Re: [Dcrup] I-D Action: draft-ietf-dcrup-dkim-usage-00.txt

"Rose, Scott" <scott.rose@nist.gov> Fri, 02 June 2017 14:02 UTC

Return-Path: <scott.rose@nist.gov>
X-Original-To: dcrup@ietfa.amsl.com
Delivered-To: dcrup@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8BD4E129521 for <dcrup@ietfa.amsl.com>; Fri, 2 Jun 2017 07:02:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.202
X-Spam-Level:
X-Spam-Status: No, score=-4.202 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hoXXQfmm6sy5 for <dcrup@ietfa.amsl.com>; Fri, 2 Jun 2017 07:02:39 -0700 (PDT)
Received: from wsget2.nist.gov (wsget2.nist.gov [IPv6:2610:20:6005:13::151]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A2699120721 for <dcrup@ietf.org>; Fri, 2 Jun 2017 07:02:39 -0700 (PDT)
Received: from WSGHUB1.xchange.nist.gov (129.6.42.34) by wsget2.nist.gov (129.6.13.151) with Microsoft SMTP Server (TLS) id 14.3.319.2; Fri, 2 Jun 2017 10:02:30 -0400
Received: from postmark.nist.gov (129.6.16.94) by mail-g.nist.gov (129.6.42.33) with Microsoft SMTP Server id 14.3.319.2; Fri, 2 Jun 2017 10:02:36 -0400
Received: from [129.6.140.7] ([129.6.140.7]) by postmark.nist.gov (8.13.8/8.13.1) with ESMTP id v52E2RRw007040 for <dcrup@ietf.org>; Fri, 2 Jun 2017 10:02:27 -0400
From: "Rose, Scott" <scott.rose@nist.gov>
To: dcrup@ietf.org
Date: Fri, 02 Jun 2017 10:02:27 -0400
Message-ID: <C9C2B149-DEFB-4080-8B68-98FE6E32234C@nist.gov>
In-Reply-To: <20170602131534.2266.qmail@ary.lan>
References: <20170602131534.2266.qmail@ary.lan>
MIME-Version: 1.0
Content-Type: text/plain; format="flowed"
X-Mailer: MailMate (1.9.6r5347)
X-NIST-MailScanner-Information:
Archived-At: <https://mailarchive.ietf.org/arch/msg/dcrup/mV1_03d404B60o6Kp_7uIHxHsrI>
Subject: Re: [Dcrup] I-D Action: draft-ietf-dcrup-dkim-usage-00.txt
X-BeenThere: dcrup@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: DKIM Crypto Update <dcrup.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dcrup>, <mailto:dcrup-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dcrup/>
List-Post: <mailto:dcrup@ietf.org>
List-Help: <mailto:dcrup-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dcrup>, <mailto:dcrup-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 02 Jun 2017 14:02:41 -0000

Some communities have a larger security policy on algorithms, key 
lengths, etc. that they are compelled to comply to rather than 
per-protocol recommendations. Usually admins follow it out of routine or 
simply to keep auditors from complaining.  Listing what a validator MUST 
be able to support is good, but dictating what a sender MUST use might 
lead to issues.

I agree on only adding 1 (two at most) algorithms to DKIM.  Too many 
algorithms leads to confusion among implementors and deployments as to 
what is the recommended algorithm.  DNSSEC is facing this now and there 
are now several drafts about which algorithms should be mandatory, which 
should be retired, etc.

Scott


On 2 Jun 2017, at 9:15, John Levine wrote:

> In article 
> <CABkgnnX2uQkKiRWgBknXqn6Ho_yP2twcDzS8adsh8RoVWianig@mail.gmail.com> 
> you write:
>> TLS does this for cipher suites.  The policy there is to allow
>> registration of entries with a low bar, but to require a higher bar
>> (Standards Track) for entries that mark the entry as "recommended".
>
> TLS does cipher negotiation, DKIM doesn't, because TLS has a two-way
> path between sender and recipient.  That means that adding new
> algorithm to DKIM is hard and slow, because signers can't use them
> (other than in parallel with older algorithms) until a sufficient
> number of verifiers implement them.  That's why my draft adds one (1)
> new algorithm that is intended to be good enough to last for a long
> time.  The current draft may not have the best algo for that goal, but
> that's why it's still a draft.
>
> I'm also somewhat sceptical of outsourcing key strength advice.  You
> don't pick key strengths in a vacuum and DKIM is in an odd place with
> signatures that last for a week, not a few seconds like in TLS or
> years like S/MIME or PGP signatures.  Writing a new RFC that updates
> key strength advice needn't be hard unless we make it hard.
>
> R's,
> John
>
> _______________________________________________
> Dcrup mailing list
> Dcrup@ietf.org
> https://www.ietf.org/mailman/listinfo/dcrup


===================================
Scott Rose
NIST ITL
scott.rose@nist.gov
+1-301-975-8439
GV: +1-571-249-3671
===================================