Re: [Dcrup] I-D Action: draft-ietf-dcrup-dkim-usage-02.txt

Scott Kitterman <sklist@kitterman.com> Sat, 10 June 2017 18:33 UTC

Return-Path: <sklist@kitterman.com>
X-Original-To: dcrup@ietfa.amsl.com
Delivered-To: dcrup@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1F44812702E for <dcrup@ietfa.amsl.com>; Sat, 10 Jun 2017 11:33:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.002
X-Spam-Level:
X-Spam-Status: No, score=-2.002 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=kitterman.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pH-ebkjA6NYr for <dcrup@ietfa.amsl.com>; Sat, 10 Jun 2017 11:33:57 -0700 (PDT)
Received: from mailout03.controlledmail.com (mailout03.controlledmail.com [208.43.65.50]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 53786126C83 for <dcrup@ietf.org>; Sat, 10 Jun 2017 11:33:57 -0700 (PDT)
Received: from kitterma-e6430.localnet (static-72-81-252-22.bltmmd.fios.verizon.net [72.81.252.22]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mailout03.controlledmail.com (Postfix) with ESMTPSA id 61628C403A4 for <dcrup@ietf.org>; Sat, 10 Jun 2017 13:33:55 -0500 (CDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=kitterman.com; s=201409; t=1497119635; bh=1ZKMA+Lt/BPwwSYNEko/gptilU+vj9myRiO2+jbdFDs=; h=From:To:Subject:Date:In-Reply-To:References:From; b=m3KlBwSEwGrYdzFbwVa8fRSe9vJYIM0R9XAECe+NCTIbkBSqVCXpReqKrw1mjiMbN fkp4F6WtCmDO6XrYhly037ILQ6+i5G+e+7Dgo16flm4iHC31LIrnUAWRZqq0Vw2BCy OYIxEq9/Nm3XlD1QoK3NX03xoPGdDzbjKSkpUSgU=
From: Scott Kitterman <sklist@kitterman.com>
To: dcrup@ietf.org
Date: Sat, 10 Jun 2017 14:33:54 -0400
Message-ID: <30567530.MBenZTfLgc@kitterma-e6430>
User-Agent: KMail/4.13.3 (Linux/3.13.0-119-generic; KDE/4.13.3; x86_64; ; )
In-Reply-To: <CABkgnnWdaecFqcVMSNYy8F7Z1_ijYG9-Vt2cw+AHoedziRXHDA@mail.gmail.com>
References: <149690083334.25644.8501543904193079634@ietfa.amsl.com> <CABkgnnWdaecFqcVMSNYy8F7Z1_ijYG9-Vt2cw+AHoedziRXHDA@mail.gmail.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dcrup/6kqni16i4DKlLo1K_q6WIPQU37I>
Subject: Re: [Dcrup] I-D Action: draft-ietf-dcrup-dkim-usage-02.txt
X-BeenThere: dcrup@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: DKIM Crypto Update <dcrup.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dcrup>, <mailto:dcrup-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dcrup/>
List-Post: <mailto:dcrup@ietf.org>
List-Help: <mailto:dcrup-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dcrup>, <mailto:dcrup-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 10 Jun 2017 18:33:59 -0000

On Saturday, June 10, 2017 10:42:34 AM Martin Thomson wrote:
> I find the construction of this draft strange.  Why not simply say
> "verifiers MUST implement and use rsa-sha256 instead of rsa-sha1"?
> The remainder of the text is largely unchanged, which took me a while
> to validate.
> 
> The problem here is that removing the definition of rsa-sha1 is not
> the point.  The code point can't be undefined (Section 7 gets that
> right), and we don't really benefit from having the definition
> removed.  What we want is to have rsa-sha256 implemented and deployed.
> 
> So say two things, just to be perfectly clear:
> 
> 1. DKIM implementations MUST NOT rely on rsa-sha1, it's busted.
> 
> 2. DKIM implementations MUST use rsa-sha256.  Signers MUST create
> signatures using rsa-sha256 and verifiers MUST verify those
> signatures.

This is pretty much what we had in -01 and this approach was suggested 
instead.  In XML, sorry, here's the diff:

https://github.com/kitterma/draft-ietf-dcrup-dkim-usage/commit/b3956a026c18b88ac2f47f8a012610598149e286

I liked it better before, which is more like I believe you are suggesting, so 
let's see what others say on that particular topic.

> I disagree with John about the publication of this draft without the
> new schemes.  It's worth doing now and the extra overheads of
> publication are small.

Exactly.

> Nits:
> 
> Section 3, two errors here:
> > One algorithms, rsa-sha256, is currenlty defined.

Done.

> Section 3.2 s/,/ / here:
> > DKIM,[RFC6376]

Done.

> Section 6 has an extra period.

Fixed.

> Collapse Section 7.1 into Section 7:
> 
> """
> IANA is requested to update the "sha1" registration in the "DKIM Hash
> Algorithms" as follows:
> <table>
> """

Done.

snip.

Scott K