Re: Suggestion: Announce date for MD5 signature deactivation

2009-01-14 Thread Ian G
On 14/1/09 06:47, Paul Hoffman wrote: At 5:29 PM -0800 1/13/09, Julien R Pierre - Sun Microsystems wrote: IMO, we don't have complete confidence that every CA and sub CA has closed the MD5 hole yet, What level of confidence do we seek? Bearing in mind that complete confidence is a

Re: Suggestion: Announce date for MD5 signature deactivation

2009-01-14 Thread Michael Ströder
Eddy Nigg wrote: On 01/13/2009 10:15 AM, Rob Stradling: Eddy, I do think that the Mozilla CA Certificate Policy should cover *all* actual problematic practices. In this particular case, I think that a blacklist of unsupported/non-allowed/not-recommended algorithms and/or a whitelist of

Re: Suggestion: Announce date for MD5 signature deactivation

2009-01-14 Thread Michael Ströder
Paul Hoffman wrote: At 5:29 PM -0800 1/13/09, Julien R Pierre - Sun Microsystems wrote: Just because root CAs have stopped using MD5 doesn't mean every intermediate CA in the world has stopped yet. It would be a fairly arduous task to determine that. If a sub CA hasn't stopped using MD5 yet,

Re: Suggestion: Announce date for MD5 signature deactivation

2009-01-13 Thread Eddy Nigg
On 01/13/2009 10:15 AM, Rob Stradling: Eddy, I do think that the Mozilla CA Certificate Policy should cover *all* actual problematic practices. In this particular case, I think that a blacklist of unsupported/non-allowed/not-recommended algorithms and/or a whitelist of

Re: Suggestion: Announce date for MD5 signature deactivation

2009-01-13 Thread Ian G
On 13/1/09 10:16, Eddy Nigg wrote: Before Mozilla yanks any root (which isn't something Mozilla does for fun really), Mozilla will confront the CA with the concern and assumed risk concerning the practice of the CA. - Mozilla will give the CA reasonable time to address the concern - where

Re: Suggestion: Announce date for MD5 signature deactivation

2009-01-13 Thread Eddy Nigg
On 01/13/2009 12:50 PM, Ian G: Sorry, where is this documented? It looks unfamiliar and unworkable to me. In which respect unworkable? Please explain. -- Regards Signer: Eddy Nigg, StartCom Ltd. Jabber: start...@startcom.org Blog: https://blog.startcom.org

Re: Suggestion: Announce date for MD5 signature deactivation

2009-01-13 Thread Eddy Nigg
On 01/13/2009 02:09 PM, Ian G: Let's work from Mozo's documentation. Where is it? Otherwise we are liable to get distracted... If this is not a documented situation, Rob already explained it. Or, have a look at my comments on dropping the root is useless. This is not documented, this is how

Re: Suggestion: Announce date for MD5 signature deactivation

2009-01-13 Thread Paul Hoffman
At 11:16 AM +0200 1/13/09, Eddy Nigg wrote: On 01/13/2009 10:15 AM, Rob Stradling: Eddy, I do think that the Mozilla CA Certificate Policy should cover *all* actual problematic practices. In this particular case, I think that a blacklist of unsupported/non-allowed/not-recommended algorithms

Re: Suggestion: Announce date for MD5 signature deactivation

2009-01-13 Thread Eddy Nigg
On 01/13/2009 05:23 PM, Paul Hoffman: Useful yes, up to certain extend. If there is too much information in the policy, it will start to be problematic. For whom? For Mozilla mostly. Most CAs run businesses where written policies are the norm. Mozilla is not a CA. Where did Frank

Re: Suggestion: Announce date for MD5 signature deactivation

2009-01-13 Thread Paul Hoffman
At 9:00 PM +0200 1/13/09, Eddy Nigg wrote: On 01/13/2009 05:23 PM, Paul Hoffman: Useful yes, up to certain extend. If there is too much information in the policy, it will start to be problematic. For whom? For Mozilla mostly. We disagree here. I think it would be more problematic for Mozilla

Re: Suggestion: Announce date for MD5 signature deactivation

2009-01-13 Thread Eddy Nigg
On 01/13/2009 09:56 PM, Paul Hoffman: We disagree here. I think it would be more problematic for Mozilla to be accused of having hard-to-find policy changes than to simply change the policy itself when needed. I did not suggest that there should be hard-to-find policy changes at all.

Re: Suggestion: Announce date for MD5 signature deactivation

2009-01-13 Thread Gervase Markham
Ben Bucksch wrote: I propose to announce that we'll stop supporting MD5 in 3 months, and ask website owners to get new certs. On the basis of any known risk? The current attack requires the attacker to be able to get a cert signed for a key they control. If all CAs stop using MD5 (which they

Re: Suggestion: Announce date for MD5 signature deactivation

2009-01-13 Thread Julien R Pierre - Sun Microsystems
Gervase, Gervase Markham wrote: Ben Bucksch wrote: I propose to announce that we'll stop supporting MD5 in 3 months, and ask website owners to get new certs. On the basis of any known risk? The current attack requires the attacker to be able to get a cert signed for a key they control. If

Re: Suggestion: Announce date for MD5 signature deactivation

2009-01-13 Thread Paul Hoffman
At 5:29 PM -0800 1/13/09, Julien R Pierre - Sun Microsystems wrote: Just because root CAs have stopped using MD5 doesn't mean every intermediate CA in the world has stopped yet. It would be a fairly arduous task to determine that. If a sub CA hasn't stopped using MD5 yet, they may be subject to

Re: Suggestion: Announce date for MD5 signature deactivation

2009-01-12 Thread Rob Stradling
Eddy, I apologize if I'm misinterpreting your response to Paul's last comment, but I think you are suggesting that Mozilla could hold a CA to doing something that is 'currently in the 'problematic practices' wiki page, purely because that wiki page is a document that is (you allege) presented

Re: Suggestion: Announce date for MD5 signature deactivation

2009-01-12 Thread Eddy Nigg
On 01/12/2009 01:08 PM, Rob Stradling: Eddy, I apologize if I'm misinterpreting your response to Paul's last comment, but I think you are suggesting that Mozilla could hold a CA to doing something that is 'currently in the 'problematic practices' wiki page, purely because that wiki page is a

Re: Suggestion: Announce date for MD5 signature deactivation

2009-01-12 Thread Eddy Nigg
On 01/12/2009 01:26 PM, Eddy Nigg: Instead I think the policy should mention that such by-laws may exists - as matter of fact section 4 deals with it more or less. Incidentally section 13 could be lumped together with those by-laws since it's only a recommendation. But we've discussed

Re: Suggestion: Announce date for MD5 signature deactivation

2009-01-12 Thread Rob Stradling
Eddy, I agree that the Potentially Problematic Practices wiki page is a useful resource during the information gathering period that happens *before* a Root Certificate is ever accepted by Mozilla. But (reading back a few messages in this thread), the context of this discussion is Paul's

Re: Suggestion: Announce date for MD5 signature deactivation

2009-01-12 Thread Eddy Nigg
On 01/12/2009 03:07 PM, Rob Stradling: Eddy, I agree that the Potentially Problematic Practices wiki page is a useful resource during the information gathering period that happens *before* a Root Certificate is ever accepted by Mozilla. But (reading back a few messages in this thread), the

Re: Suggestion: Announce date for MD5 signature deactivation

2009-01-12 Thread Kyle Hamilton
I believe that this is not only exactly what he is saying, but also exactly what must be done. Once a potentially problematic practice is shown to have moved from potential to actual, it is a problematic practice. Once that happens, it must be addressed. CAs fall into a class of security called

Re: Suggestion: Announce date for MD5 signature deactivation

2009-01-12 Thread Rob Stradling
On Monday 12 January 2009 13:30:35 Kyle Hamilton wrote: I believe that this is not only exactly what he is saying, but also exactly what must be done. Once a potentially problematic practice is shown to have moved from potential to actual, it is a problematic practice. Once that happens, it

Re: Suggestion: Announce date for MD5 signature deactivation

2009-01-12 Thread Eddy Nigg
On 01/12/2009 03:59 PM, Rob Stradling: Right now, as I see it, we have... 1). potential - The Potentially Problematic Practices wiki page. 2). actual - The Mozilla CA Certificate Policy. So when a problem is shown to have moved from 'potential' to 'actual', surely the way to address it would

Re: Suggestion: Announce date for MD5 signature deactivation

2009-01-12 Thread Ian G
On 12/1/09 22:03, Kyle Hamilton wrote: On Mon, Jan 12, 2009 at 5:59 AM, Rob Stradlingrob.stradl...@comodo.com wrote: On Monday 12 January 2009 13:30:35 Kyle Hamilton wrote: I believe that this is not only exactly what he is saying, but also exactly what must be done. Once a potentially

Re: Suggestion: Announce date for MD5 signature deactivation

2009-01-12 Thread Kyle Hamilton
If things have deteriorated to the point where the political hands are tied, and the only way to get things done is to just make a change in the code... ...how is the political structure helping the coders? Or anyone else? -Kyle H On Mon, Jan 12, 2009 at 1:23 PM, Ian G i...@iang.org wrote: On

Re: Suggestion: Announce date for MD5 signature deactivation

2009-01-12 Thread Eddy Nigg
On 01/12/2009 11:37 PM, Kyle Hamilton: If things have deteriorated to the point where the political hands are tied, and the only way to get things done is to just make a change in the code... ...how is the political structure helping the coders? Or anyone else? Errr...how do you govern

Re: Suggestion: Announce date for MD5 signature deactivation

2009-01-12 Thread Ben Bucksch
On 09.01.2009 18:51, Johnathan Nightingale wrote: SHA-1 is heading that way as well, and the decisions we make here will likely shape policy for SHA-1's eventual decommissioning as well. I think it's important to prepare now that we actually *can* decommission SHA-1. This means: * All popular

Re: Suggestion: Announce date for MD5 signature deactivation

2009-01-10 Thread Ian G
On 9/1/09 22:25, Johnathan Nightingale wrote: Still, it's not nothing either, so if we don't mind extrapolating a bit: it seems to me that end of 2010, while further out than I'd like, is probably a good upper bound. At that point we'd have about 4000 valid, md5 certs out there we'd be breaking,

Re: Suggestion: Announce date for MD5 signature deactivation

2009-01-10 Thread Paul Hoffman
The main difference is that my solution would force all MD5 certs out of circulation by the given date, no matter their expiration date, ...for no valid security reason... while yours would allow MD5 certs with long validity periods to stay in use. ...because there is no security problem with

Re: Suggestion: Announce date for MD5 signature deactivation

2009-01-10 Thread Paul Hoffman
At 5:18 PM +0100 1/10/09, Ian G wrote: That I agree with, although I believe NIST's decisions will be a lot more important. (Disclaimer: I sometimes consult for NIST.) Ahhh... no, please! Mozilla needs to do its own analysis. If it can't make up its own mind about MDs, which are the simplest

Re: Suggestion: Announce date for MD5 signature deactivation

2009-01-10 Thread Ian G
On 10/1/09 19:59, Paul Hoffman wrote: At 5:18 PM +0100 1/10/09, Ian G wrote: That I agree with, although I believe NIST's decisions will be a lot more important. (Disclaimer: I sometimes consult for NIST.) Ahhh... no, please! Mozilla needs to do its own analysis. If it can't make up its

Re: Suggestion: Announce date for MD5 signature deactivation

2009-01-10 Thread Eddy Nigg
On 01/10/2009 08:59 PM, Paul Hoffman: That's absurd. You can't hold a CA to doing something that we don't document. Just a by-note on this one...It doesn't have to be in the CA Policy, but may be also in some by-laws or as we have it currently in the problematic practices. This document is

Re: Suggestion: Announce date for MD5 signature deactivation

2009-01-09 Thread Paul Hoffman
At 11:41 PM +0100 1/8/09, Jan Schejbal wrote: MD5 is not secure for applications that blindly sign inputs from non-trusted parties that can predict the content of the part of the message before the submitted text. This is an attack on the collision-resistance of the function. I assume that for

Re: Suggestion: Announce date for MD5 signature deactivation

2009-01-09 Thread Ian G
On 9/1/09 18:02, Paul Hoffman wrote: At 11:41 PM +0100 1/8/09, Jan Schejbal wrote: With that definition, SHA-1 is also not secure: its collision resistance has be reduced from 2^80 to 2^60ish by similar attacks as for MD5. Yes, the writing is on the wall for SHA-1 as well, and has been since

Re: Suggestion: Announce date for MD5 signature deactivation

2009-01-09 Thread Ian G
Yes, the writing is on the wall for SHA-1 as well, and has been since 2005 or so. February 2005, here's my blog posts. https://financialcryptography.com/mt/archives/000374.html https://financialcryptography.com/mt/archives/000357.html

Re: Suggestion: Announce date for MD5 signature deactivation

2009-01-09 Thread Johnathan Nightingale
On 8-Jan-09, at 3:45 PM, Paul Hoffman wrote: At 6:51 PM +0100 1/8/09, Jan Schejbal wrote: As the MD5 algorithm is obviously not secure anymore, This statement is not based on reality, so the rest of the message does not follow. MD5 is not secure for applications that blindly sign inputs

RE: Suggestion: Announce date for MD5 signature deactivation

2009-01-09 Thread Robin Alden
-Original Message- On 1/9/09 12:51 PM, Johnathan Nightingale wrote: - Do the work to arm ourselves so that when we are confident pulling the trigger, we can actually do so with minimal changes (in case it happens in a point release, for instance) - Establish our feelings

Re: Suggestion: Announce date for MD5 signature deactivation

2009-01-09 Thread Paul Hoffman
At 12:51 PM -0500 1/9/09, Johnathan Nightingale wrote: On 8-Jan-09, at 3:45 PM, Paul Hoffman wrote: At 6:51 PM +0100 1/8/09, Jan Schejbal wrote: As the MD5 algorithm is obviously not secure anymore, This statement is not based on reality, so the rest of the message does not follow. MD5 is not

Re: Suggestion: Announce date for MD5 signature deactivation

2009-01-09 Thread Julien R Pierre - Sun Microsystems
Ian, Ian G wrote: Yes, the writing is on the wall for SHA-1 as well, and has been since 2005 or so. February 2005, here's my blog posts. https://financialcryptography.com/mt/archives/000374.html https://financialcryptography.com/mt/archives/000357.html

Re: Suggestion: Announce date for MD5 signature deactivation

2009-01-09 Thread Johnathan Nightingale
On 9-Jan-09, at 1:27 PM, Benjamin Smedberg wrote: Perhaps it would help if we had some additional information such as: what is the maximum certificate expiration time? That is, if all CAs stopped using MD5 *today* and switched to SHA-256, how long would it be before there were no unexpired

Re: Suggestion: Announce date for MD5 signature deactivation

2009-01-09 Thread Benjamin Smedberg
On 1/9/09 4:25 PM, Johnathan Nightingale wrote: On 9-Jan-09, at 1:27 PM, Benjamin Smedberg wrote: Perhaps it would help if we had some additional information such as: what is the maximum certificate expiration time? That is, if all CAs stopped using MD5 *today* and switched to SHA-256, how

Re: Suggestion: Announce date for MD5 signature deactivation

2009-01-09 Thread Eddy Nigg
On 01/09/2009 11:32 PM, Benjamin Smedberg: On 1/9/09 4:25 PM, Johnathan Nightingale wrote: On 9-Jan-09, at 1:27 PM, Benjamin Smedberg wrote: Perhaps it would help if we had some additional information such as: what is the maximum certificate expiration time? That is, if all CAs stopped using

Re: Suggestion: Announce date for MD5 signature deactivation

2009-01-08 Thread Paul Hoffman
At 6:51 PM +0100 1/8/09, Jan Schejbal wrote: As the MD5 algorithm is obviously not secure anymore, This statement is not based on reality, so the rest of the message does not follow. MD5 is not secure for applications that blindly sign inputs from non-trusted parties that can predict the

Re: Suggestion: Announce date for MD5 signature deactivation

2009-01-08 Thread Jan Schejbal
MD5 is not secure for applications that blindly sign inputs from non-trusted parties that can predict the content of the part of the message before the submitted text. This is an attack on the collision-resistance of the function. I assume that for a cryptographic hash function to be called