Re: [Secdispatch] Document that registers the SECG secp256k1 elliptic curve

John Menerick <john@syn.agency> Mon, 04 June 2018 19:17 UTC

Return-Path: <john@syn.agency>
X-Original-To: secdispatch@ietfa.amsl.com
Delivered-To: secdispatch@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F1821130DD0 for <secdispatch@ietfa.amsl.com>; Mon, 4 Jun 2018 12:17:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.7
X-Spam-Level:
X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=syn.agency
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3r9L0ZS7V7Jh for <secdispatch@ietfa.amsl.com>; Mon, 4 Jun 2018 12:17:37 -0700 (PDT)
Received: from mail2.protonmail.ch (mail2.protonmail.ch [185.70.40.22]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D0EC3130DCC for <secdispatch@ietf.org>; Mon, 4 Jun 2018 12:17:36 -0700 (PDT)
Date: Mon, 04 Jun 2018 15:17:29 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=syn.agency; s=protonmail; t=1528139851; bh=3py66KykBZF9/JVA5JAuy2UNH1sAj1EiwlRqTdl/6ew=; h=Date:To:From:Cc:Reply-To:Subject:In-Reply-To:References: Feedback-ID:From; b=Js6yzfo+FUewxROFBrZCPhXz+2bk+zdv5UL09fE6fw7Z5LCCi18U8eXaDf0RtUy1C QaU+9apL1poDTZMSikLnFi2pIAH/uwyHWKN+7llPzWkdHl3/ftW5hquoDuYebvvR6H 6hYugWUl6YyWq/P6TMVnPPANX9rYoGiSkPpNEyrI=
To: Phillip Hallam-Baker <phill@hallambaker.com>, Mike Jones <Michael.Jones=40microsoft.com@dmarc.ietf.org>
From: John Menerick <john@syn.agency>
Cc: "secdispatch@ietf.org" <secdispatch@ietf.org>, Benjamin Kaduk <kaduk@mit.edu>
Reply-To: John Menerick <john@syn.agency>
Message-ID: <quRVmqd1yO1DU1qmuk6ruEeczslBUpKEClUYbt0s8VeYsbqVg-hQhd5YS7IRYSzcHaPRlz2YmHq2Rx2vG1jk8mVziJkdFosRMgzMqxhy18A=@syn.agency>
In-Reply-To: <CAMm+Lwgf9nwPdhT7Gdex+mRhdRyfstwyYk-znpWFmaRchM_8vA@mail.gmail.com>
References: <BL0PR00MB02927CDBA6AE65BB7979118FF5670@BL0PR00MB0292.namprd00.prod.outlook.com> <CAMm+Lwgf9nwPdhT7Gdex+mRhdRyfstwyYk-znpWFmaRchM_8vA@mail.gmail.com>
Feedback-ID: iZ2oc5bGnsb8GsH0-PuA6V5K2VV8q_e43I8O-6r176i4WlN9P8-RhZ2N66vC_m8eCwHj0ITTy7fJ2sK347MNtA==:Ext:ProtonMail
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="b1_3855f3fb0f25a2398206a75912be357f"
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdispatch/mI4RVmYE9Idd7DtybjaEg9it32Y>
Subject: Re: [Secdispatch] Document that registers the SECG secp256k1 elliptic curve
X-BeenThere: secdispatch@ietf.org
X-Mailman-Version: 2.1.26
Precedence: list
List-Id: Security Dispatch <secdispatch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdispatch/>
List-Post: <mailto:secdispatch@ietf.org>
List-Help: <mailto:secdispatch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 04 Jun 2018 19:17:44 -0000

Agreed.

Warmly,

John Menerick
http://securesql.info

Sent from ProtonMail Mobile

On Mon, Jun 4, 2018 at 12:15, Phillip Hallam-Baker <phill@hallambaker.com> wrote:

> If we are going to register algorithms, perhaps we could do all of them in one doc including ASN.1 OIDS. These need not be new code points if already specified but we should have one OID for IETF purposes per algorithm wherever possible.
>
> On Mon, Jun 4, 2018 at 3:12 PM, Mike Jones <[Michael..Jones=40microsoft.com@dmarc.ietf.org](mailto:Michael.Jones=40microsoft.com@dmarc.ietf.org)> wrote:
>
>> This note is soliciting feedback on the best path for https://tools.ietf.org/html/draft-jones-webauthn-secp256k1-00 to become an RFC.  Its purpose is very specific and narrow:  It registers JOSE and COSE curve identifiers for the SECG secp256k1 elliptic curve and associated algorithm identifiers.   This is used by FIDO UAF, the W3C Verifiable Claims interest group, and several blockchain projects.  I want to get standard identifiers registered so these projects can use standards-based, rather than ad-hoc, cryptographic representations.  Given the widespread use of this curve and algorithm, I would like this spec to become an RFC so that the small integer values can be assigned for COSE, per the "Standards Action" requirement for the Label assignment in the registry policy at https://tools.ietf.org/html/rfc8152#section-16.2. I believe it’s also very likely that some IETF specifications will end up using these registrations as well.
>>
>> As background, I’d committed to the W3C Web Authentication (WebAuthn) working group and the FIDO Alliance to register all the algorithms used by their specifications that do not have current IANA registrations for JOSE and COSE.  https://tools.ietf.org/html/draft-jones-webauthn-cose-algorithms-01 started this process by registering additional RSA algorithms (with help from Jim Schaad, Sean Turner, and others).  The next step in this process is registering the SECG secp256k1 elliptic curve and associated algorithm identifiers.
>>
>> Ben Kaduk suggested that I ask SecDispatch for input on the best path forward.  For instance, is anyone interested in reviewing the document or being the document shepherd?  I believe that Area Director sponsorship probably makes the best sense for this very targeted document but am open to other options.   I know that the W3C and the FIDO Alliance would appreciate having a path forward for these registrations.
>>
>> Thanks for your feedback.
>>
>>                                                        -- Mike
>>
>> ______________________________ _________________
>> Secdispatch mailing list
>> Secdispatch@ietf.org
>> https://www.ietf.org/mailman/listinfo/secdispatch