Hanno Böck schrieb:
> I believe the potential problem is a different one: Systems that accept
> SHA256 on certificate signatures, but not on OCSP responses. I don't
> know if such systems exist, but if I had to make a bet I'd say they do.

Roland does not talk about signature algorithms. He is considering
something different:

OCSP requests contain a CertId to identify the requested certificate.
CertId contains hashes of the issuer public key and subject-dn.

Roland wants to accept OCSP requests with sha1 issuer hashes (which is
standard practice today), and issue OCSP responses for those requests
with a CertId with sha256 hashes (which is unusual). Especially unusual
is to respond with a different CertId than was used in the request.

rfc6960 does not state that the response CertId must be constructed with
the same algorithm as the request CertId. So, from a standards point of
view all should be fine.

Given that the code path for verification in e.g. openssl is slightly
different for same-algorithm issuer hashes than for different-algorithm
issuer hashes (see ocsp_check_ids() in ocsp_vfy.c), I would be surprised
if this plan will work without some major bumps. But I don't have any
hard data to contribute, and Roland has said that they already did some
investigations, so he'll know more about the feasibilty of their plans
than most of us here.

Jürgen

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to