[openpgp] Re: Encryption subkey selection
Daniel Huigens <d.huigens@protonmail.com> Wed, 09 April 2025 09:28 UTC
Return-Path: <d.huigens@protonmail.com>
X-Original-To: openpgp@mail2.ietf.org
Delivered-To: openpgp@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id ED30719720DD for <openpgp@mail2.ietf.org>; Wed, 9 Apr 2025 02:28:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.096
X-Spam-Level:
X-Spam-Status: No, score=-2.096 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=protonmail.com
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id repC5hK_BS_p for <openpgp@mail2.ietf.org>; Wed, 9 Apr 2025 02:28:09 -0700 (PDT)
Received: from mail-24418.protonmail.ch (mail-24418.protonmail.ch [109.224.244.18]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id 5FA0919720D1 for <openpgp@ietf.org>; Wed, 9 Apr 2025 02:28:09 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=protonmail.com; s=protonmail3; t=1744190887; x=1744450087; bh=7OpgK0vcxAIezu3SwueS5gdYwRLY4gcjjMh57Os7wD0=; h=Date:To:From:Cc:Subject:Message-ID:In-Reply-To:References: Feedback-ID:From:To:Cc:Date:Subject:Reply-To:Feedback-ID: Message-ID:BIMI-Selector:List-Unsubscribe:List-Unsubscribe-Post; b=W910Xk18YcpcYt/DhUcuscf/x8ZIQAfRGvBU+Ek5+e68ZKed3OeIl74bHuhl2x7C/ qLC8DGJHKID0eF/JijEKmM4ih/MrWq/0ePRlyDpu3RQUEFLPQ/PmSGsoJGXIN93Rfk jQHR1ZfQpwVR3/4guuhhdQXo2/WKgr2BX1FeCV1GEBhfs8TQbnldxv+lX55jgpsTMy mtG6JDu52TPuFH00ofbco7oFsloj/k50zfjZbKi7n0b8SwPEqchvXqvgvgr01fhTcr +uYviozM4wmKR41UX+olLRQ0udSYHcotJ4EGtaMawl9fhn6j2B6RhSCyU0p3Gab9pl eFB/dcaZqqppw==
Date: Wed, 09 Apr 2025 09:28:03 +0000
To: Falko Strenzke <falko.strenzke@mtg.de>
From: Daniel Huigens <d.huigens@protonmail.com>
Message-ID: <yV2spuz8ZDABNnxVp-miI969S1U_Rk22qGYrIr0LUdLl4Wx2Y0YP4oZJkBTW_Y-zQKGE-c2128Fmg9BQApbypEZxMYcPLKxnGr6-s-uxDS0=@protonmail.com>
In-Reply-To: <301ff73c-fd6f-43e4-beb0-ecfdc8fc3c3e@mtg.de>
References: <87h631mvol.fsf@thinbox> <dI4YtuyWCyCqKizRafc2sNHBFSRSuQEt-03l8CBI-bRD4SPN7701nRDLFYtu0hwve96cG3Q4kIglx6oVTIAiJbVJseQRzLrt2AoKpSLes28=@protonmail.com> <301ff73c-fd6f-43e4-beb0-ecfdc8fc3c3e@mtg.de>
Feedback-ID: 2934448:user:proton
X-Pm-Message-ID: 6f54e05b5dba73984853de8268f7abb8dc93db6d
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="b1=_ZKrjW1SG9u68djHt3x38KMNPfefAeY6Wiq18Qorvg"
Message-ID-Hash: RS7GWHC37J5JWZ7ZOZMH5LHFMEGKVEM7
X-Message-ID-Hash: RS7GWHC37J5JWZ7ZOZMH5LHFMEGKVEM7
X-MailFrom: d.huigens@protonmail.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-openpgp.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: Justus Winter <justus@sequoia-pgp.org>, openpgp@ietf.org
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [openpgp] Re: Encryption subkey selection
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/openpgp/H2fmmNXe_iVY908gccI7yHqeoJ4>
List-Archive: <https://mailarchive.ietf.org/arch/browse/openpgp>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Owner: <mailto:openpgp-owner@ietf.org>
List-Post: <mailto:openpgp@ietf.org>
List-Subscribe: <mailto:openpgp-join@ietf.org>
List-Unsubscribe: <mailto:openpgp-leave@ietf.org>
Hi Falko, I left the exact algorithm a bit open as IMO it's up for debate and also depends on which variant we go with from the ones I proposed (if any). In the first & simplest variant, I imagined it would be something like: - for each certificate I have, in the order given by the RKS or an implementation-defined order (e.g. newest first): - if the certificate contains an encryption subkey that I can use: - encrypt to all valid encryption subkeys that I can use - return This changes the behavior even in the single-certificate case, but matches what Sequoia already does in that case. If you don't like that behavior you might like the one below more. (It also doesn't properly handle the case where e.g. the first certificate contains an ML-KEM-768 and an ML-KEM-1024 subkey, each for a different device, and I only support ML-KEM-768, for example. But as I wrote before I think that's a silly thing to do as you don't gain security from using ML-KEM-1024 on one of the devices if the sender is always going to use ML-KEM-768 to encrypt as well.) In the last & most flexible variant I imagined it would be something like: - for each certificate I have, in the order given by the RKS or an implementation-defined order (e.g. newest first): - if the certificate says that it wants all encryption subkeys to be used: - if the certificate contains only encryption subkeys that I can use: - encrypt to all of them - return - else if this is the last certificate I have: - encrypt to all encryption subkeys that I can use - return - else: - if the certificate contains an encryption subkey that I can use: - encrypt to it - return That way, in both cases, there are no new failure modes introduced that there weren't before (which I agree is important). Just FWIW, I also want to point out that while it's obvious that the second one covers more use cases than the first one, IMHO we also need to keep in mind the effort it will take to test all code paths, make sure all implementations are consistent in every case, and so on. The more complex an algorithm we propose, the more difficult that will be. So I hope we can find the simplest algorithm that covers all cases that we think are absolutely necessary :) Best, Daniel On Wednesday, April 9th, 2025 at 08:33, Falko Strenzke <falko.strenzke@mtg.de> wrote: > Hi Daniel, > > I am not entirely sure what exact algorithm you are proposing for encryption key selection. Do you mean this? > > - if certificate has replacement key subpacket pointing to a further certificate > > - while have certificates to select, process next certificate in sequence > > - if certificate contains only encryption subkeys that I can use: > > - encrypt to all of them > - return > > - fail to encrypt (⁕) > > - else: > > - encrypt to whatever subset of encryption keys the user or implementation prefers > > That would mean that the including a replacement key subpacket (RKS) pointing to the previous key would imply that all the encryption subkeys of the certificate should be used in parallel, whereas where the subpacket is absent, the sending implementation is free to choose any set of subkeys. I am not sure if everyone who will include an RKS to point to a previous key want this behaviour. This would also retroactively change the behaviour for the certificate pointed to, which possibly was created without the assumption that all encryption subkeys should be used in parallel. It would introduce a new failure case also. Or should the last step in the outer if-clause (⁕) be: “choose one certificate and encrypt to as many of it’s subkeys as possible”? > > And do you mean that multiple certificates of the same recipient should be handled in this way in any case (where the ordering would have to be determined somehow), or only in the case that they are linked by the RKS? > > Best regards, > Falko > > Am 08.04.25 um 20:06 schrieb Daniel Huigens: > >> Hi Justus & all, >> >> I agree that it would be good to reach a consensus on this, and that >> if we assume that we want to support one-subkey-per-device setups >> (e.g. for use with integrated HSMs, to be able to generate a key >> on each of your devices in hardware), which seemed to be the >> conclusion from the multi-device session at the summit, >> then we probably need some mechanism for that. >> >> _However_, I want to raise one specific potential solution that >> Patrick Brunschwig proposed in that session, which is a variant of >> "List of sets of subkeys", but rather than introducing some new >> encoding for this, we could simply say: each certificate is such >> a list of subkeys. In other words, we pick the first certificate, >> see if it's usable, if so use all valid encryption subkeys in that >> certificate. If not, try the next certificate. And so on. >> >> This means that, to migrate to a new encryption algorithm, you also >> need to generate a new certificate. Often we want to do that anyway: >> in the migration from RSA to ECC, and ECC to PQC, we've introduced >> both new encryption algorithms and new signing algorithms. >> >> I know this goes a bit against what I've said previously and also >> conflicts with the concept of "certificate equivalence" in the >> key replacement draft (because multiple subkeys across linked certs >> would then not behave the same as multiple subkeys in a single cert). >> _But_ if we all agree that we need some mechanism for this then >> I think it's best to pick the simplest possible mechanism. >> >> --- >> >> Alternatively, as an intermediary solution, we could have a single >> _per-certificate_ flag which says: please use all valid encryption >> keys in this certificate. (And potentially also: if you don't >> understand all encryption subkeys, please use the fallback >> certificate instead, if there is one. That being said, I think >> it would be a bit silly and a very niche edge case if you want >> to e.g. use a mix of ML-KEM-768 and ML-KEM-1024 subkeys in >> your latest cert, _especially_ you're going to ask the sender >> to encrypt to all of them, as then there's no security advantage >> to using ML-KEM-1024 in one/some of the subkeys). >> >> That way, we could keep the existing behavior for a single cert, >> if needed (so that you could still do a encryption algorithm >> migration within a single cert if you only have a single device), >> but could opt-in to the new behavior (from our perspective; >> obviously for Sequoia it'd be the other way around) if you have >> multiple devices. >> >> The only thing you then can't do is an encryption(-only) algorithm >> migration within a single certificate with per-device subkeys. >> But, that kinda seems like an edge case within an edge case.. >> >> Best, >> Daniel >> >> _______________________________________________ >> openpgp mailing list -- >> openpgp@ietf.org >> To unsubscribe send an email to >> openpgp-leave@ietf.org > > -- > > MTG AG > Dr. Falko Strenzke > > Phone: +49 6151 8000 24 > E-Mail: falko.strenzke@mtg.de > Web: [mtg.de](https://www.mtg.de) > > --------------------------------------------------------------- > > MTG AG - Dolivostr. 11 - 64293 Darmstadt, Germany > Commercial register: HRB 8901 > Register Court: Amtsgericht Darmstadt > Management Board: Jürgen Ruf (CEO), Tamer Kemeröz > Chairman of the Supervisory Board: Dr. Thomas Milde > > This email may contain confidential and/or privileged information. If you are not the correct recipient or have received this email in error, > please inform the sender immediately and delete this email.Unauthorised copying or distribution of this email is not permitted. > > Data protection information: [Privacy policy](https://www.mtg.de/en/privacy-policy)
- [openpgp] Encryption subkey selection Justus Winter
- [openpgp] Re: Encryption subkey selection Andrew Gallagher
- [openpgp] Re: Encryption subkey selection Falko Strenzke
- [openpgp] Re: Encryption subkey selection Bart Butler
- [openpgp] Re: Encryption subkey selection Falko Strenzke
- [openpgp] Re: Encryption subkey selection Andrew Gallagher
- [openpgp] Re: Encryption subkey selection Falko Strenzke
- [openpgp] Re: Encryption subkey selection Daniel Huigens
- [openpgp] Re: Encryption subkey selection Falko Strenzke
- [openpgp] Re: Encryption subkey selection Daniel Huigens
- [openpgp] Re: Encryption subkey selection Andrew Gallagher
- [openpgp] Re: Encryption subkey selection Falko Strenzke
- [openpgp] Re: Encryption subkey selection Falko Strenzke
- [openpgp] Re: Encryption subkey selection Andrew Gallagher
- [openpgp] Re: Encryption subkey selection Justus Winter
- [openpgp] Re: Encryption subkey selection Daniel Huigens
- [openpgp] Re: Encryption subkey selection Daniel Kahn Gillmor
- [openpgp] Re: Encryption subkey selection Falko Strenzke
- [openpgp] Re: Encryption subkey selection Daniel Huigens
- [openpgp] Re: Encryption subkey selection Daniel Huigens
- [openpgp] Re: Encryption subkey selection Johannes Roth
- [openpgp] Re: Encryption subkey selection Daniel Huigens