Re: [Curdle] AD Review: draft-ietf-curdle-pkix-04.txt

Jim Schaad <ietf@augustcellars.com> Mon, 08 May 2017 18:10 UTC

Return-Path: <ietf@augustcellars.com>
X-Original-To: curdle@ietfa.amsl.com
Delivered-To: curdle@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4025E128AFE for <curdle@ietfa.amsl.com>; Mon, 8 May 2017 11:10:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.001
X-Spam-Level:
X-Spam-Status: No, score=-2.001 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=augustcellars.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QQkejsm87zCX for <curdle@ietfa.amsl.com>; Mon, 8 May 2017 11:10:53 -0700 (PDT)
Received: from mail4.augustcellars.com (augustcellars.com [50.45.239.150]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C9011128B8E for <curdle@ietf.org>; Mon, 8 May 2017 11:10:52 -0700 (PDT)
Content-Type: multipart/alternative; boundary="----=_NextPart_000_0080_01D2C7EB.C651D760"
Content-Language: en-us
DKIM-Signature: v=1; a=rsa-sha256; d=augustcellars.com; s=winery; c=simple/simple; t=1494267050; h=from:subject:to:date:message-id; bh=96jg8YmgWrC5ch3rWbaQo78AGukTl3hB427gm6JFjJU=; b=ZACFZWueNjaM2juya1m1I6HjjT43tG3ebO1LG8VBmgffMuLRRyUCEHU3zynfMIKiQP8uPGyBKbs zVZ6yRXGdh35Tk4ezclbh98T0763YWlp6O0Aj7/6TLhroL39OD/Vt4ytOLwGAvOn0cNedyf+3OEaA UsSzGwJR9SIx3eGjaFE3uU1PWlFINfo9pGU+ps1IkcLxg8+ctKoyBFceJdb+csfjO3lFvDr1qhMS6 V8f+Ul7178WyvQ8b00PkqYr/6bs8FY+90oQ1e3aJGvHqWZZsbVHlu9rwPqrUIQ5xrCQSVnAssV7Xh mzmBJW58lLhoZJX+AOtuQEvzQcTJA00UgV3A==
Received: from mail2.augustcellars.com (192.168.1.201) by mail4.augustcellars.com (192.168.1.153) with Microsoft SMTP Server (TLS) id 15.0.1263.5; Mon, 8 May 2017 11:10:50 -0700
Received: from Hebrews (24.21.96.37) by mail2.augustcellars.com (192.168.0.56) with Microsoft SMTP Server (TLS) id 15.0.1263.5; Mon, 8 May 2017 11:10:37 -0700
From: Jim Schaad <ietf@augustcellars.com>
To: 'Eric Rescorla' <ekr@rtfm.com>, 'curdle' <curdle@ietf.org>
References: <CABcZeBOG_n0JpQYiJ4ECrV7RqhvZYhaj0jmfkWT5Ow8nimXeLA@mail.gmail.com>
In-Reply-To: <CABcZeBOG_n0JpQYiJ4ECrV7RqhvZYhaj0jmfkWT5Ow8nimXeLA@mail.gmail.com>
Date: Mon, 08 May 2017 11:10:57 -0700
Message-ID: <007f01d2c826$72af9df0$580ed9d0$@augustcellars.com>
MIME-Version: 1.0
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQHbQntJtMtoRE13Ns+MdJ1uAlEKgaHZv7bA
X-Originating-IP: [24.21.96.37]
Archived-At: <https://mailarchive.ietf.org/arch/msg/curdle/B66d-w9hxg5DkWSOmpNo_YAZYOY>
Subject: Re: [Curdle] AD Review: draft-ietf-curdle-pkix-04.txt
X-BeenThere: curdle@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "List for discussion of potential new security area wg." <curdle.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/curdle>, <mailto:curdle-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/curdle/>
List-Post: <mailto:curdle@ietf.org>
List-Help: <mailto:curdle-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/curdle>, <mailto:curdle-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 08 May 2017 18:10:55 -0000

Please see in-line

 

From: Curdle [mailto:curdle-bounces@ietf.org] On Behalf Of Eric Rescorla
Sent: Friday, May 5, 2017 12:46 PM
To: curdle <curdle@ietf.org>
Subject: [Curdle] AD Review: draft-ietf-curdle-pkix-04.txt

 

AD Review: draft-ietf-curdle-pkix-04.txt

 

TECHNICAL

I see that Brian Smith made a number of comments on 4/29. Is the WG

convinced that they have addressed them adequately.

 

[JLS] I believe that he is probably not happy with the resolution dealing with the requirement to make all of the private keys use either only v1 or v2, however I think that the working group has reached a rough consensus on not making either of these a MUST.   

 

I need to go through the examples dealing with v2 and erroneous keys that have been supplied, but intend to incorporate them into the document.

 

S 5.

The RFC5280 text on {encipher,decipher}Only is kind of obscure.

Say that I have keyAgreement | encipherOnly, can I use this key

for TLS?

 

   one of the following MAY also be present:

 

Am I supposed to read from this that no other extension may be

present? I think this should be explicitly stated. The same

applies to signature certificates.

 

Also, did the WG discuss whether you should mandate keyUsage?

 

[JLS] There was no discussion that I remember about the question of mandating the keyUsage extension.  This would end up being deferred to RFC 5280 – so that answer would be no.

 

I am not sure that this is the correct document to deal with the meaning of the {encipher,decipher}Only bits in key usage.  I cannot remember ever having seen these in practice, unlike the non-Repudiation bit.  If memory serves, I was once told that these bits made more sense for the Royal Holloway than they do for DH or ECDH.  My  personal opinion would be that if you set either of those bits, then the certificate would not be usable for TLS.  (I believe that the question is academic for TLS 1.3 since key agreement certificates are not used anywhere.)  The use of the bits would be for the purpose of doing some type of an authenticated key transport algorithm where the algorithms would be ECDH+HKDF+AES-GCM as a single identified item.

 

 

EDITORIAL

S 1.

   HashEdDSA mode with pre-hashing.  The convention used for identifying

   the algorithm/curve combinations are to use the Ed25519 and Ed448 for

 

convention is

 

RFC 7748 seems to use "curveXXX" rather than "CurveXXX"

 

[JLS] fixed locally

 

S 4.

 

    o  subjectPublicKey contains the byte stream of the public key.

      While the encoded public keys for the current algorithms are all

      an even number of octets, future curves could change that.

 

I know what you mean by "even number" but I think it would be clearer

to say "an exact multiple of 8 bits" so people don't think you are

talking about the parity of the number of bytes.

 

[JLS] Take makes it clearer – done.

 

S 13.

Diffie-Hellman has two ls

 

[JLS] Done

 

Jim

 

 

-Ekr