Re: [Suit] draft-housley-suit-cose-hash-sig
Jim Schaad <ietf@augustcellars.com> Wed, 13 June 2018 19:03 UTC
Return-Path: <ietf@augustcellars.com>
X-Original-To: suit@ietfa.amsl.com
Delivered-To: suit@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 68C2F130E88 for <suit@ietfa.amsl.com>; Wed, 13 Jun 2018 12:03:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cNZTQwp93trE for <suit@ietfa.amsl.com>; Wed, 13 Jun 2018 12:03:31 -0700 (PDT)
Received: from mail2.augustcellars.com (augustcellars.com [50.45.239.150]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 44B3B126CB6 for <suit@ietf.org>; Wed, 13 Jun 2018 12:03:31 -0700 (PDT)
Received: from Jude (73.180.8.170) by mail2.augustcellars.com (192.168.0.56) with Microsoft SMTP Server (TLS) id 15.0.1347.2; Wed, 13 Jun 2018 12:00:28 -0700
From: Jim Schaad <ietf@augustcellars.com>
To: 'Michael Richardson' <mcr+ietf@sandelman.ca>, 'suit' <suit@ietf.org>
References: <31676.1528913351@localhost>
In-Reply-To: <31676.1528913351@localhost>
Date: Wed, 13 Jun 2018 12:03:22 -0700
Message-ID: <04f401d40349$33a58b10$9af0a130$@augustcellars.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQHwZWPvfC0oH/KJpPKzh2KFlMHiSaQlxdig
Content-Language: en-us
X-Originating-IP: [73.180.8.170]
Archived-At: <https://mailarchive.ietf.org/arch/msg/suit/j_v1IhzRY5WxOn7m3J5EnYLf2Hs>
Subject: Re: [Suit] draft-housley-suit-cose-hash-sig
X-BeenThere: suit@ietf.org
X-Mailman-Version: 2.1.26
Precedence: list
List-Id: Software Updates for Internet of Things <suit.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/suit>, <mailto:suit-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/suit/>
List-Post: <mailto:suit@ietf.org>
List-Help: <mailto:suit-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/suit>, <mailto:suit-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Jun 2018 19:03:34 -0000
> -----Original Message----- > From: Suit <suit-bounces@ietf.org> On Behalf Of Michael Richardson > Sent: Wednesday, June 13, 2018 11:09 AM > To: suit <suit@ietf.org> > Subject: [Suit] draft-housley-suit-cose-hash-sig > > > I have read the -01 draft today. > I have not read [HASHSIG] yet. > I thought I'd try reading this first, to see what questions I had. > > I have implemented COSE Sign1 with ECDSA in Ruby, so I have a grasp of > what we are trying to plug hash-sig *into*. > > > Suggestions: > 1) would the structure show in section 3 be easier if it was described by > CDDL? I'm rather unclear about this. No - this are not CBOR structures they are pure binary strings > > 2) I din't understand section 4, where it says: > o If the 'key_ops' field is present, it MUST include 'sign' when > creating a hash-based signature. > > o If the 'key_ops' field is present, it MUST include 'verify' > when verifying a hash-based signature. > > Clearly this is not something that travels over the network. Is this somehow > indicating how to understand if one is dealing a public (verify) key or a private > (sign) key? The key_ops field can be considered to potentially be transported over a network. It is part of the COSE_Key object rather than part of the COSE_Sign1 object. > > 3) the variations: LMS_SHA256_M32_H20, and LMOTS_SHA256_N32_W2, > etc. are > listed, but I don't know if they need to be carried in the signature > structure somehow. See the [HASHSIG] draft. It is encoded into the signature structure and the key type is in the public key structure. > > 4) I thought that perhaps we'd need CBOR or COSE specific way to transport > the signatures. I guess I shall read HASHSIG to find out what the > signatures look like. We have that. This is looking at a signature just like ECDSA would produce. This is a different "ECDSA" replacement. > > I understand draft-mcgrew-hash-sigs-11 is being advanced by CFRG. > I believe that SUIT should adopt this document, and should do so in the > current state. > > I would like to have some examples in CBOR/COSE worked out with private > keys available in the appendices. Always a good thing to have. Jim > > -- > ] Never tell me the odds! | ipv6 mesh networks [ > ] Michael Richardson, Sandelman Software Works | network architect [ > ] mcr@sandelman.ca http://www.sandelman.ca/ | ruby on rails [ > > -- > Michael Richardson <mcr+IETF@sandelman.ca>, Sandelman Software Works > -= IPv6 IoT consulting =- > >
- Re: [Suit] draft-housley-suit-cose-hash-sig Russ Housley
- Re: [Suit] draft-housley-suit-cose-hash-sig Russ Housley
- Re: [Suit] draft-housley-suit-cose-hash-sig Tony Putman
- Re: [Suit] draft-housley-suit-cose-hash-sig Jim Schaad
- Re: [Suit] draft-housley-suit-cose-hash-sig Russ Housley
- Re: [Suit] draft-housley-suit-cose-hash-sig Dave Thaler
- Re: [Suit] draft-housley-suit-cose-hash-sig Brendan Moran
- Re: [Suit] draft-housley-suit-cose-hash-sig Russ Housley
- Re: [Suit] draft-housley-suit-cose-hash-sig Brendan Moran
- Re: [Suit] draft-housley-suit-cose-hash-sig Tony Putman
- Re: [Suit] draft-housley-suit-cose-hash-sig Jim Schaad
- Re: [Suit] draft-housley-suit-cose-hash-sig Russ Housley
- [Suit] draft-housley-suit-cose-hash-sig Michael Richardson
- Re: [Suit] draft-housley-suit-cose-hash-sig Russ Housley