Re: [Curdle] AD Review: draft-ietf-curdle-rsa-sha2-07.txt
denis bider <denisbider.ietf@gmail.com> Tue, 20 June 2017 14:15 UTC
Return-Path: <denisbider.ietf@gmail.com>
X-Original-To: curdle@ietfa.amsl.com
Delivered-To: curdle@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2866412EC78 for <curdle@ietfa.amsl.com>; Tue, 20 Jun 2017 07:15:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3deqTg2I7GQN for <curdle@ietfa.amsl.com>; Tue, 20 Jun 2017 07:15:12 -0700 (PDT)
Received: from mail-yb0-x22d.google.com (mail-yb0-x22d.google.com [IPv6:2607:f8b0:4002:c09::22d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1456112EC9B for <curdle@ietf.org>; Tue, 20 Jun 2017 07:14:53 -0700 (PDT)
Received: by mail-yb0-x22d.google.com with SMTP id 84so37675089ybe.0 for <curdle@ietf.org>; Tue, 20 Jun 2017 07:14:53 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=HivJL7gJcq8Dia1Lw5nBxrI1vxp7xwkcSuj+x9B8Kho=; b=ipskiFtKHua5ppf5qxACFZI4GTJE/SPWYo+DmfLOVy6ICeeC5I8Ik453VdcXXRbEmv pk7XYC/ESWl91WV3v8t1O1BNW5ce05y/jezmCBr5/uE1y9JBAt/9h8BEDEeqwo7lrVmU Mv5dLGqp+v1dMzHy+NutxQvfdSF2LyVV3jdg/ZKE//oMbjf9FK2hZRb0RbD4YqXFcxtm 27zMscaSkaQ4Z/ITU8dAQoDTERb3V8h67T2vzm7hXwzJ+Jxts1mKmFA5XWJdhn0I4RbY 6BiOZ2A9aNTEiZ0Olgrc9Q3mtAYAWb2/SXcXIOLs2MnTYCfx/zJAjb2f+YhSGFdvpXq/ n9uQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=HivJL7gJcq8Dia1Lw5nBxrI1vxp7xwkcSuj+x9B8Kho=; b=CqVB09BHDAL3DGQlMc7t/uff7T6IJGjPqrsAnEr72BhJZYa1ou5bRql2ognDjFvpd+ S6AzVqQJxlNet+Jnk4XrA8fdSU+LNJu9tNoC3sgSPU2me1+mGkluZcTIaDC0EJIYwr3+ UFgTf970lpts21qtiG2FNm0VE/1NAwIGtU4kCPMLlpaZMLA+YzWuyDSg72z2hzaoNyNQ zOaWVJuTvTy9+Q0CTsJtg/pZAicPFW9mGwpFhOp96ciCzMMMWHZoW+S2P1m/FIVE8ZC7 RYgybqhAfNAIIu5Wuf2bLtm2Wt8FQSAtEQY5Xy0qVB96M7m/hk6OEWwx09OYb/JJa52C 7C+g==
X-Gm-Message-State: AKS2vOwJMoUfjZDBluT0SAr04d0s9dqnsmWst9XHDile1hkw5cvQPDTf /suF84CF7Ea6wUeFiqTQ72ENvkGtOQ==
X-Received: by 10.37.205.133 with SMTP id d127mr23352926ybf.215.1497968092311; Tue, 20 Jun 2017 07:14:52 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.37.45.2 with HTTP; Tue, 20 Jun 2017 07:14:51 -0700 (PDT)
In-Reply-To: <CABcZeBMSmrjaPwMGZofzbAikS2xCzjQMyJAtAHfHbejiOMQiRg@mail.gmail.com>
References: <CABcZeBNPQXbS2m6tk6DwB_8YqHD=MObiH+VeXpPZdn7atkfREw@mail.gmail.com> <CADPMZDDh4CiPurv-7aYXt7oT_27xX97ZK-qrdMVJi4uGf-K--Q@mail.gmail.com> <CABcZeBMSmrjaPwMGZofzbAikS2xCzjQMyJAtAHfHbejiOMQiRg@mail.gmail.com>
From: denis bider <denisbider.ietf@gmail.com>
Date: Tue, 20 Jun 2017 08:14:51 -0600
Message-ID: <CADPMZDCPjGhp454NoutcPpWFuC-saf41VhvrVbffiGBY=1A6rw@mail.gmail.com>
To: Eric Rescorla <ekr@rtfm.com>
Cc: curdle <curdle@ietf.org>
Content-Type: multipart/alternative; boundary="94eb2c189eec070bbc055264e0eb"
Archived-At: <https://mailarchive.ietf.org/arch/msg/curdle/mseEUYHRmorHxCkqN8s7839VfcM>
Subject: Re: [Curdle] AD Review: draft-ietf-curdle-rsa-sha2-07.txt
X-BeenThere: curdle@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "List for discussion of potential new security area wg." <curdle.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/curdle>, <mailto:curdle-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/curdle/>
List-Post: <mailto:curdle@ietf.org>
List-Help: <mailto:curdle-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/curdle>, <mailto:curdle-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 20 Jun 2017 14:15:19 -0000
I agree, but there has to be a reason it's on its way out. :) This is the one reason I know how to phrase. If there's something else I can do instead, let me know. On Mon, Jun 19, 2017 at 11:11 AM, Eric Rescorla <ekr@rtfm.com> wrote: > > > On Mon, Jun 19, 2017 at 8:28 AM, denis bider <denisbider.ietf@gmail.com> > wrote: > >> > Either you are using PKCS#1 v1.5 or you are using PSS. >> > In the former case, there is no mask function and salt. >> >> Yikes, thanks. :) This was left over from an early version that specified >> PSS. This was before PKCS#1 v1.5 was requested. (The change took place >> before any implementation was released, so all deployed implementations use >> PKCS#1 v1.5.) >> >> >> > You say in the intro that RSA was defined as 1024 bit >> > keys. Are these keys of arbitrary length? Is there an >> > upper or lower limit? >> >> I believe this may refer to the following sentence: >> >> "In [RFC4253], SSH originally defined the public key algorithms "ssh-rsa" >> for server and client authentication using RSA with SHA-1, and "ssh-dss" >> using 1024-bit DSA and SHA-1." >> >> Here, 1024-bit refers to DSA. RFC 4253 imposes no limits on RSA key sizes. >> >> >> > > Implementations SHOULD apply PKCS#1 v1.5 padding to the expected >> > > hash, THEN compare the encoded bytes with the output of [...] >> >> > Why "SHOULD? >> >> Fair point. Changed as follows: >> >> "Verifiers MUST instead apply PKCS#1 v1.5 padding to the expected hash, >> then compare the encoded bytes with the output of the RSA operation." >> >> >> > This is an odd argument given that ECDSA is often also >> > implemented with random k. >> >> I agree, but that is the main argument that was given by multiple people >> as the main reason to remove DSA from the original draft (which covered DSA >> in addition). >> > > How about just "DSA is on its way out" :) > > >> >> >> denis >> >> >> >> On Sat, Jun 17, 2017 at 1:30 PM, Eric Rescorla <ekr@rtfm.com> wrote: >> >>> TECHNICAL >>> S 3. >>> Signing and verifying using these algorithms is performed according to >>> the RSASSA-PKCS1-v1_5 scheme in [RFC8017] using SHA-2 [SHS] as hash; >>> MGF1 as mask function; and salt length equal to hash size. >>> >>> This seems incorrect. Either you are using PKCS#1 v1.5 or you are >>> using PSS. In the former case, there is no mask function and salt. >>> Appendix 5.3 suggests that you are not using PSS. In any case, >>> you need to fix the inconsistency. >>> >>> You say in the intro that RSA was defined as 1024 bit keys. Are >>> these keys of arbitrary length? Is there an upper or lower limit? >>> >>> >>> S 5.3. >>> Implementations SHOULD apply PKCS#1 v1.5 padding to the expected hash, >>> THEN compare the encoded bytes with the output of the RSA operation. >>> >>> Why "SHOULD? >>> >>> >>> S 6. >>> A draft version of this memo also defined an algorithm name for use of >>> 2048-bit and 3072-bit DSA keys with a 256-bit subgroup and SHA-2 256 >>> hashing. It is possible to implement DSA securely by generating "k" >>> deterministically as per [RFC6979]. However, a plurality of reviewers >>> were concerned that implementers would continue to use libraries that >>> generate "k" randomly. This is vulnerable to biased "k" generation, >>> and extremely vulnerable to "k" reuse. This document therefore >>> disrecommends DSA, in favor of RSA and elliptic curve cryptography. >>> >>> This is an odd argument given that ECDSA is often also implemented >>> with random k. Not that I am in favor of adding DSA here. >>> >>> -Ekr >>> >>> >>> >>> _______________________________________________ >>> Curdle mailing list >>> Curdle@ietf.org >>> https://www.ietf.org/mailman/listinfo/curdle >>> >>> >> >
- [Curdle] AD Review: draft-ietf-curdle-rsa-sha2-07… Eric Rescorla
- Re: [Curdle] AD Review: draft-ietf-curdle-rsa-sha… denis bider
- Re: [Curdle] AD Review: draft-ietf-curdle-rsa-sha… Eric Rescorla
- Re: [Curdle] AD Review: draft-ietf-curdle-rsa-sha… denis bider
- Re: [Curdle] AD Review: draft-ietf-curdle-rsa-sha… Eric Rescorla
- Re: [Curdle] AD Review: draft-ietf-curdle-rsa-sha… Eric Rescorla
- Re: [Curdle] AD Review: draft-ietf-curdle-rsa-sha… denis bider
- Re: [Curdle] AD Review: draft-ietf-curdle-rsa-sha… Eric Rescorla
- Re: [Curdle] AD Review: draft-ietf-curdle-rsa-sha… denis bider