Re: [dmarc-ietf] Fwd: New Version Notification for draft-srose-dkim-ecc-00.txt

Vladimir Dubrovin <dubrovin@corp.mail.ru> Fri, 07 April 2017 14:24 UTC

Return-Path: <dubrovin@corp.mail.ru>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2706D124B0A for <dmarc@ietfa.amsl.com>; Fri, 7 Apr 2017 07:24:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=corp.mail.ru
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9QwpC2hHWI5D for <dmarc@ietfa.amsl.com>; Fri, 7 Apr 2017 07:24:10 -0700 (PDT)
Received: from smtp58.i.mail.ru (smtp58.i.mail.ru [217.69.128.38]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A05E5120227 for <dmarc@ietf.org>; Fri, 7 Apr 2017 07:24:09 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=corp.mail.ru; s=mail; h=Content-Type:In-Reply-To:MIME-Version:Date:Message-ID:From:References:To:Subject; bh=Md0A/KSk4CbI7XZ/s8mUe9iLmQg8ERgA6EAN2fSWQCM=; b=sAknM+OT5EaaQcuzroUwtCp0zR5wr2AFkPhP1Ux4B/kUOhB28mAkmF6vyPjftfDNni4ABdb6RH8HSSSG7Gs0eugnkBfAaOEFxdRMzAYi2YTVEH9+eXTjWtAAcsF3DyKC0+og8da08/3LWYfrkSvRMfnQAGGpLB0iyUxP/4rNAlk=;
Received: from [178.22.89.88] (port=23194 helo=[127.0.0.1]) by smtp58.i.mail.ru with esmtpa (envelope-from <dubrovin@corp.mail.ru>) id 1cwUo3-0002zd-32; Fri, 07 Apr 2017 17:24:07 +0300
To: Scott Rose <scott.rose@nist.gov>, "dmarc@ietf.org" <dmarc@ietf.org>
References: <149149960391.22024.11499305209108527807.idtracker@ietfa.amsl.com> <ac345fcc-ae8e-a92a-0ec3-4792529c865d@nist.gov> <d91de205-05b4-0b59-b3a3-568fc0f57375@corp.mail.ru> <6af0bc7b-1ec4-9e87-557b-51d86046842c@nist.gov>
From: Vladimir Dubrovin <dubrovin@corp.mail.ru>
Message-ID: <c0abcdbe-b8a8-707e-3a54-d0c9f2433b90@corp.mail.ru>
Date: Fri, 07 Apr 2017 17:24:03 +0300
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:45.0) Gecko/20100101 Thunderbird/45.8.0
MIME-Version: 1.0
In-Reply-To: <6af0bc7b-1ec4-9e87-557b-51d86046842c@nist.gov>
Content-Type: multipart/alternative; boundary="------------8E84B5498839DCAD3FC753D7"
Authentication-Results: smtp58.i.mail.ru; auth=pass smtp.auth=dubrovin@corp.mail.ru smtp.mailfrom=dubrovin@corp.mail.ru
X-Mras: Ok
X-SRW: 606F30325CFA050C8C380D4BBEABEE3039BC097A4E62EBC3F1C0548A3F644CCC
X-Mru-Trust-IP: 1
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/PGk4faqiMcSV0nNUKeztMGu49XM>
Subject: Re: [dmarc-ietf] Fwd: New Version Notification for draft-srose-dkim-ecc-00.txt
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 07 Apr 2017 14:24:14 -0000

And again: the problem here is not in the signature, it's in key
published. If you publish both weak  and strong keys, attacker doesn't
need to exploit the stronger key, he can exploit weak key, it doesn't
matter if you use the strong one if the weak key is also valid. Attacker
will generate single DKIM-Signature by using the comproised weak key.
The fact you are ussing the strong one adds nothing to security in this
case. There is no way for you to indicate you use the stronger one
unless you indicate it with the key itself. So, if you keep the weak key
published for compatibility, somehow you must indicate you are using it
for compatibility purposes only to prevent verifiers from acepting the
messages signed with weak key only if it's not accomplished by a
stronger signature.


07.04.2017 15:09, Scott Rose пишет:
> On 04/06/2017 05:28 PM, Vladimir Dubrovin wrote:
>
>>
>> Hello Scott,
>>
>> it may be good to cover compatibility issues, because otherwise there
>> are little chances to succeed the older but more compatible protocols
>> in nearest future.  The possible (but probably not the best one)
>> solution is:
>>
>> 1. produce 2 different DKIM-Signatures with 2 different selectors:
>> slector1  with SHA-1 + RSA and selector2 one with SHA-512 + ECDSA
>> 2. add an additional field to either selector1 DKIM DNS record (need
>> to consult RFC if it's allowed) or to DKIM-Signature with selector1
>> (it's allowed but probably is not enough to protect against
>> downgrade) to indicate the selector is legacy-only, e.g.
>> o=sha512/eccp256 to indicate this selector should be ignored if
>> verifier supports sha-512 and eccp256.
>>
>> Legacy verifier has valid DKIM-Signature with sha1+rsa
>> Compatible verifier ignores sha1+rsa and choose sha-512+ECDSA
>>
> Something similar was proposed in the DANE WG, but was not included
> because it isn't up to the sender to tell the receiver which
> algorithms to support - the receiver (likely) has its own list of
> approved or preferred algorithms from which to do validation.  Some
> text could be added to the validation section about how validators
> should select their strongest preferred algorithm, etc. but not
> specify "legacy" algorithms unless there is clear consensus to get rid
> of it for DKIM.
>
> Scott
>
>
>> I can imagine few more ways to resolve compatibility issues, but this
>> one seems to be a simplest.
>>
>>
>> 06.04.2017 20:32, Scott Rose пишет:
>>> This may be of interest to this group, as there isn't an active DKIM
>>> WG anymore.  This is my first attempt to produce a draft about
>>> defining new digital algorithms for DKIM. I'm trying to keep this
>>> short i.e. only define a few IANA registry entries and that's it.
>>>
>>> I'm trying to head off a potential issue for organizations that are
>>> told to migrate to ECDSA or looking for algorithm agility that
>>> doesn't involve using SHA-1.
>>>
>>> Comments welcome and needed. Including being told this isn't needed
>>> (though I think it might be).
>>>
>>> Scott Rose
>>>
>>> NIST
>>>
>>>
>>>
>>> -------- Forwarded Message --------
>>> Subject:     New Version Notification for draft-srose-dkim-ecc-00.txt
>>> Date:     Thu, 6 Apr 2017 10:26:43 -0700
>>> From: internet-drafts@ietf.org
>>> To:     Scott Rose <scott.rose@nist.gov>
>>>
>>>
>>>
>>> A new version of I-D, draft-srose-dkim-ecc-00.txt
>>> has been successfully submitted by Scott Rose and posted to the
>>> IETF repository.
>>>
>>> Name:        draft-srose-dkim-ecc
>>> Revision:    00
>>> Title:        Defining Elliptic Curve Cryptography Algorithms for
>>> use with DKIM
>>> Document date:    2017-04-06
>>> Group:        Individual Submission
>>> Pages:        6
>>> URL: https://www.ietf.org/internet-drafts/draft-srose-dkim-ecc-00.txt
>>> Status: https://datatracker.ietf.org/doc/draft-srose-dkim-ecc/
>>> Htmlized: https://tools.ietf.org/html/draft-srose-dkim-ecc-00
>>> Htmlized: https://datatracker.ietf.org/doc/html/draft-srose-dkim-ecc-00
>>>
>>>
>>> Abstract:
>>>    DomainKeys Identified Mail (DKIM) uses digital signature to
>>> associate
>>>    a message with a given sending domain.  Currently, there is only one
>>>    cryptography algorithm defined for use with DKIM (RSA).  This
>>>    document defines four new elliptic curve cryptography algorithms for
>>>    use with DKIM.  This will allow for algorithm agility if a weakness
>>>    is found in RSA, and allows for smaller key length to provide the
>>>    same digital signature strength.
>>>
>>>
>>>
>>> Please note that it may take a couple of minutes from the time of
>>> submission
>>> until the htmlized version and diff are available at tools.ietf.org.
>>>
>>> The IETF Secretariat
>>>
>>> _______________________________________________
>>> dmarc mailing list
>>> dmarc@ietf.org
>>> https://www.ietf.org/mailman/listinfo/dmarc
>>
>>
>> -- 
>> Vladimir Dubrovin
>> @Mail.Ru
>
> _______________________________________________
> dmarc mailing list
> dmarc@ietf.org
> https://www.ietf.org/mailman/listinfo/dmarc


-- 
Vladimir Dubrovin
@Mail.Ru