On Mon, January 18, 2016 9:05 pm, Eric Mill wrote:
>  Really? Given your last few years of experience, if you could time travel
>  back to 2012, you would tell Past Ryan Sleevi to make a different decision
>  at that time about adding a flag for MD5 support in the enterprise?

Yes.

> Was there significant observed negative fallout of that decision?

Yes.

>  Sure, but part of the benefit of shutting off SHA-1 issuance is to remove
>  SHA-1 code from the overall software pipeline altogether, and to remove
>  the
>  opportunity for bugs and mistakes from having outsized impacts on critical
>  infrastructure.

This argument doesn't really hold any water for the case of enterprise
CAs, nor does it (in a practical sense) hold water for SHA-1. For that
matter, even MD5 as an implementation isn't removed from most
cryptographic libraries - including OpenSSL, BoringSSL, and CryptoAPI -
because of its use in other constructs (e.g. HMAC-MD5 or the MD5+SHA1
concatenation in TLS < 1.2)

>From an issuance standpoint, it really doesn't reduce code, and from the
validation standpoint, the need for SHA-1 in the PKI products will remain
for some time (e.g. AKI/SKI synthetic construction, or the use in OCSP)

>  I would put browser certificate validation code in a similar category of
>  critical software infrastructure as CA issuance code. Removing SHA-1
>  validation code from browsers altogether is a much stronger guarantee than
>  depending on logic which distinguishes between publicly trusted and
>  locally
>  trusted roots, which, as discussed on this thread already, is quite
>  tricky.

Again, not really.

>  That's a great point, but Peter's data was from website logs, and
>  detecting
>  middleboxes in that data is about comparing TLS "fingerprints" to sent
>  user
>  agents. That's not something enterprises have to opt-in to. So, large
>  website operators could be providing valuable (appropriately aggregated,
>  etc.) data in this regard.

Only to an extent. You're again presuming the enterprise MITM box, which
may show for sites like Amazon (of course, it would not show at all for
enterprise MITM boxes that blocked it). This would not, however, show up
at all for the case of using UAs to access internal enterprise resources,
which is a far greater (by volume of users, though necessarily not volume
of certificates) use case.

My point is that the over-reliance on metrics underestimates (on orders of
magnitude) the impact to enterprises, which is why IF a user agent wishes
to support enterprises (and it's a complex question of business and
product direction), more nuance is needed.

I think the benefits to restricting SHA-1 in PTCs is both obvious and
uncontroversial, and offers positive security steps - more than doing
nothing. I can understand the desire of those *not* impacted by such
changes to wish to push the industry towards changes - I know, I've been
there myself. But I certainly am more aware of the impact these decisions
have, and of the real tradeoffs involved for these users, and thus the
need for a softer touch.

Arguing that enterprise users should be thrown under the bus is not a new
argument, nor is it one without grounding. We've certainly seen the
energetically emotional appeals in cases like HPKP, where some corners
have argued for making it harder and harder for enterprises to accomplish
their goals because they're seen as disagreeable. And while I certainly
don't agree with many of the reasons why such organizations see the need
to MITM, I'm quite aware of the lengths that MITM vendors will go to, and
of the lengths businesses will go to to support their needs. The same can
be said for SHA-1 here.

To me, the root of the issue here is education - how do we educate
enterprises that SHA-1 issuance is risky (to their organization, not to
the Internet at large), such that they lean on their vendors, such that
they have the economic incentives to switch vendors or, in many cases, pay
the exorbitant fees the vendors demand in order to support better
security. It's certainly one strategy to "hold users hostage" (via
interstitials), but that's one that doesn't seem to pay off well. Even
holding users hostage via lock icons is one that, as it played out, was
significantly less effective than desired. Nor is it a good game - for
users or for browser vendors - to get in the habit of hostage taking "for
the greater good". Another strategy is "pure outreach", although that's
unlikely to have the economies of scale necessary to get the industry to
move, and is the one previously attempted with MD5. So there's likely
somewhere in the middle ground - and that's something I hope Mozilla will
consider, in taking the necessary steps to secure PTCs, and working to
employ all appropriate means for ETCs.

_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to