RE: Issues with S/MIME Message Specification
"Robert R. Jueneman" <bjueneman@novell.com> Tue, 18 May 1999 23:35 UTC
Received: from mail.proper.com (mail.proper.com [206.86.127.224]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA17673 for <smime-archive@odin.ietf.org>; Tue, 18 May 1999 19:35:39 -0400 (EDT)
Received: (from majordomo@localhost) by mail.proper.com (8.8.8/8.8.5) id PAA24157 for ietf-smime-bks; Tue, 18 May 1999 15:27:11 -0700 (PDT)
Received: from orm-mail20.orem.novell.com (orm-mail20.orem.novell.com [151.155.118.32]) by mail.proper.com (8.8.8/8.8.5) with SMTP id PAA24153 for <ietf-smime@imc.org>; Tue, 18 May 1999 15:27:10 -0700 (PDT)
Received: from bobjuenemannt (stevecarroll.dnsdhcp.provo.novell.com [137.65.212.77]) by orm-mail20.orem.novell.com; Tue, 18 May 1999 16:26:41 -0600
Reply-To: bjueneman@novell.com
From: "Robert R. Jueneman" <bjueneman@novell.com>
To: ekr@rtfm.com
Cc: ietf-smime@imc.org
Subject: RE: Issues with S/MIME Message Specification
Date: Tue, 18 May 1999 16:26:42 -0600
Message-ID: <00ba01bea17d$812f7eb0$4dd44189@provo.novell.com>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="----=_NextPart_000_00BB_01BEA14B.36950EB0"
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook 8.5, Build 4.71.2173.0
Importance: Normal
In-Reply-To: <kj3e0u16z7.fsf@romeo.rtfm.com>
X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2314.1300
Sender: owner-ietf-smime@imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-smime/mail-archive/>
List-Unsubscribe: <mailto:ietf-smime-request@imc.org?body=unsubscribe>
Eric, Thanks for your comments. I hadn't considered the possible difference in scope between the S/MIME Message Specification and the CMS, but I can see that CMS might have broader applicability, and hence, differing requirements. I was also unaware of the fact that an information RFC had been published on RC2, and withdraw my comments on that accordingly. With respect to the issue of bcc'ing the originator on an encrypted message, although I suppose it is possible that the originator doesn't have a public encryption key, this seems mildly unlikely, so I am more inclined to agree with William Whyte's comment. I wish I could find where I read that statement -- I thought it was in one of the RFC's, but I can't find it. Regards, Bob --------------------------- Robert R. Jueneman Novell, Inc. >-----Original Message----- >From: ekr@rtfm.com [mailto:ekr@rtfm.com] >Sent: Tuesday, May 18, 1999 2:03 PM >To: bjueneman@novell.com >Cc: The IESG; RFC Editor; ietf-smime@imc.org >Subject: Re: Issues with S/MIME Message Specification > > >"Robert R. Jueneman" <bjueneman@novell.com> writes: >> Regarding the S/MIME Version 3 Message Specification, >> draft-ietf-smime-msg-08.txt, I believe that all MUSTs and SHOULDs >> regarding specific cryptographic algorithms should be removed from this >> document, and contained only in the Cryptographic Message Syntax >document. >> I can see no reason at all why such things should be specified >twice -- it >> just makes conformance checking all that much more difficult. An example >> of this kind of difficulty is para 2.2 of the S/MIME Message >> Specification, which says that sending and receiving agents >SHOULD support >> rsaEncryption, whereas the Cryptographic Message Syntax , para 12.2, says >> that CMS implementations "may" support RSA. Neither mentions RSA with >> OAEP. >CMS and S/MIME MSG intentionally have different requirements. >In order to preserve backwards compatibility with S/MIMEv2, >implementations SHOULD implement RSA. CMS implementations that >do not need to be used in the S/MIME context may very well >have no need to use RSA. > >> The second part of 2.7 specifies that receiving agents SHOULD support >> RC2/40 "or a compatible algorithm at a key size of 40 bits..." This >> recommendation suffers from two major problems, in my view. First, it is >> LESS secure than 56-bit DES, which is now acceptable world-wide (with >> perhaps one or two minor exceptions -- not quite clear) for data >> encryption. >The purpose of this is once again for compatability with S/MIME v2 >which required RC2. > >> And second, it is a proprietary, trade-secret algorithm. >This statement is incorrect. See RFC-2268: > >2268 A Description of the RC2(r) Encryption Algorithm. R. Rivest. > January 1998. (Format: TXT=19048 bytes) (Status: INFORMATIONAL) > >> Finally, somewhere in these documents there is a statement regarding the >> advisability of including the content encryption key encrypted in the >> originator's public key, but despite rereading the documents multiple >> times I can't find that text again. As I recall, the text said that this >> SHOULD be done. I would argue that this should be changed to MUST, for I >> can't imagine a situation where the originator of an encrypted message >> would not want to be able to read his own message, for example in an >> outgoing or Sent-Mail queue. He might need to be able to decrypted, and >> even retract it in order to resend it with modifications. It >would not be >> reasonable to rely on the originator to bcc herself to gain this >> capability -- it ought to be required by the spec. >I disagree. Firstly, it's entirely possible that the originator >does not have a public key suitable for data encryption -- he >might have a signature only key. Secondly, encrypted content keys >take up a not-insignificant amount of space in the message. Mandating >this serves no interoperability requirement and therefore >it's inappropriate. > >-Ekr > >-- >[Eric Rescorla ekr@rtfm.com] >
- Protocol Action: Cryptographic Message Syntax to … The IESG
- Issues with S/MIME Message Specification Robert R. Jueneman
- Re: Issues with S/MIME Message Specification EKR
- Re: Issues with S/MIME Message Specification Paul Hoffman / IMC
- RE: Issues with S/MIME Message Specification Robert R. Jueneman
- Re: Issues with S/MIME Message Specification Andrew Farrell
- RE: Issues with S/MIME Message Specification Robert R. Jueneman
- RE: Issues with S/MIME Message Specification Andrew Ferguson
- Re: Issues with S/MIME Message Specification Andrew Farrell
- Re: Issues with S/MIME Message Specification Russ Housley
- Protocol Action: Cryptographic Message Syntax to … The IESG