2008-12-30 18:15:27 +01:00
|
|
|
Filename: xxx-what-uses-sha1.txt
|
|
|
|
Title: Where does Tor use SHA-1 today?
|
|
|
|
Version: $Revision$
|
|
|
|
Last-Modified: $Date$
|
|
|
|
Author: Nick Mathewson
|
|
|
|
Created: 30-Dec-2008
|
|
|
|
Status: Meta
|
|
|
|
|
|
|
|
|
|
|
|
Introduction:
|
|
|
|
|
|
|
|
Tor uses SHA-1 as a message digest. SHA-1 is showing its age:
|
|
|
|
theoretical attacks for finding collisions against it get better
|
|
|
|
every year or two, and it will likely be broken in practice before
|
|
|
|
too long.
|
|
|
|
|
|
|
|
According to smart crypto people, the SHA-2 functions (SHA-256, etc)
|
|
|
|
share too much of SHA-1's structure to be very good. Some people
|
|
|
|
like other hash functions; most of these have not seen enough
|
|
|
|
analysis to be widely regarded as an extra-good idea.
|
|
|
|
|
|
|
|
By 2012, the NIST SHA-3 competition will be done, and with luck we'll
|
|
|
|
have something good to switch too. But it's probably a bad idea to
|
|
|
|
wait until 2012 to figure out _how_ to migrate to a new hash
|
|
|
|
function, for two reasons:
|
|
|
|
1) It's not inconceivable we'll want to migrate in a hurry
|
|
|
|
some time before then.
|
|
|
|
2) It's likely that migrating to a new hash function will
|
|
|
|
require protocol changes, and it's easiest to make protocol
|
|
|
|
changes backward compatible if we lay the groundwork in
|
|
|
|
advance. It would suck to have to break compatibility with
|
|
|
|
a big hard-to-test "flag day" protocol change.
|
|
|
|
|
|
|
|
This document attempts to list everything Tor uses SHA-1 for today.
|
|
|
|
This is the first step in getting all the design work done to switch
|
|
|
|
to something else.
|
|
|
|
|
|
|
|
This document SHOULD NOT be a clearinghouse of what to do about our
|
|
|
|
use of SHA-1. That's better left for other individual proposals.
|
|
|
|
|
|
|
|
|
|
|
|
Why now?
|
|
|
|
|
|
|
|
The recent publication of "MD5 considered harmful today: Creating a
|
|
|
|
rogue CA certificate" by Alexander Sotirov, Marc Stevens, Jacob
|
|
|
|
Appelbaum, Arjen Lenstra, David Molnar, Dag Arne Osvik, and Benne de
|
|
|
|
Weger has reminded me that:
|
|
|
|
|
|
|
|
* You can't rely on theoretical attacks to stay theoretical.
|
|
|
|
* It's quite unpleasant when theoretical attacks become practical
|
|
|
|
and public on days you were planning to leave for vacation.
|
|
|
|
* Broken hash functions (which SHA-1 is not quite yet AFAIU)
|
|
|
|
should be dropped like hot potatoes. Failure to do so can make
|
|
|
|
one look silly.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
What Tor uses hashes for today:
|
|
|
|
|
|
|
|
1. Infrastructure.
|
|
|
|
|
|
|
|
A. Our X.509 certificates are signed with SHA-1.
|
|
|
|
B. TLS uses SHA-1 (and MD5) internally to generate keys.
|
|
|
|
C. Some of the TLS ciphersuites we allow use SHA-1.
|
|
|
|
D. When we sign our code with GPG, it might be using SHA-1.
|
|
|
|
E. Our GPG keys might be authenticated with SHA-1.
|
2008-12-31 19:25:30 +01:00
|
|
|
F. OpenSSL's random number generator uses SHA-1, I believe.
|
2008-12-30 18:15:27 +01:00
|
|
|
|
|
|
|
2. The Tor protocol
|
|
|
|
|
|
|
|
A. Everything we sign, we sign using SHA-1-based OAEP-MGF1.
|
|
|
|
B. Our CREATE cell format uses SHA-1 for: OAEP padding.
|
|
|
|
C. Our EXTEND cells use SHA-1 to hash the identity key of the
|
|
|
|
target server.
|
|
|
|
D. Our CREATED cells use SHA-1 to hash the derived key data.
|
|
|
|
E. The data we use in CREATE_FAST cells to generate a key is the
|
|
|
|
length of a SHA-1.
|
|
|
|
F. The data we send back in a CREATED/CREATED_FAST cell is the length
|
|
|
|
of a SHA-1.
|
|
|
|
G. We use SHA-1 to derive our circuit keys from the negotiated g^xy value.
|
|
|
|
H. We use SHA-1 to derive the digest field of each RELAY cell, but that's
|
|
|
|
used more as a checksum than as a strong digest.
|
|
|
|
|
|
|
|
3. Directory services
|
|
|
|
|
|
|
|
A. All signatures are generated on the SHA-1 of their corresponding
|
|
|
|
documents, using PKCS1 padding.
|
|
|
|
B. Router descriptors identify their corresponding extra-info documents
|
|
|
|
by their SHA-1 digest.
|
|
|
|
C. Fingerprints in router descriptors are taken using SHA-1.
|
|
|
|
D. Fingerprints in authority certs are taken using SHA-1.
|
|
|
|
E. Fingerprints in dir-source lines of votes and consensuses are taken
|
|
|
|
using SHA-1.
|
|
|
|
F. Networkstatuses refer to routers identity keys and descriptors by their
|
|
|
|
SHA-1 digests.
|
|
|
|
G. Directory-signature lines identify which key is doing the signing by
|
|
|
|
the SHA-1 digests of the authority's signing key and its identity key.
|
|
|
|
H. The following items are downloaded by the SHA-1 of their contents:
|
|
|
|
XXXX list them
|
|
|
|
I. The following items are downloaded by the SHA-1 of an identity key:
|
|
|
|
XXXX list them too.
|
|
|
|
|
|
|
|
4. The rendezvous protocol
|
|
|
|
|
|
|
|
XXXX write me
|
|
|
|
|
|
|
|
5. The bridge protocol
|
|
|
|
|
|
|
|
XXXX write me
|
|
|
|
|
|
|
|
6. The Tor user interface
|
|
|
|
|
|
|
|
A. We log information about servers based on SHA-1 hashes of their
|
|
|
|
identity keys.
|
|
|
|
B. The controller identifies servers based on SHA-1 hashes of their
|
|
|
|
identity keys.
|
|
|
|
C. Nearly all of our configuration options that list servers allow SHA-1
|
|
|
|
hashes of their identity keys.
|
|
|
|
E. The deprecated .exit notation uses SHA-1 hashes of identity keys
|
|
|
|
|
|
|
|
|