Re: [pkix] EC key pair

Erwann Abalea <eabalea@gmail.com> Wed, 01 April 2015 11:54 UTC

Return-Path: <eabalea@gmail.com>
X-Original-To: pkix@ietfa.amsl.com
Delivered-To: pkix@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2B0C41A898F for <pkix@ietfa.amsl.com>; Wed, 1 Apr 2015 04:54:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cKEsnvTzPP-G for <pkix@ietfa.amsl.com>; Wed, 1 Apr 2015 04:54:29 -0700 (PDT)
Received: from mail-yh0-x235.google.com (mail-yh0-x235.google.com [IPv6:2607:f8b0:4002:c01::235]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 46D021A8923 for <pkix@ietf.org>; Wed, 1 Apr 2015 04:54:29 -0700 (PDT)
Received: by yhpt93 with SMTP id t93so11533718yhp.0 for <pkix@ietf.org>; Wed, 01 Apr 2015 04:54:28 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=99vj2nynDevj6IPTfRQNR8Uawdp1y4pyZB7igJ6fYRY=; b=xWtQxBoJL7Ha6vu1Npbu0bEyewPmgSWENaEXtX/X3sQ7agGgmE9paAuWMj2kmGirbN 2bUO5rvmxcNleGv5GYUk+Z02CuP9B1kSNCeT05SQ7Ikrk956WpDJiz17nihEdDRaDc9V Gm4m7qwLugAYjP0fXPH8+p38iXonbrKffFLSaCnqQ+sZxIr8qjORNpJq7jf7H7eis2xk FZpRbq74+68iXwBAtnEetv6QTFoMW3djjPgxERF3zk0Hla7ZA6+gOdr6DNsDh1E/Gu9n 0DG1HMWTvD0q9uSVk54OJ9mn09gf+R642N4znrI1WvPNFuYWKrXpRsdDne44C+Oy5awg 9kjg==
MIME-Version: 1.0
X-Received: by 10.52.248.138 with SMTP id ym10mr504397vdc.62.1427889268601; Wed, 01 Apr 2015 04:54:28 -0700 (PDT)
Received: by 10.52.17.105 with HTTP; Wed, 1 Apr 2015 04:54:28 -0700 (PDT)
In-Reply-To: <9A043F3CF02CD34C8E74AC1594475C73AAFC850A@uxcn10-5.UoA.auckland.ac.nz>
References: <9A043F3CF02CD34C8E74AC1594475C73AAFC850A@uxcn10-5.UoA.auckland.ac.nz>
Date: Wed, 01 Apr 2015 13:54:28 +0200
Message-ID: <CA+i=0E7v_54f9RMKNqHr5HCdvLfFt+8ME3xwdMYFDUruOAOrcw@mail.gmail.com>
From: Erwann Abalea <eabalea@gmail.com>
To: Peter Gutmann <pgut001@cs.auckland.ac.nz>
Content-Type: multipart/alternative; boundary="089e0149c272a23a370512a86014"
Archived-At: <http://mailarchive.ietf.org/arch/msg/pkix/Nosvy-jvVY0YhTQIoaQ6F6YeFec>
Cc: IETF PKIX <pkix@ietf.org>
Subject: Re: [pkix] EC key pair
X-BeenThere: pkix@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: PKIX Working Group <pkix.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/pkix>, <mailto:pkix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/pkix/>
List-Post: <mailto:pkix@ietf.org>
List-Help: <mailto:pkix-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/pkix>, <mailto:pkix-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 01 Apr 2015 11:54:31 -0000

2015-04-01 9:02 GMT+02:00 Peter Gutmann <pgut001@cs.auckland.ac.nz>:

> Erwann Abalea <eabalea@gmail.com> writes:
>
> >SCEP (as a draft) already supports enrolment of an EC public key with a
> >request encrypted to the RSA public key of the CA/RA.
>
> Uhh, no it doesn't:
>
>    The message types, being based on CMS [3] and PKCS #10 [6], fully
>    support algorithm agility but the requester has to use a key type
>    that is supported by the server.  Specifically, they must employ a
>    PKC algorithm capable of both encryption and signing.  RSA is the
>    only widely-used algorithm that has these properties.
>

Note the "as a draft", I'm not talking about specific implementations.
And in the first example, the CA/RA key is used as the recipient of the
envelopedData part of the CMS, and it works perfectly if the CA/RA has an
RSA key (that's classic). Still in that first example, the PKCS#10 can
enclose an EC public key, be self-signed, etc. Nothing strange here.
The result is only signed.

The second example will only work if you accept RFC5753 or a
derivative/similar work to exchange the symetric key used to encrypt the
payload of that envelopedData. This will involve ECMQV or ECIES, or any
other similar thing based on ECDH/EC-ElGamal.


> >But SCEP is so old that it's probably not the best idea to play with it
> and
> >EC keys. It was changed as "Historic" some years ago, and the latest draft
> >(september 2011) never went published.
>
> The latest draft is from March 2015.  It's also extremely widely deployed
> (unless someone knows of something non-proprietary that's bigger, I'll say
> it's the most widely-deployed cert enrolment protocol), so going with SCEP
> if
> you can manage it ensures widespread support for your whatever-it-is.
>

https://datatracker.ietf.org/doc/draft-nourse-scep/ lists the latest
version of the draft as 2011-09-07. I don't know where is this March 2015
version from.

-- 
Erwann.