RE: Comments on draft-ietf-smime-rfc2630bis-03
"Jim Schaad" <jimsch@nwlink.com> Wed, 19 September 2001 18:49 UTC
Received: from above.proper.com (above.proper.com [208.184.76.39]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA08672 for <smime-archive@odin.ietf.org>; Wed, 19 Sep 2001 14:49:42 -0400 (EDT)
Received: from localhost (localhost [[UNIX: localhost]]) by above.proper.com (8.11.6/8.11.3) id f8JIQeX05497 for ietf-smime-bks; Wed, 19 Sep 2001 11:26:40 -0700 (PDT)
Received: from femail27.sdc1.sfba.home.com ([24.254.60.17]) by above.proper.com (8.11.6/8.11.3) with ESMTP id f8JIQcD05493 for <ietf-smime@imc.org>; Wed, 19 Sep 2001 11:26:38 -0700 (PDT)
Received: from revelation ([65.4.166.11]) by femail27.sdc1.sfba.home.com (InterMail vM.4.01.03.20 201-229-121-120-20010223) with ESMTP id <20010919182635.HDQL559.femail27.sdc1.sfba.home.com@revelation>; Wed, 19 Sep 2001 11:26:35 -0700
Reply-To: jimsch@exmsft.com
From: Jim Schaad <jimsch@nwlink.com>
To: "'Housley, Russ'" <rhousley@rsasecurity.com>, jimsch@exmsft.com
Cc: ietf-smime@imc.org
Subject: RE: Comments on draft-ietf-smime-rfc2630bis-03
Date: Wed, 19 Sep 2001 11:26:11 -0700
Message-ID: <000701c14138$8f116360$0c00a8c0@soaringhawk.net>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook, Build 10.0.2627
In-Reply-To: <5.0.1.4.2.20010919102807.0280ca88@exna07.securitydynamics.com>
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2526.0000
Sender: owner-ietf-smime@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-smime/mail-archive/>
List-ID: <ietf-smime.imc.org>
List-Unsubscribe: <mailto:ietf-smime-request@imc.org?body=unsubscribe>
Content-Transfer-Encoding: 7bit
Russ: Items of agreement have been removed. > > > Jim: > > > > This text was proposed by Peter Gutmann and improved upon by John > Pawling. This is one place where backward comparability with > PKCS#7 has > not been preserved, and we are trying to warn implementors about the > potential dangers. > > You make a good point about DER. I have made a few changes > to the text to > highlight the DER issue. Are these changes sufficient? I propose: > > 5.2.1 Compatibility with PKCS #7 > > This section contains a word of warning to implementers > that wish to > support both the CMS and PKCS #7 [PKCS#7] SignedData > content types. > Both the CMS and PKCS #7 identify the type of the encapsulated > content with an object identifier, but the ASN.1 type of > the content > itself is variable in PKCS #7 SignedData content type. > > PKCS #7 defines content as: > > content [0] EXPLICIT ANY DEFINED BY contentType OPTIONAL > > The CMS defines eContent as: > > eContent [0] EXPLICIT OCTET STRING OPTIONAL > > The CMS definition is much easier to use in most > applications, and it > is compatible with both S/MIME v2 and S/MIME v3. S/MIME signed > messages using the CMS and PKCS #7 are compatible because > identical > signed message formats are specified in RFC 2311 for S/MIME v2 > [OLDMSG] and RFC 2633 for S/MIME v3 [MSG]. S/MIME v2 encapsulates > the MIME content in a Data type (that is, an OCTET > STRING) carried in > the SignedData contentInfo content ANY field, and S/MIME > v3 carries > the MIME content in the SignedData encapContentInfo eContent OCTET > STRING. Therefore, in both S/MIME v2 and S/MIME v3, the > MIME content > is placed in an OCTET STRING and the message digest is > computed over > the identical portions of the content. That is, the > message digest > is computed over the octets comprising the value of the > OCTET STRING, > neither the tag nor length octets are included. > > There are incompatibilities between the CMS and PKCS #7 signedData > types when the encapsulated content is not formatted > using the Data > type. For example, when an RFC 2634 [ESS] signed receipt is > encapsulated in the CMS signedData type, then the Receipt > SEQUENCE is > encoded in the signedData encapContentInfo eContent OCTET > STRING and > the message digest is computed using the entire Receipt SEQUENCE > encoding (including tag, length and value octets). However, if an > RFC 2634 signed receipt is encapsulated in the PKCS #7 signedData > type, then the Receipt SEQUENCE is DER encoded [X.509-88] in the > SignedData contentInfo content ANY field (a SEQUENCE, not an OCTET > STRING). Therefore, the message digest is computed using only the > value octets of the Receipt SEQUENCE encoding. I have a minor issue with the last sentence. The digest must include the type and length bytes of the SEQUENCE and I don't believe that this is correctly stated in the text. Suggest: "Therefore, the message digest is computed using the entirety of the Receipt SEQUENCE encoding." > > The following strategy can be used to achieve backward > compatibility > with PKCS #7 when processing SignedData content types. If the > implementation is unable to ASN.1 decode the signedData type using > the CMS signedData encapContentInfo eContent OCTET STRING syntax, > then the implementation MAY attempt to decode the signedData type > using the PKCS #7 SignedData contentInfo content ANY syntax and > compute the message digest accordingly. > > The following strategy can be used to achieve backward > compatibility > with PKCS #7 when creating a SignedData content type in which the > encapsulated content is not formatted using the Data type. > Implementations MAY examine the value of the > eContentType, and then > adjust the expected DER encoding of eContent based on the object > identifier value. For example, to support Microsoft AuthentiCode, > the following information MAY be included: > > eContentType Object Identifier is set to { 1 3 6 1 4 1 > 311 2 1 4 } > eContent contains DER encoded AuthentiCode signing information > > > > Russ > Jim
- Comments on draft-ietf-smime-rfc2630bis-03 Jim Schaad
- Re: Comments on draft-ietf-smime-rfc2630bis-03 Housley, Russ
- RE: Comments on draft-ietf-smime-rfc2630bis-03 Jim Schaad
- RE: Comments on draft-ietf-smime-rfc2630bis-03 Pawling, John
- RE: Comments on draft-ietf-smime-rfc2630bis-03 Jim Schaad