draft-ietf-822ext-md5-00.txt

James M Galvin <galvin@tis.com> Tue, 06 April 1993 20:59 UTC

Received: from ietf.nri.reston.va.us by IETF.CNRI.Reston.VA.US id aa19606; 6 Apr 93 16:59 EDT
Received: from CNRI.RESTON.VA.US by IETF.CNRI.Reston.VA.US id aa19600; 6 Apr 93 16:59 EDT
Received: from dimacs.rutgers.edu by CNRI.Reston.VA.US id aa21515; 6 Apr 93 16:59 EDT
Received: by dimacs.rutgers.edu (5.59/SMI4.0/RU1.5/3.08) id AA01619; Tue, 6 Apr 93 16:34:12 EDT
Received: from TIS.COM by dimacs.rutgers.edu (5.59/SMI4.0/RU1.5/3.08) id AA01615; Tue, 6 Apr 93 16:34:10 EDT
Received: from TIS.COM by TIS.COM (4.1/SUN-5.64) id AA04890; Tue, 6 Apr 93 16:35:03 EDT
Message-Id: <9304062035.AA04890@TIS.COM>
Reply-To: James M Galvin <galvin@tis.com>
To: ietf-822@dimacs.rutgers.edu
Subject: draft-ietf-822ext-md5-00.txt
Date: Tue, 06 Apr 1993 16:35:02 -0400
Sender: ietf-archive-request@IETF.CNRI.Reston.VA.US
From: James M Galvin <galvin@tis.com>

Two comments.

1.  I'm guessing you chose to call the header field content-md5 so that
    the choice of algorithm was explicit and it would not be necessary
    to parse the value of the header into two parts: algorithm
    identifier and value.

    In any case, this course of action means there will need to be a
    header defined for each choice of algorithm that may be available.
    Note that PEM allows for the specification of suites of algorithms,
    thus admitting that there will exist more than one algorithm.  I
    think we should follow this model and that this header should be
    called content-mic and there should be two parameters: "alg=MD5" ;
    mic="Integrity Check!".  I favor this over the creation of multiple
    header fields.

    As far as registration of algorithms is concerned, you can reference
    the values defined in the PEM's RFC 1423.

2.  This document will ultimately require a security considerations
    section in which it will be necessary to distinguish between the
    service provided by this specification and the service provided by a
    secure data integrity service.  For example:


    This document specifies a data integrity service that protects data
    from accidental modification while in transit from the sender to the
    recipient.  A secure data integrity service, such as that provided
    by Privacy Enhanced Mail [3], would protect data from all
    modifications.


    This is stated in the document but it needs to be restated in a
    security considerations section.


Jim