[openpgp] OpenPGP sample artifacts [was: Re: reviewing sample v5 certificate: can't validate internal signatures]

Daniel Kahn Gillmor <dkg@fifthhorseman.net> Sat, 26 November 2022 08:36 UTC

Return-Path: <dkg@fifthhorseman.net>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CA697C1522B6 for <openpgp@ietfa.amsl.com>; Sat, 26 Nov 2022 00:36:16 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.303
X-Spam-Level:
X-Spam-Status: No, score=-6.303 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, RDNS_NONE=0.793, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=neutral reason="invalid (unsupported algorithm ed25519-sha256)" header.d=fifthhorseman.net header.b=2SH42srR; dkim=pass (2048-bit key) header.d=fifthhorseman.net header.b=V64tvvAC
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EZ6vslMpMgJd for <openpgp@ietfa.amsl.com>; Sat, 26 Nov 2022 00:36:11 -0800 (PST)
Received: from che.mayfirst.org (unknown [162.247.75.117]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BCD82C1522AD for <openpgp@ietf.org>; Sat, 26 Nov 2022 00:36:11 -0800 (PST)
DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/simple; d=fifthhorseman.net; i=@fifthhorseman.net; q=dns/txt; s=2019; t=1669451770; h=from : to : cc : subject : in-reply-to : references : date : message-id : mime-version : content-type : from; bh=U9AcZjGZBFkPqJQHKfjrIbT1EL6rusJKRXhfTXbOX5w=; b=2SH42srRmViRc1hBVvs+BDVVsnN2Ha0+FAcJRc8O+3s07IpjCdgdvg/BmwydUF5fLbkSk W3lSDwbWdmcOZakAQ==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=fifthhorseman.net; i=@fifthhorseman.net; q=dns/txt; s=2019rsa; t=1669451770; h=from : to : cc : subject : in-reply-to : references : date : message-id : mime-version : content-type : from; bh=U9AcZjGZBFkPqJQHKfjrIbT1EL6rusJKRXhfTXbOX5w=; b=V64tvvACcuS5Cf1zUInXWaB5bd3rm6XjFEIhqQ63e1hXK1H/Ij64fospmQlJvA9XqB4Yt fhg8bokLXitZ+JnxZE3o9ot3FW8SKYRejotcaXTxX7zKOU2iTofPO7unaLXhJumRajAyGZ4 mmP5RS8n9wLrVCqznIP+yR/SjyWWy7jJ1CmuM3WL54SuV4TkGVOw1zd0LIyoE5wVFgbSVHk g2H9PWJDq6dhLxh2RpI+iYjajEBbIeYMpUwWLwHYUL8zM/9/rpBWhrxKLIxy2r4u9EIOfKG Yl+F5Aa8zS73T30+Q71IkSNuNNgpuhrI8ZiHgd8yxm9yKfB8kGmEYS5AgUeA==
Received: from fifthhorseman.net (unknown [202.77.124.55]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) server-digest SHA384) (No client certificate requested) by che.mayfirst.org (Postfix) with ESMTPSA id AA1C1F9AD; Sat, 26 Nov 2022 03:36:09 -0500 (EST)
Received: by fifthhorseman.net (Postfix, from userid 1000) id 6E6022061A; Fri, 25 Nov 2022 21:59:23 -0500 (EST)
From: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
To: Daniel Huigens <d.huigens@protonmail.com>
Cc: openpgp@ietf.org
In-Reply-To: <LycMdjwdREeLhATHjLndoo5VK4tGazwTkOkvkfKh2N-DN9ub2XZvGIqhC2SWdFDp1rs7OnWJCgUONe8twZD-O3Uv9TYaR2wNNVHbQgV7mfY=@protonmail.com>
References: <87sfifzp3a.fsf@fifthhorseman.net> <d00SL5PjvNYlsflHLLYPyh1E_JPpIUltjQCBB4HyeITSpCR8_g-4jNZsYJPUf2CZVrkaicEesXZNFf1UDe8-z9z48IR1FGGZIObq2ZHpsfE=@protonmail.com> <874junuqb4.fsf@fifthhorseman.net> <LycMdjwdREeLhATHjLndoo5VK4tGazwTkOkvkfKh2N-DN9ub2XZvGIqhC2SWdFDp1rs7OnWJCgUONe8twZD-O3Uv9TYaR2wNNVHbQgV7mfY=@protonmail.com>
Autocrypt: addr=dkg@fifthhorseman.net; prefer-encrypt=mutual; keydata= mDMEX+i03xYJKwYBBAHaRw8BAQdACA4xvL/xI5dHedcnkfViyq84doe8zFRid9jW7CC9XBiI0QQf FgoAgwWCX+i03wWJBZ+mAAMLCQcJEOCS6zpcoQ26RxQAAAAAAB4AIHNhbHRAbm90YXRpb25zLnNl cXVvaWEtcGdwLm9yZ/tr8E9NA10HvcAVlSxnox6z62KXCInWjZaiBIlgX6O5AxUKCAKbAQIeARYh BMKfigwB81402BaqXOCS6zpcoQ26AADZHQD/Zx9nc3N2kj13AUsKMr/7zekBtgfSIGB3hRCU74Su G44A/34Yp6IAkndewLxb1WdRSokycnaCVyrk0nb4imeAYyoPtBc8ZGtnQGZpZnRoaG9yc2VtYW4u bmV0PojRBBMWCgCDBYJf6LTfBYkFn6YAAwsJBwkQ4JLrOlyhDbpHFAAAAAAAHgAgc2FsdEBub3Rh dGlvbnMuc2VxdW9pYS1wZ3Aub3JnL0Gwxvypz2tu1IPG+yu1zPjkiZwpscsitwrVvzN3bbADFQoI ApsBAh4BFiEEwp+KDAHzXjTYFqpc4JLrOlyhDboAAPkXAP0Z29z7jW+YzLzPTQML4EQLMbkHOfU4 +s+ki81Czt0WqgD/SJ8RyrqDCtEP8+E4ZSR01ysKqh+MUAsTaJlzZjehiQ24MwRf6LTfFgkrBgEE AdpHDwEBB0DkKHOW2kmqfAK461+acQ49gc2Z6VoXMChRqobGP0ubb4kBiAQYFgoBOgWCX+i03wWJ BZ+mAAkQ4JLrOlyhDbpHFAAAAAAAHgAgc2FsdEBub3RhdGlvbnMuc2VxdW9pYS1wZ3Aub3Jnfvo+ nHoxDwaLaJD8XZuXiaqBNZtIGXIypF1udBBRoc0CmwICHgG+oAQZFgoAbwWCX+i03wkQPp1xc3He VlxHFAAAAAAAHgAgc2FsdEBub3RhdGlvbnMuc2VxdW9pYS1wZ3Aub3JnaheiqE7Pfi3Atb3GGTw+ jFcBGOaobgzEJrhEuFpXREEWIQQttUkcnfDcj0MoY88+nXFzcd5WXAAAvrsBAIJ5sBg8Udocv25N stN/zWOiYpnjjvOjVMLH4fV3pWE1AP9T6hzHz7hRnAA8d01vqoxOlQ3O6cb/kFYAjqx3oMXSBhYh BMKfigwB81402BaqXOCS6zpcoQ26AADX7gD/b83VObe14xrNP8xcltRrBZF5OE1rQSPkMNy+eWpk eCwA/1hxiS8ZxL5/elNjXiWuHXEvUGnRoVj745Vl48sZPVYMuDgEX+i03xIKKwYBBAGXVQEFAQEH QIGex1WZbH6xhUBve5mblScGYU+Y8QJOomXH+rr5tMsMAwEICYjJBBgWCgB7BYJf6LTfBYkFn6YA CRDgkus6XKENukcUAAAAAAAeACBzYWx0QG5vdGF0aW9ucy5zZXF1b2lhLXBncC5vcmcEAx9vTD3b J0SXkhvcRcCr6uIDJwic3KFKxkH1m4QW0QKbDAIeARYhBMKfigwB81402BaqXOCS6zpcoQ26AAAX mwD8CWmukxwskU82RZLMk5fm1wCgMB5z8dA50KLw3rgsCykBAKg1w/Y7XpBS3SlXEegIg1K1e6dR fRxL7Z37WZXoH8AH
Date: Fri, 25 Nov 2022 21:59:20 -0500
Message-ID: <87sfi6to8n.fsf@fifthhorseman.net>
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=-=-="; micalg="pgp-sha256"; protocol="application/pgp-signature"
Archived-At: <https://mailarchive.ietf.org/arch/msg/openpgp/ZTEwFGvfTXOsXgeyc6vBiGT8TLY>
Subject: [openpgp] OpenPGP sample artifacts [was: Re: reviewing sample v5 certificate: can't validate internal signatures]
X-BeenThere: openpgp@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/openpgp>, <mailto:openpgp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/openpgp/>
List-Post: <mailto:openpgp@ietf.org>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/openpgp>, <mailto:openpgp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 26 Nov 2022 08:36:16 -0000

On Fri 2022-11-25 15:44:23 +0000, Daniel Huigens wrote:
> While we're at it, it may be useful to have an example with a Padding
> packet, perhaps. (We haven't implemented that yet, though, but I guess
> it shouldn't be much work.) And, maybe also an example Curve448 key?
> (That might be a bit more work, though :').)

I can imagine a good appendix that offers several sample objects,
similar to draft-bre-openpgp-samples, but using all the new features.

I don't want us to block the RFC on a full and exhaustive bestiary
(that's more of a job for the interop test suite, i think), but I
encourage anyone who wants to offer something narrow, simple, and useful
to suggest the objects.

While a sample Curve448 key looks like it would be useful, i think that
a more important sample might be the exact same Transferable Secret Key
that we already have, but with both pieces of secret key material locked
with a simple passphrase using Argon2 as s2k and AEAD for encrypting the
secret material.  That way, an implementer can compare the locked key
with the unlocked version.

But again, i wouldn't block the RFC on either of those artifacts --
they're just things that all implementations will need to have access to
sooner or later.

     --dkg