Hi Phil,
I am wondering about the rationale for switching the hash algorithm used for generating SKIs. If the full SHA-256 hash of the subjectPublicKey is used as the SKI value, then the intermediate certificate and end-entity certificate will each be 12 octets larger (256-bit SHA-256 hash vs. 160-bit SHA-1 hash).
If the rationale is to move away from all use of SHA-1 (even in non-security relevant contexts), then I’d recommend looking at section 2 of RFC 7093 [1]. One of the methods the RFC prescribes is using the 160 leftmost bits of the SHA-256 hash of the subjectPublicKey as the SKI value. This allows the CA to replace the use of SHA-1 with SHA-256 without incurring any certificate size increase. Namely, chains will be 24 octets smaller than they would be if the full SHA-256 hash were used.
Thanks,
Corey
--
You received this message because you are subscribed to the Google Groups "dev-secur...@mozilla.org" group.
To unsubscribe from this group and stop receiving emails from it, send an email to dev-security-po...@mozilla.org.
To view this discussion on the web visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CACpGwJZOLVQUw_XsEjuMjPgbW0QbnLKu6KboZ68nLSXEY0G4zA%40mail.gmail.com.
>I am wondering about the rationale for switching the hash algorithm used for
>generating SKIs. If the full SHA-256 hash of the subjectPublicKey is used as
>the SKI value, then the intermediate certificate and end-entity certificate
>will each be 12 octets larger (256-bit SHA-256 hash vs. 160-bit SHA-1 hash).
And in particular the sKID is an implicit value, not an explicit value. In
other words it can be anything that works for the CA, not explicitly a hash of
the public key with a specific algorithm, although that's a very common way to
create it.
In terms of the announcement:
They will use SHA256 to compute their Subject Key Identifiers instead of SHA1.
while that sort of implies use of the full hash, it could actually be
anything, just using SHA256 instead of SHA1 at some step of the process.
Peter.
--
You received this message because you are subscribed to the Google Groups "dev-secur...@mozilla.org" group.
To unsubscribe from this group and stop receiving emails from it, send an email to dev-security-po...@mozilla.org.
To view this discussion on the web visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/SY4PR01MB62511ED00308FF7E72E6B40AEE85A%40SY4PR01MB6251.ausprd01.prod.outlook.com.
On Mon, 4 Dec 2023 14:20:34 -0500
"'Phil Porada' via dev-secur...@mozilla.org"
<dev-secur...@mozilla.org> wrote:
> 1. We will be generating 5 RSA and 5 ECDSA intermediates, instead
> of 2 each. We plan to automatically rotate issuance between multiple
> intermediates for improved redundancy.
I'm curious what exactly that means. Do you mean you will basically
pick an intermediate at random and an ACME user will have no way of
knowing previously which intermediate one will get?
I expect that there are likely plenty of LE users out there that have
setups where the certificate is dynamically generated, but the
intermediate configured statically. (I know I have such setups myself,
with the expectation that a new intermediate is rare enough and I'll
always learn about it in advance, so I can react manually.)
Also yes, we're very aware of this possibility. This is in fact a large part of why we're making this change: it's a mechanical way of discouraging/preventing intermediate pinning. We went through this recently with the change to the R3 and E1 intermediates, and although some people had to make changes to accommodate the new intermediates, there were relatively few breakages. We expect to handle a similar level of support requests this time, but with the advantage that (in theory) we'll never have to do so again during future intermediate transitions.For what it's worth, the intermediate *shouldn't* need to be configured statically in any ACME setup, since it is provided in the same file as the newly issued certificate itself at the end of issuance.
Key continuity is a much better security property than what key
rotation provides. Loss of key continuity exposed Diginotar. Why would
LE discourage it?
What advantages?
Hmmm... We use Apache, SSLCertificateChainFile and SSLCertificateFile.
LE is just creating more work for us.
>This is contrary to the current industry consensus.
Just doing a sanity check here, key continuity has been a core feature of SSH
security for close to thirty years, and was finally adopted for PKI use as
well after a string of highly-public CA failures. Are you saying that the
consensus among all? most? CAs is that actively breaking key continuity/
pinning is a good idea, or is this just a Let's Encrypt thing? Just trying to
get an idea of how widespread this is.
Peter.
>I am not sure what you mean by key continuity being adopted for PKI use
I meant the use of certificate pinning, so trusting the known-good cert you've
seen before and, like SSH when a key changes, triggering an alert if it
changes.
Peter.
I meant the use of certificate pinning, so trusting the known-good cert you've seen before
Just trying to get an idea of how widespread this is.
--
You received this message because you are subscribed to the Google Groups "dev-secur...@mozilla.org" group.
To unsubscribe from this group and stop receiving emails from it, send an email to dev-security-po...@mozilla.org.
To view this discussion on the web visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/SY4PR01MB6251D5B575FFD8981ACC72A6EE84A%40SY4PR01MB6251.ausprd01.prod.outlook.com.
--
You received this message because you are subscribed to the Google Groups "dev-secur...@mozilla.org" group.
To unsubscribe from this group and stop receiving emails from it, send an email to dev-security-po...@mozilla.org.
To view this discussion on the web visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CAH8yC8k8MKg9%2BucQx7fPYJDttuGNm0nt6DwEnkuBSO5bB5Mv5w%40mail.gmail.com.
>pinning roots is better than pinning intermediates. And I'll reiterate that
>various Root Programs are moving towards enforcing short intermediate
>lifetimes, so this idea is not just restricted to CAs.
Just a minor nit here, talking about "pinning roots" is a bit of an oxymoron
because they're hardcoded into the trust store and you can't choose to pin
them. If you want to give that any sort of name then perhaps it'd be
supergluing, but pinning, choosing to remember a certificate for future use,
it ain't.
In effect the use of dynamic intermediates kills pinning, because any ability
for the user to remember a known-good certificate for future use is made
impossible.
Peter.
Just a minor nit here, talking about "pinning roots" is a bit of an oxymoron
because they're hardcoded into the trust store and you can't choose to pin
them.