why the proposal I made (force CAs to agree not to issue new MD5
certs, and to not allow any sub-CAs signed with MD5) does not cover
your desire.
I said that your proposal DOES (mostly) cover my desire and should be
implemented. I also tried to point out the differences I see between
the proposals and what conditions would (all) have to be met so it is
not necessary to go the additional step of invalidating existing MD5
certificates.
I said that assuming that (1) there will be no preimage attack on MD5
for the next years (I did not make any assumptions on how probable that
is, I don't consider it very probable that someone finds such an attack
in the next few years) AND (2) if we are willing to take the small risk
that someone might have already done (and not published but kept for
later abuse) exactly the attack that was demonstrated at the end of the
last year (which I considered OK), AND (3) we don't care about
non-default CAs, then your proposal is way better than mine.
I already pointed out in my last post that (2) shouldn't be a problem
but still wanted to point that risk out as something that is there and
should be considered by people who can assess it better. I also did not
consider (1) a problem (might not have been clear enough) and again
just did not want to conceal that assumption. So it all depends on if
we should care about CAs not trusted in the default install of Mozilla
apps and thus bound by mozilla policies, and if we don't (which is
reasonable) then I was and am saying that your solution IS better. In
case we want to care about CAs that are not bound by mozilla policies
(which I also consider reasonable), then (and only then) my proposal
might have advantages.
I don't know why this makes you assume that I
mistrust the cryptographer community so deeply
No matter what way will be chosen, the sooner
it happens, the sooner we will get rid of this
security risk.
Please state your security risk,
CAs that may still be issuing MD5 certs if *nothing* gets done. This is
why the proposal you made *does* cover my desire. Your proposal would
put all the risks we know to be significant out of the way, while mine
would also fix some smaller ones that can *probably* be ignored as
insignificant (but we can't be 100% sure).
I think mine is a tiny bit more secure (mostly by avoiding the risk
that someone might already have a colliding cert using the known attack
and didn't publish it) at the expense of refusing some valid certs,
while yours is probably still secure enough and avoids invalidating
certs.
As I learned that in security, it is often attempted not to take any
risks, not even quite far-fetched ones, I don't know if someone who
takes the decisions will not prefer the "paranoid" way despite the
disadvantages. I really do not know what choice is the right one,
taking certain minor risks or avoiding them too at a certain cost.
To put it short and clean: I consider your proposal better than mine,
but depending on what one wants to achieve, mine could have some
advantages at the cost of (bigger) disadvantages.
Jan
--
Please avoid sending mails, use the group instead.
If you really need to send me an e-mail, mention "FROM NG"
in the subject line, otherwise my spam filter will delete your mail.
Sorry for the inconvenience, thank the spammers...
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto