[openpgp] Working Group reportback from IETF 110

Daniel Kahn Gillmor <dkg@fifthhorseman.net> Mon, 15 March 2021 23:38 UTC

Return-Path: <dkg@fifthhorseman.net>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 860AE3A1301 for <openpgp@ietfa.amsl.com>; Mon, 15 Mar 2021 16:38:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.306
X-Spam-Level:
X-Spam-Status: No, score=-1.306 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RDNS_NONE=0.793, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=neutral reason="invalid (unsupported algorithm ed25519-sha256)" header.d=fifthhorseman.net header.b=HgqV4pGB; dkim=pass (2048-bit key) header.d=fifthhorseman.net header.b=RfZvPIDt
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LH3WjmFS2SeB for <openpgp@ietfa.amsl.com>; Mon, 15 Mar 2021 16:38:38 -0700 (PDT)
Received: from che.mayfirst.org (unknown [162.247.75.117]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B7B6D3A12FF for <openpgp@ietf.org>; Mon, 15 Mar 2021 16:38:38 -0700 (PDT)
DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/simple; d=fifthhorseman.net; i=@fifthhorseman.net; q=dns/txt; s=2019; t=1615851518; h=from : to : subject : date : message-id : mime-version : content-type : from; bh=2OYCrQUIUyeLINjgMUwbGbDlJcrIv+xbdRe3Qs4rosg=; b=HgqV4pGBNz0QIOD7leW0VevmguL1wo7pDZLTIXzzzde9OHygg+n1geCCgf4F0soFBrtxd FMy5498JkpXoE1SAw==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=fifthhorseman.net; i=@fifthhorseman.net; q=dns/txt; s=2019rsa; t=1615851518; h=from : to : subject : date : message-id : mime-version : content-type : from; bh=2OYCrQUIUyeLINjgMUwbGbDlJcrIv+xbdRe3Qs4rosg=; b=RfZvPIDtECpSb8QsKNUyMcWRK97zuYRAm6T9EjeLxOZgF0nr4bN74FPTLVhjzOcZNztkX L5/Ch8/o1p9icTzQBv5nti3qLekJn9xFdm/nSuZlAmny3zi6oFavMUuv3yMlC9amDDtzeZ5 GytOS2l09CeALCkq9idn2qYHtIiXVc6xN/f1Nof7XBEzeyD+ZcQdcTiJ06xlNwXBhYnBy4f a672srv3Qy//ROkCht9PVJqt3xiSprr7Y83fuit1h3TLdZFjBLvjaEJt/MIE7h9lDbrLfH5 zJAfBNNO/Y2tRcbVjPQW76r7FFgiI3nc5ZJZGb+onFK232yuJemTblGxgy3A==
Received: from fifthhorseman.net (unknown [IPv6:2001:470:1f07:60d:841d:2bce:26c3:59c6]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits)) (No client certificate requested) by che.mayfirst.org (Postfix) with ESMTPSA id 0A408F9A6 for <openpgp@ietf.org>; Mon, 15 Mar 2021 19:38:38 -0400 (EDT)
Received: by fifthhorseman.net (Postfix, from userid 1000) id 83C8E2032E; Mon, 15 Mar 2021 19:38:35 -0400 (EDT)
From: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
To: openpgp@ietf.org
Autocrypt: addr=dkg@fifthhorseman.net; prefer-encrypt=mutual; keydata= mDMEX+i03xYJKwYBBAHaRw8BAQdACA4xvL/xI5dHedcnkfViyq84doe8zFRid9jW7CC9XBiI0QQf FgoAgwWCX+i03wWJBZ+mAAMLCQcJEOCS6zpcoQ26RxQAAAAAAB4AIHNhbHRAbm90YXRpb25zLnNl cXVvaWEtcGdwLm9yZ/tr8E9NA10HvcAVlSxnox6z62KXCInWjZaiBIlgX6O5AxUKCAKbAQIeARYh BMKfigwB81402BaqXOCS6zpcoQ26AADZHQD/Zx9nc3N2kj13AUsKMr/7zekBtgfSIGB3hRCU74Su G44A/34Yp6IAkndewLxb1WdRSokycnaCVyrk0nb4imeAYyoPtBc8ZGtnQGZpZnRoaG9yc2VtYW4u bmV0PojRBBMWCgCDBYJf6LTfBYkFn6YAAwsJBwkQ4JLrOlyhDbpHFAAAAAAAHgAgc2FsdEBub3Rh dGlvbnMuc2VxdW9pYS1wZ3Aub3JnL0Gwxvypz2tu1IPG+yu1zPjkiZwpscsitwrVvzN3bbADFQoI ApsBAh4BFiEEwp+KDAHzXjTYFqpc4JLrOlyhDboAAPkXAP0Z29z7jW+YzLzPTQML4EQLMbkHOfU4 +s+ki81Czt0WqgD/SJ8RyrqDCtEP8+E4ZSR01ysKqh+MUAsTaJlzZjehiQ24MwRf6LTfFgkrBgEE AdpHDwEBB0DkKHOW2kmqfAK461+acQ49gc2Z6VoXMChRqobGP0ubb4kBiAQYFgoBOgWCX+i03wWJ BZ+mAAkQ4JLrOlyhDbpHFAAAAAAAHgAgc2FsdEBub3RhdGlvbnMuc2VxdW9pYS1wZ3Aub3Jnfvo+ nHoxDwaLaJD8XZuXiaqBNZtIGXIypF1udBBRoc0CmwICHgG+oAQZFgoAbwWCX+i03wkQPp1xc3He VlxHFAAAAAAAHgAgc2FsdEBub3RhdGlvbnMuc2VxdW9pYS1wZ3Aub3JnaheiqE7Pfi3Atb3GGTw+ jFcBGOaobgzEJrhEuFpXREEWIQQttUkcnfDcj0MoY88+nXFzcd5WXAAAvrsBAIJ5sBg8Udocv25N stN/zWOiYpnjjvOjVMLH4fV3pWE1AP9T6hzHz7hRnAA8d01vqoxOlQ3O6cb/kFYAjqx3oMXSBhYh BMKfigwB81402BaqXOCS6zpcoQ26AADX7gD/b83VObe14xrNP8xcltRrBZF5OE1rQSPkMNy+eWpk eCwA/1hxiS8ZxL5/elNjXiWuHXEvUGnRoVj745Vl48sZPVYMuDgEX+i03xIKKwYBBAGXVQEFAQEH QIGex1WZbH6xhUBve5mblScGYU+Y8QJOomXH+rr5tMsMAwEICYjJBBgWCgB7BYJf6LTfBYkFn6YA CRDgkus6XKENukcUAAAAAAAeACBzYWx0QG5vdGF0aW9ucy5zZXF1b2lhLXBncC5vcmcEAx9vTD3b J0SXkhvcRcCr6uIDJwic3KFKxkH1m4QW0QKbDAIeARYhBMKfigwB81402BaqXOCS6zpcoQ26AAAX mwD8CWmukxwskU82RZLMk5fm1wCgMB5z8dA50KLw3rgsCykBAKg1w/Y7XpBS3SlXEegIg1K1e6dR fRxL7Z37WZXoH8AH
Date: Mon, 15 Mar 2021 19:38:34 -0400
Message-ID: <87o8fk6l8l.fsf@fifthhorseman.net>
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=-=-="; micalg="pgp-sha256"; protocol="application/pgp-signature"
Archived-At: <https://mailarchive.ietf.org/arch/msg/openpgp/J9BtKaoShzB6B6igkBkMjrda0Is>
Subject: [openpgp] Working Group reportback from IETF 110
X-BeenThere: openpgp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/openpgp>, <mailto:openpgp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/openpgp/>
List-Post: <mailto:openpgp@ietf.org>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/openpgp>, <mailto:openpgp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 15 Mar 2021 23:38:41 -0000

Thanks to everyone who joined the OpenPGP Working Group last week at
IETF 110.  We had a packed agenda, with not a lot of time for extra
discussion.  Below is the report i sent to the SAAG list:

----
  We discussed attacks against secret key material that are facilitated by
  corruption of the associated public keys.  This is research work by
  Bruseghini, Paterson, and Huigens.

  We also had a presentation of the OpenPGP Interoperability Test Suite by
  Winter, identifying places where interoperability is solid, and places
  where more guidance is likely to be needed.  See
  https://tests.sequoia-pgp.org/ for more detail from this ongoing
  project.

  Finally, Niibe presented some of the historical warts of ECC wire
  representation within OpenPGP, and proposed an argument for a
  normalization of ECC representation for future curves, including CFRG's
  "heavy-duty" curve Curve448.
----

The minutes for the 110 meeting can be found at
https://datatracker.ietf.org/doc/minutes-110-openpgp/ and are reproduced
here as well (thanks to Yoav Nir for taking the minutes).

The XMPP room openpgp@jabber.ietf.org was logged during the meeting
here:

https://www.ietf.org/jabber/logs/openpgp@jabber.ietf.org/2021-03-11.html

---------------
## OpenPGP Session @ IETF 110
2021-03-11 14:30:00 to 15:30:00 UTC

Stephen Farrell and DKG chairing.

Note Well was projected.

No agenda bashing. Will go over github issues (with Paul W) if time permits.

DKG went over the process for rfc4880bis. Using gitlab.
Stephen: Looking to do that (work on the crypto refresh draft) in interim
meetings. Not open for new ideas at this time.

----

## Lara Bruseghini presenting Key Extraction Attacks through Encrypted Private
Key Corruption Stephen Farrell: When will we see the results? Lara: Don't know
yet. Kirsty Paine: Did you report the vulnerabilities (found in two apps) Lara:
Yes. We contacted them. They've been fixed a few months ago. Kenny Paterson: We
did responsible disclosure. All libraries we found were patched.

----

## Justus Winter on A Common OpenPGP Interoperability Test Suite
DKG (no relation to the dkgpg library): Thanks for the presentation and the
work. ### No other questions

----

## NIIBE Yutaka on SOS (Simple Octet String)
### [representing new ECC in OpenPGP]
PHB: Can also use a random seed + a per-algorithms key generation mechanism. If
we adopted that, you push the onus of tagging and bagging on the algorithm
creators. DKG: That has serious interop / legacy issues with deployed clients.
PHB: Yes, but this solution is good for the next set of curves.

----

## Open Issues (with the draft)
Paul Wouters: pulling in a lot of issues. 3DES is still a MUST because we
didn't get to this section yet. Presenting the parts in small chunks to the WG.
Re-confirmed the consensus on the items. DKG: Can follow up now or on the list.
Paul W: If we have a new way for new curves, should discuss it soon, because
we're going to do that part soon. Stephen Farrell: Think we want 1 or 2
interims between now and 111.  Willl do Doodle polls on the list.

DKG: Hoping to get more people to give feedback on the list.
Stephen Farrell: Good night.

### Session ended
-------------------

Regards,

        --dkg