On Thu, Jan 2, 2014 at 1:57 PM, Jacob Appelbaum <ja...@appelbaum.net> wrote:

> Paul Hoffman:
> > On Jan 1, 2014, at 10:22 AM, Jacob Appelbaum <ja...@appelbaum.net>
> > wrote:
> >
> >> I do control the private key for the aforementioned intermediate
> >> certificate[0] authority. :)
> >
> > No, you really do not.
>


> Unless one explicitly distrusts (all) MD5 signed certificates, pre-loads
> our certificate to mark it as untrusted, or a few other things relating
> to time constraints - it will probably still work for MITM attacks. Many
> applications fail to do proper constraint checking.


Anyone who trusts MD5 for signing any form of keying material is vulnerable
to this type of attack. It does not matter whether there is a CA involved
or not or the number of sub CAs. A variation of the attack could be
performed on PGP or DNSSEC.

The fix here is to disable MD5 completely in the browser or for CAs to not
use MD5 in any certificate. The industry has chosen to do the second since
we can't actually recall legacy browsers. However, Microsoft's recent
decision to end of life SHA-1 will have the effect of rendering most of the
legacy browsers unusable in any case.



> Please don't overstate the results of
> > the excellent research that you did; doing so diminishes the
> > research.
>
> I'm not overstating anything. I think you don't understand what we
> actually did if you think that later, patching things will somehow
> magically stop previously successful attacks...
>

You are confusing people by using a valid attack against the algorithm to
argue against the trust model. PKIX is designed on the assumption that the
digest algorithm chosen is secure against a second preimage attack.

We have a lot of security issues to deal with right now and we want to make
sure we are paying attention to the ones that matter most. This is really
not helping.

-- 
Website: http://hallambaker.com/
_______________________________________________
therightkey mailing list
therightkey@ietf.org
https://www.ietf.org/mailman/listinfo/therightkey

Reply via email to