[144654] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: XML signature HMAC truncation authentication bypass

daemon@ATHENA.MIT.EDU (Peter Gutmann)
Tue Jul 28 20:09:13 2009

From: Peter Gutmann <pgut001@cs.auckland.ac.nz>
To: jon@callas.org, pgut001@cs.auckland.ac.nz
Cc: cryptography@metzdowd.com, lmeiners@gmail.com
In-Reply-To: <2735B4A2-15E9-430A-ABCA-AD5195C48CE9@callas.org>
Date: Wed, 29 Jul 2009 03:58:48 +1200

Jon Callas <jon@callas.org> writes:

>Okay, password-protected files would get it, too. I won't ask why you're
>sending password protected files to an agent.

They're not technically password-protected files but pre-shared key (PSK)
protected files, where the keys have a high level of entropy (presumably 128
bits, but I don't know the exact figure).  So in this case the S2K isn't
actually necessary because of the choice of password/PSK used.

(Sorry, for non-OpenPGP folks "S2K" = "string to key", a parameterised way of
processing a password, for example by iterated hashing with a salt, into a
key).

>By the way, do you think it's safe to phase out MD5? That will break all the
>PGP 2 users.

The answer depends on what sort of user base you expect to have to support.  
In my case I disable things that I don't think get used much in betas and see 
if anyone complains.  If no-one does, it remains disabled in the final 
release.  Now if only I could rearrange this process so I didn't have to 
implement support for assorted practically-unused mechanisms in the first 
place...

This is another interesting philosophical debate: What do other people do in 
terms of deprecating obsolete/insecure/little-used mechanisms?  Deprecate by 
stealth?  Flag day?  Support it forever?

Peter.

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post