Re: RIP: Crypto-Key header field

Martin Thomson <martin.thomson@gmail.com> Wed, 23 November 2016 01:01 UTC

Return-Path: <ietf-http-wg-request+bounce-httpbisa-archive-bis2juki=lists.ie@listhub.w3.org>
X-Original-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Delivered-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C5C3C12948C for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Tue, 22 Nov 2016 17:01:11 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.998
X-Spam-Level:
X-Spam-Status: No, score=-7.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HEADER_FROM_DIFFERENT_DOMAINS=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_SORBS_SPAM=0.5, RP_MATCHES_RCVD=-1.497, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cq_pqWYVCEQi for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Tue, 22 Nov 2016 17:01:11 -0800 (PST)
Received: from frink.w3.org (frink.w3.org [128.30.52.56]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8F0F21293F8 for <httpbisa-archive-bis2Juki@lists.ietf.org>; Tue, 22 Nov 2016 16:52:41 -0800 (PST)
Received: from lists by frink.w3.org with local (Exim 4.80) (envelope-from <ietf-http-wg-request@listhub.w3.org>) id 1c9Ljc-000721-I8 for ietf-http-wg-dist@listhub.w3.org; Wed, 23 Nov 2016 00:48:24 +0000
Resent-Date: Wed, 23 Nov 2016 00:48:24 +0000
Resent-Message-Id: <E1c9Ljc-000721-I8@frink.w3.org>
Received: from titan.w3.org ([128.30.52.76]) by frink.w3.org with esmtps (TLS1.2:RSA_AES_128_CBC_SHA1:128) (Exim 4.80) (envelope-from <martin.thomson@gmail.com>) id 1c9LjW-000710-CO for ietf-http-wg@listhub.w3.org; Wed, 23 Nov 2016 00:48:18 +0000
Received: from mail-qk0-f174.google.com ([209.85.220.174]) by titan.w3.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.84_2) (envelope-from <martin.thomson@gmail.com>) id 1c9LjQ-0007pt-Gq for ietf-http-wg@w3.org; Wed, 23 Nov 2016 00:48:13 +0000
Received: by mail-qk0-f174.google.com with SMTP id q130so48654493qke.1 for <ietf-http-wg@w3.org>; Tue, 22 Nov 2016 16:47:52 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=1EJlOzuUm7fhjenGfNj66ltI+wdXgBKoMG5zNp/i5OY=; b=gWWSlfpOsdSLdw1v6CvSAHPcmNuhdByu2eF9KE/nlHKcS/bGXiLXL04I5d2mlXXyn+ eC+jPfVC91Z5R6bTuJfgL7GsNhYMd4E+Xx6+G1iJdaF4JZ2SEb+72Ts3RqbqTpZv/7b8 o0o38el+uG/dAV2HsOwfTrqsLEbGHw2eqBAG4wZLVLDuGtqzJvkvRUhBT7fcYzFFnC+a yzkBLRTDl/LojYMRvJQtWRHKSN8SPZhKSNLlpzz2Y7IXxMxRz3dLCgrR2ln3qkoKSnnf ZZI//BPLVEvwHbyC3u5YBTJYHnJ2LwsECHhowM/um3PdEB+/16pXlYym3KJThUWyXqYh sZ9A==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=1EJlOzuUm7fhjenGfNj66ltI+wdXgBKoMG5zNp/i5OY=; b=MHk0nYodS/Ua1kT7pP0ZHkI2oFdjUclomOsamqPbqW4AE0hYJ6y3jSZQH2nXmMkQB3 P2d0NlsWokMEWZGoLVBh6D9st35V2N7Lqm/1LPIStrg2UDcPXT2R3Hl+uP/Gii7K3hxJ P1sqcI9a01W7ePa0/gsTJWoAvZ1Pp93zgmwgWIzzfhm4RMUEiLJJzGS6NNAX7RhO/Gff W2Ul0hQjhoERLKnfL/a/f5CsDj0pPxt/5EFZ71yMku3DJ7kq3cstvGh+K/e0Zfn4Q9yn 65X5JHCBpiwJvwY7BsaBHEGUAvnA7qEy56JkJ+YyCf/VCqfyX/uYWQ57CxI5u8IY7/dO jxKA==
X-Gm-Message-State: AKaTC02vUmgnPIB0qMzSgvFiexpW8oi9GPnavInb0vhUK4RoQKUU+1FWxIutLSEVqG6iXpamlw99jWvaZIlTKQ==
X-Received: by 10.55.12.2 with SMTP id 2mr435498qkm.68.1479862066680; Tue, 22 Nov 2016 16:47:46 -0800 (PST)
MIME-Version: 1.0
Received: by 10.140.85.101 with HTTP; Tue, 22 Nov 2016 16:47:46 -0800 (PST)
In-Reply-To: <41b1ccf6-32ff-c450-9f61-8f51feb99dad@gmx.de>
References: <CABkgnnXQ7jFX+U0Ziai_kmja740h-6MBmBG5vxNF5Tr2fpTX3w@mail.gmail.com> <41b1ccf6-32ff-c450-9f61-8f51feb99dad@gmx.de>
From: Martin Thomson <martin.thomson@gmail.com>
Date: Wed, 23 Nov 2016 11:47:46 +1100
Message-ID: <CABkgnnV4wtcnZBajJy0VCYXbTQ=LDjGuytz4iOzOLVvVHqB24Q@mail.gmail.com>
To: Julian Reschke <julian.reschke@gmx.de>
Cc: HTTP Working Group <ietf-http-wg@w3.org>
Content-Type: text/plain; charset="UTF-8"
Received-SPF: pass client-ip=209.85.220.174; envelope-from=martin.thomson@gmail.com; helo=mail-qk0-f174.google.com
X-W3C-Hub-Spam-Status: No, score=-6.1
X-W3C-Hub-Spam-Report: AWL=0.103, BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RCVD_IN_SORBS_SPAM=0.5, SPF_PASS=-0.001, W3C_AA=-1, W3C_DB=-1, W3C_IRA=-1, W3C_WL=-1
X-W3C-Scan-Sig: titan.w3.org 1c9LjQ-0007pt-Gq 4109c62b342a047901c6a4e9f8939ef9
X-Original-To: ietf-http-wg@w3.org
Subject: Re: RIP: Crypto-Key header field
Archived-At: <http://www.w3.org/mid/CABkgnnV4wtcnZBajJy0VCYXbTQ=LDjGuytz4iOzOLVvVHqB24Q@mail.gmail.com>
Resent-From: ietf-http-wg@w3.org
X-Mailing-List: <ietf-http-wg@w3.org> archive/latest/32962
X-Loop: ietf-http-wg@w3.org
Resent-Sender: ietf-http-wg-request@w3.org
Precedence: list
List-Id: <ietf-http-wg.w3.org>
List-Help: <http://www.w3.org/Mail/>
List-Post: <mailto:ietf-http-wg@w3.org>
List-Unsubscribe: <mailto:ietf-http-wg-request@w3.org?subject=unsubscribe>

On 22 November 2016 at 19:28, Julian Reschke <julian.reschke@gmx.de> wrote:
> 1) The way "keyid" is currently specified makes it an octet sequence, that
> may or may not be valid UTF-8 and could even include NUL. Is that really the
> intention? We've seen the consequences of this with ALPN identifiers, which
> required us to define a funky escaping mechanism in alt-svc, so we could put
> them into places that take strings. This not only affects related specs, but
> also APIs for code that handles encryption encoding (such as: what's the
> datatype for the key in dictionaries?)

The virtue of this is that a particular profile can define this field
as it chooses, to meet its own requirements.  If you intend to use
this with strings, then you can constrain to ASCII or UTF-8 as you see
fit.

> 2) Is there a notion of uniqueness? Can there be multiple dictionaries,
> which might contain different information for the same keyid? What's the
> suggest behavior when there's more than one? Pick first? Pick first that
> works?

That would be application-defined.  Applications would have to define
the scope over which a dictionary is applicable.

Worst case is that you pick a key that works.  That is, one that
decrypts the first record.  Thanks to integrity protection, that's
never(*) going to get you the wrong answer, though it might be
sub-optimal.

> 3) Is there any spec that uses encryption encoding and uses dictionaries? If
> so, how does it interface with key dictionaries?

There is no such spec, unless your intent with the out-of-band stuff
was to define such a dictionary.

The question, I guess, is to work out what sort of guidance we might
want to provide around the use of these identifiers.  Is it entirely
up to the usage to define format and scope?  I think yes on both is
the obvious answer - we aren't defining how keys move around either.
Explicitly saying that is probably a good idea though.