Re: [pkix] Fwd: I-D Action: draft-turner-additional-methods-4kis-02.txt

Sean Turner <turners@ieca.com> Tue, 24 April 2012 12:28 UTC

Return-Path: <turners@ieca.com>
X-Original-To: pkix@ietfa.amsl.com
Delivered-To: pkix@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7B92821F87B4 for <pkix@ietfa.amsl.com>; Tue, 24 Apr 2012 05:28:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.193
X-Spam-Level:
X-Spam-Status: No, score=-102.193 tagged_above=-999 required=5 tests=[AWL=0.072, BAYES_00=-2.599, IP_NOT_FRIENDLY=0.334, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fKUGzKKGm0kQ for <pkix@ietfa.amsl.com>; Tue, 24 Apr 2012 05:28:05 -0700 (PDT)
Received: from gateway04.websitewelcome.com (gateway04.websitewelcome.com [67.18.125.4]) by ietfa.amsl.com (Postfix) with ESMTP id 0049721F8686 for <pkix@ietf.org>; Tue, 24 Apr 2012 05:28:04 -0700 (PDT)
Received: by gateway04.websitewelcome.com (Postfix, from userid 5007) id 7516A4375A32E; Tue, 24 Apr 2012 07:28:04 -0500 (CDT)
Received: from gator1743.hostgator.com (gator1743.hostgator.com [184.173.253.227]) by gateway04.websitewelcome.com (Postfix) with ESMTP id 6ABA34375A30E for <pkix@ietf.org>; Tue, 24 Apr 2012 07:28:04 -0500 (CDT)
Received: from [96.231.123.106] (port=47732 helo=thunderfish.local) by gator1743.hostgator.com with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.69) (envelope-from <turners@ieca.com>) id 1SMeqf-0000Ed-2j; Tue, 24 Apr 2012 07:28:04 -0500
Message-ID: <4F969C50.2070601@ieca.com>
Date: Tue, 24 Apr 2012 08:28:00 -0400
From: Sean Turner <turners@ieca.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.6; rv:11.0) Gecko/20120327 Thunderbird/11.0.1
MIME-Version: 1.0
To: "Manger, James H" <James.H.Manger@team.telstra.com>
References: <20120423183151.1989.87952.idtracker@ietfa.amsl.com> <4F95A1A4.5060209@ieca.com> <255B9BB34FB7D647A506DC292726F6E114F0C4080F@WSMSG3153V.srv.dir.telstra.com>
In-Reply-To: <255B9BB34FB7D647A506DC292726F6E114F0C4080F@WSMSG3153V.srv.dir.telstra.com>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - gator1743.hostgator.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - ieca.com
X-BWhitelist: no
X-Source:
X-Source-Args:
X-Source-Dir:
X-Source-Sender: pool-96-231-123-106.washdc.east.verizon.net (thunderfish.local) [96.231.123.106]:47732
X-Source-Auth: sean.turner@ieca.com
X-Email-Count: 12
X-Source-Cap: ZG9tbWdyNDg7ZG9tbWdyNDg7Z2F0b3IxNzQzLmhvc3RnYXRvci5jb20=
Cc: "pkix@ietf.org" <pkix@ietf.org>
Subject: Re: [pkix] Fwd: I-D Action: draft-turner-additional-methods-4kis-02.txt
X-BeenThere: pkix@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: PKIX Working Group <pkix.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/pkix>, <mailto:pkix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/pkix>
List-Post: <mailto:pkix@ietf.org>
List-Help: <mailto:pkix-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/pkix>, <mailto:pkix-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 24 Apr 2012 12:28:05 -0000

James,

Thanks for the review.  Comments inline.

spt

On 4/23/12 11:15 PM, Manger, James H wrote:
>> 	Title           : Additional Methods for Generating Key Identifiers
>> 	Filename        : draft-turner-additional-methods-4kis-04.txt
>
> Using a more recent hash alg than SHA-1 to generate key ids sounds fine.
>
> Keeping the 160-bit size "to avoid adversely affecting relying party code" sounds strange. RFC5280 already recommends 2 methods with different lengths (160-bit and 64-bit) so relying party code better handle that. Perhaps using a size no longer than 160-bit is nice (so it takes no more space in a database field, for instance). Since we are truncating the hashes in all the new algs, why not truncate to something shorter? 64-bits would be a good choice (matching the shorter existing recommended method). We could even set the first 4 bits to 0101, 0110, 0111, 1000 for the 4 new methods so it matches the existing recommendation even more closely.

Okay I struck "to avoid ...".

My primary reason for picking the 160-bit truncated length was that in 
sidr there was some discussion about what the output lengths would be if 
the alg to generate the key identifier was from the SHA2 family.  Some 
of the implementers seemed to like the idea of having it documented and 
fixed to the same length as the 160-bit truncated SHA-1 example in 5280 
(which is what they use now).  I realize that they could define any old 
method they wanted in their drafts, but this has come up a couple of 
times for me and I just wanted to document something so that it could be 
referenced.

Given the above, I don't want to remove the 160-bit truncated versions, 
but I don't have any problem adding the 64-bit methods you describe. 
Remember these are just listing some example methods - implementers are 
free to do these or not.

Sound like a plan?

> What is the reason for having a certificate extension to describe how a key id is generated?
> I don't think the draft gives any reason.

I added it because there was some discussion on the list about it - 
granted it was like 2 years ago.  Some folks were on about it here:
https://www.ietf.org/mail-archive/web/pkix/current/msg27849.html

I'll add some wording after I've run it by my co-author.

> The kiLength field seems pointless. You can look at the actual key id (also in the cert) to get its length.

I think you're right here and I'll remove kiLength.

> A kiHashInput value of id-subjectPublicKey seems to mean the same thing as the kiHashInput field being absent. Two ways to say the same thing is bad.

Ah that should have been id-subjectPublicKeyInfo which is different than 
just the key because it includes alg id/parameters.