Re: [saag] sntrup761x25519-sha512
Tero Kivinen <kivinen@iki.fi> Wed, 24 May 2023 21:17 UTC
Return-Path: <kivinen@iki.fi>
X-Original-To: saag@ietfa.amsl.com
Delivered-To: saag@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 63014C1519BE for <saag@ietfa.amsl.com>; Wed, 24 May 2023 14:17:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.097
X-Spam-Level:
X-Spam-Status: No, score=-7.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, NICE_REPLY_A=-0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=iki.fi
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 96l1uRrqPF2J for <saag@ietfa.amsl.com>; Wed, 24 May 2023 14:17:04 -0700 (PDT)
Received: from meesny.iki.fi (meesny.iki.fi [IPv6:2001:67c:2b0:1c1::201]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 60A1AC151B12 for <saag@ietf.org>; Wed, 24 May 2023 14:16:57 -0700 (PDT)
Received: from fireball.acr.fi (fireball.acr.fi [83.145.195.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) (Authenticated sender: kivinen@iki.fi) by meesny.iki.fi (Postfix) with ESMTPSA id 4QRPBr22BlzyPY; Thu, 25 May 2023 00:16:51 +0300 (EEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=iki.fi; s=meesny; t=1684963012; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=jfLw+ZRqSqhtImXApxTX3l2rJFUC/bDbdq/mSYLutiM=; b=eTxtSVfdbFmdMupfcLRQzKU6Zd6jQjLs2ZKzV7+S8TCK5R6AWViAUAfUQs3z9kidyTvB0/ 5HHWvsDsz5GsGvwWVvXN6tY0Qo2V3v+AHFtUKrzNG/5DpZhHJvsdwmuU4nurTaM7IfKUW4 2y7IM2ix96dnLGGHka86GHWPyrQkKDE=
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=iki.fi; s=meesny; t=1684963012; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=jfLw+ZRqSqhtImXApxTX3l2rJFUC/bDbdq/mSYLutiM=; b=KVL+QqhINkK/D8uBIqh8qOTSrGxLHZ0+26f3fnkgkjdF5sgiCFSLFI7ajR43qBjbyINN16 AlWVjUitaWNlxrDCylV+KnlpiGeO/ouMCHOZWhcm1Ln124LLVx2dY05r/BdEHk16mEFnhQ +JfeyQX7JRqplMMgQoEqKjx3P7BJ+rg=
ARC-Authentication-Results: i=1; ORIGINATING; auth=pass smtp.auth=kivinen@iki.fi smtp.mailfrom=kivinen@iki.fi
ARC-Seal: i=1; s=meesny; d=iki.fi; t=1684963012; a=rsa-sha256; cv=none; b=ctbDNrKA7O0rcWzENkPoj+i7OWnBuxU+wQuUiVy1+MSx38sTzCA/hONpyG9xOUbIRlrTqg ZtsR/64WMdQaw1MzwFdn9JXzSq51IjeP/SSTCs+fZZO8aHpmH/ZzOkvt8zmrC4jbNDBSmf 0yE7oEwgnFxUHsQixk5vHjP9B+EP5XY=
Received: by fireball.acr.fi (Postfix, from userid 15204) id 35AEB25C1304; Thu, 25 May 2023 00:16:51 +0300 (EEST)
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Message-ID: <25710.32450.966653.66336@fireball.acr.fi>
Date: Thu, 25 May 2023 00:16:50 +0300
From: Tero Kivinen <kivinen@iki.fi>
To: Eric Rescorla <ekr@rtfm.com>
Cc: Simon Josefsson <simon=40josefsson.org@dmarc.ietf.org>, saag@ietf.org
In-Reply-To: <CABcZeBMobKFKjtFn3xt7DDD1rx0ZtvW2m5sq6Gz1q29ETp04rQ@mail.gmail.com>
References: <875y8y4ip2.fsf@kaka.sjd.se> <84296E62-5843-4E7A-BD43-430491A5A1F3@akamai.com> <874jo8ytgw.fsf@kaka.sjd.se> <f6aa133635084609b0032ab1cfbfb7ce@amazon.com> <87sfbny046.fsf@kaka.sjd.se> <CABcZeBME4CRjd+4kqFCzYOmaOEafUiabsBoUQ0Eqm8A7OD-46A@mail.gmail.com> <87fs7nxj9f.fsf@kaka.sjd.se> <b82f1264-3935-4ca0-918a-fdb7f819c2bf@app.fastmail.com> <877csyznd1.fsf@kaka.sjd.se> <CABcZeBMobKFKjtFn3xt7DDD1rx0ZtvW2m5sq6Gz1q29ETp04rQ@mail.gmail.com>
X-Mailer: VM 8.2.0b under 26.3 (x86_64--netbsd)
X-Edit-Time: 12 min
X-Total-Time: 11 min
Archived-At: <https://mailarchive.ietf.org/arch/msg/saag/CcpQSyqpryzdIxVdHU70jPdqemw>
Subject: Re: [saag] sntrup761x25519-sha512
X-BeenThere: saag@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Security Area Advisory Group <saag.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/saag>, <mailto:saag-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/saag/>
List-Post: <mailto:saag@ietf.org>
List-Help: <mailto:saag-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/saag>, <mailto:saag-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 24 May 2023 21:17:08 -0000
Eric Rescorla writes: > Without taking a position on this draft, I think it would be good if > we loosened the policy for the SSH-KEX registry, as we have for TLS > and some other protocols. Note, that SSH actually has much looser registry policy than any of the other protocols like TLS. All names having @example.com are free for that organization to allocate as they like. I.e. openssh has allocated several protocol names from @openssh.com domain. The reason names without @ require more checking is because those are supposed to have some meaning, i.e., they are something that have gone through the IETF consensus process, and because of that there might be more people actually willing to use them. There are several implementations who already implement openssh.com specific names for different algorithms. The idea is that if we go through the IETF consensus process then the name to refer the algorithm will be different, i.e., it will not be @open.ssh.com anymore, it will be name without @-sign, thus it will be completely different entry point, and if the IETF did some changes to the protocol then those implementations who want to support both IANA allocated name and @openssh.com allocated name, needs to implement both. If IETF does not make any changes, then implementations can simply add alias to their existing @openssh.com name so it will point to IANA allocated name. Because of this I do not think it is good idea to relax the allocation policies for the ssh registries even more. They already allow anybody to allocate names very easily, and I think it is good idea to have bit of difference between private names and IANA allocated names, i.e., bit more review done by IETF for IANA allocated names. What I think would be possible to add a list of "known algorithms for specific domains", i.e., list of known foo@example.com names and pointer pointing them to the whatever stable reference those domains are having for their own extensions with clear understanding that IETF does has not checked those algorithms in any way, and does not know whether they are secure or not. If the IANA page would have something like this in the end that would be useful (separate from normal IANA registries). Having those documents going through AD sponsored role should not be that big issue. -- kivinen@iki.fi
- Re: [saag] sntrup761x25519-sha512 Simon Josefsson
- Re: [saag] sntrup761x25519-sha512 Kampanakis, Panos
- Re: [saag] sntrup761x25519-sha512 Simon Josefsson
- Re: [saag] sntrup761x25519-sha512 Martin Thomson
- Re: [saag] sntrup761x25519-sha512 Simon Josefsson
- Re: [saag] sntrup761x25519-sha512 Eric Rescorla
- Re: [saag] sntrup761x25519-sha512 Simon Josefsson
- Re: [saag] sntrup761x25519-sha512 John Mattsson
- Re: [saag] sntrup761x25519-sha512 Rene Struik
- Re: [saag] sntrup761x25519-sha512 Kampanakis, Panos
- Re: [saag] sntrup761x25519-sha512 Martin Thomson
- Re: [saag] sntrup761x25519-sha512 Loganaden Velvindron
- Re: [saag] sntrup761x25519-sha512 Simon Josefsson
- Re: [saag] sntrup761x25519-sha512 Eric Rescorla
- Re: [saag] sntrup761x25519-sha512 Mark Baushke
- Re: [saag] sntrup761x25519-sha512 Paul Wouters
- Re: [saag] sntrup761x25519-sha512 Peter Yee
- Re: [saag] sntrup761x25519-sha512 Mark Baushke
- Re: [saag] sntrup761x25519-sha512 Peter Yee
- Re: [saag] sntrup761x25519-sha512 Tero Kivinen
- Re: [saag] sntrup761x25519-sha512 Stephen Farrell
- Re: [saag] sntrup761x25519-sha512 Peter Gutmann
- Re: [saag] sntrup761x25519-sha512 Tero Kivinen