Re: [openpgp] [PATCH] RFC4880bis: Argon2i

Peter Gutmann <pgut001@cs.auckland.ac.nz> Wed, 04 November 2015 00:33 UTC

Return-Path: <pgut001@cs.auckland.ac.nz>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7B2731A0121 for <openpgp@ietfa.amsl.com>; Tue, 3 Nov 2015 16:33:58 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.61
X-Spam-Level:
X-Spam-Status: No, score=-2.61 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_LOW=-0.7, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AfO14oPji_2v for <openpgp@ietfa.amsl.com>; Tue, 3 Nov 2015 16:33:54 -0800 (PST)
Received: from mx4.auckland.ac.nz (mx4.auckland.ac.nz [130.216.125.248]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DCAC91A0007 for <openpgp@ietf.org>; Tue, 3 Nov 2015 16:33:53 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=auckland.ac.nz; i=@auckland.ac.nz; q=dns/txt; s=mail; t=1446597234; x=1478133234; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=ypq/kJtFCqiTZ9As7HUgbzZCXHDHuPj7Kobl6HwtdtA=; b=wdihLD6/BMzdshILb2XIFpI3tihgNfT9qE5VhR38DZRkxNEHQJ7eOmyf CWwWSkpU4bQy/wILrfsBgXXtB53XKMU/oh8VIhF7Pr80UnOn6q27bBkSp DlO7Gyqo9evF1sAY3VhSsVgUm3ba0UC0tBLfdwK6qx5snH9JsBpT+AXEF xYmz62DTkQlf7zWYiMumB5LB1xt538InoO0T0xOXDalxaavy7HXJweoE7 5TlpgpDzrSvM1N/KlgAXxGvBUYqG2iuy4ewbO1SOLESCdgbBx1GP7CSp/ OKNyGLWqlX+6EmcgbaAqvp1a8ldoW8nZD2LpS8N/mIAWGdXiTOh3fThfT Q==;
X-IronPort-AV: E=Sophos;i="5.20,240,1444647600"; d="scan'208";a="52382790"
X-Ironport-HAT: MAIL-SERVERS - $RELAYED
X-Ironport-Source: 130.216.4.112 - Outgoing - Outgoing
Received: from uxchange10-fe1.uoa.auckland.ac.nz ([130.216.4.112]) by mx4-int.auckland.ac.nz with ESMTP/TLS/AES128-SHA; 04 Nov 2015 13:33:52 +1300
Received: from UXCN10-5.UoA.auckland.ac.nz ([169.254.5.51]) by uxchange10-fe1.UoA.auckland.ac.nz ([130.216.4.112]) with mapi id 14.03.0174.001; Wed, 4 Nov 2015 13:33:51 +1300
From: Peter Gutmann <pgut001@cs.auckland.ac.nz>
To: Nils Durner <ndurner@googlemail.com>
Thread-Topic: [openpgp] [PATCH] RFC4880bis: Argon2i
Thread-Index: AQHRFdXlijSW/3f4FU2z5WUCh4oiMp6I0HUAgAAzAACAATMki///vmSAgAEQNPo=
Date: Wed, 04 Nov 2015 00:33:51 +0000
Message-ID: <9A043F3CF02CD34C8E74AC1594475C73F4B52B3E@uxcn10-5.UoA.auckland.ac.nz>
References: <5623AA95.4060903@googlemail.com> <874mh3q3ol.fsf@alice.fifthhorseman.net> <56382F70.5000501@iang.org> <56385A38.6000707@googlemail.com> <9A043F3CF02CD34C8E74AC1594475C73F4B51C09@uxcn10-5.UoA.auckland.ac.nz>, <563924D5.6020407@googlemail.com>
In-Reply-To: <563924D5.6020407@googlemail.com>
Accept-Language: en-NZ, en-GB, en-US
Content-Language: en-NZ
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [130.216.158.4]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/openpgp/vsBCqFgXAwhHk0KyiVzqkmBxYFk>
Cc: "openpgp@ietf.org" <openpgp@ietf.org>
Subject: Re: [openpgp] [PATCH] RFC4880bis: Argon2i
X-BeenThere: openpgp@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/openpgp>, <mailto:openpgp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/openpgp/>
List-Post: <mailto:openpgp@ietf.org>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/openpgp>, <mailto:openpgp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 04 Nov 2015 00:33:58 -0000

Nils Durner <ndurner@googlemail.com> writes:

>That is certainly one of the safest options for actual passwords, but gets in
>the way of symmetric keys (cheaply) being used as passphrases.

Hmm, yeah, but if you've already got a raw symmetric key (which won't need any
extra processing) I'd lean towards having it identified as such rather than
overloading a password-processing mechanism for it.  In other words make the
use for symmetric key transport explicit rather than relying on the
implementer to somehow know that S2K type X is meant to be used for symkey
transport.

So perhaps have type 4 = Argon2, type 5 = symmetric key transport, with a
safety note added to say that it's meant for randomly-generated symmetric keys
that are already, in effect, in the post-S2K state.

Peter.