>
> http://stackoverflow.com/questions/10378066/which-algorithm-is-stronger-for-tls-aes-256-or-camellia-256
>
> which says:
>
>   The reasoning is contained in the NSS library source code and is somewhat
>   convoluted, but it has nothing to do with security. It has to do with a
>   desire to support national vanity algorithms.
>


If you wonder why NSS would prefer Camellia over AES (I sure did), here's
the rationale. (Not a very good one, in my opinion -- if servers in certain
countries are expected to have a strong preference for certain
ciphersuites, those servers should override client preferences rather than
hope that clients list them at higher priority than AES.)


https://bugzilla.mozilla.org/show_bug.cgi?id=430769#c4

 Nelson Bolyard (seldom reads bugmail) 2008-04-25 08:27:36 PDT

[...]

Putting Camellia ahead of AES and RC4 was intentional, but maybe we should
rethink it.  The rationale was as follows:

- We presumed that Camellia would be implemented *and* enabled in few
servers outside of Japan.  Since it has not received anywhere near the
amount of international scrutiny that DES and AES did, we thought that most
server admins would not choose to enable it.  We did not expect that it
would be enabled by default in server products.  (It is not enabled by
default in NSS, as you know, but PSM enables it, apparently by default.
Maybe the solution is to change PSM's default.)

- Japanese server admins would prefer to use Camellia to AES or RC4
whenever
it can be negotiated, however, most clients deployed do not yet implement
it.
Most clients deployed DO implement RC4 and/or AES.  Therefore, it is not
yet feasible for servers in Japan to disable RC4 and DES, because they want
to communicate with a wide range of clients.  It was reasoned that if
Camellia was arranpreference than AES or RC4, it would only
be chosen if and when either the client or the server or both had disabled
both AES and RC4, which (as explained above) was thought to be unlikely to
happen unless and until Camellia becomes more widespread.

If you think we should consider an alternative prioritization of the
ciphers in NSS, and/or consider having separate priority orders for
the client and the server in NSS, please file a bug on that.  I don't
think it's a bug or a bad thing that clients are using Camellia in the
wild.
I just noted it to mark the historic occasion of the first sighting. :)


https://bugzilla.mozilla.org/show_bug.cgi?id=430875#c2

Nelson Bolyard (seldom reads bugmail) 2008-04-25 17:39:08 PDT

I think it is fair to say that, even before the addition of Camellia, there
was an exception.  RC4 was given priority over 128-bit ciphers, even though
it is thought to be weaker than any other 128-bit ciphers.  This was (and
is)
due to the fact that it was far more performance than any other 128-bit
ciphers, and performance has always been very important to nearly all SSL
users.  We also rationalize that those who really want AES or DES could and
would disable RC4, because implementation of AES and DES are so ubiquitous
that disabling RC4 was not likely to prevent interoperability.

Now, with Camellia, we a third motivation for prioritizing ciphers; one that
is neither purely one of strength, not of performance, but of national
pride.
The situation with SEED, if it is ever introduced into NSS, will be the
same.
IMO, neither algorithm is likely to ever reach the level of ubiquity of the
other ciphers we have now.  The major, peeason to use any of
them will be national pride, IMO.

IMO, Ultimately, the best way to deal with this, the way that will make the
largest number of people happy, is to have user-selectable priority ordering
of cipher suites.  The problem with that is that the API and GUI for
presenting that prioritization problem to a user or administrator is large,
and IMO, products will be loath to do it.  Firefox has already removed the
GUI for even simple enabling and disabling of cipher suites, so I think it
is highly unlikely that they would ever implement a GUI for prioritization
of cipher suites.

So, until we have user-selectable priority ordering, I think the way to
go forward is to take those cipher suites that will be used predominantly
for national pride, and disable them by default.  The Cammeria suites are
already disabled by default in NSS, but are enabled by default in PSM.
Perhaps it would be appropriate to enable them by default in localized
Japanese builds, and not in others.

Comments?
_______________________________________________
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to