The problem with migrating away from SHA1-based thumbprints is that to do so,
the underlying development platforms used to build JOSE implementations would
also need to do so for the migration at the JOSE level to be useful. In
particular, as Nat pointed out, "x5t" was added to the JOSE specs in the first
place because Windows enables key lookup in the Windows key store using the
SHA-1 thumbprint.
While I'm sensitive to the fact that I'm using Windows as a motivating use case
and I'm a Microsoft employee (so you can discount my remarks relative to this
as you see fit), in practice, you can't look up a key in Windows using any
thumbprint value but the SHA-1 thumbprint. Unless that changes, I doubt that
any migration away from SHA-1 thumbprints will be practical, at least when
using keys in stored in the Windows key store. I believe the same is currently
also true of OpenSSL.
-- Mike
-----Original Message-----
From: jose [mailto:[email protected]] On Behalf Of Kathleen Moriarty
Sent: Tuesday, May 27, 2014 8:28 AM
To: Matt Miller
Cc: [email protected]
Subject: Re: [jose] JWS Review, SHA 256 thumbprints - was - AD review of
draft-ietf-jose-json-web-algorithms
Thanks for the quick reply. Another argument would be for the ability to drop
SHA1 support eventually. If you move to all SHA2, there is no need to support
the SHA1 code anymore.
On Tue, May 27, 2014 at 11:00 AM, Matt Miller <[email protected]> wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA512
>
> /me dons "XMPP Expert" Hat
>
> There is some desire to use SHA2 but no strong requirement. As far as
> algorithm requirements go, look to [XMPP-TLS], [XEP-0300], and
> [XEP-0320] for the results of the community's more current discussions.
>
>
> - --
> - - m&m
>
> Matt Miller < [email protected] >
> Cisco Systems, Inc.
>
> [XMPP-TLS] Use of Transport Layer Security (TLS) in the Extensible
> Messaging and Presence Protocol (XMPP) <
> http://tools.ietf.org/html/draft-ietf-uta-xmpp-00 > [XEP-0300] Use of
> Cryptographic Hash Functions in XMPP <
> http://xmpp.org/extensions/xep-0300.html > [XEP-0320] Use of DTLS-SRTP
> in Jingle Sessions < http://xmpp.org/extensions/xep-0320.html >
>
> On 5/27/14, 8:42 AM, Kathleen Moriarty wrote:
>> The reviews got a little confused with the responses for SHA1 and
>> SHA2 thumbprints. A couple of people responded supporting Mike's
>> assertion, but I have had others tell me directly, SHA2 would be
>> good.
>>
>> Is there a need to support this for the XMPP community, since they
>> set to SHA256 as a default for certificate fingerprints:
>> http://xmpp.org/extensions/xep-0189.html
>>
>> Thanks, Kathleen
>>
>> On Wed, May 21, 2014 at 9:51 PM, Nat Sakimura <[email protected]>
>> wrote:
>>> ditto here.
>>>
>>> The primary reason for having thumbprint was for finding keys in the
>>> Windows crypto API. Security property must not depend on it.
>>> If it wants to deal with authentication, it should use the keys,
>>> IMHO.
>>>
>>>
>>> 2014-05-22 3:10 GMT+09:00 John Bradley <[email protected]>:
>>>>
>>>> I agree with Mike, many key stores use SHA1 thumbprints. I
>>>> don't know of any security consideration that makes SHA2
>>>> thumbprints better in any practical way.
>>>>
>>>> I don't think that adding SHA 2 thumbprints is something that we
>>>> need to do now.
>>>>
>>>> John B.
>>>>
>>>> On May 1, 2014, at 1:46 PM, Kathleen Moriarty
>>>> <[email protected]> wrote:
>>>>
>>>>>>
>>>>>> Mike> Per your JWS comment, SHA-1 thumbprints are widely
>>>>>> deployed. I’m aware of no SHA-256 certificate thumbprint
>>>>>> deployments. I’ll note that even if SHA-1 were completely
>>>>>> broken, that wouldn’t be a security issue because it’s just being
>>>>>> used to generate a digest of publicly available certificate
>>>>>> information. It’s not being used to cryptographically obscure
>>>>>> anything. (But that’s actually a discussion for another draft. J)
>>>>>>
>>>>>
>>>>> This is in place for the XML equivalents and should be possible
>>>>> for JSON. I used this at least 2 years ago in the XML Oxygen
>>>>> editor. I believe this has been brought up before in terms of
>>>>> JSON, so I am not the first. But it is another draft... I'd like
>>>>> to get through these all soon :-)
>>>>
>>>>
>>>> _______________________________________________ jose mailing list
>>>> [email protected] https://www.ietf.org/mailman/listinfo/jose
>>>>
>>>
>>>
>>>
>>> -- Nat Sakimura (=nat) Chairman, OpenID Foundation
>>> http://nat.sakimura.org/ @_nat_en
>>
>>
>>
>
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG/MacGPG2 v2.0.22 (Darwin)
> Comment: GPGTools - https://gpgtools.org
> Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
>
> iQEcBAEBCgAGBQJThKiWAAoJEDWi+S0W7cO1RT0H/115y7u4qLZbWNTC23/dZhNa
> cvH47z2l+cL5KEEKLCFlx3NNgDFYZMabZc9NfTnHYxs0oRw8HQ48B5UubDp/wOgL
> E35wM4k7+Qsdl+UuiQR86Xu6JRc/9NW8ov4dTSk80TN64AltEtvjyFCO1cN9Zs89
> 6x/LBtgxrvjhsze4R+LnwWnm/+lXswME01wK8mZTCl0tY753Ca8FtRoAeLb51f4S
> YwGolRZ8bSRv5waZhupxV/crMeWUFbEsSKQePqrnH7R0O6EzKEI8qZuYc1BsoQ1a
> EyhHkeElAmJ71qfvBRzLMM6xTA+AGGVtmQG5msm2ETyTiJ4b1ASfG5EHXU1KYVE=
> =bDGF
> -----END PGP SIGNATURE-----
--
Best regards,
Kathleen
_______________________________________________
jose mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/jose
_______________________________________________
jose mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/jose