Re: [keyassure] Opening issue #21: "Need to specify which crypto

Phillip Hallam-Baker <hallam@gmail.com> Fri, 04 March 2011 16:14 UTC

Return-Path: <hallam@gmail.com>
X-Original-To: keyassure@core3.amsl.com
Delivered-To: keyassure@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B24973A67AF for <keyassure@core3.amsl.com>; Fri, 4 Mar 2011 08:14:43 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.564
X-Spam-Level:
X-Spam-Status: No, score=-3.564 tagged_above=-999 required=5 tests=[AWL=0.034, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 81JC2GHae6iD for <keyassure@core3.amsl.com>; Fri, 4 Mar 2011 08:14:42 -0800 (PST)
Received: from mail-bw0-f44.google.com (mail-bw0-f44.google.com [209.85.214.44]) by core3.amsl.com (Postfix) with ESMTP id 2747A3A67A1 for <keyassure@ietf.org>; Fri, 4 Mar 2011 08:14:41 -0800 (PST)
Received: by bwz13 with SMTP id 13so2571775bwz.31 for <keyassure@ietf.org>; Fri, 04 Mar 2011 08:15:50 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:in-reply-to:references:date :message-id:subject:from:to:cc:content-type; bh=eBMapswD55ygTS5qCN0OFfbuOv/SbJGT0cGuPa4kpfo=; b=k+AqjeUweJbgilNRhNwd5XwS2GnkA7M9K4yc0klV2koEpL1SZgs/NhegYH/9QO/edq 6blwZm3wDFK7YbEftDnxeSPV3IXo12HtUvptaPT382iseOT7HBcwDNOlaJusA/cJ5CmJ 8HlefcLywIYHzoqWdqZQIqcGm+/YbIeEVjSqw=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; b=uELBYaipym1r/dzjh8/TsROWE56irNqioxGprFy7x1RfWVoK5jJRzcEBWHA0oU2h3K vKSsh0rCAckwE4ORJ57B8o8PJc4nLqqMMN9lpQlho3w5gsoDGy6uj25NUGxUMs/yjLN9 6ijv8YepVnWZvrZzlaoGz4Bqz2bvHOrecxKAM=
MIME-Version: 1.0
Received: by 10.204.154.74 with SMTP id n10mr733548bkw.33.1299255350638; Fri, 04 Mar 2011 08:15:50 -0800 (PST)
Received: by 10.204.14.139 with HTTP; Fri, 4 Mar 2011 08:15:50 -0800 (PST)
In-Reply-To: <4D70F990.2040202@vpnc.org>
References: <7CDBED48-C800-4169-AF59-72075BA7EC2E@kumari.net> <201103041246.p24CkHZt011245@fs4113.wdf.sap.corp> <AANLkTik1r-sZvnNHCUtKO1De2CGb53x1Wk+ojRPOhOih@mail.gmail.com> <4D70F990.2040202@vpnc.org>
Date: Fri, 04 Mar 2011 11:15:50 -0500
Message-ID: <AANLkTinjn9-Wrwzfv3Q8sL+D8g54ZzNFyi6ez6x3GeRn@mail.gmail.com>
From: Phillip Hallam-Baker <hallam@gmail.com>
To: Paul Hoffman <paul.hoffman@vpnc.org>
Content-Type: multipart/alternative; boundary="0015175cf8d4a5ba18049daa759a"
Cc: keyassure@ietf.org
Subject: Re: [keyassure] Opening issue #21: "Need to specify which crypto
X-BeenThere: keyassure@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Key Assurance With DNSSEC <keyassure.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/keyassure>, <mailto:keyassure-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/keyassure>
List-Post: <mailto:keyassure@ietf.org>
List-Help: <mailto:keyassure-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/keyassure>, <mailto:keyassure-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 04 Mar 2011 16:14:43 -0000

On Fri, Mar 4, 2011 at 9:39 AM, Paul Hoffman <paul.hoffman@vpnc.org> wrote:

> On 3/4/11 5:57 AM, Phillip Hallam-Baker wrote:
>
>> OK, how about this
>>
>> Define code points for
>>
>> SHA2-256
>> SHA2-512
>> SHA3-256 (reserved)
>> SHA3-512 (reserved)
>>
>
> This would only work if we knew today that there will be algorithms with
> those exact names. Those of us following the NIST hash competition have seen
> that there is a good chance that will *not* be the case: NIST is explicitly
> allowing (some would say encouraging) parameters on the functions.


All the finalists are designed to be used as a drop in replacement for SHA2,
which is a mandatory requirement.

But I do prefer using a hash that incorporates random data in the hash
mechanism. It provides a lot of protection against attack, in most cases an
attacker has to achieve a first preimage attack rather than a second.


So while we could certainly reserve a slot now, it is likely that there will
be further discussion on the choice of mode. And I would really like us to
be having one IETF conversation at that point and not ten with different
combinations of what is mostly the same people.

Since we are going to be using this with TLS it is probably going to make
most sense to consider what algorithms TLS is going to use.


-- 
Website: http://hallambaker.com/