Re: [Dcrup] AD review of draft-ietf-dcrup-dkim-usage-04.txt

Alexey Melnikov <aamelnikov@fastmail.fm> Fri, 03 November 2017 10:11 UTC

Return-Path: <aamelnikov@fastmail.fm>
X-Original-To: dcrup@ietfa.amsl.com
Delivered-To: dcrup@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 00F9A13FD44 for <dcrup@ietfa.amsl.com>; Fri, 3 Nov 2017 03:11:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.719
X-Spam-Level:
X-Spam-Status: No, score=-2.719 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=fastmail.fm header.b=5arcg/T1; dkim=pass (2048-bit key) header.d=messagingengine.com header.b=oJ1AwtAO
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KVL2U3ggkY3j for <dcrup@ietfa.amsl.com>; Fri, 3 Nov 2017 03:10:58 -0700 (PDT)
Received: from out4-smtp.messagingengine.com (out4-smtp.messagingengine.com [66.111.4.28]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7EFD813FD3E for <dcrup@ietf.org>; Fri, 3 Nov 2017 03:10:58 -0700 (PDT)
Received: from compute7.internal (compute7.nyi.internal [10.202.2.47]) by mailout.nyi.internal (Postfix) with ESMTP id E799020CF4; Fri, 3 Nov 2017 06:10:57 -0400 (EDT)
Received: from web5 ([10.202.2.215]) by compute7.internal (MEProxy); Fri, 03 Nov 2017 06:10:57 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fastmail.fm; h= content-transfer-encoding:content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to:x-me-sender :x-me-sender:x-sasl-enc; s=fm1; bh=1ZGnvAHd9TKxmGIbSQwYS1iFTv6KC 9UZ9rP+LTdQ674=; b=5arcg/T1UAFEdc6Bshi6mQBlGf7VtyQ5O8GLaFDwbqpS5 jae4bjAXNaJyUzvyXmGxCvjS3qtgLXs2ABsWkya+QQREsiWf6anpnpPNXQKJZ7nc aRO4PRDZQ6rvh2dJ0mXneEEyYDpT9zoo2bhCVRgt6c8sDWPARD7l+13EKYgVCJdn +sQUaZFa+ZZ9Dlc4IGr0LtvjyJ+69Q9/r9aiIxfm4IF7hVBUdr1PTn3bLWd9dfv+ mSF8zmn1eUyLzaU2v8X4wzvsKL+fViSlmV0Gz9k07dhL0aK0DF6wofY1EvgM+LFX zTtz9Oc4KqBt5nD6VOqacJkjdG0kW9lXiBKquU5JQ==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=content-transfer-encoding:content-type :date:from:in-reply-to:message-id:mime-version:references :subject:to:x-me-sender:x-me-sender:x-sasl-enc; s=fm1; bh=1ZGnvA Hd9TKxmGIbSQwYS1iFTv6KC9UZ9rP+LTdQ674=; b=oJ1AwtAOOJh3JfSEiHcVQk R4y9Qia3WXJkxaxVbrrCi1FWLwI3KpjPcoJUu3uSTCJKS4rX9WrVGVwY2+noJMTp 4Cbb2Qa8cTs0+Bwq97MkFq8+MRr27AbAuPmeTHTP3Z3/vuirVP7FZfWFB6AyJvD2 wx0uuHsWtR36ykmBJSQCXHE4DwQ0gBDa/GVP5eaqBGUUKwG3u92Sp2wC86EfvSRi n74zreC5M3+d9A+bqSwVqnXN98zUd85FP1fegJ5/Ii1E2F3uH4dxuqNr7awjMzuI lVPy7RWvKY6W4+hxJZWzCoFHADw0PwXTYj4en0Swc23GBrzsxG58coO79bGOLemQ ==
X-ME-Sender: <xms:sUD8WefbVgbacly8XrwDjXSLXJDWnukkNTsFA25Q-48FAZN8dl4BYw>
Received: by mailuser.nyi.internal (Postfix, from userid 99) id C76D09E227; Fri, 3 Nov 2017 06:10:57 -0400 (EDT)
Message-Id: <1509703857.2871167.1160341520.3C2D0DC2@webmail.messagingengine.com>
From: Alexey Melnikov <aamelnikov@fastmail.fm>
To: Scott Kitterman <sklist@kitterman.com>, dcrup@ietf.org
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="utf-8"
X-Mailer: MessagingEngine.com Webmail Interface - ajax-c8a842c4
Date: Fri, 03 Nov 2017 10:10:57 +0000
References: <1504117534.496823.1090155768.0E7DA2E2@webmail.messagingengine.com> <CAL0qLwYM_k7gUDWX8=ZNoROj=zFtQuW9pTqvRLtvwSHDEDTNGQ@mail.gmail.com> <1509635194.3915266.1159421104.02964C44@webmail.messagingengine.com> <2853504.Nql0Dy0gKo@kitterma-e6430>
In-Reply-To: <2853504.Nql0Dy0gKo@kitterma-e6430>
Archived-At: <https://mailarchive.ietf.org/arch/msg/dcrup/uu3e6rg2_cRAjPwg-O3sDUz_PRw>
Subject: Re: [Dcrup] AD review of draft-ietf-dcrup-dkim-usage-04.txt
X-BeenThere: dcrup@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: DKIM Crypto Update <dcrup.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dcrup>, <mailto:dcrup-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dcrup/>
List-Post: <mailto:dcrup@ietf.org>
List-Help: <mailto:dcrup-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dcrup>, <mailto:dcrup-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 03 Nov 2017 10:11:00 -0000

This looks good to me. Please post a new version.
If you need to do a manual post (due to pre-Singapore draft submission
deadline), please request it and I will authorize it.

On Thu, Nov 2, 2017, at 07:18 PM, Scott Kitterman wrote:
> On Thursday, November 02, 2017 03:06:34 PM Alexey Melnikov wrote:
> > On Wed, Nov 1, 2017, at 10:45 PM, Murray S. Kucherawy wrote:
> > > Circling back on this, which is the remaining point:
> > > 
> > > On Thu, Aug 31, 2017 at 3:58 AM, Alexey Melnikov
> > > <aamelnikov@fastmail.fm> wrote:>>
> > > 
> > >> On Thu, Aug 31, 2017, at 01:11 AM, Murray S. Kucherawy wrote:
> > >>> On Wed, Aug 30, 2017 at 11:33 AM, Alexey Melnikov
> > >>> <aamelnikov@fastmail.fm> wrote:>>>>
> > >>> 
> > >>>> On Wed, Aug 30, 2017, at 07:29 PM, Murray S. Kucherawy wrote:
> > >>>>> The first line in Section 4 already says this updates 3.3 of
> > >>>>> RFC6376.  You think we need to be more specific?>>>>
> > >>>> 
> > >>>> As I mentioned: I think sections 3.3.2 and 3.3.4 are still
> > >>>> relevant. If this document is replacing 3.3 and its subsections,
> > >>>> some of this is lost.>>>>
> > >>>> If you really intended to replace 3.3 and its subsections, it would
> > >>>> be worth adding "and its subsections" to the draft.>>>
> > >>> 
> > >>> The draft says "updates", but you're saying "replaces".  I don't see
> > >>> those as the same thing.  What this document says is to my mind
> > >>> treated as an overlay, not a replacement; read RFC6376, then read
> > >>> this for current advice, then act.>>
> > >> 
> > >> I assume you are replacing the whole sections. If this is not what
> > >> you are doing, the document is even less clear and need to be
> > >> clarified.>>
> > >> 
> > >>> If it's better to say this updates a specific subsection, then
> > >>> that's also reasonable.  I just thought what we have is sufficient.>>
> > >> 
> > >> Yes, please be specific. I couldn't be certain which sections are
> > >> still in force and which were updated.>
> > > 
> > > I propose this, replacing our document's current Section 4:
> > > 
> > > 4. Update to DKIM Signing and Verification Algorithms
> > > 
> > >    Section 4.1 updates the text in [RFC6376] Section 3.3.
> > >    
> > >    
> > >    
> > >    Section 4.2 updates the first paragraph in [RFC6376] Section 3.3.3.
> > 
> > I want some specific text about what happens to sections:
> > 
> > 3.3.1.  The rsa-sha1 Signing Algorithm
> > 3.3.2.  The rsa-sha256 Signing Algorithm
> > 3.3.4.  Other Algorithms
> > 
> > e.g. "Sections 3.3.1, 3.3.2 and 3.3.4 are not affected" or similar. (Or
> >      the correct disposition of these sections if what I suggested is
> >      not correct.
> > 
> > > 4.1. DKIM Signing and Verification Algorithms  DKIM supports multiple
> > > 
> > >      digital signature algorithms.  Two algorithms are defined by this
> > >      specification at this time: rsa-sha1 and rsa- sha256.  Signers
> > >      MUST sign using rsa-sha256.  Verifiers MUST be able to verify
> > >      using rsa-sha256.  rsa-sha1 MUST NOT be used for signing or
> > >      verifying.  DKIM signatures signed with historic algorithms
> > >      (currently rsa-sha1) or with insufficient key sizes (currently
> > >      rsa-sha256 with less than 1024 bits) have permanently failed
> > >      evaluation as discussed in  [RFC6376] Section 3.9[1].  4.2. Key
> > >      Sizes  Selecting appropriate key sizes is a trade-off between
> > >      cost, performance, and risk.  Since short RSA keys more easily
> > >      succumb to off-line attacks, Signers MUST use RSA keys of at
> > >      least 1024 bits for all keys.  Signers SHOULD use RSA keys of at
> > >      least 2048 bits. Verifiers MUST be able to validate signatures
> > >      with keys ranging from 1024 bits to 4096 bits, and they MAY be
> > >      able to validate signatures with larger keys.  Verifier policies
> > >      can use the length of the signing key as one metric for
> > >      determining whether a signature is acceptable.  Verifiers MUST
> > >      NOT consider signatures using RSA keys of less than 1024 bits as
> > >      valid signatures.
> > > 
> > > Alexey, would this suffice? -MSK
> > 
> > Links:
> > 
> >   1. https://tools.ietf.org/html/rfc6376#section-3.9
> 
> I added text about 3.3.1, 2, and 4.  See the attached RFC diff.  If that
> works 
> for you, I'll submit -06 and (hopefully) we can call it done.