Re: [Curdle] Some work for the group

Jim Schaad <ietf@augustcellars.com> Mon, 12 December 2016 22:22 UTC

Return-Path: <ietf@augustcellars.com>
X-Original-To: curdle@ietfa.amsl.com
Delivered-To: curdle@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 14CAA129C7F for <curdle@ietfa.amsl.com>; Mon, 12 Dec 2016 14:22:57 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.797
X-Spam-Level:
X-Spam-Status: No, score=-4.797 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-2.896, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zk7Ql3DTs5IQ for <curdle@ietfa.amsl.com>; Mon, 12 Dec 2016 14:22:55 -0800 (PST)
Received: from mail2.augustcellars.com (augustcellars.com [50.45.239.150]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EAAE51294BB for <curdle@ietf.org>; Mon, 12 Dec 2016 14:22:54 -0800 (PST)
Received: from hebrews (173.8.216.38) by mail2.augustcellars.com (192.168.0.56) with Microsoft SMTP Server (TLS) id 15.0.1210.3; Mon, 12 Dec 2016 14:42:31 -0800
From: Jim Schaad <ietf@augustcellars.com>
To: 'Nikos Mavrogiannopoulos' <nmav@redhat.com>, "'Dang, Quynh (Fed)'" <quynh.dang@nist.gov>, rsalz@akamai.com, curdle@ietf.org
References: <D4701965.2CFAB%qdang@nist.gov> <1481295892.20432.16.camel@redhat.com>
In-Reply-To: <1481295892.20432.16.camel@redhat.com>
Date: Mon, 12 Dec 2016 14:22:47 -0800
Message-ID: <0e1701d254c6$46509670$d2f1c350$@augustcellars.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQGOVN2GtPOV1KiNXXPE24AdYcNsXgL/ocZFoXTkMvA=
Content-Language: en-us
X-Originating-IP: [173.8.216.38]
Archived-At: <https://mailarchive.ietf.org/arch/msg/curdle/yi5QpqSi7tDJ4PT1gOE0Z21Cdmk>
Subject: Re: [Curdle] Some work for the group
X-BeenThere: curdle@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "List for discussion of potential new security area wg." <curdle.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/curdle>, <mailto:curdle-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/curdle/>
List-Post: <mailto:curdle@ietf.org>
List-Help: <mailto:curdle-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/curdle>, <mailto:curdle-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 12 Dec 2016 22:22:57 -0000


> -----Original Message-----
> From: Curdle [mailto:curdle-bounces@ietf.org] On Behalf Of Nikos
> Mavrogiannopoulos
> Sent: Friday, December 09, 2016 7:05 AM
> To: Dang, Quynh (Fed) <quynh.dang@nist.gov>; rsalz@akamai.com;
> curdle@ietf.org
> Subject: Re: [Curdle] Some work for the group
> 
> On Fri, 2016-12-09 at 13:46 +0000, Dang, Quynh (Fed) wrote:
> 
> > There are no security issues with the pre-hash option. One more hash
> > does not create any performance issues for the current protocols.  In
> > addition, the pre-hash option provides the need for long messages as
> > we know: one example is the long CRLs on small devices as pointed out
> > on Jim’s slides.
> >
> > If I had to choose one algorithm which works well for all situations,
> > I would choose the pre-hash option.
> 
> I agree.
> 
> Moreover, I don't quite follow the rationale for having it a must not on some
> scenarios. Of the options:
> 1. CA uses SECP256R1 (no prehash)
> 2. CA uses Ed25519R1 (prehash)
> 3. CA uses Ed25519R1 (no prehash)

I am going to assume that this is just a typo as the prehash and no prehash are reversed on the above list.  

There is one low level argument that I have found for forbidding the pre-hash version for Ed25519.   There is a possibility that if the pre-hash version is allowed somebody is going to implement it incorrectly and do the pre-hash as the item to be signed for pure mode as that is what is currently available.  The current restrictions would avoid this possibility for certificates but not for other uses.

> 
> the 3rd is banned. I kind of understand what the authors try to achieve, but
> adding local policies into RFCs does not make much sense (especially if the
> policy is dubious as in this case; one option with this particular curve is banned,
> with the other curves it is fine). The option (2) is apparently better than 3, but I
> do not see why the existence of better option should prevent a CA from using
> option (3).
> 
> Similar argumentation could be made for banning Ed25519R1 since Ed441 is
> better.
> 
> I instead propose 2 alternatives, (a) remove the prehash option, or (b) create an
> RFC mandating policies for CAs, which algorithms they MUST use and which not.
> A CA can chose to follow them.

I think that option B would be more for the CA Consortium that for the IETF to do. 

Jim

> 
> regards,
> Nikos
> 
> _______________________________________________
> Curdle mailing list
> Curdle@ietf.org
> https://www.ietf.org/mailman/listinfo/curdle