[dmarc-ietf] Fwd: New Version Notification for draft-srose-dkim-ecc-00.txt

Scott Rose <scott.rose@nist.gov> Thu, 06 April 2017 17:32 UTC

Return-Path: <scott.rose@nist.gov>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C4A4312957D for <dmarc@ietfa.amsl.com>; Thu, 6 Apr 2017 10:32:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.201
X-Spam-Level:
X-Spam-Status: No, score=-4.201 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eisj2A-z1Dvy for <dmarc@ietfa.amsl.com>; Thu, 6 Apr 2017 10:32:39 -0700 (PDT)
Received: from wsget1.nist.gov (wsget1.nist.gov [IPv6:2610:20:6005:13::150]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B98C21295EA for <dmarc@ietf.org>; Thu, 6 Apr 2017 10:32:38 -0700 (PDT)
Received: from WSGHUB2.xchange.nist.gov (129.6.42.35) by wsget1.nist.gov (129.6.13.150) with Microsoft SMTP Server (TLS) id 14.3.319.2; Thu, 6 Apr 2017 13:32:25 -0400
Received: from postmark.nist.gov (129.6.16.94) by mail-g.nist.gov (129.6.42.33) with Microsoft SMTP Server id 14.3.319.2; Thu, 6 Apr 2017 13:32:36 -0400
Received: from had3.antd.nist.gov ([129.6.141.200]) by postmark.nist.gov (8.13.8/8.13.1) with ESMTP id v36HWR1s017354 for <dmarc@ietf.org>; Thu, 6 Apr 2017 13:32:27 -0400
References: <149149960391.22024.11499305209108527807.idtracker@ietfa.amsl.com>
To: dmarc@ietf.org
From: Scott Rose <scott.rose@nist.gov>
X-Forwarded-Message-Id: <149149960391.22024.11499305209108527807.idtracker@ietfa.amsl.com>
Message-ID: <ac345fcc-ae8e-a92a-0ec3-4792529c865d@nist.gov>
Date: Thu, 06 Apr 2017 13:32:27 -0400
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Thunderbird/45.8.0
MIME-Version: 1.0
In-Reply-To: <149149960391.22024.11499305209108527807.idtracker@ietfa.amsl.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 7bit
X-NIST-MailScanner-Information:
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/mlrXanycbPWw8e7AGRVBJM2E-Ts>
Subject: [dmarc-ietf] Fwd: New Version Notification for draft-srose-dkim-ecc-00.txt
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 06 Apr 2017 17:32:42 -0000

This may be of interest to this group, as there isn't an active DKIM WG 
anymore.  This is my first attempt to produce a draft about defining new 
digital algorithms for DKIM.  I'm trying to keep this short i.e. only 
define a few IANA registry entries and that's it.

I'm trying to head off a potential issue for organizations that are told 
to migrate to ECDSA or looking for algorithm agility that doesn't 
involve using SHA-1.

Comments welcome and needed. Including being told this isn't needed 
(though I think it might be).

Scott Rose

NIST



-------- Forwarded Message --------
Subject: 	New Version Notification for draft-srose-dkim-ecc-00.txt
Date: 	Thu, 6 Apr 2017 10:26:43 -0700
From: 	internet-drafts@ietf.org
To: 	Scott Rose <scott.rose@nist.gov>



A new version of I-D, draft-srose-dkim-ecc-00.txt
has been successfully submitted by Scott Rose and posted to the
IETF repository.

Name:		draft-srose-dkim-ecc
Revision:	00
Title:		Defining Elliptic Curve Cryptography Algorithms for use with DKIM
Document date:	2017-04-06
Group:		Individual Submission
Pages:		6
URL:            https://www.ietf.org/internet-drafts/draft-srose-dkim-ecc-00.txt
Status:         https://datatracker.ietf.org/doc/draft-srose-dkim-ecc/
Htmlized:       https://tools.ietf.org/html/draft-srose-dkim-ecc-00
Htmlized:       https://datatracker.ietf.org/doc/html/draft-srose-dkim-ecc-00


Abstract:
    DomainKeys Identified Mail (DKIM) uses digital signature to associate
    a message with a given sending domain.  Currently, there is only one
    cryptography algorithm defined for use with DKIM (RSA).  This
    document defines four new elliptic curve cryptography algorithms for
    use with DKIM.  This will allow for algorithm agility if a weakness
    is found in RSA, and allows for smaller key length to provide the
    same digital signature strength.

                                                                                   


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

The IETF Secretariat