Re: [keyassure] Opening issue #21: "Need to specify which crypto

Paul Hoffman <paul.hoffman@vpnc.org> Fri, 04 March 2011 14:35 UTC

Return-Path: <paul.hoffman@vpnc.org>
X-Original-To: keyassure@core3.amsl.com
Delivered-To: keyassure@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A52473A6864 for <keyassure@core3.amsl.com>; Fri, 4 Mar 2011 06:35:39 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.81
X-Spam-Level:
X-Spam-Status: No, score=-101.81 tagged_above=-999 required=5 tests=[AWL=0.789, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uJZ1XHyFcI3N for <keyassure@core3.amsl.com>; Fri, 4 Mar 2011 06:35:38 -0800 (PST)
Received: from hoffman.proper.com (unknown [IPv6:2001:4870:a30c:41::81]) by core3.amsl.com (Postfix) with ESMTP id 4B6BC3A6834 for <keyassure@ietf.org>; Fri, 4 Mar 2011 06:35:38 -0800 (PST)
Received: from MacBook-08.local (75-101-30-90.dsl.dynamic.sonic.net [75.101.30.90]) (authenticated bits=0) by hoffman.proper.com (8.14.4/8.14.3) with ESMTP id p24Eah7N029240 (version=TLSv1/SSLv3 cipher=DHE-RSA-CAMELLIA256-SHA bits=256 verify=NO) for <keyassure@ietf.org>; Fri, 4 Mar 2011 07:36:45 -0700 (MST) (envelope-from paul.hoffman@vpnc.org)
Message-ID: <4D70F8FA.7020506@vpnc.org>
Date: Fri, 04 Mar 2011 06:36:42 -0800
From: Paul Hoffman <paul.hoffman@vpnc.org>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.6; en-US; rv:1.9.2.14) Gecko/20110221 Thunderbird/3.1.8
MIME-Version: 1.0
To: keyassure@ietf.org
References: <6B5E58CC-4DBB-4C43-93F4-FC97A9D358AA@checkpoint.com> <E1PvSbG-0003G9-Nd@login01.fos.auckland.ac.nz> <20110304121318.GG16012@shinkuro.com>
In-Reply-To: <20110304121318.GG16012@shinkuro.com>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Subject: Re: [keyassure] Opening issue #21: "Need to specify which crypto
X-BeenThere: keyassure@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Key Assurance With DNSSEC <keyassure.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/keyassure>, <mailto:keyassure-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/keyassure>
List-Post: <mailto:keyassure@ietf.org>
List-Help: <mailto:keyassure-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/keyassure>, <mailto:keyassure-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 04 Mar 2011 14:35:39 -0000

On 3/4/11 4:13 AM, Andrew Sullivan wrote:
> On Fri, Mar 04, 2011 at 11:51:10PM +1300, Peter Gutmann wrote:
>> is finalised all I need to do is plug the algorithm in.  Putting the same
>> thing into DANE isn't hard, and makes it easier to deploy future-compatible
>> implementations from day one.
>
> I don't see any reason to say specifically, "We'll be moving to _x_ so
> you better have a placeholder for it".  That will simply encourage
> foolish programmers to write one placeholder spot, and then when SHA-4
> or whatever comes along we have a new problem.
>
> The right way to do this is something like the unknown RRTYPE in DNS.
> In that case, you have to be able to handle anything you get (within
> the valid codepoint range) _even if_ you don't understand it.  By
> "handle", I mean, "be able to pass messages; not spit up and die," and
> so on.  It does not mean, of course, that you have to be able to do
> whatever additional section processing or whatever is required, and
> you don't need to be able to do anything useful (if you don't know
> what NSEC3 is, you're not going to be able to validate with it).
>
> I'm not sure how to say something similar in this case, but I think
> it's the right sort of framework.

The way I read Warren's proposal, we get exactly what you want. There 
are two different mandatory code points defined for two different 
hashes, so we are sure that the deployed code will be able to handle 
hash agility. We don't care which algorithm people use in practice 
because they are both mandatory, so there is no spitting up or dying.

Does that work for you?

--Paul Hoffman