Re: [keyassure] Opening issue #21: "Need to specify which crypto

Jakob Schlyter <jakob@kirei.se> Tue, 08 March 2011 07:19 UTC

Return-Path: <jakob@kirei.se>
X-Original-To: keyassure@core3.amsl.com
Delivered-To: keyassure@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id BB86A3A68FE for <keyassure@core3.amsl.com>; Mon, 7 Mar 2011 23:19:46 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.249
X-Spam-Level:
X-Spam-Status: No, score=-2.249 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HELO_EQ_SE=0.35]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Opv5YLJA7Z0A for <keyassure@core3.amsl.com>; Mon, 7 Mar 2011 23:19:45 -0800 (PST)
Received: from spg.kirei.se (gomi.kirei.se [91.206.174.9]) by core3.amsl.com (Postfix) with ESMTP id 45F053A68EF for <keyassure@ietf.org>; Mon, 7 Mar 2011 23:19:44 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=kirei.se; s=spg20100524; h=received:subject:mime-version:content-type:from:in-reply-to:date:cc: content-transfer-encoding:message-id:references:to:x-mailer; bh=lFdONtQCX1MYR6Esrt+cm0qw38d4Jl86j92FylCgap8=; b=qr8yTjN4J16xCvKS49el+fOPUwovtNB4p3vSXWDDdRB+RMiNvWY3+u79iKjWlVa6olCZzkidpmofN rZkBQbULotN3Y0tNLC5GnMpXN61l7BSxlvFgdTadCm+a6KYED50XRt5nERT5sD0OY2R78i/WoX3G3U pqw5XalJrj7EPw0Q=
Received: from mail.kirei.se (unknown [91.206.174.10]) by spg.kirei.se (Halon Mail Gateway) with ESMTP; Tue, 8 Mar 2011 08:20:54 +0100 (CET)
Mime-Version: 1.0 (Apple Message framework v1082)
Content-Type: text/plain; charset="us-ascii"
From: Jakob Schlyter <jakob@kirei.se>
In-Reply-To: <397794924.536913.1299565388720.JavaMail.root@cm-mail03.mozilla.org>
Date: Tue, 08 Mar 2011 08:20:50 +0100
Content-Transfer-Encoding: quoted-printable
Message-Id: <E971C167-FE76-497D-A156-16EF687B522A@kirei.se>
References: <397794924.536913.1299565388720.JavaMail.root@cm-mail03.mozilla.org>
To: Brian Smith <bsmith@mozilla.com>
X-Mailer: Apple Mail (2.1082)
Cc: keyassure@ietf.org
Subject: Re: [keyassure] Opening issue #21: "Need to specify which crypto
X-BeenThere: keyassure@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Key Assurance With DNSSEC <keyassure.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/keyassure>, <mailto:keyassure-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/keyassure>
List-Post: <mailto:keyassure@ietf.org>
List-Help: <mailto:keyassure-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/keyassure>, <mailto:keyassure-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 08 Mar 2011 07:19:46 -0000

On 8 mar 2011, at 07.23, Brian Smith wrote:

> It would be better to have both SHA-384 mandatory for clients. Those two algorithms are already practically required because they are both required for a good implementation of TLS 1.2. Making SHA-384 mandatory for clients makes it easier for server administrators to switch from SHA-256 to SHA-384 if that would ever be helpful; that could be a real possibility considering the deployment of SHA-3 on clients is a long way off.

+1 - having two algorithms (although from the same family) from the start is better than just one. And we add SHA-3 and friends later - no need to "reserve" code points for them at this point.

	jakob