Re: [IPsec] WG Last Call on draft-ietf-ipsecme-rfc4307bis
Tero Kivinen <kivinen@iki.fi> Mon, 11 April 2016 12:47 UTC
Return-Path: <kivinen@iki.fi>
X-Original-To: ipsec@ietfa.amsl.com
Delivered-To: ipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4CB6612EB54 for <ipsec@ietfa.amsl.com>; Mon, 11 Apr 2016 05:47:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.121
X-Spam-Level:
X-Spam-Status: No, score=-1.121 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_NEUTRAL=0.779] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dKylI7JZEl4U for <ipsec@ietfa.amsl.com>; Mon, 11 Apr 2016 05:47:18 -0700 (PDT)
Received: from mail.kivinen.iki.fi (fireball.acr.fi [83.145.195.1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F03D912EC6B for <ipsec@ietf.org>; Mon, 11 Apr 2016 05:47:17 -0700 (PDT)
Received: from fireball.acr.fi (localhost [127.0.0.1]) by mail.kivinen.iki.fi (8.15.2/8.15.2) with ESMTPS id u3BClChS026679 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Mon, 11 Apr 2016 15:47:12 +0300 (EEST)
Received: (from kivinen@localhost) by fireball.acr.fi (8.15.2/8.14.8/Submit) id u3BClBlO022435; Mon, 11 Apr 2016 15:47:11 +0300 (EEST)
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Message-ID: <22283.40143.898294.982675@fireball.acr.fi>
Date: Mon, 11 Apr 2016 15:47:11 +0300
From: Tero Kivinen <kivinen@iki.fi>
To: Yaron Sheffer <yaronf.ietf@gmail.com>
In-Reply-To: <570AE1AD.3060001@gmail.com>
References: <325E33E7-8F06-414A-B0BB-FCBEEA8CC6C6@vpnc.org> <570AE1AD.3060001@gmail.com>
X-Mailer: VM 8.2.0b under 24.5.1 (x86_64--netbsd)
X-Edit-Time: 13 min
X-Total-Time: 17 min
Archived-At: <http://mailarchive.ietf.org/arch/msg/ipsec/leAstyzd85m6JFXQxVBbHOtBNhQ>
Cc: IPsecME WG <ipsec@ietf.org>, Paul Hoffman <paul.hoffman@vpnc.org>
Subject: Re: [IPsec] WG Last Call on draft-ietf-ipsecme-rfc4307bis
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipsec/>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 11 Apr 2016 12:47:22 -0000
Yaron Sheffer writes: > 4.1: have we considered making "Digital Signature" (#14) a SHOULD+ > instead of a SHOULD? Yes, I think we discussed it, but I think we should really see at least one implementation before we pick it as SHOULD+ level... Has anybody implemented this yet? This is still quite new, i.e., about year old, and as product cycles tend to be quite slow in the VPN gateways, I have not yet seen any implementations. > 4.2: aren't we trying to move the world to the generic "Digital > Signature", even if they're still using old certs? Yes. > If we are, then (gasp) PKCS1 v1.5 needs to be SHOULD. Why? There is no relationship between the RSASSA-PSS and RSASSA-PKCS1-v1.5 signatures in the certificates and in the AUTH payload. I.e., you can have RSASSA-PKCS1-v1.5 signature in the certificate, and use the RSASSA-PSS with SHA-256 to generate the AUTH payload. Also as we do say that RSASSA-PSS MUST be implemented, that means that every implementation which sends out the SIGNATURE_HASH_ALGORITHMS and conforms to this document, must support RSASSA-PSS, thus implementations can always use it when using RSA keys. Only reason to support RSASSA-PKCS1-v1.5 is to support RFC7427 implementations which are made before this 4307bis document came out, and which do not support RSASSA-PSS required here. > And the table should mention sha256WithRSAEncryption. Which by defination is then MAY. And it is MAY because it is not using SHA1 (which would make it SHOULD NOT), and it is using old RSASSA-PKCS1-v1.5 which is only MAY. We did remove all MAY lines from the table in last round. -- kivinen@iki.fi
- [IPsec] WG Last Call on draft-ietf-ipsecme-rfc430… Paul Hoffman
- Re: [IPsec] WG Last Call on draft-ietf-ipsecme-rf… Yaron Sheffer
- Re: [IPsec] WG Last Call on draft-ietf-ipsecme-rf… Tero Kivinen
- Re: [IPsec] WG Last Call on draft-ietf-ipsecme-rf… Yaron Sheffer
- Re: [IPsec] WG Last Call on draft-ietf-ipsecme-rf… Tero Kivinen
- Re: [IPsec] WG Last Call on draft-ietf-ipsecme-rf… Yaron Sheffer
- Re: [IPsec] WG Last Call on draft-ietf-ipsecme-rf… Paul Wouters
- Re: [IPsec] WG Last Call on draft-ietf-ipsecme-rf… Valery Smyslov
- Re: [IPsec] WG Last Call on draft-ietf-ipsecme-rf… Valery Smyslov
- Re: [IPsec] WG Last Call on draft-ietf-ipsecme-rf… Dang, Quynh (Fed)
- Re: [IPsec] WG Last Call on draft-ietf-ipsecme-rf… paul
- [IPsec] Fw: WG Last Call on draft-ietf-ipsecme-rf… Dang, Quynh (Fed)
- Re: [IPsec] WG Last Call on draft-ietf-ipsecme-rf… Tero Kivinen
- Re: [IPsec] WG Last Call on draft-ietf-ipsecme-rf… Tero Kivinen
- Re: [IPsec] WG Last Call on draft-ietf-ipsecme-rf… Valery Smyslov
- Re: [IPsec] WG Last Call on draft-ietf-ipsecme-rf… Valery Smyslov
- Re: [IPsec] WG Last Call on draft-ietf-ipsecme-rf… Tero Kivinen
- Re: [IPsec] WG Last Call on draft-ietf-ipsecme-rf… Tero Kivinen
- Re: [IPsec] WG Last Call on draft-ietf-ipsecme-rf… paul
- Re: [IPsec] WG Last Call on draft-ietf-ipsecme-rf… Valery Smyslov
- Re: [IPsec] WG Last Call on draft-ietf-ipsecme-rf… Graham Bartlett (grbartle)