Re: [Dcrup] new version draft-ietf-dcrup-dkim-crypto-04

"John R Levine" <johnl@taugh.com> Mon, 07 August 2017 02:54 UTC

Return-Path: <johnl@taugh.com>
X-Original-To: dcrup@ietfa.amsl.com
Delivered-To: dcrup@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6D399127077 for <dcrup@ietfa.amsl.com>; Sun, 6 Aug 2017 19:54:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.001
X-Spam-Level:
X-Spam-Status: No, score=-2.001 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1536-bit key) header.d=iecc.com header.b=SaK76re+; dkim=pass (1536-bit key) header.d=taugh.com header.b=Sf3K+w4N
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cJtE3eTJ3dnL for <dcrup@ietfa.amsl.com>; Sun, 6 Aug 2017 19:54:01 -0700 (PDT)
Received: from miucha.iecc.com (w6.iecc.com [IPv6:2001:470:1f07:1126::4945:4343]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E7D8C126CD8 for <dcrup@ietf.org>; Sun, 6 Aug 2017 19:53:57 -0700 (PDT)
Received: (qmail 89402 invoked from network); 7 Aug 2017 02:53:56 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=iecc.com; h=date:message-id:from:to:cc:subject:in-reply-to:references:mime-version:content-type:user-agent; s=15d38.5987d644.k1707; bh=bA05vfcZu+fEsIJFZ6YYaPDKCWsflCrHiiDVS5Ct4Ro=; b=SaK76re+fm5KydhuNF8PQoNxtBfX08CEB7c3wYSXenjcuXxn+0p2cT5b0WnYV7d2dGjWY7micdjf5BfqIySMAWkW6caPrKiCaSGzvjjHfrMa9l9KU4ONf2awsjZoP9c4S6H+yQUmpWaAFREwtRqKRV5mZGf2ZmyXVTHSzCeCmWNPKfJM2dqUoW5NU6OlVRN472Am7zjkn8cl7YMtknvCqY0umvbNRhrCPwVWonNobRBlBEIyQdmZ2bCf6Lp+Alee
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=taugh.com; h=date:message-id:from:to:cc:subject:in-reply-to:references:mime-version:content-type:user-agent; s=15d38.5987d644.k1707; bh=bA05vfcZu+fEsIJFZ6YYaPDKCWsflCrHiiDVS5Ct4Ro=; b=Sf3K+w4NV84gWmxS+KZQYadcn0RvVY/sdr/kTvnORSgdvVd2fimZtHhIpHqBnvTTInkSr4n5rRdYBMgjuENIss9F48/cJHsJaQGN5dX3i1WZWSeIw52CLHpVAmPteozsunKmvXI7ofOqaVayxcszlx5R0Iy7AN9qWBWLqjiOZZXTdXeL1EfXELygMV/cPbIHnn+P8HoZGvMS446R80xK9qDQhZggvqPzB0PDBl84VG7KDy8Y91zdgCGm+0Ry9ciX
Received: from localhost ([IPv6:2001:470:1f07:1126::78:696d:6170]) by imap.iecc.com ([IPv6:2001:470:1f07:1126::78:696d:6170]) with ESMTPS (TLS1.2/X.509/AEAD) via TCP6; 07 Aug 2017 02:53:56 -0000
Date: Sun, 06 Aug 2017 22:53:55 -0400
Message-ID: <alpine.OSX.2.21.1708062218580.28227@ary.qy>
From: John R Levine <johnl@taugh.com>
To: Martin Thomson <martin.thomson@gmail.com>
Cc: dcrup@ietf.org
In-Reply-To: <CABkgnnWi6qS6L7mBHfFObMZhP=2C9mpX8sCuM8sx5efD=dX=kQ@mail.gmail.com>
References: <alpine.OSX.2.21.1707281410000.7564@ary.qy> <CABkgnnWi6qS6L7mBHfFObMZhP=2C9mpX8sCuM8sx5efD=dX=kQ@mail.gmail.com>
User-Agent: Alpine 2.21 (OSX 202 2017-01-01)
MIME-Version: 1.0
Content-Type: text/plain; format="flowed"; charset="US-ASCII"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dcrup/5FjmxVbLEAgPSsP9CNtEr0mqyDY>
Subject: Re: [Dcrup] new version draft-ietf-dcrup-dkim-crypto-04
X-BeenThere: dcrup@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: DKIM Crypto Update <dcrup.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dcrup>, <mailto:dcrup-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dcrup/>
List-Post: <mailto:dcrup@ietf.org>
List-Help: <mailto:dcrup-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dcrup>, <mailto:dcrup-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 07 Aug 2017 02:54:03 -0000

> This looks pretty good.

Thanks,

> The abstract still says "and deprecates an obsolete signing
> algorithm",

Right, it's gone.

> In the spirit of leaving the removal of the crusty old stuff to the
> other draft, I think that you should:
>
> 1. remove the clause from the abstract
> 2. remove the first paragraph of Section 6 (which specifies the update
> to RFC 6376)
> 3. remove the requirement to use 1024-bit keys for "rsa-sha256"

That makes no sense to me.  Going forward, if DKIM signers and verifiers 
are going to interoperate, the verifiers have to handle every signature 
that a signer can create.  It's not like TLS where they get to negotiate 
at connection time.  So we have to update 6376 to add all the new 
signature methods that a signer might use.  Also remember that the current 
unhashed RSA works just fine for the large fraction of signers whose DNS 
provisioning system isn't broken, so we're not deprecating it.

For the editorial stuff, you're right that I confused p= and k= which I 
think are right in the -05 version.  The text changes don't seem any 
clearer to me so I'll wait and see what other people say.

> Final unrelated comment:
>
> You recommend that "rsafp signatures SHOULD use key lengths of 1536 or
> 2048 bits".

Well, actually, I said 1536 to 2048 bits in one place and 1024 to 2048 in 
another.  Oops.  I took out the second and now says signatures MUST be at 
least 1024 bits and SHOULD be 2048 bits, and verifiers MUST NOT accept 
shorter than 1024.  I think that matches reality, particularly the final 
MUST NOT to get the remaining 512 bit signers to increase the key size.

R's,
John