Re: [dns-dir] some comments on draft-os-ietf-sshfp-ecdsa-sha2-04.txt

Ralph Droms <rdroms.ietf@gmail.com> Wed, 15 February 2012 20:21 UTC

Return-Path: <rdroms.ietf@gmail.com>
X-Original-To: dns-dir@ietfa.amsl.com
Delivered-To: dns-dir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C587F21E808E for <dns-dir@ietfa.amsl.com>; Wed, 15 Feb 2012 12:21:19 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -103.149
X-Spam-Level:
X-Spam-Status: No, score=-103.149 tagged_above=-999 required=5 tests=[AWL=-0.450, BAYES_00=-2.599, J_CHICKENPOX_23=0.6, MIME_8BIT_HEADER=0.3, RCVD_IN_DNSWL_LOW=-1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id c+49-pmxrRI9 for <dns-dir@ietfa.amsl.com>; Wed, 15 Feb 2012 12:21:15 -0800 (PST)
Received: from mail-qw0-f51.google.com (mail-qw0-f51.google.com [209.85.216.51]) by ietfa.amsl.com (Postfix) with ESMTP id E2D1721E8090 for <dns-dir@ietf.org>; Wed, 15 Feb 2012 12:21:14 -0800 (PST)
Received: by qan41 with SMTP id 41so1515645qan.10 for <dns-dir@ietf.org>; Wed, 15 Feb 2012 12:21:14 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=subject:mime-version:content-type:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to:x-mailer; bh=BfUry7v8uWnwW2eNhPEjxW1b4EJ/bw7ZuDekbebvLVM=; b=w8dHAyPP95DCdVymkZbtmlLfKQk7B5LbXh8q2p+DWj6s5aHLUK4HUBAogFymCbavZT JKtE+/uB8kQttApib2XDSyQsGY62mcAPdFHUk1WD3l/bUVqmo05edY6UXNX7u2s/EgD6 8Hri4L+obRpgnlFtowfZ9pnqh1eXYxuJjOpoI=
Received: by 10.229.137.144 with SMTP id w16mr16294166qct.8.1329337273949; Wed, 15 Feb 2012 12:21:13 -0800 (PST)
Received: from rtp-rdroms-8916.cisco.com (rtp-isp-nat1.cisco.com. [64.102.254.33]) by mx.google.com with ESMTPS id bd19sm12738786qab.17.2012.02.15.12.21.10 (version=SSLv3 cipher=OTHER); Wed, 15 Feb 2012 12:21:11 -0800 (PST)
Mime-Version: 1.0 (Apple Message framework v1251.1)
Content-Type: text/plain; charset="utf-8"
From: Ralph Droms <rdroms.ietf@gmail.com>
In-Reply-To: <A1AF0D31-AC51-47C1-8528-9A3A28A12A1D@nic.cz>
Date: Wed, 15 Feb 2012 15:21:08 -0500
Content-Transfer-Encoding: quoted-printable
Message-Id: <BD122AC8-4619-425C-9A68-FC130FDB1174@gmail.com>
References: <20120104181709.GP13424@x27.adm.denic.de> <A1AF0D31-AC51-47C1-8528-9A3A28A12A1D@nic.cz>
To: Ondřej Surý <ondrej.sury@nic.cz>, Peter Koch <pk@DENIC.DE>
X-Mailer: Apple Mail (2.1251.1)
Cc: IETF Directorate DNS <dns-dir@ietf.org>
Subject: Re: [dns-dir] some comments on draft-os-ietf-sshfp-ecdsa-sha2-04.txt
X-BeenThere: dns-dir@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: IETF DNS directorate discussion list <dns-dir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dns-dir>, <mailto:dns-dir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dns-dir>
List-Post: <mailto:dns-dir@ietf.org>
List-Help: <mailto:dns-dir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dns-dir>, <mailto:dns-dir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 15 Feb 2012 20:21:19 -0000

I have a couple of followups in line

Otherwise, is the DNS Directorate OK with rev -07 of this document?

- Ralph

On Jan 27, 2012, at 3:00 AM 1/27/12, Ondřej Surý wrote:

> Hi Peter,
> 
> On 4. 1. 2012, at 19:17, Peter Koch wrote:
> 
>> Hi Ondrej,
>> 
>> i came across another review of <draft-os-ietf-sshfp-ecdsa-sha2-04.txt>
>> and would like to add some remarks.  I've copied the DNS Directorate
>> for information.  Not sure what the status of the draft is - the
>> datatracker confuses me by claiming 'wg document', but i do not see
>> which WG?  Generally the draft looks like a good idea!
>> 
>> To start with some formalities, the header and abstract claim the draft
>> updates RFC 4255. I would suggest it does not.  It updates two IANA
>> registries defined and seeded by RFC 4255, but it does not (to my
>> reading) change any content of RFC 4255.   If it were to update 4255,
>> it should probably adjust the registry policies from "IETF consensus"
>> as per RFC 2434 to "IETF Review" as per RFC 5226, but that's probably
>> for another venue to discuss.
> 
> Fixed.  Sound reasonable.
> 
>> Second, the document aims at Standards Track and I do not see why.
>> An IETF/IESG reviewed RFC would be sufficient.  Not saying it
>> should be less than ST, but what's the purpose here?  Later serving
>> as normative reference?
> 
> I am not aware of such thing as IESG reviewed RFC. RFC 2026 is no
> help here.  Maybe you can point me to a reading material?

E.g., an Informational RFC would suffice.

>> In section 3.2 the use of an ECDSA fingerprint is defined.  I could
>> not find the description of the Fingerprint in RFC 5656.
>> Furtheron it reads
>> 
>>  ECDSA public key fingerprints MUST use the SHA-256 algorithm for the
>>  fingerprint as using the SHA-1 algorithm would weaken the security of
>>  the key.
>> 
>> First, could the claim 'would weaken the security' be substantiated
>> (maybe by reference) a bit?  Second, what is the consequence, i.e.
>> who is supposed to act on a violation? Is it the DNS implementation
>> (hard to achieve with 'transparent' RR types), the DNS operator or
>> the consuming entity?  I would suggest to reverse the logic here and
>> only demand that a consuming party MUST ignore SHA-1 FPs for ECDSA.
> 
> Sounds reasonable, but if I were to reverse the login, it would also
> mean that if there's an implementation which generates ECDSA with SHA-1
> it wouldn't work for consuming party and it breaks the robustness
> principle.
> 
> I want to say - if you create the FP use SHA-256, if you receive SHA-1
> key then you may use it unless you also receive SHA-256.

Section 3.2 seems to have changed.  What was the ultimate resolution of this discussion point?

> 
>> In 4.1, the SHA-256 fingerprint is introduced. The consuming entity
>>  is advised "Secure Shell
>>  implementations which support SHA-256 fingerprints MUST prefer a SHA-
>>  256 fingerprint over SHA-1 if both are available for a server.  If
>>  the SHA-256 fingerprint is tested and does not match the supplied
>>  key, then the key MUST be rejected rather than testing the
>>  alternative SHA-1 fingerprint."
>> 
>> This assumes that both FPs are for the same key? Couldn't it happen that
>> the server offers an RSA and an ECDSA key, using SHA-1 for the former
>> and ECDSA for the latter?
> 
> No, I don't think so.  The server always offers just one key.  And in the
> unlikely scenario where more servers are behind balanced IP address you
> would need to keep the keys in sync, because SSH would yell at you every
> time you get different server key.
> 
> As for key rollovers - you first need to upgrade hashing algorithm
> and then add new key.
> 
>> Nit: Add some text after the headline "5. Examples", e.g.
>> 
>> The following examples provide reference for both the newly defined
>> ECDSA algorithm number and the use of the SHA-256 fingerprint
>> combined with both the new and the existing algorithm numbers.
> 
> Thanks for the text, added.
> 
>> The examples refer to "OpenSSH format" without any reference.
> 
> Good catch.
> 
>> The references to the DNSSEC RFCs are probably informative only.
> 
> 
> Fixed.
> 
> O.
> --
> Ondřej Surý
> vedoucí výzkumu/Head of R&D department
> -------------------------------------------
> CZ.NIC, z.s.p.o.    --    Laboratoře CZ.NIC
> Americka 23, 120 00 Praha 2, Czech Republic
> mailto:ondrej.sury@nic.cz    http://nic.cz/
> tel:+420.222745110       fax:+420.222745112
> -------------------------------------------
> 
> _______________________________________________
> dns-dir mailing list
> dns-dir@ietf.org
> https://www.ietf.org/mailman/listinfo/dns-dir