Re: [stir] Choice of STIR signature algorithm
Eric Rescorla <ekr@rtfm.com> Sun, 15 May 2016 15:37 UTC
Return-Path: <ekr@rtfm.com>
X-Original-To: stir@ietfa.amsl.com
Delivered-To: stir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B8A4612D1E2 for <stir@ietfa.amsl.com>; Sun, 15 May 2016 08:37:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=rtfm-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yMdaiVFRDLvp for <stir@ietfa.amsl.com>; Sun, 15 May 2016 08:37:38 -0700 (PDT)
Received: from mail-yw0-x22f.google.com (mail-yw0-x22f.google.com [IPv6:2607:f8b0:4002:c05::22f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7312812D1DD for <stir@ietf.org>; Sun, 15 May 2016 08:37:38 -0700 (PDT)
Received: by mail-yw0-x22f.google.com with SMTP id g133so142095226ywb.2 for <stir@ietf.org>; Sun, 15 May 2016 08:37:38 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rtfm-com.20150623.gappssmtp.com; s=20150623; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=mbUHxd310axir2BkcVBU6/H2KV850GAbPhqGKLsIn48=; b=dVONaG2QVTLFCzMjDEBlIFPMIB0jQdZNWynhv195yyf1mYd10SakhV5fSj8Q1nOEqy ByNfXOqUMCB9Fkh2UKzGnEjaeC75WvnFLpY3UAQG2VjoUFtDKHjiVp4AINSqvihxOGDb vd0ZIasDpL6f9bsZVVHCNQKG0aE0joHqzq4+Cc4/6YpNpksWlHSrmKGSwuhUPmkUCfGz FUgLyDs+1Rp3TwAbf/uvYm5EYeOK4q1C81WsFIGrFmzVp9D2NPZ8yLt1PultKmc+SdD3 KKciVG5piLrTsAWJpNgRwuQPiltxFjuyl4qQXstpOUuTlPUzOAVt/yZeBNV+2/UrhiOF QW4w==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=mbUHxd310axir2BkcVBU6/H2KV850GAbPhqGKLsIn48=; b=HtyZlsCwt9Af/DePJ0s7hB75Z+t+K2QO7nBAHjmVpMzNof0/bsIMfXRWS+VtMnzfgR NuIZjCNsGAiRoyJIlWc0JXh0mlK96DqnnjLxdwza9P52n4HcVRFEWDBlsVFb874YLH/X 9E6r8RY5qS8YI+2BoTN6uVdsyWDe8o1uJ50Ea5OwEOp72Mcg6DPINIzChzyjatVKlQOn zYHwUlDicS6m4+yxmKGSVzxyGbSuS+myw6dhGBgdN49NXsFKz2xsYYcajfgrcNRhx0tP pkhMB0kpuIm3P4u2spo7yaYIWHIzwIhHzSdyuy8DQ0ZQM0z+nKbhsxnnWTuExN4CX8uI u6lw==
X-Gm-Message-State: AOPr4FXOti1Sz5/OLM2jqN5vpmJh+LJYrIE/T1IpDHOPSK2SHGjGXc2RoxLwCtG56x6lqz3VAXOWy5vqJIOhjg==
X-Received: by 10.37.207.194 with SMTP id f185mr12180990ybg.82.1463326657683; Sun, 15 May 2016 08:37:37 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.129.132.12 with HTTP; Sun, 15 May 2016 08:36:58 -0700 (PDT)
In-Reply-To: <EED4C512-B57C-47EC-9CE4-07C64365D246@vigilsec.com>
References: <D32953D1.4770F%john.mattsson@ericsson.com> <1A843300-AEB7-4EC6-8256-C88F6847B82E@neustar.biz> <D329995E.477D9%john.mattsson@ericsson.com> <A3723DBB-476C-4F22-95E0-37AE0872FBBD@shockey.us> <F4F09888-780B-4725-9A74-AD2EF661C5C0@vigilsec.com> <0DD82221-E79D-4F15-B2B5-93165EC98919@shockey.us> <570534D4.6010707@nostrum.com> <5195FEBC-8395-4E77-B768-2B2D81144121@shockey.us> <56DF2D20-9381-45CB-8057-6B1AB99B05E9@chriswendt.net> <BB4B8171-BF3E-4D3F-B81B-73AC9768ED75@shockey.us> <D3316C0C.485E4%john.mattsson@ericsson.com> <2EC06927-2614-491E-A499-C86ABB30573C@chriswendt.net> <26AE9662-B919-4B22-AFF8-45CF351AA03F@vigilsec.com> <2C466A8A-D638-49AE-9698-699D67762FF1@standardstrack.com> <EED4C512-B57C-47EC-9CE4-07C64365D246@vigilsec.com>
From: Eric Rescorla <ekr@rtfm.com>
Date: Sun, 15 May 2016 08:36:58 -0700
Message-ID: <CABcZeBN3OLiaea10cWrtyv6R9KxHHVMuAsC56o=xmj6MWn_RYg@mail.gmail.com>
To: Russ Housley <housley@vigilsec.com>
Content-Type: multipart/alternative; boundary="94eb2c0594ba9f54520532e3499e"
Archived-At: <http://mailarchive.ietf.org/arch/msg/stir/HJ4_Ql981B9bDbGzLC13ZHjkcRA>
Cc: IETF STIR Mail List <stir@ietf.org>
Subject: Re: [stir] Choice of STIR signature algorithm
X-BeenThere: stir@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Secure Telephone Identity Revisited <stir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/stir>, <mailto:stir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/stir/>
List-Post: <mailto:stir@ietf.org>
List-Help: <mailto:stir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/stir>, <mailto:stir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 15 May 2016 15:37:41 -0000
This seems largely reasonable. I would consider removing the SHOULD for RSA for PASSporT signatures, for two reasons: 1. There's no legacy to deal with 2. Because these objects are just sent out with no negotiation, it's not that useful to know that relying parties might or might not support your algorithm. The safe thing to do would be ECDSA. I would also note that the above doesn't specify a curve, but I assume we're talking P-256. -Ekr On Mon, May 9, 2016 at 1:37 PM, Russ Housley <housley@vigilsec.com> wrote: > I would rather be a bit more granular. > > MUST support ECDSA for PASSporT signatures > SHOULD support RSA PKCS#1 v1.5 for PASSporT signatures > > and > > MUST support ECDSA for certificate signatures > MUST support RSA PKCS#1 v1.5 for certificate signatures > > Then, we should say something to product planners that at some point in > the future, we expect support for RSA to be downgraded. > > Russ > > > On May 6, 2016, at 10:18 AM, Eric Burger <eburger@standardstrack.com> > wrote: > > > FINALLY, a cogent *engineering* reason for needing RSA. > > > > How about: > > MUST support ECDSA > > SHOULD support RSA unless you know you will not need it > > > > Rationale: > > ECDSA is ubiquitous today. ECDSA has lots of deployment advantages. > Pretty much everything else s*cks in comparison. > > > > However, especially for delegated certificates, there is a chance that > one of the intermediate certificates will not be signed with ECDSA but with > RSA. As such, if you know you will be deployed in such an environment, RSA > is OK. > > > > I would also suggest putting in a toxic waste warning in the document > that the support of RSA is *not* a built-in downgrade attack. This is > something that is covered by policy, not necessarily engineering. As such, > a note to the implementor suggesting that if they know they should only see > ECDSA (or better) signatures, they can feel free to reject an INVITE signed > with RSA, even if it looks legitimate. > > > >> On Apr 12, 2016, at 4:57 PM, Russ Housley <housley@vigilsec.com> wrote: > >> > >> > >>> I don’t know why so much of the discussion during the Tuesday meeting > was > >>> about root certificates. As Eric pointed out on the mail, it is not > hard > >>> to get a ECDSA certificate as Digicert, Entrust, Globalising, Symantec, > >>> Certicom, Comodo, and soon Let’s encrypt will happily give you one. As > >>> Russ pointed out most (or all) of these ECDSA certificates will be > signed > >>> by a RSA root certificate. But root certificates and verification of > the > >>> credentials seems to be out of scope of STIR and does not affect the > >>> PASSporT object. As far as I understand, the only thing STIR should > >>> specify is verification of the PASSporT object. > >> > >> We will need to say that the validation will include RFC 5280 path > validation to a trust anchor. This means that the signature on each > certificate will be validated. So, for quite some time we will need to be > able to validate RSA PKCS#1 v1.5 signatures, either on the PASSporT object > or on a certificate, even if we state a strong preference for ECDSA. > >> > >> Russ > >> > >> _______________________________________________ > >> stir mailing list > >> stir@ietf.org > >> https://www.ietf.org/mailman/listinfo/stir > > > > _______________________________________________ > > stir mailing list > > stir@ietf.org > > https://www.ietf.org/mailman/listinfo/stir > > _______________________________________________ > stir mailing list > stir@ietf.org > https://www.ietf.org/mailman/listinfo/stir >
- Re: [stir] Choice of STIR signature algorithm Sean Turner
- [stir] Choice of STIR signature algorithm John Mattsson
- Re: [stir] Choice of STIR signature algorithm Chris Wendt
- Re: [stir] Choice of STIR signature algorithm DOLLY, MARTIN C
- Re: [stir] Choice of STIR signature algorithm John Mattsson
- Re: [stir] Choice of STIR signature algorithm Peterson, Jon
- Re: [stir] Choice of STIR signature algorithm John Mattsson
- Re: [stir] Choice of STIR signature algorithm Richard Shockey
- Re: [stir] Choice of STIR signature algorithm Russ Housley
- Re: [stir] Choice of STIR signature algorithm Richard Shockey
- Re: [stir] Choice of STIR signature algorithm Robert Sparks
- Re: [stir] Choice of STIR signature algorithm Richard Shockey
- Re: [stir] Choice of STIR signature algorithm Eric Burger
- Re: [stir] Choice of STIR signature algorithm Eric Burger
- Re: [stir] Choice of STIR signature algorithm Chris Wendt
- Re: [stir] Choice of STIR signature algorithm Richard Shockey
- Re: [stir] Choice of STIR signature algorithm John Mattsson
- Re: [stir] Choice of STIR signature algorithm Russ Housley
- Re: [stir] Choice of STIR signature algorithm Chris Wendt
- Re: [stir] Choice of STIR signature algorithm Richard Shockey
- Re: [stir] Choice of STIR signature algorithm Gorman, Pierce A [CTO]
- Re: [stir] Choice of STIR signature algorithm Richard Shockey
- Re: [stir] Choice of STIR signature algorithm Chris Wendt
- Re: [stir] Choice of STIR signature algorithm Eric Burger
- Re: [stir] Choice of STIR signature algorithm Russ Housley
- Re: [stir] Choice of STIR signature algorithm Eric Burger
- Re: [stir] Choice of STIR signature algorithm Chris Wendt
- Re: [stir] Choice of STIR signature algorithm Peterson, Jon
- Re: [stir] Choice of STIR signature algorithm Eric Rescorla
- Re: [stir] Choice of STIR signature algorithm Russ Housley
- Re: [stir] Choice of STIR signature algorithm Eric Rescorla
- Re: [stir] Choice of STIR signature algorithm DOLLY, MARTIN C
- Re: [stir] Choice of STIR signature algorithm Eric Rescorla
- Re: [stir] Choice of STIR signature algorithm Chris Wendt
- Re: [stir] Choice of STIR signature algorithm Chris Wendt
- Re: [stir] Choice of STIR signature algorithm Eric Burger
- Re: [stir] Choice of STIR signature algorithm Russ Housley