On Thu, Oct 24, 2013 at 07:59:46AM +0200, Tobias Reckhard wrote:

> >  Support for public key fingerprints was added in Postfix 2.9, ...
> 
> This is stated at the beginning of the section dealing with
> fingerprints. Further down, where the actual openssl commands are noted,
> there is no such note. I'm not saying there should be one there, but had
> there been one, I probably wouldn't have picked the wrong set of commands.

I'll keep that in mind for the next documentation review.  You can
submit documentation patches (as I was recently reminded, after
passing the final documents through an HTML validator).

> >> [...] certificate fingerprint [...] and public-key fingerprints being
> >> [...] mutually exclusive.
> > 
> > They are not mutually exclusive.
> 
> Ah, OK, thanks for the clarification.

That is a "match=..." attribute in a tls policy table fingerprint
entry will match either the peer public key or the peer certificate.

Assuming that 2nd-preimage attacks on your digest function are
computationally infeasible (still true IIRC even for md5), there
is no risk of confusion.  An attacker should not be able to
independently construct a certificate with the same digest as a
given public key or a public key with the same digest as a given
certificate.  All known collision attacks against md5 are I believe
extension attacks where two messages are built with a common prefix.

-- 
        Viktor.

Reply via email to