Re: [openpgp] Chunked OpenPGP streams

Nils Durner <ndurner@googlemail.com> Wed, 30 December 2015 13:01 UTC

Return-Path: <ndurner@googlemail.com>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F22451A8763 for <openpgp@ietfa.amsl.com>; Wed, 30 Dec 2015 05:01:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id asw7eEpCMzY0 for <openpgp@ietfa.amsl.com>; Wed, 30 Dec 2015 05:01:51 -0800 (PST)
Received: from mail-wm0-x235.google.com (mail-wm0-x235.google.com [IPv6:2a00:1450:400c:c09::235]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 73A3D1A0021 for <openpgp@ietf.org>; Wed, 30 Dec 2015 05:01:51 -0800 (PST)
Received: by mail-wm0-x235.google.com with SMTP id u188so38783665wmu.1 for <openpgp@ietf.org>; Wed, 30 Dec 2015 05:01:51 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=googlemail.com; s=20120113; h=subject:to:references:from:cc:message-id:date:user-agent :mime-version:in-reply-to:content-type:content-transfer-encoding; bh=FYtn5AAJ4+0n1I5YAjGyI5AWR1py2ATMutBQG660oxI=; b=1G62bWxZnHB86CsDYU9i0hnZVtotHggArlsA5JNXRFGzufOk3/SL/SR67/85YfK3bt 16FFrlNldgu0ESN6rUQVwc+t0i6NzSeQOfqMOrs+lW03+ydHpBxjUs4ibw1YB/Vd77FE 7zEACrW2xzdl41ZNjoSVJT9qg/mY54LYY/B/Jy9O40kYRsywYmV0l1w8mqt3rNzkjjPZ rw1VMJIy1YiCY/7oST4qo4uWqtSQc8nXuNG8sAxuXkMBAA3lzaLmSc2uCMMf5MAGwd8m cgKXnr6ZFAzzn3dzZ0WCMtbBOxoPdi/3Omd+ge2bLGSfSwEi//Tvul5PGSUu3bB4+q6n XcNA==
X-Received: by 10.194.95.199 with SMTP id dm7mr69757070wjb.15.1451480510110; Wed, 30 Dec 2015 05:01:50 -0800 (PST)
Received: from ?IPv6:2001:67c:20a1:1192:9ad:3d4b:fb2:11aa? ([2001:67c:20a1:1192:9ad:3d4b:fb2:11aa]) by smtp.googlemail.com with ESMTPSA id q6sm65458703wjx.28.2015.12.30.05.01.48 (version=TLSv1/SSLv3 cipher=OTHER); Wed, 30 Dec 2015 05:01:49 -0800 (PST)
To: openpgp@ietf.org
References: <20151230115130.GA17604@localhost.localdomain>
From: Nils Durner <ndurner@googlemail.com>
X-Enigmail-Draft-Status: N1110
Message-ID: <5683D5BA.8050208@googlemail.com>
Date: Wed, 30 Dec 2015 14:01:46 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101 Thunderbird/38.4.0
MIME-Version: 1.0
In-Reply-To: <20151230115130.GA17604@localhost.localdomain>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <http://mailarchive.ietf.org/arch/msg/openpgp/yELcaCLYSwUzOy5aKTl7MPZWPPs>
Cc: guilhem@fripost.org
Subject: Re: [openpgp] Chunked OpenPGP streams
X-BeenThere: openpgp@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/openpgp>, <mailto:openpgp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/openpgp/>
List-Post: <mailto:openpgp@ietf.org>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/openpgp>, <mailto:openpgp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 30 Dec 2015 13:01:55 -0000

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi,

> I wonder if chunked streams could make their way to RFC4880bis instead.
> The verification mechanism (MDC or data signature) would be added to
> each chunk using the intermediate hash value,

I think this goes in the same direction that OAED or online
authenticating cipher modes are being considered for - see the recording
of the last IETF meeting at
http://recs.conf.meetecho.com/Playout/watch.jsp?recording=IETF94_OPENPGP&chapter=chapter_1

Regarding the potential use of online authenticating cipher modes, it
was discussed during that meeting that there is *some* research on modes
that *might* be usable with PGP. If anyone can share papers (or
references), I would appreciate it.


Regards,

Nils
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.22 (GNU/Linux)

iQIcBAEBAgAGBQJWg9W6AAoJEM2vZ+BQCpt2OL4P/2UZZmwSEfvOTTdIfkq668WH
4UAS7qRYH9R760XYq3RkcRoYu8QbL6A86oafbhChHEzGVFyjyzYJqknQ5PUJW6kF
7wBdOieMF3xeMqw9wSwMsW13B/k2AULVc1HCOEeiHRAm40B1cvALltuYKK2G5Ipz
KWBKGfnLzNHe/iL1vrZzecht++U1/DDCT/MpCd9ULZu5zZvc3TAVULQ4poVh3/Hw
B/lAeRHZElYOAMIwxnY+5PHwecNqskN3k+R6NWO3+7OkiJrYhxb9YvkOM/qgY5h5
CoBLai0RG9K7T39GYMuMObXEjidyv/rG3XFJGNc/SQTIquRChyyQdm13dOO3z92C
VxcsoWdrS30YhHKVnBdySlZNLHXgUW0rLikbki5bz5wSmRLLjy1+bDhze3ikRCN9
rSV5ZrIQxOvIw88/RpwVxaOjgEBaCsq9DWRsqg3o4DCo/5KDkqEpcLmcyhcrSVCK
cK+aA+FOjSZ1Z8rz8VfQ2dL0kItKoos7MLtVMjTjdzSMXAWHbnLjlXxAL8P1RqBG
diRGRgI0dVnXcW43MPHCnFvFOk4L9T77n7LM2QN0Kbko7aNf2Y/Sp4xKsN1MEfv2
z8ruLYfquDaRVU85iCztwJsxWf0DfRgj14QWgEPngwPpn2cVEXy+5/1lkVC4LNrl
9Ziu77Pw1Ur63GRFq/7d
=qUMc
-----END PGP SIGNATURE-----