Any thoughts, Kathleen?  We'd like to update the draft to incorporate your 
feedback before the telechat.

                                Thanks,
                                -- Mike

-----Original Message-----
From: Michael Jones <[email protected]> 
Sent: Wednesday, March 26, 2025 5:46 PM
To: Kathleen Moriarty <[email protected]>; [email protected]
Cc: [email protected]; [email protected]; 
[email protected]
Subject: RE: Secdir last call review of 
draft-ietf-jose-fully-specified-algorithms-08

Hi Kathleen,

Thanks for your review.  We have a mitigation for your first issue.  But before 
we add it to the draft, I wanted to better understand your second issue.

Are you saying that an attacker could vary the algorithms used when signing 
content?  That's of course true, but the attack scenario is not clear to me.  
Are you saying that an attacker might be identifiable from the algorithm it 
chooses to use and that by changing algorithms, they could somewhat obscure 
their identity?  Can you describe an example of a scenario where this could 
occur in practice, so I can better understand it?

Also, as you wrote, this consideration applies whether the algorithms are 
fully-specified or polymorphic.  So it seems like it may have broader 
application than the specific algorithms defined in this document and this 
documents advice to avoid polymorphic algorithms.  Does it, for instance, apply 
to all of JOSE and all of COSE and all of X.509?  Without understanding the 
attack better, I can't tell.

                                Thanks,
                                -- Mike

-----Original Message-----
From: Kathleen Moriarty via Datatracker <[email protected]> 
Sent: Tuesday, March 25, 2025 5:33 AM
To: [email protected]
Cc: [email protected]; [email protected]; 
[email protected]
Subject: Secdir last call review of 
draft-ietf-jose-fully-specified-algorithms-08

Reviewer: Kathleen Moriarty
Review result: Has Issues

Greetings!

Sorry for my late review. In reviewing the draft, there are 2 easily resolvable 
findings. The first is that the term "cross mode" is used and never defined.
Tracing back to the reference provided, the closest I could find to "cross 
mode" was the following text in RFC 9459:
   "To avoid cross-protocol concerns, implementations MUST NOT use the
   same keying material with more than one mode.  For example, the same
   keying material must not be used with AES-CTR and AES-CBC."
Matching the language or proving a definition would help to resolve this 
concern.

Second, as I was reading the draft, anther security consideration became clear 
and should be added. An attacker can easily avoid fingerprinting detection or 
signature detection by rotating the ciphersuite whether it be defined or 
polymorphic. If programmed to rotate, then the results will look different.
Awareness of flexibility in protocols to conduct attacks should be explicitly 
stated so that OWASP can write up mitigations sooner rather than later when 
attacks become prevalent.

Thank you for addressing the concerns! I did check the has issues, but do think 
these are very easily addressed.

Best regards,
Kathleen



_______________________________________________
jose mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to