Re: [Dcrup] AD review of draft-ietf-dcrup-dkim-usage-04.txt

"Murray S. Kucherawy" <superuser@gmail.com> Fri, 03 November 2017 17:34 UTC

Return-Path: <superuser@gmail.com>
X-Original-To: dcrup@ietfa.amsl.com
Delivered-To: dcrup@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AA1AC13FF1A for <dcrup@ietfa.amsl.com>; Fri, 3 Nov 2017 10:34:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level:
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rB2cjbqiWmPm for <dcrup@ietfa.amsl.com>; Fri, 3 Nov 2017 10:34:43 -0700 (PDT)
Received: from mail-qt0-x229.google.com (mail-qt0-x229.google.com [IPv6:2607:f8b0:400d:c0d::229]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 27D5313FF0D for <dcrup@ietf.org>; Fri, 3 Nov 2017 10:34:43 -0700 (PDT)
Received: by mail-qt0-x229.google.com with SMTP id z28so4109655qtz.13 for <dcrup@ietf.org>; Fri, 03 Nov 2017 10:34:43 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=RCRrDnbAbUDY1YEKDBP5i027uqEu66Qjf/dtv5jSLcM=; b=Xh0+E3deJC1HRJZw8Ha7prOBEGl7JDW9isv0etHEt1LDEKq3gPjjV5znTxkPTBZM0p ZvkQt3p3o9ySR0XauSVaxLYzJrOij/d/L3TEevOSo6lAhXxAmMMd26806RMBIPlTmTud 570gD9hYaJ61xJ/ueeA/MoZAr/DyBp9B9J+hHI4xd8zIwVSZ0pdcKl2HNC2ebdVXrrX1 Noo91FQPX5bDQt7oUUR9Czpf42vlpXkl3B9wmAB/dW36HNYyyBlxozfffjHZql2AwDLZ YPCUIVfD1kS1Kl6/oin2mAcUKIHf2cICkZi+okg3vfRVToOVo1IYKuWIGxeLjwMxm9/L ZaCw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=RCRrDnbAbUDY1YEKDBP5i027uqEu66Qjf/dtv5jSLcM=; b=tRyCzSDJteMCh6/sawiuE6PgQR7NIslOT/lfPOT8Tb3/a/+3mHTvFLATtHiPjDz9/M N6QcchIsV+cYfWjE+BG+UmWeOKzZN4aqt/8dFcN1gJ+H1UoZwFBVIysl0R6Yo0vaI40v +ITAkgXgGn2lmlzXQ3RUwwig7lQ5yJPn+UTjq61VgBvGpKHSox8/0FQzvp89cChc9FrI dVZRgrBUSVcAMwh/V0XaCZa6QCH2PbI9Cx0AikwYTxGRCLccBNPr+9f6IT1KnyMkOEr+ 2IW96C1gr2ROtt+M5Cv9TcnisW9pbh4LaOaHsSEHads8P9HZjHqza1qXuoGGaQG/bfFM 4I+w==
X-Gm-Message-State: AMCzsaU7sLCt5BuTiiwOSk2uJIiXs1SeR0SxEHwaPlYFjkLkpeKlhgu9 YM1jHyJDd24NRhi+QU5iW7L4AV5w3sRhD2eUcY8=
X-Google-Smtp-Source: ABhQp+Q1raCOgJw23nbHeuZXpjMDKw+OAe92doS78IzdT9qASShRAt+V6Zaa5nY65UY6kxcjXU9bdnCiBVXX5y91yn0=
X-Received: by 10.237.62.153 with SMTP id n25mr10916175qtf.124.1509730482116; Fri, 03 Nov 2017 10:34:42 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.200.40.115 with HTTP; Fri, 3 Nov 2017 10:34:41 -0700 (PDT)
In-Reply-To: <1509703857.2871167.1160341520.3C2D0DC2@webmail.messagingengine.com>
References: <1504117534.496823.1090155768.0E7DA2E2@webmail.messagingengine.com> <CAL0qLwYM_k7gUDWX8=ZNoROj=zFtQuW9pTqvRLtvwSHDEDTNGQ@mail.gmail.com> <1509635194.3915266.1159421104.02964C44@webmail.messagingengine.com> <2853504.Nql0Dy0gKo@kitterma-e6430> <1509703857.2871167.1160341520.3C2D0DC2@webmail.messagingengine.com>
From: "Murray S. Kucherawy" <superuser@gmail.com>
Date: Fri, 03 Nov 2017 10:34:41 -0700
Message-ID: <CAL0qLwZ++QMsoAOzmogKOZ0SnPF4=HsZiYV8ku86pcw1fE3v+g@mail.gmail.com>
To: Alexey Melnikov <aamelnikov@fastmail.fm>
Cc: Scott Kitterman <sklist@kitterman.com>, dcrup@ietf.org
Content-Type: multipart/alternative; boundary="001a113a1f1617dc2c055d178561"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dcrup/9sIZSjT9gQuGAhIfa85VS1EssrA>
Subject: Re: [Dcrup] AD review of draft-ietf-dcrup-dkim-usage-04.txt
X-BeenThere: dcrup@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: DKIM Crypto Update <dcrup.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dcrup>, <mailto:dcrup-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dcrup/>
List-Post: <mailto:dcrup@ietf.org>
List-Help: <mailto:dcrup-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dcrup>, <mailto:dcrup-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 03 Nov 2017 17:34:46 -0000

Scott may not have had to do that before, so just to be sure: The procedure
I've used there is to email internet-drafts@ietf.org with the content as an
attachment(s) and explain that Alexey will be approving it.

On Fri, Nov 3, 2017 at 3:10 AM, Alexey Melnikov <aamelnikov@fastmail.fm>
wrote:

> This looks good to me. Please post a new version.
> If you need to do a manual post (due to pre-Singapore draft submission
> deadline), please request it and I will authorize it.
>
> On Thu, Nov 2, 2017, at 07:18 PM, Scott Kitterman wrote:
> > On Thursday, November 02, 2017 03:06:34 PM Alexey Melnikov wrote:
> > > On Wed, Nov 1, 2017, at 10:45 PM, Murray S. Kucherawy wrote:
> > > > Circling back on this, which is the remaining point:
> > > >
> > > > On Thu, Aug 31, 2017 at 3:58 AM, Alexey Melnikov
> > > > <aamelnikov@fastmail.fm> wrote:>>
> > > >
> > > >> On Thu, Aug 31, 2017, at 01:11 AM, Murray S. Kucherawy wrote:
> > > >>> On Wed, Aug 30, 2017 at 11:33 AM, Alexey Melnikov
> > > >>> <aamelnikov@fastmail.fm> wrote:>>>>
> > > >>>
> > > >>>> On Wed, Aug 30, 2017, at 07:29 PM, Murray S. Kucherawy wrote:
> > > >>>>> The first line in Section 4 already says this updates 3.3 of
> > > >>>>> RFC6376.  You think we need to be more specific?>>>>
> > > >>>>
> > > >>>> As I mentioned: I think sections 3.3.2 and 3.3.4 are still
> > > >>>> relevant. If this document is replacing 3.3 and its subsections,
> > > >>>> some of this is lost.>>>>
> > > >>>> If you really intended to replace 3.3 and its subsections, it
> would
> > > >>>> be worth adding "and its subsections" to the draft.>>>
> > > >>>
> > > >>> The draft says "updates", but you're saying "replaces".  I don't
> see
> > > >>> those as the same thing.  What this document says is to my mind
> > > >>> treated as an overlay, not a replacement; read RFC6376, then read
> > > >>> this for current advice, then act.>>
> > > >>
> > > >> I assume you are replacing the whole sections. If this is not what
> > > >> you are doing, the document is even less clear and need to be
> > > >> clarified.>>
> > > >>
> > > >>> If it's better to say this updates a specific subsection, then
> > > >>> that's also reasonable.  I just thought what we have is
> sufficient.>>
> > > >>
> > > >> Yes, please be specific. I couldn't be certain which sections are
> > > >> still in force and which were updated.>
> > > >
> > > > I propose this, replacing our document's current Section 4:
> > > >
> > > > 4. Update to DKIM Signing and Verification Algorithms
> > > >
> > > >    Section 4.1 updates the text in [RFC6376] Section 3.3.
> > > >
> > > >
> > > >
> > > >    Section 4.2 updates the first paragraph in [RFC6376] Section
> 3.3.3.
> > >
> > > I want some specific text about what happens to sections:
> > >
> > > 3.3.1.  The rsa-sha1 Signing Algorithm
> > > 3.3.2.  The rsa-sha256 Signing Algorithm
> > > 3.3.4.  Other Algorithms
> > >
> > > e.g. "Sections 3.3.1, 3.3.2 and 3.3.4 are not affected" or similar. (Or
> > >      the correct disposition of these sections if what I suggested is
> > >      not correct.
> > >
> > > > 4.1. DKIM Signing and Verification Algorithms  DKIM supports multiple
> > > >
> > > >      digital signature algorithms.  Two algorithms are defined by
> this
> > > >      specification at this time: rsa-sha1 and rsa- sha256.  Signers
> > > >      MUST sign using rsa-sha256.  Verifiers MUST be able to verify
> > > >      using rsa-sha256.  rsa-sha1 MUST NOT be used for signing or
> > > >      verifying.  DKIM signatures signed with historic algorithms
> > > >      (currently rsa-sha1) or with insufficient key sizes (currently
> > > >      rsa-sha256 with less than 1024 bits) have permanently failed
> > > >      evaluation as discussed in  [RFC6376] Section 3.9[1].  4.2. Key
> > > >      Sizes  Selecting appropriate key sizes is a trade-off between
> > > >      cost, performance, and risk.  Since short RSA keys more easily
> > > >      succumb to off-line attacks, Signers MUST use RSA keys of at
> > > >      least 1024 bits for all keys.  Signers SHOULD use RSA keys of at
> > > >      least 2048 bits. Verifiers MUST be able to validate signatures
> > > >      with keys ranging from 1024 bits to 4096 bits, and they MAY be
> > > >      able to validate signatures with larger keys.  Verifier policies
> > > >      can use the length of the signing key as one metric for
> > > >      determining whether a signature is acceptable.  Verifiers MUST
> > > >      NOT consider signatures using RSA keys of less than 1024 bits as
> > > >      valid signatures.
> > > >
> > > > Alexey, would this suffice? -MSK
> > >
> > > Links:
> > >
> > >   1. https://tools.ietf.org/html/rfc6376#section-3.9
> >
> > I added text about 3.3.1, 2, and 4.  See the attached RFC diff.  If that
> > works
> > for you, I'll submit -06 and (hopefully) we can call it done.
>
> _______________________________________________
> Dcrup mailing list
> Dcrup@ietf.org
> https://www.ietf.org/mailman/listinfo/dcrup
>