Re: [openpgp] 1PA3PC: first-party attested third-party certifications (making Key Server Prefs no-modify actionable)

Benjamin Kaduk <kaduk@mit.edu> Sat, 31 August 2019 06:04 UTC

Return-Path: <kaduk@mit.edu>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 619B9120091 for <openpgp@ietfa.amsl.com>; Fri, 30 Aug 2019 23:04:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level:
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HxTfRPbVXwrq for <openpgp@ietfa.amsl.com>; Fri, 30 Aug 2019 23:04:30 -0700 (PDT)
Received: from outgoing.mit.edu (outgoing-auth-1.mit.edu [18.9.28.11]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B19CD120059 for <openpgp@ietf.org>; Fri, 30 Aug 2019 23:04:30 -0700 (PDT)
Received: from kduck.mit.edu ([24.16.140.251]) (authenticated bits=56) (User authenticated as kaduk@ATHENA.MIT.EDU) by outgoing.mit.edu (8.14.7/8.12.4) with ESMTP id x7V64K6e012868 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Sat, 31 Aug 2019 02:04:23 -0400
Date: Sat, 31 Aug 2019 01:04:19 -0500
From: Benjamin Kaduk <kaduk@mit.edu>
To: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
Cc: openpgp@ietf.org, Heiko Stamer <HeikoStamer@gmx.net>
Message-ID: <20190831060419.GV84368@kduck.mit.edu>
References: <87tva1am9t.fsf@fifthhorseman.net>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <87tva1am9t.fsf@fifthhorseman.net>
User-Agent: Mutt/1.10.1 (2018-07-13)
Archived-At: <https://mailarchive.ietf.org/arch/msg/openpgp/SCNbm_hdnciMny9JNfCcSBL2Qk4>
Subject: Re: [openpgp] 1PA3PC: first-party attested third-party certifications (making Key Server Prefs no-modify actionable)
X-BeenThere: openpgp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/openpgp>, <mailto:openpgp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/openpgp/>
List-Post: <mailto:openpgp@ietf.org>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/openpgp>, <mailto:openpgp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 31 Aug 2019 06:04:34 -0000

On Wed, Aug 28, 2019 at 01:31:42AM -0400, Daniel Kahn Gillmor wrote:
> 
> This new proposal (diff for RFC 4880bis attached) claims subpacket
> codepoint 37 for shipping these attestations.  I've also put this
> proposal as a merge request here:
> https://gitlab.com/openpgp-wg/rfc4880bis/merge_requests/20

It looks like this is in an "IETF Review" registry; please please please
consider making a request for an RFC 7120 early allocation.
I know the risk is probably less of conflicting codepoint squatting in
openpgp than in TLS, but in TLS we managed to have *three* different
extensions squatting on the same codepoint, and it is pretty unpleasant to
resolve.

-Ben