Re: [secdir] [Cfrg] Time to recharter CFRG as a working group? Was: Re: ISE seeks help with some crypto drafts

Tero Kivinen <kivinen@iki.fi> Wed, 20 March 2019 14:16 UTC

Return-Path: <kivinen@iki.fi>
X-Original-To: secdir@ietfa.amsl.com
Delivered-To: secdir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 498C812799B for <secdir@ietfa.amsl.com>; Wed, 20 Mar 2019 07:16:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.421
X-Spam-Level:
X-Spam-Status: No, score=-3.421 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_NEUTRAL=0.779] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LL7Ocxww1pxu for <secdir@ietfa.amsl.com>; Wed, 20 Mar 2019 07:16:40 -0700 (PDT)
Received: from mail.kivinen.iki.fi (fireball.acr.fi [83.145.195.1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1F62B12787F for <secdir@ietf.org>; Wed, 20 Mar 2019 07:16:39 -0700 (PDT)
Received: from fireball.acr.fi (localhost [127.0.0.1]) by mail.kivinen.iki.fi (8.15.2/8.15.2) with ESMTPS id x2KEFrSX011847 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Wed, 20 Mar 2019 16:15:53 +0200 (EET)
Received: (from kivinen@localhost) by fireball.acr.fi (8.15.2/8.14.8/Submit) id x2KEFp3X014618; Wed, 20 Mar 2019 16:15:51 +0200 (EET)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
Message-ID: <23698.19223.566447.639174@fireball.acr.fi>
Date: Wed, 20 Mar 2019 16:15:51 +0200
From: Tero Kivinen <kivinen@iki.fi>
To: Peter Gutmann <pgut001@cs.auckland.ac.nz>
Cc: Paul Wouters <paul@nohats.ca>, Watson Ladd <watsonbladd@gmail.com>, Martin Thomson <mt@lowentropy.net>, denis bider <denisbider.ietf@gmail.com>, secdir <secdir@ietf.org>
In-Reply-To: <1552957626423.33373@cs.auckland.ac.nz>
References: <1d8de489fc976b63a911573300a431d4.squirrel@www.amsl.com> <20190310182935.GE8182@kduck.mit.edu> <B876B124-7EDE-4E20-A878-3AAD3FA074BC@krovetz.net> <20190310191026.GF8182@kduck.mit.edu> <CAHOTMVJcosEgYV9caWapgyzQfh-g4k5DQry5n42bEfrkJvmdWQ@mail.gmail.com> <042b3f13-7d5a-12d7-e604-9f8cad197608@cs.tcd.ie> <CANeU+ZCmiTKfE1_YgjM6GX9ZCw_35mZoT8M-6VL72UhbenT2og@mail.gmail.com> <3FA4B2DD-334E-4C7C-A01E-6C370CAE4C00@ll.mit.edu> <2935C6E3-3AE8-4447-BA01-8DAE0410E5C6@ericsson.com> <CAL02cgSeCgAOOh3oMhJZqCGvT0F=JQ6n-bmgWYU=6hxkV+aOHQ@mail.gmail.com> <0d38eabd-6f90-2d19-3b45-f1ce19ba9b73@nthpermutation.com> <CAL02cgRVXn2U3SKhGh6biTZJKmHM6KrW6D_rVB2-ZTC5Oohh4w@mail.gmail.com> <829ca608-8d47-083e-e0a6-e7276525b080@nthpermutation.com> <5FAC333B-38EF-4F58-89FB-3DF3F774DD2C@inf.ethz.ch> <F6A7941E-17AD-4525-905B-B76E09D8E780@nohats.ca> <679B6759-5AD3-4F28-9EF4-8794F383468B@mit.edu> <CADPMZDDYNoxK1uu06MFp4==GfAmRucCXO8R63X+q6bV0=OoXwg@mail.gmail.com> <df8882e7-da71-9007-4440-5777958fd87c@gmail .com> <CADPMZDCaeN7iLuPgAe5gSQDvMRx6eGut6rqcAM7GQLWPwBFLPA@mail.gmail.com> <1552890164140.4569@cs.auckland.ac.nz> <CADPMZDC4ONMPoGfT2LAotjkbxWxr1LkOWmc735Lqc9hWCkECoA@mail.gmail.com> <CACsn0cn2yop7oD+-6jUD3LpDY85YqoPY5sqKSLBBed-m++50Cg@mail.gmail.com> <B2DC61AF-3C81-4B16-A045-E9D5D8B7F68B@nohats.ca> <1552957626423.33373@cs.auckland.ac.nz>
X-Mailer: VM 8.2.0b under 25.1.1 (x86_64--netbsd)
X-Edit-Time: 11 min
X-Total-Time: 11 min
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdir/xfkCGstXl8kFKdqZCFDxvUzD-jE>
Subject: Re: [secdir] [Cfrg] Time to recharter CFRG as a working group? Was: Re: ISE seeks help with some crypto drafts
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Mar 2019 14:16:43 -0000

Peter Gutmann writes:
> Paul Wouters <paul@nohats.ca> writes:
> 
> >The standard should not be “bug compatible with the dominant
> >implementation” 
> 
> Just an additional note to this, the standard currently literally is "bug
> compatible with the dominant implementation".  If you implement SSH as per the
> core RFCs, sticking to all the MUSTs and whatnot, it won't talk to OpenSSH,
> which means it de facto won't work.
> 
> Also, expanding on Denis' comment about the PROTOOCOL doc:
> 
>   Note that OpenSSH's sftp and sftp-server implement revision 3 of the SSH
>   filexfer protocol described in:
> 
>   https://www.openssh.com/txt/draft-ietf-secsh-filexfer-02.txt
> 
>   Newer versions of the draft will not be supported, though some features
>   are individually implemented as extensions described below.
> 
> I don't know if much, or even anything, supports any of draft-ietf-secsh-
> filexfer-03.txt through to draft-ietf-secsh-filexfer-13.txt.  So the standard
> in this case is "use a 17-year-old expired draft, but not any newer version of
> the same document".

Secsh WG was active between 1997-2006. The filexfer-02 was published
in 2001 and final filexfer-13 was published in 2006, i.e., the -13
version is what the working group was working on. My understanding was
that the issue was that openssh did not want to implement what was
specified in the working group because of the issues with trademarks,
personalities and things not at all relevant to the actual protocol
development or IETF work. Those things practically killed the group
and there was not that much work ongoing after that.

This does not mean that IETF working groups do not work, it just mean
that one group did fail.

In the IPsec we had similar situation where we did finish the base
specifications closed up the working at 2005. Created a new working
group IPsecME (IP Security Maintenance and Extensions) in 2008 to
create place for working extensions and fixes for IPsec protocol
suite. We have rechartered several times since, every time checking
out our current set of extensions proposed for us and taken those
which had enough interest.

So I do not think that forming working group raises the bar too high,
or makes things too difficult, the issues with secsh was (and I think
is) not related to IETF processes.

Jan  9  2001 draft-ietf-secsh-filexfer-00.txt
Mar  5  2001 draft-ietf-secsh-filexfer-01.txt
Nov 21  2001 draft-ietf-secsh-filexfer-02.txt
Oct 17  2002 draft-ietf-secsh-filexfer-03.txt
Dec 20  2002 draft-ietf-secsh-filexfer-04.txt
Feb 12  2004 draft-ietf-secsh-filexfer-05.txt
Oct 27  2004 draft-ietf-secsh-filexfer-06.txt
Mar 25  2005 draft-ietf-secsh-filexfer-07.txt
Apr  6  2005 draft-ietf-secsh-filexfer-08.txt
Jun 13  2005 draft-ietf-secsh-filexfer-09.txt
Oct  6  2005 draft-ietf-secsh-filexfer-10.txt
Jan 18  2006 draft-ietf-secsh-filexfer-11.txt
Jan 26  2006 draft-ietf-secsh-filexfer-12.txt
Jul 18  2006 draft-ietf-secsh-filexfer-13.txt
-- 
kivinen@iki.fi