FYI. Quietly ignoring fractional seconds makes sense to me. From: David McGrew <[email protected]> Date: Saturday, August 11, 2018 at 9:45 AM To: Rich Salz <[email protected]>, "Barry Fussell (bfussell)" <[email protected]> Cc: "Marty Loy (mloyjr)" <[email protected]>, "Jonathan Felten (jfelten)" <[email protected]>, "Bill Sulzen (bsulzen)" [email protected]<mailto:[email protected]> Subject: Re: Certificate fractional time processing in upcoming openssl releases
Hi Barry and Rich, Thanks for this. I think that having the rejection of fractional seconds be part of the “—strict” option makes sense. As I understand it, there are fielded certs with fractional seconds in GeneralizedTime, which violates the RFC5280 profile but doesn’t introduce any vulnerability. That RFC aims to promote interoperability by making a profile of X509 formats and semantics, and fractional seconds is only formatting, and not semantics. So it seems counter to the spirit of the RFC to prevent openSSL from being able to interoperate with certs issued by IAIK or whatever noncompliant systems. Thanks, David From: "Salz, Rich" <[email protected]<mailto:[email protected]>> Date: Friday, August 10, 2018 at 12:24 PM To: "Barry Fussell (bfussell)" <[email protected]<mailto:[email protected]>> Cc: "Marty Loy (mloyjr)" <[email protected]<mailto:[email protected]>>, "Jonathan Felten (jfelten)" <[email protected]<mailto:[email protected]>>, mcgrew <[email protected]<mailto:[email protected]>>, "Bill Sulzen (bsulzen)" <[email protected]<mailto:[email protected]>> Subject: Re: Certificate fractional time processing in upcoming openssl releases Please post to [email protected]<mailto:[email protected]> It’s a moderated list, but the posting will get approved very quickly. From: "Barry Fussell (bfussell)" <[email protected]<mailto:[email protected]>> Date: Friday, August 10, 2018 at 9:34 AM To: Rich Salz <[email protected]<mailto:[email protected]>> Cc: "Marty Loy (mloyjr)" <[email protected]<mailto:[email protected]>>, "Jonathan Felten (jfelten)" <[email protected]<mailto:[email protected]>>, David McGrew <[email protected]<mailto:[email protected]>>, "Bill Sulzen (bsulzen)" <[email protected]<mailto:[email protected]>> Subject: Certificate fractional time processing in upcoming openssl releases Rich, My team was recently made aware of a change in the time comparison logic in openssl to adhere to RFC5280 requirements . This change will be in the upcoming 1.0.2p and 1.1.0i releases. We’ve had discussions regarding the impact to legacy devices in the field and feel the change could be detrimental if enabled by default. We've seen fractional time used in many cases, for example the IAIK crypto library generated fractional times for quite a while. I believe the issue with the IAIK library has been fixed, but products still have those certs embedded in them today. In reading the discussion linked below it seems the only impetus for this change was to meet RFC5280, not that allowing fractional times was any specific vulnerability. https://github.com/openssl/openssl/issues/2620<https://urldefense.proofpoint.com/v2/url?u=https-3A__github.com_openssl_openssl_issues_2620&d=DwMFAg&c=96ZbZZcaMF4w0F4jpN6LZg&r=4LM0GbR0h9Fvx86FtsKI-w&m=Lwc9LOtfM8pc8gkaABxWdUutvh8gwoL2KvhYe2d4y3Q&s=7DMTtQYOol3SGlQwP-5nyNTMX8ulbcaYRt5_PF8ol7g&e=> Is there any option for this going forward, removal, compile-time enabled or part of the strict checks ? Thanks ! Barry Fussell [http://www.cisco.com/web/europe/images/email/signature/tomorrow_anthem_H.png] Barry Fussell Technical Leader Security & Trust Organization [email protected]<mailto:[email protected]> Phone: +1 919 392 2920 Cisco Systems, Inc. 7025-2 Kit Creek Road Research Triangle Park, NC 27709 United States Cisco.com<https://urldefense.proofpoint.com/v2/url?u=http-3A__www.cisco.com_&d=DwMFAg&c=96ZbZZcaMF4w0F4jpN6LZg&r=4LM0GbR0h9Fvx86FtsKI-w&m=Lwc9LOtfM8pc8gkaABxWdUutvh8gwoL2KvhYe2d4y3Q&s=jiXJrK_CCjJLudysdejd12bdgw7_tY1mj_o-AtgDeLw&e=> [http://www.cisco.com/assets/swa/img/thinkbeforeyouprint.gif]Think before you print. This email may contain confidential and privileged material for the sole use of the intended recipient. Any review, use, distribution or disclosure by others is strictly prohibited. If you are not the intended recipient (or authorized to receive for the recipient), please contact the sender by reply email and delete all copies of this message. Please click here<https://urldefense.proofpoint.com/v2/url?u=http-3A__www.cisco.com_web_about_doing-5Fbusiness_legal_cri_index.html&d=DwMFAg&c=96ZbZZcaMF4w0F4jpN6LZg&r=4LM0GbR0h9Fvx86FtsKI-w&m=Lwc9LOtfM8pc8gkaABxWdUutvh8gwoL2KvhYe2d4y3Q&s=gfKgERtaAUVlAA0GHdXitfmhgtPbojPDaeFPm99y5SU&e=> for Company Registration Information.
_______________________________________________ openssl-project mailing list [email protected] https://mta.openssl.org/mailman/listinfo/openssl-project
