Re: [dmarc-ietf] Fwd: New Version Notification for draft-srose-dkim-ecc-00.txt

"John R Levine" <johnl@taugh.com> Sat, 08 April 2017 12:45 UTC

Return-Path: <johnl@taugh.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4B888128CDC for <dmarc@ietfa.amsl.com>; Sat, 8 Apr 2017 05:45:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.101
X-Spam-Level:
X-Spam-Status: No, score=-0.101 tagged_above=-999 required=5 tests=[DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1536-bit key) header.d=iecc.com header.b=O90b4hho; dkim=pass (1536-bit key) header.d=taugh.com header.b=ivUEdRiG
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id y1_47QqbD3Ik for <dmarc@ietfa.amsl.com>; Sat, 8 Apr 2017 05:45:06 -0700 (PDT)
Received: from miucha.iecc.com (abusenet-1-pt.tunnel.tserv4.nyc4.ipv6.he.net [IPv6:2001:470:1f06:1126::2]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 96D08128BB6 for <dmarc@ietf.org>; Sat, 8 Apr 2017 05:45:06 -0700 (PDT)
Received: (qmail 95087 invoked from network); 8 Apr 2017 12:45:05 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=iecc.com; h=date:message-id:from:to:cc:subject:in-reply-to:references:mime-version:content-type:user-agent; s=1736d.58e8db51.k1704; bh=Z/6KWdI9EIowEqX+OR/sm1nzwlvL9uF5HlyCf4mABvs=; b=O90b4hhoDKpQSpeTeRKtngsiOSqgMISYYM9U/vGUjt50/u51ZPQ2/OZKBtPGk6rwdFRf2w5tyNu57Q9Hze+LAueti5T8zMCDP1BcvsMIBQ3gO7c95xVaZNE4c9s43XmZngM9SyBua3L8z6abUs6stV1tvIYn0Y71KB7DtvxNfCO/zvX9WzxH4ysd1OMwJB8jAKQ1S8tKPCT9HjOf++D8u4NjOhS2jxnh+sKto6Ekpry8XX34K5WoYwPps/Iz7IhJ
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=taugh.com; h=date:message-id:from:to:cc:subject:in-reply-to:references:mime-version:content-type:user-agent; s=1736d.58e8db51.k1704; bh=Z/6KWdI9EIowEqX+OR/sm1nzwlvL9uF5HlyCf4mABvs=; b=ivUEdRiGPa7jAqP+B5r4qZHc/2uY8OKhuD5zyrDiXSYkgzxsJgaHDnefIlDh9AVMujTcMz44E3LiDnExTs4qqMauAa1yxQLX4pBoIvGX79hG+mNJermvgOFV75NLVObuNhFfk3d4s7gceopDFv3f23pHlnCxjLXJBjuMsdq8GCwb2Xk8xoJK579dfj46rmb/t1a7hrDhOwG1Cvh0Y4eU3mqybktxvov266lIuDHU2ANhbww6bUoAJSoD5M0JDVYU
Received: from localhost ([IPv6:2001:470:1f07:1126::78:696d:6170]) by imap.iecc.com ([IPv6:2001:470:1f07:1126::78:696d:6170]) with ESMTPS (TLS1.2/X.509/AEAD) via TCP6; 08 Apr 2017 12:45:05 -0000
Date: Sat, 08 Apr 2017 08:45:04 -0400
Message-ID: <alpine.OSX.2.20.1704071004500.55219@ary.qy>
From: John R Levine <johnl@taugh.com>
To: Vladimir Dubrovin <dubrovin@corp.mail.ru>
Cc: dmarc@ietf.org
In-Reply-To: <1491556016.525223113@f391.i.mail.ru>
References: <d91de205-05b4-0b59-b3a3-568fc0f57375@corp.mail.ru> <20170406235815.47843.qmail@ary.lan> <1491556016.525223113@f391.i.mail.ru>
User-Agent: Alpine 2.20 (OSX 67 2015-01-07)
MIME-Version: 1.0
Content-Type: text/plain; format="flowed"; charset="US-ASCII"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/t5FWMEyvvSY66O0jme-F1CeMbpM>
Subject: Re: [dmarc-ietf] Fwd: New Version Notification for draft-srose-dkim-ecc-00.txt
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 08 Apr 2017 12:45:08 -0000

> Without marking the published key as obsolete, downgrade attack is 
> possible, because attacker can still use a weaker key to spoof 
> signature.

If you know how to spoof a sha256/rsa1024 signature, I know a lot of 
people who would like to talk to you.

Other than that, please review RFC 6376.  Each signing algorithm has a 
separate key -- if you don't trust an algorithm, don't publish a key for 
it.

R's,
John

>
>>> 1. produce 2 different DKIM-Signatures with 2 different selectors:
>>> slector1  with SHA-1 + RSA and selector2 one with  SHA-512 + ECDSA
>>
>> Of course.
>>
>>> 2. add an additional field to either selector1 DKIM DNS record (need to
>>> consult RFC if it's allowed) or to DKIM-Signature with selector1 (it's
>>> allowed but probably is not enough to protect against downgrade) to
>>> indicate the selector is legacy-only, e.g. o=sha512/eccp256 to indicate
>>> this selector should be ignored if verifier supports sha-512 and eccp256.
>>
>> No.  If the verifier is smart enough to understand new algorithms, it
>> is smart enough to figure out which signature to prefer.  Also keep in
>> mind that the legacy crypto is sha256/rsa1024 which is plenty strong
>> for the forseeable future.