Hi Jeffrey and Peter
On 4/11/11 23:06 PM, Jeffrey Walton wrote:
> Unfortunately, I could not locate the post. I did come across "The
> Curse of Cryptographic Numerology", but I don't have an IEEE or ACM
> membership to fetch the paper.
Apologies, the post was not a post, but an offlist mail. I've since put
up a copy of the document on this page:
http://iang.org/ssl/
I'm not sure if it is permitted to post it or not; I recall authors are
allowed to post a copy on their personal pages ... if this works it will
remain there.
Peter, is that the latest version? Something about it makes me think it
is an earlier draft.
>> No-one will ever
>> go after "the CA's weaker 1024-bit modulus". They'll go after the CA, the
>> bugs in the PKI software, the awful security UI, the two dozen buffer
>> overflows in the app you're using, the 0day in your OS...
> Agreed.
>
>> Thinking about threats purely in
>> terms of public-key sizes is pure numerology, and until we can get away from
>> this fixation with numerology it's very difficult to hold a sensible
>> discussion about the issue.
> Its not so much fixation, but honoring or observing best practice. My
> chances of dying in a car accident are slim to none, but I still wear
> a seat belt.
Seat belts are informed by empirical research showing frequent events
with & without. Although controversial (there are some safety
mechanisms like bike helmets that are allegedly worse than the
alternate) there are statistics about what happens with & without, and
we can have that debate, and decide on the costs.
In PKI we don't have that. Or we ignore that 99% of traffic is
successfully completed and unchallenged over HTTP ... Or we come up with
another way to avoid informed discussion (bad marks on both sides:
http://financialcryptography.com/mt/archives/001341.html ).
> I don't want to ship a negligent implementation because other parts of
> the system are defective. That sounds a lot like "let's all jump off
> the cliff together". In fact, I often cannot because I frequently work
> in US Federal and I am governed by NIST and their Special Publications
> (et al).
Right. So, you do "their practices" a.k.a. compliance.
Calling it best practices requires you to leap of that cliff with them,
faith wise :) I am reminded of the US banking community's "best
practices" in dealing with account fraud, another superlative example of
the race to the bottom.
Another way to look at this is the concept of core business. A
corollary in core business is that you never outsource your core. So if
you are doing something whereby security is considered part of your core
.. outsourcing it to a NIST sp* isn't a smart move.
In this theory, "selling to Federal" would be considered your core
business. So it is fine, if that's what you do. So you follow NIST,
which is for US Federal. Simple.
> To play devils advocate: suppose there are no other weaknesses for an
> attacker to leverage. Would it then be appropriate to observe security
> levels?
Well, yes, absolutely. If we could organise the world of attackers to
respect our security model and attack it, and organise the world of
users and suppliers to follow our security model, and eliminate
violence, false marketing claims, and fly-by-night, and 1000 other human
behaviours ... then a classical MITM against crypto might surface to be
the only way for an attacker to take users' value.
The problem occurs when we don't eliminate those things, concentrate all
our energies in dealing with a tiny subset of possibilities, and then
declare that we have secured the user. Then, we're negligent at a
professional level, if not at a standards/compliance level (*).
iang
(*) however this is changing. BR requires risk analysis. This will
eventually find its way to the vendors.