Re: [Curdle] comments on draft-ietf-curdle-rsa-sha2-03.txt

Daniel Migault <daniel.migault@ericsson.com> Fri, 07 April 2017 18:43 UTC

Return-Path: <mglt.ietf@gmail.com>
X-Original-To: curdle@ietfa.amsl.com
Delivered-To: curdle@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 27680129550 for <curdle@ietfa.amsl.com>; Fri, 7 Apr 2017 11:43:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.4
X-Spam-Level:
X-Spam-Status: No, score=-2.4 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FREEMAIL_FORGED_FROMDOMAIN=0.197, FREEMAIL_FROM=0.001, HEADER_FROM_DIFFERENT_DOMAINS=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jt9VwxOwhkGC for <curdle@ietfa.amsl.com>; Fri, 7 Apr 2017 11:43:06 -0700 (PDT)
Received: from mail-lf0-x235.google.com (mail-lf0-x235.google.com [IPv6:2a00:1450:4010:c07::235]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4FF3B1294A0 for <curdle@ietf.org>; Fri, 7 Apr 2017 11:43:06 -0700 (PDT)
Received: by mail-lf0-x235.google.com with SMTP id z15so46501084lfd.1 for <curdle@ietf.org>; Fri, 07 Apr 2017 11:43:06 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:sender:in-reply-to:references:from:date:message-id :subject:to:cc; bh=3fzClIh6BQhjvMEQqGEQ2HtNVHZDPjfCXmr7eCXjb1s=; b=f0qRlFsMeqxn4xCMq9biEwLArIO3bTrbWTNyam+sP+HstP5wfQrYa+YqvlYjBALo2Z fRtQnStUs6fRxC3V9RQIqh2bV5rfjtoknslOlGi+AIyQaqI9IJfV4LascH8hrSG834nc LvjYwDxfFVwRKx8cMzxQ+vjwGUNEo06xZi0pz2TECWiwYQry3NNpX3j5t2xHuQ1NSvZS JPkBCNYAP+f7QU80FSRd6TqU9FXnl4gVcrylYtu2CWe6pZesJ483oS2u61b0CyTnr89/ TIqe59dAWuZHJPJDO35/t3v+eicBYfKrA/bTOFksG312T6MhMHDaFfudIQm6cEz7Cbxg M9iA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:sender:in-reply-to:references:from :date:message-id:subject:to:cc; bh=3fzClIh6BQhjvMEQqGEQ2HtNVHZDPjfCXmr7eCXjb1s=; b=rDxOkhYp7Xp8UgKbS7K9SpjAdK05CefRB1BzG7zAOfXuqEnT60SrJRzOpdpHcxD4eB Y+JAqvCNaUdRC9oKKwpQTWZvhqEti+UPhwkLMkW4lJaD889AAEuwx4fBqnMKyn0MRGi0 xLbuhHFqBXQXKD/ZgdD3UWrWLU5DOUHJ8Gex2LQ5inJdPQ1guSJOFKK6IAzxM82WTCTj 9HgmjM5tjRcB/fUKMWTtKGFp/25ivFv9FndUBygJKYoFn6ZMFQG78ua9bDgYQ7y9bsnW f+Zi22V3Pc4I9RPD/YcrJ0dOpN9/O2c8x/5KbqKDxC9JhKd+XhIuzejeUjP1AxMoXCUK 7ZNg==
X-Gm-Message-State: AFeK/H1NzxaPpOULRWjRg1ylNPvwnf8Fr9wAqeVjmXbKg3k+HlVBNWSBpxvfKcg/uPiG2N2j3jmWxZbeSXqD2Q==
X-Received: by 10.46.33.135 with SMTP id h7mr12060590lji.96.1491590584610; Fri, 07 Apr 2017 11:43:04 -0700 (PDT)
MIME-Version: 1.0
Sender: mglt.ietf@gmail.com
Received: by 10.46.69.85 with HTTP; Fri, 7 Apr 2017 11:43:03 -0700 (PDT)
In-Reply-To: <CADPMZDAmuUKy_AJ9aYd4YYAmO5ZU-8z0P7EZwq2aG+jJM-kRaQ@mail.gmail.com>
References: <CADPMZDByTiWov0vp2Tk1n9dnnkfwepO+UsAnh3rdsrbem2H=VQ@mail.gmail.com> <1490575901696.39454@cs.auckland.ac.nz> <CADPMZDDNZTznKBJ2-vf4MJFjP0Bx34ALF8JCVBhwv12Pdm=XcA@mail.gmail.com> <CADZyTk=L2mKheNkHQ+jtecspLnR2rGc1BajkTKQ0G3cynxkwow@mail.gmail.com> <20170327072447.GA2827@LK-Perkele-V2.elisa-laajakaista.fi> <CADPMZDAmuUKy_AJ9aYd4YYAmO5ZU-8z0P7EZwq2aG+jJM-kRaQ@mail.gmail.com>
From: Daniel Migault <daniel.migault@ericsson.com>
Date: Fri, 07 Apr 2017 14:43:03 -0400
X-Google-Sender-Auth: XhdCFqLypTX2CSYmozQLU7w1uqs
Message-ID: <CADZyTk=r9quAZxvyQgLd7PrvvhzoQ96s5CPqHcFNaGez8igYcw@mail.gmail.com>
To: denis bider <denisbider.ietf@gmail.com>
Cc: Ilari Liusvaara <ilariliusvaara@welho.com>, "curdle@ietf.org" <curdle@ietf.org>, Peter Gutmann <pgut001@cs.auckland.ac.nz>
Content-Type: multipart/alternative; boundary="001a1142b632f2342e054c97fecf"
Archived-At: <https://mailarchive.ietf.org/arch/msg/curdle/wcllK8flmD_JLKggpgRPh5PT6RA>
Subject: Re: [Curdle] comments on draft-ietf-curdle-rsa-sha2-03.txt
X-BeenThere: curdle@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "List for discussion of potential new security area wg." <curdle.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/curdle>, <mailto:curdle-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/curdle/>
List-Post: <mailto:curdle@ietf.org>
List-Help: <mailto:curdle-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/curdle>, <mailto:curdle-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 07 Apr 2017 18:43:09 -0000

Hi,

In the chicago meeting [1], the consensus seems that even though pss would
be defined, there is no plane to implement nor to use it. I am confirming
this consensus on the mailing list. If you desagree with that, please raise
your opinion. If not we will move the draft forward.

The nits tool on the current version provides teh following output:

[1] https://www.ietf.org/proceedings/98/minutes/minutes-98-curdle-00.txt


  Checking nits according to http://www.ietf.org/id-info/checklist :
  ----------------------------------------------------------------------------

  -- The draft header indicates that this document updates RFC4252, but the
     abstract doesn't seem to mention this, which it should.

  -- The draft header indicates that this document updates RFC4253, but the
     abstract doesn't seem to mention this, which it should.

  -- The document seems to lack a disclaimer for pre-RFC5378 work, but may
     have content which was first submitted before 10 November 2008.  If you
     have contacted all the original authors and they are all willing to grant
     the BCP78 rights to the IETF Trust, then this is fine, and you can ignore
     this comment.  If not, you may need to add the pre-RFC5378 disclaimer.
     (See the Legal Provisions document at
     http://trustee.ietf.org/license-info for more information.)


  Checking references for intended status: Proposed Standard
  ----------------------------------------------------------------------------

     (See RFCs 3967 and 4897 for information about using normative references
     to lower-maturity documents in RFCs)

  == Missing Reference: 'RFC3629' is mentioned on line 100, but not defined

  == Unused Reference: 'RFC4250' is defined on line 298, but no explicit
     reference was found in the text

  -- Possible downref: Non-RFC (?) normative reference: ref. 'FIPS-180-4'

  ** Obsolete normative reference: RFC 3447

yours,

Daniel


On Mon, Mar 27, 2017 at 4:51 PM, denis bider <denisbider.ietf@gmail.com>
wrote:

> That is a welcome assurance. If PSS is added, it sounds like something to
> mention in Security Considerations as a further argument against small keys.
>
> On Mon, Mar 27, 2017 at 1:24 AM, Ilari Liusvaara <ilariliusvaara@welho.com
> > wrote:
>
>> On Sun, Mar 26, 2017 at 10:50:02PM -0500, Daniel Migault wrote:
>> > Whether pss variant have to be added is up to the WG to decide. That I
>> > would be in favor is only one opinion ;-) [1] lists some advantages of
>> PSS
>> > vs PKCS1v1.5. Note that enabling a given key may be used by two variants
>> > needs also some thoughts. I will raise the question during the meeting,
>> but
>> > discussion will be made on the mailing list.
>>
>> This thing came up in context of TLS 1.3.
>>
>> The probability PKCS#1v1.5 and PSS signature overlaps depends on key
>> size and salt size. Where overlap is defined as encoded message that
>> is valid in both PKCS#1v1.5 and PSS. These depend on hashing algorithm
>> and number of bits in n, but not precise value of n.
>>
>> TLS restricts salt length to be the same as hash length. Which makes
>> overlaps highly unlikely with key sizes >=2048 bits and hash sizes
>> <=512 bits. The problem being to control ~1000 bits using 512 bits.
>>
>> As key size decreases or salt size increases, the overlap probability
>> increases, and eventually overlaps become almost certain, and further
>> one gets multiple overlaps.
>>
>> >
>> > [1]
>> > https://www.emc.com/emc-plus/rsa-labs/historical/raising-sta
>> ndard-rsa-signatures-rsa-pss.htm
>>
>>
>> -Ilari
>>
>
>
> _______________________________________________
> Curdle mailing list
> Curdle@ietf.org
> https://www.ietf.org/mailman/listinfo/curdle
>
>