Re: [dmarc-ietf] Fwd: New Version Notification for draft-srose-dkim-ecc-00.txt

Scott Rose <scott.rose@nist.gov> Fri, 07 April 2017 12:09 UTC

Return-Path: <scott.rose@nist.gov>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 358B0127342 for <dmarc@ietfa.amsl.com>; Fri, 7 Apr 2017 05:09:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.201
X-Spam-Level:
X-Spam-Status: No, score=-4.201 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6uRmqyAIIJez for <dmarc@ietfa.amsl.com>; Fri, 7 Apr 2017 05:09:38 -0700 (PDT)
Received: from wsget1.nist.gov (wsget1.nist.gov [IPv6:2610:20:6005:13::150]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 66BAC12778D for <dmarc@ietf.org>; Fri, 7 Apr 2017 05:09:38 -0700 (PDT)
Received: from WSGHUB2.xchange.nist.gov (129.6.42.35) by wsget1.nist.gov (129.6.13.150) with Microsoft SMTP Server (TLS) id 14.3.319.2; Fri, 7 Apr 2017 08:09:24 -0400
Received: from postmark.nist.gov (129.6.16.94) by mail-g.nist.gov (129.6.42.33) with Microsoft SMTP Server id 14.3.319.2; Fri, 7 Apr 2017 08:09:36 -0400
Received: from had3.antd.nist.gov ([129.6.141.200]) by postmark.nist.gov (8.13.8/8.13.1) with ESMTP id v37C9Nw3000688; Fri, 7 Apr 2017 08:09:23 -0400
To: Vladimir Dubrovin <dubrovin@corp.mail.ru>, "dmarc@ietf.org" <dmarc@ietf.org>
References: <149149960391.22024.11499305209108527807.idtracker@ietfa.amsl.com> <ac345fcc-ae8e-a92a-0ec3-4792529c865d@nist.gov> <d91de205-05b4-0b59-b3a3-568fc0f57375@corp.mail.ru>
From: Scott Rose <scott.rose@nist.gov>
Message-ID: <6af0bc7b-1ec4-9e87-557b-51d86046842c@nist.gov>
Date: Fri, 07 Apr 2017 08:09:23 -0400
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Thunderbird/45.8.0
MIME-Version: 1.0
In-Reply-To: <d91de205-05b4-0b59-b3a3-568fc0f57375@corp.mail.ru>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 8bit
X-NIST-MailScanner-Information:
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/Z2nLNdUPfZz117Hre1Dms3_NIto>
Subject: Re: [dmarc-ietf] Fwd: New Version Notification for draft-srose-dkim-ecc-00.txt
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 07 Apr 2017 12:09:41 -0000

On 04/06/2017 05:28 PM, Vladimir Dubrovin wrote:

>
> Hello Scott,
>
> it may be good to cover compatibility issues, because otherwise there 
> are little chances to succeed the older but more compatible protocols 
> in nearest future.  The possible (but probably not the best one) 
> solution is:
>
> 1. produce 2 different DKIM-Signatures with 2 different selectors: 
> slector1  with SHA-1 + RSA and selector2 one with SHA-512 + ECDSA
> 2. add an additional field to either selector1 DKIM DNS record (need 
> to consult RFC if it's allowed) or to DKIM-Signature with selector1 
> (it's allowed but probably is not enough to protect against downgrade) 
> to indicate the selector is legacy-only, e.g. o=sha512/eccp256 to 
> indicate this selector should be ignored if verifier supports sha-512 
> and eccp256.
>
> Legacy verifier has valid DKIM-Signature with sha1+rsa
> Compatible verifier ignores sha1+rsa and choose sha-512+ECDSA
>
Something similar was proposed in the DANE WG, but was not included 
because it isn't up to the sender to tell the receiver which algorithms 
to support - the receiver (likely) has its own list of approved or 
preferred algorithms from which to do validation.  Some text could be 
added to the validation section about how validators should select their 
strongest preferred algorithm, etc. but not specify "legacy" algorithms 
unless there is clear consensus to get rid of it for DKIM.

Scott


> I can imagine few more ways to resolve compatibility issues, but this 
> one seems to be a simplest.
>
>
> 06.04.2017 20:32, Scott Rose пишет:
>> This may be of interest to this group, as there isn't an active DKIM 
>> WG anymore.  This is my first attempt to produce a draft about 
>> defining new digital algorithms for DKIM. I'm trying to keep this 
>> short i.e. only define a few IANA registry entries and that's it.
>>
>> I'm trying to head off a potential issue for organizations that are 
>> told to migrate to ECDSA or looking for algorithm agility that 
>> doesn't involve using SHA-1.
>>
>> Comments welcome and needed. Including being told this isn't needed 
>> (though I think it might be).
>>
>> Scott Rose
>>
>> NIST
>>
>>
>>
>> -------- Forwarded Message --------
>> Subject:     New Version Notification for draft-srose-dkim-ecc-00.txt
>> Date:     Thu, 6 Apr 2017 10:26:43 -0700
>> From: internet-drafts@ietf.org
>> To:     Scott Rose <scott.rose@nist.gov>
>>
>>
>>
>> A new version of I-D, draft-srose-dkim-ecc-00.txt
>> has been successfully submitted by Scott Rose and posted to the
>> IETF repository.
>>
>> Name:        draft-srose-dkim-ecc
>> Revision:    00
>> Title:        Defining Elliptic Curve Cryptography Algorithms for use 
>> with DKIM
>> Document date:    2017-04-06
>> Group:        Individual Submission
>> Pages:        6
>> URL: https://www.ietf.org/internet-drafts/draft-srose-dkim-ecc-00.txt
>> Status: https://datatracker.ietf.org/doc/draft-srose-dkim-ecc/
>> Htmlized: https://tools.ietf.org/html/draft-srose-dkim-ecc-00
>> Htmlized: https://datatracker.ietf.org/doc/html/draft-srose-dkim-ecc-00
>>
>>
>> Abstract:
>>    DomainKeys Identified Mail (DKIM) uses digital signature to associate
>>    a message with a given sending domain.  Currently, there is only one
>>    cryptography algorithm defined for use with DKIM (RSA).  This
>>    document defines four new elliptic curve cryptography algorithms for
>>    use with DKIM.  This will allow for algorithm agility if a weakness
>>    is found in RSA, and allows for smaller key length to provide the
>>    same digital signature strength.
>>
>>
>>
>> Please note that it may take a couple of minutes from the time of 
>> submission
>> until the htmlized version and diff are available at tools.ietf.org.
>>
>> The IETF Secretariat
>>
>> _______________________________________________
>> dmarc mailing list
>> dmarc@ietf.org
>> https://www.ietf.org/mailman/listinfo/dmarc
>
>
> -- 
> Vladimir Dubrovin
> @Mail.Ru