Re: [dane] I-D Action: draft-ietf-dane-smime-04.txt

James Cloos <cloos@jhcloos.com> Thu, 09 January 2014 19:51 UTC

Return-Path: <cloos@jhcloos.com>
X-Original-To: dane@ietfa.amsl.com
Delivered-To: dane@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8587D1AE3D5 for <dane@ietfa.amsl.com>; Thu, 9 Jan 2014 11:51:55 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.539
X-Spam-Level:
X-Spam-Status: No, score=-2.539 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RP_MATCHES_RCVD=-0.538, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ukmQR4EFIclb for <dane@ietfa.amsl.com>; Thu, 9 Jan 2014 11:51:52 -0800 (PST)
Received: from ore.jhcloos.com (ore.jhcloos.com [IPv6:2604:2880::b24d:a297]) by ietfa.amsl.com (Postfix) with ESMTP id 69FAF1AE114 for <dane@ietf.org>; Thu, 9 Jan 2014 11:51:52 -0800 (PST)
Received: by ore.jhcloos.com (Postfix, from userid 10) id 4FF891DEB5; Thu, 9 Jan 2014 19:51:39 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=jhcloos.com; s=ore13; t=1389297099; bh=NsQM+qjiYS2Xb78QFeGOMcW5+4hFAFfXLhfYATPOZGs=; h=From:To:Subject:In-Reply-To:References:Date:From; b=H4w/I/csb7GXTQb53xrxUrPJVOHMf+eRmdqD2Bz5oqgKplWwI+eh/1p0g2/8xq1x/ dtXWHh2QFDtqRC5Cp9j9kLjKl/200wyyDC9wiClOTLqTjQ9EMJyZp9h8oLg/VlAXHx uQ8D67hd9cb28uM1ykfgcq0z1CzSgCr+rQZeYz2tISQ==
Received: by carbon.jhcloos.org (Postfix, from userid 500) id 96FE360027; Thu, 9 Jan 2014 19:45:50 +0000 (UTC)
From: James Cloos <cloos@jhcloos.com>
To: dane@ietf.org
In-Reply-To: <20140109173943.GL2317@mournblade.imrryr.org> (Viktor Dukhovni's message of "Thu, 9 Jan 2014 17:39:43 +0000")
References: <89AE05E1-BC6C-46BA-A4CC-A8F29070096D@vpnc.org> <CEF43EFD.F8FB%bdickson@verisign.com> <20140109173943.GL2317@mournblade.imrryr.org>
User-Agent: Gnus/5.130008 (Ma Gnus v0.8) Emacs/24.3.50 (gnu/linux)
Face: iVBORw0KGgoAAAANSUhEUgAAABAAAAAQAgMAAABinRfyAAAACVBMVEX///8ZGXBQKKnCrDQ3 AAAAJElEQVQImWNgQAAXzwQg4SKASgAlXIEEiwsSIYBEcLaAtMEAADJnB+kKcKioAAAAAElFTkSu QmCC
Copyright: Copyright 2013 James Cloos
OpenPGP: ED7DAEA6; url=http://jhcloos.com/public_key/0xED7DAEA6.asc
OpenPGP-Fingerprint: E9E9 F828 61A4 6EA9 0F2B 63E7 997A 9F17 ED7D AEA6
Date: Thu, 09 Jan 2014 14:45:50 -0500
Message-ID: <m37ga9kkfs.fsf@carbon.jhcloos.org>
Lines: 35
MIME-Version: 1.0
Content-Type: text/plain
X-Hashcash: 1:30:140109:dane@ietf.org::ZhMC6X+SKOoWK7LS:000cjKhA
Subject: Re: [dane] I-D Action: draft-ietf-dane-smime-04.txt
X-BeenThere: dane@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: DNS-based Authentication of Named Entities <dane.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dane>, <mailto:dane-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dane/>
List-Post: <mailto:dane@ietf.org>
List-Help: <mailto:dane-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dane>, <mailto:dane-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 Jan 2014 19:51:55 -0000

>>>>> "BD" == Brian Dickson <bdickson@verisign.com> writes:
>>>>> "VD" == Viktor Dukhovni <viktor1dane@dukhovni.org> writes:

BD>> So instead of "encoding" per se, what about using a hash function?
BD>> ... re-use of the NSEC3 code might be reasonable

VD> An intriguing suggestion.

Very!

VD> If the hash is HMAC-SHA1(domain, username), its hex representation
VD> is 40 octets which fits comfortably into a DNS label.

As hex; and 40 hex vs 32 base32 isn't enough of a difference to warrant
adding extra code for base32.  A win overall.

Should anyone insist of hmac-sha256, though, base32 would be necessary.
But I've yet to see any credible claims that sha1's vulnerabilities
affect hmac-sha1, so there shouldn't be a reason for sha2 or sha3.

VD> HMAC with the domain as a key makes rainbow tables less useful.

If hmac nonetheless isn't used, then the nsec3 hash SHOULD be.

The issue of normalization (before hashing) remains, as foo will
generate a different hash than LHS or Lhs (or lHs), not to mention
the differences between NFC vs NFD (eg, <U+E4> vs <U+61 U+308>).

I like the idea of a published policy (perhaps using the token _policy)
to specify the details for that zone.  With lc(nfc(lhs)) as the default
policy, if none is specified.

-JimC
--
James Cloos <cloos@jhcloos.com>         OpenPGP: 1024D/ED7DAEA6