Re: [Suit] draft-housley-suit-cose-hash-sig

Jim Schaad <ietf@augustcellars.com> Wed, 13 June 2018 19:03 UTC

Return-Path: <ietf@augustcellars.com>
X-Original-To: suit@ietfa.amsl.com
Delivered-To: suit@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 68C2F130E88 for <suit@ietfa.amsl.com>; Wed, 13 Jun 2018 12:03:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cNZTQwp93trE for <suit@ietfa.amsl.com>; Wed, 13 Jun 2018 12:03:31 -0700 (PDT)
Received: from mail2.augustcellars.com (augustcellars.com [50.45.239.150]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 44B3B126CB6 for <suit@ietf.org>; Wed, 13 Jun 2018 12:03:31 -0700 (PDT)
Received: from Jude (73.180.8.170) by mail2.augustcellars.com (192.168.0.56) with Microsoft SMTP Server (TLS) id 15.0.1347.2; Wed, 13 Jun 2018 12:00:28 -0700
From: Jim Schaad <ietf@augustcellars.com>
To: 'Michael Richardson' <mcr+ietf@sandelman.ca>, 'suit' <suit@ietf.org>
References: <31676.1528913351@localhost>
In-Reply-To: <31676.1528913351@localhost>
Date: Wed, 13 Jun 2018 12:03:22 -0700
Message-ID: <04f401d40349$33a58b10$9af0a130$@augustcellars.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQHwZWPvfC0oH/KJpPKzh2KFlMHiSaQlxdig
Content-Language: en-us
X-Originating-IP: [73.180.8.170]
Archived-At: <https://mailarchive.ietf.org/arch/msg/suit/j_v1IhzRY5WxOn7m3J5EnYLf2Hs>
Subject: Re: [Suit] draft-housley-suit-cose-hash-sig
X-BeenThere: suit@ietf.org
X-Mailman-Version: 2.1.26
Precedence: list
List-Id: Software Updates for Internet of Things <suit.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/suit>, <mailto:suit-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/suit/>
List-Post: <mailto:suit@ietf.org>
List-Help: <mailto:suit-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/suit>, <mailto:suit-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Jun 2018 19:03:34 -0000


> -----Original Message-----
> From: Suit <suit-bounces@ietf.org> On Behalf Of Michael Richardson
> Sent: Wednesday, June 13, 2018 11:09 AM
> To: suit <suit@ietf.org>
> Subject: [Suit] draft-housley-suit-cose-hash-sig
> 
> 
> I have read the -01 draft today.
> I have not read [HASHSIG] yet.
> I thought I'd try reading this first, to see what questions I had.
> 
> I have implemented COSE Sign1 with ECDSA in Ruby, so I have a grasp of
> what we are trying to plug hash-sig *into*.
> 
> 
> Suggestions:
> 1) would the structure show in section 3 be easier if it was described by
>    CDDL?  I'm rather unclear about this.

No - this are not CBOR structures they are pure binary strings

> 
> 2) I din't understand section 4, where it says:
>       o  If the 'key_ops' field is present, it MUST include 'sign' when
>                  creating a hash-based signature.
> 
>       o  If the 'key_ops' field is present, it MUST include 'verify'
>                  when verifying a hash-based signature.
> 
> Clearly this is not something that travels over the network.  Is this
somehow
> indicating how to understand if one is dealing a public (verify) key or a
private
> (sign) key?

The key_ops field can be considered to potentially be transported over a
network.  It is part of the COSE_Key object rather than part of the
COSE_Sign1 object.

> 
> 3) the variations: LMS_SHA256_M32_H20, and LMOTS_SHA256_N32_W2,
> etc. are
>    listed, but I don't know if they need to be carried in the signature
>    structure somehow.

See the [HASHSIG] draft.  It is encoded into the signature structure and the
key type is in the public key structure.

> 
> 4) I thought that perhaps we'd need CBOR or COSE specific way to transport
>    the signatures.  I guess I shall read HASHSIG to find out what the
>    signatures look like.

We have that.  This is looking at a signature just like ECDSA would produce.
This is a different "ECDSA" replacement.

> 
> I understand draft-mcgrew-hash-sigs-11 is being advanced by CFRG.
> I believe that SUIT should adopt this document, and should do so in the
> current state.
> 
> I would like to have some examples in CBOR/COSE worked out with private
> keys available in the appendices.

Always a good thing to have.

Jim

> 
> --
> ]               Never tell me the odds!                 | ipv6 mesh
networks [
> ]   Michael Richardson, Sandelman Software Works        | network
architect  [
> ]     mcr@sandelman.ca  http://www.sandelman.ca/        |   ruby on rails
[
> 
> --
> Michael Richardson <mcr+IETF@sandelman.ca>, Sandelman Software Works
> -= IPv6 IoT consulting =-
> 
>