- Mozilla changes its rules for CAs in the trust anchor pile to say that they must not issue certificates with RSA-MD5 starting on some date (it could even be this year),

Sure, that would be a great way to start with. I think that saying "do what you want but if you sign certs with MD5 your customers will be very unhappy because these certs will show up as invalid after 2010-xx-yy, so we suggest not issuing any after 2009-xx-yy" would be quite similar in effect, but would also have an effect on the CAs that are not trusted by default in NSS. (Of course, Mozilla has no obligation to keep those secure, but is there something speaking against it?)

The main difference is that my solution would force all MD5 certs out of circulation by the given date, no matter their expiration date, while yours would allow MD5 certs with long validity periods to stay in use. The question is closely related to whether we are reasonably sure that noone except the recent researchers managed to get a collision-signed cert or not. If we are willing to take that small risk (which is probably smaller than the unavoidable other risks like CA mistakes), and we don't care about CAs that are not trusted in the default settings, and we assume that preimage attacks on MD5 will not occur in the next years, then it is better just to disallow issuing new certs as you suggested and not invalidating old ones.

However, this is just my opinion, Ian G seems to have pretty good arguments why a purely technical decision (just dropping MD5 support after announcement) might be better.

No matter what way will be chosen, the sooner it happens, the sooner we will get rid of this security risk. (Mind that after the decision and announcement it will take 1 year or more until the MD5 problem is finally solved.) I think a "partial preimage attack" where you generate a "mostly" colliding cert and where it is possible to compensate for random serial numbers after the signature might be easier than a full preimage attack on normal certs.

Putting pressure on the CAs to act soon and do so in a secure manner (i.e. get rid of MD5 completely, more breaks are quite probable I think) is a good idea, IMO, so I suggest that the ones who can do the decision follow Paul's idea with a date like 3-6 months in the future(shoudn't be that hard to change the signature algorithm) and maybe follow up with mine to cover the remaining issues if it seems necessary after that. I think announcing to disable MD5 support in 1.5 years would also lessen the probability that a CA thinks "lets ignore their policy, they make an exception for us as we are too big to be removed".

Jan

--
Please avoid sending mails, use the group instead.
If you really need to send me an e-mail, mention "FROM NG"
in the subject line, otherwise my spam filter will delete your mail.
Sorry for the inconvenience, thank the spammers...
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to