Re: [dnsext] draft-hoffman-dnssec-ecdsa-04

Miek Gieben <miek@miek.nl> Thu, 12 April 2012 11:25 UTC

Return-Path: <miekg@atoom.net>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CEAEF21F8598 for <dnsext@ietfa.amsl.com>; Thu, 12 Apr 2012 04:25:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level:
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, NO_RELAYS=-0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JOuCCqzgdB2V for <dnsext@ietfa.amsl.com>; Thu, 12 Apr 2012 04:25:14 -0700 (PDT)
Received: from elektron.atoom.net (cl-201.ede-01.nl.sixxs.net [IPv6:2001:7b8:2ff:c8::2]) by ietfa.amsl.com (Postfix) with ESMTP id 098AA21F8594 for <dnsext@ietf.org>; Thu, 12 Apr 2012 04:25:14 -0700 (PDT)
Received: by elektron.atoom.net (Postfix, from userid 1000) id F0D2C4030E; Thu, 12 Apr 2012 13:25:09 +0200 (CEST)
Date: Thu, 12 Apr 2012 13:25:09 +0200
From: Miek Gieben <miek@miek.nl>
To: dnsext WG <dnsext@ietf.org>
Message-ID: <20120412112509.GA25406@miek.nl>
Mail-Followup-To: dnsext WG <dnsext@ietf.org>
References: <20120412071421.GA19834@miek.nl> <201204121117.q3CBHIi5033363@givry.fdupont.fr>
MIME-Version: 1.0
Content-Type: multipart/signed; micalg="pgp-sha1"; protocol="application/pgp-signature"; boundary="zYM0uCDKw75PZbzx"
Content-Disposition: inline
In-Reply-To: <201204121117.q3CBHIi5033363@givry.fdupont.fr>
User-Agent: Vim/Mutt/Linux
X-Home: http://www.miek.nl
Subject: Re: [dnsext] draft-hoffman-dnssec-ecdsa-04
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 12 Apr 2012 11:25:14 -0000

[ Quoting <Francis.Dupont@fdupont.fr> in "Re: [dnsext] draft-hoffman-dnssec-e..." ]
> 
> => in fact they can get leading zeros so not the length you expect.
> IMHO the critical thing is (quoting the I-D):
>    For P-256, each integer MUST be encoded as 32 octets; for
>    P-384, each integer MUST each be encoded as 48 octets.

Ah, I completely missed that and now I know way: browser caching :(
Thanks.

> >  * Section 6: In the examples the privatekey file is shown. I
> >    haven't seen (or can't remember) this in any previous RFC
> >    specifing new algorithms for DNSKEYs. Also all other (DSA/RSA)
> >    .priv key files (as generated by BIND) put the public key info
> >    in the .priv file, this one is an exception. Why?
> 
> => RFC 5933 (about GOST for DNSSEC, which is BTW another EC stuff).

Ok, so we are stuck with that.

> PS: as far as I can see the example is hard to use to test code:
> the only thing you can do is to validate old/expired signatures...
> PPS: the crypto answer is Q = dG so the public key Q is trivial to
> compute from the private key d and the curve parameters (which
> includes the generator G).

Thanks for you answers.

 Regards,

-- 
    Miek Gieben