[saag] Re: New Version Notification for draft-rsalz-crypto-registries-00.txt
Paul Wouters <paul.wouters@aiven.io> Thu, 28 November 2024 17:33 UTC
Return-Path: <paul.wouters@aiven.io>
X-Original-To: saag@ietfa.amsl.com
Delivered-To: saag@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CFC3EC1CAF48 for <saag@ietfa.amsl.com>; Thu, 28 Nov 2024 09:33:21 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.107
X-Spam-Level:
X-Spam-Status: No, score=-2.107 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=aiven.io
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WyTFi1Yz6TZM for <saag@ietfa.amsl.com>; Thu, 28 Nov 2024 09:33:17 -0800 (PST)
Received: from mail-wr1-x42b.google.com (mail-wr1-x42b.google.com [IPv6:2a00:1450:4864:20::42b]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 46511C1DC80C for <saag@ietf.org>; Thu, 28 Nov 2024 09:33:17 -0800 (PST)
Received: by mail-wr1-x42b.google.com with SMTP id ffacd0b85a97d-382411ea5eeso653182f8f.0 for <saag@ietf.org>; Thu, 28 Nov 2024 09:33:17 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=aiven.io; s=google; t=1732815196; x=1733419996; darn=ietf.org; h=to:in-reply-to:cc:references:message-id:date:subject:mime-version :from:content-transfer-encoding:from:to:cc:subject:date:message-id :reply-to; bh=LXz4vKDBnZ10OlmONbDY8uSyjAB+Pkxxg9TyZLe8QeQ=; b=FgFfnUzRcnU7e8+Z7VMg9uWMDgzSoSeE0QiIyV5KedLKiWIab0npD0uxNiVm+vqJrL SiyXEimMOLunpz4/O1NbrMAwG62GT5Lh9jTRLRg/6linemNYElhCcrOwvPcV11YYKRV5 RSp/HFnRIiqqQUGnhOTS5jRkGRiXnQx3tpbaI=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1732815196; x=1733419996; h=to:in-reply-to:cc:references:message-id:date:subject:mime-version :from:content-transfer-encoding:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=LXz4vKDBnZ10OlmONbDY8uSyjAB+Pkxxg9TyZLe8QeQ=; b=WwN8slTT2CMnxMY2bbbpkdulAMAXOu2wpsiU5K7JdlLaFuAPYyD/u1ybVDbX8TQ3xv Qbm0Ebip6vCs4SgGErH/U+tLIEgExqgCUF677hlglFmMYmTOt+Q+qz4AMC3tn8AkxWeM VwMyJIWMN8SKjD8zoH7uVdEj0ddlmS9aPNgU3V3AfSSyo+Pp5e7CZFfGg9qeia/TujtR /WWCwf+aOaUAqZf++1adqSvqJNum3LgeeDwIBEI81IqSFzbt/0n9+/+6jtsk+Oi8QHrD KVgGYlayngy57cSlaRRRqVPkUm/Us3fKiOtJ5++vh15pQYM5UM+g1PaIUta9tcjtF13n Q2OQ==
X-Forwarded-Encrypted: i=1; AJvYcCWR7zZEuR4Gg08ZYereGPEmgEHZo/21lJ4J42UJK4bPQ2jWVAkEZYAuL7gunj5du9tb6SAR@ietf.org
X-Gm-Message-State: AOJu0Yx1s7lEC0UXZzk+7pjOVwtNKbeAeRQPTkLc+tEh8ZKZ1DDelfuq qSnH+VOHN/PUpsn9YLShH11KW507LPkrlxH4dzuLWmSVsmdfrw6bUmjlhUX2+pk=
X-Gm-Gg: ASbGncv4I6ijTZcWTboG8E7H9yhHzbmytLuQyllfu3k6tJQ2i7wNCzkn+OSGjsEhC7I RPjo+JKkWPpen9Cr8HU6F+U4M8/YMSJFTDj31URWXCv/iT5gMYTFVYtoJP2HZnwb96kUE/m+Xow CGFrceqaYpRuWCTbdKsdAVBqCS3LU/S0n49XWQWcvaV7DzkJxSMiwDi7divCsGGyxwzhilG8SbQ vM8+y8P5RyN3E6sM99hd68AeVNZ6/YU5zKyQIzL/oIrbcI6ib/Sr0j1+TEkfdfq1EbOCFJvPoLe JAo=
X-Google-Smtp-Source: AGHT+IE2Wyogethqxd2Amc7DeEB4oChYMhwKCD24dTTHibZWbOifl8f+FxLbQ5xGux1VPY7M60tuyw==
X-Received: by 2002:a5d:5c05:0:b0:385:d7f9:f15f with SMTP id ffacd0b85a97d-385d7f9f229mr1074810f8f.19.1732815195716; Thu, 28 Nov 2024 09:33:15 -0800 (PST)
Received: from smtpclient.apple ([2001:56b:3fed:6976:192b:e682:ee99:6c16]) by smtp.gmail.com with ESMTPSA id 8926c6da1cb9f-4e230e90723sm351986173.153.2024.11.28.09.33.15 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Thu, 28 Nov 2024 09:33:15 -0800 (PST)
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
From: Paul Wouters <paul.wouters@aiven.io>
Mime-Version: 1.0 (1.0)
Date: Thu, 28 Nov 2024 12:33:04 -0500
Message-Id: <4855756A-0AB8-44C1-9A44-45D477E0A548@aiven.io>
References: <87zfljybgc.fsf@kaka.sjd.se>
In-Reply-To: <87zfljybgc.fsf@kaka.sjd.se>
To: Simon Josefsson <simon=40josefsson.org@dmarc.ietf.org>
X-Mailer: iPhone Mail (21H16)
Message-ID-Hash: PLP55SWK4I6AEXPJQ4YOT2CFU5IXYLXB
X-Message-ID-Hash: PLP55SWK4I6AEXPJQ4YOT2CFU5IXYLXB
X-MailFrom: paul.wouters@aiven.io
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-saag.ietf.org-0; header-match-saag.ietf.org-1; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: Tero Kivinen <kivinen@iki.fi>, Damien Miller <djm@mindrot.org>, "Salz, Rich" <rsalz=40akamai.com@dmarc.ietf.org>, saag@ietf.org
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [saag] Re: New Version Notification for draft-rsalz-crypto-registries-00.txt
List-Id: Security Area Advisory Group <saag.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/saag/La-fXBEbMqRhwOWrxDfKzIypE-A>
List-Archive: <https://mailarchive.ietf.org/arch/browse/saag>
List-Help: <mailto:saag-request@ietf.org?subject=help>
List-Owner: <mailto:saag-owner@ietf.org>
List-Post: <mailto:saag@ietf.org>
List-Subscribe: <mailto:saag-join@ietf.org>
List-Unsubscribe: <mailto:saag-leave@ietf.org>
> On Nov 28, 2024, at 04:07, Simon Josefsson <simon=40josefsson.org@dmarc.ietf.org> wrote: > > > I share that sympathy. We can help them by making the IETF a welcoming > place to get documents reviewed, improved and published. > > I believe the IETF share the responsibility for things ending up in the > way you describe. > > While it is easy to cast the blame on OpenSSH folks for doing the > actions, I believe the primary place to improve the outcome is in the > IETF. It's not OpenSSH that should change, it's the IETF. Again you seem to want to have the benefits of the IETF process while skipping the IETF process that yields that value to the community. > If the IETF had been a more attractive place to come to and get things > done, doing so happens naturally and automatically. and somehow most protocols can do this fine except ssh ? > Unfortunately, I see diminishing interest in acknowleding or improving > this state. as long a you believe only ietf is wrong, i can see how your statement becomes true. > Instead there appears to be strong interest in using the > powers to 1) delay, defer and stop publications (ssh-ntruprime, peap, > anything non-nist) "the powers" being the entire active ietf community, except 3 ssh people with a very personal agenda about cryptography. The rough consensus is that there is no appetite for NTRUprime. the reasonings of why some believe this case is special because of its "widespread use", ignore the market position of these three people and 1 implementation who pushed through defaults as they saw fitting their own cryptographic and political agenda. Don't blame IETF for this. > and 2) publish specifications that are incompatible > with deployments which damages ecosystems (pgp) it's interesting you pick this example as i was closely involved after the first re-opened openpgp working group failed due to one draft author adding stuff without working group consensus, then claiming the code point later after they walked away from IETF during a two year additional run of the re-re-opened working group. The IETF here had weekly calls to move forward with the openpgp document and the author in the rough was part of that until the substituted themselves with their candidate of choice from their own implementation. two years later they complained about the results. How is this the IETFs fault ? The IETF even skipped the code point to avoid wide scale issues because of the one person squatting a code point for their own homegrown stuff. Remember, "rough consensus", not Kings or Rockstars or single implementors / implementations. > , and 3) favor protocols > that lead to weaker system security due to complexity (ipsec, x509). i assume you mean IKE, not IPsec (if not I advise you to check the wire formats of wireguard and ESP). I also advise you to look at how one does negotiate parameters with WireGuard - hint it requires its own crypto stack, usually HTTPS or SSH for a severely limited hardcoded way of doing things. That might work for your basement but not at scale. You want to do just in time operator access for VPN to a bastion host? you need to use an entire different (ssh) protocol to login to the bastion with root access allowing you to modify crypto keys inside the kernel. Then do the same later on to remove the state. complaining about x509 and proposing a simpler alternative that doesn't meet the minimum requirements won't help (eg see "age" vs "openpgp" ) IETF is slower because we make things that apply to different deployment scenarios. it involves listening and talking and discussion with many different people and taking their points into consideration. saying x509 leads to weaker system security is cute, and everyone here agrees the complexity is not ideal. Replacing it is a difficult large project. Meanwhile, it's the basis for almost all encrypted internet connections. it's offering real life security benefits for everyone doing web, email, vpn. Again coming in isolation, with a single use case solution, and having everyone write custom wrapper code (around wireguard, around ssh certificates) is itself a huge unknown risk because all that wrapper code has been mostly unaudited, unseen and hacked by generic non-security (often junior) software engineers. It's guaranteed to be less secure, less maintained, and never revisited. A large part of academic public cryptographic research and development happens around NIST competitions. That's not something the IETF can change. It is not surprising that IETF picks among those candidates. In the previous round, IETF ended up selecting a NIST and a non-NIST algorithm as the defacto algorithms. Nothing suggests it will be different this time. Paul
- [saag] FW: New Version Notification for draft-rsa… Salz, Rich
- [saag] Re: New Version Notification for draft-rsa… Salz, Rich
- [saag] Re: FW: New Version Notification for draft… Simon Josefsson
- [saag] Re: New Version Notification for draft-rsa… Simon Josefsson
- [saag] Re: New Version Notification for draft-rsa… Salz, Rich
- [saag] Re: New Version Notification for draft-rsa… Tero Kivinen
- [saag] Re: New Version Notification for draft-rsa… Damien Miller
- [saag] Re: New Version Notification for draft-rsa… Simon Josefsson
- [saag] Re: New Version Notification for draft-rsa… Tero Kivinen
- [saag] Re: New Version Notification for draft-rsa… Paul Wouters
- [saag] Re: New Version Notification for draft-rsa… Michael Richardson
- [saag] Re: New Version Notification for draft-rsa… Salz, Rich
- [saag] Re: New Version Notification for draft-rsa… Stephen Farrell
- [saag] Re: New Version Notification for draft-rsa… Peter Gutmann
- [saag] Re: New Version Notification for draft-rsa… Michael Richardson
- [saag] Re: New Version Notification for draft-rsa… Peter Gutmann
- [saag] Re: New Version Notification for draft-rsa… Salz, Rich
- [saag] Re: New Version Notification for draft-rsa… Paul Wouters
- [saag] Re: New Version Notification for draft-rsa… Michael Richardson
- [saag] Re: New Version Notification for draft-rsa… Watson Ladd
- [saag] Re: New Version Notification for draft-rsa… Paul Wouters
- [saag] Re: New Version Notification for draft-rsa… Paul Wouters
- [saag] Re: New Version Notification for draft-rsa… Paul Wouters
- [saag] Re: New Version Notification for draft-rsa… D. J. Bernstein
- [saag] Re: New Version Notification for draft-rsa… Salz, Rich
- [saag] Re: New Version Notification for draft-rsa… Eliot Lear
- [saag] Re: New Version Notification for draft-rsa… Paul Wouters
- [saag] Re: New Version Notification for draft-rsa… Watson Ladd
- [saag] Re: New Version Notification for draft-rsa… Eliot Lear
- [saag] Re: New Version Notification for draft-rsa… Eliot Lear
- [saag] Re: New Version Notification for draft-rsa… Watson Ladd
- [saag] Re: New Version Notification for draft-rsa… D. J. Bernstein
- [saag] Re: New Version Notification for draft-rsa… Paul Wouters
- [saag] Re: New Version Notification for draft-rsa… Paul Wouters
- [saag] Re: New Version Notification for draft-rsa… Randy Bush
- [saag] Re: New Version Notification for draft-rsa… Michael Jones
- [saag] Re: New Version Notification for draft-rsa… Randy Bush
- [saag] Re: New Version Notification for draft-rsa… Eliot Lear
- [saag] Re: New Version Notification for draft-rsa… Alan DeKok
- [saag] Re: New Version Notification for draft-rsa… D. J. Bernstein
- [saag] Re: New Version Notification for draft-rsa… Damien Miller
- [saag] Re: New Version Notification for draft-rsa… Eric Rescorla
- [saag] Re: New Version Notification for draft-rsa… Stephen Farrell
- [saag] Side-comment: SSH issues (was: New Version… Peter Gutmann
- [saag] Re: New Version Notification for draft-rsa… Eric Rescorla
- [saag] Re: New Version Notification for draft-rsa… Stephen Farrell
- [saag] Re: New Version Notification for draft-rsa… Simon Josefsson
- [saag] Re: New Version Notification for draft-rsa… Simon Josefsson
- [saag] RFCs vs Standards Michael Richardson
- [saag] Re: New Version Notification for draft-rsa… D. J. Bernstein
- [saag] Re: New Version Notification for draft-rsa… Eric Rescorla
- [saag] Re: RFCs vs Standards Stephen Farrell
- [saag] Re: RFCs vs Standards John Mattsson
- [saag] Re: New Version Notification for draft-rsa… Eliot Lear
- [saag] Re: New Version Notification for draft-rsa… Peter Gutmann
- [saag] Re: RFCs vs Standards Carsten Bormann
- [saag] Re: [rfc-i] Re: RFCs vs Standards Salz, Rich
- [saag] Re: [rfc-i] RFCs vs Standards Carsten Bormann
- [saag] Re: [rfc-i] RFCs vs Standards Eliot Lear
- [saag] Re: [rfc-i] RFCs vs Standards Salz, Rich
- [saag] Re: [rfc-i] RFCs vs Standards Tim Bray
- [saag] Re: [rfc-i] RFCs vs Standards StJohns, Michael
- [saag] Re: [rfc-i] Re: Re: RFCs vs Standards Brian E Carpenter
- [saag] Re: New Version Notification for draft-rsa… Eliot Lear
- [saag] Re: New Version Notification for draft-rsa… Paul Wouters
- [saag] Re: [rfc-i] RFCs vs Standards Eric Rescorla
- [saag] Re: [rfc-i] Re: RFCs vs Standards Brian E Carpenter
- [saag] Re: [rfc-i] RFCs vs Standards Carsten Bormann
- [saag] Re: [rfc-i] RFCs vs Standards Eric Rescorla
- [saag] Re: New Version Notification for draft-rsa… Peter Gutmann
- [saag] Re: [rfc-i] Re: Re: RFCs vs Standards Joel Halpern
- [saag] Re: [rfc-i] RFCs vs Standards Behcet Sarikaya
- [saag] Re: New Version Notification for draft-rsa… Eric Rescorla
- [saag] Re: [rfc-i] Re: RFCs vs Standards Brian E Carpenter
- [saag] Re: New Version Notification for draft-rsa… Eliot Lear
- [saag] Re: [rfc-i] RFCs vs Standards Salz, Rich
- [saag] Re: [rfc-i] Re: Re: RFCs vs Standards Salz, Rich
- [saag] Re: [rfc-i] Re: Re: RFCs vs Standards Martin Thomson
- [saag] Re: [rfc-i] RFCs vs Standards Michael Richardson
- [saag] Re: [rfc-i] Re: Re: RFCs vs Standards Alan DeKok
- [saag] Re: [rfc-i] RFCs vs Standards Carsten Bormann
- [saag] Re: [rfc-i] RFCs vs Standards Salz, Rich
- [saag] Re: [rfc-i] Re: RFCs vs Standards Watson Ladd
- [saag] Re: [rfc-i] Re: Re: RFCs vs Standards Simon Josefsson
- [saag] Re: [rfc-i] Re: Re: RFCs vs Standards S Moonesamy
- [saag] Re: [rfc-i] RFCs vs Standards Eliot Lear
- [saag] Re: [rfc-i] RFCs vs Standards Eric Rescorla
- [saag] Re: [rfc-i] Re: Re: RFCs vs Standards Eric Rescorla
- [saag] Re: [rfc-i] Re: Re: RFCs vs Standards Joel Halpern
- [saag] Re: [rfc-i] Re: Re: RFCs vs Standards John Mattsson
- [saag] Re: [rfc-i] Re: Re: RFCs vs Standards Randy Bush
- [saag] Re: [rfc-i] Re: Re: RFCs vs Standards Carsten Bormann
- [saag] Re: [rfc-i] Re: Re: RFCs vs Standards Randy Bush
- [saag] Re: [rfc-i] Re: Re: RFCs vs Standards Carsten Bormann
- [saag] Re: [rfc-i] Re: Re: Re: Re: RFCs vs Standa… Phillip Hallam-Baker
- [saag] Re: [rfc-i] Re: Re: Re: Re: RFCs vs Standa… Eric Rescorla
- [saag] Re: [rfc-i] Re: Re: Re: Re: RFCs vs Standa… Tero Kivinen
- [saag] Re: [rfc-i] Re: Re: Re: Re: Re: RFCs vs St… touch@strayalpha.com
- [saag] Re: [rfc-i] Re: Re: Re: Re: RFCs vs Standa… Phillip Hallam-Baker