Re: [Dcrup] sequence of drafts, draft-ietf-dcrup-dkim-usage and document shepherds

Scott Kitterman <sklist@kitterman.com> Sat, 10 June 2017 17:44 UTC

Return-Path: <sklist@kitterman.com>
X-Original-To: dcrup@ietfa.amsl.com
Delivered-To: dcrup@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3D6F71270A3 for <dcrup@ietfa.amsl.com>; Sat, 10 Jun 2017 10:44:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.002
X-Spam-Level:
X-Spam-Status: No, score=-2.002 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=kitterman.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id L4b02O0Hz7ye for <dcrup@ietfa.amsl.com>; Sat, 10 Jun 2017 10:44:39 -0700 (PDT)
Received: from mailout03.controlledmail.com (mailout03.controlledmail.com [IPv6:2607:f0d0:3001:aa::2]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 43C44126DC2 for <dcrup@ietf.org>; Sat, 10 Jun 2017 10:44:39 -0700 (PDT)
Received: from android-df929938bd25e485.home.kitterman.com (static-72-81-252-22.bltmmd.fios.verizon.net [72.81.252.22]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mailout03.controlledmail.com (Postfix) with ESMTPSA id D70D4C403A4; Sat, 10 Jun 2017 12:44:37 -0500 (CDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=kitterman.com; s=201409; t=1497116677; bh=+KfNaz3SBXJTydwgzHbK08Ny9BlzmGT5GEC7+os1plE=; h=Date:In-Reply-To:References:Subject:To:From:From; b=XbFt8uk5SodoH2O02haGef6Kt29RLAmsKkI4ib4Jnmw+1KHmdMpTFyT+rI0wMR5C0 ZdYVpeXER8KtjOU1lOp4vKX9i7YRZ0xQjHiGyqRhXYVfTHUFH/03fazxrcs63Qx1pA U260dgb+8Hy2VY8Wu5A1PgYCcZCJX11vEbt6Bh3c=
Date: Sat, 10 Jun 2017 17:44:34 +0000
In-Reply-To: <alpine.OSX.2.21.1706100940170.16076@ary.qy>
References: <20170610030400.12835.qmail@ary.lan> <DE201939-EA16-4957-B160-2B45B3BA60C1@kitterman.com> <alpine.OSX.2.21.1706100940170.16076@ary.qy>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
To: dcrup@ietf.org
From: Scott Kitterman <sklist@kitterman.com>
Message-ID: <33024B2C-DBF1-44DC-A18E-973D4C8ACD12@kitterman.com>
Archived-At: <https://mailarchive.ietf.org/arch/msg/dcrup/NswmtN1l1awgTGNaC5RNFudiW9k>
Subject: Re: [Dcrup] sequence of drafts, draft-ietf-dcrup-dkim-usage and document shepherds
X-BeenThere: dcrup@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: DKIM Crypto Update <dcrup.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dcrup>, <mailto:dcrup-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dcrup/>
List-Post: <mailto:dcrup@ietf.org>
List-Help: <mailto:dcrup-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dcrup>, <mailto:dcrup-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 10 Jun 2017 17:44:41 -0000


On June 10, 2017 9:42:25 AM EDT, "John R. Levine" <johnl@iecc.com> wrote:
>> If we don't get something that rips out the obsolete crypto soon,
>then 
>> ARC is either going to have to wait or have a separate crypto 
>> specification from DKIM.  I don't see a new protocol with rsa-sha1
>512 
>> bits getting approved.  Neither of those options is good.
>
>I'm not clear on what sequence you're expecting here.  Is this it?
>
>* Update DKIM to take out old crypto
>
>* Publish ARC with only sha256 and RSA1024.
>
>* Update DKIM to add new algorithm and maybe key hashes
>
>* What about ARC?
>
>I'm seeing at least four documents where we should only need two, one
>to 
>update DKIM, one to publish ARC with the same crypto.

Ideally, ARC will be able to use DKIM's crypto requirements by reference and not need its own separate definition.  If ARC can do that, then it doesn't need to be modified once this WG completes.

Today's DKIM crypto requirements are completely unsuitable and would (I hope) never get IETF consensus for a new protocol.  Getting from "unsuitable" to "suitable for today, but not future proofed" is easy.  That's what my draft does.  It's the minimal change needed to avoid ARC having to specify its own crypto requirements, which is what prompted, finally, this working group.

Eventually the working group lands another document that defines the post rsa-sha256 future as an update to DKIM.  Since ARC will incorporate the DKIM crypto requirements by reference, it won't need updating again.

So I see two documents from this WG:

 - one now to get DKIM crypto requirements to be minimally acceptable for today's use
- another to define requirements to be secure in the future so that someday, when it's no longer appropriate, rsa-sha256 can be replaced

Alternately, as you suggest, we land one document that does both.  I thought we made that decision when we adopted this document, so I don't know why we're having the conversation again now.  If we were going to land only one, then we don't need this document at all.

I think you are substantially underestimating the time it will take to get IETF consensus on a new approach based on ECC.  I think if it's done in a year, that'll be fast.

I think I'm done on this particular topic.  

Scott K