Re: Suggestion: Announce date for MD5 signature deactivation

2009-01-13 Thread Paul Hoffman
At 5:29 PM -0800 1/13/09, Julien R Pierre - Sun Microsystems wrote: >Just because root CAs have stopped using MD5 doesn't mean every intermediate >CA in the world has stopped yet. It would be a fairly arduous task to >determine that. If a sub CA hasn't stopped using MD5 yet, they may be subject

Re: Suggestion: Announce date for MD5 signature deactivation

2009-01-13 Thread Julien R Pierre - Sun Microsystems
Gervase, Gervase Markham wrote: Ben Bucksch wrote: I propose to announce that we'll stop supporting MD5 in 3 months, and ask website owners to get new certs. On the basis of any known risk? The current attack requires the attacker to be able to get a cert signed for a key they control. If al

JSS API for FIPS Self Tests

2009-01-13 Thread Sreedhar Kamishetti
Hello, I just started looking at JSS. Can some one point me to the API provided by JSS for running Power Up and Conditional Self Tests for various cryptographic modules/algorithms? Thanks, Sreedhar ___ dev-tech-crypto mailing list dev-tech-

Re: Suggestion: Announce date for MD5 signature deactivation

2009-01-13 Thread Gervase Markham
Ben Bucksch wrote: > I propose to announce that we'll stop supporting MD5 in 3 months, and > ask website owners to get new certs. On the basis of any known risk? The current attack requires the attacker to be able to get a cert signed for a key they control. If all CAs stop using MD5 (which they

Re: PositiveSSL is not valid for browsers

2009-01-13 Thread Gervase Markham
Florian, Thank you for bringing this to my attention. Florian Weimer wrote: > But the EV certificate was issued to "SEB AG", a different legal > entity. (SEB AG, in turn, is part of Skandinaviska Enskilda Banken > AB.) Are you able to outline the exact corporate relationship between these three

Re: Suggestion: Announce date for MD5 signature deactivation

2009-01-13 Thread Eddy Nigg
On 01/13/2009 09:56 PM, Paul Hoffman: We disagree here. I think it would be more problematic for Mozilla to be accused of having hard-to-find policy changes than to simply change the policy itself when needed. I did not suggest that there should be "hard-to-find policy changes" at all. Bes

Re: Suggestion: Announce date for MD5 signature deactivation

2009-01-13 Thread Paul Hoffman
At 9:00 PM +0200 1/13/09, Eddy Nigg wrote: >On 01/13/2009 05:23 PM, Paul Hoffman: >>>Useful yes, up to certain extend. If there is too much information in the >>>policy, it will start to be problematic. >> >>For whom? > >For Mozilla mostly. We disagree here. I think it would be more problematic f

Re: Suggestion: Announce date for MD5 signature deactivation

2009-01-13 Thread Eddy Nigg
On 01/13/2009 05:23 PM, Paul Hoffman: Useful yes, up to certain extend. If there is too much information in the policy, it will start to be problematic. For whom? For Mozilla mostly. Most CAs run businesses where written policies are the norm. Mozilla is not a CA. Where did Frank say,

Re: JSS doesn't support AES key unwrapping

2009-01-13 Thread Glen Beasley
alex.agra...@gmail.com wrote: FYI - I submitted a patch that fixes the problem. See https://bugzilla.mozilla.org/show_bug.cgi?id=470982 for details. ___ dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/de

Re: Cert expiry with Key Continuity Management

2009-01-13 Thread Paul Hoffman
At 3:31 PM + 1/13/09, Rob Stradling wrote: >Why "almost every piece of PKIX validating software" ? > >I think it would be worth it if, at a minimum... > - the majority of CAs added the extension to the certificates they issue, >and... > - Mozilla implemented support for the extension in NSS.

Re: Cert expiry with Key Continuity Management

2009-01-13 Thread Rob Stradling
Why "almost every piece of PKIX validating software" ? I think it would be worth it if, at a minimum... - the majority of CAs added the extension to the certificates they issue, and... - Mozilla implemented support for the extension in NSS. This would allow Mozilla to disable a weak algorith

Re: Suggestion: Announce date for MD5 signature deactivation

2009-01-13 Thread Paul Hoffman
At 11:16 AM +0200 1/13/09, Eddy Nigg wrote: >On 01/13/2009 10:15 AM, Rob Stradling: >>Eddy, I do think that the Mozilla CA Certificate Policy should cover >>*all* "actual" problematic practices. In this particular case, I think that >>a blacklist of unsupported/non-allowed/not-recommended algorith

Re: Cert expiry with Key Continuity Management

2009-01-13 Thread Paul Hoffman
At 9:55 AM + 1/13/09, Rob Stradling wrote: >Thanks Ben. Perhaps it's time to have another go at canvassing support for >the idea. In 2006, the PKIX WG didn't seem interested in tackling the >problem I was trying to solve. > >Paul, do you think it's worth re-raising this idea with the PKIX WG

Re: Suggestion: Announce date for MD5 signature deactivation

2009-01-13 Thread Eddy Nigg
On 01/13/2009 02:09 PM, Ian G: Let's work from Mozo's documentation. Where is it? Otherwise we are liable to get distracted... If this is not a documented situation, Rob already explained it. Or, have a look at my comments on "dropping the root is useless". This is not documented, this is how

Re: Suggestion: Announce date for MD5 signature deactivation

2009-01-13 Thread Ian G
On 13/1/09 11:57, Eddy Nigg wrote: On 01/13/2009 12:50 PM, Ian G: Sorry, where is this documented? It looks unfamiliar and unworkable to me. In which respect unworkable? Please explain. Let's work from Mozo's documentation. Where is it? Otherwise we are liable to get distracted... If

Re: Suggestion: Announce date for MD5 signature deactivation

2009-01-13 Thread Eddy Nigg
On 01/13/2009 12:50 PM, Ian G: Sorry, where is this documented? It looks unfamiliar and unworkable to me. In which respect unworkable? Please explain. -- Regards Signer: Eddy Nigg, StartCom Ltd. Jabber: start...@startcom.org Blog: https://blog.startcom.org

Re: Suggestion: Announce date for MD5 signature deactivation

2009-01-13 Thread Ian G
On 13/1/09 10:16, Eddy Nigg wrote: Before Mozilla yanks any root (which isn't something Mozilla does for fun really), Mozilla will confront the CA with the concern and assumed risk concerning the practice of the CA. - Mozilla will give the CA reasonable time to address the concern - where "reason

Re: Cert expiry with Key Continuity Management

2009-01-13 Thread Rob Stradling
Thanks Ben. Perhaps it's time to have another go at canvassing support for the idea. In 2006, the PKIX WG didn't seem interested in tackling the problem I was trying to solve. Paul, do you think it's worth re-raising this idea with the PKIX WG ? On Tuesday 13 January 2009 09:39:06 Ben Bucksch

Re: JSS doesn't support AES key unwrapping

2009-01-13 Thread alex . agranov
FYI - I submitted a patch that fixes the problem. See https://bugzilla.mozilla.org/show_bug.cgi?id=470982 for details. ___ dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto

Re: Cert expiry with Key Continuity Management

2009-01-13 Thread Ben Bucksch
On 13.01.2009 09:48, Rob Stradling wrote: I made a similar suggestion to ietf.pkix in October 2006. See... http://www.imc.org/ietf-pkix/mail-archive/msg01964.html ...and the rest of that thread, including... http://www.imc.org/ietf-pkix/mail-archive/msg01984.html ... Ben, I agree that having m

Re: Suggestion: Announce date for MD5 signature deactivation

2009-01-13 Thread Eddy Nigg
On 01/13/2009 10:15 AM, Rob Stradling: Eddy, I do think that the Mozilla CA Certificate Policy should cover *all* "actual" problematic practices. In this particular case, I think that a blacklist of unsupported/non-allowed/not-recommended algorithms and/or a whitelist of supported/allowed/recomm

Re: Cert expiry with Key Continuity Management

2009-01-13 Thread Rob Stradling
On Friday 09 January 2009 02:04:59 Julien R Pierre - Sun Microsystems wrote: > On Friday 09 January 2009 04:32:41 Ben Bucksch wrote: > > > > Can we create another extension? The signature itself is a shell around > > the certified bits. Add the second signature around that first signature. > > > >

Re: Suggestion: Announce date for MD5 signature deactivation

2009-01-13 Thread Rob Stradling
On Monday 12 January 2009 20:28:25 Eddy Nigg wrote: > On 01/12/2009 09:20 PM, Paul Hoffman: > > No, because it is not true. What is true is that signing with MD5 is now > > considered to be insecure, and what Mozilla will do about it. > > > >> Should every possible algorithm be listed there too? >