Re: RSA Keygen problem

2009-01-22 Thread Jean-Daniel
On Jan 22, 2:48 am, Julien R Pierre - Sun Microsystems julien.pierre.nos...@nospam.sun.com wrote: Jean-Daniel, Jean-Daniel wrote: Another possible reason is if you are comparing 32-bit NSS vs 64-bit OpenSSL binaries. Regardless of assembly optimizations. The 64-bit code is always a lot

Re: Policy: revoke on private key exposure

2009-01-22 Thread Florian Weimer
* Eddy Nigg: As a matter of fact, most CAs have policies in place which require them upon knowledge of potential or *suspected* compromise to revoke ANY certificate. I'm certain those policies exist for the top CAs covering the majority of certificates. The keys are compromised, not only

Re: SSL Blacklist : List of servers using compromised private keys

2009-01-22 Thread Eddy Nigg
On 01/22/2009 08:53 AM, Florian Weimer: * Nelson B. Bolyard: IMO, yes, it is enough evidence. But the position of those CAs, as I understand it, is that such publication is only a potential compromise. They require evidence that the published key is actually being used to attack the site.

Re: Policy: revoke on private key exposure

2009-01-22 Thread Eddy Nigg
On 01/22/2009 11:04 AM, Florian Weimer: * Eddy Nigg: As a matter of fact, most CAs have policies in place which require them upon knowledge of potential or *suspected* compromise to revoke ANY certificate. I'm certain those policies exist for the top CAs covering the majority of certificates.

Re: Policy: revoke on private key exposure

2009-01-22 Thread Florian Weimer
* Eddy Nigg: On 01/22/2009 11:04 AM, Florian Weimer: * Eddy Nigg: As a matter of fact, most CAs have policies in place which require them upon knowledge of potential or *suspected* compromise to revoke ANY certificate. I'm certain those policies exist for the top CAs covering the majority

Re: Policy: revoke on private key exposure

2009-01-22 Thread Kyle Hamilton
On Thu, Jan 22, 2009 at 1:59 AM, Florian Weimer f...@deneb.enyo.de wrote: * Eddy Nigg: but I guess that sub CAs could be published, end-user certificates most likely not. Why not? Among other things: - The ability for other entities to mine that data for improper contact - The ability for

Re: Policy: revoke on private key exposure

2009-01-22 Thread Eddy Nigg
On 01/22/2009 11:59 AM, Florian Weimer: http://lxr.mozilla.org/mozilla/source/security/nss/lib/ckfw/builtins/certdata.txt The list doesn't include sub-CAs, which are equivalent to listed CAs for all practical purposes. Well, if you ping a web site then you'll most likely also know the

Re: Policy: revoke on private key exposure

2009-01-22 Thread Eddy Nigg
On 01/22/2009 12:17 PM, Kyle Hamilton: - The ability for other entities to mine that data for improper contact - The ability for the information in the certificates to be otherwise misused - Not every certificate user wants to identify as being a part of a given PKI system - Requiring full

Re: SSL Blacklist : List of servers using compromised private keys

2009-01-22 Thread Ian G
On 22/1/09 00:07, Nelson B Bolyard wrote: Jean-Marc Desperrier wrote, On 2009-01-21 01:13 PST: Now did we not receive promises by the CAs that they were *actively* working to solve the problem and get all sites to replace their cert ? Yes, but some of the CAs were emphatic that they would

Re: SSL Blacklist : List of servers using compromised private keys

2009-01-22 Thread Eddy Nigg
On 01/22/2009 01:13 PM, Ian G: Although it is good that people rose to the challenge of the debian PRNG failure, I do not understand the position that all certs had to be revoked. Isn't it a situation between the Subscribers, Relying Parties and the CA concerned? That is, notification is as far

Re: SSL Blacklist : List of servers using compromised private keys

2009-01-22 Thread Kyle Hamilton
Not really, Ian. Basically, MITM attacks against the sites involved are now trivial, and we already know that MITM attacks are being mounted by unscrupulous operators of unencrypted wireless access points. All the attacker must do at this point is download the certificates from the affected

Re: SSL Blacklist : List of servers using compromised private keys

2009-01-22 Thread Ian G
On 22/1/09 12:26, Eddy Nigg wrote: On 01/22/2009 01:13 PM, Ian G: Although it is good that people rose to the challenge of the debian PRNG failure, I do not understand the position that all certs had to be revoked. Isn't it a situation between the Subscribers, Relying Parties and the CA

Re: SSL Blacklist : List of servers using compromised private keys

2009-01-22 Thread Eddy Nigg
On 01/22/2009 02:26 PM, Ian G: Theoretical weaknesses in crypto mean little, it's a business discussion, and the threat has to be related to the business risks, liabilities and obligations. LOL, this isn't a theoretical weakness, you can download all compromised keys by yourself. They are

Re: SSL Blacklist : List of servers using compromised private keys

2009-01-22 Thread Kyle Hamilton
Ian, I'd rather not spell this out, because it's a blueprint that any malicious coder could follow. Unfortunately, you seem to insist on documentation -- and refuse to accept the word of those who actually do know. So. The clear and present danger exists. It requires: A router (say, a WRT54G)

Re: RSA Keygen problem

2009-01-22 Thread Jean-Daniel
On Jan 22, 1:23 am, Robert Relyea rrel...@redhat.com wrote: Nelson B Bolyard wrote: Julien R Pierre - Sun Microsystems wrote, On 2009-01-21 15:03: Even if you end up building NSS with optimizations, they use the regular multiply instructions, which performs best on AMD chips, but not as

Re: SSL Blacklist : List of servers using compromised private keys

2009-01-22 Thread Ian G
On 22/1/09 13:54, Kyle Hamilton wrote: Ian, I'd rather not spell this out, because it's a blueprint that any malicious coder could follow. Unfortunately, you seem to insist on documentation -- and refuse to accept the word of those who actually do know. So. Please Are you assuming here

Re: Policy: revoke on private key exposure

2009-01-22 Thread Michael Ströder
Julien R Pierre - Sun Microsystems wrote: Paul Hoffman wrote: At 3:45 PM -0800 1/21/09, Nelson B Bolyard wrote: Perhaps Mozilla should change its policy to require CAs to revoke certs when the private key is known to be compromised, whether or not an attack is in evidence, as a condition of

Re: SSL Blacklist : List of servers using compromised private keys

2009-01-22 Thread Eddy Nigg
On 01/22/2009 03:56 PM, Ian G: LOL, this isn't a theoretical weakness, you can download all compromised keys by yourself. They are widely published. It's a theoretical weakness until you see evidence of damages. Ian, I'm somewhat tired arguing about this...but here is my take on this:

Re: Policy: revoke on private key exposure

2009-01-22 Thread Michael Ströder
Florian Weimer wrote: What about requiring that all certificates must be published by the CA (including sub-CAs)? No, this might lead to also revealing internal DNS names never meant to be public. Ciao, Michael. -- dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org

Re: SSL Blacklist : List of servers using compromised private keys

2009-01-22 Thread Eddy Nigg
On 01/22/2009 01:45 AM, Nelson B Bolyard: Isn't the publishing of the private key enough evidence for compromise? At least it got us and some others to revoke all weak keys. IMO, yes, it is enough evidence. But the position of those CAs, as I understand it, is that such publication is only a

Re: RSA Keygen problem

2009-01-22 Thread Nelson B Bolyard
Jean-Daniel wrote, On 2009-01-22 05:39: Unfortunately it doesn't use gas. I have modified the mpi_x86.s to use be able to compile it using gcc, but I have a question. Congratulations. You're well on your way to the fame and glory of becoming a contributor to NSS. :) Seriously, it sounds

Re: DSV/S-TRUST root inclusion request

2009-01-22 Thread Kyle Hamilton
(sorry for the late response.) On Wed, Dec 17, 2008 at 4:20 AM, Ian G i...@iang.org wrote: On 17/12/08 12:42, Kyle Hamilton wrote: But... ... and would also violate the archival principle (that signatures of archived documents can be verified via the presence of a timestamp from a

Re: SSL Blacklist : List of servers using compromised private keys

2009-01-22 Thread Kyle Hamilton
On Thu, Jan 22, 2009 at 6:05 AM, Ian G i...@iang.org wrote: On 22/1/09 13:54, Kyle Hamilton wrote: Ian, I'd rather not spell this out, because it's a blueprint that any malicious coder could follow. Unfortunately, you seem to insist on documentation -- and refuse to accept the word of those

Re: Take my database of certs/ssl details from high-traffic sites, please!

2009-01-22 Thread Johnathan Nightingale
First off, Ian and Paul, glad you find it helpful, and thanks for the support. Let me know if there are things that would make it better. On 21-Jan-09, at 11:48 AM, Eddy Nigg wrote: I already left a message at the blog, but short notice here. This is certainly useful and even more, if we

Re: RSA Keygen problem

2009-01-22 Thread Jean-Daniel
On Jan 22, 6:46 pm, Nelson B Bolyard nel...@bolyard.me wrote: min: 389 ms, max: 2648 That's more like what's expected. Is there a simple way to test if the generated values are correct ? Two ways come to mind. 1) Run NSS's cipher tests.    cd mozilla/security/nss/tests/cipher    

Re: RSA Keygen problem

2009-01-22 Thread Robert Relyea
Julien R Pierre - Sun Microsystems wrote: Nelson, Nelson B Bolyard wrote: Julien R Pierre - Sun Microsystems wrote, On 2009-01-21 15:03: I don't like much the way that we implemented SSE2 on Linux - together in a single freebl shared library with the non-SSE2 version. That stands in the

Re: SSL Blacklist : List of servers using compromised private keys

2009-01-22 Thread Jan Schejbal
Hi, you can download all compromised keys by yourself. They are widely published. Has anyone actually published all (or all interesting) weak private keys for SSL? I know such a release exists for SSH (which AFAIK uses a different exponent or something like that) and I know it is easily

Re: SSL Blacklist : List of servers using compromised private keys

2009-01-22 Thread Chris Hills
Florian Weimer wrote: Perhaps Mozilla should change its policy to require CAs to revoke certs when the private key is known to be compromised, whether or not an attack is in evidence, as a condition of having trust bits in Firefox. I don't think this can be made a requirement. Sudden

Re: SSL Blacklist : List of servers using compromised private keys

2009-01-22 Thread Eddy Nigg
On 01/23/2009 02:43 AM, Jan Schejbal: Hi, you can download all compromised keys by yourself. They are widely published. Has anyone actually published all (or all interesting) weak private keys for SSL? I know such a release exists for SSH (which AFAIK uses a different exponent or something