Re: [Dcrup] draft-ietf-dcrup-dkim-usage and document shepherds

Scott Kitterman <sklist@kitterman.com> Mon, 12 June 2017 14:29 UTC

Return-Path: <sklist@kitterman.com>
X-Original-To: dcrup@ietfa.amsl.com
Delivered-To: dcrup@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 23DAC1293E0 for <dcrup@ietfa.amsl.com>; Mon, 12 Jun 2017 07:29:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.002
X-Spam-Level:
X-Spam-Status: No, score=-2.002 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=kitterman.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sX2O7GohhXYj for <dcrup@ietfa.amsl.com>; Mon, 12 Jun 2017 07:29:09 -0700 (PDT)
Received: from mailout03.controlledmail.com (mailout03.controlledmail.com [208.43.65.50]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F19F3124D68 for <dcrup@ietf.org>; Mon, 12 Jun 2017 07:29:08 -0700 (PDT)
Received: from kitterma-e6430.localnet (static-72-81-252-22.bltmmd.fios.verizon.net [72.81.252.22]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mailout03.controlledmail.com (Postfix) with ESMTPSA id B38E8C40236 for <dcrup@ietf.org>; Mon, 12 Jun 2017 09:29:07 -0500 (CDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=kitterman.com; s=201409; t=1497277747; bh=+lWxMvfBp6LYSdViBZr7cxSMW2d47B1J1gQ3cZnJVHw=; h=From:To:Subject:Date:In-Reply-To:References:From; b=w+7WRKNXulzJbkHXYd+pZwOncfxtKP8pJ4oU25zBhtgItY2le8EBDSdR1EP3YEM4j ARDo0SLBsq77v+6tD2Rn2YMfdZvdo/s2gqNP35W5bMt2vkB4AQqJe2mU6CouVfO4TH Ng1Cn2y1KQkV7F2406anAzxeZ4bXFDhp1WZvEpBI=
From: Scott Kitterman <sklist@kitterman.com>
To: dcrup@ietf.org
Date: Mon, 12 Jun 2017 10:29:07 -0400
Message-ID: <4379310.8G0EpGEsGj@kitterma-e6430>
User-Agent: KMail/4.13.3 (Linux/3.13.0-119-generic; KDE/4.13.3; x86_64; ; )
In-Reply-To: <CAL0qLwY4yFGbBXHw=YXgLgok1uzWm4s2TQ2GSBak_cDn4KsOBA@mail.gmail.com>
References: <20170610002538.10992.qmail@ary.lan> <2034638.szbv6KSWyz@kitterma-e6430> <CAL0qLwY4yFGbBXHw=YXgLgok1uzWm4s2TQ2GSBak_cDn4KsOBA@mail.gmail.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dcrup/cGO7A_Bceuxk3N69HNLNI9r5Pak>
Subject: Re: [Dcrup] draft-ietf-dcrup-dkim-usage and document shepherds
X-BeenThere: dcrup@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: DKIM Crypto Update <dcrup.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dcrup>, <mailto:dcrup-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dcrup/>
List-Post: <mailto:dcrup@ietf.org>
List-Help: <mailto:dcrup-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dcrup>, <mailto:dcrup-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 12 Jun 2017 14:29:13 -0000

On Monday, June 12, 2017 12:23:16 AM Murray S. Kucherawy wrote:
> On Sun, Jun 11, 2017 at 9:38 PM, Scott Kitterman <sklist@kitterman.com>
> 
> wrote:
> > The IETF is five years late with action on this front.  At least.
> > Whatever is
> > happening in this working group, hurrying isn't on the list.
> 
> Then I don't understand why this thread seems to be so tense with
> frustration.

I think getting rid of sha1 and keys < 1024 bits should be really easy.  

I THOUGHT we had all agreed to get that done and out of the way.  In the space 
of two days we went from "OK, almost done" to "Here's three different visions 
for how the draft should be written that all say the same thing" or maybe 
don't bother.  That's frustrating.

I find the notion that it's not an interoperability problem for signers to 
sign with keys that receivers will ignore frustrating.

> > I have no idea what should be in this draft or if it should even exist
> > anymore.
> 
> I really don't think the proposed changes are all that major here.

If I knew which of the three approaches to take, then I could  pick one and 
write it:

1.  Fully replace section 3.3 explicitly saying MUST rsa-sha256 and MUST NOT 
rsa-sha1 (my personal preference)

2.  Fully replace section 3.3 dropping rsa-sha1 and just giving the new 
requirements (possibly with an appendix that says MUST NOT rsa-sha1)

3.  Make the draft a lot shorter and only state updated requirements.  Also 
don't remove rsa-sha1 [1]

As a maintainer of an implementation of RFC 4871 and its updates (e.g. RFC 
6376) and its updates, I strongly prefer option #1.  That structure makes it 
very easy to see what needs changing when I update the code.  

Using the approach in option 2 I need to either mentally diff RFC 6376 and the 
new document (or if we add it look at the main body of the text and an 
appendix) to determine what to do.  It's less clear.

Option 3 makes the entire document a no-op.  It both fails to remove rsa-sha1 
and offers no guidance on key sizes.  The one new thing it says (compared to 
RFC 6376 is "Verifiers MUST NOT rely on the rsa-sha1 algorithm".  What does 
that even mean?  Since rsa-sha1 is not removed from the ABNF, it's still a 
required part of the protocol.  Once we add an ECC algorithm are all three 
going to be required?

I would like to know what the group prefers.  I'll do whatever, but I really 
have no idea what that is.  If option 4 is kill the document, my ranking would 
be:

1
2
4
3

> > I also really don't understand why we have a discussion about if a draft
> > should be adopted before a WG adopts it if we just get to re-have the same
> > discussion periodically.
> 
> You think working groups should not be allowed to revisit their choices?

You think working groups should have a bi-weekly periodic on revisiting 
choices?  Of course choices can be revisited, but if decisions aren't at all 
sticky, then there's no way to make progress.

Scott K

[1] https://github.com/kitterma/draft-ietf-dcrup-dkim-usage/pull/1/commits/b7815a3b876c5b57f7eff4537ed0c0e9eef497a8