Re: [dnsext] draft-hoffman-dnssec-ecdsa-01

Robert Moskowitz <rgm-ietf@htt-consult.com> Mon, 19 April 2010 21:10 UTC

Return-Path: <owner-namedroppers@ops.ietf.org>
X-Original-To: ietfarch-namedroppers-archive-gleetwall6@core3.amsl.com
Delivered-To: ietfarch-namedroppers-archive-gleetwall6@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 52ED63A68D4; Mon, 19 Apr 2010 14:10:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.737
X-Spam-Level:
X-Spam-Status: No, score=0.737 tagged_above=-999 required=5 tests=[AWL=-1.368, BAYES_50=0.001, FH_RELAY_NODNS=1.451, HELO_MISMATCH_COM=0.553, RDNS_NONE=0.1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kSY0kJ-jKi6J; Mon, 19 Apr 2010 14:10:23 -0700 (PDT)
Received: from psg.com (psg.com [IPv6:2001:418:1::62]) by core3.amsl.com (Postfix) with ESMTP id 208C03A68BA; Mon, 19 Apr 2010 14:10:23 -0700 (PDT)
Received: from majordom by psg.com with local (Exim 4.71 (FreeBSD)) (envelope-from <owner-namedroppers@ops.ietf.org>) id 1O3y8u-0005oi-4j for namedroppers-data0@psg.com; Mon, 19 Apr 2010 21:04:32 +0000
Received: from [208.83.67.149] (helo=klovia.htt-consult.com) by psg.com with esmtp (Exim 4.71 (FreeBSD)) (envelope-from <rgm-ietf@htt-consult.com>) id 1O3y8p-0005mT-8F for namedroppers@ops.ietf.org; Mon, 19 Apr 2010 21:04:27 +0000
Received: from localhost (unknown [127.0.0.1]) by klovia.htt-consult.com (Postfix) with ESMTP id 7614568CDF; Mon, 19 Apr 2010 20:58:48 +0000 (UTC)
Received: from klovia.htt-consult.com ([127.0.0.1]) by localhost (klovia.htt-consult.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rnwF0zlZopeu; Mon, 19 Apr 2010 16:58:38 -0400 (EDT)
Received: from nc2400.htt-consult.com (h155.home.htt [208.83.67.155]) (Authenticated sender: rgm-ietf@htt-consult.com) by klovia.htt-consult.com (Postfix) with ESMTPSA id 720A368C39; Mon, 19 Apr 2010 16:58:38 -0400 (EDT)
Message-ID: <4BCCC54D.4030805@htt-consult.com>
Date: Mon, 19 Apr 2010 17:04:13 -0400
From: Robert Moskowitz <rgm-ietf@htt-consult.com>
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.1.9) Gecko/20100330 Fedora/3.0.4-1.fc12 Thunderbird/3.0.4
MIME-Version: 1.0
To: Paul Hoffman <paul.hoffman@vpnc.org>
CC: Alfred � <ah@TR-Sys.de>, namedroppers@ops.ietf.org
Subject: Re: [dnsext] draft-hoffman-dnssec-ecdsa-01
References: <201001271230.NAA07971@TR-Sys.de> <p06240831c78616f57db1@[10.20.30.158]>
In-Reply-To: <p06240831c78616f57db1@[10.20.30.158]>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 7bit
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
List-ID: <namedroppers.ops.ietf.org>
List-Unsubscribe: To unsubscribe send a message to namedroppers-request@ops.ietf.org with
List-Unsubscribe: the word 'unsubscribe' in a single line as the message text body.
List-Archive: <http://ops.ietf.org/lists/namedroppers/>

On 01/27/2010 11:23 AM, Paul Hoffman wrote:
> At 1:30 PM +0100 1/27/10, Alfred =?hp-roman8?B?SM5uZXM=?= wrote:
>    
>> I have a few technical points to be discussed for the DNSSEC
>> EDCDA draft, draft-hoffman-dnssec-ecdsa-01.
>>
>>
>> (1)  bit string vs. octet strings
>>
>> Cryptographers are used to think in bit strings of arbitrary
>> bit size.  DNS folks usually deal with octet strings.
>>
>> Since the introduction of bit strings does not incur any visible
>> benefit here, I suggest to avoid the notion of bit strings entirely
>> throughout the draft and use octet string oriented language and
>> octet string sizes for field descriptions.
>>      
> I figured that keeping the cryptographers happy while not hurting the DNS folks was a good idea. I'm happy to change, however.
>    

Paul, is there some reason you did not include P-521?  I might think it 
should be here for completeness.  It is in RFCs like 4753.

>    
>> (2)  representation of EC keys
>>
>> Section 3 of the draft says (in its first paragraph):
>>
>> |  ECDSA public keys consist of a single value, called "Q" in FIPS
>> |  186-3.  In DNSSEC keys, Q is a simple bit string that represents
>> |  the uncompressed form of a curve point.
>>
>> This is by far underspecified for the intended audience of this memo.
>>
>> Section 2.3.3 of the SEC-1 Standard specifies the precise algorithm
>> to convert an EC point to a 'normalized' octet string.
>> This algorithm is widely adopted (IEEE, ANSI, NIST, IETF PKIX, etc.).
>> Making explicit reference to the resulting data format should
>> provide benefits for re-using existing crypto-APIs as well.
>>
>> I recommend to normatively quote this specification in a similar
>> way as it is done in various new RFCs, including this week's
>> RFC 575? series.
>>      
> That sounds good.
>
>    
>> Further, the restriction to uncompressed form seems unnecessary,
>> or even detrimental to the intended benefit of savings in DNS
>> response packet size as well as consumed bandwidth and delay.
>> The use of the compressed form essentially would cut down the
>> EC key size to half the size of the uncompressed form.
>>      
> Some IPR claims have been made on the compressed form, and none on the uncompressed form. I chose to avoid that problem.
>
>    
>> The draft text also is silent about the 'quality' requirements.
>> SEC-1 and various NIST publications contain verification procedures
>> and requirements for key generators, signers, and verifiers.
>> Such requirements are already imported in recent IETF documents,
>> cf. the abovementioned RFC 575? series.
>> I suggest that the draft be amended by related normative text,
>> after discussion of the assurance level the WG deems needed for
>> this application of ECC.
>>      
> The current DNSSEC documents do not reference the NIST material on provable and probable primes in the discussion of RSA. The material you suggest is parallel. I'm happy to add it, but it will likely cause people to think that ECC is harder than RSA.
>
>    
>> (3)  Precision if data element/field specification
>>
>> Given the intended audience of the draft, the size of the data
>> elements used in the specification should be made explicit.
>>
>> I suggest to introduce a parameter 'm' (this is 'mlen' in SEC-1)
>> into the table in Section 3 and make systematical use of it in
>> Section 4.
>>      
> Given how few people understand NIST's m values, I think this will lead to more confusion for no benefit.
>
>
> --Paul Hoffman, Director
> --VPN Consortium
>
>
>