On Sun, Feb 26, 2006, Erwann ABALEA wrote:

> Bonjour,
> 
> Hodie IV Kal. Mar. MMVI est, Dr. Stephen Henson scripsit:
> [... about serial numbers ...]
> > Some CAs choose consecutive values, other what look like random values of
> > hashes.
> > 
> > One commercial reason for not using consecutive values is that competitors 
> > can
> > work out how many certificates you've issued...
> 
> One good technical reason to choose "random" serial numbers was
> demonstrated by the a paper written by Lenstra, Wang, and Weger
> (http://eprint.iacr.org/2005/067). The point here is that if the
> attacker can "predict" the content of a certificate, he can carefully
> generate a public key so that the signature of a certificate can be
> used on another certificate with another identity and public key. This
> attack is based on flaws on MD5 demonstrated in summer 2004. SHA1 is
> now under attack, and until the SHA2 series is well understood by a
> large proportion of the installed software base, CAs are "forced" to
> use SHA1...
> See also: http://www.win.tue.nl/~bdeweger/CollidingCertificates/
> 

Just to add that that version of the attack can only generate colliding
certificates which are identical other than the public keys.

> The CA has the possibility to change the name of the issued
> certificate, by adding a random element (a kind of serial number), but
> this isn't usually well percieved (the customer always asks for
> clarification about this random stuff added to his identity), and it
> prevents an end-user to renew a certificate with the same exact
> identity (since this will render the counter-measure useless).
> 
> 

>From my understanding of the collision a non-critical extension would be
another place but people would of course ask what it was for.

Steve.
--
Dr Stephen N. Henson. Email, S/MIME and PGP keys: see homepage
OpenSSL project core developer and freelance consultant.
Funding needed! Details on homepage.
Homepage: http://www.drh-consultancy.demon.co.uk
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to