agree, etc.

This is mostly a technical level thing that can in most cases be sorted out at a lower layer of communications; For most CAs, the technicians can turn off MD5 without any need to discuss it because they already have the framework in place.

This is what happened at Verisign, they were 1 month (apparently) away from dropping MD5 entirely, so they just advanced the timetable. No discussion needed.



iang



[1] to declare any conflicts: CAcert's current major ("audit fail") subroot has an MD5 signature. They are arguing what to do ... endlessly :(
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to