Thunderbird should use AES for S/MIME based on correspondent's key sizes, for compliance with RFC 5751
Categories
(NSS :: Libraries, defect, P1)
Tracking
(Not tracked)
People
(Reporter: an_to-n.k13, Assigned: dcooper16)
References
Details
(Whiteboard: [nss-nofx])
Attachments
(1 file)
1.88 KB,
patch
|
rrelyea
:
review+
|
Details | Diff | Splinter Review |
Comment 1•10 years ago
|
||
Comment 2•9 years ago
|
||
Comment 3•9 years ago
|
||
Assignee | ||
Comment 6•6 years ago
|
||
Comment 7•6 years ago
|
||
Assignee | ||
Comment 8•6 years ago
|
||
Updated•6 years ago
|
Comment 9•6 years ago
|
||
Updated•6 years ago
|
Comment 10•5 years ago
|
||
(In reply to Kai Engert (:kaie:) from comment #9)
Thunderbird will get this change when it picks up a newer Mozilla core with NSS 3.42
I assume we picked this up by now? So this is fixed?
Assignee | ||
Comment 11•5 years ago
|
||
(In reply to Magnus Melin [:mkmelin] from comment #10)
(In reply to Kai Engert (:kaie:) from comment #9)
Thunderbird will get this change when it picks up a newer Mozilla core with NSS 3.42
I assume we picked this up by now? So this is fixed?
I just tried sending an encrypted message using Thunderbird 68.2.0 and it was encrypted using AES-128 CBC. So, it seems that the patch I submitted has been picked up. However, the original comment was about following the SMIMECapabilities of the recipient, and my patch did nothing about that.
In addition, it seems that my patch is already out of date. Section 2.7.1.2 of RFC 5751 recommends using AES-128 CBC if the capabilities of the recipient are unknown, and this is what my patch does if the recipient has an RSA key of 3072-bits or less. However, I just discovered that RFC 5751 was obsoleted by RFC 8551 in April 2019, and Section 2.7.1.2 of RFC 8551 says that AES-256 GCM SHOULD be used if the sender has no knowledge of the capabilities of the recipient. It does, however, also say:
If the sending agent chooses not to use AES-256 GCM in this step,
given the presumption is that a client implementing AES-GCM would do
both AES-256 and AES-128, it SHOULD use AES-128 CBC.
So, AES-128 CBC is still deemed acceptable, but moving to AES-256 GCM should be considered. I haven't done any testing, so at the moment I don't even know whether Thunderbird could decrypt a message that was encrypted using AES GCM, and if it can, I don't know what would be required to modify it to use AES GCM to encrypt messages.
Comment 12•5 years ago
|
||
I just want to say: THANK YOU!
It made me very happy today to see that someone still cares about privacy and that Thunderbird has gotten this update. That's really a great sign after too many years of stagnation in this area of Thunderbird.
Updated•4 years ago
|
Updated•4 years ago
|
Comment 13•3 years ago
|
||
This landed long ago (comment 9).,
Description
•