Re: [lamps] Logo carrying certificate profile for email` draft

Russ Housley <housley@vigilsec.com> Tue, 08 May 2018 18:25 UTC

Return-Path: <housley@vigilsec.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F420E12E88A for <spasm@ietfa.amsl.com>; Tue, 8 May 2018 11:25:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level:
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Umm_Ec4U-GYG for <spasm@ietfa.amsl.com>; Tue, 8 May 2018 11:25:48 -0700 (PDT)
Received: from mail.smeinc.net (mail.smeinc.net [209.135.209.11]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1E84F1277BB for <spasm@ietf.org>; Tue, 8 May 2018 11:25:48 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mail.smeinc.net (Postfix) with ESMTP id 16515300A03 for <spasm@ietf.org>; Tue, 8 May 2018 14:25:46 -0400 (EDT)
X-Virus-Scanned: amavisd-new at mail.smeinc.net
Received: from mail.smeinc.net ([127.0.0.1]) by localhost (mail.smeinc.net [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id 51xA321XqT6O for <spasm@ietf.org>; Tue, 8 May 2018 14:25:44 -0400 (EDT)
Received: from [5.5.33.66] (vpn.snozzages.com [204.42.252.17]) by mail.smeinc.net (Postfix) with ESMTPSA id 0F24B3002C1; Tue, 8 May 2018 14:25:43 -0400 (EDT)
From: Russ Housley <housley@vigilsec.com>
Message-Id: <E90BEE76-F33C-486C-8B3B-7938A06B23F7@vigilsec.com>
Content-Type: multipart/signed; boundary="Apple-Mail=_42E04D56-C1E2-4359-989E-577E528DBA1A"; protocol="application/pkcs7-signature"; micalg="sha1"
Mime-Version: 1.0 (Mac OS X Mail 10.3 \(3273\))
Date: Tue, 08 May 2018 14:25:44 -0400
In-Reply-To: <CAAFsWK2YCAQGPomunWv3CELDmKUYGN7phZN3=3+xr9cVQe7JwQ@mail.gmail.com>
Cc: LAMPS <spasm@ietf.org>
To: Wei Chuang <weihaw@google.com>
References: <CAAFsWK2YCAQGPomunWv3CELDmKUYGN7phZN3=3+xr9cVQe7JwQ@mail.gmail.com>
X-Mailer: Apple Mail (2.3273)
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/FMCLFdlyzAcMxP9b08yUXqubLz4>
Subject: Re: [lamps] Logo carrying certificate profile for email` draft
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 08 May 2018 18:25:50 -0000

Wei:

In the future, please use TBD for numbers in IANA registries.  Authors do not make assignments.  That is left to the IANA staff.

I have asked the IANA staff to reserve this value to ensure that a collision is avoided.

Russ


> On May 8, 2018, at 3:02 AM, Wei Chuang <weihaw@google.com> wrote:
> 
> Hi all,
> 
> I've posted a draft https://datatracker.ietf.org/doc/draft-chuang-bimi-certificate/ <https://datatracker.ietf.org/doc/draft-chuang-bimi-certificate/> regarding a logo carrying certificate for authenticated email using domain based methods (DKIM and SPF).  In particular this draft calls for a new Extended Key Usage for these certificates to help distinguish this usage from other profiles such as S/MIME.  Can this draft be considered for the LAMPS rechartering?  This work is being done by a Brand Indicator for Message Identification (BIMI) working group.  An early version of the overall protocol can be seen at https://authindicators.github.io/rfc-brand-indicators-for-message-identification/ <https://authindicators.github.io/rfc-brand-indicators-for-message-identification/> though that version doesn't include changes that include X.509 certificates.  
> 
> thanks,
> -Wei 
>