On Monday 16 November 2015 19:51:08 Emilia Käsper wrote:
> One more time,
> 
> I know that someone, somewhere is probably using any given feature of
> OpenSSL. I am looking to gather information about concrete, actively
> maintained applications that may be using one of those algorithms, to
> build a more complete picture.
> 
> If you are aware of a concrete use of MD2 or any of the other
> algorithms, please let us know!

And I'm saying that it is next-to impossible for me to say for certain 
because standards like CMS, S/MIME, PKCS#8 and X.509 are extensible and 
self descriptive. The file itself says which algorithms are needed to 
process it.

So without access to _all_ _data_ that the applications need to process 
it is impossible for me to tell which of those algorithms are necessary 
for continued operation of those applications.


Example: CAdES V1.2.2 was published in late 2000, the first serious 
attacks on MD2 were not published until 2004. I think it is not 
unreasonable for CAdES-A documents to exist today which were originally 
signed with MD2 while it was still considered secure and that are still 
relevant today, just 15 years later.

> Thanks,
> Emilia
> 
> On Mon, Nov 16, 2015 at 7:25 PM, Hubert Kario <hka...@redhat.com> 
wrote:
> > On Monday 16 November 2015 16:51:10 Emilia Käsper wrote:
> > > IDEA, MD2, MDC2, RC5, RIPEMD, SEED, Whirlpool, binary curves
> > > 
> > > This isn't of course entirely representative of widespread usage.
> > > However Google's multi-billion line codebase now builds against
> > > BoringSSL and therefore largely does not depend on these
> > > algorithms.
> > > Those billions of lines aren't all new and shiny code written in
> > > 2015, and some of it does have to interoperate with the outside
> > > world.
> > > 
> > > And here's the list gone from LibreSSL, from what I can tell:
> > > 
> > > MD2, MDC2, RC5, SEED
> > > 
> > > Neither have removed CAST, and there is presumably a good reason
> > > for
> > > that. (PGP?)
> > > 
> > > It seems to me that these can pretty safely go:
> > > 
> > > MD2 - (The argument that someone somewhere may want to keep
> > > verifying
> > > old MD2 signatures on self-signed certs doesn't seem like a
> > > compelling enough reason to me. It's been disabled by default
> > > since
> > > OpenSSL 1.0.0.) MDC2
> > > SEED
> > > RC5
> > > 
> > > These could probably stay (C only):
> > > 
> > > CAST
> > > IDEA
> > > RIPEMD (used in Bitcoin?)
> > > WHIRLPOOL
> > > 
> > > as well as
> > > 
> > > BLOWFISH
> > > MD4
> > > RC2
> > > 
> > > I am on the fence about the binary curves: I am not aware of any
> > > usage, really, and it's not about to pick up now.
> > 
> > I'm afraid you're too focused on TLS/SSL use case. And while it is
> > important it's not the only use case the OpenSSL does serve.
> > 
> > And for what it's worth, I'm very much *for* removing as much (and
> > as
> > fast as possible) support for the old junk (or unused stuff - like
> > curves < 256 bit) in TLS. Search the archives for "Insecure DEFAULT
> > cipher set" for an example.
> > 
> > But stuff like this:
> > > The argument that someone somewhere may want to keep verifying
> > > old MD2 signatures on self-signed certs
> > 
> > is not true. I was talking about document signatures, time stamps,
> > CRL signatures and certificate signatures in general. Not the trust
> > anchors or their self-signatures.
> > 
> > --
> > Regards,
> > Hubert Kario
> > Senior Quality Engineer, QE BaseOS Security team
> > Web: www.cz.redhat.com
> > Red Hat Czech s.r.o., Purkyňova 99/71, 612 45, Brno, Czech Republic

-- 
Regards,
Hubert Kario
Senior Quality Engineer, QE BaseOS Security team
Web: www.cz.redhat.com
Red Hat Czech s.r.o., Purkyňova 99/71, 612 45, Brno, Czech Republic

Attachment: signature.asc
Description: This is a digitally signed message part.

_______________________________________________
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Reply via email to