|
|
Message-ID: <MEAPR01MB3654EED3E6D2079807952CCBEE8DA@MEAPR01MB3654.ausprd01.prod.outlook.com> Date: Fri, 16 Jan 2026 03:50:05 +0000 From: Peter Gutmann <pgut001@...auckland.ac.nz> To: Demi Marie Obenour <demiobenour@...il.com>, "oss-security@...ts.openwall.com" <oss-security@...ts.openwall.com>, Collin Funk <collin.funk1@...il.com> CC: "kf503bla@...k.com" <kf503bla@...k.com> Subject: Re: Re: Best practices for signature verifcation Demi Marie Obenour writes: >To answer your last question: I believe that it is sufficient for the TSA to >sign the public key, hash algorithm, and signature algorithm used to make the >signature, as well as the signature itself. That's more or less what a TSA does anyway, but it doesn't address any of the other issues. I think the required approach would be to start with a threat model and work from there, not with a given technology and say "the threat is whatever this tech counters" (which is admittedly the standard "threat model" used in 99% of all crypto designs). So you'd have: Signed malware An attacker can use a compromised key to sign malware. To deal with this ... Rollback attacks Once a binary is signed, it's universally trusted. An attacker can feed in an older signed binary (with an vulnerability) in place of a newer one that has the vulnerability fixed. To deal with this ... >I'm fine with CMS *if* there is an implementation that is permissively >licensed and *obviously* correct. I don't want a CMS equivalent of <https:// >gpg.fail>. I don't think this is possible, though, because CMS is such a >complex standard. Of all the protocols I've implemented, I'd put my CMS implementation as having the least likelihood of being compromised because the TLV encoding means it can be statically checked before you ever process or act on it. And before anyone asks, the one I have the least confidence in is SSH because of its wild mix of binary data and comma-delimited text strings, and the incredibly complex exchange and potentially protracted ongoing negotiations it carries out in the handshake phase, there's huge scope there for state confusion attacks. Peter.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.