Re: [Dcrup] I-D Action: draft-ietf-dcrup-dkim-usage-00.txt

Scott Kitterman <sklist@kitterman.com> Mon, 05 June 2017 20:35 UTC

Return-Path: <sklist@kitterman.com>
X-Original-To: dcrup@ietfa.amsl.com
Delivered-To: dcrup@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4ED5C12E03C for <dcrup@ietfa.amsl.com>; Mon, 5 Jun 2017 13:35:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.99
X-Spam-Level:
X-Spam-Status: No, score=-1.99 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, T_HTML_ATTACH=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=kitterman.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eRcDICE0Q5Vw for <dcrup@ietfa.amsl.com>; Mon, 5 Jun 2017 13:35:09 -0700 (PDT)
Received: from mailout03.controlledmail.com (mailout03.controlledmail.com [IPv6:2607:f0d0:3001:aa::2]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 93042128D6F for <dcrup@ietf.org>; Mon, 5 Jun 2017 13:35:09 -0700 (PDT)
Received: from kitterma-e6430.localnet (static-72-81-252-22.bltmmd.fios.verizon.net [72.81.252.22]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mailout03.controlledmail.com (Postfix) with ESMTPSA id 9D43DC401BE for <dcrup@ietf.org>; Mon, 5 Jun 2017 15:35:08 -0500 (CDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=kitterman.com; s=201409; t=1496694908; bh=E54FToQ9wsZVD/6nrHX1BaCI4ZHZY1VZPBDw6dHQbCY=; h=From:To:Subject:Date:In-Reply-To:References:From; b=1r44IkAS4fYiD9QwZ48mJjn8PRRSWzEAM2F7wLggFTqEyXdq+7fpreKfWOw5YYzez /GHG+S8EGuKp3rXd3uHcJgI8aaiPJ0UC5mjvve4VKtyJuUhJmm30L5HKTn3V+slWFT atTmVRmu4/wqWus9LCgUFznG2VqULJ1lXvrPV2AI=
From: Scott Kitterman <sklist@kitterman.com>
To: dcrup@ietf.org
Date: Mon, 05 Jun 2017 16:35:08 -0400
Message-ID: <1707162.iKDblKR2ho@kitterma-e6430>
User-Agent: KMail/4.13.3 (Linux/3.13.0-119-generic; KDE/4.13.3; x86_64; ; )
In-Reply-To: <CAL0qLwYOr0iMh2HkyBBUbwBE+4Mz=ZDxyPiHBtzKcFBbNwwSSg@mail.gmail.com>
References: <149619233095.19793.14947085917778354002@ietfa.amsl.com> <1830430.b8hTZcbnc5@kitterma-e6430> <CAL0qLwYOr0iMh2HkyBBUbwBE+4Mz=ZDxyPiHBtzKcFBbNwwSSg@mail.gmail.com>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="nextPart4873468.UmegzGKBkX"
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/dcrup/AQEBM8y_t4j8t3kp1KEnVRPRVlk>
Subject: Re: [Dcrup] I-D Action: draft-ietf-dcrup-dkim-usage-00.txt
X-BeenThere: dcrup@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: DKIM Crypto Update <dcrup.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dcrup>, <mailto:dcrup-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dcrup/>
List-Post: <mailto:dcrup@ietf.org>
List-Help: <mailto:dcrup-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dcrup>, <mailto:dcrup-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 05 Jun 2017 20:35:12 -0000

On Monday, June 05, 2017 01:18:13 PM Murray S. Kucherawy wrote:
> On Mon, Jun 5, 2017 at 9:53 AM, Scott Kitterman <sklist@kitterman.com>
> 
> wrote:
> > I hear you.  I expect this to be the most contentious part of the draft.
> > 
> > Here's my counter argument:
> > 
> > The first DKIM RFC (RFC 4871), published in 2007 said:
> > > Signers MUST implement and SHOULD sign using rsa-sha256
> > 
> > I believe that the only reason rsa-sha1 was included at all was to make
> > transition from domainkeys easier (see RFC 4870).  That's also (as I
> > understand it where the 512 bit minimum key size came from).
> 
> As I recall, there were also implementations of DKIM made during its
> development (even before its IETF time) that supported both, and defaulted
> to rsa-sha1 because support for SHA256 in OpenSSL was new and not
> universally deployed.  Some of them were still running in the wild, and
> SHA1 wasn't fully deprecated, so the choice was made to be inclusive while
> encouraging use of the newer stuff as much as possible.
> 
> > As a working group document editor, I'll change it however the group wants
> > (of
> > course), but I think we should either kill rsa-sha1 entirely in this
> > document
> > or leave it out entirely and let one of the follow-on documents add a new
> > algorithm and remove rsa-sha1.  Preferably a clean kill or, failing that,
> > not
> > at all is what I think we should do.
> 
> I would omit it from the updated version entirely, and mark it "obsolete"
> in the registry.
> 
> -MSK, from the floor

How about this (rfcdiff attached)?

Scott K