Re: [Dcrup] rsa-sha1 proposals
Kurt Andersen <kurta@drkurt.com> Tue, 20 June 2017 19:00 UTC
Return-Path: <kurta@drkurt.com>
X-Original-To: dcrup@ietfa.amsl.com
Delivered-To: dcrup@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 82E541315FB for <dcrup@ietfa.amsl.com>; Tue, 20 Jun 2017 12:00:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=drkurt.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SmsZaDwrtYzg for <dcrup@ietfa.amsl.com>; Tue, 20 Jun 2017 12:00:11 -0700 (PDT)
Received: from mail-ua0-x236.google.com (mail-ua0-x236.google.com [IPv6:2607:f8b0:400c:c08::236]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3F2C11315F5 for <dcrup@ietf.org>; Tue, 20 Jun 2017 12:00:07 -0700 (PDT)
Received: by mail-ua0-x236.google.com with SMTP id 70so25573478uau.0 for <dcrup@ietf.org>; Tue, 20 Jun 2017 12:00:07 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=drkurt.com; s=20130612; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=FdQL+K5ya+h50C7fRvrKGyaIF9/HdLsDFzxy4AT7u2I=; b=e/MeVJhtCiLH0AZZAkEhFTr3/OacQdEwkRGqqjWQtZCsr/gQTBB7tizhVSqpzmDE8o VMfyIiGiUJmo+Jmq/lLfLb+xkzl064Q4ReU2gxiELuUcpxQ02leHLVU/Doa0iuHlGUIY 2U9rjLCFYkYVrtu9VJyZGJqg/AfMUYnkbtWkc=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=FdQL+K5ya+h50C7fRvrKGyaIF9/HdLsDFzxy4AT7u2I=; b=iwGSlQIYdhdqRVLGnR2rgrSwNPSPa+i3MxeTG+lUUhoQaotaILAR3Wo0FRcC/lhE91 D+dM5ifxH5X76KRw8PojLr5nZy5ee13otG+edhnSXjVyQ/5+a7aZ+4ws/jBgV61XJ6qT /3mvq06rmZr1dqTs0iWTSTFBA/cas+/YFVvMDLCbciXHxch9+6PiAjinK85JK6wP2HHR ZumSGVRj2SXSJGZcjTeIChrdmAocss63gd0VawGxbGOCMl1EN8vheINaUyAShGYBGpHX N1WdpDb8n6SUvLLNZVoXUJzuCSWdlNfqDHkKnyHkwGIPaKSDQBjQmLwYDO+y2wKSPULt qFfQ==
X-Gm-Message-State: AKS2vOzjWNGPQUyIh1x0tK0KO97T4+6YAJWLwtvyz0oH5Ccel0cF8ruj giECRYarKVsAS8T/+ukjincD6i3EdjGAYUE=
X-Received: by 10.159.52.77 with SMTP id s13mr13430972uab.8.1497985206192; Tue, 20 Jun 2017 12:00:06 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.176.75.153 with HTTP; Tue, 20 Jun 2017 12:00:05 -0700 (PDT)
In-Reply-To: <1642300.47WuTbIWPP@kitterma-e6430>
References: <1642300.47WuTbIWPP@kitterma-e6430>
From: Kurt Andersen <kurta@drkurt.com>
Date: Tue, 20 Jun 2017 12:00:05 -0700
Message-ID: <CABuGu1q66gCCVeurfdV3qF3yvKyL8PbBoW5D94mvNNatVtRT+g@mail.gmail.com>
To: Scott Kitterman <sklist@kitterman.com>
Cc: "dcrup@ietf.org" <dcrup@ietf.org>
Content-Type: multipart/alternative; boundary="f403043eb7a4187df0055268dcf1"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dcrup/0J4EcJ41KXM0ta6sFZ9JxGg1yvg>
Subject: Re: [Dcrup] rsa-sha1 proposals
X-BeenThere: dcrup@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: DKIM Crypto Update <dcrup.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dcrup>, <mailto:dcrup-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dcrup/>
List-Post: <mailto:dcrup@ietf.org>
List-Help: <mailto:dcrup-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dcrup>, <mailto:dcrup-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 20 Jun 2017 19:00:13 -0000
On Tue, Jun 20, 2017 at 8:39 AM, Scott Kitterman <sklist@kitterman.com> wrote: > > I think there are roughly three options that have been discussed: > > Status quo: > > > Signers MUST implement and SHOULD sign using rsa-sha256. Verifiers MUST > > implement both rsa-sha1 and rsa-sha256. > > Deprecate rsa-sha1: > > > Signers MUST implement and sign using rsa-sha256 only. Verifiers MUST > > implement both rsa-sha1 and rsa-sha256. > > Remove rsa-sha1: > > > Signers MUST implement and sign using rsa-sha256 only. Verifiers MUST > > implement rsa-sha256. rsa-sha1 is obsolete and MUST not be used. > Note: This option also removes rsa-sha1 from the ABNF. > [elided] Remove rsa-sha1: > This option eliminates (to the extent it is adopted) the potential of > security > risks with rsa-sha1. . . > While this might be considered somewhat abrupt, rsa-sha1 signing has been > effectively SHOULD NOT for a decade. Maybe this will create some momentum > for > operators to move off of it. > > It is abrupt to remove something without a formal deprecation period. > I'm in favor of moving strongly and clearly to kill sha1, but what about moving it out to the registry with a dated "MUST NOT". That provides for a deprecation period without the need for further intervention. The other advantage is that it provides a stronger historical record that people can point to when explaining brain-deadness to people who have not updated :-) I would suggest a "drop dead" date of something like mid-2018 to allow the rest of this work to reach completion. --Kurt
- [Dcrup] rsa-sha1 proposals Scott Kitterman
- Re: [Dcrup] rsa-sha1 proposals Seth Blank
- Re: [Dcrup] rsa-sha1 proposals Scott Kitterman
- Re: [Dcrup] rsa-sha1 proposals Salz, Rich
- Re: [Dcrup] rsa-sha1 proposals Jim Fenton
- Re: [Dcrup] rsa-sha1 proposals Kurt Andersen
- Re: [Dcrup] rsa-sha1 proposals Brandon Long
- Re: [Dcrup] rsa-sha1 proposals Hector Santos
- Re: [Dcrup] rsa-sha1 proposals Hector Santos
- Re: [Dcrup] rsa-sha1 proposals Scott Kitterman
- Re: [Dcrup] rsa-sha1 proposals John Levine
- Re: [Dcrup] rsa-sha1 proposals Hector Santos
- Re: [Dcrup] rsa-sha1 proposals Hector Santos
- Re: [Dcrup] rsa-sha1 proposals Seth Blank
- Re: [Dcrup] rsa-sha1 proposals Hector Santos
- Re: [Dcrup] rsa-sha1 proposals Jim Fenton
- Re: [Dcrup] rsa-sha1 proposals Scott Kitterman
- Re: [Dcrup] rsa-sha1 proposals Hector Santos
- Re: [Dcrup] rsa-sha1 proposals Salz, Rich
- Re: [Dcrup] rsa-sha1 proposals Scott Kitterman
- Re: [Dcrup] rsa-sha1 proposals Hector Santos
- Re: [Dcrup] rsa-sha1 proposals John Levine
- Re: [Dcrup] rsa-sha1 proposals John Levine
- Re: [Dcrup] rsa-sha1 proposals Brandon Long
- Re: [Dcrup] rsa-sha1 proposals Phillip Hallam-Baker
- [Dcrup] Review of draft-ietf-dcrup-dkim-crypto-02 Jim Fenton
- Re: [Dcrup] Review of draft-ietf-dcrup-dkim-crypt… John R. Levine