Re: [openpgp] AEAD Chunk Size

"brian m. carlson" <sandals@crustytoothpaste.net> Sat, 30 March 2019 00:19 UTC

Return-Path: <sandals@crustytoothpaste.net>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E5204120059 for <openpgp@ietfa.amsl.com>; Fri, 29 Mar 2019 17:19:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (3072-bit key) header.d=crustytoothpaste.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UgQ7WHn5sN5I for <openpgp@ietfa.amsl.com>; Fri, 29 Mar 2019 17:19:57 -0700 (PDT)
Received: from injection.crustytoothpaste.net (injection.crustytoothpaste.net [192.241.140.119]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B6C0F12001E for <openpgp@ietf.org>; Fri, 29 Mar 2019 17:19:56 -0700 (PDT)
Received: from genre.crustytoothpaste.net (unknown [IPv6:2001:470:b978:101:cd73:609e:99e6:698f]) (using TLSv1.2 with cipher ECDHE-RSA-CHACHA20-POLY1305 (256/256 bits)) (No client certificate requested) by injection.crustytoothpaste.net (Postfix) with ESMTPSA id B0D2C60446; Sat, 30 Mar 2019 00:19:54 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=crustytoothpaste.net; s=default; t=1553905195; bh=2x80Xf7gCE1aX4bQLPQ1YPOIL/qfwuY01GsqpT36Rdc=; h=Date:From:To:Cc:Subject:References:Content-Type: Content-Disposition:In-Reply-To:From:Reply-To:Subject:Date:To:CC: Resent-Date:Resent-From:Resent-To:Resent-Cc:In-Reply-To:References: Content-Type:Content-Disposition; b=beJKjrsmdrd5hNTjSSk64Q/O1DFZLqgzA627Zv14TbB7Ztr97TnkVLnQOKKxAscWQ mXnRJFmitvucuj6BRwGZE24k66tbsWpoYUjPML7ZIFE37kjA38aJ97Z5/7TLvgWyu6 vmkCPHPd46rX4j6msf3yoEuOSYTpNqa/IOax9rQMd/NpdAEjnu3HOA/CMvWVofAcaf L9RYDcu8eCfH9gSWSjJdF+vXNKaeLtfS5TtorCDz3tQtaWze9PcLjdyQ/qxYruKB1c xZHxbJRTgX8HtENN/S9zXWHSxLm93KX8Q8A0M2nPH3pekvnWO5Vn+K9b0PS7PidX18 ITwNgsw0QqwcESvubxJMk/ekWJ6ZNsst18bunYZZEFWgEVZZy3s4hChzPu6BEC8o4f YRMUGqzni4n58QDE1GEyyJAVH/wJFkhAyK00R0Y34e92Q82y5CY/12OzsYWKNkshT+ 6QmxFknFpztRP0fVlGfoGrAoTuC2cfc6C1Sl5H2YK1thdAkoPlQ
Date: Sat, 30 Mar 2019 00:19:49 +0000
From: "brian m. carlson" <sandals@crustytoothpaste.net>
To: Jon Callas <joncallas=40icloud.com@dmarc.ietf.org>
Cc: "Neal H. Walfield" <neal@walfield.org>, openpgp@ietf.org, Justus Winter <justuswinter@gmail.com>, Jon Callas <joncallas@icloud.com>
Message-ID: <20190330001949.GB12419@genre.crustytoothpaste.net>
References: <87mumh33nc.wl-neal@walfield.org> <878swzp4fb.fsf@europa.jade-hamburg.de> <E65F6E9D-8B0B-466D-936B-E8852F26E1FF@icloud.com> <8736n63bav.wl-neal@walfield.org> <DD6BD098-A048-4513-BAAC-913BF52CDB1D@icloud.com>
MIME-Version: 1.0
Content-Type: multipart/signed; micalg="pgp-sha512"; protocol="application/pgp-signature"; boundary="UHN/qo2QbUvPLonB"
Content-Disposition: inline
In-Reply-To: <DD6BD098-A048-4513-BAAC-913BF52CDB1D@icloud.com>
X-Machine: Running on genre using GNU/Linux on x86_64 (Linux kernel 4.19.0-4-amd64)
User-Agent: Mutt/1.10.1 (2018-07-13)
X-Scanned-By: MIMEDefang 2.79 on 127.0.1.1
Archived-At: <https://mailarchive.ietf.org/arch/msg/openpgp/oRaFvGp98hFi88-EEac5RE4WBXA>
Subject: Re: [openpgp] AEAD Chunk Size
X-BeenThere: openpgp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/openpgp>, <mailto:openpgp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/openpgp/>
List-Post: <mailto:openpgp@ietf.org>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/openpgp>, <mailto:openpgp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 30 Mar 2019 00:19:59 -0000

On Thu, Mar 28, 2019 at 07:19:39PM -0700, Jon Callas wrote:
> I wrote a point-by-point reply and decided that that’s not productive. I’m going to try to cut to the chase on this, so forgive me if I have dodged an important point. I’m happy to come back to it later.
> 
> Like some interim replies, particularly Bart Butler, I thought we had a rough consensus and that it was approximately:
> 
> * MUST support 16KB chunks.
> * SHOULD support 256K chunks, as these are common (Protonmail).
> * MAY support larger up to the present very large size.
> * MAY reject or error out on chunks larger than 16KB, but repeating ourselves, SHOULD support 256K.

I think this is fine. It covers what's requires for interoperability, it
makes prudent suggestions, and it allows people leeway if they know
they're the only one consuming their data.

If people like my original proposal, that's also fine with me (as would
be expected).
-- 
brian m. carlson: Houston, Texas, US
OpenPGP: https://keybase.io/bk2204