Re: [Curdle] Some work for the group

Jim Schaad <ietf@augustcellars.com> Tue, 13 December 2016 20:30 UTC

Return-Path: <ietf@augustcellars.com>
X-Original-To: curdle@ietfa.amsl.com
Delivered-To: curdle@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A2B6812970F for <curdle@ietfa.amsl.com>; Tue, 13 Dec 2016 12:30:47 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.796
X-Spam-Level:
X-Spam-Status: No, score=-4.796 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RP_MATCHES_RCVD=-2.896, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mVDWBWypqW5r for <curdle@ietfa.amsl.com>; Tue, 13 Dec 2016 12:30:44 -0800 (PST)
Received: from mail2.augustcellars.com (augustcellars.com [50.45.239.150]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B72F3129706 for <curdle@ietf.org>; Tue, 13 Dec 2016 12:30:42 -0800 (PST)
Received: from hebrews (24.21.96.37) by mail2.augustcellars.com (192.168.0.56) with Microsoft SMTP Server (TLS) id 15.0.1210.3; Tue, 13 Dec 2016 12:50:17 -0800
From: Jim Schaad <ietf@augustcellars.com>
To: "'Dang, Quynh (Fed)'" <quynh.dang@nist.gov>, curdle@ietf.org
References: <D4701965.2CFAB%qdang@nist.gov> <1481295892.20432.16.camel@redhat.com> <0e1701d254c6$46509670$d2f1c350$@augustcellars.com> <D4754C1E.2D0B1%qdang@nist.gov>
In-Reply-To: <D4754C1E.2D0B1%qdang@nist.gov>
Date: Tue, 13 Dec 2016 12:30:33 -0800
Message-ID: <00f001d2557f$c298b140$47ca13c0$@augustcellars.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_00F1_01D2553C.B4774600"
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQGOVN2GtPOV1KiNXXPE24AdYcNsXgL/ocZFAelhcFYAhZA4jaFi36FA
Content-Language: en-us
X-Originating-IP: [24.21.96.37]
Archived-At: <https://mailarchive.ietf.org/arch/msg/curdle/J4jQN2WFCdiw7YWUN3Iu2prMHYs>
Subject: Re: [Curdle] Some work for the group
X-BeenThere: curdle@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "List for discussion of potential new security area wg." <curdle.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/curdle>, <mailto:curdle-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/curdle/>
List-Post: <mailto:curdle@ietf.org>
List-Help: <mailto:curdle-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/curdle>, <mailto:curdle-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 13 Dec 2016 20:30:48 -0000

 

 

From: Dang, Quynh (Fed) [mailto:quynh.dang@nist.gov] 
Sent: Tuesday, December 13, 2016 4:09 AM
To: Jim Schaad <ietf@augustcellars.com>; 'Nikos Mavrogiannopoulos'
<nmav@redhat.com>; Dang, Quynh (Fed) <quynh.dang@nist.gov>;
rsalz@akamai.com; curdle@ietf.org
Subject: Re: [Curdle] Some work for the group

 

 

 

From: Jim Schaad <ietf@augustcellars.com <mailto:ietf@augustcellars.com> >
Date: Monday, December 12, 2016 at 5:22 PM
To: 'Nikos Mavrogiannopoulos' <nmav@redhat.com>, 'Quynh'
<Quynh.Dang@nist.gov <mailto:Quynh.Dang@nist.gov> >, "rsalz@akamai.com
<mailto:rsalz@akamai.com> " <rsalz@akamai.com <mailto:rsalz@akamai.com> >,
"curdle@ietf.org <mailto:curdle@ietf.org> " <curdle@ietf.org
<mailto:curdle@ietf.org> >
Subject: RE: [Curdle] Some work for the group

 

 

 

-----Original Message-----

From: Curdle [mailto:curdle-bounces@ietf.org] On Behalf Of Nikos

Mavrogiannopoulos

Sent: Friday, December 09, 2016 7:05 AM

To: Dang, Quynh (Fed) <quynh.dang@nist.gov <mailto:quynh.dang@nist.gov> >;
rsalz@akamai.com <mailto:rsalz@akamai.com> ;

curdle@ietf.org <mailto:curdle@ietf.org> 

Subject: Re: [Curdle] Some work for the group

On Fri, 2016-12-09 at 13:46 +0000, Dang, Quynh (Fed) wrote:

> There are no security issues with the pre-hash option. One more hash

> does not create any performance issues for the current protocols.  In

> addition, the pre-hash option provides the need for long messages as

> we know: one example is the long CRLs on small devices as pointed out

> on Jim's slides.

> 

> If I had to choose one algorithm which works well for all situations,

> I would choose the pre-hash option.

I agree.

Moreover, I don't quite follow the rationale for having it a must not on
some

scenarios. Of the options:

1. CA uses SECP256R1 (no prehash)

2. CA uses Ed25519R1 (prehash)

3. CA uses Ed25519R1 (no prehash)

 

I am going to assume that this is just a typo as the prehash and no prehash
are reversed on the above list.  

 

There is one low level argument that I have found for forbidding the
pre-hash version for Ed25519.   There is a possibility that if the pre-hash
version is allowed somebody is going to implement it incorrectly and do the
pre-hash as the item to be signed for pure mode as that is what is currently
available.  The current restrictions would avoid this possibility for
certificates but not for other uses.

 

Hi Jim, 

 

Don't people check or test their implementations.  It is hard for me to
imagine why when someone does not want to use the pre-hash, decides to
implement the non pre-hash version, but ended implementing the pre-hash
version, then don't check or test his or her implementation at all. 

 

Quynh,

 

No, this is I implement the pure version and somebody else abuses it and
uses it as a pre-hash version.  That is they do what comes naturally today.

 

Jim

 





I appreciate your work and contributions!





Quynh. 

 

 

the 3rd is banned. I kind of understand what the authors try to achieve, but

adding local policies into RFCs does not make much sense (especially if the

policy is dubious as in this case; one option with this particular curve is
banned,

with the other curves it is fine). The option (2) is apparently better than
3, but I

do not see why the existence of better option should prevent a CA from using

option (3).

Similar argumentation could be made for banning Ed25519R1 since Ed441 is

better.

I instead propose 2 alternatives, (a) remove the prehash option, or (b)
create an

RFC mandating policies for CAs, which algorithms they MUST use and which
not.

A CA can chose to follow them.

 

I think that option B would be more for the CA Consortium that for the IETF
to do. 

 

Jim

 

regards,

Nikos

_______________________________________________

Curdle mailing list

Curdle@ietf.org <mailto:Curdle@ietf.org> 

https://www.ietf.org/mailman/listinfo/curdle