Re: [pkix] Fwd: I-D Action: draft-turner-additional-methods-4kis-02.txt

"Manger, James H" <James.H.Manger@team.telstra.com> Tue, 24 April 2012 03:15 UTC

Return-Path: <James.H.Manger@team.telstra.com>
X-Original-To: pkix@ietfa.amsl.com
Delivered-To: pkix@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EE68021F847E for <pkix@ietfa.amsl.com>; Mon, 23 Apr 2012 20:15:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.669
X-Spam-Level:
X-Spam-Status: No, score=-0.669 tagged_above=-999 required=5 tests=[AWL=0.232, BAYES_00=-2.599, HELO_EQ_AU=0.377, HOST_EQ_AU=0.327, RELAY_IS_203=0.994]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xX6cFxSP32rC for <pkix@ietfa.amsl.com>; Mon, 23 Apr 2012 20:15:44 -0700 (PDT)
Received: from ipxavo.tcif.telstra.com.au (ipxavo.tcif.telstra.com.au [203.35.135.200]) by ietfa.amsl.com (Postfix) with ESMTP id BDEB621F84C9 for <pkix@ietf.org>; Mon, 23 Apr 2012 20:15:42 -0700 (PDT)
X-IronPort-AV: E=Sophos;i="4.75,472,1330866000"; d="scan'208";a="70896274"
Received: from unknown (HELO ipccvi.tcif.telstra.com.au) ([10.97.217.208]) by ipoavi.tcif.telstra.com.au with ESMTP; 24 Apr 2012 13:15:41 +1000
X-IronPort-AV: E=McAfee;i="5400,1158,6690"; a="60111319"
Received: from wsmsg3755.srv.dir.telstra.com ([172.49.40.196]) by ipccvi.tcif.telstra.com.au with ESMTP; 24 Apr 2012 13:15:40 +1000
Received: from WSMSG3153V.srv.dir.telstra.com ([172.49.40.159]) by WSMSG3755.srv.dir.telstra.com ([172.49.40.196]) with mapi; Tue, 24 Apr 2012 13:15:40 +1000
From: "Manger, James H" <James.H.Manger@team.telstra.com>
To: Sean Turner <turners@ieca.com>, "pkix@ietf.org" <pkix@ietf.org>
Date: Tue, 24 Apr 2012 13:15:37 +1000
Thread-Topic: [pkix] Fwd: I-D Action: draft-turner-additional-methods-4kis-02.txt
Thread-Index: Ac0hgFAo7MLGLfMxQXq0HWnWd2V2SQAQeFIg
Message-ID: <255B9BB34FB7D647A506DC292726F6E114F0C4080F@WSMSG3153V.srv.dir.telstra.com>
References: <20120423183151.1989.87952.idtracker@ietfa.amsl.com> <4F95A1A4.5060209@ieca.com>
In-Reply-To: <4F95A1A4.5060209@ieca.com>
Accept-Language: en-US, en-AU
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US, en-AU
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [pkix] Fwd: I-D Action: draft-turner-additional-methods-4kis-02.txt
X-BeenThere: pkix@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: PKIX Working Group <pkix.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/pkix>, <mailto:pkix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/pkix>
List-Post: <mailto:pkix@ietf.org>
List-Help: <mailto:pkix-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/pkix>, <mailto:pkix-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 24 Apr 2012 03:15:45 -0000

>	Title           : Additional Methods for Generating Key Identifiers
>	Filename        : draft-turner-additional-methods-4kis-04.txt

Using a more recent hash alg than SHA-1 to generate key ids sounds fine.

Keeping the 160-bit size "to avoid adversely affecting relying party code" sounds strange. RFC5280 already recommends 2 methods with different lengths (160-bit and 64-bit) so relying party code better handle that. Perhaps using a size no longer than 160-bit is nice (so it takes no more space in a database field, for instance). Since we are truncating the hashes in all the new algs, why not truncate to something shorter? 64-bits would be a good choice (matching the shorter existing recommended method). We could even set the first 4 bits to 0101, 0110, 0111, 1000 for the 4 new methods so it matches the existing recommendation even more closely.


What is the reason for having a certificate extension to describe how a key id is generated?
I don't think the draft gives any reason.

The kiLength field seems pointless. You can look at the actual key id (also in the cert) to get its length.

A kiHashInput value of id-subjectPublicKey seems to mean the same thing as the kiHashInput field being absent. Two ways to say the same thing is bad.


--
James Manger