[openpgp] [Technical Errata Reported] RFC4880 (7889)

RFC Errata System <rfc-editor@rfc-editor.org> Wed, 10 April 2024 17:17 UTC

Return-Path: <wwwrun@rfcpa.amsl.com>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 02637C14F5F9 for <openpgp@ietfa.amsl.com>; Wed, 10 Apr 2024 10:17:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.648
X-Spam-Level:
X-Spam-Status: No, score=-1.648 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, CTE_8BIT_MISMATCH=0.001, HEADER_FROM_DIFFERENT_DOMAINS=0.248, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ngd8zVkXHTXq for <openpgp@ietfa.amsl.com>; Wed, 10 Apr 2024 10:17:11 -0700 (PDT)
Received: from rfcpa.amsl.com (rfcpa.amsl.com [50.223.129.200]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E8D93C14F5F4 for <openpgp@ietf.org>; Wed, 10 Apr 2024 10:17:11 -0700 (PDT)
Received: by rfcpa.amsl.com (Postfix, from userid 499) id 8A43F13BB51E; Wed, 10 Apr 2024 10:17:11 -0700 (PDT)
To: jon@callas.org, lutz@iks-jena.de, hal@finney.org, dshaw@jabberwocky.com, rodney@canola-jones.com, debcooley1@gmail.com, paul.wouters@aiven.io, stephen.farrell@cs.tcd.ie, dkg@fifthhorseman.net
From: RFC Errata System <rfc-editor@rfc-editor.org>
Cc: dkg@fifthhorseman.net, openpgp@ietf.org, rfc-editor@rfc-editor.org
Content-Type: text/plain; charset="UTF-8"
Message-Id: <20240410171711.8A43F13BB51E@rfcpa.amsl.com>
Date: Wed, 10 Apr 2024 10:17:11 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/openpgp/mu8Qu3Ri1395tttPhc-v4gkphHI>
X-Mailman-Approved-At: Thu, 18 Apr 2024 13:10:23 -0700
Subject: [openpgp] [Technical Errata Reported] RFC4880 (7889)
X-BeenThere: openpgp@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/openpgp>, <mailto:openpgp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/openpgp/>
List-Post: <mailto:openpgp@ietf.org>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/openpgp>, <mailto:openpgp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 10 Apr 2024 17:17:16 -0000

The following errata report has been submitted for RFC4880,
"OpenPGP Message Format".

--------------------------------------
You may review the report below and at:
https://www.rfc-editor.org/errata/eid7889

--------------------------------------
Type: Technical
Reported by: Daniel Kahn Gillmor <dkg@fifthhorseman.net>

Section: 5.2.3.23

Original Text
-------------
Note that any signature may be revoked, including a certification on some other person's key.

Corrected Text
--------------
Note that any certification may be revoked, including a certification on some other person's key.

Notes
-----
the only three types of revocation that are specified in OpenPGP are:

0x20: Key revocation signature
The signature is calculated directly on the key being revoked. A
revoked key is not to be used. Only revocation signatures by the
key being revoked, or by an authorized revocation key, should be
considered valid revocation signatures.

0x28: Subkey revocation signature
The signature is calculated directly on the subkey being revoked.
A revoked subkey is not to be used. Only revocation signatures
by the top-level signature key that is bound to this subkey, or
by an authorized revocation key, should be considered valid
revocation signatures.

0x30: Certification revocation signature
This signature revokes an earlier User ID certification signature
(signature class 0x10 through 0x13) or direct-key signature
(0x1F). It should be issued by the same key that issued the
revoked signature or an authorized revocation key. The signature
is computed over the same data as the certificate that it
revokes, and should have a later creation date than that
certificate.

There is no explicit mechanism to revoke a document signature (as opposed to a certification signature), so it makes no sense to claim that "any signature may be revoked".

This was observed by Andrew Gallagher in https://gitlab.com/dkg/openpgp-revocation/-/issues/15, and is still an issue in the successor to RFC 4880, draft-ietf-openpgp-crypto-refresh ☹

Instructions:
-------------
This erratum is currently posted as "Reported". (If it is spam, it 
will be removed shortly by the RFC Production Center.) Please
use "Reply All" to discuss whether it should be verified or
rejected. When a decision is reached, the verifying party  
will log in to change the status and edit the report, if necessary.

--------------------------------------
RFC4880 (draft-ietf-openpgp-rfc2440bis-22)
--------------------------------------
Title               : OpenPGP Message Format
Publication Date    : November 2007
Author(s)           : J. Callas, L. Donnerhacke, H. Finney, D. Shaw, R. Thayer
Category            : PROPOSED STANDARD
Source              : Open Specification for Pretty Good Privacy
Stream              : IETF
Verifying Party     : IESG