Re: [openpgp] Weird OIDs in the 4880bis draft

Paul Wouters <paul@nohats.ca> Tue, 14 February 2023 00:05 UTC

Return-Path: <paul@nohats.ca>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E3FFEC16B5D6 for <openpgp@ietfa.amsl.com>; Mon, 13 Feb 2023 16:05:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.095
X-Spam-Level:
X-Spam-Status: No, score=-2.095 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nohats.ca
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PvJHC6x8Tk0u for <openpgp@ietfa.amsl.com>; Mon, 13 Feb 2023 16:05:16 -0800 (PST)
Received: from mx.nohats.ca (mx.nohats.ca [193.110.157.85]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AAF49C16B5D7 for <openpgp@ietf.org>; Mon, 13 Feb 2023 16:05:16 -0800 (PST)
Received: from localhost (localhost [IPv6:::1]) by mx.nohats.ca (Postfix) with ESMTP id 4PG1gF4Z44zFJr; Tue, 14 Feb 2023 01:05:13 +0100 (CET)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nohats.ca; s=default; t=1676333113; bh=iDQhA25kkzSQtgHgnnBAH53O/Z17NUffHYBFZSWhZPA=; h=Date:From:To:cc:Subject:In-Reply-To:References; b=o6n142oK+B75Q+/0S9J/V4FmzNmuITjRnSjPAo591FCH+/F+fmeXg1NeXx04rArhH jJIQqrWsdifv60JGgurN2hjwqHY/1y4V8GcJAC1d6Om4p2xZVd9ihcATYvBke3eUDx MHG+AxJbCseoF8aJpnEKPbcB8dwOCA7ldQRdJezQ=
X-Virus-Scanned: amavisd-new at mx.nohats.ca
Received: from mx.nohats.ca ([IPv6:::1]) by localhost (mx.nohats.ca [IPv6:::1]) (amavisd-new, port 10024) with ESMTP id opdC29WcRWw9; Tue, 14 Feb 2023 01:05:12 +0100 (CET)
Received: from bofh.nohats.ca (bofh.nohats.ca [193.110.157.194]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx.nohats.ca (Postfix) with ESMTPS; Tue, 14 Feb 2023 01:05:12 +0100 (CET)
Received: by bofh.nohats.ca (Postfix, from userid 1000) id BEADC78FA31; Mon, 13 Feb 2023 19:05:11 -0500 (EST)
Received: from localhost (localhost [127.0.0.1]) by bofh.nohats.ca (Postfix) with ESMTP id BC72578FA30; Mon, 13 Feb 2023 19:05:11 -0500 (EST)
Date: Mon, 13 Feb 2023 19:05:11 -0500
From: Paul Wouters <paul@nohats.ca>
To: Peter Gutmann <pgut001@cs.auckland.ac.nz>
cc: Werner Koch <wk@gnupg.org>, "openpgp@ietf.org" <openpgp@ietf.org>
In-Reply-To: <SY4PR01MB6251048223366D25E14FF34FEEDE9@SY4PR01MB6251.ausprd01.prod.outlook.com>
Message-ID: <24d23b9f-50b4-0a80-d1a5-63b20c366a54@nohats.ca>
References: <SY4PR01MB6251048223366D25E14FF34FEEDE9@SY4PR01MB6251.ausprd01.prod.outlook.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="US-ASCII"; format="flowed"
Archived-At: <https://mailarchive.ietf.org/arch/msg/openpgp/5nvg9OWt--1_5KUk4KjscWIKt68>
Subject: Re: [openpgp] Weird OIDs in the 4880bis draft
X-BeenThere: openpgp@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/openpgp>, <mailto:openpgp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/openpgp/>
List-Post: <mailto:openpgp@ietf.org>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/openpgp>, <mailto:openpgp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 14 Feb 2023 00:05:21 -0000

On Fri, 10 Feb 2023, Peter Gutmann wrote:

> Werner Koch writes:
>
>> Actually rfc6637 allows the specification of curves using arbitrary OIDs.
>> FWIW:
>
> Yup, and the original from 2013 was:
>
> -- Snip --
>
>> For completeness, Crypto++ has a factory-like method that serves curves. The
>> curves are sorted by OID in the function, so Crypto++ would need an OID for
>> ed25519.
>
>  { 1 3 6 1 4 1 3029 1 5 1 } ed209^H^H5519
>
> You have been OIDed.  Go forth and encrypt.
>
> -- Snip --
>
> I picked a bit of random unused space, which in any case was for Ed25519 and
> not Curve25519, because there was nothing else available at the time and
> people needed something to play with.  It was never intended to be a
> permanent, standards-track value, it was something I made up (but from a space
> where it was guaranteed not to clash with anything) to help out folks who
> needed an OID.  Until someone pointed me at the RFC I had no idea it was still
> in use.
>
> We now have standard OIDs for this, they're in RFC 8410.  If there are
> implementations out there that use the made-up value then the RFC can include
> a note to say that for historical purposes implementations may encounter keys
> with the ... 1 5 1 OID, but new keys should use the standard OID.
>
> Peter.

Thanks for the clarification Peter.

I think we should use the new OIDs and mention the old OIDs in the draft
for backwards compatibility.

Paul