Re: [Dcrup] Hashed Key Records
denis bider <denisbider.ietf@gmail.com> Fri, 23 June 2017 13:34 UTC
Return-Path: <denisbider.ietf@gmail.com>
X-Original-To: dcrup@ietfa.amsl.com
Delivered-To: dcrup@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C70D212EAE2 for <dcrup@ietfa.amsl.com>; Fri, 23 Jun 2017 06:34:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level:
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id k7j9cFsvTlHo for <dcrup@ietfa.amsl.com>; Fri, 23 Jun 2017 06:34:29 -0700 (PDT)
Received: from mail-yb0-x22c.google.com (mail-yb0-x22c.google.com [IPv6:2607:f8b0:4002:c09::22c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F0BD9126D45 for <dcrup@ietf.org>; Fri, 23 Jun 2017 06:34:28 -0700 (PDT)
Received: by mail-yb0-x22c.google.com with SMTP id s9so13243539ybe.3 for <dcrup@ietf.org>; Fri, 23 Jun 2017 06:34:28 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=uPSkX4k5x8jPSA92GH+cGge2ERMecD/htvlN7U+yd14=; b=a1X1woDA/iWFPl/E+zqxXHaniH85NeRgW0y2vCPb+cU3Ym2luugvHK2dHogRWxBv3+ FPvjIBztZS50DZCbnMhAX+2ktziyKyJHw5zbRu+cUmdgJK3k2lAz096thq4o2gVm3UBs 6OP72rBQmy8LF5SO2V9zGRtBE1rvwA2amTgPh0YR3DgqHmV8Ew2VQbcXX4Fh67X/Sqrq kTzMvJfYX6X36Rnd7LyCBxlXGynq5qvz0WSSYxwkqkOlI607mmxN1oUaMOycJ/AByque ieeAmlzbltOpVjnjFzoMdN6bqPU98RSNRlGQW64tw115u3L3lLV/+Uzq9hEOFjq/lY0B dBGQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=uPSkX4k5x8jPSA92GH+cGge2ERMecD/htvlN7U+yd14=; b=ERvoKSYIOoGE7Opb1tbF7pNHKBsDN/5IrfAE3Yqna+ELyGrOJUZPpCRX4YUadUzesg //yjxeNByWcvTfIEmVHUyiPLeRmbN9ESjmvEvQq5/fRglYaLM8vGOinzss68QqlccnJT KBWrp+/JmDTa+mynDGhSMYK15zDQ01k5GWWhiEedsXCudtO5/e9LDP7e6287HYgC3W/p 7kUetZIkbnfblsdG0kwKeeuGZlpe6miaxd+j2Ec6LdlIfwhXFli7W4PvWghntzKX+PUk NNtRoA53fk7IG/0cs5K1y8XuUfEaOxnRywLV1rqdhTTxF+/sVLiSz43fhPJeq5EOX2cH NnPg==
X-Gm-Message-State: AKS2vOz4ym0RFTjRp0b7wQ9uKtgZbpl+39WWrTeDAnRx8ClSD2KvBR32 edC6wMyhixWdTCUK6fXz/P5u35h+RQLG
X-Received: by 10.37.125.133 with SMTP id y127mr5858001ybc.238.1498224868102; Fri, 23 Jun 2017 06:34:28 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.37.174.65 with HTTP; Fri, 23 Jun 2017 06:34:27 -0700 (PDT)
In-Reply-To: <CAMm+Lwiu=bkQTmQsaaM6_-_kcPi6DEH3VPnJfB=3jDRtiGSyaQ@mail.gmail.com>
References: <2793611.63lxTaCm4r@kitterma-e6430> <CAMm+Lwiu=bkQTmQsaaM6_-_kcPi6DEH3VPnJfB=3jDRtiGSyaQ@mail.gmail.com>
From: denis bider <denisbider.ietf@gmail.com>
Date: Fri, 23 Jun 2017 07:34:27 -0600
Message-ID: <CADPMZDD+1vG8=sMEPz=-+wwRLSWJTjAV5pLyxsURU5xZH6WKhw@mail.gmail.com>
To: Phillip Hallam-Baker <phill@hallambaker.com>
Cc: Scott Kitterman <sklist@kitterman.com>, dcrup@ietf.org
Content-Type: multipart/alternative; boundary="001a114dc5960e99840552a0a996"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dcrup/A96RA1ZXvUP1TZFMG_Y1mlxN6Ac>
Subject: Re: [Dcrup] Hashed Key Records
X-BeenThere: dcrup@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: DKIM Crypto Update <dcrup.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dcrup>, <mailto:dcrup-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dcrup/>
List-Post: <mailto:dcrup@ietf.org>
List-Help: <mailto:dcrup-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dcrup>, <mailto:dcrup-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 23 Jun 2017 13:34:32 -0000
I propose that the best fingerprint encoding designed so far is the Bubble-Babble encoding by Antti Huima. Example: xedec-nypul-taboz-mugaz-supak-nekyc-bibec-busek-fegon-gekug-loxix It is easy to compare words both visually, and on the phone. Users like it. I found the spec preserved here: http://wiki.yak.net/589/Bubble_Babble_Encoding.txt It was intended to be standardized as part of SSH, but somehow didn't make it to RFC. A number of implementations implemented Bubble Babble, and still have it. However, open source implementations (you know who you are!) went with hexadecimal (MD5) and now Base64 (SHA-256), and now we're stuck with that. If we want to standardize a universal fingerprint format, Base32 is certainly better than either hex or Base64. However, I'd suggest checking out Bubble Babble. denis On Thu, Jun 22, 2017 at 5:44 PM, Phillip Hallam-Baker <phill@hallambaker.com > wrote: > I would really like to get to a point where we could use one fingerprint > format everywhere. This would then allow fingerprints to be cut and pasted > from one place to another. > > When I suggest we do something of this sort, people say 'write a draft'. > Once I write a draft they say I am peddling my proposal. So pretend that I > don't have a draft yet. These are the features I think are needed: > > 1) Use Base32 encoding. > > DNS labels are case insensitive. Using fingerprints in DNS labels is very > powerful. It allows DANE like effects without the need for DANE records or > DNSSEC. > > 2) Incorporate the algorithm identifier into the fingerprint, do so in a > way that ensures a Base32 fingerprint will never be confused with a PGP > fingerprint. > > 3) Include a description of the content type in the target of the > fingerprint. This prevents semantic substitution attacks. > > 4) Allow for optional grouping of characters to encourage readability. > > On Thu, Jun 22, 2017 at 7:17 PM, Scott Kitterman <sklist@kitterman.com> > wrote: > >> It seemed like the hashed RSA variant ought to be easy enough to >> implement, so >> I decided to give it a go. I almost immediately ran into a question. For >> terminology, I'm using what openssl says [1] >> >> I am assuming that "SHA-256 hash of the public key, stored in base64" >> means >> use the output of the digest in binary form (--binary) option and encode >> it in >> base 64. Is that correct? >> >> >> So if my signing key were (I know, but just to make sure I understand the >> tranformations): >> >> 'Hello World' >> >> Then the the p tag in DNS would be: >> >> p=pZGm1Av0IEBKARczz7exkNYsZb8LzaMrV7J32a2fFG4= >> >> Am I understanding it correctly? >> >> A python one liner: >> >> >>> base64.b64encode(hashlib.sha256(b'Hello World').digest()) >> 'pZGm1Av0IEBKARczz7exkNYsZb8LzaMrV7J32a2fFG4=' >> >> Scott K >> >> >> >> [1] https://www.openssl.org/docs/man1.1.0/apps/sha256.html >> >> _______________________________________________ >> Dcrup mailing list >> Dcrup@ietf.org >> https://www.ietf.org/mailman/listinfo/dcrup >> > > > _______________________________________________ > Dcrup mailing list > Dcrup@ietf.org > https://www.ietf.org/mailman/listinfo/dcrup > >
- [Dcrup] Hashed Key Records Scott Kitterman
- Re: [Dcrup] Hashed Key Records Phillip Hallam-Baker
- Re: [Dcrup] Hashed Key Records Steve Atkins
- Re: [Dcrup] Hashed Key Records Phillip Hallam-Baker
- Re: [Dcrup] Hashed Key Records Scott Kitterman
- Re: [Dcrup] Hashed Key Records Phillip Hallam-Baker
- Re: [Dcrup] Hashed Key Records John Levine
- Re: [Dcrup] Hashed Key Records Scott Kitterman
- Re: [Dcrup] Hashed Key Records denis bider
- Re: [Dcrup] Hashed Key Records Salz, Rich
- Re: [Dcrup] Hashed Key Records in draft-ietf-dcru… John Levine
- Re: [Dcrup] Hashed Key Records in draft-ietf-dcru… Salz, Rich
- Re: [Dcrup] Hashed Key Records in draft-ietf-dcru… denis bider