Re: Thunderbird S/MIME: Interoperability problem with gpgsm (KMail / Claws Mail)

2007-05-01 Thread Nelson B
Nelson Bolyard wrote:

> I will send an encrypted reply to the email I received.  We'll see if
> my correspondent can decrypt it.

I remembered that mozilla doesn't "import" (save) an encryption cert
from an email unless it can validate that cert.  That means the cert
has to have been issued by a trusted issuer.  So, I set the email trust
bit on the CACert root CA, and then read the message, and THEN mozilla
imported his cert and it appeared in Cert Manager.

Then I replied to the message with a signed and encrypted reply.
After sending it, I looked at the message I had just sent, and saw this:

  SEQUENCE {
OBJECT IDENTIFIER data (1 2 840 113549 1 7 1) (PKCS #7)
SEQUENCE {
  OBJECT IDENTIFIER rc2CBC (1 2 840 113549 3 2)
  SEQUENCE {
INTEGER 160
OCTET STRING 3B EE E9 74 FF FE 87 90
}
  }

Which tells me that mozilla sent an rc2 encrypted reply. :(
So, indeed, something seems wrong with mozilla's SMIME code here
(in NSS or PSM).  Given that the KMail message offered to receive
either 3DES or AES, and mozilla supports 3DES, mozilla should have
sent a 3DES reply.

-- 
Nelson B

___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto


Re: Thunderbird S/MIME: Interoperability problem with gpgsm (KMail / Claws Mail)

2007-05-01 Thread Martin Hoefling
Nelson B wrote:

Hi Nelson and others...

> Nelson Bolyard wrote:
> 
>> I will send an encrypted reply to the email I received.  We'll see if
>> my correspondent can decrypt it.

Just to reduce confusion about my mail: I am Martin Hoefling (using
KMail/Kontact), and Wurstsemmel is using Thunderbird. We encountered the
problems, while testing communication via S/Mime certificates.

As far as we understood, this is a thunderbird issue. Who should file a
bugreport? Shall we do it?

We can test, the patch, if a communication partner with KMail is needed.

Cheers
Martin
___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto


Re: Amending Mozilla's Root CA cert policy with key size requirements

2007-05-01 Thread Frank Hecker
Paul Hoffman wrote:
> At 2:12 PM -0700 4/30/07, Robert Relyea wrote:
>> I don't see a way around the legacy 1024 bit certs, but I would 
>> definately want to see wording that will discourage the issuance of 
>> new root certs that are less than 2048.
> 
>  From a cryptographic standpoint, such a policy would not make sense. 

You are correct in the strict sense. However IMO getting rid of 1024-bit 
certs will not be a one-time event where we remove all such certs, 
instead we have to plan for a transitional period as CAs phase out the 
use of old root CA certs and start issuing certs under new root CA 
certs. During that transition period it makes policy sense (if not 
cryptographic sense) to discourage inclusion of new 1024-bit root CA 
certs while allowing old ones to remain for a little while longer.

So if we do change our CA policy to reflect current thinking on modulus 
length I think we should do two things:

1. Stop accepting new 1024-bit CA certs immediately (or at least very soon).

2. Set a target date (or dates) for removal of legacy 1024-bit CA certs.

(This can also encompass looking at intermediate CA certs and related 
issues, of course.)

Frank

-- 
Frank Hecker
[EMAIL PROTECTED]
___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto


Re: Dumping RC2/40

2007-05-01 Thread Nicholas Sushkin
Thunderbird already has a bug which could be interpreted as a request to
disable RC2/40 - "S/MIME should not support weak crypto"
(https://bugzilla.mozilla.org/show_bug.cgi?id=84213)

Also, here's a thread in which author of gpgsm Werner Koch explains why he
doesn't support RC2 and what he thinks about Thunderbird implementation.
http://www.nabble.com/gpgsm-1.9.22-supports-no-RC2-Algorithm---tf3581426.html

Also, I am using KMail with gpgsm and Thunderbird when I can't decrypt using
KMail. So, if anyone needs testing, I can help.

Thanks.

Paul Hoffman wrote:

> At 5:38 PM -0700 4/27/07, Nelson Bolyard wrote:
>>Paul Hoffman wrote:
>>
>>>  Proposal:
>>>  a) Completely turn off the ability to encrypt with RC2/40 unless there
>>>  is no strong algorithm.
>>>  b) Every time you are about to encrypt with RC2/40, warn the user,
>>>  including an explanation of how Tb got to this point in the logic
>>>  chain.
>>
>>Patches cheerfully received. :)
> 
> Thought there should be some conversation first...

-- 
Nick
___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto


Re: Amending Mozilla's Root CA cert policy with key size requirements

2007-05-01 Thread Paul Hoffman
At 2:12 PM -0700 4/30/07, Robert Relyea wrote:
>I don't see a way around the legacy 1024 bit certs, but I would 
>definately want to see wording that will discourage the issuance of 
>new root certs that are less than 2048.

 From a cryptographic standpoint, such a policy would not make sense. 
All root certs are treated equivalently by Mozilla for validating 
domain names. Therefore, as long as there is even one root cert with 
a 1024-bit key, Mallory would attack that one cert and, if 
successful, issue bogus certificates with the compromised key.

If we make a rule about signature strength, it has to apply equally 
to every root certificate in the set; otherwise, the rule will have 
no effect on the security of the system.

--Paul Hoffman
___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto


Re: Thunderbird S/MIME: Interoperability problem with gpgsm (KMail / Claws Mail)

2007-05-01 Thread Robert Relyea

Martin Hoefling wrote:

Nelson B wrote:

Hi Nelson and others...

  

Nelson Bolyard wrote:



I will send an encrypted reply to the email I received.  We'll see if
my correspondent can decrypt it.
  


Just to reduce confusion about my mail: I am Martin Hoefling (using
KMail/Kontact), and Wurstsemmel is using Thunderbird. We encountered the
problems, while testing communication via S/Mime certificates.

As far as we understood, this is a thunderbird issue. Who should file a
bugreport? Shall we do it?
  

file the bug at bugzilla.mozilla.org  New->Other Products->NSS

We don't know if it's PSM or NSS, but at this point I think NSS picks 
the cipher, so start there.

Nelson's experiment clearly exonerates KMail.

bob

We can test, the patch, if a communication partner with KMail is needed.

Cheers
Martin
___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
  




smime.p7s
Description: S/MIME Cryptographic Signature
___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto


Re: Amending Mozilla's Root CA cert policy with key size requirements

2007-05-01 Thread Paul Hoffman
At 11:54 AM -0400 5/1/07, Frank Hecker wrote:
>Paul Hoffman wrote:
>>  At 2:12 PM -0700 4/30/07, Robert Relyea wrote:
>>>  I don't see a way around the legacy 1024 bit certs, but I would
>>>  definately want to see wording that will discourage the issuance of
>>>  new root certs that are less than 2048.
>>
>>   From a cryptographic standpoint, such a policy would not make sense.
>
>You are correct in the strict sense. '

Thank you. :-)

>However IMO getting rid of 1024-bit
>certs will not be a one-time event where we remove all such certs,
>instead we have to plan for a transitional period as CAs phase out the
>use of old root CA certs and start issuing certs under new root CA
>certs.

Yep. The tricky part will be getting them to agree to phase out their 
old certs in under five years. OTOH, Firefox is gaining enough 
traction where if we say "after 2013 all 1024-bit root certs will be 
banished from the root store", it might get them moving.

>During that transition period it makes policy sense (if not
>cryptographic sense) to discourage inclusion of new 1024-bit root CA
>certs while allowing old ones to remain for a little while longer.
>
>So if we do change our CA policy to reflect current thinking on modulus
>length I think we should do two things:
>
>1. Stop accepting new 1024-bit CA certs immediately (or at least very soon).

Fully agree.

>
>2. Set a target date (or dates) for removal of legacy 1024-bit CA certs.

Fully agree.

What about 1536-bit CA certs? This is a serious question. We need to 
understand whether or not the CAs we care about want this 
intermediate size for any reason, or if we make the required size 
after the cutoff to be 2048 bits.

Again, while we are at it, how about mandating SHA-246? We can safely 
assume complete deployment of it within five years.
___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto