Re: [openpgp] Guidance for Designated Expert?
Daniel Kahn Gillmor <dkg@fifthhorseman.net> Tue, 07 February 2023 21:36 UTC
Return-Path: <dkg@fifthhorseman.net>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 88F60C1524B4 for <openpgp@ietfa.amsl.com>; Tue, 7 Feb 2023 13:36:35 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.796
X-Spam-Level:
X-Spam-Status: No, score=-2.796 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=neutral reason="invalid (unsupported algorithm ed25519-sha256)" header.d=fifthhorseman.net header.b="0kxbkfe2"; dkim=pass (2048-bit key) header.d=fifthhorseman.net header.b="qjEDIber"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4n1f7CY9ekRX for <openpgp@ietfa.amsl.com>; Tue, 7 Feb 2023 13:36:30 -0800 (PST)
Received: from che.mayfirst.org (che.mayfirst.org [IPv6:2001:470:1:116::7]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CD5E7C1524AC for <openpgp@ietf.org>; Tue, 7 Feb 2023 13:36:30 -0800 (PST)
DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/simple; d=fifthhorseman.net; i=@fifthhorseman.net; q=dns/txt; s=2019; t=1675805788; h=from : to : subject : in-reply-to : references : date : message-id : mime-version : content-type : from; bh=fo4pu2CasQH/DeBkP2mBwgvkQAmqWGBAuRJku1Nhi3g=; b=0kxbkfe2nlxzFCluWshN4L6zLchVML2W/YxBRHsjmomir1xMbDwRtQEKO5Z+bog+VbekO 1LD/RIw16rcfOLWDA==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=fifthhorseman.net; i=@fifthhorseman.net; q=dns/txt; s=2019rsa; t=1675805788; h=from : to : subject : in-reply-to : references : date : message-id : mime-version : content-type : from; bh=fo4pu2CasQH/DeBkP2mBwgvkQAmqWGBAuRJku1Nhi3g=; b=qjEDIber7g4wweiht8eqQ7xr989V5iFNELqDmdl5eRCKqNfZMSi1ERDBfyd+3VCnflz/h 7qRJdwZVyHVCS12ZD0xsSsO8WLEe24vvt9S0JWVdJ3MEuivgrHNeE0miV9XCb6xycZf96r5 do1QG3s428MNxt7fESIUFahrJaoS+Anla7vOMpKnFEAuBPuWzTIZqn4LZoh0GEgfD/ShS7f WtbfVfRsFt+id1kVbcAoLahjvwtA3ZNiKTlB3L01uBuzWga7SM4Ot3r2pbIgUpDm3riWjTw 4oE2x8Oet4oKSrWYgUvTz775lb356tigLexCUBG3MXNvd7q9IC56fQ3FNjGg==
Received: from fifthhorseman.net (unknown [38.109.115.130]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) server-digest SHA384) (No client certificate requested) by che.mayfirst.org (Postfix) with ESMTPSA id 5D82FF9AD for <openpgp@ietf.org>; Tue, 7 Feb 2023 16:36:28 -0500 (EST)
Received: by fifthhorseman.net (Postfix, from userid 1000) id 43E772046D; Tue, 7 Feb 2023 16:36:25 -0500 (EST)
From: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
To: openpgp@ietf.org
In-Reply-To: <87v8kgm3ah.fsf@fifthhorseman.net>
References: <87v8kgm3ah.fsf@fifthhorseman.net>
Autocrypt: addr=dkg@fifthhorseman.net; prefer-encrypt=mutual; keydata= mDMEX+i03xYJKwYBBAHaRw8BAQdACA4xvL/xI5dHedcnkfViyq84doe8zFRid9jW7CC9XBiI0QQf FgoAgwWCX+i03wWJBZ+mAAMLCQcJEOCS6zpcoQ26RxQAAAAAAB4AIHNhbHRAbm90YXRpb25zLnNl cXVvaWEtcGdwLm9yZ/tr8E9NA10HvcAVlSxnox6z62KXCInWjZaiBIlgX6O5AxUKCAKbAQIeARYh BMKfigwB81402BaqXOCS6zpcoQ26AADZHQD/Zx9nc3N2kj13AUsKMr/7zekBtgfSIGB3hRCU74Su G44A/34Yp6IAkndewLxb1WdRSokycnaCVyrk0nb4imeAYyoPtBc8ZGtnQGZpZnRoaG9yc2VtYW4u bmV0PojRBBMWCgCDBYJf6LTfBYkFn6YAAwsJBwkQ4JLrOlyhDbpHFAAAAAAAHgAgc2FsdEBub3Rh dGlvbnMuc2VxdW9pYS1wZ3Aub3JnL0Gwxvypz2tu1IPG+yu1zPjkiZwpscsitwrVvzN3bbADFQoI ApsBAh4BFiEEwp+KDAHzXjTYFqpc4JLrOlyhDboAAPkXAP0Z29z7jW+YzLzPTQML4EQLMbkHOfU4 +s+ki81Czt0WqgD/SJ8RyrqDCtEP8+E4ZSR01ysKqh+MUAsTaJlzZjehiQ24MwRf6LTfFgkrBgEE AdpHDwEBB0DkKHOW2kmqfAK461+acQ49gc2Z6VoXMChRqobGP0ubb4kBiAQYFgoBOgWCX+i03wWJ BZ+mAAkQ4JLrOlyhDbpHFAAAAAAAHgAgc2FsdEBub3RhdGlvbnMuc2VxdW9pYS1wZ3Aub3Jnfvo+ nHoxDwaLaJD8XZuXiaqBNZtIGXIypF1udBBRoc0CmwICHgG+oAQZFgoAbwWCX+i03wkQPp1xc3He VlxHFAAAAAAAHgAgc2FsdEBub3RhdGlvbnMuc2VxdW9pYS1wZ3Aub3JnaheiqE7Pfi3Atb3GGTw+ jFcBGOaobgzEJrhEuFpXREEWIQQttUkcnfDcj0MoY88+nXFzcd5WXAAAvrsBAIJ5sBg8Udocv25N stN/zWOiYpnjjvOjVMLH4fV3pWE1AP9T6hzHz7hRnAA8d01vqoxOlQ3O6cb/kFYAjqx3oMXSBhYh BMKfigwB81402BaqXOCS6zpcoQ26AADX7gD/b83VObe14xrNP8xcltRrBZF5OE1rQSPkMNy+eWpk eCwA/1hxiS8ZxL5/elNjXiWuHXEvUGnRoVj745Vl48sZPVYMuDgEX+i03xIKKwYBBAGXVQEFAQEH QIGex1WZbH6xhUBve5mblScGYU+Y8QJOomXH+rr5tMsMAwEICYjJBBgWCgB7BYJf6LTfBYkFn6YA CRDgkus6XKENukcUAAAAAAAeACBzYWx0QG5vdGF0aW9ucy5zZXF1b2lhLXBncC5vcmcEAx9vTD3b J0SXkhvcRcCr6uIDJwic3KFKxkH1m4QW0QKbDAIeARYhBMKfigwB81402BaqXOCS6zpcoQ26AAAX mwD8CWmukxwskU82RZLMk5fm1wCgMB5z8dA50KLw3rgsCykBAKg1w/Y7XpBS3SlXEegIg1K1e6dR fRxL7Z37WZXoH8AH
Date: Tue, 07 Feb 2023 16:36:24 -0500
Message-ID: <87sffhkvjb.fsf@fifthhorseman.net>
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=-=-="; micalg="pgp-sha256"; protocol="application/pgp-signature"
Archived-At: <https://mailarchive.ietf.org/arch/msg/openpgp/flDfekYQsL72hsRrktkhZnDf0ng>
Subject: Re: [openpgp] Guidance for Designated Expert?
X-BeenThere: openpgp@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/openpgp>, <mailto:openpgp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/openpgp/>
List-Post: <mailto:openpgp@ietf.org>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/openpgp>, <mailto:openpgp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 07 Feb 2023 21:36:35 -0000
On Sun 2023-02-05 12:26:46 -0500, Daniel Kahn Gillmor wrote: > A baseline proposal (sorry it's not yet a patch), is for the guidance to > say that the Designated Experts should be given substantial leeway, but > they should: > > - avoid codepoint squatting and vanity registrations > > - require that the specification is concretely useful > > - require that any registered algorithms meet the security requirements > of the community and the message structures for which they are > proposed to be used. I've just knocked together https://gitlab.com/openpgp-wg/rfc4880bis/-/merge_requests/232, which adds text to the IANA considerations section: ------------ --- a/crypto-refresh.md +++ b/crypto-refresh.md @@ -3331,6 +3331,31 @@ Because this document obsoletes {{RFC4880}}, IANA is requested to update all reg OpenPGP is highly parameterized, and consequently there are a number of considerations for allocating parameters for extensions. This section describes how IANA should look at extensions to the protocol as described in this document. +Most of these registries have been moved the SPECIFICATION REQUIRED method. +As indicated in {{RFC8126}}, the designated expert is expected to ensure that a clear and detailed specification capable of producing interoperable implementations is permanent and readily available. +Because interoperability in the store-and-forward domains where OpenPGP most often used is made more challenging by combinatorial explosions of options, and because many of these registries are limited in size, the designated expert is expected to minimize codepoint squatting and vanity registrations by taking the following steps: + +- Ensure that the specification is concretely useful. + Does a clear use case exist? + Is that use case *not* handled by any existing mechanism in OpenPGP? + Is the referenced specification fit for purpose for that use case? + +- Ensure that the specification is complete. + Does it describe the expected semantics or behavior when the proposed codepoint is present? + (For example, when adding a new elliptic curve, are all tables referencing the curve populated as expected?) + Do the expected semantics or behavior when the codepoint is *not* present conform to existing baseline deployments? + Does the specification identify *where* the codepoint is expected to be observed? + (For example, when designating a new signature subpacket, does the specification indicate which types of signature it is to be found in?) + Does the specification clearly identify the expected semantics or behavior when the code point is observed in unexpected places? + +- Ensure that the specification and its use case is not contradictory to existing registered codepoints. + Can the the specification or its deployment produce confusion or interoperability failures when it is observed in combination with some other mechanism in OpenPGP? + +- Ensure that any registered algorithms meet the security requirements of the community and the message structures for which they are proposed to be used. + When a novel cryptographic approach is considered, is it strong enough to be worth deploying? + Are there enough diverse expressions of interest to determine a sense of the security needs of the community that would adopt the feature? + Does the proposed algorithm meet those security needs? + ## New String-to-Key Specifier Types OpenPGP S2K specifiers contain a mechanism for new algorithms to turn a string into a key. ------------ I'm sure it's imperfect, but i'm offering it as a basis for discussion. What guidance do you think the designated expert should follow when considering a codepoint registration? --dkg
- [openpgp] Guidance for Designated Expert? Daniel Kahn Gillmor
- Re: [openpgp] Guidance for Designated Expert? Daniel Kahn Gillmor
- Re: [openpgp] Guidance for Designated Expert? Paul Wouters
- Re: [openpgp] Guidance for Designated Expert? Daniel Kahn Gillmor
- Re: [openpgp] Guidance for Designated Expert? Stephen Farrell