Re: [Secdispatch] Document that registers the SECG secp256k1 elliptic curve

Mike Jones <Michael.Jones@microsoft.com> Fri, 08 June 2018 19:23 UTC

Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: secdispatch@ietfa.amsl.com
Delivered-To: secdispatch@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 10736130EFD for <secdispatch@ietfa.amsl.com>; Fri, 8 Jun 2018 12:23:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.01
X-Spam-Level:
X-Spam-Status: No, score=-2.01 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=microsoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EPyKsjq0v4aa for <secdispatch@ietfa.amsl.com>; Fri, 8 Jun 2018 12:23:48 -0700 (PDT)
Received: from NAM03-CO1-obe.outbound.protection.outlook.com (mail-co1nam03on071c.outbound.protection.outlook.com [IPv6:2a01:111:f400:fe48::71c]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F2F40130F7C for <secdispatch@ietf.org>; Fri, 8 Jun 2018 12:23:41 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=HmyNBGVBkN6ciHUSBJXVw4ShzMrgAQ8f4EPsZ+6/UHw=; b=XGcsumv8jIWVj3XVy+EViXT3BZovE0OZRSkxVPxBpX0zPD5b/m7uI3gL5o/8p1beLDKdtZUIPeRTuBD71HER86c+NOAicOo+KyaX3HRzKhSSuaKf03Io1g3FHpP+5SDEo3iPoHMHHLotH1XIAldkNNQrWxy/eClN6udVyqg6mEc=
Received: from BL0PR00MB0292.namprd00.prod.outlook.com (52.132.19.158) by BL0PR00MB0292.namprd00.prod.outlook.com (52.132.19.158) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.880.0; Fri, 8 Jun 2018 19:23:32 +0000
Received: from BL0PR00MB0292.namprd00.prod.outlook.com ([fe80::13e:8f40:ef2a:4b2f]) by BL0PR00MB0292.namprd00.prod.outlook.com ([fe80::13e:8f40:ef2a:4b2f%3]) with mapi id 15.20.0880.000; Fri, 8 Jun 2018 19:23:32 +0000
From: Mike Jones <Michael.Jones@microsoft.com>
To: Phillip Hallam-Baker <phill@hallambaker.com>
CC: "secdispatch@ietf.org" <secdispatch@ietf.org>, Benjamin Kaduk <kaduk@mit.edu>
Thread-Topic: [Secdispatch] Document that registers the SECG secp256k1 elliptic curve
Thread-Index: AdP8Kdnc3ZZaMd5VTPONut+KoS2cIQADoAAAAMUz5FAAA4zggAAAo6QA
Date: Fri, 08 Jun 2018 19:23:32 +0000
Message-ID: <BL0PR00MB0292B6891FCF5AA30D590E34F57B0@BL0PR00MB0292.namprd00.prod.outlook.com>
References: <BL0PR00MB02927CDBA6AE65BB7979118FF5670@BL0PR00MB0292.namprd00.prod.outlook.com> <CAMm+Lwgf9nwPdhT7Gdex+mRhdRyfstwyYk-znpWFmaRchM_8vA@mail.gmail.com> <BL0PR00MB029274D5B739CC78BE98B3E5F57B0@BL0PR00MB0292.namprd00.prod.outlook.com> <CAMm+LwgbWr+xF6nKU=jhCQuA_J=vHLNfFFqyN7uLH3-tiV2jOQ@mail.gmail.com>
In-Reply-To: <CAMm+LwgbWr+xF6nKU=jhCQuA_J=vHLNfFFqyN7uLH3-tiV2jOQ@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Enabled=True; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SiteId=72f988bf-86f1-41af-91ab-2d7cd011db47; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Owner=mbj@microsoft.com; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SetDate=2018-06-08T19:23:29.4388720Z; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Name=General; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Application=Microsoft Azure Information Protection; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Extended_MSFT_Method=Automatic; Sensitivity=General
x-originating-ip: [2001:4898:80e8:1:8d97:35c9:9394:f501]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; BL0PR00MB0292; 7:0cW26E4GcjYFY9HYtCRc0kDizh6bGbkHxzjtLIlh0dGZoHziVDrkwOnqn2W76exRHe4tg6rRwMQ7/aN2LXnuOuVeuW7TjR78AWWpfqldikRgrvsT90ZA9DdXdnsnxUj5vo1PxVXakOhDZsisXoYbixQazXmhvau6IOjrJlmxBM5RLFuHDEgHymGScILGYcBWHl9ExlkErUq7PKG5VZTX8RsRGa9ApepwywpG+3Wo5hCIx5H08n62xkBFadz/9fGq
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652020)(48565401081)(5600026)(4534165)(4627221)(201703031133081)(201702281549075)(2017052603328)(7193020); SRVR:BL0PR00MB0292;
x-ms-traffictypediagnostic: BL0PR00MB0292:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=Michael.Jones@microsoft.com;
x-microsoft-antispam-prvs: <BL0PR00MB029262B0B8A1F379A2A738F0F57B0@BL0PR00MB0292.namprd00.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(28532068793085)(89211679590171)(85827821059158)(21748063052155)(240460790083961)(5213294742642);
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(2017102700009)(2017102701064)(6040522)(2401047)(5005006)(8121501046)(2017102702064)(20171027021009)(20171027022009)(20171027023009)(20171027024009)(20171027025009)(20171027026009)(2017102703076)(3231254)(2018427008)(944501410)(52105095)(93006095)(93001095)(3002001)(10201501046)(6055026)(149027)(150027)(6041310)(20161123562045)(20161123560045)(20161123564045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123558120)(6072148)(201708071742011)(7699016); SRVR:BL0PR00MB0292; BCL:0; PCL:0; RULEID:; SRVR:BL0PR00MB0292;
x-forefront-prvs: 06973FFAD3
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(39860400002)(396003)(366004)(39380400002)(346002)(376002)(199004)(52254002)(189003)(53546011)(59450400001)(6506007)(478600001)(5250100002)(10290500003)(186003)(10090500001)(46003)(86612001)(446003)(486006)(99286004)(76176011)(86362001)(476003)(11346002)(102836004)(72206003)(22452003)(966005)(8990500004)(33656002)(54906003)(19609705001)(316002)(14454004)(5660300001)(53936002)(6436002)(81166006)(236005)(6246003)(2906002)(2900100001)(229853002)(68736007)(97736004)(7696005)(106356001)(74316002)(55016002)(54896002)(8676002)(81156014)(7736002)(8936002)(105586002)(6306002)(9686003)(6116002)(790700001)(3660700001)(3280700002)(93886005)(4326008)(6916009)(606006)(25786009); DIR:OUT; SFP:1102; SCL:1; SRVR:BL0PR00MB0292; H:BL0PR00MB0292.namprd00.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: microsoft.com does not designate permitted sender hosts)
x-microsoft-antispam-message-info: B97thRXXBObRcqX/+yemnQCIBioWqwZl0UahKm8buWYKezKbI5Edr8jE4ti0u74wbI5pMAnBSGCSg6Fw1eSYalsHOGmLi/GDXKFBNz1g8ekeHazj23tc1tJMl4FYRzbSmzv6C0cOc8KUr9eTr9OvNte/db1IKwuj4RYG2jq0FUj0mndD48S+tU6DScAp5ChW
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_BL0PR00MB0292B6891FCF5AA30D590E34F57B0BL0PR00MB0292namp_"
MIME-Version: 1.0
X-MS-Office365-Filtering-Correlation-Id: 3bdf67ed-0db7-4813-bd85-08d5cd75528e
X-OriginatorOrg: microsoft.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 3bdf67ed-0db7-4813-bd85-08d5cd75528e
X-MS-Exchange-CrossTenant-originalarrivaltime: 08 Jun 2018 19:23:32.1606 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL0PR00MB0292
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdispatch/i30ilATxDbZuY3jOkLZKG-GCOl4>
Subject: Re: [Secdispatch] Document that registers the SECG secp256k1 elliptic curve
X-BeenThere: secdispatch@ietf.org
X-Mailman-Version: 2.1.26
Precedence: list
List-Id: Security Dispatch <secdispatch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdispatch/>
List-Post: <mailto:secdispatch@ietf.org>
List-Help: <mailto:secdispatch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 08 Jun 2018 19:23:52 -0000

Sure.  I was actually thinking of adding an appendix much like the one at https://tools.ietf.org/html/rfc7518#appendix-A cross-referencing the different identifiers.

                                                                -- Mike

From: Secdispatch <secdispatch-bounces@ietf.org> On Behalf Of Phillip Hallam-Baker
Sent: Friday, June 8, 2018 12:03 PM
To: Mike Jones <Michael.Jones@microsoft.com>
Cc: secdispatch@ietf.org; Benjamin Kaduk <kaduk@mit.edu>
Subject: Re: [Secdispatch] Document that registers the SECG secp256k1 elliptic curve

Could you point to those definitions in your draft so that we close the circle?

There are two reasons for this. First, a lot of folk are going to use your draft as cookie cutter for theirs and so there may not be an OID. But equally importantly, we need to capture the fact that these two things are the same. Otherwise, we are likely to end up having to write documents to state that...


On Fri, Jun 8, 2018 at 1:43 PM, Mike Jones <Michael.Jones@microsoft.com<mailto:Michael.Jones@microsoft..com>> wrote:
Thanks for asking, Phillip.  I just took the time to look up whether there is already an OID registered for this curve and it turns out that there is.  See Section A.2.1 of http://www.secg.org/sec2-v2.pdf which specifies the OID 1.3.132.0.10 for secp256k1  (and also specifies OIDs for the other curves specified therein, such as 1.2.840.10045.3.1.7 for secp256r1).  Furthermore, RFC 5758 specifies the OID 1.2.840.10045.4.3.2 for ECDSA with SHA-256 in https://tools.ietf.org/html/rfc5758#section-3.2.

So I believe we’re already covered on the OID registrations.

                                                       -- Mike

From: hallam@gmail.com<mailto:hallam@gmail.com> <hallam@gmail.com<mailto:hallam@gmail.com>> On Behalf Of Phillip Hallam-Baker
Sent: Monday, June 4, 2018 12:15 PM
To: Mike Jones <Michael.Jones@microsoft.com<mailto:Michael.Jones@microsoft.com>>
Cc: secdispatch@ietf.org<mailto:secdispatch@ietf.org>; Benjamin Kaduk <kaduk@mit.edu<mailto:kaduk@mit.edu>>
Subject: Re: [Secdispatch] Document that registers the SECG secp256k1 elliptic curve

If we are going to register algorithms, perhaps we could do all of them in one doc including ASN.1 OIDS. These need not be new code points if already specified but we should have one OID for IETF purposes per algorithm wherever possible.


On Mon, Jun 4, 2018 at 3:12 PM, Mike Jones <Michael..Jones=40microsoft.com@dmarc.ietf.org<mailto:Michael.Jones=40microsoft.com@dmarc.ietf.org>> wrote:
This note is soliciting feedback on the best path for https://tools.ietf.org/html/draft-jones-webauthn-secp256k1-00 to become an RFC.  Its purpose is very specific and narrow:  It registers JOSE and COSE curve identifiers for the SECG secp256k1 elliptic curve and associated algorithm identifiers.   This is used by FIDO UAF, the W3C Verifiable Claims interest group, and several blockchain projects.  I want to get standard identifiers registered so these projects can use standards-based, rather than ad-hoc, cryptographic representations.  Given the widespread use of this curve and algorithm, I would like this spec to become an RFC so that the small integer values can be assigned for COSE, per the “Standards Action” requirement for the Label assignment in the registry policy at https://tools.ietf.org/html/rfc8152#section-16.2. I believe it’s also very likely that some IETF specifications will end up using these registrations as well.

As background, I’d committed to the W3C Web Authentication (WebAuthn) working group and the FIDO Alliance to register all the algorithms used by their specifications that do not have current IANA registrations for JOSE and COSE.  https://tools.ietf.org/html/draft-jones-webauthn-cose-algorithms-01 started this process by registering additional RSA algorithms (with help from Jim Schaad, Sean Turner, and others).  The next step in this process is registering the SECG secp256k1 elliptic curve and associated algorithm identifiers.

Ben Kaduk suggested that I ask SecDispatch for input on the best path forward.  For instance, is anyone interested in reviewing the document or being the document shepherd?  I believe that Area Director sponsorship probably makes the best sense for this very targeted document but am open to other options.   I know that the W3C and the FIDO Alliance would appreciate having a path forward for these registrations.

Thanks for your feedback.

                                                       -- Mike


_______________________________________________
Secdispatch mailing list
Secdispatch@ietf.org<mailto:Secdispatch@ietf.org>
https://www.ietf.org/mailman/listinfo/secdispatch