RE: Another Potential Work Item

"Tony Capel" <capel@comgate.com> Fri, 08 May 2009 18:47 UTC

Return-Path: <owner-ietf-smime@mail.imc.org>
X-Original-To: ietfarch-smime-archive@core3.amsl.com
Delivered-To: ietfarch-smime-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 25F213A6F40 for <ietfarch-smime-archive@core3.amsl.com>; Fri, 8 May 2009 11:47:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7EzDFqfDZCP2 for <ietfarch-smime-archive@core3.amsl.com>; Fri, 8 May 2009 11:47:07 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id EAA543A68AE for <smime-archive@ietf.org>; Fri, 8 May 2009 11:47:06 -0700 (PDT)
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n48IZbmd052417 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 8 May 2009 11:35:37 -0700 (MST) (envelope-from owner-ietf-smime@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n48IZaaS052416; Fri, 8 May 2009 11:35:36 -0700 (MST) (envelope-from owner-ietf-smime@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-smime@mail.imc.org using -f
Received: from mail-07.primus.ca (mail10.primus.ca [216.254.141.177]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n48IZP7k052405 for <ietf-smime@imc.org>; Fri, 8 May 2009 11:35:36 -0700 (MST) (envelope-from capel@comgate.com)
Received: from ottawa-hs-209-217-122-183.s-ip.magma.ca ([209.217.122.183] helo=tony) by mail-07.primus.ca with esmtpa (Exim 4.69) (envelope-from <capel@comgate.com>) id 1M2Uui-00082c-0h; Fri, 08 May 2009 14:35:16 -0400
From: Tony Capel <capel@comgate.com>
To: ietf-smime@imc.org
Cc: 'Sean Turner' <turners@ieca.com>
Subject: RE: Another Potential Work Item
Date: Fri, 08 May 2009 14:35:31 -0400
Message-ID: <3B900B8944EA4BA9A9961812E9C02EC6@tony>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook, Build 10.0.6838
Thread-Index: AcnOks5kjoAQn1XzTEmuDnDmrqBTiwBeMQPw
In-Reply-To: <4A020131.6010403@ieca.com>
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.5579
X-Authenticated: capel - ottawa-hs-209-217-122-183.s-ip.magma.ca (tony) [209.217.122.183]
Sender: owner-ietf-smime@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-smime/mail-archive/>
List-ID: <ietf-smime.imc.org>
List-Unsubscribe: <mailto:ietf-smime-request@imc.org?body=unsubscribe>

Yes,
it would be useful to have a comprehensive reference to these attributes.
(It would be nice in the future to use a registry for this, to allow timely
updates!)

Tony

| -----Original Message-----
| From: owner-ietf-smime@mail.imc.org 
| [mailto:owner-ietf-smime@mail.imc.org] On Behalf Of Sean Turner
| Sent: May 6, 2009 5:29 PM
| To: ietf-smime@imc.org
| Subject: Another Potential Work Item
| 
| 
| 
| I have had a new draft posted as an individual draft.  I 
| would like the working group to consider adopting the draft 
| as a WG item.
| 
| http://www.ietf.org/internet-drafts/draft-turner-additional-sm
imecaps-00.txt 

provides a list of SMIME capabilities.  Some are already contained in 
RFCs and some are not.  What I'm trying to figure out is whether we 
should relax the requirements in S/MIME MSG (all the way back to RFC 
2311, 2633, 3851, and 3851bis) that say "In the event that there are no 
differentiating parameters for a particular OID, the parameters MUST be 
omitted, and MUST NOT be encoded as NULL."  I think many implementations 
and a few RFCs didn't follow this requirement, e.g., ECDSA, ECDH, ECMQV 
in RFC 3278 and RSAES-OAEP in RFC 3560.  We'd also like to lock down 
what implementations do for RSA with *.

spt