[openpgp] Late wire-format changes for the v6 PKESK packet

Justus Winter <justus@sequoia-pgp.org> Mon, 08 May 2023 18:01 UTC

Return-Path: <justus@sequoia-pgp.org>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DC71FC169508 for <openpgp@ietfa.amsl.com>; Mon, 8 May 2023 11:01:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.693
X-Spam-Level:
X-Spam-Status: No, score=-1.693 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_INVALID=0.1, DKIM_SIGNED=0.1, MSGID_FROM_MTA_HEADER=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=neutral reason="invalid (public key: not available)" header.d=sequoia-pgp.org
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4QDPoQt1lqoS for <openpgp@ietfa.amsl.com>; Mon, 8 May 2023 11:01:30 -0700 (PDT)
Received: from harrington.uberspace.de (harrington.uberspace.de [185.26.156.85]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3DB10C13739B for <openpgp@ietf.org>; Mon, 8 May 2023 11:01:29 -0700 (PDT)
Received: (qmail 2447 invoked by uid 500); 8 May 2023 18:01:26 -0000
Authentication-Results: harrington.uberspace.de; auth=pass (plain)
From: Justus Winter <justus@sequoia-pgp.org>
To: openpgp@ietf.org
Date: Mon, 08 May 2023 20:01:18 +0200
Message-Id: <20230508180119.1705651-1-justus@sequoia-pgp.org>
X-Mailer: git-send-email 2.39.2
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
X-Rspamd-Bar: /
X-Rspamd-Report: R_MISSING_CHARSET(0.5) MIME_GOOD(-0.1) MID_CONTAINS_FROM(1) BAYES_HAM(-0.458335)
X-Rspamd-Score: 0.941664
Received: from unknown (HELO unkown) (::1) by harrington.uberspace.de (Haraka/3.0.1) with ESMTPSA; Mon, 08 May 2023 20:01:25 +0200
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=sequoia-pgp.org; s=uberspace; h=from; bh=Stid7i5Af3NQXXuHu/nCXLmpfYlcEtWg6WJudI0KP/A=; b=nA+l68HH5UdRspWIpyeZGgS7vS4qAXuQ7xg3OxWGLOCNwIf9wHg12ZETpAIgBY8mPcVUkyn0o9 /Phhvl/SyfwHEenfDOL5Mle+YuKm06GImtoE8ftQurTwsBhba/XzqUekIyHmHxVV6DcXg7myYni0 3e0OEMiJ//KzVzvCKwGDnypLpO62dkObtFSQW6claKZF3nQ2+tHzEllaDn/jguWryjgpa7QLu5iI NwJ8eEn8kq5Vpn0SDGxfptzcV2aHHbXyF3e0tSUsQydmTzC/mMBQSlDgttU1NkAAgbQa7M/dP7PV Jn6TtK6yTCECImmnXs6fR09yJr+1a80Ozi0dQXFHD1be4AJtOMzk3rszVP2tOq+xr2df9QvDaxuq kBBycoZ8PxLf0ukcdy//8pQuzJCMlGaN/kVhWGBcUfp+wXp0T/3pvg/axWB6LDucu2axD/WaFhkZ 2LwKr/tgaHxXQUdLNwAeVcI8hf6Y4eLrVGzmir1QUEkR3R+/8mVYibj+aIbWc+Y/VAdfa2FebfZQ ZHhjkd7xc0kqCkTt/9jYAQfaRiUNNsM2pMIQRR3gwfpC6/UICoSUsK4opYioaqLgUhAtStIsFpFd uR3f0lJXqDTnD2f9VfwEWCcrAa3cbvwQFHwql6r+4ob8fJtDl7Bg8M5yUSuGfk4wCk5Jos1/pYMg 4=
Archived-At: <https://mailarchive.ietf.org/arch/msg/openpgp/h1OgXIuHg2cRf1DuEFbLvUXk4tQ>
Subject: [openpgp] Late wire-format changes for the v6 PKESK packet
X-BeenThere: openpgp@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/openpgp>, <mailto:openpgp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/openpgp/>
List-Post: <mailto:openpgp@ietf.org>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/openpgp>, <mailto:openpgp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 08 May 2023 18:01:35 -0000

Hello working group,

please consider this change, even if it is very late in the
standardization process and it changes the wire format.

There is an issue with the PKESK packet: it has a fingerprint field
that is prefixed by the key version.  But, that information alone is
not sufficient to parse the fingerprint field in general, because you
cannot know the length of fingerprints of unknown key versions.

More discussion: https://gitlab.com/openpgp-wg/rfc4880bis/-/issues/166
Merge request:   https://gitlab.com/openpgp-wg/rfc4880bis/-/merge_requests/304

Best,
Justus