I am looking at this from an interoperability perspective and not security. If 
a client is requesting a SHA256 hash for the issuerNameHash and issuerKeyHash I 
don’t think the OCSP responder should be prohibited from returning a response 
containing issuerNameHash and issuerKeyHash using SHA256. I like the idea of 
agility for algorithms and it appears the RFCs supports this by having a 
CertID.hashAlgorithm field.

- Curt

> On Sep 19, 2019, at 4:24 AM, Rob Stradling via dev-security-policy 
> <dev-security-policy@lists.mozilla.org> wrote:
> 
> I'm not aware of any requirement that demands that OCSP responders 
> support SHA-256 for CertID.hashAlgorithm or of any requirement that 
> forbids this.  Therefore, I think 1, 2 and 4 are all acceptable 
> responses to an OCSP request whose CertID.hashAlgorithm is SHA-256.
> 
> SHA-1 is the defacto requirement for CertID.hashAlgorithm, and I would 
> (still [1]) prefer to see SHA-1 required and all other hash algorithms 
> forbidden.
> 
> Supporting stronger hash algorithms for CertID.hashAlgorithm would not 
> lead to any security gain, but it would inflict pain on those CAs that 
> need to regularly pregenerate OCSP responses (see [2]) for all unexpired 
> leaf certificates.
> 
> 
> [1] https://cabforum.org/pipermail/public/2013-November/002453.html 
> <https://cabforum.org/pipermail/public/2013-November/002453.html>
> 
> [2] https://tools.ietf.org/html/rfc6960#section-4.4.7.2.2 
> <https://tools.ietf.org/html/rfc6960#section-4.4.7.2.2>
> 
> On 19/09/2019 01:09, Curt Spann via dev-security-policy wrote:
>> In the WebPKI ecosystem I have seen a wide range of OCSP responses for OCSP 
>> requests using SHA256 for the issuerNameHash and issuerKeyHash. I have 
>> observed the following types of OCSP responses:
>> 1. “good” response with issuerNameHash and issuerKeyHash using SHA256
>> 2. “good” response with issuerNameHash and issuerKeyHash using SHA1
>> 3. “unknown” response containing the correct SHA256 issuerNameHash and 
>> issuerKeyHash but signed with an incorrect OCSP signing cert (chains to 
>> different authority)
>> 4. “unauthorized” response
>> 5. “malformedrequest” response
>> 
>> I would like to have a discussion with the community about what is thought 
>> to be the correct response. Of the various responses I have observed I think 
>> the correct response is number 1. I would also like to know if others have 
>> seen other variants of OCSP responses for request using SHA256 for the 
>> issuerNameHash and issuerKeyHash.
>> 
>> Supporting info
>> RFC 6960: https://tools.ietf.org/html/rfc6960
>> - 4.1.1.  ASN.1 Specification of the OCSP Request
>> RFC 2560: https://tools.ietf.org/html/rfc2560
>> - 4.1.1  Request Syntax
>> 
>> - Curt
> 
> -- 
> Rob Stradling
> Senior Research & Development Scientist
> Sectigo Limited
> 
> _______________________________________________
> dev-security-policy mailing list
> dev-security-policy@lists.mozilla.org 
> <mailto:dev-security-policy@lists.mozilla.org>
> https://lists.mozilla.org/listinfo/dev-security-policy 
> <https://lists.mozilla.org/listinfo/dev-security-policy>
_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to