On Thu, Jan 16, 2014 at 7:12 PM, MJ <m...@sci.fi> wrote:
> On 17 Jan 2014, at 00.54, Christian Weisgerber <na...@mips.inka.de> wrote:
>
>> MJ <m...@sci.fi> wrote:
>>
>>> I would like to inquire as to which OpenBSD RELEASE will offer the 
>>> possibility
>>> to avoid NIST crypto for everything in Base (isakmpd, openssh, openssl, 
>>> https,
>>> nginx being the key items in mind)?
>>
>> What is "NIST crypto"?
>
> Are you serious or just being facetious?

He was serious, because "NIST crypto" has multiple definitions.


> I basically used it as an umbrella term to include all of the crypto in which 
> the US government has had their hand involved in it’s specification, 
> implementation, approval, standardisation, etc and so forth.

Ah, so if NIST looked at work done by someone completely unrelated to
NIST and said "looks good, we'll standardize exactly what you did",
you think that it's now contaminated by NISTs talking about it?  For
example, AES, which was designed by europeans and standardized after a
massively public competitive process that even the losing competitors
think was legit with no funny games, should be excluded by your
clarified criteria.  That sounds like you're interested in a political
statement and not a security goal.


As for your original question: let's imagine it could be done right
now with just a trivial build switch.  Poof, no more "NIST crypto"
(haha) for everything.  Sweet: you can no longer securely connect to
or from almost any non-OpenBSD box!  Practically no https:// website
would work for you.  Wow, that's so much more secure!  What problem
are you trying to solve?

A transition to new ciphers is like an API change: you have you get
mind share and acceptance, show people that new stuff still solves
their problem and that the change isn't insurmountable in time or
effort.  You push, but not so hard that you lose traction with the
larger community, because we're not just trying to make our own
systems more secure, but also everyone else's system.  Go listen
(again) to Theo's talk at yandex, where he talks about address space
mititgations including the ones that were too aggressive and had to be
backed out...
    http://tech.yandex.com/events/ruBSD/2013/talks/103/


Philip Guenther

Reply via email to