Re: [dispatch] Proposed charter for DCRUP v0.2

"John Levine" <johnl@taugh.com> Thu, 06 April 2017 23:32 UTC

Return-Path: <johnl@taugh.com>
X-Original-To: dispatch@ietfa.amsl.com
Delivered-To: dispatch@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2B49A1296AC for <dispatch@ietfa.amsl.com>; Thu, 6 Apr 2017 16:32:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Yl8uAt1ow_CQ for <dispatch@ietfa.amsl.com>; Thu, 6 Apr 2017 16:32:42 -0700 (PDT)
Received: from miucha.iecc.com (abusenet-1-pt.tunnel.tserv4.nyc4.ipv6.he.net [IPv6:2001:470:1f06:1126::2]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0C1A81296A5 for <dispatch@ietf.org>; Thu, 6 Apr 2017 16:32:41 -0700 (PDT)
Received: (qmail 28597 invoked from network); 6 Apr 2017 23:32:36 -0000
Received: from unknown (64.57.183.18) by mail1.iecc.com with QMQP; 6 Apr 2017 23:32:36 -0000
Date: Thu, 06 Apr 2017 23:32:14 -0000
Message-ID: <20170406233214.47717.qmail@ary.lan>
From: John Levine <johnl@taugh.com>
To: dispatch@ietf.org
Cc: johnl@taugh.com
In-Reply-To: <20170404161917.37759.qmail@ary.lan>
Organization:
X-Headerized: yes
Mime-Version: 1.0
Content-type: text/plain; charset="utf-8"
Content-transfer-encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/dispatch/_8sEj7bsMxLB-8HOH_mxg96Rufw>
Subject: Re: [dispatch] Proposed charter for DCRUP v0.2
X-BeenThere: dispatch@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: DISPATCH Working Group Mail List <dispatch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dispatch>, <mailto:dispatch-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dispatch/>
List-Post: <mailto:dispatch@ietf.org>
List-Help: <mailto:dispatch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dispatch>, <mailto:dispatch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 06 Apr 2017 23:32:44 -0000

Scott Rose submitted this draft with suggested new algorithms for DCRUP.

--- snippo ---
A New Internet-Draft is available from the on-line Internet-Drafts directories.


        Title           : Defining Elliptic Curve Cryptography Algorithms for use with DKIM
        Author          : Scott Rose
        Filename        : draft-srose-dkim-ecc-00.txt
        Pages           : 6
        Date            : 2017-04-06

Abstract:
   DomainKeys Identified Mail (DKIM) uses digital signature to associate
   a message with a given sending domain.  Currently, there is only one
   cryptography algorithm defined for use with DKIM (RSA).  This
   document defines four new elliptic curve cryptography algorithms for
   use with DKIM.  This will allow for algorithm agility if a weakness
   is found in RSA, and allows for smaller key length to provide the
   same digital signature strength.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-srose-dkim-ecc/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-srose-dkim-ecc-00
https://datatracker.ietf.org/doc/html/draft-srose-dkim-ecc-00


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/
A New Internet-Draft is available from the on-line Internet-Drafts directories.


        Title           : Defining Elliptic Curve Cryptography Algorithms for use with DKIM
        Author          : Scott Rose
        Filename        : draft-srose-dkim-ecc-00.txt
        Pages           : 6
        Date            : 2017-04-06

Abstract:
   DomainKeys Identified Mail (DKIM) uses digital signature to associate
   a message with a given sending domain.  Currently, there is only one
   cryptography algorithm defined for use with DKIM (RSA).  This
   document defines four new elliptic curve cryptography algorithms for
   use with DKIM.  This will allow for algorithm agility if a weakness
   is found in RSA, and allows for smaller key length to provide the
   same digital signature strength.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-srose-dkim-ecc/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-srose-dkim-ecc-00
https://datatracker.ietf.org/doc/html/draft-srose-dkim-ecc-00


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/
A New Internet-Draft is available from the on-line Internet-Drafts directories.


        Title           : Defining Elliptic Curve Cryptography Algorithms for use with DKIM
        Author          : Scott Rose
        Filename        : draft-srose-dkim-ecc-00.txt
        Pages           : 6
        Date            : 2017-04-06

Abstract:
   DomainKeys Identified Mail (DKIM) uses digital signature to associate
   a message with a given sending domain.  Currently, there is only one
   cryptography algorithm defined for use with DKIM (RSA).  This
   document defines four new elliptic curve cryptography algorithms for
   use with DKIM.  This will allow for algorithm agility if a weakness
   is found in RSA, and allows for smaller key length to provide the
   same digital signature strength.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-srose-dkim-ecc/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-srose-dkim-ecc-00
https://datatracker.ietf.org/doc/html/draft-srose-dkim-ecc-00


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/
A New Internet-Draft is available from the on-line Internet-Drafts directories.


        Title           : Defining Elliptic Curve Cryptography Algorithms for use with DKIM
        Author          : Scott Rose
        Filename        : draft-srose-dkim-ecc-00.txt
        Pages           : 6
        Date            : 2017-04-06

Abstract:
   DomainKeys Identified Mail (DKIM) uses digital signature to associate
   a message with a given sending domain.  Currently, there is only one
   cryptography algorithm defined for use with DKIM (RSA).  This
   document defines four new elliptic curve cryptography algorithms for
   use with DKIM.  This will allow for algorithm agility if a weakness
   is found in RSA, and allows for smaller key length to provide the
   same digital signature strength.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-srose-dkim-ecc/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-srose-dkim-ecc-00
https://datatracker.ietf.org/doc/html/draft-srose-dkim-ecc-00


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/
A New Internet-Draft is available from the on-line Internet-Drafts directories.


        Title           : Defining Elliptic Curve Cryptography Algorithms for use with DKIM
        Author          : Scott Rose
        Filename        : draft-srose-dkim-ecc-00.txt
        Pages           : 6
        Date            : 2017-04-06

Abstract:
   DomainKeys Identified Mail (DKIM) uses digital signature to associate
   a message with a given sending domain.  Currently, there is only one
   cryptography algorithm defined for use with DKIM (RSA).  This
   document defines four new elliptic curve cryptography algorithms for
   use with DKIM.  This will allow for algorithm agility if a weakness
   is found in RSA, and allows for smaller key length to provide the
   same digital signature strength.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-srose-dkim-ecc/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-srose-dkim-ecc-00
https://datatracker.ietf.org/doc/html/draft-srose-dkim-ecc-00


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/