[openpgp] Matters arising from IETF-121 re draft-replacementkey
Andrew Gallagher <andrewg@andrewg.com> Tue, 19 November 2024 20:16 UTC
Return-Path: <andrewg@andrewg.com>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 06E3DC1ECA94 for <openpgp@ietfa.amsl.com>; Tue, 19 Nov 2024 12:16:48 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.104
X-Spam-Level:
X-Spam-Status: No, score=-2.104 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=andrewg.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IMaeuGvjFTpH for <openpgp@ietfa.amsl.com>; Tue, 19 Nov 2024 12:16:43 -0800 (PST)
Received: from fum.andrewg.com (fum.andrewg.com [135.181.198.78]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4F374C1F5889 for <openpgp@ietf.org>; Tue, 19 Nov 2024 12:16:30 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=andrewg.com; s=andrewg-com; t=1732047388; bh=Nxk/C3pY3vBDep4wqxb50Ys20e4UGhJM4GWpvHL+C6U=; h=Subject:From:In-Reply-To:Date:Cc:References:To:From; b=aL+FAniaLh6tA1H02ClEgb2i2mVQLdUcupvIeuvvE61fvv7GNW9xsc+r+P0FJ67qx UUKbli6PIm5FXPwLWqk+OhFFhfn4S65odEb29KOJejHRgFJ/hSftboprkR1D+Sba4L dkj49l3QkFTH8gEYZMlNzf1Jkh2vpfU0L5nIaYb+sf0oG8TDcgCXnHioFUX8mxMLbf ABc9Q2f9F85URU3hh0nePMlszsLmum7oO4lv4V1bcgJ8j9MYgndhoE36TahoTUJCOj fGzzg/gx2riwUNDkYihlDZEYBqufh8mjh74Nnk0LQBtOyuG1GUf5D9R3nRoCwS6cyP W2/rW07dKj+jg==
Received: from smtpclient.apple (serenity [IPv6:fc93:5820:7349:eda2:99a7::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by fum.andrewg.com (Postfix) with ESMTPSA id 7010E5E5FA; Tue, 19 Nov 2024 20:16:28 +0000 (UTC)
Content-Type: multipart/signed; boundary="Apple-Mail=_157B9EC9-7C25-425A-87AA-C428613EC53E"; protocol="application/pgp-signature"; micalg="pgp-sha512"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3731.700.6.1.2\))
From: Andrew Gallagher <andrewg@andrewg.com>
In-Reply-To: <d0ec517e-53d2-4bb9-ae71-f6a7eef50529@cs.tcd.ie>
Date: Tue, 19 Nov 2024 20:15:56 +0000
Message-Id: <2A6F2C41-A2AA-4153-BA48-5FF4723B4AEC@andrewg.com>
References: <d0ec517e-53d2-4bb9-ae71-f6a7eef50529@cs.tcd.ie>
To: Stephen Farrell <stephen.farrell@cs.tcd.ie>
X-Mailer: Apple Mail (2.3731.700.6.1.2)
Message-ID-Hash: DMSG5Z6VQKZR6ZR32NFC6VEVNQ4DYBAC
X-Message-ID-Hash: DMSG5Z6VQKZR6ZR32NFC6VEVNQ4DYBAC
X-MailFrom: andrewg@andrewg.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-openpgp.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: "openpgp@ietf.org" <openpgp@ietf.org>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [openpgp] Matters arising from IETF-121 re draft-replacementkey
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/openpgp/TYFcl1crW-ufOlj5NkHkRf1d_gc>
List-Archive: <https://mailarchive.ietf.org/arch/browse/openpgp>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Owner: <mailto:openpgp-owner@ietf.org>
List-Post: <mailto:openpgp@ietf.org>
List-Subscribe: <mailto:openpgp-join@ietf.org>
List-Unsubscribe: <mailto:openpgp-leave@ietf.org>
On 19 Nov 2024, at 18:05, Stephen Farrell <stephen.farrell@cs.tcd.ie> wrote: > > [1] https://datatracker.ietf.org/doc/minutes-121-openpgp-202411070930/ Thanks, Stephen! There are some outstanding items for draft-replacementkey arising from the minutes. I’ll summarise them below: 1. It was decided to remove the reference to the Preferred Keyserver subpacket - this will be removed from the next draft unless anyone objects before Friday. [1] 2. It was also indicated that there was no consensus in favour of changing the format of the Target Record, which is currently: ( Record Length || Target Key Version || Target Key Fingerprint || Target Key Imprint ) Unless there is a rough consensus otherwise on the list, this will stay as is. 3. The name of the draft (and potentially the subpacket). Several people have indicated that they wish to change it to “Certificate Replacement”. I’m personally not in favour of this because I think it is imprecise — it is already possible to “replace" a certificate with a modified one that shares the same primary key, while this mechanism is only useful for certificate replacement that also includes primary key replacement. As a counter-proposal, I would suggest “Primary Key Replacement”, which I believe describes more precisely what exactly is achieved by the mechanism. I know Justus doesn’t like it, but I’d like to hear some other opinions, either way. :-) 4. There is also one other item which we mentioned at the interim but is not in the minutes, which is whether to include an “encrypt to all equivalent keys” mechanism. I am reluctant to do this as it is a significant expansion of scope. As a counter-proposal, we could instead invert the meaning of the following text in the draft: > An implementation that encounters a class octet that has other bits set MUST disregard that Replacement Key subpacket. This text is included so that we can make breaking changes to the packet format in the future while preventing misinterpretation by legacy software. This would however prevent us from adding an optional flag in the future that indicated encryption preference - this would be a non-breaking change where the new flag SHOULD be ignored, rather than invalidating the subpacket (which the current text states). Inverting this text would allow us to specify such a mechanism in a later draft, at the cost of requiring us to use a new subpacket type if we were ever to make a breaking change to the wire format. [2] So would the counter-proposal be acceptable? If so, we should be able to finalise the wire format of the draft this week. Comments welcome! Thanks, Andrew. [1] https://gitlab.com/andrewgdotcom/openpgp-replacementkey/-/merge_requests/15/diffs [2] https://gitlab.com/andrewgdotcom/openpgp-replacementkey/-/issues/14#note_2218974758
- [openpgp] draft minutes for IETF-121 session Stephen Farrell
- [openpgp] Matters arising from IETF-121 re draft-… Andrew Gallagher
- [openpgp] Re: draft minutes for IETF-121 session Andrew Gallagher
- [openpgp] Re: Matters arising from IETF-121 re dr… Andrew Gallagher