ietf-dkim
[Top] [All Lists]

[ietf-dkim] Re: 1368 straw-poll :

2007-02-26 10:02:04
Douglas Otis <dotis(_at_)mail-abuse(_dot_)org> writes:
On Feb 26, 2007, at 7:32 AM, John Levine wrote:
  Why shouldn't receivers use their own best judgement about what
hashes are adequately strong, and why should they believe
statements from random spammers about relative strengths of crypto
algorithms?

Without a means for the signer to assert which algorithms are
deprecated, until the problematic algorithm can be obsoleted, a
downgrade vulnerability will exist.  This period of this
vulnerability will likely be measured in years.  Defining a way
forward does not need to alter existing structures, but instead
simply define how the signer can make the assertions when they are
needed.

I'm sure I'm going to regret wading in here, but...

We have two algorithms, A and B. Let's stipulate that B is stronger
than A. Now, the sender can have three policies: send A (SA) Send B
(SB) and send A+B (SAB). The receiver can similarly have three
policies, accept A (RA), accept B (RB) and accept A or B (RAB).

If you cross these you get the following matrix:

                 Sender
             SA    SB    SAB
         RA   A     X      A
Receiver RB   X     B      B
         RAB  A     B     AB

Because implementations are supposed to ignore signatures they
can't verify, the only context in which downgrade attacks matter
is if the sender is implementing SAB and the receiver is implementing
RAB. In this case, assuming there's no policy information, the 
attacker can strip a signature and convince the receiver that the
sender implemented SA or SB. Since we've stipulated that B>A, 
only the former makes sense.

Now, again there are two cases:

1. A is so weak that an attacker can readily mount attacks on it
   at a practical level.
2. It's not.

Only in the first case does a downgrade attack buy you anything.

So, as I understand Doug's argument, A is strong enough that the
receiver thinks it conveys *some* informational value (otherwise
he would simply implement RB) but strong enough that it's
being regularly broken. So, the sender wants to implement SAB
and securely tell the receiver that so that receivers which
do implement RAB will get the benefit of B. Do I have this
right?

If so, I find this scenario fairly implausible. If algorithms
are being routinely broken, I would expect people to turn them
off entirely or *at least* for receivers to quickly roll out
the new algorithms allowing senders to safely send the newer
ones without the older ones. And if algorithms are being broken
enough to mandate this kind of policy indicator, I find it
hard to believe they carry much informational value.

As a thought experiment: SHA-256 has a nominal security value
of 256-bits against preimage attacks (the kind that's most
likely relevant here). At what bit strength do you believe
receivers would still trust it but downgrade attacks would be
practical enough to mandate this kind of indicator?

-Ekr









 






_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html

<Prev in Thread] Current Thread [Next in Thread>