Re: [dane] Start of WGLC for draft-ietf-dane-openpgpkey: objection about keyring format documentation

Brian Dickson <brian.peter.dickson@gmail.com> Tue, 17 March 2015 21:03 UTC

Return-Path: <brian.peter.dickson@gmail.com>
X-Original-To: dane@ietfa.amsl.com
Delivered-To: dane@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 052B71A88E7 for <dane@ietfa.amsl.com>; Tue, 17 Mar 2015 14:03:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qqXCLI1jfvy7 for <dane@ietfa.amsl.com>; Tue, 17 Mar 2015 14:03:30 -0700 (PDT)
Received: from mail-ie0-x235.google.com (mail-ie0-x235.google.com [IPv6:2607:f8b0:4001:c03::235]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DCA321A88E4 for <dane@ietf.org>; Tue, 17 Mar 2015 14:03:26 -0700 (PDT)
Received: by ieclw3 with SMTP id lw3so21972674iec.2 for <dane@ietf.org>; Tue, 17 Mar 2015 14:03:26 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=X+154ZILCYJ8Ind/TVV47kRrH1ILUElW5KNB/k6V6Rw=; b=B0IEuRfCvLW6ftKZee+80ze3GAaZwUY16YTg+63fmTuyDCsH1N8yev8DHDINEfjyOh j4KWwPdZNynb2ughzIcjRsG3wQYNxcK+3ht7VMYAcU4JHwG7pB44WifLAuYnHFK9S0XZ vDSASLxRQzrfgCPdTn+JNvDPB8nYKC3XGBpNn70VF1x5Mywt0JGECWKcDgQIiz3lH/40 ci+AokQpLdOvnKeJUF+s86LNimBcXDTRTWP72wF7CEBKVhiRFRpjpFHu2dViixM80mSS MshhWIMHmtbosOBfF1hxMEXQ+oOtvE64Q4NuWtSSfMizTytgAd8C5Mm3ifN+ye2AlqGR SqNg==
MIME-Version: 1.0
X-Received: by 10.107.3.164 with SMTP id e36mr80924273ioi.70.1426626206331; Tue, 17 Mar 2015 14:03:26 -0700 (PDT)
Received: by 10.64.57.201 with HTTP; Tue, 17 Mar 2015 14:03:26 -0700 (PDT)
In-Reply-To: <55088A79.8070201@redhat.com>
References: <CAHw9_iJPuG23Aok7V_wcAMirua_DPDLHy01tnd+DaUqEeK3NZA@mail.gmail.com> <54EF3A7D.6070809@redhat.com> <8CB4E1AD-35C6-4A92-97ED-CC2853C2896C@vpnc.org> <alpine.LFD.2.10.1503082309420.31060@bofh.nohats.ca> <55088A79.8070201@redhat.com>
Date: Tue, 17 Mar 2015 14:03:26 -0700
Message-ID: <CAH1iCip2p_j0Uk-gcGVu5AvR2NVhLauwjzp9w0=OPHJzbyn=1Q@mail.gmail.com>
From: Brian Dickson <brian.peter.dickson@gmail.com>
To: Petr Spacek <pspacek@redhat.com>
Content-Type: multipart/alternative; boundary="001a113ecf1c4198e30511824c32"
Archived-At: <http://mailarchive.ietf.org/arch/msg/dane/NTmOEN5k4pfakF1vG2l4gD9E5xg>
Cc: "dane@ietf.org" <dane@ietf.org>
Subject: Re: [dane] Start of WGLC for draft-ietf-dane-openpgpkey: objection about keyring format documentation
X-BeenThere: dane@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: DNS-based Authentication of Named Entities <dane.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dane>, <mailto:dane-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dane/>
List-Post: <mailto:dane@ietf.org>
List-Help: <mailto:dane-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dane>, <mailto:dane-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 17 Mar 2015 21:03:36 -0000

On Tue, Mar 17, 2015 at 1:11 PM, Petr Spacek <pspacek@redhat.com> wrote:

> Hello!
>
> Currently we have:
>
> > 2.2. The OPENPGPKEY RDATA wire format
> >    The RDATA Wire Format consists of a single OpenPGP public key as
> >    defined in Section 5.5.1.1 of [RFC4880].  Note that this format is
> >    without ASCII armor or base64 encoding.
>
> http://tools.ietf.org/html/rfc4880#section-5.5.1.1 says:
> > 5.5.1.1. Public-Key Packet (Tag 6)
> >    A Public-Key packet starts a series of packets that forms an OpenPGP
> >    key (sometimes called an OpenPGP certificate).
>
> Blindly using top-level key from first public key packet would violate
> crypto
> protocol enforced by PGP (and doing so could have undesired effects as you
> should never ever use one key to do encryption/decryption and signing...).
>
> I would say that for the purpose of OPENPGPKEY we do not need user IDs
> because, after all, we are going to use DNS for user id -> key mapping.


Maybe yes, maybe no.
Do "people" (a generalization for sure) use their PGP/GPG keys as a defacto
mapping of mailboxes, via their user IDs?

If so, then maybe this is at least a partial solution to the "mailbox
aliases / case-folding" problem.

Perhaps stripping out IDs which do not fall in the parent domain's
namespace, and publishing the OPENPGPKEY at all owner names corresponding
to the hash(LHS(user id)), would be a useful thing?

(This is analogous to the in-addr.arpa/ip6.arpa PTRs vs A/AAAA records, and
loose name-based validation. Except with added crypto goop.)



> The next problem is that by stripping all the 'signature' packets we would
> lose preferences like preferred hashing algorithms, key flags etc. which
> are
> stored in signature packet.
>

I think the question of what to include/exclude ties to the general PGP
usage questions:
Is the need/intent to have these PGP keys operate entirely stand-alone?
Do these DANE keys only augment, or entirely duplicate, keys published in
public key sites?
Does stripping some content out, in the DANE context, cause conflicts or
breakage, compared to other key sources (such as a local keyring with
signatures etc.)?
Would there be some "fluff" that can be stripped without breaking things?
If the same key is found in multiple DANE locations, but each partially
stripped, to what degree would simply merging the keys' "packets" result in
"correct" keys?
If the same key is found in its entirety, but maybe some components differ
(like sigs), because of different publication dates,  would a blind merge
be okay?

I think these might need to be answered to be sure the right RDATA choices
are made.

Thanks,
Brian