
From nobody Sun Dec  2 17:02:08 2018
Return-Path: <kaduk@mit.edu>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 079C1130DE7 for <openpgp@ietfa.amsl.com>; Sun,  2 Dec 2018 17:02:06 -0800 (PST)
X-Quarantine-ID: <JccMVSrCRBB7>
X-Virus-Scanned: amavisd-new at amsl.com
X-Amavis-Alert: BAD HEADER SECTION, Non-encoded 8-bit data (char 9C hex): Received: ...s kaduk@ATHENA.MIT.EDU)\n\t\234by outgoing.mit[...]
X-Spam-Flag: NO
X-Spam-Score: -4.198
X-Spam-Level: 
X-Spam-Status: No, score=-4.198 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JccMVSrCRBB7 for <openpgp@ietfa.amsl.com>; Sun,  2 Dec 2018 17:02:04 -0800 (PST)
Received: from dmz-mailsec-scanner-5.mit.edu (dmz-mailsec-scanner-5.mit.edu [18.7.68.34]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 34285130DE1 for <openpgp@ietf.org>; Sun,  2 Dec 2018 17:02:04 -0800 (PST)
X-AuditID: 12074422-b33ff70000005b85-25-5c048088824e
Received: from mailhub-auth-2.mit.edu ( [18.7.62.36]) (using TLS with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by dmz-mailsec-scanner-5.mit.edu (Symantec Messaging Gateway) with SMTP id 9E.EE.23429.980840C5; Sun,  2 Dec 2018 20:02:02 -0500 (EST)
Received: from outgoing.mit.edu (OUTGOING-AUTH-1.MIT.EDU [18.9.28.11]) by mailhub-auth-2.mit.edu (8.14.7/8.9.2) with ESMTP id wB311uIT030102; Sun, 2 Dec 2018 20:01:57 -0500
Received: from kduck.kaduk.org (24-107-191-124.dhcp.stls.mo.charter.com [24.107.191.124]) (authenticated bits=56) (User authenticated as kaduk@ATHENA.MIT.EDU) by outgoing.mit.edu (8.14.7/8.12.4) with ESMTP id wB311qfV016469 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Sun, 2 Dec 2018 20:01:54 -0500
Date: Sun, 2 Dec 2018 19:01:51 -0600
From: Benjamin Kaduk <kaduk@mit.edu>
To: Ronald Tse <tse@ribose.com>
Cc: "openpgp@ietf.org" <openpgp@ietf.org>, "Mark D. Baushke" <mdb@juniper.net>, Derek Atkins <derek@ihtfp.com>
Message-ID: <20181203010151.GG54918@kduck.kaduk.org>
References: <87y3aosju2.fsf@wheatstone.g10code.de> <B64F4A5B-1894-4B01-9DAE-3C7A19C772BF@ribose.com> <14036.1543342928@contrail-ubm16-mdb.svec1.juniper.net> <B6F2B98A-E960-4189-A579-E29916079904@ribose.com> <875zwhvef3.fsf@wheatstone.g10code.de> <sjmmuptyszn.fsf@securerf.ihtfp.org> <20181201001941.GE87441@kduck.kaduk.org> <348B9107-4726-4899-A980-FD3BEB2A0BA5@ribose.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <348B9107-4726-4899-A980-FD3BEB2A0BA5@ribose.com>
User-Agent: Mutt/1.10.1 (2018-07-13)
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFupgleLIzCtJLcpLzFFi42IRYrdT0e1qYIkx2LlUwmLlpB3sFl13rrNZ NPx7yG7Ruu0ImwOLx5IlP5k8ln99wOJxvekqu8fV+VPYAliiuGxSUnMyy1KL9O0SuDLm3l3D WrCNr+LPl10sDYyfuLoYOTgkBEwkLq1N7WLk4hASWMMkcW7fVlYIZwOjxOEjL5i6GDmBnDtM Eu3H7UBsFgEViRmPfoLF2YDshu7LzCC2iIC8xOnpK9lAbGaBcon3t9+A1QgL+Ejcb90IVsML tGxKw24WiJnNzBK776lBxAUlTs58wgLRqyVx499LJpDjmAWkJZb/4wAJcwrYSfRdeMwKEhYF Wvt5gcAERoFZSJpnIWmehdC8gJF5FaNsSm6Vbm5iZk5xarJucXJiXl5qka6pXm5miV5qSukm RnAguyjtYJz4z+sQowAHoxIP74xElhgh1sSy4srcQ4ySHExKorxORUAhvqT8lMqMxOKM+KLS nNTiQ4wSHMxKIrwFhUA53pTEyqrUonyYlDQHi5I47x+Rx9FCAumJJanZqakFqUUwWRkODiUJ XrtaoEbBotT01Iq0zJwShDQTByfIcB6g4Xlgw4sLEnOLM9Mh8qcYdTlezOiYwSzEkpeflyol znu1DqhIAKQoozQPbg4oAUlk7695xSgO9JYwrzxIFQ8wecFNegW0hAloSc4WJpAlJYkIKakG RtPC+DTjpooTtZNt78UfXJGo8alRbNKWwMa88ht3vwY3mn7Zs3Otc0+7pfKR3fIvpCYf3Gvz ot1/1UXpZ5a60Se215V/PJgin5TKtXBKzJtEyQa571sdKqWU5s8zsjgQbnZv25SWnQ1d8o// HmK2c0xcvLt8yymez0KXps+d9KT0gkrQdS0PfiWW4oxEQy3mouJEAI5l2DIbAwAA
Archived-At: <https://mailarchive.ietf.org/arch/msg/openpgp/yfgATXq83JOO7E4xjZGoALRAXmU>
Subject: Re: [openpgp] rfc4880bis and draft-openpgp-iana-registry-updates-01
X-BeenThere: openpgp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/openpgp>, <mailto:openpgp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/openpgp/>
List-Post: <mailto:openpgp@ietf.org>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/openpgp>, <mailto:openpgp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 03 Dec 2018 01:02:06 -0000

On Sat, Dec 01, 2018 at 07:21:43AM +0000, Ronald Tse wrote:
>    Hi Ben, Derek,
> 
>      Derek is absolutely right, here.
> 
>    I fully agree that managing two documents is more complex than handling
>    one.
> 
>      I'll note that for TLS 1.3 we did separate documents, RFCs 8446 and
>      8447,
>      since there were a *lot* of registry changes and we did want a permanent
>      record of them, but that split caused a lot of extra work to ensure
>      things
>      were synchronized during AUTH48.
> 
>    However, the OpenPGP IANA update document was created from a suggestion by
>    the Security AD, where the TLS registry update model was the acceptable
>    role model to follow. RFC 8447 is at 17 pages; this document is close to
>    30 - the OpenPGP IANA registries are numerous and changes to them many,
>    since a lot of them have been dilapidated since the days of 2440.
>    If we merge this into 4880bis and remove them at publication, we're adding
>    30 pages (temporarily) and then maybe removing 25 at publication. And we
>    lose the permanent record that RFC 8447 provides for TLS. Perhaps there is
>    an argument that the registries of OpenPGP aren't as important (!) as
>    TLS's for permanent record keeping, and therefore should be relegated to
>    an Internet-Draft, but it doesn't sound like a good reason to forgo that.
>    Given that the IETF process has already processed the pair of 8446/8447
>    successfully in a synchronized way, would it be possible that it's even
>    easier this time round?

Most of the pain of 8447 was on the WG chairs and AD to manually do
consistency checks.  I don't expect much of an efficiency gain from
practice, but I suppose there are probably ways to distribute the work that
we did not explore very well for 8447.

-Ben


From nobody Mon Dec  3 08:59:06 2018
Return-Path: <derek@ihtfp.com>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 49816130E1E for <openpgp@ietfa.amsl.com>; Mon,  3 Dec 2018 08:59:04 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.99
X-Spam-Level: 
X-Spam-Status: No, score=-1.99 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, T_SPF_PERMERROR=0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ihtfp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YdroR-zXuEvc for <openpgp@ietfa.amsl.com>; Mon,  3 Dec 2018 08:59:02 -0800 (PST)
Received: from mail2.ihtfp.org (MAIL2.IHTFP.ORG [204.107.200.7]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 80564130E0E for <openpgp@ietf.org>; Mon,  3 Dec 2018 08:59:02 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by mail2.ihtfp.org (Postfix) with ESMTP id 6E03EE2050; Mon,  3 Dec 2018 11:58:54 -0500 (EST)
Received: from mail2.ihtfp.org ([127.0.0.1]) by localhost (mail2.ihtfp.org [127.0.0.1]) (amavisd-maia, port 10024) with ESMTP id 26882-06; Mon,  3 Dec 2018 11:58:53 -0500 (EST)
Received: from securerf.ihtfp.org (IHTFP-DHCP-158.IHTFP.ORG [192.168.248.158]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mocana.ihtfp.org", Issuer "IHTFP Consulting Certification Authority" (not verified)) by mail2.ihtfp.org (Postfix) with ESMTPS id DDEEBE2045; Mon,  3 Dec 2018 11:58:52 -0500 (EST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ihtfp.com; s=default; t=1543856332; bh=SVBW7iJwxefPlT+0moBlfX3trCnPXhmENMI6FS38+ao=; h=From:To:Cc:Subject:References:Date:In-Reply-To; b=LBalP47rgdXZqJ0QFQZG4wrL3H88j3bFOyPrEsUh1BZMFC6wnu61y5xZtZ/wjhOuU dip/wlZ35ImvogGt3be1lyTsN3XcAT5CkpjGQI2QjkQr0l53vYSIPBPMmFWXTJ3BGB BX7u2En5MrQ8m9oT1X3/5TfbFmeed3KJAMNHrscg=
Received: (from warlord@localhost) by securerf.ihtfp.org (8.15.2/8.15.2/Submit) id wB3Gwp1Z031827; Mon, 3 Dec 2018 11:58:51 -0500
From: Derek Atkins <derek@ihtfp.com>
To: Benjamin Kaduk <kaduk@mit.edu>
Cc: Ronald Tse <tse@ribose.com>, "openpgp\@ietf.org" <openpgp@ietf.org>, Derek Atkins <derek@ihtfp.com>, "Mark D. Baushke" <mdb@juniper.net>
References: <87y3aosju2.fsf@wheatstone.g10code.de> <B64F4A5B-1894-4B01-9DAE-3C7A19C772BF@ribose.com> <14036.1543342928@contrail-ubm16-mdb.svec1.juniper.net> <B6F2B98A-E960-4189-A579-E29916079904@ribose.com> <875zwhvef3.fsf@wheatstone.g10code.de> <sjmmuptyszn.fsf@securerf.ihtfp.org> <20181201001941.GE87441@kduck.kaduk.org> <348B9107-4726-4899-A980-FD3BEB2A0BA5@ribose.com> <20181203010151.GG54918@kduck.kaduk.org>
Date: Mon, 03 Dec 2018 11:58:51 -0500
In-Reply-To: <20181203010151.GG54918@kduck.kaduk.org> (Benjamin Kaduk's message of "Sun, 2 Dec 2018 19:01:51 -0600")
Message-ID: <sjmftvey2b8.fsf@securerf.ihtfp.org>
User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/25.3 (gnu/linux)
MIME-Version: 1.0
Content-Type: text/plain
X-Virus-Scanned: Maia Mailguard 1.0.2a
Archived-At: <https://mailarchive.ietf.org/arch/msg/openpgp/IBXwukO6SBE_PVKQ5hdRipypmN0>
Subject: Re: [openpgp] rfc4880bis and draft-openpgp-iana-registry-updates-01
X-BeenThere: openpgp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/openpgp>, <mailto:openpgp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/openpgp/>
List-Post: <mailto:openpgp@ietf.org>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/openpgp>, <mailto:openpgp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 03 Dec 2018 16:59:04 -0000

Benjamin Kaduk <kaduk@mit.edu> writes:

> Most of the pain of 8447 was on the WG chairs and AD to manually do
> consistency checks.  I don't expect much of an efficiency gain from
> practice, but I suppose there are probably ways to distribute the work that
> we did not explore very well for 8447.

And we don't have a WG chair here.......

> -Ben

-derek
-- 
       Derek Atkins                 617-623-3745
       derek@ihtfp.com             www.ihtfp.com
       Computer and Internet Security Consultant


From nobody Mon Dec  3 09:27:15 2018
Return-Path: <tse@ribose.com>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1220C130FC4 for <openpgp@ietfa.amsl.com>; Mon,  3 Dec 2018 09:27:06 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level: 
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9,  DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ribose.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jQ6aBnrTsr0o for <openpgp@ietfa.amsl.com>; Mon,  3 Dec 2018 09:27:03 -0800 (PST)
Received: from KOR01-PS2-obe.outbound.protection.outlook.com (mail-eopbgr1280055.outbound.protection.outlook.com [40.107.128.55]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B195E130FBE for <openpgp@ietf.org>; Mon,  3 Dec 2018 09:27:02 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ribose.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=DPY3iCvrSM2pzepmRQcFmyZWsRfWqwtGgNrAZQ1bVcE=; b=CyMv3Mbqzzzora6u82+3D2NARP0B+dWs6FbRn8ujT/y1zgLn7YHwKhShao89KfBgY9pfqd8lIJVsRSWX6N5GzIATg06onvdiMzoZjZ7Wuxf389ptmsIijzMHyf/t/BsJJ0NzHLN2uTWz0vd34rFJFyrn1gS3VzVixp6vtcOReYE=
Received: from SL2PR01MB2955.apcprd01.prod.exchangelabs.com (10.174.127.83) by SL2PR01MB2763.apcprd01.prod.exchangelabs.com (20.177.182.21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1382.21; Mon, 3 Dec 2018 17:26:57 +0000
Received: from SL2PR01MB2955.apcprd01.prod.exchangelabs.com ([fe80::7d7f:f09d:4f80:aced]) by SL2PR01MB2955.apcprd01.prod.exchangelabs.com ([fe80::7d7f:f09d:4f80:aced%4]) with mapi id 15.20.1382.020; Mon, 3 Dec 2018 17:26:56 +0000
From: Ronald Tse <tse@ribose.com>
To: Derek Atkins <derek@ihtfp.com>
CC: Benjamin Kaduk <kaduk@mit.edu>, "openpgp@ietf.org" <openpgp@ietf.org>, "Mark D. Baushke" <mdb@juniper.net>
Thread-Topic: [openpgp] rfc4880bis and draft-openpgp-iana-registry-updates-01
Thread-Index: AQHUau5gREidRDRyVkybXZt3x9+Nn6VkGnkAgAAL4ACAALJSAIAALK73gACv7+OAA4v1gIAAdeUAgAK6jYCAAQtwSIAAB8gA
Date: Mon, 3 Dec 2018 17:26:56 +0000
Message-ID: <CF7883D3-6D47-4790-AF43-4945B0903972@ribose.com>
References: <87y3aosju2.fsf@wheatstone.g10code.de> <B64F4A5B-1894-4B01-9DAE-3C7A19C772BF@ribose.com> <14036.1543342928@contrail-ubm16-mdb.svec1.juniper.net> <B6F2B98A-E960-4189-A579-E29916079904@ribose.com> <875zwhvef3.fsf@wheatstone.g10code.de> <sjmmuptyszn.fsf@securerf.ihtfp.org> <20181201001941.GE87441@kduck.kaduk.org> <348B9107-4726-4899-A980-FD3BEB2A0BA5@ribose.com> <20181203010151.GG54918@kduck.kaduk.org> <sjmftvey2b8.fsf@securerf.ihtfp.org>
In-Reply-To: <sjmftvey2b8.fsf@securerf.ihtfp.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=tse@ribose.com; 
x-originating-ip: [112.120.148.19]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; SL2PR01MB2763; 6:+WvTyxLF+uqtNuduuFpiL2DHY1D4CtPc/LvE7Zy3mmKpDdok5RPHKBw3kIR9vxLfpAnI81Gizfl/rr4OLNp7N1fi7qD3aLz0a8lKLjLEtCl/PPG+W2lTuIsR1EDrZNrNy5Qggf3NMjUJp18dNgPPmFeRX5VXQFp+S7hrC6ZR+p5rpdfjjADP3KRfscZL2yV14YWS61lLhUTWKCs81kVFQC87oWltc/X9FazC6GxGYsAxDEI0hKdpDMyFJt5xWMFLKkiwO2GBWvEa93BCO6FWaU/gAB2EbTS6ka3nddTaNxV4esOttmLOaXEQEj+6caQuiocHX0xZTBzXXPLzWayLa399CKNk1D1nc624kjt57tDTJ8s54FdgiCdyBktMQhZeeB3yCjuFT7pPuihf2LsQvSLTf8Nv5FQj+NlQVl7XSC1NnQYyl3vEoXpLAULuvw77lV37ODOWUGGEY6kQ8nWXyQ==; 5:dp/mt1lwYbtKut26+fj70Fl4wsQHbNsdRiSN9zDIMccgae9igSCjdmrrCU2cVoG2hvXc2kH2O2NLSVImJgG/vi84y2g1KEm5KYtm0RXejDkSQV6LLEkQ8Tn5+V3bUtilImr+re2rPxaiy1GTk43hsmevGtFPkRajRPiD476FUMI=; 7:PWj9WOJGdJWJkCJvNPDAj3zXbw6OPg1uu7xuIxYMHKy4RFgZUN0Fq1Es/azUb0I0GJemZ9OZAsN0mGFejvhHsGgRM5esJHkeXOgHcnVL7yyWmNaGXdMyCbdj6OKhho4RgrIPDR6+zeINt+a80nJwtw==
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: 4dff8e44-7172-4c48-4425-08d65944868e
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390098)(7020095)(4652040)(7021145)(8989299)(4534185)(7022145)(4603075)(4627221)(201702281549075)(8990200)(7048125)(7024125)(7027125)(7023125)(5600074)(711020)(2017052603328)(7153060)(7193020); SRVR:SL2PR01MB2763; 
x-ms-traffictypediagnostic: SL2PR01MB2763:
x-microsoft-antispam-prvs: <SL2PR01MB2763D68DD4255558A676D568D7AE0@SL2PR01MB2763.apcprd01.prod.exchangelabs.com>
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040522)(2401047)(5005006)(8121501046)(10201501046)(3231455)(999002)(944501493)(52105112)(93006095)(93001095)(3002001)(148016)(149066)(150057)(6041310)(2016111802025)(20161123560045)(20161123564045)(20161123562045)(20161123558120)(6043046)(201708071742011)(7699051)(76991095); SRVR:SL2PR01MB2763; BCL:0; PCL:0; RULEID:; SRVR:SL2PR01MB2763; 
x-forefront-prvs: 08756AC3C8
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(136003)(346002)(376002)(396003)(366004)(39830400003)(189003)(199004)(236005)(6486002)(81166006)(33656002)(508600001)(6916009)(11346002)(102836004)(446003)(6116002)(97736004)(81156014)(106356001)(6506007)(15650500001)(7110500001)(8676002)(2420400007)(93886005)(105586002)(4326008)(6512007)(54896002)(6306002)(229853002)(53546011)(186003)(68736007)(3846002)(8936002)(256004)(14454004)(606006)(5660300001)(316002)(10710500007)(2906002)(6246003)(71200400001)(53386004)(36756003)(66066001)(71190400001)(14444005)(99286004)(476003)(53936002)(486006)(7736002)(2616005)(54906003)(83716004)(26005)(76176011)(82746002)(86362001)(6436002)(25786009); DIR:OUT; SFP:1101; SCL:1; SRVR:SL2PR01MB2763; H:SL2PR01MB2955.apcprd01.prod.exchangelabs.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: ribose.com does not designate permitted sender hosts)
x-microsoft-antispam-message-info: t4Ki2oatyrx4t/RokgmpvK/WLqRQQfvCQmKy48imyaLcF9WJlYsrLzTyM7W4dm6W1qa3E4OR30DkGedSq7lLb5jZZcN2v8mh0yqI2/A42y1MyGFtlVP4A0sQfusvqMSjWIsDZ9yQD9D16n1ZPoK1u0NDpEB6J3AAKCJrKALhOu9IPdzsTZJtBZU97/DR3kPm6NXdfmuhMk1n0PUsUb8gfreSGCmcnbNN7zCE+2+j0JRLqmypGAvHRhjgLnbeVo+5hHOZajzVmVfGYuRYX9EGaBRr+YtsnMy6vm0TqWs4JcVRmSSr5t9Uc7wdJiBB+jjfyV3nTpYETmCBKWy321Vz8UdMbFe8yEtQ5MEsR787ccE=
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_CF7883D36D474790AF434945B0903972ribosecom_"
MIME-Version: 1.0
X-OriginatorOrg: ribose.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 4dff8e44-7172-4c48-4425-08d65944868e
X-MS-Exchange-CrossTenant-originalarrivaltime: 03 Dec 2018 17:26:56.7591 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: d98a04ff-ef98-489b-b33c-13c23a2e091a
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SL2PR01MB2763
Archived-At: <https://mailarchive.ietf.org/arch/msg/openpgp/w6kgLXUvFMO2nXGhJF4aRWeghgs>
Subject: Re: [openpgp] rfc4880bis and draft-openpgp-iana-registry-updates-01
X-BeenThere: openpgp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/openpgp>, <mailto:openpgp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/openpgp/>
List-Post: <mailto:openpgp@ietf.org>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/openpgp>, <mailto:openpgp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 03 Dec 2018 17:27:14 -0000

--_000_CF7883D36D474790AF434945B0903972ribosecom_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

I thought we were only left with a mailing list without a WG... ;-)

In any case, could the consistency checks can be done by the authors and RF=
C editors instead?

On Dec 4, 2018, at 12:58 AM, Derek Atkins <derek@ihtfp.com<mailto:derek@iht=
fp.com>> wrote:

Benjamin Kaduk <kaduk@mit.edu<mailto:kaduk@mit.edu>> writes:

Most of the pain of 8447 was on the WG chairs and AD to manually do
consistency checks.  I don't expect much of an efficiency gain from
practice, but I suppose there are probably ways to distribute the work that
we did not explore very well for 8447.

And we don't have a WG chair here.......

-Ben

-derek
--
      Derek Atkins                 617-623-3745
      derek@ihtfp.com<mailto:derek@ihtfp.com>             www.ihtfp.com<htt=
p://www.ihtfp.com>
      Computer and Internet Security Consultant

_____________________________________

Ronald Tse
Ribose Inc.

--_000_CF7883D36D474790AF434945B0903972ribosecom_
Content-Type: text/html; charset="us-ascii"
Content-ID: <2F1730E486A09B44A8053DAC98EFF703@apcprd01.prod.exchangelabs.com>
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
</head>
<body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; line-break:=
 after-white-space;" class=3D"">
I thought we were only left with a mailing list without a WG... ;-)
<div class=3D""><br class=3D"">
</div>
<div class=3D"">In any case, could the consistency checks can be done by th=
e authors and RFC editors instead?<br class=3D"">
<div class=3D"">
<div style=3D"color: rgb(0, 0, 0); letter-spacing: normal; orphans: auto; t=
ext-align: start; text-indent: 0px; text-transform: none; white-space: norm=
al; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; word-w=
rap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-=
space;" class=3D"">
<br class=3D"">
</div>
</div>
<div>
<blockquote type=3D"cite" class=3D"">
<div class=3D"">On Dec 4, 2018, at 12:58 AM, Derek Atkins &lt;<a href=3D"ma=
ilto:derek@ihtfp.com" class=3D"">derek@ihtfp.com</a>&gt; wrote:</div>
<br class=3D"Apple-interchange-newline">
<div class=3D"">
<div class=3D"">Benjamin Kaduk &lt;<a href=3D"mailto:kaduk@mit.edu" class=
=3D"">kaduk@mit.edu</a>&gt; writes:<br class=3D"">
<br class=3D"">
<blockquote type=3D"cite" class=3D"">Most of the pain of 8447 was on the WG=
 chairs and AD to manually do<br class=3D"">
consistency checks. &nbsp;I don't expect much of an efficiency gain from<br=
 class=3D"">
practice, but I suppose there are probably ways to distribute the work that=
<br class=3D"">
we did not explore very well for 8447.<br class=3D"">
</blockquote>
<br class=3D"">
And we don't have a WG chair here.......<br class=3D"">
<br class=3D"">
<blockquote type=3D"cite" class=3D"">-Ben<br class=3D"">
</blockquote>
<br class=3D"">
-derek<br class=3D"">
-- <br class=3D"">
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Derek Atkins &nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;617-6=
23-3745<br class=3D"">
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<a href=3D"mailto:derek@ihtfp.com" clas=
s=3D"">derek@ihtfp.com</a> &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;<a href=3D"http://www.ihtfp.com" class=3D"">www.iht=
fp.com</a><br class=3D"">
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Computer and Internet Security Consulta=
nt<br class=3D"">
</div>
</div>
</blockquote>
</div>
<br class=3D"">
<div class=3D"">_____________________________________<br class=3D"">
<br class=3D"">
Ronald Tse<br class=3D"">
Ribose Inc.<br class=3D"">
</div>
</div>
</body>
</html>

--_000_CF7883D36D474790AF434945B0903972ribosecom_--


From nobody Thu Dec  6 07:17:47 2018
Return-Path: <derek@ihtfp.com>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AE1ED130E09 for <openpgp@ietfa.amsl.com>; Thu,  6 Dec 2018 07:17:38 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.789
X-Spam-Level: 
X-Spam-Status: No, score=-1.789 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, T_SPF_PERMERROR=0.01, URIBL_BLOCKED=0.001, URIBL_CSS=0.1, URIBL_CSS_A=0.1] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ihtfp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 531ezl3QTMpE for <openpgp@ietfa.amsl.com>; Thu,  6 Dec 2018 07:17:32 -0800 (PST)
Received: from mail2.ihtfp.org (MAIL2.IHTFP.ORG [204.107.200.7]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 124451277D2 for <openpgp@ietf.org>; Thu,  6 Dec 2018 07:17:30 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by mail2.ihtfp.org (Postfix) with ESMTP id 5D587E2042; Thu,  6 Dec 2018 10:17:27 -0500 (EST)
Received: from mail2.ihtfp.org ([127.0.0.1]) by localhost (mail2.ihtfp.org [127.0.0.1]) (amavisd-maia, port 10024) with ESMTP id 01073-04; Thu,  6 Dec 2018 10:17:23 -0500 (EST)
Received: from securerf.ihtfp.org (unknown [12.46.110.2]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mocana.ihtfp.org", Issuer "IHTFP Consulting Certification Authority" (not verified)) by mail2.ihtfp.org (Postfix) with ESMTPS id CE3A6E2040; Thu,  6 Dec 2018 10:17:22 -0500 (EST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ihtfp.com; s=default; t=1544109443; bh=JwTUWcHYDygPKmvSOebHfPqH+SnATYeCet7TUQlYgyY=; h=From:To:Cc:Subject:References:Date:In-Reply-To; b=LrgNOBDG42iGteA2lxbg6gY/OavyN+4gP9AGG7Iyy3uKd9Ybe89vJJRjW0wUxx0Rm +ihdMQf/+VK9LIF5n3ctos2IKtFHcDzP8rQhIpUvriebnkWMsJZ+7tDUr7+EtmsNeW SH7s4ngbHo22tNQSIDRNCmZVkCIsGo0famah0dfc=
Received: (from warlord@localhost) by securerf.ihtfp.org (8.15.2/8.15.2/Submit) id wB6FHLIU026301; Thu, 6 Dec 2018 10:17:21 -0500
From: Derek Atkins <derek@ihtfp.com>
To: Ronald Tse <tse@ribose.com>
Cc: Benjamin Kaduk <kaduk@mit.edu>, "openpgp\@ietf.org" <openpgp@ietf.org>, "Mark D. Baushke" <mdb@juniper.net>
References: <87y3aosju2.fsf@wheatstone.g10code.de> <B64F4A5B-1894-4B01-9DAE-3C7A19C772BF@ribose.com> <14036.1543342928@contrail-ubm16-mdb.svec1.juniper.net> <B6F2B98A-E960-4189-A579-E29916079904@ribose.com> <875zwhvef3.fsf@wheatstone.g10code.de> <sjmmuptyszn.fsf@securerf.ihtfp.org> <20181201001941.GE87441@kduck.kaduk.org> <348B9107-4726-4899-A980-FD3BEB2A0BA5@ribose.com> <20181203010151.GG54918@kduck.kaduk.org> <sjmftvey2b8.fsf@securerf.ihtfp.org> <CF7883D3-6D47-4790-AF43-4945B0903972@ribose.com>
Date: Thu, 06 Dec 2018 10:17:21 -0500
In-Reply-To: <CF7883D3-6D47-4790-AF43-4945B0903972@ribose.com> (Ronald Tse's message of "Mon, 3 Dec 2018 17:26:56 +0000")
Message-ID: <sjmefau1y7y.fsf@securerf.ihtfp.org>
User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/25.3 (gnu/linux)
MIME-Version: 1.0
Content-Type: text/plain
X-Virus-Scanned: Maia Mailguard 1.0.2a
Archived-At: <https://mailarchive.ietf.org/arch/msg/openpgp/bsqtFMmuzODm1igCqeMC2Yn-M3c>
Subject: Re: [openpgp] rfc4880bis and draft-openpgp-iana-registry-updates-01
X-BeenThere: openpgp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/openpgp>, <mailto:openpgp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/openpgp/>
List-Post: <mailto:openpgp@ietf.org>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/openpgp>, <mailto:openpgp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 06 Dec 2018 15:17:46 -0000

Ronald Tse <tse@ribose.com> writes:

> I thought we were only left with a mailing list without a WG... ;-)

Exactly.

> In any case, could the consistency checks can be done by the authors and RFC
> editors instead?

Do YOU want to go ask them to do all this work?  Seriously?  That's
pretty unfair, just to meet some personal sense of "better".

Let's just make the changes in 4880bis and make everyone's life easier,
at the expense of potentially losing the historical reference if we
decide to remove the IANA actions from the final RFC.

N.B. that we don't have to remove the actions if we don't want to.

-derek

-- 
       Derek Atkins                 617-623-3745
       derek@ihtfp.com             www.ihtfp.com
       Computer and Internet Security Consultant


From nobody Thu Dec  6 16:43:58 2018
Return-Path: <tse@ribose.com>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 828DB131266 for <openpgp@ietfa.amsl.com>; Thu,  6 Dec 2018 16:43:56 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.8
X-Spam-Level: 
X-Spam-Status: No, score=-1.8 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_CSS=0.1, URIBL_CSS_A=0.1] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ribose.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kXsJzD4TK95T for <openpgp@ietfa.amsl.com>; Thu,  6 Dec 2018 16:43:51 -0800 (PST)
Received: from KOR01-SL2-obe.outbound.protection.outlook.com (mail-eopbgr1290050.outbound.protection.outlook.com [40.107.129.50]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5DA78130E89 for <openpgp@ietf.org>; Thu,  6 Dec 2018 16:43:49 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ribose.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=mrLFKJPPMfICgtt0chlN+7S5x15UaAbD2WZTgBf0p58=; b=OpaxoHG/C+Xg2aAR6moCD11Mw9DXNsBrRKCjVl8cZdwyXpjc01HNpEnyv3j/px7wpcnN5RQRN+ySqr7XQOA9/ruCH/7xbtVPngiDJZDKU89HpB0i60/b8hIu6n3Tw782l6W5G2sDt/+t2OjUikY/7OjikzaFbS2fgu19LzcNN8g=
Received: from SL2PR01MB2955.apcprd01.prod.exchangelabs.com (10.174.127.83) by SL2PR01MB3066.apcprd01.prod.exchangelabs.com (10.174.127.210) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1404.22; Fri, 7 Dec 2018 00:43:44 +0000
Received: from SL2PR01MB2955.apcprd01.prod.exchangelabs.com ([fe80::7d7f:f09d:4f80:aced]) by SL2PR01MB2955.apcprd01.prod.exchangelabs.com ([fe80::7d7f:f09d:4f80:aced%5]) with mapi id 15.20.1404.020; Fri, 7 Dec 2018 00:43:44 +0000
From: Ronald Tse <tse@ribose.com>
To: Derek Atkins <derek@ihtfp.com>
CC: Benjamin Kaduk <kaduk@mit.edu>, "openpgp@ietf.org" <openpgp@ietf.org>, "Mark D. Baushke" <mdb@juniper.net>
Thread-Topic: [openpgp] rfc4880bis and draft-openpgp-iana-registry-updates-01
Thread-Index: AQHUau5gREidRDRyVkybXZt3x9+Nn6VkGnkAgAAL4ACAALJSAIAALK73gACv7+OAA4v1gIAAdeUAgAK6jYCAAQtwSIAAB8gAgASS5dSAAJ4fAA==
Date: Fri, 7 Dec 2018 00:43:44 +0000
Message-ID: <85ACC577-AE2D-47B4-9D29-06B19DBDA7E3@ribose.com>
References: <87y3aosju2.fsf@wheatstone.g10code.de> <B64F4A5B-1894-4B01-9DAE-3C7A19C772BF@ribose.com> <14036.1543342928@contrail-ubm16-mdb.svec1.juniper.net> <B6F2B98A-E960-4189-A579-E29916079904@ribose.com> <875zwhvef3.fsf@wheatstone.g10code.de> <sjmmuptyszn.fsf@securerf.ihtfp.org> <20181201001941.GE87441@kduck.kaduk.org> <348B9107-4726-4899-A980-FD3BEB2A0BA5@ribose.com> <20181203010151.GG54918@kduck.kaduk.org> <sjmftvey2b8.fsf@securerf.ihtfp.org> <CF7883D3-6D47-4790-AF43-4945B0903972@ribose.com> <sjmefau1y7y.fsf@securerf.ihtfp.org>
In-Reply-To: <sjmefau1y7y.fsf@securerf.ihtfp.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=tse@ribose.com; 
x-originating-ip: [124.217.189.184]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; SL2PR01MB3066; 6:fXbn/B6WUHcGL/j0xxRkQ3pFy8IKXjnvXM5Vnoz4qrsWEMQluGh0QjtyXgVOusXXRY9j0rAoThSgBbsJCGOFNrsseQ2copZoKLaEqzRgg/9umWRGQeNo8RIDE0tGy52hcrKadDy8csJd9ZoYhdUaUNBdSEelwZ5QYNBkKR0oxxhm7QuNAcGY3Y6Lq9YWW9rF+bcrFrZVs0czyrvWBRbuUMiKk4sy1nEBLYpSRiXdJ/CorPQCXh93tFivLDb0DLH80NCERxoeH/j3Xuib4d/dPXue2hOO7ywSXSutEnXsK2rnKZkBu3Po6C3mUywGsK9cB0IVjuo5X1HyzMvmgtnIyRP3X5arRt2CEDb3OAn8YyYuWiW+Y3BV6GVlbgHmyysRCmdGZBRTnh6Zy11xkxASpatqDMGQrxiJmeJVivfdclgRv+CVOztueKcXC5MCU1/WYSOWj30fEwqGgNh/h0cRjA==; 5:GQEHBj7b63iQXPhfHUfZwHwln1+yVKcAlaYUWOnAGHOQfoxW3jORGjgmm01dB95ysfhib1oxTybZ0gGV27PIupkU1VJDdRkCU7XhK/fQL3OEAOPpQtQvfFGTR57O0e8yGSuqE9KOPIJtn6rpJDrpeyZQIJcR/hoNL+5jGPy8X1E=; 7:RKBbXXNMEVFgIkrgPacytG7FAd2DbcK4bL5EuOkiKQL/TDqPcejD02K6hf0KdXeXqjckKRlPNXHWGETfPTVm+OTgTAw4uJBqeDZhMscY7xG5tDcfoLX6sioelAkzviA3rkEKUFLn94xWmhparxmISw==
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: 5a10a049-b492-4112-436a-08d65bdd0aab
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390098)(7020095)(4652040)(7021145)(8989299)(4534185)(7022145)(4603075)(7168020)(4627221)(201702281549075)(8990200)(7048125)(7024125)(7027125)(7023125)(5600074)(711020)(2017052603328)(7153060)(7193020); SRVR:SL2PR01MB3066; 
x-ms-traffictypediagnostic: SL2PR01MB3066:
x-microsoft-antispam-prvs: <SL2PR01MB3066C2F51B08DE789ADC665AD7AA0@SL2PR01MB3066.apcprd01.prod.exchangelabs.com>
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040522)(2401047)(8121501046)(5005006)(3231455)(999002)(944501520)(52105112)(10201501046)(3002001)(93006095)(93001095)(148016)(149066)(150057)(6041310)(20161123564045)(20161123558120)(20161123560045)(20161123562045)(2016111802025)(6043046)(201708071742011)(7699051)(76991095); SRVR:SL2PR01MB3066; BCL:0; PCL:0; RULEID:; SRVR:SL2PR01MB3066; 
x-forefront-prvs: 0879599414
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(136003)(366004)(396003)(346002)(39830400003)(376002)(199004)(189003)(52314003)(6436002)(14444005)(256004)(68736007)(8936002)(82746002)(86362001)(93886005)(105586002)(6246003)(486006)(25786009)(53386004)(53936002)(508600001)(7736002)(11346002)(446003)(2616005)(561944003)(4326008)(66574011)(106356001)(7110500001)(476003)(316002)(33656002)(6306002)(6512007)(54906003)(54896002)(236005)(5660300001)(6506007)(3846002)(102836004)(53546011)(66066001)(55236004)(6116002)(36756003)(10710500007)(229853002)(606006)(26005)(2420400007)(83716004)(71190400001)(15650500001)(186003)(71200400001)(6916009)(99286004)(6486002)(81156014)(97736004)(81166006)(2906002)(76176011)(8676002)(14454004); DIR:OUT; SFP:1101; SCL:1; SRVR:SL2PR01MB3066; H:SL2PR01MB2955.apcprd01.prod.exchangelabs.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: ribose.com does not designate permitted sender hosts)
x-microsoft-antispam-message-info: 0a1qMrZ9CIyuv4YoysXqiwNOZcpoTD4V2/2IAfziWe1/m4wAI67B0URj4jznqyGfJ7jgo8pojTBB1v/asG5xlcxmgR1XXBUEs5ugn20bEHLn8juKIT0WUcsUCFADkM6rGvcIkOSKgFFnZhZarCYRAM4UGu6yvBmEmwZ4L47JDhtRJqAUu9DRqZmvSNZkhvXSyaqdkTgHMlxMj/2KyPnMR/7mYnxVRGqkOK48sr9jJ/Kdcmk5xmRV5aZAua1uvC0q9AAjDdLsZ8q8/P0iABN+zCvXXWqMwPUJrzUN1J1Sdp2TnnT+9ElvhfzFBLlrcFlKHKMKToFPmzkIgD7qTTBWk5+F2dmpnX+9UYylGMclfsU=
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_85ACC577AE2D47B49D2906B19DBDA7E3ribosecom_"
MIME-Version: 1.0
X-OriginatorOrg: ribose.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 5a10a049-b492-4112-436a-08d65bdd0aab
X-MS-Exchange-CrossTenant-originalarrivaltime: 07 Dec 2018 00:43:44.1958 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: d98a04ff-ef98-489b-b33c-13c23a2e091a
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SL2PR01MB3066
Archived-At: <https://mailarchive.ietf.org/arch/msg/openpgp/WN2o5qvyr1UuK-7aOB_aoFYU3Vc>
Subject: Re: [openpgp] rfc4880bis and draft-openpgp-iana-registry-updates-01
X-BeenThere: openpgp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/openpgp>, <mailto:openpgp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/openpgp/>
List-Post: <mailto:openpgp@ietf.org>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/openpgp>, <mailto:openpgp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 07 Dec 2018 00:43:57 -0000

--_000_85ACC577AE2D47B49D2906B19DBDA7E3ribosecom_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_85ACC577AE2D47B49D2906B19DBDA7E3ribosecom_
Content-Type: text/html; charset="utf-8"
Content-ID: <CB014E7247DD0C41A41B3063845EA983@apcprd01.prod.exchangelabs.com>
Content-Transfer-Encoding: base64
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--_000_85ACC577AE2D47B49D2906B19DBDA7E3ribosecom_--


From nobody Fri Dec  7 06:44:48 2018
Return-Path: <hanno@hboeck.de>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C7C561252B7 for <openpgp@ietfa.amsl.com>; Fri,  7 Dec 2018 06:44:47 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.622
X-Spam-Level: 
X-Spam-Status: No, score=-1.622 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FROM_EXCESS_BASE64=0.979, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uNZ1TuBeGCjL for <openpgp@ietfa.amsl.com>; Fri,  7 Dec 2018 06:44:44 -0800 (PST)
Received: from zucker2.schokokeks.org (zucker2.schokokeks.org [178.63.68.90]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B5773124D68 for <openpgp@ietf.org>; Fri,  7 Dec 2018 06:44:44 -0800 (PST)
Received: from computer ([2a02:8109:83c0:4bfd:dc27:39b2:705d:72e7]) (AUTH: LOGIN hanno-default@schokokeks.org, TLS: TLSv1/SSLv3, 256bits, ECDHE-RSA-AES256-GCM-SHA384) by zucker.schokokeks.org with ESMTPSA; Fri, 07 Dec 2018 15:44:39 +0100 id 0000000000000049.000000005C0A8757.00000E43
Date: Fri, 7 Dec 2018 15:44:41 +0100
From: Hanno =?UTF-8?B?QsO2Y2s=?= <hanno@hboeck.de>
To: openpgp@ietf.org
Message-ID: <20181207154441.41b02dc3@computer>
X-Mailer: Claws Mail 3.17.1 (GTK+ 2.24.32; x86_64-pc-linux-gnu)
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/openpgp/eVVjbj9jipgyQEf5UTC70x5nZXw>
Subject: [openpgp] Enigmail XSA issue with WKD and HTTP authentication
X-BeenThere: openpgp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/openpgp>, <mailto:openpgp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/openpgp/>
List-Post: <mailto:openpgp@ietf.org>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/openpgp>, <mailto:openpgp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 07 Dec 2018 14:44:48 -0000

Cross-posting this here as I believe this is something that should be
clarified in the WKD draft/standard.

There's an issue in Enigmail that can potentially be abused for
phishing attacks involving WKD and HTTP authentication.

Web Key Directory or WKD [1] is a feature where OpenPGP keys can be
fetched via a defined web address of the form
https://example.org/.well-known/./openpgpkey/hu/[zbase32_sha1_hash_of_local=
_part]

Enigmail automatically tries to fetch WKD keys already when writing a
mail, so simply having a mail address in "To" will cause an HTTPS
request.

When the server answers with a HTTP authentication challenge (HTTP code
401) then Enigmail/Thunderbird would open up an HTTP login window.
While the login window will show the hostname, this can be very
confusing for a user. If randomly a login window pops up within a mail
client it's plausible that some users will enter their email
credentials. Here's a video to illustrate the issue:
https://www.youtube.com/watch?v=3DeFSMBX98XiE

Similar attacks in browsers have previously been described as
"Cross-Site-Authentication" or XSA [2].

I think it would be good if the WKD draft would be updated to clarify
that a client should never answer to any 401 authentication requests
from the server.


I discovered this together with Moritz Tremmel (We discovered this by
accident due to a server serving HTTP authentication requests for
every path starting with a dot). After we reported this to Enigmail we
learned that this was previously reported in the public bug tracker:
https://sourceforge.net/p/enigmail/bugs/890/

[1] https://tools.ietf.org/html/draft-koch-openpgp-webkey-service-07
[2]
http://www.joachim-breitner.de/blog/56-Like_XSS,_just_simpler_and_harder_to=
_prevent__The_Cross_Site_Auth_(XSA)_Attack

--=20
Hanno B=C3=B6ck
https://hboeck.de/

mail/jabber: hanno@hboeck.de
GPG: FE73757FA60E4E21B937579FA5880072BBB51E42


From rogerandrea.ellenberger@students.bfh.ch  Sat Dec  8 07:17:23 2018
Return-Path: <rogerandrea.ellenberger@students.bfh.ch>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 201A01252B7 for <openpgp@ietfa.amsl.com>; Sat,  8 Dec 2018 07:17:23 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.201
X-Spam-Level: 
X-Spam-Status: No, score=-4.201 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uhz9x_rLsfE6 for <openpgp@ietfa.amsl.com>; Sat,  8 Dec 2018 07:17:16 -0800 (PST)
Received: from mx2.bfh.ch (mx2.bfh.ch [147.87.250.53]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 029D3130934 for <openpgp@ietf.org>; Sat,  8 Dec 2018 07:17:15 -0800 (PST)
Received: from MAIL22.bfh.ch (mail22.bfh.ch [147.87.245.162]) by mx2.bfh.ch (8.14.4/8.14.4/Debian-4) with ESMTP id wB8FH91G021389 (version=TLSv1/SSLv3 cipher=AES256-GCM-SHA384 bits=256 verify=OK); Sat, 8 Dec 2018 16:17:09 +0100
Received: from thinkx.localdomain (147.87.245.141) by MAIL22.bfh.ch (147.87.245.162) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1034.26; Sat, 8 Dec 2018 16:17:04 +0100
From: Roger Ellenberger <rogerandrea.ellenberger@students.bfh.ch>
Openpgp: preference=signencrypt
Autocrypt: addr=rogerandrea.ellenberger@students.bfh.ch; prefer-encrypt=mutual; keydata= xsFNBFf2pkMBEADU9a1RONP716ZedoyUGDWhDHN0zp1H4MnoWKIJRm/DGtrqEb7GGmbBbSUk YPHqCrA7iUf/hSJB/tjYbkrbclRXLXjICub0qu9Ha1MLyhCHs2V91r7Ueyj5vI034PhosIeN Au67ZIGdQ/h3v259TCdbkXFN/X/jJGsOzMWWQo5mtXgIAe6x3XbX0PHm3+KVlId0X9vMOgOi SJymNH7V7vq4obBOXDop7BCCRX3j+dVeu4YVEqb9kGK5M/7nA5Sm4vPGR+2aHQ8SZhFGbzD6 s7k8x3zA4VC68AJyJEXbh+heuDfhHcSMX/XIwGfXhHHQ7RDSztRREWRPp6HUtV7xxO2IarJm /AJCU+6zGT1Usr2dcqmgSi07YZjQqYIiswrmZq9twuMlLT3RB6GyJBNP/Nj+It7eAvPmz57Q 00xs9LLThRPx+JnCPQw7Uewcr9wqM/cbMf5GNXPspxwjRpE0C2JChg2OF9R0DDkEwnbCXjRk WqIYh+buHqKQjvqKNJHY+Tbs/As+NSeNcSWyIbIjJaiaqex03Uk3IfvqREwXNTqUlP2LzJt4 uKQ7ZFgdGOCTkGVEeYpMvYIfOB7M5tQ3lxrE7LinJbfVH+Y9KZnzElwJoNasPBuyyGfjfHg8 XO39sY12wdsjghMkzwFH1+HxLNo4XH0pis4t/Zg7MG8Qe8WgtQARAQABzTFSb2dlciBFbGxl bmJlcmdlciA8cm9nZXIuZWxsZW5iZXJnZXJAbWFpbGJveC5vcmc+wsGBBBMBAgArAhsDBgsJ CAcDAgYVCAIJCgsEFgIDAQIeAQIXgAUJFK+OCAUCWdoxuwIZAQAKCRD2R7znF43PeYvAD/9g VK7rToBnEqDGJs1+1S3L+XQtbFtm1iTyuUVndbgSdk8q4RSEyt4L2uupKlfApRjmahTcI8yi pGzePio1I8s7UFV2mn/un9ET1Pk1m6GxBjTgmEmFMtWD0EQ0+f4unbtfVLvKjsBB0JmP43WH EDOvJOMc2tWk09ffGI2119a6u4SRo+1BtwfxyEMOsOWQg+iPMwGIJl/G7fqp1ZFFXVH7VHHg sOPSmWrOnLAg2oFLZ/iKmjXbB91yubTevZxaKXRyGSeSQAg7HHGRvkNBR9jhnJDEoUN/kTQM hP0Aap3/FvVuWDx50CWQV5sB2+Prpka2EAtp5b4V7y00+qy0e8W4chY1qc/1fztJNgtVevnX 70GpaPrb/XL1Y0uhHYlnmVluBaczS82TfrO7ogX3WbV4Hq6+4Wa+18JXJ9hfHpA8ZtrUnM2b 1lcV3F/2f24MPKUfrGhQSC2NHhwROrwG+712Ntn1aoKLGRAeCutGI62au+JZv93dcAsZRV7E qqdHgr/GjoLePxYFmFyDZNjPvdSzECfFVlZXFXz1deJHHccJpY1IGaHmO6amNp8Bpis5ut3g oa8m6BfISXvCinVr+BV9s7i6M2pCMxq9Qasj9Tp1zQnMm5kpuednvhhXX83YVKkWwh/SYCPt HfWL3KCAMKcmo9BjMtdtM3VfG1Uv1aSTUM7BTQRX9qZDARAAugeo7q4n1uVoff5IgfZNYSzX VFQcZXB5FnFxLySbyo5esw6TEZgpNE99jPVvdnGshnLRdC4HVAFKYSZnx1nKXLJhDuWF/yXZ k5Hjg0RfxxHqEm3COKd3VnRzZmYMJywW+965dyATNtpvLvFkOagqt+/ae/+e54/tw+eFpF6P FWOXc3Y5d6y4F8ETewPQNIqdPDLB+W7ZVsPfklpNRPNRnz/ECshxgN8iBf9Plcq2YYGMooSh dJMteBDK6yYF/gCOMFH2DoV5ikAa56EjudhokA8TTIdJkbOlphbJhzDSFKokKtxCfUpXfGZ0 BPyUrJTwXv5ypvrbZwaQVZWjrDIyEDnDoGrBt9B8rrB4kx9/o/2zo7fF9l/NQZG8+VnohfZP qNyfKLl8nW5HoRW6LFFZ6GNCO65HiJi3eHwPJ3F4WR7CmM+AWtbs7oS79FnEqFDoCSWY4Pf+ ubGCs7xziWDKVpcE/niiNen75vAlFisGlwJrHlcCD7SKQUkmDaMl4nkxZ2/3UknroQSxR8rN CXgaXmtGGe9UfFi9Xqq2+tkBv43SrdGW75nUSsaWRNNZLB8NklLaY9mgJJiDx+Lp32lqc2tH HSwkbEKnanvoZWUtJfTBt+frcbkt+cnTnzvNG/3IXlZmkzFPNxSQyaxbO+duQwph5MVIdjLT I8k3eISFwq0AEQEAAcLBZQQYAQIADwIbDAUCWdoxSwUJFK+OCAAKCRD2R7znF43PeaxzD/sE j9yR7iuRIja0nvjp8qmkMAEvlcfLUnYBgFU+IggnCLi1ecutHhFbK/Pvk8oyNDvcc+NRTc/a 34U2nqkbtTDRjjN58ZMIOv0oWOH51+6DruVU3o8w5eH9jh+Sdp638O5tEvIzSUntcFH8K4CB c7Vsd1/dTsE626DlNI/tZiyGhQYSkDrY7ObgP6c7ihR2PcxPs7D3zZvVAMztCDb+TLi//R+T CKThF88ncxE7Ay2G64O7Bw7DyFDi3NprdShWp/NurHT+ddmNie6r2/X7F6OTPTPhXDqzyArF oOwtfplf0FVulvyq48Wjy34Px4pTM/25lUbkevs1a+5K5fNUguPwR6ERezYDshk0lOa8FhYo IPMZI74JwV1NjaTxcCACaFCoa5qwiQcWWH9q7lZPfhDT3xKutCTtD97Aa+r+DAFCUIvOMAil tDnIVANI7JyncPTWTae2wdm4IgQDbM6CL4I7k3DJYI2mybAU+J19SDnPGYe4ZSDLnlYmFlmg A814wrJjaNaPIpEcykz4jOrnLER3j8G2Yaio1vK1QkFoB7e+SjocTD4nT3bsdG2FZCeBI25G v1vsXbmiSVcIJCcwaurxRdM6U7I/sEIaWepqa7pfXcp4ahc+Z+qwRjfNhtsWr5aEWZgtl5d8 BaBMA1xBVd8myEgxX+B++u9PD42pGf4cpA==
To: <openpgp@ietf.org>
CC: =?UTF-8?Q?Fl=c3=bchmann_Tobias?= <tobias.fluehmann@students.bfh.ch>
Date: Sat, 8 Dec 2018 16:16:59 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.3.1
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Language: en-US
Content-Transfer-Encoding: 8bit
X-Originating-IP: [147.87.245.141]
X-ClientProxiedBy: MAIL24.bfh.ch (147.87.245.164) To MAIL22.bfh.ch (147.87.245.162)
Message-ID: <c7375635-ea32-4474-b706-ebbc82ac79c1@MAIL22.bfh.ch>
X-Bayes-Prob: 0.0001 (Score 0, tokens from: outbound, bfh:default, base:default, @@RPTN)
X-CanIt-Geo: ip=147.87.245.162; country=CH; region=Lucerne; city=Kastanienbaum; latitude=47.0082; longitude=8.3400; http://maps.google.com/maps?q=47.0082,8.3400&z=6
X-CanItPRO-Stream: bfh:outbound (inherits from bfh:default,base:default)
X-Canit-Stats-ID: 03X9rh9yk - 565e21a627d9 - 20181208
X-CanIt-Archive-Cluster: gbKgvJ3SmUdnfmr4CnDUWvXR30M
X-Scanned-By: CanIt (www . roaringpenguin . com) on 147.87.250.53
Archived-At: <https://mailarchive.ietf.org/arch/msg/openpgp/UJXk68Fu2Kx8m-PYzNzOySVNlP8>
X-Mailman-Approved-At: Sat, 08 Dec 2018 07:21:46 -0800
Subject: [openpgp] IND-CPA security of OpenPGP's ElGamal implementation
X-BeenThere: openpgp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/openpgp>, <mailto:openpgp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/openpgp/>
List-Post: <mailto:openpgp@ietf.org>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/openpgp>, <mailto:openpgp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 08 Dec 2018 15:19:38 -0000

Hi,

We are currently working on a Firefox extension which allows us to
encrypt and decrypt OpenPGP messages using partially-trusted remote
keystores. We perform the asymmetric decryption operations on these
remote keystores using a threshold ElGamal scheme. We develop this
extension as our thesis project at Bern University for Applied Sciences.

ElGamal is our preferred asymmetric algorithm since we make use of
threshold cryptography and the threshold scheme of ElGamal is much
simpler compared to threshold RSA.

Working on the decryption of OpenPGP messages we saw in the section 5.1
of RFC4880 that the symmetric key $s$ with algorithm identifier and
checksum is encoded and padded using PKCS#1 v1.5 EME encoding. The
result of the EME encoding $eme_encode(s) = m$ then is encrypted using
ElGamal.

A short recap of ElGamal: We use the Groups Z*_p and G_q for ElGamal,
where p is a safe prime, $q = (p-1)/2$ and $G_q$ is a subgroup of
$Z*_p$. Encryption is defined as follows:

$
enc(y, r, m):   G_q x Z_q x G_q -> G_q x G_q
             :=  (c_1, c_2) = (g**k mod p, m * y**k mod p)
$

According literature one need to map $m$ into $G_q$ to guarantee that
ElGamal ist IND-CPA secure. According the RFC this check is not
performed, but an encoding/padding is applied to the plaintext.

Long story short: We would like to know what the considerations have
been to use ElGamal combined with a PKCS-EME encoding, since without the
encoding/padding it actually lacks of CPA security. Unfortunately we did
not find any authoritative reference which give a statement about
ElGamal security when $m$ is not in G_q but padded.

Thank you very much in advance for your help.


Best regards,
Tobias and Roger


From nobody Sat Dec  8 10:43:16 2018
Return-Path: <watsonbladd@gmail.com>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 09EC3130E5F for <openpgp@ietfa.amsl.com>; Sat,  8 Dec 2018 10:43:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zUzPg1kCo-Ip for <openpgp@ietfa.amsl.com>; Sat,  8 Dec 2018 10:43:13 -0800 (PST)
Received: from mail-lf1-x143.google.com (mail-lf1-x143.google.com [IPv6:2a00:1450:4864:20::143]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A5015130E4D for <openpgp@ietf.org>; Sat,  8 Dec 2018 10:43:12 -0800 (PST)
Received: by mail-lf1-x143.google.com with SMTP id p17so5297353lfh.4 for <openpgp@ietf.org>; Sat, 08 Dec 2018 10:43:12 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=t8n4K0WiFLBdoPc9eI54EDiQUl0cr6xzceQEHhF9hDk=; b=V1esRKrJpRfaBTe5wS/ZKHo8ah+ny9xY+EDnflLCW+cRfA+ToQ+f1wSsUZ4epJq8se rSXfyU7JWWAXqC8YCaoQKwXJSeFa6Z2KORFX0gt85hX4sNx/gBof0dooxTLs8DVSE5ZF s5jmCYm3/2/O3Fcjf029DVP33AnZONQNKIffuAgLbzLApeUJazoh3hg1O+upK/s3PA6N VRTdY8ZNQYTu55gCvDg8xy99PTmZmZHaGe7QLIxyA/XfeeN9PQ5y8NjK0yqfl9nNsyZp MTu7aYXNmrFqRQC5tOQMQ+MgpGv1qNittLw/+/m+zOZ7PeFAsLIBFoaoXGuWVQwHqxS6 Akaw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=t8n4K0WiFLBdoPc9eI54EDiQUl0cr6xzceQEHhF9hDk=; b=pu2mWOP5EDoObvJiRMEmlpUQ8KX8IQnJ+L8HQlhmkzPGm2T/oiep6zgMyBkfZScU2o qctZhTKtt/jS7LdRLWSCwQAfnhftFsbee6/ArvzI3VO6idZlfVU+ykxpdT8hODfoRtiD DCDUSBPBNH7B6YjGIbpWzQC+YZtTJknJCG2m6Mmg7OVZKZqsIv6aEplTvc4GrBev4dtm S/F+ikxOcqYt41M9v/O7EcSE5qqj6kmcU3J0mQVx0Lrj/t0VmjleaVKKMdkJu7sXAE8y JH9kPImOaprAuxBFwQM97AQw1rUi8LRg7mdUcBA5z9UA8jJew020TGwidIOiTwH7Fwo0 l6/g==
X-Gm-Message-State: AA+aEWYADE1TWOdYISH3qhGKTRoj8DkyKF4/Qtfluo+5ROnjPGVgc4Ie D7AVh82d7I6+u7pfvAyy85tvtrbQxLGpi0IXaq9tXEdY
X-Google-Smtp-Source: AFSGD/UatC7wJ/eibjWtjdmvVtqikrngzcIVTx0v2qEbdF4li5/H3bAqp1t0Y1bOBXJ8M2oWtgF/5fbg5+3QOfVINLk=
X-Received: by 2002:a19:4287:: with SMTP id p129mr3926735lfa.135.1544294590646;  Sat, 08 Dec 2018 10:43:10 -0800 (PST)
MIME-Version: 1.0
References: <c7375635-ea32-4474-b706-ebbc82ac79c1@MAIL22.bfh.ch>
In-Reply-To: <c7375635-ea32-4474-b706-ebbc82ac79c1@MAIL22.bfh.ch>
From: Watson Ladd <watsonbladd@gmail.com>
Date: Sat, 8 Dec 2018 10:42:56 -0800
Message-ID: <CACsn0cmocVf1s53JLKhKd+prRQvri2XKruaB3gzDyuQ_ccDwyg@mail.gmail.com>
To: rogerandrea.ellenberger@students.bfh.ch
Cc: IETF OpenPGP <openpgp@ietf.org>, tobias.fluehmann@students.bfh.ch
Content-Type: text/plain; charset="UTF-8"
Archived-At: <https://mailarchive.ietf.org/arch/msg/openpgp/qvOcwijA04GF6cl04lOvwfEhu78>
Subject: Re: [openpgp] IND-CPA security of OpenPGP's ElGamal implementation
X-BeenThere: openpgp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/openpgp>, <mailto:openpgp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/openpgp/>
List-Post: <mailto:openpgp@ietf.org>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/openpgp>, <mailto:openpgp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 08 Dec 2018 18:43:15 -0000

On Sat, Dec 8, 2018 at 7:21 AM Roger Ellenberger
<rogerandrea.ellenberger@students.bfh.ch> wrote:
><snip>
> Long story short: We would like to know what the considerations have
> been to use ElGamal combined with a PKCS-EME encoding, since without the
> encoding/padding it actually lacks of CPA security. Unfortunately we did
> not find any authoritative reference which give a statement about
> ElGamal security when $m$ is not in G_q but padded.

I suspect the only leak is one bit, namely whether or not m is a
quadratic residue mod p or not. The impact on the security is minimal.
But why not use threshold IECS as https://tools.ietf.org/html/rfc6637
does and avoid this quirk?

>
> Thank you very much in advance for your help.
>
>
> Best regards,
> Tobias and Roger
>
> _______________________________________________
> openpgp mailing list
> openpgp@ietf.org
> https://www.ietf.org/mailman/listinfo/openpgp



-- 
"Man is born free, but everywhere he is in chains".
--Rousseau.


From nobody Sat Dec  8 16:44:32 2018
Return-Path: <joncallas@icloud.com>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E2025130FE8 for <openpgp@ietfa.amsl.com>; Sat,  8 Dec 2018 16:44:30 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.3
X-Spam-Level: 
X-Spam-Status: No, score=-4.3 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=icloud.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HmjnVBVMY3Mt for <openpgp@ietfa.amsl.com>; Sat,  8 Dec 2018 16:44:29 -0800 (PST)
Received: from pv50p00im-zteg10011401.me.com (pv50p00im-zteg10011401.me.com [17.58.6.41]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3C13B130FE6 for <openpgp@ietf.org>; Sat,  8 Dec 2018 16:44:29 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=icloud.com; s=04042017; t=1544316268; bh=MTo8nG7NRyFjyGQpLkzYc7sCbEmwb9r6hAfAjAD+Vrc=; h=Content-Type:Mime-Version:Subject:From:Date:Message-Id:To; b=igtYKN38umY+letgU5b7/Q7KPkw/+/83jJ5T7SO3PKMONGaSokfHcum9J9QRxmLRf f+MRL/ZmciTFTjnhwRgBim/rl+TKu+FmSh77qkTNVeD8i19wo+0nA4hS3CwXotlzRY FTZ1pBgiXay1OA8UFOOSd/bRn82bI2/IA3J8qU0BciLhmaBFcWzhRW9aRancQ4+OF4 OBL4QmpHcRna0PJ5VK3tLdK3xhRDjftKNCCcF522xPKcqPfgX98xJZ3oB+UhQd0E2m 2voXVx946ScG9dgT3FDWYXnRR+fftgAND+XreLhfwXyRUPWPLyPkdHXyxmmktLNEBM beGa5sn2GrgJw==
Received: from [172.20.0.207] (unknown [70.102.70.91]) by pv50p00im-zteg10011401.me.com (Postfix) with ESMTPSA id 0C56F9000EC; Sun,  9 Dec 2018 00:44:27 +0000 (UTC)
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 12.1 \(3445.101.1\))
From: Jon Callas <joncallas@icloud.com>
In-Reply-To: <c7375635-ea32-4474-b706-ebbc82ac79c1@MAIL22.bfh.ch>
Date: Sat, 8 Dec 2018 16:44:25 -0800
Cc: Jon Callas <joncallas@icloud.com>, openpgp@ietf.org, =?utf-8?Q?Fl=C3=BChmann_Tobias?= <tobias.fluehmann@students.bfh.ch>
Content-Transfer-Encoding: quoted-printable
Message-Id: <06553B5C-A899-405C-BA8F-420B8C895A1A@icloud.com>
References: <c7375635-ea32-4474-b706-ebbc82ac79c1@MAIL22.bfh.ch>
To: Roger Ellenberger <rogerandrea.ellenberger@students.bfh.ch>
X-Mailer: Apple Mail (2.3445.101.1)
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:, , definitions=2018-12-08_08:, , signatures=0
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=0 malwarescore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1011 mlxscore=0 mlxlogscore=905 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1807170000 definitions=main-1812090005
Archived-At: <https://mailarchive.ietf.org/arch/msg/openpgp/R2NxvBrbtlbEwROdOa2k13XeklQ>
Subject: Re: [openpgp] IND-CPA security of OpenPGP's ElGamal implementation
X-BeenThere: openpgp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/openpgp>, <mailto:openpgp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/openpgp/>
List-Post: <mailto:openpgp@ietf.org>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/openpgp>, <mailto:openpgp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 09 Dec 2018 00:44:31 -0000

> On Dec 8, 2018, at 7:16 AM, Roger Ellenberger =
<rogerandrea.ellenberger@students.bfh.ch> wrote:
>=20
> [=E2=80=A6]
>=20
> Long story short: We would like to know what the considerations have
> been to use ElGamal combined with a PKCS-EME encoding, since without =
the
> encoding/padding it actually lacks of CPA security. Unfortunately we =
did
> not find any authoritative reference which give a statement about
> ElGamal security when $m$ is not in G_q but padded.
>=20
> Thank you very much in advance for your help.

What a wonderful idea. I really like it.

The short answer to your question is that there aren=E2=80=99t any =
references. I concur with Watson that any issue is minimal, especially =
if you=E2=80=99re using Elgamal keys that are 3K to 4K.

A longer answer is that OpenPGP is pretty much the first substantial =
protocol to use Elgamal keys. Back in the late =E2=80=9890s, when =
patents were an issue, the then "PGP 3=E2=80=9D system which became =
=E2=80=9CPGP 5=E2=80=9D and then that became standardized as OpenPGP, =
wanted an alternative to RSA. The RSA patent expired in the year 2000, =
but the discrete log patents expired in =E2=80=9997. Thus, there was a =
real reason for wanting a discrete  log option. They picked Elgamal =
because you can use it more or less as if it were RSA. As time went on, =
Elgamal signatures fell by the wayside over DSA, leaving Elgamal for =
encryption.

Derek Atkins might remember more, because a lot of those original =
decisions were made by some combination of him, Colin Plumb, and Hal =
Finney.

	Jon


From nobody Sun Dec  9 00:55:05 2018
Return-Path: <HeikoStamer@gmx.net>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D06F7130F25 for <openpgp@ietfa.amsl.com>; Sun,  9 Dec 2018 00:55:02 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.701
X-Spam-Level: 
X-Spam-Status: No, score=-0.701 tagged_above=-999 required=5 tests=[BAYES_20=-0.001, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bd7VCUD8dvwG for <openpgp@ietfa.amsl.com>; Sun,  9 Dec 2018 00:55:00 -0800 (PST)
Received: from mout.gmx.net (mout.gmx.net [212.227.17.22]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 253C8130F09 for <openpgp@ietf.org>; Sun,  9 Dec 2018 00:54:59 -0800 (PST)
Received: from [192.168.178.22] ([80.132.226.110]) by mail.gmx.com (mrgmx103 [212.227.17.168]) with ESMTPSA (Nemesis) id 0MOOJl-1gZTlC0p9R-005mMR for <openpgp@ietf.org>; Sun, 09 Dec 2018 09:54:55 +0100
To: openpgp@ietf.org
References: <c7375635-ea32-4474-b706-ebbc82ac79c1@MAIL22.bfh.ch>
From: Heiko Stamer <HeikoStamer@gmx.net>
Message-ID: <f7b18d82-bae7-388a-5b39-894acbcc0dc2@gmx.net>
Date: Sun, 9 Dec 2018 10:02:19 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.3.0
MIME-Version: 1.0
In-Reply-To: <c7375635-ea32-4474-b706-ebbc82ac79c1@MAIL22.bfh.ch>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Language: de-DE
Content-Transfer-Encoding: 7bit
X-Provags-ID: V03:K1:h4eVT2CeAap1y6n2u37DJ+N8fH+c3T8NAKJ7btKEAGP5cjsvZNq MI788H5cO+nUVpc3CtF6UgAmnqv89YSCrqJFuxvB3zsvoCAufl7lIPcTKgr5nRmt2Q5X47W snK+lbbR0c7fYUpQNlHZJ84bLIUqIYrMIzTFTzMlgUbrjMnRAPd1VgbfN59aQjf8r6J19gQ ZLU4xsCCtddvvJ8L2r+hw==
X-UI-Out-Filterresults: notjunk:1;V03:K0:FD+YS0/BXb0=:iQLLqWm2aMNjS8AtNLYh6G TewmgPabPGnQEpKEKjHxLDC8gTsfNJik45w3yMef4lDQDBjOk1zg72VyrtA78bPCzEvZ+l8oJ 7OKHBaKCmUEtdzpMPCyF031az7kuEs27J9H6N80uPZ/wpKMiinf3+mwlrrd5oCfEDfeoxbTyV LYYoxMfBiosXEOXO51vLSLfzcDJZ1XGWFbHpdA35r/oop7cBXkIox7S3oQPvEO07UViNX1QbO aSriePX+/mirG0ewUgcy1JZDN8/dIJAB+7XMfUu5I1xJSkPFl3rXiP9VZ8+R6/irv0q/NcX0y 4MCo2NAQGvUFdwhvs8aOH6k3SFKT0paj+ZeqbMpEBN0i9yciDtc9kEMkqQiRmY7VdspQWOw/0 xh/HkUEPOEIpYgw3G8NwimGgHzn3yT0rpkjTPQgv19U34VFXYq2K7FoCAX+apNpLLsA7wuTYX bIAhx1m1SH2qSwtpaq/WqbVMZa/zslrm2IpB0zwCnyhg7jVTHggOxUDGJIWOCQJlt47gTBmEb 98GSTlHr4UsbYFmtZYZ2ARIsgenmVfYvE2oBwS+FGJkKelYvrnxz1vZw68/NXsEnx+96Qwh7W pPtJK4cRuBf2n5ttxFBkGzIBWAh0mYtvbUdbOLsjRzdb0BV7b3jlVXVAn+TjQLEvxpM0tpS2w 9szv/Kjz2a6kf/8rXD1wxTlbBHdHmgaEXB2fgnClwu+aPwuauyG7vL1EUtdmKH6wFova8aimG 5VDmuPvK8LyqpIRC7CTvbLETuKhnTBX/3oZYbE2JGCXpCSUpsT0gBYkax0PnVEhVKzb/jO7T9 fkG2XV6bIg1uy+UsdnwMC4AcgL/odK/UMdNVmuf98GFqt3MlRc628OXr25xCffSHka+3/fD6O Mq7EDv6yYEFpI+AbOEJvNIMWLSmPIBZRKBW6yVuoj/EqJQWrfc98xc0rWR9hrEJgbp3Rzkuwv PVdobejmJiw==
Archived-At: <https://mailarchive.ietf.org/arch/msg/openpgp/bS0-C2G3AEan5ElghqMxWwVSREs>
Subject: Re: [openpgp] IND-CPA security of OpenPGP's ElGamal implementation
X-BeenThere: openpgp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/openpgp>, <mailto:openpgp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/openpgp/>
List-Post: <mailto:openpgp@ietf.org>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/openpgp>, <mailto:openpgp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 09 Dec 2018 08:55:03 -0000

At 08.12.18 / 16:16 Roger Ellenberger wrote:

> According literature one need to map $m$ into $G_q$ to guarantee that
> ElGamal ist IND-CPA secure. According the RFC this check is not
> performed, but an encoding/padding is applied to the plaintext.

I stumble upon the same problem [1] when creating DKGPG some months ago. 
In my oppinion it cannot be solved without revising ElGamal in the RFC. 
Maybe the work of Sakurai and Shizuya [2] can help to understand some 
implications of the RFC authors choice at that time.

[1] slide #17 of https://www.nongnu.org/libtmcg/dg81_slides.pdf
[2] https://link.springer.com/content/pdf/10.1007/3-540-49264-X_28.pdf

Best regards,
Heiko.


From nobody Sun Dec  9 02:14:28 2018
Return-Path: <rogerandrea.ellenberger@students.bfh.ch>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D51ED126DBF for <openpgp@ietfa.amsl.com>; Sun,  9 Dec 2018 02:14:27 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.201
X-Spam-Level: 
X-Spam-Status: No, score=-4.201 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YrPu93Qcxd95 for <openpgp@ietfa.amsl.com>; Sun,  9 Dec 2018 02:14:25 -0800 (PST)
Received: from mx2.bfh.ch (mx2.bfh.ch [147.87.250.53]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 75C0712426A for <openpgp@ietf.org>; Sun,  9 Dec 2018 02:14:24 -0800 (PST)
Received: from MAIL22.bfh.ch (mail22.bfh.ch [147.87.245.162]) by mx2.bfh.ch (8.14.4/8.14.4/Debian-4) with ESMTP id wB9AEFRW010688 (version=TLSv1/SSLv3 cipher=AES256-GCM-SHA384 bits=256 verify=OK); Sun, 9 Dec 2018 11:14:16 +0100
Received: from thinkx.localdomain (147.87.245.142) by MAIL22.bfh.ch (147.87.245.162) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1034.26; Sun, 9 Dec 2018 11:14:11 +0100
To: Jon Callas <joncallas@icloud.com>
CC: <openpgp@ietf.org>, =?UTF-8?Q?Fl=c3=bchmann_Tobias?= <tobias.fluehmann@students.bfh.ch>
References: <c7375635-ea32-4474-b706-ebbc82ac79c1@MAIL22.bfh.ch> <06553B5C-A899-405C-BA8F-420B8C895A1A@icloud.com>
From: Roger Ellenberger <rogerandrea.ellenberger@students.bfh.ch>
Openpgp: preference=signencrypt
Autocrypt: addr=rogerandrea.ellenberger@students.bfh.ch; prefer-encrypt=mutual; keydata= xsFNBFf2pkMBEADU9a1RONP716ZedoyUGDWhDHN0zp1H4MnoWKIJRm/DGtrqEb7GGmbBbSUk YPHqCrA7iUf/hSJB/tjYbkrbclRXLXjICub0qu9Ha1MLyhCHs2V91r7Ueyj5vI034PhosIeN Au67ZIGdQ/h3v259TCdbkXFN/X/jJGsOzMWWQo5mtXgIAe6x3XbX0PHm3+KVlId0X9vMOgOi SJymNH7V7vq4obBOXDop7BCCRX3j+dVeu4YVEqb9kGK5M/7nA5Sm4vPGR+2aHQ8SZhFGbzD6 s7k8x3zA4VC68AJyJEXbh+heuDfhHcSMX/XIwGfXhHHQ7RDSztRREWRPp6HUtV7xxO2IarJm /AJCU+6zGT1Usr2dcqmgSi07YZjQqYIiswrmZq9twuMlLT3RB6GyJBNP/Nj+It7eAvPmz57Q 00xs9LLThRPx+JnCPQw7Uewcr9wqM/cbMf5GNXPspxwjRpE0C2JChg2OF9R0DDkEwnbCXjRk WqIYh+buHqKQjvqKNJHY+Tbs/As+NSeNcSWyIbIjJaiaqex03Uk3IfvqREwXNTqUlP2LzJt4 uKQ7ZFgdGOCTkGVEeYpMvYIfOB7M5tQ3lxrE7LinJbfVH+Y9KZnzElwJoNasPBuyyGfjfHg8 XO39sY12wdsjghMkzwFH1+HxLNo4XH0pis4t/Zg7MG8Qe8WgtQARAQABzTFSb2dlciBFbGxl bmJlcmdlciA8cm9nZXIuZWxsZW5iZXJnZXJAbWFpbGJveC5vcmc+wsGBBBMBAgArAhsDBgsJ CAcDAgYVCAIJCgsEFgIDAQIeAQIXgAUJFK+OCAUCWdoxuwIZAQAKCRD2R7znF43PeYvAD/9g VK7rToBnEqDGJs1+1S3L+XQtbFtm1iTyuUVndbgSdk8q4RSEyt4L2uupKlfApRjmahTcI8yi pGzePio1I8s7UFV2mn/un9ET1Pk1m6GxBjTgmEmFMtWD0EQ0+f4unbtfVLvKjsBB0JmP43WH EDOvJOMc2tWk09ffGI2119a6u4SRo+1BtwfxyEMOsOWQg+iPMwGIJl/G7fqp1ZFFXVH7VHHg sOPSmWrOnLAg2oFLZ/iKmjXbB91yubTevZxaKXRyGSeSQAg7HHGRvkNBR9jhnJDEoUN/kTQM hP0Aap3/FvVuWDx50CWQV5sB2+Prpka2EAtp5b4V7y00+qy0e8W4chY1qc/1fztJNgtVevnX 70GpaPrb/XL1Y0uhHYlnmVluBaczS82TfrO7ogX3WbV4Hq6+4Wa+18JXJ9hfHpA8ZtrUnM2b 1lcV3F/2f24MPKUfrGhQSC2NHhwROrwG+712Ntn1aoKLGRAeCutGI62au+JZv93dcAsZRV7E qqdHgr/GjoLePxYFmFyDZNjPvdSzECfFVlZXFXz1deJHHccJpY1IGaHmO6amNp8Bpis5ut3g oa8m6BfISXvCinVr+BV9s7i6M2pCMxq9Qasj9Tp1zQnMm5kpuednvhhXX83YVKkWwh/SYCPt HfWL3KCAMKcmo9BjMtdtM3VfG1Uv1aSTUM7BTQRX9qZDARAAugeo7q4n1uVoff5IgfZNYSzX VFQcZXB5FnFxLySbyo5esw6TEZgpNE99jPVvdnGshnLRdC4HVAFKYSZnx1nKXLJhDuWF/yXZ k5Hjg0RfxxHqEm3COKd3VnRzZmYMJywW+965dyATNtpvLvFkOagqt+/ae/+e54/tw+eFpF6P FWOXc3Y5d6y4F8ETewPQNIqdPDLB+W7ZVsPfklpNRPNRnz/ECshxgN8iBf9Plcq2YYGMooSh dJMteBDK6yYF/gCOMFH2DoV5ikAa56EjudhokA8TTIdJkbOlphbJhzDSFKokKtxCfUpXfGZ0 BPyUrJTwXv5ypvrbZwaQVZWjrDIyEDnDoGrBt9B8rrB4kx9/o/2zo7fF9l/NQZG8+VnohfZP qNyfKLl8nW5HoRW6LFFZ6GNCO65HiJi3eHwPJ3F4WR7CmM+AWtbs7oS79FnEqFDoCSWY4Pf+ ubGCs7xziWDKVpcE/niiNen75vAlFisGlwJrHlcCD7SKQUkmDaMl4nkxZ2/3UknroQSxR8rN CXgaXmtGGe9UfFi9Xqq2+tkBv43SrdGW75nUSsaWRNNZLB8NklLaY9mgJJiDx+Lp32lqc2tH HSwkbEKnanvoZWUtJfTBt+frcbkt+cnTnzvNG/3IXlZmkzFPNxSQyaxbO+duQwph5MVIdjLT I8k3eISFwq0AEQEAAcLBZQQYAQIADwIbDAUCWdoxSwUJFK+OCAAKCRD2R7znF43PeaxzD/sE j9yR7iuRIja0nvjp8qmkMAEvlcfLUnYBgFU+IggnCLi1ecutHhFbK/Pvk8oyNDvcc+NRTc/a 34U2nqkbtTDRjjN58ZMIOv0oWOH51+6DruVU3o8w5eH9jh+Sdp638O5tEvIzSUntcFH8K4CB c7Vsd1/dTsE626DlNI/tZiyGhQYSkDrY7ObgP6c7ihR2PcxPs7D3zZvVAMztCDb+TLi//R+T CKThF88ncxE7Ay2G64O7Bw7DyFDi3NprdShWp/NurHT+ddmNie6r2/X7F6OTPTPhXDqzyArF oOwtfplf0FVulvyq48Wjy34Px4pTM/25lUbkevs1a+5K5fNUguPwR6ERezYDshk0lOa8FhYo IPMZI74JwV1NjaTxcCACaFCoa5qwiQcWWH9q7lZPfhDT3xKutCTtD97Aa+r+DAFCUIvOMAil tDnIVANI7JyncPTWTae2wdm4IgQDbM6CL4I7k3DJYI2mybAU+J19SDnPGYe4ZSDLnlYmFlmg A814wrJjaNaPIpEcykz4jOrnLER3j8G2Yaio1vK1QkFoB7e+SjocTD4nT3bsdG2FZCeBI25G v1vsXbmiSVcIJCcwaurxRdM6U7I/sEIaWepqa7pfXcp4ahc+Z+qwRjfNhtsWr5aEWZgtl5d8 BaBMA1xBVd8myEgxX+B++u9PD42pGf4cpA==
Date: Sun, 9 Dec 2018 11:14:10 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.3.1
MIME-Version: 1.0
In-Reply-To: <06553B5C-A899-405C-BA8F-420B8C895A1A@icloud.com>
Content-Type: text/plain; charset="utf-8"
Content-Language: en-US
Content-Transfer-Encoding: 8bit
X-Originating-IP: [147.87.245.142]
X-ClientProxiedBy: MAIL23.bfh.ch (147.87.245.163) To MAIL22.bfh.ch (147.87.245.162)
Message-ID: <3e1fe861-8f5c-4ced-9122-2f30d58773a9@MAIL22.bfh.ch>
X-Bayes-Prob: 0.0001 (Score 0, tokens from: outbound, bfh:default, base:default, @@RPTN)
X-CanIt-Geo: ip=147.87.245.162; country=CH; region=Lucerne; city=Kastanienbaum; latitude=47.0082; longitude=8.3400; http://maps.google.com/maps?q=47.0082,8.3400&z=6
X-CanItPRO-Stream: bfh:outbound (inherits from bfh:default,base:default)
X-Canit-Stats-ID: 03X9KeghC - df868af55dcf - 20181209
X-CanIt-Archive-Cluster: gbKgvJ3SmUdnfmr4CnDUWvXR30M
X-Scanned-By: CanIt (www . roaringpenguin . com) on 147.87.250.53
Archived-At: <https://mailarchive.ietf.org/arch/msg/openpgp/0C2FoQTK8AYGXq2UHVb5uF8MAFw>
Subject: Re: [openpgp] IND-CPA security of OpenPGP's ElGamal implementation
X-BeenThere: openpgp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/openpgp>, <mailto:openpgp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/openpgp/>
List-Post: <mailto:openpgp@ietf.org>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/openpgp>, <mailto:openpgp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 09 Dec 2018 10:14:28 -0000

On 12/9/18 1:44 AM, Jon Callas wrote:
>> On Dec 8, 2018, at 7:16 AM, Roger Ellenberger <rogerandrea.ellenberger@students.bfh.ch> wrote:
>>
>> […]
>>
>> Long story short: We would like to know what the considerations have
>> been to use ElGamal combined with a PKCS-EME encoding, since without the
>> encoding/padding it actually lacks of CPA security. Unfortunately we did
>> not find any authoritative reference which give a statement about
>> ElGamal security when $m$ is not in G_q but padded.
>>
>> Thank you very much in advance for your help.
> 
> What a wonderful idea. I really like it.
Very appreciated. We're thrilled you like it.

> 
> The short answer to your question is that there aren’t any references. I concur with Watson that any issue is minimal, especially if you’re using Elgamal keys that are 3K to 4K.
> 
> A longer answer is that OpenPGP is pretty much the first substantial protocol to use Elgamal keys. Back in the late ‘90s, when patents were an issue, the then "PGP 3” system which became “PGP 5” and then that became standardized as OpenPGP, wanted an alternative to RSA. The RSA patent expired in the year 2000, but the discrete log patents expired in ’97. Thus, there was a real reason for wanting a discrete  log option. They picked Elgamal because you can use it more or less as if it were RSA. As time went on, Elgamal signatures fell by the wayside over DSA, leaving Elgamal for encryption.
We already supposed that there might be historical reasons for that. So
that's exactly the sort of reply we hoped to get. That's awesome. Thanks
a lot Jon.

> 
> Derek Atkins might remember more, because a lot of those original decisions were made by some combination of him, Colin Plumb, and Hal Finney.
> 
> 	Jon
> 
We are pleased to get as much information as possible if anymore
remembers more. However Jon's answer is already a big leap forward.


Cheers
Tobias and Roger


From nobody Mon Dec 10 08:21:33 2018
Return-Path: <derek@ihtfp.com>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 510CF130FFF for <openpgp@ietfa.amsl.com>; Mon, 10 Dec 2018 08:21:32 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.789
X-Spam-Level: 
X-Spam-Status: No, score=-1.789 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, T_SPF_PERMERROR=0.01, URIBL_BLOCKED=0.001, URIBL_CSS=0.1, URIBL_CSS_A=0.1] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ihtfp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ftW9CJPS6aZV for <openpgp@ietfa.amsl.com>; Mon, 10 Dec 2018 08:21:31 -0800 (PST)
Received: from mail2.ihtfp.org (MAIL2.IHTFP.ORG [204.107.200.7]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 064CD13100F for <openpgp@ietf.org>; Mon, 10 Dec 2018 08:21:31 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by mail2.ihtfp.org (Postfix) with ESMTP id 9EDD4E2059; Mon, 10 Dec 2018 11:21:29 -0500 (EST)
Received: from mail2.ihtfp.org ([127.0.0.1]) by localhost (mail2.ihtfp.org [127.0.0.1]) (amavisd-maia, port 10024) with ESMTP id 04279-05; Mon, 10 Dec 2018 11:21:23 -0500 (EST)
Received: from securerf.ihtfp.org (c-24-147-169-185.hsd1.ct.comcast.net [24.147.169.185]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mocana.ihtfp.org", Issuer "IHTFP Consulting Certification Authority" (not verified)) by mail2.ihtfp.org (Postfix) with ESMTPS id 944E9E2045; Mon, 10 Dec 2018 11:21:23 -0500 (EST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ihtfp.com; s=default; t=1544458883; bh=uMCTdt4ohxCD9txTlgeJlsariEIZlwdGxT5pxyUk9Z0=; h=From:To:Cc:Subject:References:Date:In-Reply-To; b=pSDTWXY3X9G2aODfWTACLeLAowLGoihyReQIM5Yi2QYVlAOwZXY2vdaEh8+Amr8TM hfmTjWRYt0/molV93jykg7+gMtfmQMuUopJp2+Ykmfmf8DPUD4b9L4M98L+ud/2e0t urKb0D34PMJtzsvu2S0aCnAz32DrQSbXz74Tuuys=
Received: (from warlord@localhost) by securerf.ihtfp.org (8.15.2/8.15.2/Submit) id wBAGLKWp014487; Mon, 10 Dec 2018 11:21:20 -0500
From: Derek Atkins <derek@ihtfp.com>
To: Jon Callas <joncallas=40icloud.com@dmarc.ietf.org>
Cc: Roger Ellenberger <rogerandrea.ellenberger@students.bfh.ch>, =?utf-8?Q?Fl=C3=BChmann?= Tobias <tobias.fluehmann@students.bfh.ch>, <openpgp@ietf.org>, Jon Callas <joncallas@icloud.com>
References: <c7375635-ea32-4474-b706-ebbc82ac79c1@MAIL22.bfh.ch> <06553B5C-A899-405C-BA8F-420B8C895A1A@icloud.com>
Date: Mon, 10 Dec 2018 11:21:18 -0500
In-Reply-To: <06553B5C-A899-405C-BA8F-420B8C895A1A@icloud.com> (Jon Callas's message of "Sat, 8 Dec 2018 16:44:25 -0800")
Message-ID: <sjmbm5tz729.fsf@securerf.ihtfp.org>
User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/25.3 (gnu/linux)
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable
X-Virus-Scanned: Maia Mailguard 1.0.2a
Archived-At: <https://mailarchive.ietf.org/arch/msg/openpgp/Pfa4UUZCtMDpT38CuCGp10JcnJk>
Subject: Re: [openpgp] IND-CPA security of OpenPGP's ElGamal implementation
X-BeenThere: openpgp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/openpgp>, <mailto:openpgp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/openpgp/>
List-Post: <mailto:openpgp@ietf.org>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/openpgp>, <mailto:openpgp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 10 Dec 2018 16:21:32 -0000

Jon Callas <joncallas=3D40icloud.com@dmarc.ietf.org> writes:

> A longer answer is that OpenPGP is pretty much the first substantial
> protocol to use Elgamal keys. Back in the late =E2=80=9890s, when patents=
 were
> an issue, the then "PGP 3=E2=80=9D system which became =E2=80=9CPGP 5=E2=
=80=9D and then that
> became standardized as OpenPGP, wanted an alternative to RSA. The RSA
> patent expired in the year 2000, but the discrete log patents expired
> in =E2=80=9997. Thus, there was a real reason for wanting a discrete log
> option. They picked Elgamal because you can use it more or less as if
> it were RSA. As time went on, Elgamal signatures fell by the wayside
> over DSA, leaving Elgamal for encryption.
>
> Derek Atkins might remember more, because a lot of those original
> decisions were made by some combination of him, Colin Plumb, and Hal
> Finney.

As I recall, we added DSA and ElGamal to attempt to work around the RSA
patents.  For a while, IIRC, PGP3/5 did not even support RSA at all,
making it harder to interact with PGP2 -- at least for a short while.
This was all back in 1996-1997 when this work was done.

> 	Jon

-derek
--=20
       Derek Atkins                 617-623-3745
       derek@ihtfp.com             www.ihtfp.com
       Computer and Internet Security Consultant


From nobody Fri Dec 14 01:05:15 2018
Return-Path: <wk@gnupg.org>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B9B571310D8 for <openpgp@ietfa.amsl.com>; Fri, 14 Dec 2018 01:05:13 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7
X-Spam-Level: 
X-Spam-Status: No, score=-7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9,  DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=gnupg.org
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qHzr2msl8LSi for <openpgp@ietfa.amsl.com>; Fri, 14 Dec 2018 01:05:11 -0800 (PST)
Received: from kerckhoffs.g10code.com (kerckhoffs.g10code.com [IPv6:2001:aa8:fff1:100::22]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 126B9126CC7 for <openpgp@ietf.org>; Fri, 14 Dec 2018 01:05:10 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=gnupg.org;  s=20181017; h=Content-Type:MIME-Version:Message-ID:In-Reply-To:Date: References:Subject:Cc:To:From:Sender:Reply-To:Content-Transfer-Encoding: Content-ID:Content-Description:Resent-Date:Resent-From:Resent-Sender: Resent-To:Resent-Cc:Resent-Message-ID:List-Id:List-Help:List-Unsubscribe: List-Subscribe:List-Post:List-Owner:List-Archive; bh=OEld2cfwXfPXpCpTqtMqMo2XStQeNJEOYpWmbqk6D9k=; b=etUlI+H13sIOHhlPwE/mZ6LYh/ fRdsIqf6rcShmGAmsh4wrGtwqVzfNf9nlNCexLHAx2JFi9vev0DkDHyb9/vGQtwZlMV708iiG2Z4c 0mOyx7VTKh38P9GYK2GdWJsjAeYSbCGJVFOniSxqXcnux40UM4WHlMsPnJYAI5yaa/m0=;
Received: from uucp by kerckhoffs.g10code.com with local-rmail (Exim 4.89 #1 (Debian)) id 1gXjPB-00071X-0V for <openpgp@ietf.org>; Fri, 14 Dec 2018 10:05:09 +0100
Received: from wk by wheatstone.g10code.de with local (Exim 4.84 #3 (Debian)) id 1gXjMt-0008JN-Ry; Fri, 14 Dec 2018 10:02:47 +0100
From: Werner Koch <wk@gnupg.org>
To: Hanno =?utf-8?Q?B=C3=B6ck?= <hanno@hboeck.de>
Cc: openpgp@ietf.org
References: <20181207154441.41b02dc3@computer>
Organisation: GnuPG e.V.
X-message-flag: Mails containing HTML will not be read! Please send only plain text.
Mail-Followup-To: Hanno =?utf-8?Q?B=C3=B6ck?= <hanno@hboeck.de>, openpgp@ietf.org
Date: Fri, 14 Dec 2018 10:02:46 +0100
In-Reply-To: <20181207154441.41b02dc3@computer> ("Hanno =?utf-8?Q?B=C3=B6c?= =?utf-8?Q?k=22's?= message of "Fri, 7 Dec 2018 15:44:41 +0100")
Message-ID: <877egcfpl5.fsf@wheatstone.g10code.de>
User-Agent: Gnus/5.13 (Gnus v5.13)
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=bullion_Uzbekistan_9/11_JUWTF_LABLINK_Peking_high_security_top_secre"; micalg=pgp-sha256; protocol="application/pgp-signature"
Archived-At: <https://mailarchive.ietf.org/arch/msg/openpgp/EWkjgC7r1S7b_euLyOJxGukSLXU>
Subject: Re: [openpgp] Enigmail XSA issue with WKD and HTTP authentication
X-BeenThere: openpgp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/openpgp>, <mailto:openpgp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/openpgp/>
List-Post: <mailto:openpgp@ietf.org>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/openpgp>, <mailto:openpgp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 Dec 2018 09:05:14 -0000

--=bullion_Uzbekistan_9/11_JUWTF_LABLINK_Peking_high_security_top_secre
Content-Type: text/plain
Content-Transfer-Encoding: quoted-printable

On Fri,  7 Dec 2018 15:44, hanno@hboeck.de said:

> I think it would be good if the WKD draft would be updated to clarify
> that a client should never answer to any 401 authentication requests
> from the server.

Is this okay:

  A client MUST not accept a HTTP authentication challenge (HTTP code
  401) because the information in the Web Key Directory is public and
  needs no authentication.  Allowing an authentication challenge has the
  problem to easily confuse a user with a password prompt and tricking
  him into falsely entering the passphrase used to protect his private
  key or to login to his mail provider.
=20=20


Shalom-Salam,

   Werner

=2D-=20
Die Gedanken sind frei.  Ausnahmen regelt ein Bundesgesetz.

--=bullion_Uzbekistan_9/11_JUWTF_LABLINK_Peking_high_security_top_secre
Content-Type: application/pgp-signature

-----BEGIN PGP SIGNATURE-----

iHUEARYIAB0WIQTX/8BjtAoilLlm20f/gK6dHew1jQUCXBNxtwAKCRD/gK6dHew1
jfJHAQCEECI1jUV1pyAEohbH0L8bLccoOgz2dLHr+8mDJrs9RwEAjF4st3HCKFOV
1OHu6pzKfG0ib+nIo9Yg8JQsiU736wE=
=nOqV
-----END PGP SIGNATURE-----
--=bullion_Uzbekistan_9/11_JUWTF_LABLINK_Peking_high_security_top_secre--


From nobody Fri Dec 14 02:07:08 2018
Return-Path: <hanno@hboeck.de>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7817A12D84D for <openpgp@ietfa.amsl.com>; Fri, 14 Dec 2018 02:07:06 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.621
X-Spam-Level: 
X-Spam-Status: No, score=-1.621 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FROM_EXCESS_BASE64=0.979, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CTDdlxEVfX7A for <openpgp@ietfa.amsl.com>; Fri, 14 Dec 2018 02:07:03 -0800 (PST)
Received: from zucker2.schokokeks.org (zucker2.schokokeks.org [178.63.68.90]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4C2C2128766 for <openpgp@ietf.org>; Fri, 14 Dec 2018 02:07:02 -0800 (PST)
Received: from computer ([2a02:8109:83c0:4bfd:dc27:39b2:705d:72e7]) (AUTH: LOGIN hanno-default@schokokeks.org, TLS: TLSv1/SSLv3, 256bits, ECDHE-RSA-AES256-GCM-SHA384) by zucker.schokokeks.org with ESMTPSA; Fri, 14 Dec 2018 11:07:00 +0100 id 0000000000000063.000000005C1380C4.00003807
Date: Fri, 14 Dec 2018 11:06:59 +0100
From: Hanno =?UTF-8?B?QsO2Y2s=?= <hanno@hboeck.de>
To: Werner Koch <wk@gnupg.org>
Cc: openpgp@ietf.org
Message-ID: <20181214110659.084bee0a@computer>
In-Reply-To: <877egcfpl5.fsf@wheatstone.g10code.de>
References: <20181207154441.41b02dc3@computer> <877egcfpl5.fsf@wheatstone.g10code.de>
X-Mailer: Claws Mail 3.17.1 (GTK+ 2.24.32; x86_64-pc-linux-gnu)
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="=_zucker.schokokeks.org-14343-1544782020-0001-2"
Archived-At: <https://mailarchive.ietf.org/arch/msg/openpgp/fVAwsc4dCu4CZis5slYlEfXkHQ8>
Subject: Re: [openpgp] Enigmail XSA issue with WKD and HTTP authentication
X-BeenThere: openpgp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/openpgp>, <mailto:openpgp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/openpgp/>
List-Post: <mailto:openpgp@ietf.org>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/openpgp>, <mailto:openpgp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 Dec 2018 10:07:07 -0000

This is a MIME-formatted message.  If you see this text it means that your
E-mail software does not support MIME-formatted messages.

--=_zucker.schokokeks.org-14343-1544782020-0001-2
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

On Fri, 14 Dec 2018 10:02:46 +0100
Werner Koch <wk@gnupg.org> wrote:

>   A client MUST not accept a HTTP authentication challenge (HTTP code
>   401) because the information in the Web Key Directory is public and
>   needs no authentication.  Allowing an authentication challenge has
> the problem to easily confuse a user with a password prompt and
> tricking him into falsely entering the passphrase used to protect his
> private key or to login to his mail provider.

Sounds good.

--=20
Hanno B=C3=B6ck
https://hboeck.de/

mail/jabber: hanno@hboeck.de
GPG: FE73757FA60E4E21B937579FA5880072BBB51E42

--=_zucker.schokokeks.org-14343-1544782020-0001-2
Content-Type: application/pgp-signature
Content-Transfer-Encoding: 7bit
Content-Description: OpenPGP digital signature

-----BEGIN PGP SIGNATURE-----
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=mW4r
-----END PGP SIGNATURE-----

--=_zucker.schokokeks.org-14343-1544782020-0001-2--


From nobody Fri Dec 14 06:12:44 2018
Return-Path: <derek@ihtfp.com>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 331AD127B4C for <openpgp@ietfa.amsl.com>; Fri, 14 Dec 2018 06:12:43 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.989
X-Spam-Level: 
X-Spam-Status: No, score=-1.989 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, T_SPF_PERMERROR=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ihtfp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id I2zeUcITlYVh for <openpgp@ietfa.amsl.com>; Fri, 14 Dec 2018 06:12:40 -0800 (PST)
Received: from mail2.ihtfp.org (MAIL2.IHTFP.ORG [204.107.200.7]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B706D12426E for <openpgp@ietf.org>; Fri, 14 Dec 2018 06:12:40 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by mail2.ihtfp.org (Postfix) with ESMTP id 78B10E2054; Fri, 14 Dec 2018 09:12:39 -0500 (EST)
Received: from mail2.ihtfp.org ([127.0.0.1]) by localhost (mail2.ihtfp.org [127.0.0.1]) (amavisd-maia, port 10024) with ESMTP id 09355-08; Fri, 14 Dec 2018 09:12:34 -0500 (EST)
Received: from securerf.ihtfp.org (IHTFP-DHCP-158.IHTFP.ORG [192.168.248.158]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mocana.ihtfp.org", Issuer "IHTFP Consulting Certification Authority" (not verified)) by mail2.ihtfp.org (Postfix) with ESMTPS id A6A3EE2045; Fri, 14 Dec 2018 09:12:34 -0500 (EST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ihtfp.com; s=default; t=1544796754; bh=csQ15djbQinl8Hvn8W3CMsqRYISutvlzxqZLjNnECDo=; h=From:To:Cc:Subject:References:Date:In-Reply-To; b=jYf6HT0YTj8ZmAnuafDlvRBxXHsrCKjxPjYsXcxjVp5rdp6fs4MFA0gQUdvFf68IZ SDcRLKmUCiNg2rglFrsNlQNGPzpw3SD0KQXiXMWyH55/fckZZkz1A1FFpqmNkjB+2+ sPriajnrTQ2f3jJ8+3pqPVVg5F+/7zFGzAQOmAms=
Received: (from warlord@localhost) by securerf.ihtfp.org (8.15.2/8.15.2/Submit) id wBEECXik027112; Fri, 14 Dec 2018 09:12:33 -0500
From: Derek Atkins <derek@ihtfp.com>
To: wk@gnupg.org, Hanno =?utf-8?Q?B=C3=B6ck?= <hanno@hboeck.de>
Cc: openpgp@ietf.org
References: <20181207154441.41b02dc3@computer> <877egcfpl5.fsf@wheatstone.g10code.de>
Date: Fri, 14 Dec 2018 09:12:33 -0500
In-Reply-To: <877egcfpl5.fsf@wheatstone.g10code.de> (Werner Koch's message of "Fri, 14 Dec 2018 10:02:46 +0100")
Message-ID: <sjm1s6kxkmm.fsf@securerf.ihtfp.org>
User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/25.3 (gnu/linux)
MIME-Version: 1.0
Content-Type: text/plain
X-Virus-Scanned: Maia Mailguard 1.0.2a
Archived-At: <https://mailarchive.ietf.org/arch/msg/openpgp/uZ6srEmHjZ6VeHGOVF5u7q-3qv8>
Subject: Re: [openpgp] Enigmail XSA issue with WKD and HTTP authentication
X-BeenThere: openpgp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/openpgp>, <mailto:openpgp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/openpgp/>
List-Post: <mailto:openpgp@ietf.org>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/openpgp>, <mailto:openpgp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 Dec 2018 14:12:43 -0000

Werner Koch <wk@gnupg.org> writes:

> On Fri,  7 Dec 2018 15:44, hanno@hboeck.de said:
>
>> I think it would be good if the WKD draft would be updated to clarify
>> that a client should never answer to any 401 authentication requests
>> from the server.
>
> Is this okay:
>
>   A client MUST not accept a HTTP authentication challenge (HTTP code

You should capitalize this as "MUST NOT" (and not "MUST not").

>   401) because the information in the Web Key Directory is public and
>   needs no authentication.  Allowing an authentication challenge has the
>   problem to easily confuse a user with a password prompt and tricking
>   him into falsely entering the passphrase used to protect his private
>   key or to login to his mail provider.
>   
>
>
> Shalom-Salam,
>
>    Werner

-derek

-- 
       Derek Atkins                 617-623-3745
       derek@ihtfp.com             www.ihtfp.com
       Computer and Internet Security Consultant


From nobody Fri Dec 14 08:45:15 2018
Return-Path: <wk@gnupg.org>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2FC7C13114E for <openpgp@ietfa.amsl.com>; Fri, 14 Dec 2018 08:45:14 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7
X-Spam-Level: 
X-Spam-Status: No, score=-7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9,  DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=gnupg.org
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DZ5K37nY3Z-H for <openpgp@ietfa.amsl.com>; Fri, 14 Dec 2018 08:45:11 -0800 (PST)
Received: from kerckhoffs.g10code.com (kerckhoffs.g10code.com [IPv6:2001:aa8:fff1:100::22]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5852013114B for <openpgp@ietf.org>; Fri, 14 Dec 2018 08:45:11 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=gnupg.org;  s=20181017; h=Content-Type:MIME-Version:Message-ID:In-Reply-To:Date: References:Subject:Cc:To:From:Sender:Reply-To:Content-Transfer-Encoding: Content-ID:Content-Description:Resent-Date:Resent-From:Resent-Sender: Resent-To:Resent-Cc:Resent-Message-ID:List-Id:List-Help:List-Unsubscribe: List-Subscribe:List-Post:List-Owner:List-Archive; bh=eqeLKGNaG+RKbnH+ZiDbfMoswmxwqThvr9mn6ip/YRU=; b=JsrgTzvZjejdeMrtp99cYS2Bkl 2FuKSdyMSMuTBgtW4+6dbV75T9p7eigj5nw4ZuW152qKzJ5aeJfjxMpUsHCtdX60PZ1bFP0DBQRIa Je48U7SrM1zoPwO8YKUSb9mtju2DrqbEnZj3fUDC6jtZ1ujerA65oHiX2mXEVF/NMR08=;
Received: from uucp by kerckhoffs.g10code.com with local-rmail (Exim 4.89 #1 (Debian)) id 1gXqaL-0004Th-KY for <openpgp@ietf.org>; Fri, 14 Dec 2018 17:45:09 +0100
Received: from wk by wheatstone.g10code.de with local (Exim 4.84 #3 (Debian)) id 1gXqWD-0007bF-6s; Fri, 14 Dec 2018 17:40:53 +0100
From: Werner Koch <wk@gnupg.org>
To: Derek Atkins <derek@ihtfp.com>
Cc: Hanno =?utf-8?Q?B=C3=B6ck?= <hanno@hboeck.de>,  openpgp@ietf.org
References: <20181207154441.41b02dc3@computer> <877egcfpl5.fsf@wheatstone.g10code.de> <sjm1s6kxkmm.fsf@securerf.ihtfp.org>
Organisation: GnuPG e.V.
X-message-flag: Mails containing HTML will not be read! Please send only plain text.
Mail-Followup-To: Derek Atkins <derek@ihtfp.com>, Hanno =?utf-8?Q?B=C3=B6c?= =?utf-8?Q?k?= <hanno@hboeck.de>, openpgp@ietf.org
Date: Fri, 14 Dec 2018 17:40:43 +0100
In-Reply-To: <sjm1s6kxkmm.fsf@securerf.ihtfp.org> (Derek Atkins's message of "Fri, 14 Dec 2018 09:12:33 -0500")
Message-ID: <87tvjgcb90.fsf@wheatstone.g10code.de>
User-Agent: Gnus/5.13 (Gnus v5.13)
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=SRI_lynch_Aladdin_Medco_USDOJ_Crowell_quiche_broadside_covert_video="; micalg=pgp-sha256; protocol="application/pgp-signature"
Archived-At: <https://mailarchive.ietf.org/arch/msg/openpgp/F-6UxQD7NUGf_Q81GHlDMx-x4J8>
Subject: Re: [openpgp] Enigmail XSA issue with WKD and HTTP authentication
X-BeenThere: openpgp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/openpgp>, <mailto:openpgp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/openpgp/>
List-Post: <mailto:openpgp@ietf.org>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/openpgp>, <mailto:openpgp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 Dec 2018 16:45:14 -0000

--=SRI_lynch_Aladdin_Medco_USDOJ_Crowell_quiche_broadside_covert_video=
Content-Type: text/plain
Content-Transfer-Encoding: quoted-printable

On Fri, 14 Dec 2018 15:12, derek@ihtfp.com said:

>>   A client MUST not accept a HTTP authentication challenge (HTTP code
>
> You should capitalize this as "MUST NOT" (and not "MUST not").

Right.  I always have to fix up these.


Salam-Shalom,

   Werner

=2D-=20
Die Gedanken sind frei.  Ausnahmen regelt ein Bundesgesetz.

--=SRI_lynch_Aladdin_Medco_USDOJ_Crowell_quiche_broadside_covert_video=
Content-Type: application/pgp-signature

-----BEGIN PGP SIGNATURE-----

iHUEARYIAB0WIQTX/8BjtAoilLlm20f/gK6dHew1jQUCXBPdCwAKCRD/gK6dHew1
jYrdAP97mjyNkVsR0fR94yakKR/Sfq2c04hJ39+JXv45D6Ws7wEAyIQCCSn3a9Fz
Nby49fej62mCtfdhOgqFunjq9tWI4A8=
=40Op
-----END PGP SIGNATURE-----
--=SRI_lynch_Aladdin_Medco_USDOJ_Crowell_quiche_broadside_covert_video=--


From nobody Fri Dec 14 15:13:31 2018
Return-Path: <dkg@fifthhorseman.net>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EAD54131354 for <openpgp@ietfa.amsl.com>; Fri, 14 Dec 2018 15:13:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.889
X-Spam-Level: 
X-Spam-Status: No, score=-1.889 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_SPF_PERMERROR=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pX9TAg62JF97 for <openpgp@ietfa.amsl.com>; Fri, 14 Dec 2018 15:13:28 -0800 (PST)
Received: from che.mayfirst.org (che.mayfirst.org [IPv6:2001:470:1:116::7]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2BE9B131342 for <openpgp@ietf.org>; Fri, 14 Dec 2018 15:13:28 -0800 (PST)
Received: from fifthhorseman.net (unknown [38.109.115.130]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by che.mayfirst.org (Postfix) with ESMTPSA id 098BCF99D; Fri, 14 Dec 2018 18:13:26 -0500 (EST)
Received: by fifthhorseman.net (Postfix, from userid 1000) id 569802055A; Fri, 14 Dec 2018 17:59:52 -0500 (EST)
From: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
To: Werner Koch <wk@gnupg.org>, Hanno =?utf-8?Q?B=C3=B6ck?= <hanno@hboeck.de>
Cc: openpgp@ietf.org
In-Reply-To: <877egcfpl5.fsf@wheatstone.g10code.de>
References: <20181207154441.41b02dc3@computer> <877egcfpl5.fsf@wheatstone.g10code.de>
Date: Fri, 14 Dec 2018 17:59:52 -0500
Message-ID: <871s6j3eaf.fsf@fifthhorseman.net>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/openpgp/Mace4pKvbJCHk25wwanluIUniak>
Subject: Re: [openpgp] Enigmail XSA issue with WKD and HTTP authentication
X-BeenThere: openpgp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/openpgp>, <mailto:openpgp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/openpgp/>
List-Post: <mailto:openpgp@ietf.org>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/openpgp>, <mailto:openpgp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 Dec 2018 23:13:30 -0000

On Fri 2018-12-14 10:02:46 +0100, Werner Koch wrote:
> On Fri,  7 Dec 2018 15:44, hanno@hboeck.de said:
>
>> I think it would be good if the WKD draft would be updated to clarify
>> that a client should never answer to any 401 authentication requests
>> from the server.
>
> Is this okay:
>
>   A client MUST not accept a HTTP authentication challenge (HTTP code
>   401) because the information in the Web Key Directory is public and
>   needs no authentication.  Allowing an authentication challenge has the
>   problem to easily confuse a user with a password prompt and tricking
>   him into falsely entering the passphrase used to protect his private
>   key or to login to his mail provider.

The explanation and justification part here is very clear, and i agree
it should be included.  But is "accept an HTTP authentication challenge"
the same thing as "make an HTTP authentication prompt visible to the
user" ?

how about something more like "a WKD client MUST treat an HTTP response
code 401 the same way it treats a 404…"

   --dkg

