Protocol Action: 'OpenPGP Message Format' to Proposed Standard

The IESG <iesg-secretary@ietf.org> Wed, 25 July 2007 18:51 UTC

Return-path: <ietf-announce-bounces@ietf.org>
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1IDlxS-0007fL-Cf; Wed, 25 Jul 2007 14:51:38 -0400
Received: from [10.90.34.44] (helo=chiedprmail1.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IDlxQ-0007XM-QX for ietf-announce@ietf.org; Wed, 25 Jul 2007 14:51:36 -0400
Received: from ns4.neustar.com ([156.154.24.139]) by chiedprmail1.ietf.org with esmtp (Exim 4.43) id 1IDlxQ-0006Ox-Dy for ietf-announce@ietf.org; Wed, 25 Jul 2007 14:51:36 -0400
Received: from stiedprstage1.ietf.org (stiedprstage1.va.neustar.com [10.31.47.10]) by ns4.neustar.com (Postfix) with ESMTP id 484BF2ACAA; Wed, 25 Jul 2007 18:51:36 +0000 (GMT)
Received: from ietf by stiedprstage1.ietf.org with local (Exim 4.43) id 1IDlxQ-0004dm-1t; Wed, 25 Jul 2007 14:51:36 -0400
X-test-idtracker: no
From: The IESG <iesg-secretary@ietf.org>
To: IETF-Announce <ietf-announce@ietf.org>
Message-Id: <E1IDlxQ-0004dm-1t@stiedprstage1.ietf.org>
Date: Wed, 25 Jul 2007 14:51:36 -0400
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 244a2fd369eaf00ce6820a760a3de2e8
Cc: Internet Architecture Board <iab@iab.org>, openpgp chair <openpgp-chairs@tools.ietf.org>, openpgp mailing list <ietf-openpgp@imc.org>, RFC Editor <rfc-editor@rfc-editor.org>
Subject: Protocol Action: 'OpenPGP Message Format' to Proposed Standard
X-BeenThere: ietf-announce@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: ietf-announce.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ietf-announce>, <mailto:ietf-announce-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ietf-announce@ietf.org>
List-Help: <mailto:ietf-announce-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ietf-announce>, <mailto:ietf-announce-request@ietf.org?subject=subscribe>
Errors-To: ietf-announce-bounces@ietf.org

The IESG has approved the following document:

- 'OpenPGP Message Format '
   <draft-ietf-openpgp-rfc2440bis-22.txt> as a Proposed Standard

This document is the product of the An Open Specification for Pretty Good 
Privacy Working Group. 

The IESG contact persons are Sam Hartman and Tim Polk.

A URL of this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-openpgp-rfc2440bis-22.txt

Technical Summary

    OpenPGP software uses a combination of strong public-key and
    symmetric cryptography to provide security services for electronic
    communications and data storage. These services include
    confidentiality, key management, authentication, and digital
    signatures. This document specifies the message formats used in
    OpenPGP.  This document is an update to RFC 2440 based on
   implementation experience and advances in the field. 

Working Group Summary

    The OpenPGP working group had consensus to advance this document
    as a proposed standard.

Protocol Quality

    This document was reviewed for the IESG by Sam Hartman.  The
    changes since RFC 2440 are of sufficient quality to be published as a
    proposed standard.

Note to RFC Editor

Please move the reference to RFC 1991 to an informative reference and
the reference to 1951 to a normative reference.
Add to the end of section 15:

* OpenPGP does not put limits on the size of RSA public keys. However,
  large keys are not necessarily good. Larger keys take more
  computation time to use, and this can quickly be unusable. Most
  OpenPGP implementations set an upper bound of 4096 bits in RSA
  public keys. Some have allowed 8K or 16K, which are large enough to
  have problems in many environments. If an implementation creates
  keys larger than 4096 bits, it will sacrifice interoperability with
  most other implementations.

* ASCII armor is an optional feature of OpenPGP. The OpenPGP working
  group strives for a minimal set of mandatory-to-implement features,
  and since there could be useful implementations that only use binary
  object formats, this is not a "MUST" feature for an
  implementation. For example, an implementation that is using OpenPGP
  as a mechanism for file signatures may find ASCII armor
  unnecessary. OpenPGP permits an implementation to declare what
  features it does and does not support, but ASCII armor is not one of
  these. Since most implementations allow binary and armored objects
  to be used indiscriminately, an implementation that does not
  implement ASCII armor may find itself with compatibility issues with
  general-purpose implementations. Moreover, implementations of
  OpenPGP-MIME [RFC3156] already have a requirement for ASCII armor so
  those implementations will necessarily have support.


_______________________________________________
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf-announce