
From nobody Mon Aug  1 02:17:29 2016
Return-Path: <blaker@gmail.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1741C12D5CF for <spasm@ietfa.amsl.com>; Mon,  1 Aug 2016 02:17:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level: 
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KqK1oCX69NY2 for <spasm@ietfa.amsl.com>; Mon,  1 Aug 2016 02:17:25 -0700 (PDT)
Received: from mail-wm0-x22a.google.com (mail-wm0-x22a.google.com [IPv6:2a00:1450:400c:c09::22a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4AEB812D590 for <spasm@ietf.org>; Mon,  1 Aug 2016 02:16:57 -0700 (PDT)
Received: by mail-wm0-x22a.google.com with SMTP id i5so234408070wmg.0 for <spasm@ietf.org>; Mon, 01 Aug 2016 02:16:57 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=g+3+smZ5SSimz662ZVebQ4oV4VEloPwgRZOTpynV8NQ=; b=gkKTBuW9zoyykH1M4rpoF6ziYdX1sdpX+e/gnBf74yyRuO8Srw7nfscLNlppfJWyL/ ccRKJYvWAAzNeaO8Q8ycO/znx6pyEY4OpFe9UOSkPOyQSkgtftnnssb4nDU5cCjnEE53 YvV0zudsUPfQUGWn7KtdbFn96KCgD3pTJ6xcRpp2dCF2DVt3BRfx+Ha+kpJ5tWRCnQ/1 JeXtL4IZyUXtNBmeSMDP2VKlwgUpHJC7TEU4lQTbH1Uy31bsHmsORxAR0GfqCvlDfQsD 2uBEqTGgONRkRhCdNncYRa8IfuSSQ3MlA7Kq7Mf8JwCaqp3+jScz/A1f3DNNe70VRjpW p50A==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=g+3+smZ5SSimz662ZVebQ4oV4VEloPwgRZOTpynV8NQ=; b=QHH7EyvmcF9m3CTj4pe/grR00gaFnmE1XbDOqxgXyD00tom4NTHGxrPNB6aPsayjik PT1N1hITQjvhH2MKKDx2OAJSgs4xXa1UOU1QDaruY8TB4x+vHU0O2bmSfVjtN6s+8Isw etP+V6OyRKUkf5pr6sdoO3VUMuuepyEDpnpOYfWcoQpu1t++BLAEHnlm3XAV056f+1QZ Aopj7PvF2dcexLKAK1MM+A6zxFYw8oz0a90eXL3NBu4dgrVEzlZYyedgxFabj2aulZwC ga2z1zvVj9Gbp5bh/xMzaBZnq/l5CCkQXr3bgUFazOo3nDCPGSbvIM53ulTF3P9R+7Ns JGug==
X-Gm-Message-State: AEkoousPjtWs4zHd6hKXdnAM4tFrNX9fSONHhUV6g7bK6+gec+fGnxKwDseEXnLuO2NNqt84/oXdY+SYjPxGCQ==
X-Received: by 10.28.225.4 with SMTP id y4mr56065007wmg.98.1470043015639; Mon, 01 Aug 2016 02:16:55 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.194.59.35 with HTTP; Mon, 1 Aug 2016 02:16:54 -0700 (PDT)
Received: by 10.194.59.35 with HTTP; Mon, 1 Aug 2016 02:16:54 -0700 (PDT)
In-Reply-To: <011a01d1ebba$c98eabf0$5cac03d0$@augustcellars.com>
References: <011a01d1ebba$c98eabf0$5cac03d0$@augustcellars.com>
From: Blake Ramsdell <blaker@gmail.com>
Date: Mon, 1 Aug 2016 02:16:54 -0700
Message-ID: <CAB=JzvF=qZFHqQndzyHXV8DxnfkRH_tW8Pa0kRG3s3jEgoHRXQ@mail.gmail.com>
To: Jim Schaad <ietf@augustcellars.com>
Content-Type: multipart/alternative; boundary=001a114b110cc077700538ff0ff5
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/QTpCAmpCxZ1B58zomClIvJHoZGo>
Cc: SPASM <spasm@ietf.org>
Subject: Re: [Spasm] Change of Algorithms: Signature Algorithms
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 01 Aug 2016 09:17:27 -0000

--001a114b110cc077700538ff0ff5
Content-Type: text/plain; charset=UTF-8

On Jul 31, 2016 11:06 PM, "Jim Schaad" <ietf@augustcellars.com> wrote:
> Proposed for S/MIME 3.5
>
> MUST: RSA-PSS w/ SHA-256, ECDSA P-256 w/ SHA-256, EdDSA25519

Why are there three MUST algorithms?

--001a114b110cc077700538ff0ff5
Content-Type: text/html; charset=UTF-8

<p dir="ltr">On Jul 31, 2016 11:06 PM, &quot;Jim Schaad&quot; &lt;<a href="mailto:ietf@augustcellars.com">ietf@augustcellars.com</a>&gt; wrote:<br>
&gt; Proposed for S/MIME 3.5<br>
&gt;<br>
&gt; MUST: RSA-PSS w/ SHA-256, ECDSA P-256 w/ SHA-256, EdDSA25519</p>
<p dir="ltr">Why are there three MUST algorithms?</p>

--001a114b110cc077700538ff0ff5--


From nobody Mon Aug  1 07:14:03 2016
Return-Path: <santosh.chokhani@gmail.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 75AA012D782 for <spasm@ietfa.amsl.com>; Mon,  1 Aug 2016 07:14:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.7
X-Spam-Level: 
X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id c7y8IGLYUJXS for <spasm@ietfa.amsl.com>; Mon,  1 Aug 2016 07:13:57 -0700 (PDT)
Received: from mail-qk0-x230.google.com (mail-qk0-x230.google.com [IPv6:2607:f8b0:400d:c09::230]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 17A8012D8AF for <spasm@ietf.org>; Mon,  1 Aug 2016 07:13:55 -0700 (PDT)
Received: by mail-qk0-x230.google.com with SMTP id p74so146237535qka.0 for <spasm@ietf.org>; Mon, 01 Aug 2016 07:13:55 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=from:to:references:in-reply-to:subject:date:message-id:mime-version :content-transfer-encoding:thread-index:content-language; bh=xelpH7CZNsONMmJL2/UBW9zPVpay7HNjjwLnBnFCtzE=; b=Opc8DjEYGdocv6YB0KHvM8QJ4ZdUjeVDlbt7r+L4roOYjoBO4O0EZjhr4oK74fb6g4 5f+p64/1+N9x2aB7KDw6yq+eA7/WC8pATk6E0rbs6u7xdB//MtyvJMZFRphSBcch91ga 59G2PGWmI4V8hYCu6LsLoOOyHk2d6RmOY3oQjAFgOQr9WIa/jZKGEmoGBwwv0PT4O2De O4kII5BxfunYpABHMvezG2DgsKwhpECfjHILQITYi7aZMkvMOGktqIIjhCS7sqdUXt0z O3de8z3uyEAf0rjvO/MMeAfHSJRoHP71bcMrm3ecUF34tz0yhkJBAlBneAu9Mal0nesK bjtg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:from:to:references:in-reply-to:subject:date :message-id:mime-version:content-transfer-encoding:thread-index :content-language; bh=xelpH7CZNsONMmJL2/UBW9zPVpay7HNjjwLnBnFCtzE=; b=hn0EuicmqCrK4usO+4cyWrmJShZKYFj39e9HYq4ovCQAchT+dgi7HLhabpY5pHxv+A ulmuCpSslT/Mg1Xt/I4qzXos5MMbtrLQL+9mbXB7M5lz5IsUDqNr1K37YUBuYb4cz/9Y cppa63ePfBHV/bqDlWx/Qt85D1kJERS7Zx6qg4jfWAC+Pp0SQ2YmDJOkDvu33+fk1oOc tCJbWVU2S27pe4Kq3FH9s6cnIaR6tMTqrh5hYFcjX6IsFhjL0DRfTLOd0SeqNnKPDYy1 c842yYfZcrELydTeoXYliBd318ooXst2jaQqr3lForqkT7MVqqCSNEyltuOVNVDg0leB KAlA==
X-Gm-Message-State: AEkoouv8zliCj2X77hVId6ZhS9GGiszl0Y+EVghF8JspR8cOUPqDMdWg/2HJPKC9Nt4Gpg==
X-Received: by 10.55.162.138 with SMTP id l132mr64798848qke.85.1470060834211;  Mon, 01 Aug 2016 07:13:54 -0700 (PDT)
Received: from SantoshBrain (pool-173-73-91-110.washdc.fios.verizon.net. [173.73.91.110]) by smtp.gmail.com with ESMTPSA id i192sm17720269qke.5.2016.08.01.07.13.53 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Mon, 01 Aug 2016 07:13:53 -0700 (PDT)
From: "Santosh Chokhani" <santosh.chokhani@gmail.com>
To: "'Jim Schaad'" <ietf@augustcellars.com>, "'SPASM'" <spasm@ietf.org>
References: <011a01d1ebba$c98eabf0$5cac03d0$@augustcellars.com>
In-Reply-To: <011a01d1ebba$c98eabf0$5cac03d0$@augustcellars.com>
Date: Mon, 1 Aug 2016 10:14:00 -0400
Message-ID: <007f01d1ebfe$f3b549e0$db1fdda0$@gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Outlook 15.0
Thread-Index: AQGtkLMQJwATQMXJYsph6EImpvGC/aB82snw
Content-Language: en-us
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/mlLzos1cB0mU-CbbyhoEpjBpm_k>
Subject: Re: [Spasm] Change of Algorithms: Signature Algorithms
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 01 Aug 2016 14:14:02 -0000

Jim,

For S/MIME 3.5 is SHA 256 with P521 intentional or typo?

-----Original Message-----
From: Spasm [mailto:spasm-bounces@ietf.org] On Behalf Of Jim Schaad
Sent: Monday, August 1, 2016 2:06 AM
To: 'SPASM' <spasm@ietf.org>
Subject: [Spasm] Change of Algorithms: Signature Algorithms

This message looks at Signature Algorithms.  Please restrict your
discussions to this set of algorithms, I will be sending out messages on
other algorithms over time.

Current Document for S/MIME 3.1

MUST:   RSA w/ SHA-256
SHOULD+:  DSA w/ SHA-256, RSASSA-PSS w/ SHA-256
SHOULD-:  RSA w/ SHA-1, DSA w/SHA-1, RSA w/ MD5
Historic:

Key Sizes:
RSA and DSA - sign
SHOULD NOT            Key size <= 1023
SHOULD      1024 <= key size <= 2048
MAY            2048 < key size   

RSA and DSA - Verify
MAY                key size <= 1023
MUST      1024 <= key size <= 2048
MAY        2048 < key size

RSA - Certificate Verify
MAY             key size <= 1023
MUST  1024 <= key size <= 4096
MAY      4096  < key size

DSA - Certificate Verify
MAY             key size <= 1023
MUST    1024 <= key size <= 3072



Proposed for S/MIME 3.5

MUST: RSA-PSS w/ SHA-256, ECDSA P-256 w/ SHA-256, EdDSA25519
MUST-: RSA w/ SHA-256
SHOULD+:
SHOULD:  RSA-PSS w/ SHA-512, ECDSA P-521 w/ SHA-256, EdDSA448
SHOULD-: DSA w/ SHA-256
Historic: RSA w/ SHA-1, DSA w/ SHA-1, RSA w/ MD5

Key Sizes:
RSA and DSA - sign
SHOULD NOT            Key size <= 2048
SHOULD      2048 <= key size <= 4096
MAY             4096 < key size   

RSA and DSA - Verify
MAY                key size <= 2048
MUST      2048 <= key size <= 4096
MAY        4096 < key size

RSA - Certificate Verify
MAY             key size <= 2048
MUST  2048 <= key size <= 4096
MAY      4096  < key size

DSA - Certificate Verify
MAY             key size <= 1023
MUST   1024 <= key size <= 3072


Questions:

1.  Should DSA be dropped to historic for messages and just left as SHOULD-
for certificates, I don't know how many DSA certificates actually exist.

2. I have changed to lower limits on RSA but not DSA for certificate
verification - should it be changed as well?  Again I don't know how many
DSA certificates exist.

3.  I don't think that any statements for ECDSA on key size need to be made
separately from the algorithm support list.  Does any body disagree?

Jim


_______________________________________________
Spasm mailing list
Spasm@ietf.org
https://www.ietf.org/mailman/listinfo/spasm


From nobody Mon Aug  1 08:23:09 2016
Return-Path: <ietf@augustcellars.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5BB8912DC53 for <spasm@ietfa.amsl.com>; Mon,  1 Aug 2016 08:23:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.187
X-Spam-Level: 
X-Spam-Status: No, score=-3.187 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RP_MATCHES_RCVD=-1.287, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id F0dbfshXz6F7 for <spasm@ietfa.amsl.com>; Mon,  1 Aug 2016 08:23:05 -0700 (PDT)
Received: from mail2.augustcellars.com (augustcellars.com [50.45.239.150]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 75E6112DC2E for <spasm@ietf.org>; Mon,  1 Aug 2016 08:23:05 -0700 (PDT)
Received: from hebrews (24.21.96.37) by mail2.augustcellars.com (192.168.0.56) with Microsoft SMTP Server (TLS) id 15.0.1178.4; Mon, 1 Aug 2016 08:29:08 -0700
From: Jim Schaad <ietf@augustcellars.com>
To: 'Blake Ramsdell' <blaker@gmail.com>
References: <011a01d1ebba$c98eabf0$5cac03d0$@augustcellars.com> <CAB=JzvF=qZFHqQndzyHXV8DxnfkRH_tW8Pa0kRG3s3jEgoHRXQ@mail.gmail.com>
In-Reply-To: <CAB=JzvF=qZFHqQndzyHXV8DxnfkRH_tW8Pa0kRG3s3jEgoHRXQ@mail.gmail.com>
Date: Mon, 1 Aug 2016 08:22:55 -0700
Message-ID: <01bb01d1ec08$94d0a410$be71ec30$@augustcellars.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_01BC_01D1EBCD.E8726850"
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQGtkLMQJwATQMXJYsph6EImpvGC/QKQim/5oGhrLkA=
Content-Language: en-us
X-Originating-IP: [24.21.96.37]
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/ZOmjsmlO-m82LAL-HLdUuncV4Ho>
Cc: 'SPASM' <spasm@ietf.org>
Subject: Re: [Spasm] Change of Algorithms: Signature Algorithms
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 01 Aug 2016 15:23:07 -0000

------=_NextPart_000_01BC_01D1EBCD.E8726850
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Can=E2=80=99t really get rid of RSA as a signature algorithm.

Need the P-256 algorithm for the world of NIST

Need EdDSA for the world of NIST is not to be trusted.

=20

Jim

=20

=20

From: Spasm [mailto:spasm-bounces@ietf.org] On Behalf Of Blake Ramsdell
Sent: Monday, August 01, 2016 2:17 AM
To: Jim Schaad <ietf@augustcellars.com>
Cc: SPASM <spasm@ietf.org>
Subject: Re: [Spasm] Change of Algorithms: Signature Algorithms

=20

On Jul 31, 2016 11:06 PM, "Jim Schaad" <ietf@augustcellars.com =
<mailto:ietf@augustcellars.com> > wrote:
> Proposed for S/MIME 3.5
>
> MUST: RSA-PSS w/ SHA-256, ECDSA P-256 w/ SHA-256, EdDSA25519

Why are there three MUST algorithms?


------=_NextPart_000_01BC_01D1EBCD.E8726850
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" =
xmlns=3D"http://www.w3.org/TR/REC-html40"><head><meta =
http-equiv=3DContent-Type content=3D"text/html; charset=3Dutf-8"><meta =
name=3DGenerator content=3D"Microsoft Word 15 (filtered =
medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman",serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p
	{mso-style-priority:99;
	mso-margin-top-alt:auto;
	margin-right:0in;
	mso-margin-bottom-alt:auto;
	margin-left:0in;
	font-size:12.0pt;
	font-family:"Times New Roman",serif;}
p.msonormal0, li.msonormal0, div.msonormal0
	{mso-style-name:msonormal;
	mso-margin-top-alt:auto;
	margin-right:0in;
	mso-margin-bottom-alt:auto;
	margin-left:0in;
	font-size:12.0pt;
	font-family:"Times New Roman",serif;}
span.EmailStyle19
	{mso-style-type:personal-reply;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri",sans-serif;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US link=3Dblue =
vlink=3Dpurple><div class=3DWordSection1><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>Can=E2=80=99t=
 really get rid of RSA as a signature algorithm.<o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>Need the =
P-256 algorithm for the world of NIST<o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>Need EdDSA =
for the world of NIST is not to be trusted.<o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'><o:p>&nbsp;</=
o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>Jim<o:p></o:p=
></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'><o:p>&nbsp;</=
o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'><o:p>&nbsp;</=
o:p></span></p><div style=3D'border:none;border-left:solid blue =
1.5pt;padding:0in 0in 0in 4.0pt'><div><div =
style=3D'border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in'><p class=3DMsoNormal><b><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>From:</span><=
/b><span style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'> =
Spasm [mailto:spasm-bounces@ietf.org] <b>On Behalf Of </b>Blake =
Ramsdell<br><b>Sent:</b> Monday, August 01, 2016 2:17 AM<br><b>To:</b> =
Jim Schaad &lt;ietf@augustcellars.com&gt;<br><b>Cc:</b> SPASM =
&lt;spasm@ietf.org&gt;<br><b>Subject:</b> Re: [Spasm] Change of =
Algorithms: Signature Algorithms<o:p></o:p></span></p></div></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p>On Jul 31, 2016 11:06 PM, =
&quot;Jim Schaad&quot; &lt;<a =
href=3D"mailto:ietf@augustcellars.com">ietf@augustcellars.com</a>&gt; =
wrote:<br>&gt; Proposed for S/MIME 3.5<br>&gt;<br>&gt; MUST: RSA-PSS w/ =
SHA-256, ECDSA P-256 w/ SHA-256, EdDSA25519<o:p></o:p></p><p>Why are =
there three MUST algorithms?<o:p></o:p></p></div></div></body></html>
------=_NextPart_000_01BC_01D1EBCD.E8726850--


From nobody Mon Aug  1 08:23:56 2016
Return-Path: <ietf@augustcellars.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 873EC12DC41 for <spasm@ietfa.amsl.com>; Mon,  1 Aug 2016 08:23:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.188
X-Spam-Level: 
X-Spam-Status: No, score=-3.188 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-1.287, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iwxGPPwTXfaz for <spasm@ietfa.amsl.com>; Mon,  1 Aug 2016 08:23:53 -0700 (PDT)
Received: from mail2.augustcellars.com (augustcellars.com [50.45.239.150]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C871112DC2E for <spasm@ietf.org>; Mon,  1 Aug 2016 08:23:52 -0700 (PDT)
Received: from hebrews (24.21.96.37) by mail2.augustcellars.com (192.168.0.56) with Microsoft SMTP Server (TLS) id 15.0.1178.4; Mon, 1 Aug 2016 08:30:01 -0700
From: Jim Schaad <ietf@augustcellars.com>
To: 'Santosh Chokhani' <santosh.chokhani@gmail.com>, 'SPASM' <spasm@ietf.org>
References: <011a01d1ebba$c98eabf0$5cac03d0$@augustcellars.com> <007f01d1ebfe$f3b549e0$db1fdda0$@gmail.com>
In-Reply-To: <007f01d1ebfe$f3b549e0$db1fdda0$@gmail.com>
Date: Mon, 1 Aug 2016 08:23:48 -0700
Message-ID: <01c001d1ec08$b5054510$1f0fcf30$@augustcellars.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQGtkLMQJwATQMXJYsph6EImpvGC/QLJibHcoGajlTA=
Content-Language: en-us
X-Originating-IP: [24.21.96.37]
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/D1EEv2vV_4XZ_XwMy3Y5sAk33BQ>
Subject: Re: [Spasm] Change of Algorithms: Signature Algorithms
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 01 Aug 2016 15:23:54 -0000

Yes, it is a typo.  It should have been P521 w/ SHA 512.

jim

> -----Original Message-----
> From: Santosh Chokhani [mailto:santosh.chokhani@gmail.com]
> Sent: Monday, August 01, 2016 7:14 AM
> To: 'Jim Schaad' <ietf@augustcellars.com>; 'SPASM' <spasm@ietf.org>
> Subject: RE: [Spasm] Change of Algorithms: Signature Algorithms
> 
> Jim,
> 
> For S/MIME 3.5 is SHA 256 with P521 intentional or typo?
> 
> -----Original Message-----
> From: Spasm [mailto:spasm-bounces@ietf.org] On Behalf Of Jim Schaad
> Sent: Monday, August 1, 2016 2:06 AM
> To: 'SPASM' <spasm@ietf.org>
> Subject: [Spasm] Change of Algorithms: Signature Algorithms
> 
> This message looks at Signature Algorithms.  Please restrict your
discussions to
> this set of algorithms, I will be sending out messages on other algorithms
over
> time.
> 
> Current Document for S/MIME 3.1
> 
> MUST:   RSA w/ SHA-256
> SHOULD+:  DSA w/ SHA-256, RSASSA-PSS w/ SHA-256
> SHOULD-:  RSA w/ SHA-1, DSA w/SHA-1, RSA w/ MD5
> Historic:
> 
> Key Sizes:
> RSA and DSA - sign
> SHOULD NOT            Key size <= 1023
> SHOULD      1024 <= key size <= 2048
> MAY            2048 < key size
> 
> RSA and DSA - Verify
> MAY                key size <= 1023
> MUST      1024 <= key size <= 2048
> MAY        2048 < key size
> 
> RSA - Certificate Verify
> MAY             key size <= 1023
> MUST  1024 <= key size <= 4096
> MAY      4096  < key size
> 
> DSA - Certificate Verify
> MAY             key size <= 1023
> MUST    1024 <= key size <= 3072
> 
> 
> 
> Proposed for S/MIME 3.5
> 
> MUST: RSA-PSS w/ SHA-256, ECDSA P-256 w/ SHA-256, EdDSA25519
> MUST-: RSA w/ SHA-256
> SHOULD+:
> SHOULD:  RSA-PSS w/ SHA-512, ECDSA P-521 w/ SHA-256, EdDSA448
> SHOULD-: DSA w/ SHA-256
> Historic: RSA w/ SHA-1, DSA w/ SHA-1, RSA w/ MD5
> 
> Key Sizes:
> RSA and DSA - sign
> SHOULD NOT            Key size <= 2048
> SHOULD      2048 <= key size <= 4096
> MAY             4096 < key size
> 
> RSA and DSA - Verify
> MAY                key size <= 2048
> MUST      2048 <= key size <= 4096
> MAY        4096 < key size
> 
> RSA - Certificate Verify
> MAY             key size <= 2048
> MUST  2048 <= key size <= 4096
> MAY      4096  < key size
> 
> DSA - Certificate Verify
> MAY             key size <= 1023
> MUST   1024 <= key size <= 3072
> 
> 
> Questions:
> 
> 1.  Should DSA be dropped to historic for messages and just left as
SHOULD- for
> certificates, I don't know how many DSA certificates actually exist.
> 
> 2. I have changed to lower limits on RSA but not DSA for certificate
verification -
> should it be changed as well?  Again I don't know how many DSA
certificates
> exist.
> 
> 3.  I don't think that any statements for ECDSA on key size need to be
made
> separately from the algorithm support list.  Does any body disagree?
> 
> Jim
> 
> 
> _______________________________________________
> Spasm mailing list
> Spasm@ietf.org
> https://www.ietf.org/mailman/listinfo/spasm


From nobody Mon Aug  1 10:03:56 2016
Return-Path: <housley@vigilsec.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BE68E12D0FF for <spasm@ietfa.amsl.com>; Mon,  1 Aug 2016 10:03:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.9
X-Spam-Level: 
X-Spam-Status: No, score=-101.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, USER_IN_WHITELIST=-100] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id m0bkNkx7FwXI for <spasm@ietfa.amsl.com>; Mon,  1 Aug 2016 10:03:53 -0700 (PDT)
Received: from mail.smeinc.net (mail.smeinc.net [209.135.209.11]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2390312D0E3 for <spasm@ietf.org>; Mon,  1 Aug 2016 10:03:53 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mail.smeinc.net (Postfix) with ESMTP id E6D5D300596 for <spasm@ietf.org>; Mon,  1 Aug 2016 13:03:50 -0400 (EDT)
X-Virus-Scanned: amavisd-new at mail.smeinc.net
Received: from mail.smeinc.net ([127.0.0.1]) by localhost (mail.smeinc.net [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id BJvY7aanubc9 for <spasm@ietf.org>; Mon,  1 Aug 2016 13:03:49 -0400 (EDT)
Received: from [192.168.1.28] (nc-71-50-129-15.dyn.embarqhsd.net [71.50.129.15]) by mail.smeinc.net (Postfix) with ESMTPSA id 813ED300265; Mon,  1 Aug 2016 13:03:49 -0400 (EDT)
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 7.3 \(1878.6\))
From: Russ Housley <housley@vigilsec.com>
In-Reply-To: <011101d1ebb2$442449f0$cc6cddd0$@augustcellars.com>
Date: Mon, 1 Aug 2016 13:03:49 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <D8B236B1-696C-47ED-A642-398DDD2B9564@vigilsec.com>
References: <011101d1ebb2$442449f0$cc6cddd0$@augustcellars.com>
To: Jim Schaad <ietf@augustcellars.com>
X-Mailer: Apple Mail (2.1878.6)
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/_XNqfffe49ttjHTJakPFJexhccc>
Cc: SPASM <spasm@ietf.org>
Subject: Re: [Spasm] Change of Algorithms: Content Encryption Algorithms
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 01 Aug 2016 17:03:55 -0000

Jim:

In my view, AES-192 should not be included in the MUST or SHOULD =
statements.  We should be silent about it, which means that it MAY be =
implemented.

Further, I think that AES-128 CBC MUST be implemented, to provide a =
point of transition for 3.1 to 3.5.

Russ


On Aug 1, 2016, at 1:05 AM, Jim Schaad <ietf@augustcellars.com> wrote:

> I am not back onto a normal daylight schedule and have gotten through =
a
> couple of other documents so I am ready to start dealing with issues =
in the
> S/MIME documents.  So this is the first of a series of open issue =
messages
> that I will start dribbling out as things seem to come to a =
conclusion.
>=20
> This message looks at Content Encryption Algorithms.  Please restrict =
your
> discussions to this set of algorithms, I will be sending out messages =
on
> other algorithm times over time.
>=20
> Current Document for S/MIME 3.1
>=20
> MUST: AES-128 CBC
> SHOULD+: AES-192 CBC and AES-256 CBC
> SHOULD-: DES EDE3 CBC (tripleDES)
> Historic: RC2/40
>=20
> Proposed for S/MIME 3.5
>=20
> MUST:  AES-192 CBC, AES-256 CBC, AES-256 GCM
> SHOULD+: ChaCha20/Poly1305 (256-bit)
> SHOULD-: AES-128 CBC
> Historic: RC2/40, DES EDE3 CBC (tripleDES)
>=20
> Questions:
> 1.  The jump from MUST to SHOULD- may be too aggressive for AES-128 =
CBC, we
> should potentially state this as MUST- but I think being aggressive =
makes
> more sense as we want to go to all AEAD algorithms in next version.
>=20
> 2.  No recommendation for: AES-128 GCM or AES-192 GCM, should there =
be?  How
> do people feel about 128 and 192 bit algorithms?
>=20
> 3.  Do we want to downgrade all of the CBC algorithms in favor of GCM
> algorithms?
>=20
> Jim
>=20
>=20
>=20
>=20
> _______________________________________________
> Spasm mailing list
> Spasm@ietf.org
> https://www.ietf.org/mailman/listinfo/spasm


From nobody Mon Aug  1 10:41:41 2016
Return-Path: <mcr@sandelman.ca>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C86B012DB5B for <spasm@ietfa.amsl.com>; Mon,  1 Aug 2016 10:41:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.187
X-Spam-Level: 
X-Spam-Status: No, score=-3.187 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RP_MATCHES_RCVD=-1.287, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WMn31YCJ0hBC for <spasm@ietfa.amsl.com>; Mon,  1 Aug 2016 10:41:37 -0700 (PDT)
Received: from tuna.sandelman.ca (tuna.sandelman.ca [209.87.249.19]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 889D812B018 for <spasm@ietf.org>; Mon,  1 Aug 2016 10:41:37 -0700 (PDT)
Received: from [10.158.17.221] (unknown [199.119.233.156]) by tuna.sandelman.ca (Postfix) with ESMTPSA id A5EDF200A3; Mon,  1 Aug 2016 13:51:47 -0400 (EDT)
User-Agent: K-9 Mail for Android
In-Reply-To: <D8B236B1-696C-47ED-A642-398DDD2B9564@vigilsec.com>
References: <011101d1ebb2$442449f0$cc6cddd0$@augustcellars.com> <D8B236B1-696C-47ED-A642-398DDD2B9564@vigilsec.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----MRNOGJ2SWNMUOYMX19NQSHN54MW7P8"
Content-Transfer-Encoding: 8bit
From: Michael Richardson <mcr@sandelman.ca>
Date: Mon, 01 Aug 2016 13:41:26 -0400
To: Russ Housley <housley@vigilsec.com>,Jim Schaad <ietf@augustcellars.com>
Message-ID: <4D5AFDDA-C1C8-460F-90D3-A45A0E84F7C6@sandelman.ca>
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/CxG8ZXKx4B6cz_9QZ9sQmLjR-F0>
Cc: SPASM <spasm@ietf.org>
Subject: Re: [Spasm] Change of Algorithms: Content Encryption Algorithms
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 01 Aug 2016 17:41:40 -0000

------MRNOGJ2SWNMUOYMX19NQSHN54MW7P8
Content-Transfer-Encoding: 8bit
Content-Type: text/plain;
 charset=UTF-8

why do you say that AES192 is not an interesting algorithm in the progress towards support of stronger algs? not worth the step,  market confusion... 

On 1 August 2016 13:03:49 GMT-04:00, Russ Housley <housley@vigilsec.com> wrote:
>Jim:
>
>In my view, AES-192 should not be included in the MUST or SHOULD
>statements.  We should be silent about it, which means that it MAY be
>implemented.
>
>Further, I think that AES-128 CBC MUST be implemented, to provide a
>point of transition for 3.1 to 3.5.
>
>Russ
>
>
>On Aug 1, 2016, at 1:05 AM, Jim Schaad <ietf@augustcellars.com> wrote:
>
>> I am not back onto a normal daylight schedule and have gotten through
>a
>> couple of other documents so I am ready to start dealing with issues
>in the
>> S/MIME documents.  So this is the first of a series of open issue
>messages
>> that I will start dribbling out as things seem to come to a
>conclusion.
>> 
>> This message looks at Content Encryption Algorithms.  Please restrict
>your
>> discussions to this set of algorithms, I will be sending out messages
>on
>> other algorithm times over time.
>> 
>> Current Document for S/MIME 3.1
>> 
>> MUST: AES-128 CBC
>> SHOULD+: AES-192 CBC and AES-256 CBC
>> SHOULD-: DES EDE3 CBC (tripleDES)
>> Historic: RC2/40
>> 
>> Proposed for S/MIME 3.5
>> 
>> MUST:  AES-192 CBC, AES-256 CBC, AES-256 GCM
>> SHOULD+: ChaCha20/Poly1305 (256-bit)
>> SHOULD-: AES-128 CBC
>> Historic: RC2/40, DES EDE3 CBC (tripleDES)
>> 
>> Questions:
>> 1.  The jump from MUST to SHOULD- may be too aggressive for AES-128
>CBC, we
>> should potentially state this as MUST- but I think being aggressive
>makes
>> more sense as we want to go to all AEAD algorithms in next version.
>> 
>> 2.  No recommendation for: AES-128 GCM or AES-192 GCM, should there
>be?  How
>> do people feel about 128 and 192 bit algorithms?
>> 
>> 3.  Do we want to downgrade all of the CBC algorithms in favor of GCM
>> algorithms?
>> 
>> Jim
>> 
>> 
>> 
>> 
>> _______________________________________________
>> Spasm mailing list
>> Spasm@ietf.org
>> https://www.ietf.org/mailman/listinfo/spasm
>
>_______________________________________________
>Spasm mailing list
>Spasm@ietf.org
>https://www.ietf.org/mailman/listinfo/spasm

-- 
Sent from my Android device with K-9 Mail. Please excuse my brevity.
------MRNOGJ2SWNMUOYMX19NQSHN54MW7P8
Content-Type: text/html;
 charset=utf-8
Content-Transfer-Encoding: 8bit

<html><head></head><body>why do you say that AES192 is not an interesting algorithm in the progress towards support of stronger algs? not worth the step,  market confusion... <br><br><div class="gmail_quote">On 1 August 2016 13:03:49 GMT-04:00, Russ Housley &lt;housley@vigilsec.com&gt; wrote:<blockquote class="gmail_quote" style="margin: 0pt 0pt 0pt 0.8ex; border-left: 1px solid rgb(204, 204, 204); padding-left: 1ex;">
<pre class="k9mail">Jim:<br /><br />In my view, AES-192 should not be included in the MUST or SHOULD statements.  We should be silent about it, which means that it MAY be implemented.<br /><br />Further, I think that AES-128 CBC MUST be implemented, to provide a point of transition for 3.1 to 3.5.<br /><br />Russ<br /><br /><br />On Aug 1, 2016, at 1:05 AM, Jim Schaad &lt;ietf@augustcellars.com&gt; wrote:<br /><br /><blockquote class="gmail_quote" style="margin: 0pt 0pt 1ex 0.8ex; border-left: 1px solid #729fcf; padding-left: 1ex;"> I am not back onto a normal daylight schedule and have gotten through a<br /> couple of other documents so I am ready to start dealing with issues in the<br /> S/MIME documents.  So this is the first of a series of open issue messages<br /> that I will start dribbling out as things seem to come to a conclusion.<br /> <br /> This message looks at Content Encryption Algorithms.  Please restrict your<br /> discussions to this set of algorithms, I will be
sending out messages on<br /> other algorithm times over time.<br /> <br /> Current Document for S/MIME 3.1<br /> <br /> MUST: AES-128 CBC<br /> SHOULD+: AES-192 CBC and AES-256 CBC<br /> SHOULD-: DES EDE3 CBC (tripleDES)<br /> Historic: RC2/40<br /> <br /> Proposed for S/MIME 3.5<br /> <br /> MUST:  AES-192 CBC, AES-256 CBC, AES-256 GCM<br /> SHOULD+: ChaCha20/Poly1305 (256-bit)<br /> SHOULD-: AES-128 CBC<br /> Historic: RC2/40, DES EDE3 CBC (tripleDES)<br /> <br /> Questions:<br /> 1.  The jump from MUST to SHOULD- may be too aggressive for AES-128 CBC, we<br /> should potentially state this as MUST- but I think being aggressive makes<br /> more sense as we want to go to all AEAD algorithms in next version.<br /> <br /> 2.  No recommendation for: AES-128 GCM or AES-192 GCM, should there be?  How<br /> do people feel about 128 and 192 bit algorithms?<br /> <br /> 3.  Do we want to downgrade all of the CBC algorithms in favor of GCM<br /> algorithms?<br /> <br /> Jim<br /> <br />
<br /> <br /> <br /><hr /><br /> Spasm mailing list<br /> Spasm@ietf.org<br /> <a href="https://www.ietf.org/mailman/listinfo/spasm">https://www.ietf.org/mailman/listinfo/spasm</a><br /></blockquote><br /><hr /><br />Spasm mailing list<br />Spasm@ietf.org<br /><a href="https://www.ietf.org/mailman/listinfo/spasm">https://www.ietf.org/mailman/listinfo/spasm</a><br /></pre></blockquote></div><br>
-- <br>
Sent from my Android device with K-9 Mail. Please excuse my brevity.</body></html>
------MRNOGJ2SWNMUOYMX19NQSHN54MW7P8--


From nobody Mon Aug  1 10:56:02 2016
Return-Path: <ietf@augustcellars.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B19BA12D755 for <spasm@ietfa.amsl.com>; Mon,  1 Aug 2016 10:56:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.188
X-Spam-Level: 
X-Spam-Status: No, score=-3.188 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-1.287, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Rzz0yNY0Xu8v for <spasm@ietfa.amsl.com>; Mon,  1 Aug 2016 10:55:59 -0700 (PDT)
Received: from mail2.augustcellars.com (augustcellars.com [50.45.239.150]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9721512B018 for <spasm@ietf.org>; Mon,  1 Aug 2016 10:55:59 -0700 (PDT)
Received: from hebrews (24.21.96.37) by mail2.augustcellars.com (192.168.0.56) with Microsoft SMTP Server (TLS) id 15.0.1178.4; Mon, 1 Aug 2016 11:01:48 -0700
From: Jim Schaad <ietf@augustcellars.com>
To: 'Russ Housley' <housley@vigilsec.com>
References: <011101d1ebb2$442449f0$cc6cddd0$@augustcellars.com> <D8B236B1-696C-47ED-A642-398DDD2B9564@vigilsec.com>
In-Reply-To: <D8B236B1-696C-47ED-A642-398DDD2B9564@vigilsec.com>
Date: Mon, 1 Aug 2016 10:55:34 -0700
Message-ID: <01eb01d1ec1d$e8cdc060$ba694120$@augustcellars.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQIPrQ0rVM71b5yax3rKTP2+WC5mNAIeHAson6fwu7A=
Content-Language: en-us
X-Originating-IP: [24.21.96.37]
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/9bsyQVmzH2udHW3pf5z0-3Jpw58>
Cc: 'SPASM' <spasm@ietf.org>
Subject: Re: [Spasm] Change of Algorithms: Content Encryption Algorithms
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 01 Aug 2016 17:56:02 -0000

Would MUST- be reasonable for AES-128 CBC?

jim

> -----Original Message-----
> From: Russ Housley [mailto:housley@vigilsec.com]
> Sent: Monday, August 01, 2016 10:04 AM
> To: Jim Schaad <ietf@augustcellars.com>
> Cc: SPASM <spasm@ietf.org>
> Subject: Re: [Spasm] Change of Algorithms: Content Encryption Algorithms
> 
> Jim:
> 
> In my view, AES-192 should not be included in the MUST or SHOULD
statements.
> We should be silent about it, which means that it MAY be implemented.
> 
> Further, I think that AES-128 CBC MUST be implemented, to provide a point
of
> transition for 3.1 to 3.5.
> 
> Russ
> 
> 
> On Aug 1, 2016, at 1:05 AM, Jim Schaad <ietf@augustcellars.com> wrote:
> 
> > I am not back onto a normal daylight schedule and have gotten through
> > a couple of other documents so I am ready to start dealing with issues
> > in the S/MIME documents.  So this is the first of a series of open
> > issue messages that I will start dribbling out as things seem to come to
a
> conclusion.
> >
> > This message looks at Content Encryption Algorithms.  Please restrict
> > your discussions to this set of algorithms, I will be sending out
> > messages on other algorithm times over time.
> >
> > Current Document for S/MIME 3.1
> >
> > MUST: AES-128 CBC
> > SHOULD+: AES-192 CBC and AES-256 CBC
> > SHOULD-: DES EDE3 CBC (tripleDES)
> > Historic: RC2/40
> >
> > Proposed for S/MIME 3.5
> >
> > MUST:  AES-192 CBC, AES-256 CBC, AES-256 GCM
> > SHOULD+: ChaCha20/Poly1305 (256-bit)
> > SHOULD-: AES-128 CBC
> > Historic: RC2/40, DES EDE3 CBC (tripleDES)
> >
> > Questions:
> > 1.  The jump from MUST to SHOULD- may be too aggressive for AES-128
> > CBC, we should potentially state this as MUST- but I think being
> > aggressive makes more sense as we want to go to all AEAD algorithms in
next
> version.
> >
> > 2.  No recommendation for: AES-128 GCM or AES-192 GCM, should there
> > be?  How do people feel about 128 and 192 bit algorithms?
> >
> > 3.  Do we want to downgrade all of the CBC algorithms in favor of GCM
> > algorithms?
> >
> > Jim
> >
> >
> >
> >
> > _______________________________________________
> > Spasm mailing list
> > Spasm@ietf.org
> > https://www.ietf.org/mailman/listinfo/spasm



From nobody Mon Aug  1 11:21:14 2016
Return-Path: <blaker@gmail.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AECA212DD37 for <spasm@ietfa.amsl.com>; Mon,  1 Aug 2016 11:21:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.7
X-Spam-Level: 
X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id seyr1nKkiTIY for <spasm@ietfa.amsl.com>; Mon,  1 Aug 2016 11:21:11 -0700 (PDT)
Received: from mail-wm0-x233.google.com (mail-wm0-x233.google.com [IPv6:2a00:1450:400c:c09::233]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 02C7612DD38 for <spasm@ietf.org>; Mon,  1 Aug 2016 11:21:11 -0700 (PDT)
Received: by mail-wm0-x233.google.com with SMTP id f65so380347650wmi.0 for <spasm@ietf.org>; Mon, 01 Aug 2016 11:21:10 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=c33AJY/540LQs7HBpONyks/QjVdJsyQBP2tMgtzjhfI=; b=ajToO0hm84UU5M8RwfjN0dgDySxe2zw0su3BIm1kjUQ7J+BKYYxq6ubu0Cp4chfpQh 0X9JT+ehX2Z1Uy5LBLua59lIYqZw6PRRNXhL31qLG7AEPxDCTJ/9mKP+31A3wUbdy69q IYjcr4zojJu1KDHgoGC3EF9wSMW2B4O1MEJ5D5XsBdQMFaZUGB7tyn/oFYuEbCkX5pRc mdkFWP+bgKGUox9ymifTKAZryFmfmmZAddfscTphmZXhjzw1xvWGJnAIIlwaM9j3VXZL I8lvHqTfEC2PfoTGhllOqvVZylnnC0LZrFyhXBw+yYe+OIj+JkIysi6HTHI2n9c1mqRD g8wg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=c33AJY/540LQs7HBpONyks/QjVdJsyQBP2tMgtzjhfI=; b=TNEf5eQLK8spnZuO4b+Ug45VAxQ4r+7mNlLi/eFeQmfofZlhCHK1qRMr/AJAbXcDmW ug8ZFvHnqmSZ1EzeqbtIt4ncTFs06whNSzVwbPZmvhSvr6shE6psFkb1Gy4pAQU41ooe 0vEQQTlXb9Ezkk7CYS87HTCZ8XfVZ1WPY5ptL68qGvPP8pebu2amzau778rJN4X5gLAC DLEG4lgubGEcBWOjPtsyENy4n7f8GWOeoNdVKeKn/DrcziYR+bYGRZC27W6pfbqQSQ9D S87BXKoECfh9S3Ll+CLPDrdsKdIFdJwbvL7Hzq5E/dHINO9WNGS/ZddVJscld42502D1 AYNw==
X-Gm-Message-State: AEkooutVDSkLinyWW6xfKNKlWCkFGF15UsyDZhOmHJHQg16UV+0EGp6twXmE7M51ksXs6T+ADP/Ky3rjYIZF9w==
X-Received: by 10.28.222.8 with SMTP id v8mr15859912wmg.55.1470075669459; Mon, 01 Aug 2016 11:21:09 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.194.59.35 with HTTP; Mon, 1 Aug 2016 11:21:08 -0700 (PDT)
In-Reply-To: <011101d1ebb2$442449f0$cc6cddd0$@augustcellars.com>
References: <011101d1ebb2$442449f0$cc6cddd0$@augustcellars.com>
From: Blake Ramsdell <blaker@gmail.com>
Date: Mon, 1 Aug 2016 11:21:08 -0700
Message-ID: <CAB=JzvFRc0GTz2PDddrq6D2se2jq7L+HtQuCCApMEofqmue8Mw@mail.gmail.com>
To: Jim Schaad <ietf@augustcellars.com>
Content-Type: text/plain; charset=UTF-8
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/2v1_Ioyt8nYdI7FUNFADT-2IOvQ>
Cc: SPASM <spasm@ietf.org>
Subject: Re: [Spasm] Change of Algorithms: Content Encryption Algorithms
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 01 Aug 2016 18:21:13 -0000

I am going to ask this for every MUST that has multiple options for
every algorithm type, so you might consider pre-emptively having a
statement for why there are multiple options.

On Sun, Jul 31, 2016 at 10:05 PM, Jim Schaad <ietf@augustcellars.com> wrote:
> Proposed for S/MIME 3.5
>
> MUST:  AES-192 CBC, AES-256 CBC, AES-256 GCM

Why are there three MUST algorithms?

I'll further elaborate that I think there should be one for
compatibility with that old algorithm that we used to use, one for teh
new hotness algorithm that we're going to use now, and one SHOULD or
SHOULD+ for the "on deck" algorithm.


From nobody Mon Aug  1 11:36:28 2016
Return-Path: <rsalz@akamai.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A1C0912D13E for <spasm@ietfa.amsl.com>; Mon,  1 Aug 2016 11:36:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.988
X-Spam-Level: 
X-Spam-Status: No, score=-3.988 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RP_MATCHES_RCVD=-1.287, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=akamai.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JrnNF3nBEWAM for <spasm@ietfa.amsl.com>; Mon,  1 Aug 2016 11:36:25 -0700 (PDT)
Received: from prod-mail-xrelay07.akamai.com (prod-mail-xrelay07.akamai.com [23.79.238.175]) by ietfa.amsl.com (Postfix) with ESMTP id CB95B12B00B for <spasm@ietf.org>; Mon,  1 Aug 2016 11:36:25 -0700 (PDT)
Received: from prod-mail-xrelay07.akamai.com (localhost.localdomain [127.0.0.1]) by postfix.imss70 (Postfix) with ESMTP id 4184B433409; Mon,  1 Aug 2016 18:36:25 +0000 (GMT)
Received: from prod-mail-relay10.akamai.com (prod-mail-relay10.akamai.com [172.27.118.251]) by prod-mail-xrelay07.akamai.com (Postfix) with ESMTP id 2A39F433404; Mon,  1 Aug 2016 18:36:25 +0000 (GMT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=akamai.com; s=a1; t=1470076585; bh=5pmdgkZY9E6yDvcuYyamlcPNoxADLtFVVqunfNMG+hg=; l=564; h=From:To:CC:Date:References:In-Reply-To:From; b=TiREdl6hPyMNWXxAnzn36YrWESuTliAPLhbvcK86S91vs0TX31PrYW/igBEWmgLsA lNW2Ug+hTieJWYXvIPn+BhmDqETtZXjbSVwaYWWk7ypiLw86LGsyKRpYhLX/mPc2Zb cqZql8xHu2YMsVDpMfww5vvXW8NUbyS9jiMNMW9Y=
Received: from email.msg.corp.akamai.com (usma1ex-cas1.msg.corp.akamai.com [172.27.123.30]) by prod-mail-relay10.akamai.com (Postfix) with ESMTP id 25D1E1FC86; Mon,  1 Aug 2016 18:36:25 +0000 (GMT)
Received: from USMA1EX-DAG1MB1.msg.corp.akamai.com (172.27.123.101) by usma1ex-dag1mb3.msg.corp.akamai.com (172.27.123.103) with Microsoft SMTP Server (TLS) id 15.0.1178.4; Mon, 1 Aug 2016 14:36:24 -0400
Received: from USMA1EX-DAG1MB1.msg.corp.akamai.com ([172.27.123.101]) by usma1ex-dag1mb1.msg.corp.akamai.com ([172.27.123.101]) with mapi id 15.00.1178.000; Mon, 1 Aug 2016 14:36:24 -0400
From: "Salz, Rich" <rsalz@akamai.com>
To: Michael Richardson <mcr@sandelman.ca>, Russ Housley <housley@vigilsec.com>, Jim Schaad <ietf@augustcellars.com>
Thread-Topic: [Spasm] Change of Algorithms: Content Encryption Algorithms
Thread-Index: AdHrrpzyX3DwxgkpTuS8xt5E6Mmi6AAiZYmAAAFQUgAAB3V24A==
Date: Mon, 1 Aug 2016 18:36:23 +0000
Message-ID: <7ac40b105318481d81f63983c9b92fe0@usma1ex-dag1mb1.msg.corp.akamai.com>
References: <011101d1ebb2$442449f0$cc6cddd0$@augustcellars.com> <D8B236B1-696C-47ED-A642-398DDD2B9564@vigilsec.com> <4D5AFDDA-C1C8-460F-90D3-A45A0E84F7C6@sandelman.ca>
In-Reply-To: <4D5AFDDA-C1C8-460F-90D3-A45A0E84F7C6@sandelman.ca>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [172.19.36.55]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/PXsMO4yIa7coxOYB5qHykx8rCaE>
Cc: SPASM <spasm@ietf.org>
Subject: Re: [Spasm] Change of Algorithms: Content Encryption Algorithms
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 01 Aug 2016 18:36:26 -0000

PiB3aHkgZG8geW91IHNheSB0aGF0IEFFUzE5MiBpcyBub3QgYW4gaW50ZXJlc3RpbmcgYWxnb3Jp
dGhtIGluIHRoZSBwcm9ncmVzcyB0b3dhcmRzIHN1cHBvcnQgb2Ygc3Ryb25nZXIgYWxncz8gbm90
IHdvcnRoIHRoZSBzdGVwLCBtYXJrZXQgY29uZnVzaW9uLi4uIA0KDQoNCkkgYWdyZWUgd2l0aCBS
dXNzIHRoYXQgQUVTMTkyIGlzIG5vdCBpbnRlcmVzdGluZy4gIE5vdCB0byBzcGVhayBmb3IgUnVz
cywgYnV0IG15IHJlYXNvbnMgaW5jbHVkZSB3aGF0IHlvdSBsaXN0ZWQgYWJvdmUgYW5kIGFsc28g
dGhhdCB0aW1lcyBoYXZlIGNoYW5nZWQgYW5kIHdlIG5vIGxvbmdlciBkbyB0aGUgImtpdGNoZW4g
c2luayIgYXBwcm9hY2ggb2YgdGhyb3dpbmcgaW4gZXZlcnkgY2lwaGVyIHRoYXQgInNlZW1zIHJl
YXNvbmFibGUiDQo=


From nobody Mon Aug  1 11:40:36 2016
Return-Path: <housley@vigilsec.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6D16012D127 for <spasm@ietfa.amsl.com>; Mon,  1 Aug 2016 11:40:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.899
X-Spam-Level: 
X-Spam-Status: No, score=-101.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, USER_IN_WHITELIST=-100] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id L1yUNlXQJmFp for <spasm@ietfa.amsl.com>; Mon,  1 Aug 2016 11:40:27 -0700 (PDT)
Received: from mail.smeinc.net (mail.smeinc.net [209.135.209.11]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CBBE112D186 for <spasm@ietf.org>; Mon,  1 Aug 2016 11:40:27 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mail.smeinc.net (Postfix) with ESMTP id A66483004C3 for <spasm@ietf.org>; Mon,  1 Aug 2016 14:40:25 -0400 (EDT)
X-Virus-Scanned: amavisd-new at mail.smeinc.net
Received: from mail.smeinc.net ([127.0.0.1]) by localhost (mail.smeinc.net [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id iehED4c7mVkL for <spasm@ietf.org>; Mon,  1 Aug 2016 14:40:23 -0400 (EDT)
Received: from [192.168.1.28] (nc-71-50-129-15.dyn.embarqhsd.net [71.50.129.15]) by mail.smeinc.net (Postfix) with ESMTPSA id 48607300422; Mon,  1 Aug 2016 14:40:23 -0400 (EDT)
Content-Type: multipart/alternative; boundary="Apple-Mail=_70FE11EB-0634-42F3-B063-D660A28AE97C"
Mime-Version: 1.0 (Mac OS X Mail 7.3 \(1878.6\))
From: Russ Housley <housley@vigilsec.com>
In-Reply-To: <4D5AFDDA-C1C8-460F-90D3-A45A0E84F7C6@sandelman.ca>
Date: Mon, 1 Aug 2016 14:40:23 -0400
Message-Id: <072D7929-04A4-43AA-9FB8-92A0EE48F942@vigilsec.com>
References: <011101d1ebb2$442449f0$cc6cddd0$@augustcellars.com> <D8B236B1-696C-47ED-A642-398DDD2B9564@vigilsec.com> <4D5AFDDA-C1C8-460F-90D3-A45A0E84F7C6@sandelman.ca>
To: Michael Richardson <mcr@sandelman.ca>
X-Mailer: Apple Mail (2.1878.6)
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/hPyUo8Amg2bGo6xfC7_MBoVKbtQ>
Cc: SPASM <spasm@ietf.org>, Jim Schaad <ietf@augustcellars.com>
Subject: Re: [Spasm] Change of Algorithms: Content Encryption Algorithms
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 01 Aug 2016 18:40:35 -0000

--Apple-Mail=_70FE11EB-0634-42F3-B063-D660A28AE97C
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

Michael:

Jim suggested that AES-256 as SHOULD+.  We have seen people select =
AES-128 or AES-256, but ignore the middle ground in other applications.  =
So, AES-192 will not help with the interoperability goal.

Russ


On Aug 1, 2016, at 1:41 PM, Michael Richardson <mcr@sandelman.ca> wrote:

> why do you say that AES192 is not an interesting algorithm in the =
progress towards support of stronger algs? not worth the step, market =
confusion...=20
>=20
> On 1 August 2016 13:03:49 GMT-04:00, Russ Housley =
<housley@vigilsec.com> wrote:
> Jim:
>=20
> In my view, AES-192 should not be included in the MUST or SHOULD =
statements.  We should be silent about it, which means that it MAY be =
implemented.
>=20
> Further, I think that AES-128 CBC MUST be implemented, to provide a =
point of transition for 3.1 to 3.5.
>=20
> Russ
>=20
>=20
> On Aug 1, 2016, at 1:05 AM, Jim Schaad <ietf@augustcellars.com> wrote:
>=20
>  I am not back onto a normal daylight schedule and have gotten through =
a
>  couple of other documents so I am ready to start dealing with issues =
in the
>  S/MIME documents.  So this is the first of a series of open issue =
messages
>  that I will start dribbling out as things seem to come to a =
conclusion.
> =20
>  This message looks at Content Encryption Algorithms.  Please restrict =
your
>  discussions to this set of algorithms, I will be
> sending out messages on
>  other algorithm times over time.
> =20
>  Current Document for S/MIME 3.1
> =20
>  MUST: AES-128 CBC
>  SHOULD+: AES-192 CBC and AES-256 CBC
>  SHOULD-: DES EDE3 CBC (tripleDES)
>  Historic: RC2/40
> =20
>  Proposed for S/MIME 3.5
> =20
>  MUST:  AES-192 CBC, AES-256 CBC, AES-256 GCM
>  SHOULD+: ChaCha20/Poly1305 (256-bit)
>  SHOULD-: AES-128 CBC
>  Historic: RC2/40, DES EDE3 CBC (tripleDES)
> =20
>  Questions:
>  1.  The jump from MUST to SHOULD- may be too aggressive for AES-128 =
CBC, we
>  should potentially state this as MUST- but I think being aggressive =
makes
>  more sense as we want to go to all AEAD algorithms in next version.
> =20
>  2.  No recommendation for: AES-128 GCM or AES-192 GCM, should there =
be?  How
>  do people feel about 128 and 192 bit algorithms?
> =20
>  3.  Do we want to downgrade all of the CBC algorithms in favor of GCM
>  algorithms?
> =20
>  Jim
> =20
>=20
>=20
> =20
> =20
>=20
>  Spasm mailing list
>  Spasm@ietf.org
>  https://www.ietf.org/mailman/listinfo/spasm
>=20
>=20
> Spasm mailing list
> Spasm@ietf.org
> https://www.ietf.org/mailman/listinfo/spasm
>=20
> --=20
> Sent from my Android device with K-9 Mail. Please excuse my brevity.
> _______________________________________________
> Spasm mailing list
> Spasm@ietf.org
> https://www.ietf.org/mailman/listinfo/spasm


--Apple-Mail=_70FE11EB-0634-42F3-B063-D660A28AE97C
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=us-ascii

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Dus-ascii"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: =
after-white-space;">Michael:<div><br></div><div>Jim suggested that =
AES-256 as SHOULD+. &nbsp;We have seen people select AES-128 or AES-256, =
but ignore the middle ground in other applications. &nbsp;So, AES-192 =
will not help with the interoperability =
goal.</div><div><br></div><div>Russ</div><div><br></div><div><br><div><div=
>On Aug 1, 2016, at 1:41 PM, Michael Richardson &lt;<a =
href=3D"mailto:mcr@sandelman.ca">mcr@sandelman.ca</a>&gt; =
wrote:</div><br class=3D"Apple-interchange-newline"><blockquote =
type=3D"cite"><div>why do you say that AES192 is not an interesting =
algorithm in the progress towards support of stronger algs? not worth =
the step,  market confusion... <br><br><div class=3D"gmail_quote">On 1 =
August 2016 13:03:49 GMT-04:00, Russ Housley &lt;<a =
href=3D"mailto:housley@vigilsec.com">housley@vigilsec.com</a>&gt; =
wrote:<blockquote class=3D"gmail_quote" style=3D"margin: 0pt 0pt 0pt =
0.8ex; border-left: 1px solid rgb(204, 204, 204); padding-left: 1ex;">
<pre class=3D"k9mail">Jim:<br><br>In my view, AES-192 should not be =
included in the MUST or SHOULD statements.  We should be silent about =
it, which means that it MAY be implemented.<br><br>Further, I think that =
AES-128 CBC MUST be implemented, to provide a point of transition for =
3.1 to 3.5.<br><br>Russ<br><br><br>On Aug 1, 2016, at 1:05 AM, Jim =
Schaad &lt;<a =
href=3D"mailto:ietf@augustcellars.com">ietf@augustcellars.com</a>&gt; =
wrote:<br><br><blockquote class=3D"gmail_quote" style=3D"margin: 0pt 0pt =
1ex 0.8ex; border-left: 1px solid #729fcf; padding-left: 1ex;"> I am not =
back onto a normal daylight schedule and have gotten through a<br> =
couple of other documents so I am ready to start dealing with issues in =
the<br> S/MIME documents.  So this is the first of a series of open =
issue messages<br> that I will start dribbling out as things seem to =
come to a conclusion.<br> <br> This message looks at Content Encryption =
Algorithms.  Please restrict your<br> discussions to this set of =
algorithms, I will be
sending out messages on<br> other algorithm times over time.<br> <br> =
Current Document for S/MIME 3.1<br> <br> MUST: AES-128 CBC<br> SHOULD+: =
AES-192 CBC and AES-256 CBC<br> SHOULD-: DES EDE3 CBC (tripleDES)<br> =
Historic: RC2/40<br> <br> Proposed for S/MIME 3.5<br> <br> MUST:  =
AES-192 CBC, AES-256 CBC, AES-256 GCM<br> SHOULD+: ChaCha20/Poly1305 =
(256-bit)<br> SHOULD-: AES-128 CBC<br> Historic: RC2/40, DES EDE3 CBC =
(tripleDES)<br> <br> Questions:<br> 1.  The jump from MUST to SHOULD- =
may be too aggressive for AES-128 CBC, we<br> should potentially state =
this as MUST- but I think being aggressive makes<br> more sense as we =
want to go to all AEAD algorithms in next version.<br> <br> 2.  No =
recommendation for: AES-128 GCM or AES-192 GCM, should there be?  =
How<br> do people feel about 128 and 192 bit algorithms?<br> <br> 3.  Do =
we want to downgrade all of the CBC algorithms in favor of GCM<br> =
algorithms?<br> <br> Jim<br> <br>
<br> <br> <br><hr><br> Spasm mailing list<br> <a =
href=3D"mailto:Spasm@ietf.org">Spasm@ietf.org</a><br> <a =
href=3D"https://www.ietf.org/mailman/listinfo/spasm">https://www.ietf.org/=
mailman/listinfo/spasm</a><br></blockquote><br><hr><br>Spasm mailing =
list<br><a href=3D"mailto:Spasm@ietf.org">Spasm@ietf.org</a><br><a =
href=3D"https://www.ietf.org/mailman/listinfo/spasm">https://www.ietf.org/=
mailman/listinfo/spasm</a><br></pre></blockquote></div><br>
-- <br>
Sent from my Android device with K-9 Mail. Please excuse my =
brevity.</div>_______________________________________________<br>Spasm =
mailing list<br><a =
href=3D"mailto:Spasm@ietf.org">Spasm@ietf.org</a><br>https://www.ietf.org/=
mailman/listinfo/spasm<br></blockquote></div><br></div></body></html>=

--Apple-Mail=_70FE11EB-0634-42F3-B063-D660A28AE97C--


From nobody Mon Aug  1 11:41:08 2016
Return-Path: <housley@vigilsec.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 798E812D18F for <spasm@ietfa.amsl.com>; Mon,  1 Aug 2016 11:41:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.9
X-Spam-Level: 
X-Spam-Status: No, score=-101.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, USER_IN_WHITELIST=-100] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IIWdNdaf0Rj6 for <spasm@ietfa.amsl.com>; Mon,  1 Aug 2016 11:41:05 -0700 (PDT)
Received: from mail.smeinc.net (mail.smeinc.net [209.135.209.11]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3A68212D13E for <spasm@ietf.org>; Mon,  1 Aug 2016 11:41:05 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mail.smeinc.net (Postfix) with ESMTP id 4809A3005A5 for <spasm@ietf.org>; Mon,  1 Aug 2016 14:41:03 -0400 (EDT)
X-Virus-Scanned: amavisd-new at mail.smeinc.net
Received: from mail.smeinc.net ([127.0.0.1]) by localhost (mail.smeinc.net [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id VkYei4jNio3O for <spasm@ietf.org>; Mon,  1 Aug 2016 14:41:02 -0400 (EDT)
Received: from [192.168.1.28] (nc-71-50-129-15.dyn.embarqhsd.net [71.50.129.15]) by mail.smeinc.net (Postfix) with ESMTPSA id C0984300422; Mon,  1 Aug 2016 14:41:01 -0400 (EDT)
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 7.3 \(1878.6\))
From: Russ Housley <housley@vigilsec.com>
In-Reply-To: <01eb01d1ec1d$e8cdc060$ba694120$@augustcellars.com>
Date: Mon, 1 Aug 2016 14:41:02 -0400
Content-Transfer-Encoding: 7bit
Message-Id: <F253F589-9645-4BEC-8AF3-044E2A0C4A14@vigilsec.com>
References: <011101d1ebb2$442449f0$cc6cddd0$@augustcellars.com> <D8B236B1-696C-47ED-A642-398DDD2B9564@vigilsec.com> <01eb01d1ec1d$e8cdc060$ba694120$@augustcellars.com>
To: Jim Schaad <ietf@augustcellars.com>
X-Mailer: Apple Mail (2.1878.6)
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/ca9062rjPqtLLcmq07ZjUmqR30k>
Cc: SPASM <spasm@ietf.org>
Subject: Re: [Spasm] Change of Algorithms: Content Encryption Algorithms
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 01 Aug 2016 18:41:06 -0000

Jim:

Yes, that would be fine with me.

Russ


On Aug 1, 2016, at 1:55 PM, Jim Schaad <ietf@augustcellars.com> wrote:

> Would MUST- be reasonable for AES-128 CBC?
> 
> jim
> 
>> -----Original Message-----
>> From: Russ Housley [mailto:housley@vigilsec.com]
>> Sent: Monday, August 01, 2016 10:04 AM
>> To: Jim Schaad <ietf@augustcellars.com>
>> Cc: SPASM <spasm@ietf.org>
>> Subject: Re: [Spasm] Change of Algorithms: Content Encryption Algorithms
>> 
>> Jim:
>> 
>> In my view, AES-192 should not be included in the MUST or SHOULD
> statements.
>> We should be silent about it, which means that it MAY be implemented.
>> 
>> Further, I think that AES-128 CBC MUST be implemented, to provide a point
> of
>> transition for 3.1 to 3.5.
>> 
>> Russ
>> 
>> 
>> On Aug 1, 2016, at 1:05 AM, Jim Schaad <ietf@augustcellars.com> wrote:
>> 
>>> I am not back onto a normal daylight schedule and have gotten through
>>> a couple of other documents so I am ready to start dealing with issues
>>> in the S/MIME documents.  So this is the first of a series of open
>>> issue messages that I will start dribbling out as things seem to come to
> a
>> conclusion.
>>> 
>>> This message looks at Content Encryption Algorithms.  Please restrict
>>> your discussions to this set of algorithms, I will be sending out
>>> messages on other algorithm times over time.
>>> 
>>> Current Document for S/MIME 3.1
>>> 
>>> MUST: AES-128 CBC
>>> SHOULD+: AES-192 CBC and AES-256 CBC
>>> SHOULD-: DES EDE3 CBC (tripleDES)
>>> Historic: RC2/40
>>> 
>>> Proposed for S/MIME 3.5
>>> 
>>> MUST:  AES-192 CBC, AES-256 CBC, AES-256 GCM
>>> SHOULD+: ChaCha20/Poly1305 (256-bit)
>>> SHOULD-: AES-128 CBC
>>> Historic: RC2/40, DES EDE3 CBC (tripleDES)
>>> 
>>> Questions:
>>> 1.  The jump from MUST to SHOULD- may be too aggressive for AES-128
>>> CBC, we should potentially state this as MUST- but I think being
>>> aggressive makes more sense as we want to go to all AEAD algorithms in
> next
>> version.
>>> 
>>> 2.  No recommendation for: AES-128 GCM or AES-192 GCM, should there
>>> be?  How do people feel about 128 and 192 bit algorithms?
>>> 
>>> 3.  Do we want to downgrade all of the CBC algorithms in favor of GCM
>>> algorithms?
>>> 
>>> Jim
>>> 
>>> 
>>> 
>>> 
>>> _______________________________________________
>>> Spasm mailing list
>>> Spasm@ietf.org
>>> https://www.ietf.org/mailman/listinfo/spasm
> 
> 
> _______________________________________________
> Spasm mailing list
> Spasm@ietf.org
> https://www.ietf.org/mailman/listinfo/spasm


From nobody Mon Aug  1 11:59:31 2016
Return-Path: <ietf@augustcellars.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7C4CA12D867 for <spasm@ietfa.amsl.com>; Mon,  1 Aug 2016 11:59:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.188
X-Spam-Level: 
X-Spam-Status: No, score=-3.188 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-1.287, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lptyV9ADiFoT for <spasm@ietfa.amsl.com>; Mon,  1 Aug 2016 11:59:28 -0700 (PDT)
Received: from mail2.augustcellars.com (augustcellars.com [50.45.239.150]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0488F12D186 for <spasm@ietf.org>; Mon,  1 Aug 2016 11:59:28 -0700 (PDT)
Received: from hebrews (24.21.96.37) by mail2.augustcellars.com (192.168.0.56) with Microsoft SMTP Server (TLS) id 15.0.1178.4; Mon, 1 Aug 2016 12:05:04 -0700
From: Jim Schaad <ietf@augustcellars.com>
To: 'Blake Ramsdell' <blaker@gmail.com>
References: <011101d1ebb2$442449f0$cc6cddd0$@augustcellars.com> <CAB=JzvFRc0GTz2PDddrq6D2se2jq7L+HtQuCCApMEofqmue8Mw@mail.gmail.com>
In-Reply-To: <CAB=JzvFRc0GTz2PDddrq6D2se2jq7L+HtQuCCApMEofqmue8Mw@mail.gmail.com>
Date: Mon, 1 Aug 2016 11:58:50 -0700
Message-ID: <020901d1ec26$bf698110$3e3c8330$@augustcellars.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQIPrQ0rVM71b5yax3rKTP2+WC5mNAIjysX2n6fUVhA=
Content-Language: en-us
X-Originating-IP: [24.21.96.37]
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/v50zSONbbTvNCjFA6I20QHdJKPI>
Cc: 'SPASM' <spasm@ietf.org>
Subject: Re: [Spasm] Change of Algorithms: Content Encryption Algorithms
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 01 Aug 2016 18:59:30 -0000

I would say that as a general rule, we should always have a minimum of two
MUST algorithms everywhere so that we have a backup in case of failure.  I
would therefore accept arguments about having three items but not two items.

Jim


> -----Original Message-----
> From: Spasm [mailto:spasm-bounces@ietf.org] On Behalf Of Blake Ramsdell
> Sent: Monday, August 01, 2016 11:21 AM
> To: Jim Schaad <ietf@augustcellars.com>
> Cc: SPASM <spasm@ietf.org>
> Subject: Re: [Spasm] Change of Algorithms: Content Encryption Algorithms
> 
> I am going to ask this for every MUST that has multiple options for every
> algorithm type, so you might consider pre-emptively having a statement for
why
> there are multiple options.
> 
> On Sun, Jul 31, 2016 at 10:05 PM, Jim Schaad <ietf@augustcellars.com>
wrote:
> > Proposed for S/MIME 3.5
> >
> > MUST:  AES-192 CBC, AES-256 CBC, AES-256 GCM
> 
> Why are there three MUST algorithms?
> 
> I'll further elaborate that I think there should be one for compatibility
with that
> old algorithm that we used to use, one for teh new hotness algorithm that
we're
> going to use now, and one SHOULD or
> SHOULD+ for the "on deck" algorithm.
> 
> _______________________________________________
> Spasm mailing list
> Spasm@ietf.org
> https://www.ietf.org/mailman/listinfo/spasm


From nobody Tue Aug  2 03:14:10 2016
Return-Path: <era@x500.eu>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4CCE812B058 for <spasm@ietfa.amsl.com>; Tue,  2 Aug 2016 03:14:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.081
X-Spam-Level: 
X-Spam-Status: No, score=0.081 tagged_above=-999 required=5 tests=[BAYES_50=0.8, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IOIj7b9TR6tx for <spasm@ietfa.amsl.com>; Tue,  2 Aug 2016 03:14:07 -0700 (PDT)
Received: from mail04.dandomain.dk (mail04.dandomain.dk [194.150.112.204]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BF1BA12B049 for <spasm@ietf.org>; Tue,  2 Aug 2016 03:14:06 -0700 (PDT)
Received: from Morten ([62.44.135.142]) by mail04.dandomain.dk (DanDomain Mailserver) with ASMTP id 4201608021214011166 for <spasm@ietf.org>; Tue, 02 Aug 2016 12:14:01 +0200
From: "Erik Andersen" <era@x500.eu>
To: "SPASM" <spasm@ietf.org>
Date: Tue, 2 Aug 2016 12:14:04 +0200
Message-ID: <000001d1eca6$99252650$cb6f72f0$@x500.eu>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_0001_01D1ECB7.5CAF2ED0"
X-Mailer: Microsoft Outlook 15.0
Thread-Index: AdHsmI3gX+PA4ANDSvS/HUw/GPUgDA==
Content-Language: en-gb
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/r3ZkV7VhLuf9l7WH8zGQlXTHvYU>
Subject: [Spasm] Use of CMS
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 02 Aug 2016 10:14:09 -0000

This is a multipart message in MIME format.

------=_NextPart_000_0001_01D1ECB7.5CAF2ED0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit

Hi,

 

I am working on a new edition of X.1080.1. The current version claims to use
CMS without any details. It is also crap otherwise. It is supposed to
provide a general framework for telebiometrics protocols.

 

It the general model there is an exchange that sets up a session. Within the
session there may be several exchanges. The envelopedData contents type
using the keyAgreement options is used together with the signedData content
type. However, it seems a little heavy to use the key agreement method for
every exchange. 

 

My thinking is to use the AuthenticatedData content type together with
AES-GCM (aes256-GCM) as defined in RFC 5480 for all exchanges except for the
first one and then reuse the pairwise key-encryption key generated during
the first exchange by using the KEKRecipientInfo type specified in section
6.2.3. However, the KEKRecipientInfo data type requires a mandatory key

Identifier. I have not seen that the pairwise key-encryption key is
allocated a key identifier. (Such an key identifier is not actually needed,
as there is only one key in play. )

 

It seems it is a little against the spirit of CMS to do what I am
suggesting.

 

Kind regards,

 

Erik


------=_NextPart_000_0001_01D1ECB7.5CAF2ED0
Content-Type: text/html;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" =
xmlns=3D"http://www.w3.org/TR/REC-html40"><head><meta =
http-equiv=3DContent-Type content=3D"text/html; =
charset=3Dus-ascii"><meta name=3DGenerator content=3D"Microsoft Word 15 =
(filtered medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;
	mso-fareast-language:EN-US;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:#0563C1;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:#954F72;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;
	font-family:"Calibri",sans-serif;
	mso-fareast-language:EN-US;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-GB =
link=3D"#0563C1" vlink=3D"#954F72"><div class=3DWordSection1><p =
class=3DMsoNormal>Hi,<o:p></o:p></p><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>I am working =
on a new edition of X.1080.1. The current version claims to use CMS =
without any details. It is also crap otherwise. It is supposed to =
provide a general framework for telebiometrics =
protocols.<o:p></o:p></p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p =
class=3DMsoNormal>It the general model there is an exchange that sets up =
a session. Within the session there may be several exchanges. The =
envelopedData contents type using the keyAgreement options is used =
together with the signedData content type. However, it seems a little =
heavy to use the key agreement method for every exchange. =
<o:p></o:p></p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p =
class=3DMsoNormal>My thinking is to use the AuthenticatedData content =
type together with AES-GCM (aes256-GCM) as defined in RFC 5480 for all =
exchanges except for the first one and then reuse the pairwise =
key-encryption key generated during the first exchange by using the =
KEKRecipientInfo type specified in section 6.2.3. However, the =
KEKRecipientInfo data type requires a mandatory key<o:p></o:p></p><p =
class=3DMsoNormal> Identifier. I have not seen that the pairwise =
key-encryption key is allocated a key identifier. (Such an key =
identifier is not actually needed, as there is only one key in play. =
)<o:p></o:p></p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p =
class=3DMsoNormal>It seems it is a little against the spirit of CMS to =
do what I am suggesting.<o:p></o:p></p><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>Kind =
regards,<o:p></o:p></p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p =
class=3DMsoNormal>Erik<o:p></o:p></p><p class=3DMsoNormal> =
<o:p></o:p></p></div></body></html>
------=_NextPart_000_0001_01D1ECB7.5CAF2ED0--


From nobody Tue Aug  2 04:55:32 2016
Return-Path: <mcr+ietf@sandelman.ca>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E6B6212D549 for <spasm@ietfa.amsl.com>; Tue,  2 Aug 2016 04:55:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.188
X-Spam-Level: 
X-Spam-Status: No, score=-3.188 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, RP_MATCHES_RCVD=-1.287, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hguGRY5O9eN3 for <spasm@ietfa.amsl.com>; Tue,  2 Aug 2016 04:55:29 -0700 (PDT)
Received: from tuna.sandelman.ca (tuna.sandelman.ca [209.87.249.19]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 81D7312D50C for <spasm@ietf.org>; Tue,  2 Aug 2016 04:55:29 -0700 (PDT)
Received: from sandelman.ca (obiwan.sandelman.ca [209.87.249.21]) by tuna.sandelman.ca (Postfix) with ESMTP id 491682009E; Tue,  2 Aug 2016 08:05:43 -0400 (EDT)
Received: from obiwan.sandelman.ca (localhost [IPv6:::1]) by sandelman.ca (Postfix) with ESMTP id A5914638D1; Tue,  2 Aug 2016 07:55:28 -0400 (EDT)
From: Michael Richardson <mcr+ietf@sandelman.ca>
To: Jim Schaad <ietf@augustcellars.com>
In-Reply-To: <020901d1ec26$bf698110$3e3c8330$@augustcellars.com>
References: <011101d1ebb2$442449f0$cc6cddd0$@augustcellars.com> <CAB=JzvFRc0GTz2PDddrq6D2se2jq7L+HtQuCCApMEofqmue8Mw@mail.gmail.com> <020901d1ec26$bf698110$3e3c8330$@augustcellars.com>
X-Mailer: MH-E 8.6; nmh 1.6+dev; GNU Emacs 24.5.1
X-Face: $\n1pF)h^`}$H>Hk{L"x@)JS7<%Az}5RyS@k9X%29-lHB$Ti.V>2bi.~ehC0; <'$9xN5Ub# z!G,p`nR&p7Fz@^UXIn156S8.~^@MJ*mMsD7=QFeq%AL4m<nPbLgmtKK-5dC@#:k
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=-=-="; micalg=pgp-sha1; protocol="application/pgp-signature"
Date: Tue, 02 Aug 2016 07:55:28 -0400
Message-ID: <13700.1470138928@obiwan.sandelman.ca>
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/tM5Vf9SZlkrbs3bN1lpvTous6BI>
Cc: 'Blake Ramsdell' <blaker@gmail.com>, 'SPASM' <spasm@ietf.org>
Subject: Re: [Spasm] Change of Algorithms: Content Encryption Algorithms
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 02 Aug 2016 11:55:31 -0000

--=-=-=
Content-Type: text/plain


Jim Schaad <ietf@augustcellars.com> wrote:
    > I would say that as a general rule, we should always have a minimum of two
    > MUST algorithms everywhere so that we have a backup in case of failure.  I
    > would therefore accept arguments about having three items but not two
    > items.

okay, but I don't entirely consider AES128 and AES256 to be different
algorithms.  Depends upon the nature of the failure.  CGM (or other CTR-type
modes) and not-CGM are more different, but, the right failure could take them
all out at the same time, I think.

--
Michael Richardson <mcr+IETF@sandelman.ca>, Sandelman Software Works
 -= IPv6 IoT consulting =-




--=-=-=
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQEVAwUBV6CKLYCLcPvd0N1lAQI6BQf8CQLlreS3Gd38IxtKphMfoUq8P5FLs0yp
Jto0zmgbjOHTFeOjqc2FoP7NPxM91J886zzXwbTUZXhEBmnLvMFKOOzZTNQF/ZVb
IZ3kpK2sjnGuXWjXYaX9Aumx41ph2qrS83vUnJhETmgMYHOkXczZxtaEclWTV9Mg
wpr4GVM3JmT+PGtn/VNlUDblxADBcZLI4IB3mLMHQcDxGNtl5GHkY3ZvoB3/ORLq
jTIDlDaTiB0kUbWMRCjaiu4XgwK+mU8YQh/wCnkjy/LmxejtSt7sugjAiZTmrEIq
oAhyw/j/ZpCzw7gCdholpMNXBeDlXspYc3G3YgtNtaiIIDJXW8RItg==
=c9Pu
-----END PGP SIGNATURE-----
--=-=-=--


From nobody Tue Aug  2 07:15:21 2016
Return-Path: <sean@sn3rd.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4251512D743 for <spasm@ietfa.amsl.com>; Tue,  2 Aug 2016 07:15:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.701
X-Spam-Level: 
X-Spam-Status: No, score=-2.701 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=sn3rd.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IanN_8HY0cL0 for <spasm@ietfa.amsl.com>; Tue,  2 Aug 2016 07:15:15 -0700 (PDT)
Received: from mail-qk0-x232.google.com (mail-qk0-x232.google.com [IPv6:2607:f8b0:400d:c09::232]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3320412D630 for <spasm@ietf.org>; Tue,  2 Aug 2016 07:15:11 -0700 (PDT)
Received: by mail-qk0-x232.google.com with SMTP id v123so42916631qkh.3 for <spasm@ietf.org>; Tue, 02 Aug 2016 07:15:11 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sn3rd.com; s=google; h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=sXynpYmVsXkXlAupgugzw/q0vcKrEBlW9Tt7rY0xx5s=; b=YHmSoeFC1nnNHRZmGjR64XkK6ysFFrN2uyReWIm1s7fElcFtbT7x1u9ZxAkzXCVFVp xQwVEV2hMgCBnGRnkjMgR2J8M/hhdU6zTn2v+buUWsbJiq+XtvEOEAP7bpuUVX0Se3TQ RfnNoOH8M2fVOEDk/dDnNsHuNmEJ2sasrZmog=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=sXynpYmVsXkXlAupgugzw/q0vcKrEBlW9Tt7rY0xx5s=; b=OFOMXRsJKCX0mSbfg7Udr1Q2AFiC/R3iE8ddacPWpBpeCZBZU7LZfsjmHVm1preeFf 15kTbE7DwfX1mec00VS+EtPN2iVcbr9h2G7ALOni/g7CHgR85fBEaOUIV3twXHc8GFui G3Bk69PJJZF5qJN8wrBIjrNOTgZx4+VGUaVnciDmn32EN45n2+ub1Q0low9r6zhH5V4O 2NhfzvA37Bxsxwo3wfqjDCeVc9q9JlrrP127ENXBeLoG+e8yky1SDX9O1IGT+xUZqXgb XJCimndgFJRb0IzJ8+nUkmYRo/OpSKTCOE0QkdWugAXvxrm/lINCYyPkjC5spKDEAxjl uWiA==
X-Gm-Message-State: AEkooutfqSjgk05PkhfPrMij+gkrWX/gwzRC5MKLENoEWOneKH2Rcd7G7D1D0WUPTSiM/Q==
X-Received: by 10.55.144.6 with SMTP id s6mr72637324qkd.6.1470147310258; Tue, 02 Aug 2016 07:15:10 -0700 (PDT)
Received: from [172.16.0.112] (pool-173-73-123-93.washdc.east.verizon.net. [173.73.123.93]) by smtp.gmail.com with ESMTPSA id j38sm1430103qtj.35.2016.08.02.07.15.09 (version=TLS1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Tue, 02 Aug 2016 07:15:09 -0700 (PDT)
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\))
From: Sean Turner <sean@sn3rd.com>
In-Reply-To: <011a01d1ebba$c98eabf0$5cac03d0$@augustcellars.com>
Date: Tue, 2 Aug 2016 10:15:08 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <D28EFAF9-1AFF-4D06-A878-CCA9CD367F3F@sn3rd.com>
References: <011a01d1ebba$c98eabf0$5cac03d0$@augustcellars.com>
To: Jim Schaad <ietf@augustcellars.com>
X-Mailer: Apple Mail (2.3124)
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/Bst-rGOLDMWTxBtkPuHeI7wJvpU>
Cc: SPASM <spasm@ietf.org>
Subject: Re: [Spasm] Change of Algorithms: Signature Algorithms
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 02 Aug 2016 14:15:19 -0000

On Aug 01, 2016, at 02:06, Jim Schaad <ietf@augustcellars.com> wrote:
>=20
> Proposed for S/MIME 3.5

I=E2=80=99m really thinking this should be v4, but I guess that=E2=80=99s =
for another thread.

> MUST: RSA-PSS w/ SHA-256, ECDSA P-256 w/ SHA-256, EdDSA25519
> MUST-: RSA w/ SHA-256
> SHOULD+:
> SHOULD:  RSA-PSS w/ SHA-512, ECDSA P-521 w/ SHA-256, EdDSA448

{snark}Sigh I guess we=E2=80=99ll do this for those that are paranoid =
=E2=80=A6 here=E2=80=99s to the race to =E2=80=9C11=E2=80=9D.{/snark}

> SHOULD-: DSA w/ SHA-256
> Historic: RSA w/ SHA-1, DSA w/ SHA-1, RSA w/ MD5
>=20
> Key Sizes:
> RSA and DSA - sign
> SHOULD NOT            Key size <=3D 2048
> SHOULD      2048 <=3D key size <=3D 4096
> MAY             4096 < key size  =20
>=20
> RSA and DSA - Verify
> MAY                key size <=3D 2048
> MUST      2048 <=3D key size <=3D 4096
> MAY        4096 < key size
>=20
> RSA - Certificate Verify
> MAY             key size <=3D 2048
> MUST  2048 <=3D key size <=3D 4096
> MAY      4096  < key size
>=20
> DSA - Certificate Verify
> MAY             key size <=3D 1023
> MUST   1024 <=3D key size <=3D 3072

I=E2=80=99m sure there was a reason to include the MAYs back in the day =
but maybe we can drop them entirely?  I mean you may shoot yourself in =
the foot, but we don=E2=80=99t MAY that.  If they=E2=80=99re going to =
remain I think they=E2=80=99re supposed to be "<=3D 2047=E2=80=9D =
otherwise 2048 is both a MUST an a MAY.

> Questions:
>=20
> 1.  Should DSA be dropped to historic for messages and just left as =
SHOULD-
> for certificates, I don't know how many DSA certificates actually =
exist.

I=E2=80=99m all for moving DSA to historic.  I=E2=80=99m also not sure =
how many DSA certificates are out there either, but the real question is =
if anybody is actually going to update their code to do S/MIME v4 with =
DSA.  I doubt it.

I know it=E2=80=99s not apples to apples but we asked about DSA =
certificates in the TLS WG we got crickets.

> 2. I have changed to lower limits on RSA but not DSA for certificate
> verification - should it be changed as well?  Again I don't know how =
many
> DSA certificates exist.

See 1 so this is OBE.

> 3.  I don't think that any statements for ECDSA on key size need to be =
made
> separately from the algorithm support list.  Does any body disagree?

I agree with you that I think we could drop these.  I=E2=80=99ve not =
seen people go oh an ECDSA key on p-256 needs a 192-bit key.

spt=


From nobody Tue Aug  2 09:10:33 2016
Return-Path: <ietf@augustcellars.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8E42A12D137 for <spasm@ietfa.amsl.com>; Tue,  2 Aug 2016 09:10:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.187
X-Spam-Level: 
X-Spam-Status: No, score=-3.187 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RP_MATCHES_RCVD=-1.287, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wHwF5Qd22HY8 for <spasm@ietfa.amsl.com>; Tue,  2 Aug 2016 09:10:29 -0700 (PDT)
Received: from mail2.augustcellars.com (augustcellars.com [50.45.239.150]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2788212D580 for <spasm@ietf.org>; Tue,  2 Aug 2016 09:10:29 -0700 (PDT)
Received: from hebrews (24.21.96.37) by mail2.augustcellars.com (192.168.0.56) with Microsoft SMTP Server (TLS) id 15.0.1178.4; Tue, 2 Aug 2016 09:21:30 -0700
From: Jim Schaad <ietf@augustcellars.com>
To: 'Erik Andersen' <era@x500.eu>, 'SPASM' <spasm@ietf.org>
References: <000001d1eca6$99252650$cb6f72f0$@x500.eu>
In-Reply-To: <000001d1eca6$99252650$cb6f72f0$@x500.eu>
Date: Tue, 2 Aug 2016 09:09:56 -0700
Message-ID: <02f801d1ecd8$510bbd70$f3233850$@augustcellars.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_02F9_01D1EC9D.A4ADA8C0"
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQGymIGRMGgUPn9JgSzof+M4Im4gyKB0f3zA
Content-Language: en-us
X-Originating-IP: [24.21.96.37]
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/RNIyl3akM89_DLG0ZklOMuRRqNg>
Subject: Re: [Spasm] Use of CMS
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 02 Aug 2016 16:10:31 -0000

------=_NextPart_000_02F9_01D1EC9D.A4ADA8C0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit

Try taking a look at 3185, this did something similar to what you are
discussing.

 

jim

 

From: Spasm [mailto:spasm-bounces@ietf.org] On Behalf Of Erik Andersen
Sent: Tuesday, August 02, 2016 3:14 AM
To: SPASM <spasm@ietf.org>
Subject: [Spasm] Use of CMS

 

Hi,

 

I am working on a new edition of X.1080.1. The current version claims to use
CMS without any details. It is also crap otherwise. It is supposed to
provide a general framework for telebiometrics protocols.

 

It the general model there is an exchange that sets up a session. Within the
session there may be several exchanges. The envelopedData contents type
using the keyAgreement options is used together with the signedData content
type. However, it seems a little heavy to use the key agreement method for
every exchange. 

 

My thinking is to use the AuthenticatedData content type together with
AES-GCM (aes256-GCM) as defined in RFC 5480 for all exchanges except for the
first one and then reuse the pairwise key-encryption key generated during
the first exchange by using the KEKRecipientInfo type specified in section
6.2.3. However, the KEKRecipientInfo data type requires a mandatory key

Identifier. I have not seen that the pairwise key-encryption key is
allocated a key identifier. (Such an key identifier is not actually needed,
as there is only one key in play. )

 

It seems it is a little against the spirit of CMS to do what I am
suggesting.

 

Kind regards,

 

Erik

 


------=_NextPart_000_02F9_01D1EC9D.A4ADA8C0
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" =
xmlns=3D"http://www.w3.org/TR/REC-html40"><head><META =
HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Dus-ascii"><meta name=3DGenerator content=3D"Microsoft Word 15 =
(filtered medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:#0563C1;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:#954F72;
	text-decoration:underline;}
p.msonormal0, li.msonormal0, div.msonormal0
	{mso-style-name:msonormal;
	mso-margin-top-alt:auto;
	margin-right:0in;
	mso-margin-bottom-alt:auto;
	margin-left:0in;
	font-size:12.0pt;
	font-family:"Times New Roman",serif;}
span.EmailStyle18
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
span.EmailStyle19
	{mso-style-type:personal-reply;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US =
link=3D"#0563C1" vlink=3D"#954F72"><div class=3DWordSection1><p =
class=3DMsoNormal>Try taking a look at 3185, this did something similar =
to what you are discussing.<o:p></o:p></p><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p =
class=3DMsoNormal>jim<o:p></o:p></p><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><div =
style=3D'border:none;border-left:solid blue 1.5pt;padding:0in 0in 0in =
4.0pt'><div><div style=3D'border:none;border-top:solid #E1E1E1 =
1.0pt;padding:3.0pt 0in 0in 0in'><p class=3DMsoNormal><b>From:</b> Spasm =
[mailto:spasm-bounces@ietf.org] <b>On Behalf Of </b>Erik =
Andersen<br><b>Sent:</b> Tuesday, August 02, 2016 3:14 AM<br><b>To:</b> =
SPASM &lt;spasm@ietf.org&gt;<br><b>Subject:</b> [Spasm] Use of =
CMS<o:p></o:p></p></div></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal><span =
lang=3DEN-GB>Hi,<o:p></o:p></span></p><p class=3DMsoNormal><span =
lang=3DEN-GB><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
lang=3DEN-GB>I am working on a new edition of X.1080.1. The current =
version claims to use CMS without any details. It is also crap =
otherwise. It is supposed to provide a general framework for =
telebiometrics protocols.<o:p></o:p></span></p><p =
class=3DMsoNormal><span lang=3DEN-GB><o:p>&nbsp;</o:p></span></p><p =
class=3DMsoNormal><span lang=3DEN-GB>It the general model there is an =
exchange that sets up a session. Within the session there may be several =
exchanges. The envelopedData contents type using the keyAgreement =
options is used together with the signedData content type. However, it =
seems a little heavy to use the key agreement method for every exchange. =
<o:p></o:p></span></p><p class=3DMsoNormal><span =
lang=3DEN-GB><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
lang=3DEN-GB>My thinking is to use the AuthenticatedData content type =
together with AES-GCM (aes256-GCM) as defined in RFC 5480 for all =
exchanges except for the first one and then reuse the pairwise =
key-encryption key generated during the first exchange by using the =
KEKRecipientInfo type specified in section 6.2.3. However, the =
KEKRecipientInfo data type requires a mandatory =
key<o:p></o:p></span></p><p class=3DMsoNormal><span =
lang=3DEN-GB>Identifier. I have not seen that the pairwise =
key-encryption key is allocated a key identifier. (Such an key =
identifier is not actually needed, as there is only one key in play. =
)<o:p></o:p></span></p><p class=3DMsoNormal><span =
lang=3DEN-GB><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
lang=3DEN-GB>It seems it is a little against the spirit of CMS to do =
what I am suggesting.<o:p></o:p></span></p><p class=3DMsoNormal><span =
lang=3DEN-GB><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
lang=3DEN-GB>Kind regards,<o:p></o:p></span></p><p =
class=3DMsoNormal><span lang=3DEN-GB><o:p>&nbsp;</o:p></span></p><p =
class=3DMsoNormal><span lang=3DEN-GB>Erik<o:p></o:p></span></p><p =
class=3DMsoNormal><span =
lang=3DEN-GB><o:p>&nbsp;</o:p></span></p></div></div></body></html>
------=_NextPart_000_02F9_01D1EC9D.A4ADA8C0--


From nobody Tue Aug  2 09:11:16 2016
Return-Path: <mcr+ietf@sandelman.ca>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1B24712D580 for <spasm@ietfa.amsl.com>; Tue,  2 Aug 2016 09:11:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.188
X-Spam-Level: 
X-Spam-Status: No, score=-3.188 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, RP_MATCHES_RCVD=-1.287, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 87lEsn1bGBTH for <spasm@ietfa.amsl.com>; Tue,  2 Aug 2016 09:11:14 -0700 (PDT)
Received: from tuna.sandelman.ca (tuna.sandelman.ca [209.87.249.19]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 036C312D137 for <spasm@ietf.org>; Tue,  2 Aug 2016 09:11:14 -0700 (PDT)
Received: from sandelman.ca (obiwan.sandelman.ca [IPv6:2607:f0b0:f:2::247]) by tuna.sandelman.ca (Postfix) with ESMTP id 7A6702009E; Tue,  2 Aug 2016 12:21:28 -0400 (EDT)
Received: from obiwan.sandelman.ca (localhost [IPv6:::1]) by sandelman.ca (Postfix) with ESMTP id 41D62638D1; Tue,  2 Aug 2016 12:11:13 -0400 (EDT)
From: Michael Richardson <mcr+ietf@sandelman.ca>
To: Sean Turner <sean@sn3rd.com>
In-Reply-To: <D28EFAF9-1AFF-4D06-A878-CCA9CD367F3F@sn3rd.com>
References: <011a01d1ebba$c98eabf0$5cac03d0$@augustcellars.com> <D28EFAF9-1AFF-4D06-A878-CCA9CD367F3F@sn3rd.com>
X-Mailer: MH-E 8.6; nmh 1.6+dev; GNU Emacs 24.5.1
X-Face: $\n1pF)h^`}$H>Hk{L"x@)JS7<%Az}5RyS@k9X%29-lHB$Ti.V>2bi.~ehC0; <'$9xN5Ub# z!G,p`nR&p7Fz@^UXIn156S8.~^@MJ*mMsD7=QFeq%AL4m<nPbLgmtKK-5dC@#:k
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=-=-="; micalg=pgp-sha1; protocol="application/pgp-signature"
Date: Tue, 02 Aug 2016 12:11:13 -0400
Message-ID: <2551.1470154273@obiwan.sandelman.ca>
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/ibZwarK0xiB_v3Uip_3oq61IZw8>
Cc: SPASM <spasm@ietf.org>, Jim Schaad <ietf@augustcellars.com>
Subject: Re: [Spasm] Change of Algorithms: Signature Algorithms
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 02 Aug 2016 16:11:15 -0000

--=-=-=
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable


Sean Turner <sean@sn3rd.com> wrote:
    > I=E2=80=99m sure there was a reason to include the MAYs back in the d=
ay but
    > maybe we can drop them entirely?  I mean you may shoot yourself in the
    > foot, but we don=E2=80=99t MAY that.  If they=E2=80=99re going to rem=
ain I think
    > they=E2=80=99re supposed to be "<=3D 2047=E2=80=9D otherwise 2048 is =
both a MUST an a
    > MAY.

The reason to include a MAY is so that you can interoperate with an old
product (where it was a SHOULD or MUST).  Having it in the code base doesn't
mean it is enabled...  We aren't all running browsers that can upgraded wil=
ly-nilly...

Having it in the code base, of course, might mean having a bug.

=2D-
Michael Richardson <mcr+IETF@sandelman.ca>, Sandelman Software Works
 -=3D IPv6 IoT consulting =3D-




--=-=-=
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQEVAwUBV6DGHoCLcPvd0N1lAQJxqQf/VOHXuQUhL3AIFhEChds4QBBYfACs/S6B
ZAn0l6Hz1aX+2MULAD2Z0yImnK6V9BDmuNjaUDc51XhWoF1/KYWApheIi3JWdaoY
fIQUzKDvwPZjFmLjaQbe4JL9poGSCw9w7UD6iA44h9/RmqMjsg5llkCgcNfBRVvZ
AwJ5OnX9A53RgOykxOY0k0+bQK913a2kfWyGx4USfiqpmlAb3JYFiv9d3/yb3Y31
9lp3Sz/CEmY8TnQ5KnlsVRuprC3qJUkRd30GaXYia8Wc5o0p6fivxOrO4nmHcK1h
KwtPG0b1kxvSrQH4Wz0sby3uDzVhCFgyq1eDcs84z/ZEJD2aONsuig==
=G0iX
-----END PGP SIGNATURE-----
--=-=-=--


From nobody Tue Aug  2 09:15:07 2016
Return-Path: <ietf@augustcellars.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 51A2E12D7D9 for <spasm@ietfa.amsl.com>; Tue,  2 Aug 2016 09:15:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.188
X-Spam-Level: 
X-Spam-Status: No, score=-3.188 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-1.287, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OhdOQc2D0H3e for <spasm@ietfa.amsl.com>; Tue,  2 Aug 2016 09:15:04 -0700 (PDT)
Received: from mail2.augustcellars.com (augustcellars.com [50.45.239.150]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 61C8912D7CA for <spasm@ietf.org>; Tue,  2 Aug 2016 09:15:04 -0700 (PDT)
Received: from hebrews (24.21.96.37) by mail2.augustcellars.com (192.168.0.56) with Microsoft SMTP Server (TLS) id 15.0.1178.4; Tue, 2 Aug 2016 09:26:13 -0700
From: Jim Schaad <ietf@augustcellars.com>
To: 'Michael Richardson' <mcr+ietf@sandelman.ca>
References: <011101d1ebb2$442449f0$cc6cddd0$@augustcellars.com> <CAB=JzvFRc0GTz2PDddrq6D2se2jq7L+HtQuCCApMEofqmue8Mw@mail.gmail.com> <020901d1ec26$bf698110$3e3c8330$@augustcellars.com> <13700.1470138928@obiwan.sandelman.ca>
In-Reply-To: <13700.1470138928@obiwan.sandelman.ca>
Date: Tue, 2 Aug 2016 09:14:38 -0700
Message-ID: <02fd01d1ecd8$f9dff470$ed9fdd50$@augustcellars.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQIPrQ0rVM71b5yax3rKTP2+WC5mNAIjysX2AVvHsHMClTXVv5+JsMtQ
Content-Language: en-us
X-Originating-IP: [24.21.96.37]
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/t9XHipp1GGfHmG38OiAgApOD6OQ>
Cc: 'Blake Ramsdell' <blaker@gmail.com>, 'SPASM' <spasm@ietf.org>
Subject: Re: [Spasm] Change of Algorithms: Content Encryption Algorithms
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 02 Aug 2016 16:15:06 -0000

> -----Original Message-----
> From: Spasm [mailto:spasm-bounces@ietf.org] On Behalf Of Michael
> Richardson
> Sent: Tuesday, August 02, 2016 4:55 AM
> To: Jim Schaad <ietf@augustcellars.com>
> Cc: 'Blake Ramsdell' <blaker@gmail.com>; 'SPASM' <spasm@ietf.org>
> Subject: Re: [Spasm] Change of Algorithms: Content Encryption Algorithms
> 
> 
> Jim Schaad <ietf@augustcellars.com> wrote:
>     > I would say that as a general rule, we should always have a minimum
of two
>     > MUST algorithms everywhere so that we have a backup in case of
failure.  I
>     > would therefore accept arguments about having three items but not
two
>     > items.
> 
> okay, but I don't entirely consider AES128 and AES256 to be different
algorithms.
> Depends upon the nature of the failure.  CGM (or other CTR-type
> modes) and not-CGM are more different, but, the right failure could take
them
> all out at the same time, I think.

I would agree with you that the different modes with AES are not really
different algorithms as the core primitive is the same.  I don't believe
that we are yet justified to making ChaCha20 into a MUST algorithm. 

We cannot get rid of CBC because of backwards compatibility.  We need to get
into GCM for AEAD support, which is a significant step forward.  I may be
overly agreessive about trying to jump to all 256 bit key lengths however.

Im

> 
> --
> Michael Richardson <mcr+IETF@sandelman.ca>, Sandelman Software Works  -=
> IPv6 IoT consulting =-
> 
> 



From nobody Tue Aug  2 12:11:55 2016
Return-Path: <sean@sn3rd.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A0B4212D8E5 for <spasm@ietfa.amsl.com>; Tue,  2 Aug 2016 12:11:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.701
X-Spam-Level: 
X-Spam-Status: No, score=-2.701 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=sn3rd.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tgQ2G89wLOrl for <spasm@ietfa.amsl.com>; Tue,  2 Aug 2016 12:11:52 -0700 (PDT)
Received: from mail-qk0-x233.google.com (mail-qk0-x233.google.com [IPv6:2607:f8b0:400d:c09::233]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2714412D8E6 for <spasm@ietf.org>; Tue,  2 Aug 2016 12:11:52 -0700 (PDT)
Received: by mail-qk0-x233.google.com with SMTP id s63so184207624qkb.2 for <spasm@ietf.org>; Tue, 02 Aug 2016 12:11:52 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sn3rd.com; s=google; h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=3q6O5RuyEe4pN0o87jD8+/YI6Fq562SoQuTB1GCM96o=; b=FkVMJ3xoXAhKP04Ax4FKAGCmTlqcL+qaU71R1gA/Qg/IQGaYaQfSHI6M9MIhy8QmUB ojxu93jxbFFkf2YwRTA8z/nJ4Ls+QSG7rlutmSz1hkaWtLgMkMAznkCb5AJce8OeyhZS 66x6qpvxav6Vw7rcOZMlYUftk+T4merlfhJMM=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=3q6O5RuyEe4pN0o87jD8+/YI6Fq562SoQuTB1GCM96o=; b=XSgGzrUQLoXTBc7CZfO17TWfwNo9jDmqynwm6TrA6Fx81UQfGcd/9TtAD2w2nNGKAg aqOqb+T+fc9OE/N4tQo0lLk3jBKWHZQHk8nKdMaUdNfc4YUTvR7Alp9XlAk41RYbIDvd dNv41BPUW4MGSK12hJkKJ3RuTCDhdcLAmqNJju3SsNPNtbrA+npmr6bweapMmVKTa1Rp DT58BHtuM7MCdr/HtPyJV8yRF6TUZHFB51JRdiCtmZ2M0lKqAr9njJoF5LCZOTKwqEfp KmF8TpPur8SBgnDGytn82tlOJnfRNzs7Prr8oQWKcUId2SAZwWlmCdoMwAHCmmgphXUM mypg==
X-Gm-Message-State: AEkoousroq9y5BLn9ZMsGquTpWzMu+SABB30kcSF204lxIc1jYUxp8GWnbuemrIUkVWC+w==
X-Received: by 10.55.4.133 with SMTP id 127mr79461172qke.207.1470165111213; Tue, 02 Aug 2016 12:11:51 -0700 (PDT)
Received: from [172.16.0.112] (pool-173-73-123-93.washdc.east.verizon.net. [173.73.123.93]) by smtp.gmail.com with ESMTPSA id d142sm2069239qkc.33.2016.08.02.12.11.50 (version=TLS1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Tue, 02 Aug 2016 12:11:50 -0700 (PDT)
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\))
From: Sean Turner <sean@sn3rd.com>
In-Reply-To: <2551.1470154273@obiwan.sandelman.ca>
Date: Tue, 2 Aug 2016 15:11:48 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <D9D9F4D6-9FD4-4C76-A350-6ACC04AE5510@sn3rd.com>
References: <011a01d1ebba$c98eabf0$5cac03d0$@augustcellars.com> <D28EFAF9-1AFF-4D06-A878-CCA9CD367F3F@sn3rd.com> <2551.1470154273@obiwan.sandelman.ca>
To: Michael Richardson <mcr+ietf@sandelman.ca>
X-Mailer: Apple Mail (2.3124)
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/r6aAkBRXE2cnGFb6va3f_uLT2TQ>
Cc: SPASM <spasm@ietf.org>, Jim Schaad <ietf@augustcellars.com>
Subject: Re: [Spasm] Change of Algorithms: Signature Algorithms
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 02 Aug 2016 19:11:54 -0000

On Aug 02, 2016, at 12:11, Michael Richardson <mcr+ietf@sandelman.ca> =
wrote:
>=20
>=20
> Sean Turner <sean@sn3rd.com> wrote:
>> I=E2=80=99m sure there was a reason to include the MAYs back in the =
day but
>> maybe we can drop them entirely?  I mean you may shoot yourself in =
the
>> foot, but we don=E2=80=99t MAY that.  If they=E2=80=99re going to =
remain I think
>> they=E2=80=99re supposed to be "<=3D 2047=E2=80=9D otherwise 2048 is =
both a MUST an a
>> MAY.
>=20
> The reason to include a MAY is so that you can interoperate with an =
old
> product (where it was a SHOULD or MUST).  Having it in the code base =
doesn't
> mean it is enabled...  We aren't all running browsers that can =
upgraded willy-nilly...
>=20
> Having it in the code base, of course, might mean having a bug.

I can get on board with that rationale for the MAY, but it might be =
better to be explicit about what=E2=80=99s required to interop with =
older versions.

spt=


From nobody Tue Aug  2 12:16:46 2016
Return-Path: <sean@sn3rd.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5754A12D8E8 for <spasm@ietfa.amsl.com>; Tue,  2 Aug 2016 12:16:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.701
X-Spam-Level: 
X-Spam-Status: No, score=-2.701 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=sn3rd.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VQcr8jk9GOhL for <spasm@ietfa.amsl.com>; Tue,  2 Aug 2016 12:16:43 -0700 (PDT)
Received: from mail-qk0-x22f.google.com (mail-qk0-x22f.google.com [IPv6:2607:f8b0:400d:c09::22f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E6D8712D8C1 for <spasm@ietf.org>; Tue,  2 Aug 2016 12:16:42 -0700 (PDT)
Received: by mail-qk0-x22f.google.com with SMTP id s63so184335071qkb.2 for <spasm@ietf.org>; Tue, 02 Aug 2016 12:16:42 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sn3rd.com; s=google; h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=ZcOsx0z/xirbyCfbLmGdywIfAXjIMo+2o/bBVakYDaI=; b=HwP1Ai3SzqlH8cCuYK6LwpPjaejwBTtJGHykCeZmd1GGcGWyilCu8B+C0LsxOsgO11 qmXhQeJyJQArXp8geXB2FB7KDB+dQideI2FVJdYdG+ohj09lHcJy/p3jwDLNcgRDVfQg +ZbMgliAxDetZwwxz15Fzl7Sn9Vkdksgxxj7s=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=ZcOsx0z/xirbyCfbLmGdywIfAXjIMo+2o/bBVakYDaI=; b=FvTNkLa+Py/rcdGeWRgf6y9wnUL+Pa3TKfPBKG9pOvL72M09LouupfJsD2M41cAdqL oAFge7jRq8QWKYM9pDMU8vEtFB5W9tUQVLrp+JpvLVv0GQDSPPcJX25R2OVGgylkEtEB /cyeq90LKQ2STZeG8tspePBHLLc3H4rzSsPhu/8gSermOhFPNRwlVFM09/nvcOFqnjXw dmTSWbWVQiTr2PQP2Co5+MDPwrgpa6Rxbqhdy38W9W3LvEX9rUei9g+AoiygBCEMe7t5 aRUUFM/xy0+t5VCGq6iLjReI6hZxHL+YNBwyOQ9gjPJro32fHDuMsY2XJUSxL4nMhpBG 2AQA==
X-Gm-Message-State: AEkoouulGMn/uRGxnh7NfdXYmcBqSD9rRxtCF7HVGSD78kllfAwbModeFQWf2P4j+fX3Ow==
X-Received: by 10.233.216.2 with SMTP id u2mr79703690qkf.203.1470165402075; Tue, 02 Aug 2016 12:16:42 -0700 (PDT)
Received: from [172.16.0.112] (pool-173-73-123-93.washdc.east.verizon.net. [173.73.123.93]) by smtp.gmail.com with ESMTPSA id w10sm2094925qtc.28.2016.08.02.12.16.41 (version=TLS1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Tue, 02 Aug 2016 12:16:41 -0700 (PDT)
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\))
From: Sean Turner <sean@sn3rd.com>
In-Reply-To: <02fd01d1ecd8$f9dff470$ed9fdd50$@augustcellars.com>
Date: Tue, 2 Aug 2016 15:16:40 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <A7408AF3-A4C8-4759-AEF4-6881E53A6C80@sn3rd.com>
References: <011101d1ebb2$442449f0$cc6cddd0$@augustcellars.com> <CAB=JzvFRc0GTz2PDddrq6D2se2jq7L+HtQuCCApMEofqmue8Mw@mail.gmail.com> <020901d1ec26$bf698110$3e3c8330$@augustcellars.com> <13700.1470138928@obiwan.sandelman.ca> <02fd01d1ecd8$f9dff470$ed9fdd50$@augustcellars.com>
To: Jim Schaad <ietf@augustcellars.com>
X-Mailer: Apple Mail (2.3124)
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/fhydH4us0Mlk_VcsGNwEnvr220M>
Cc: Blake Ramsdell <blaker@gmail.com>, Michael Richardson <mcr+ietf@sandelman.ca>, SPASM <spasm@ietf.org>
Subject: Re: [Spasm] Change of Algorithms: Content Encryption Algorithms
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 02 Aug 2016 19:16:44 -0000

On Aug 02, 2016, at 12:14, Jim Schaad <ietf@augustcellars.com> wrote:
>=20
>=20
>=20
>> -----Original Message-----
>> From: Spasm [mailto:spasm-bounces@ietf.org] On Behalf Of Michael
>> Richardson
>> Sent: Tuesday, August 02, 2016 4:55 AM
>> To: Jim Schaad <ietf@augustcellars.com>
>> Cc: 'Blake Ramsdell' <blaker@gmail.com>; 'SPASM' <spasm@ietf.org>
>> Subject: Re: [Spasm] Change of Algorithms: Content Encryption =
Algorithms
>>=20
>>=20
>> Jim Schaad <ietf@augustcellars.com> wrote:
>>> I would say that as a general rule, we should always have a minimum
> of two
>>> MUST algorithms everywhere so that we have a backup in case of
> failure.  I
>>> would therefore accept arguments about having three items but not
> two
>>> items.
>>=20
>> okay, but I don't entirely consider AES128 and AES256 to be different
> algorithms.
>> Depends upon the nature of the failure.  CGM (or other CTR-type
>> modes) and not-CGM are more different, but, the right failure could =
take
> them
>> all out at the same time, I think.
>=20
> I would agree with you that the different modes with AES are not =
really
> different algorithms as the core primitive is the same.  I don't =
believe
> that we are yet justified to making ChaCha20 into a MUST algorithm.=20
>=20
> We cannot get rid of CBC because of backwards compatibility.  We need =
to get
> into GCM for AEAD support, which is a significant step forward.  I may =
be
> overly agreessive about trying to jump to all 256 bit key lengths =
however.

Maybe I=E2=80=99m not on the same page as everybody else, but I=E2=80=99ve=
 been thinking that we=E2=80=99re going to add AuthEnvelopedData as the =
MUST implement for this version and retain EnvelopedData, SignedData, =
and EnvelopedData+SignedData for backward compatibility.  If that=E2=80=99=
s the case do we need to up the CBC sizes at all?

spt



From nobody Sun Aug  7 14:03:39 2016
Return-Path: <ietf@augustcellars.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5893212D591 for <spasm@ietfa.amsl.com>; Sun,  7 Aug 2016 14:03:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.147
X-Spam-Level: 
X-Spam-Status: No, score=-3.147 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RP_MATCHES_RCVD=-1.247, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wX1OzKEKvU95 for <spasm@ietfa.amsl.com>; Sun,  7 Aug 2016 14:03:36 -0700 (PDT)
Received: from mail2.augustcellars.com (augustcellars.com [50.45.239.150]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 10E2B12B069 for <spasm@ietf.org>; Sun,  7 Aug 2016 14:03:35 -0700 (PDT)
Received: from hebrews (24.21.96.37) by mail2.augustcellars.com (192.168.0.56) with Microsoft SMTP Server (TLS) id 15.0.1178.4; Sun, 7 Aug 2016 14:15:09 -0700
From: Jim Schaad <ietf@augustcellars.com>
To: 'SPASM' <spasm@ietf.org>
Date: Sun, 7 Aug 2016 14:03:04 -0700
Message-ID: <01d801d1f0ef$18a68030$49f38090$@augustcellars.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_01D9_01D1F0B4.6C4B0390"
X-Mailer: Microsoft Outlook 16.0
thread-index: AdHw7J5OEFMA7q1BRdqlI6xLCewd1g==
Content-Language: en-us
X-Originating-IP: [24.21.96.37]
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/7oI6dK5PGDboRj1xqEamWuM3LwE>
Subject: [Spasm] Change of Algorithms: Content Encryption Algorithms - Take 2
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 07 Aug 2016 21:03:38 -0000

------=_NextPart_000_01D9_01D1F0B4.6C4B0390
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit

I have looked at the responses to the original mail and am updating the mail
to reflect what I thought I saw as comments.

 

This message looks at Content Encryption Algorithms.  Please restrict your
discussions to this set of algorithms, I will be sending out messages on
other algorithm times over time.

 

Current Document for S/MIME 3.1

 

MUST: AES-128 CBC

SHOULD+: AES-192 CBC and AES-256 CBC

SHOULD-: DES EDE3 CBC (tripleDES)

Historic: RC2/40

 

Proposed for S/MIME 3.5

 

MUST:  AES-192 CBC, AES-256 CBC, AES-256 GCM

MUST-: AES-128 CBC

SHOULD+: ChaCha20/Poly1305 (256-bit)

SHOULD-: AES-128 CBC

Historic: RC2/40, DES EDE3 CBC (tripleDES)

 

Take 2 State: With this set we now have two MUST algorithms with the same
primitive.  We are indicating that we think that ChaCha20/Poly1305 will
become a MUST in the future so we have stated a potential fail over
algorithm if AES or GCM go into the tank for any reason.   More comments are
welcome.

 

Questions:

1.      The jump from MUST to SHOULD- may be too aggressive for AES-128 CBC,
we should potentially state this as MUST- but I think being aggressive makes
more sense as we want to go to all AEAD algorithms in next version.

Take 2 state: Russ said that yes I was.  As I suggested on the list I have
pushed this back up to a MUST-.

 

2.      No recommendation for: AES-128 GCM or AES-192 GCM, should there be?
How do people feel about 128 and 192 bit algorithms?

Take 2 state: List appears to say that we should not say anything about
192-bit algorithms.  However people did not comment on the -128 vs -256
question so I have left the recommendation of AES-256 GCM alone.

 

3.      Do we want to downgrade all of the CBC algorithms in favor of GCM
algorithms?

Take 2 state:  SPT is the only one who commented on this.  I have a tendency
to agree with his proposal that we are adding AEAD and we should be pushing
that as the preferred algorithm.  Making a MUST statement about AES-256 CBC
seems to counter act this statement so I have removed it.

 

Jim

 

 

 


------=_NextPart_000_01D9_01D1F0B4.6C4B0390
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" =
xmlns=3D"http://www.w3.org/TR/REC-html40"><head><meta =
http-equiv=3DContent-Type content=3D"text/html; =
charset=3Dus-ascii"><meta name=3DGenerator content=3D"Microsoft Word 15 =
(filtered medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Consolas;
	panose-1:2 11 6 9 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:#0563C1;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:#954F72;
	text-decoration:underline;}
p.MsoPlainText, li.MsoPlainText, div.MsoPlainText
	{mso-style-priority:99;
	mso-style-link:"Plain Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
span.PlainTextChar
	{mso-style-name:"Plain Text Char";
	mso-style-priority:99;
	mso-style-link:"Plain Text";
	font-family:"Calibri",sans-serif;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri",sans-serif;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:328682580;
	mso-list-type:hybrid;
	mso-list-template-ids:-128299988 67698703 67698713 67698715 67698703 =
67698713 67698715 67698703 67698713 67698715;}
@list l0:level1
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level2
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level3
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
@list l0:level4
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level5
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level6
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
@list l0:level7
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level8
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level9
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
@list l1
	{mso-list-id:1453861932;
	mso-list-type:hybrid;
	mso-list-template-ids:561307070 67698703 67698713 67698715 67698703 =
67698713 67698715 67698703 67698713 67698715;}
@list l1:level1
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l1:level2
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l1:level3
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
@list l1:level4
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l1:level5
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l1:level6
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
@list l1:level7
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l1:level8
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l1:level9
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
ol
	{margin-bottom:0in;}
ul
	{margin-bottom:0in;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US =
link=3D"#0563C1" vlink=3D"#954F72"><div class=3DWordSection1><p =
class=3DMsoPlainText>I have looked at the responses to the original mail =
and am updating the mail to reflect what I thought I saw as =
comments.<o:p></o:p></p><p class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText>This message looks at Content Encryption =
Algorithms.&nbsp; Please restrict your discussions to this set of =
algorithms, I will be sending out messages on other algorithm times over =
time.<o:p></o:p></p><p class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText>Current Document for S/MIME 3.1<o:p></o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p class=3DMsoPlainText>MUST: =
AES-128 CBC<o:p></o:p></p><p class=3DMsoPlainText>SHOULD+: AES-192 CBC =
and AES-256 CBC<o:p></o:p></p><p class=3DMsoPlainText>SHOULD-: DES EDE3 =
CBC (tripleDES)<o:p></o:p></p><p class=3DMsoPlainText>Historic: =
RC2/40<o:p></o:p></p><p class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText>Proposed for S/MIME 3.5<o:p></o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText>MUST:&nbsp; <s>AES-192 CBC, AES-256 CBC,</s> =
AES-256 GCM<o:p></o:p></p><p class=3DMsoPlainText><b>MUST-: AES-128 =
CBC<o:p></o:p></b></p><p class=3DMsoPlainText>SHOULD+: ChaCha20/Poly1305 =
(256-bit)<s><o:p></o:p></s></p><p class=3DMsoPlainText><s>SHOULD-: =
AES-128 CBC<o:p></o:p></s></p><p class=3DMsoPlainText>Historic: RC2/40, =
DES EDE3 CBC (tripleDES)<o:p></o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p class=3DMsoNormal><b>Take 2 =
State</b>: With this set we now have two MUST algorithms with the same =
primitive.&nbsp; We are indicating that we think that ChaCha20/Poly1305 =
will become a MUST in the future so we have stated a potential fail over =
algorithm if AES or GCM go into the tank for any reason.&nbsp;&nbsp; =
More comments are welcome.<o:p></o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText>Questions:<o:p></o:p></p><p class=3DMsoPlainText =
style=3D'margin-left:.5in;text-indent:-.25in;mso-list:l1 level1 =
lfo2'><![if !supportLists]><span style=3D'mso-list:Ignore'>1.<span =
style=3D'font:7.0pt "Times New Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
</span></span><![endif]>The jump from MUST to SHOULD- may be too =
aggressive for AES-128 CBC, we should potentially state this as MUST- =
but I think being aggressive makes more sense as we want to go to all =
AEAD algorithms in next version.<br><br><b>Take 2 state</b>: Russ said =
that yes I was.&nbsp; As I suggested on the list I have pushed this back =
up to a MUST-.<o:p></o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p class=3DMsoPlainText =
style=3D'margin-left:.5in;text-indent:-.25in;mso-list:l1 level1 =
lfo2'><![if !supportLists]><span style=3D'mso-list:Ignore'>2.<span =
style=3D'font:7.0pt "Times New Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
</span></span><![endif]>No recommendation for: AES-128 GCM or AES-192 =
GCM, should there be?&nbsp; How do people feel about 128 and 192 bit =
algorithms?<br><br><b>Take 2 state</b>: List appears to say that we =
should not say anything about 192-bit algorithms.&nbsp; However people =
did not comment on the -128 vs -256 question so I have left the =
recommendation of AES-256 GCM alone.<o:p></o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p class=3DMsoPlainText =
style=3D'margin-left:.5in;text-indent:-.25in;mso-list:l1 level1 =
lfo2'><![if !supportLists]><span style=3D'mso-list:Ignore'>3.<span =
style=3D'font:7.0pt "Times New Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
</span></span><![endif]>Do we want to downgrade all of the CBC =
algorithms in favor of GCM algorithms?<br><br><b>Take 2 state</b>:&nbsp; =
SPT is the only one who commented on this.&nbsp; I have a tendency to =
agree with his proposal that we are adding AEAD and we should be pushing =
that as the preferred algorithm.&nbsp; Making a MUST statement about =
AES-256 CBC seems to counter act this statement so I have removed =
it.<o:p></o:p></p><p class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText>Jim<o:p></o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p></div></body></html>
------=_NextPart_000_01D9_01D1F0B4.6C4B0390--


From nobody Sun Aug  7 14:08:32 2016
Return-Path: <blaker@gmail.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7E4A712D591 for <spasm@ietfa.amsl.com>; Sun,  7 Aug 2016 14:08:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level: 
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TR0bReNlt3vp for <spasm@ietfa.amsl.com>; Sun,  7 Aug 2016 14:08:28 -0700 (PDT)
Received: from mail-wm0-x22f.google.com (mail-wm0-x22f.google.com [IPv6:2a00:1450:400c:c09::22f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4B10B12B069 for <spasm@ietf.org>; Sun,  7 Aug 2016 14:08:28 -0700 (PDT)
Received: by mail-wm0-x22f.google.com with SMTP id o80so105210828wme.1 for <spasm@ietf.org>; Sun, 07 Aug 2016 14:08:28 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=+WbMYgZv0mMr+ryrxpu+3u0uP0hdlYePY2QUJRHpLoY=; b=i1aDKBRFW2BwRZRx/C2lIgIF43UbfmNV8Mwf6walSt5lwzskCcz2/dL5V/VUafUo/n mOOKFQelTqrQvThNPoLmudRPNLb5KneC73bxeEIlD4IHXmlIXbMdXy7lsPAXF6NCXLSn JCnEdeLKZ8D4QSqFEbw0ohSZxw7SAsvaKzPWwbKiTyfn19MWHiK5zGN3l9qI9u/gEmxV i7ltw2i12q5Y4EBKvw9cL957mUH2hUKrEw/GvGLM2RmMc4IQ2jsKBPJiX2XormCWHQdM OwYVuVJoKQ+AVBCHEVyNFrKKvDmIY6lafYMitlfDWSU6swBF94BOXczFiSHJpQU5AMEk JVTw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=+WbMYgZv0mMr+ryrxpu+3u0uP0hdlYePY2QUJRHpLoY=; b=LsypspGDO1uno8f9E/SxUpO24bzXv9VWDbPgiQoE/Pb6BxLZUmaStBtEu7rj3Akw3E +6NBzoXCrxLQzMtRmFp3VUTqkau0Vd9SPTlIvKLstQtq2KcQLAGZL293I496vdxpbM3X vzqfR1W2ZPu3eRuqdlOzOT4v5D2HbJnn1PUxlVfGdbGoFkKTONWdoBfmcFoi+t726gy7 7QLODsREnVe5BLwM/LAIVFiMVAohvmWfnOFfCOCvdZ90vBL592k61aOIrPRWzhUnGGKa dz0852HlNt4AHFb5Y4qWycEwNPoIt7nn8DBrFEVOMDc3nc9ghhhsS1Xz33qmvbWMRgea pnMg==
X-Gm-Message-State: AEkooutFt0eejGppQGFZsDyHh1XQb/SPYaRoJmt3PlYw9FqPAGBVaamShlHBRbGPu+05IkIhFfvQAI55V4zv3A==
X-Received: by 10.194.23.166 with SMTP id n6mr92219627wjf.36.1470604106755; Sun, 07 Aug 2016 14:08:26 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.194.59.35 with HTTP; Sun, 7 Aug 2016 14:08:26 -0700 (PDT)
In-Reply-To: <01d801d1f0ef$18a68030$49f38090$@augustcellars.com>
References: <01d801d1f0ef$18a68030$49f38090$@augustcellars.com>
From: Blake Ramsdell <blaker@gmail.com>
Date: Sun, 7 Aug 2016 14:08:26 -0700
Message-ID: <CAB=JzvHH-nP7axm88QTaCzWqBers5bbnToX0=r9Ys6i7VHmDpA@mail.gmail.com>
To: Jim Schaad <ietf@augustcellars.com>
Content-Type: multipart/alternative; boundary=047d7b5d9ca963753d053981b3b3
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/lfch_fowfDUtG6LyeBpZoRPbEm8>
Cc: SPASM <spasm@ietf.org>
Subject: Re: [Spasm] Change of Algorithms: Content Encryption Algorithms - Take 2
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 07 Aug 2016 21:08:30 -0000

--047d7b5d9ca963753d053981b3b3
Content-Type: text/plain; charset=UTF-8

+1 plus another one if allowed. I'm happy with this structure.

On Sun, Aug 7, 2016 at 2:03 PM, Jim Schaad <ietf@augustcellars.com> wrote:

> I have looked at the responses to the original mail and am updating the
> mail to reflect what I thought I saw as comments.
>
>
>
> This message looks at Content Encryption Algorithms.  Please restrict your
> discussions to this set of algorithms, I will be sending out messages on
> other algorithm times over time.
>
>
>
> Current Document for S/MIME 3.1
>
>
>
> MUST: AES-128 CBC
>
> SHOULD+: AES-192 CBC and AES-256 CBC
>
> SHOULD-: DES EDE3 CBC (tripleDES)
>
> Historic: RC2/40
>
>
>
> Proposed for S/MIME 3.5
>
>
>
> MUST:  AES-192 CBC, AES-256 CBC, AES-256 GCM
>
> *MUST-: AES-128 CBC*
>
> SHOULD+: ChaCha20/Poly1305 (256-bit)
>
> SHOULD-: AES-128 CBC
>
> Historic: RC2/40, DES EDE3 CBC (tripleDES)
>
>
>
> *Take 2 State*: With this set we now have two MUST algorithms with the
> same primitive.  We are indicating that we think that ChaCha20/Poly1305
> will become a MUST in the future so we have stated a potential fail over
> algorithm if AES or GCM go into the tank for any reason.   More comments
> are welcome.
>
>
>
> Questions:
>
> 1.      The jump from MUST to SHOULD- may be too aggressive for AES-128
> CBC, we should potentially state this as MUST- but I think being aggressive
> makes more sense as we want to go to all AEAD algorithms in next version.
>
> *Take 2 state*: Russ said that yes I was.  As I suggested on the list I
> have pushed this back up to a MUST-.
>
>
>
> 2.      No recommendation for: AES-128 GCM or AES-192 GCM, should there
> be?  How do people feel about 128 and 192 bit algorithms?
>
> *Take 2 state*: List appears to say that we should not say anything about
> 192-bit algorithms.  However people did not comment on the -128 vs -256
> question so I have left the recommendation of AES-256 GCM alone.
>
>
>
> 3.      Do we want to downgrade all of the CBC algorithms in favor of GCM
> algorithms?
>
> *Take 2 state*:  SPT is the only one who commented on this.  I have a
> tendency to agree with his proposal that we are adding AEAD and we should
> be pushing that as the preferred algorithm.  Making a MUST statement about
> AES-256 CBC seems to counter act this statement so I have removed it.
>
>
>
> Jim
>
>
>
>
>
>
>
> _______________________________________________
> Spasm mailing list
> Spasm@ietf.org
> https://www.ietf.org/mailman/listinfo/spasm
>
>

--047d7b5d9ca963753d053981b3b3
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">+1 plus another one if allowed. I&#39;m happy with this st=
ructure.<div class=3D"gmail_extra"><br><div class=3D"gmail_quote">On Sun, A=
ug 7, 2016 at 2:03 PM, Jim Schaad <span dir=3D"ltr">&lt;<a href=3D"mailto:i=
etf@augustcellars.com" target=3D"_blank">ietf@augustcellars.com</a>&gt;</sp=
an> wrote:<br><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;=
border-left:1px #ccc solid;padding-left:1ex"><div lang=3D"EN-US" link=3D"#0=
563C1" vlink=3D"#954F72"><div><p>I have looked at the responses to the orig=
inal mail and am updating the mail to reflect what I thought I saw as comme=
nts.<u></u><u></u></p><p><u></u>=C2=A0<u></u></p><p>This message looks at C=
ontent Encryption Algorithms.=C2=A0 Please restrict your discussions to thi=
s set of algorithms, I will be sending out messages on other algorithm time=
s over time.<u></u><u></u></p><p><u></u>=C2=A0<u></u></p><p>Current Documen=
t for S/MIME 3.1<u></u><u></u></p><p><u></u>=C2=A0<u></u></p><p>MUST: AES-1=
28 CBC<u></u><u></u></p><p>SHOULD+: AES-192 CBC and AES-256 CBC<u></u><u></=
u></p><p>SHOULD-: DES EDE3 CBC (tripleDES)<u></u><u></u></p><p>Historic: RC=
2/40<u></u><u></u></p><p><u></u>=C2=A0<u></u></p><p>Proposed for S/MIME 3.5=
<u></u><u></u></p><p><u></u>=C2=A0<u></u></p><p>MUST:=C2=A0 <s>AES-192 CBC,=
 AES-256 CBC,</s> AES-256 GCM<u></u><u></u></p><p><b>MUST-: AES-128 CBC<u><=
/u><u></u></b></p><p>SHOULD+: ChaCha20/Poly1305 (256-bit)<s><u></u><u></u><=
/s></p><p><s>SHOULD-: AES-128 CBC<u></u><u></u></s></p><p>Historic: RC2/40,=
 DES EDE3 CBC (tripleDES)<u></u><u></u></p><p><u></u>=C2=A0<u></u></p><p cl=
ass=3D"MsoNormal"><b>Take 2 State</b>: With this set we now have two MUST a=
lgorithms with the same primitive.=C2=A0 We are indicating that we think th=
at ChaCha20/Poly1305 will become a MUST in the future so we have stated a p=
otential fail over algorithm if AES or GCM go into the tank for any reason.=
=C2=A0=C2=A0 More comments are welcome.<u></u><u></u></p><p><u></u>=C2=A0<u=
></u></p><p>Questions:<u></u><u></u></p><p style=3D"margin-left:.5in"><u></=
u><span>1.<span style=3D"font:7.0pt &quot;Times New Roman&quot;">=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0 </span></span><u></u>The jump from MUST to SHOULD- ma=
y be too aggressive for AES-128 CBC, we should potentially state this as MU=
ST- but I think being aggressive makes more sense as we want to go to all A=
EAD algorithms in next version.<br><br><b>Take 2 state</b>: Russ said that =
yes I was.=C2=A0 As I suggested on the list I have pushed this back up to a=
 MUST-.<u></u><u></u></p><p><u></u>=C2=A0<u></u></p><p style=3D"margin-left=
:.5in"><u></u><span>2.<span style=3D"font:7.0pt &quot;Times New Roman&quot;=
">=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 </span></span><u></u>No recommendation for=
: AES-128 GCM or AES-192 GCM, should there be?=C2=A0 How do people feel abo=
ut 128 and 192 bit algorithms?<br><br><b>Take 2 state</b>: List appears to =
say that we should not say anything about 192-bit algorithms.=C2=A0 However=
 people did not comment on the -128 vs -256 question so I have left the rec=
ommendation of AES-256 GCM alone.<u></u><u></u></p><p><u></u>=C2=A0<u></u><=
/p><p style=3D"margin-left:.5in"><u></u><span>3.<span style=3D"font:7.0pt &=
quot;Times New Roman&quot;">=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 </span></span><u=
></u>Do we want to downgrade all of the CBC algorithms in favor of GCM algo=
rithms?<br><br><b>Take 2 state</b>:=C2=A0 SPT is the only one who commented=
 on this.=C2=A0 I have a tendency to agree with his proposal that we are ad=
ding AEAD and we should be pushing that as the preferred algorithm.=C2=A0 M=
aking a MUST statement about AES-256 CBC seems to counter act this statemen=
t so I have removed it.<span class=3D"HOEnZb"><font color=3D"#888888"><u></=
u><u></u></font></span></p><span class=3D"HOEnZb"><font color=3D"#888888"><=
p><u></u>=C2=A0<u></u></p><p>Jim<u></u><u></u></p><p><u></u>=C2=A0<u></u></=
p><p><u></u>=C2=A0<u></u></p><p><u></u>=C2=A0<u></u></p></font></span></div=
></div><br>______________________________<wbr>_________________<br>
Spasm mailing list<br>
<a href=3D"mailto:Spasm@ietf.org">Spasm@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/spasm" rel=3D"noreferrer" =
target=3D"_blank">https://www.ietf.org/mailman/<wbr>listinfo/spasm</a><br>
<br></blockquote></div><br></div></div>

--047d7b5d9ca963753d053981b3b3--


From nobody Sun Aug  7 14:54:40 2016
Return-Path: <ietf@augustcellars.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 01F0812D5A4 for <spasm@ietfa.amsl.com>; Sun,  7 Aug 2016 14:54:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.147
X-Spam-Level: 
X-Spam-Status: No, score=-3.147 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RP_MATCHES_RCVD=-1.247, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jYYZyA1doWqP for <spasm@ietfa.amsl.com>; Sun,  7 Aug 2016 14:54:35 -0700 (PDT)
Received: from mail2.augustcellars.com (augustcellars.com [50.45.239.150]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0707B12D593 for <spasm@ietf.org>; Sun,  7 Aug 2016 14:54:35 -0700 (PDT)
Received: from hebrews (24.21.96.37) by mail2.augustcellars.com (192.168.0.56) with Microsoft SMTP Server (TLS) id 15.0.1178.4; Sun, 7 Aug 2016 15:06:09 -0700
From: Jim Schaad <ietf@augustcellars.com>
To: 'SPASM' <spasm@ietf.org>
Date: Sun, 7 Aug 2016 14:54:04 -0700
Message-ID: <01eb01d1f0f6$383f5230$a8bdf690$@augustcellars.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_01EC_01D1F0BB.8BE24EF0"
X-Mailer: Microsoft Outlook 16.0
thread-index: AdHw7zjRr7pNe4uWRVmZLKRppVz4Xw==
Content-Language: en-us
X-Originating-IP: [24.21.96.37]
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/ak8YSMQwPd1aQCaYHQXxIgDLrzw>
Subject: [Spasm] Change of Algorithms: Signature Algorithms Take 2
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 07 Aug 2016 21:54:38 -0000

------=_NextPart_000_01EC_01D1F0BB.8BE24EF0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit

This message looks at Signature Algorithms.  Please restrict your
discussions to this set of algorithms, I will be sending out messages on
other algorithms over time.

 

Current Document for S/MIME 3.1

 

MUST:   RSA w/ SHA-256

SHOULD+:  DSA w/ SHA-256, RSASSA-PSS w/ SHA-256

SHOULD-:  RSA w/ SHA-1, DSA w/SHA-1, RSA w/ MD5

Historic:

 

Key Sizes:

RSA and DSA - sign

SHOULD NOT            Key size <= 1023

SHOULD      1024 <= key size <= 2048

MAY            2048 < key size   

 

RSA and DSA - Verify

MAY                key size <= 1023

MUST      1024 <= key size <= 2048

MAY        2048 < key size

 

RSA - Certificate Verify

MAY             key size <= 1023

MUST  1024 <= key size <= 4096

MAY      4096  < key size

 

DSA - Certificate Verify

MAY             key size <= 1023

MUST    1024 <= key size <= 3072

 

 

 

Proposed for S/MIME 3.5

 

MUST: RSA-PSS w/ SHA-256, ECDSA P-256 w/ SHA-256, EdDSA25519

MUST-: RSA w/ SHA-256

SHOULD+:

SHOULD:  RSA-PSS w/ SHA-512, ECDSA P-521 w/ SHA-256512, EdDSA448

SHOULD-: DSA w/ SHA-256

Historic: RSA w/ SHA-1, DSA w/ SHA-1, RSA w/ MD5, DSA w/ SHA-256

 

Key Sizes:

RSA and DSA - sign

SHOULD NOT            Key size <= 2048 2047

SHOULD      2048 <= key size <= 4096

MAY             4096 < key size   

 

RSA and DSA - Verify

Historic MAY                key size <= 2048 2047

MUST      2048 <= key size <= 4096

MAY        4096 < key size

 

RSA - Certificate Verify

Historic MAY             key size <= 2048 2047

MUST  2048 <= key size <= 4096

MAY      4096  < key size

 

DSA - Certificate Verify

Historic MAY             key size <= 1023

Historic MUST   1024 <= key size <= 3072

 

 

Questions:

 

1.      Should DSA be dropped to historic for messages and just left as
SHOULD- for certificates, I don't know how many DSA certificates actually
exist.

Take 2 state: I have removed all DSA from the current set of algorithms for
both messages and certificates.  This is now historic only

 

2.      I have changed to lower limits on RSA but not DSA for certificate
verification - should it be changed as well?  Again I don't know how many
DSA certificates exist.

Take 2 state: I have removed DSA certificates to historic so the question is
moot.

 

3.      I don't think that any statements for ECDSA on key size need to be
made separately from the algorithm support list.  Does anybody disagree?

Take 2 state:  Nobody said anything to the contrary.  So no plans to make a
key size section for ECDSA algorithms.

 

4.      NEW: SPT suggested that we should not be making any statements on
doing anything with 512 hash values.  (Although with tons of standard snark
:)).   My reasoning for including this was less to do with the fact that I
thought the 512-bit hash functions were more efficient on 64-bit hardware (a
statement that I cannot find support for with a quick web search for SHA-2)
and therefore it made sense from a throughput point of view.   I don't think
we need the for security and if they are not more efficient I would be in
favor not making them SHOULDs

 

5.      NEW:  Blake has complained about the number of MUST algorithms that
comes out from this list.  There are effectively 4 in the list above, as
opposed to the 1 that is in the current set of documents.  We cannot kill
the current MUST so it has to stay.  However, all of the new MUSTs could be
downgraded from MUST to SHOULD without out any problems.  The only issue is
that one of them needs to be a MUST so that we have a true MUST not just a
MUST- algorithm.  Looking at the list my breakdown would be:

 

*        RSA-PSS - Given that it has been slow on update the only reason to
have it be a MUST is that most people are probably going to have RSA keys
today.  There are some arguments that say RSA-PSS is no better than RSA-v1.5
when doing real-world analysis.  I don't know that I agree with this as I
have problems with arguments by analogy.   This could easily be a SHOULD
instead of a MUST

*        ECDSA - This is the world of NIST requirements today.  I think this
justifies it being a MUST

*        EdDSA - This is the world of NOT MIST requirements today.  I think
this justifies it being a MUST

 

Jim

 


------=_NextPart_000_01EC_01D1F0BB.8BE24EF0
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" =
xmlns=3D"http://www.w3.org/TR/REC-html40"><head><meta =
http-equiv=3DContent-Type content=3D"text/html; =
charset=3Dus-ascii"><meta name=3DGenerator content=3D"Microsoft Word 15 =
(filtered medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Consolas;
	panose-1:2 11 6 9 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:#0563C1;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:#954F72;
	text-decoration:underline;}
p.MsoPlainText, li.MsoPlainText, div.MsoPlainText
	{mso-style-priority:99;
	mso-style-link:"Plain Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
	{mso-style-priority:34;
	margin-top:0in;
	margin-right:0in;
	margin-bottom:0in;
	margin-left:.5in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
span.PlainTextChar
	{mso-style-name:"Plain Text Char";
	mso-style-priority:99;
	mso-style-link:"Plain Text";
	font-family:"Calibri",sans-serif;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri",sans-serif;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:1545874233;
	mso-list-type:hybrid;
	mso-list-template-ids:-590992608 67698703 67698713 67698715 67698703 =
67698713 67698715 67698703 67698713 67698715;}
@list l0:level1
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level2
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level3
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
@list l0:level4
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level5
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level6
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
@list l0:level7
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level8
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level9
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
@list l1
	{mso-list-id:1967005662;
	mso-list-type:hybrid;
	mso-list-template-ids:1541186034 67698703 67698689 67698715 67698689 =
67698713 67698715 67698703 67698713 67698715;}
@list l1:level1
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l1:level2
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Symbol;}
@list l1:level3
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
@list l1:level4
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Symbol;}
@list l1:level5
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l1:level6
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
@list l1:level7
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l1:level8
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l1:level9
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
ol
	{margin-bottom:0in;}
ul
	{margin-bottom:0in;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US =
link=3D"#0563C1" vlink=3D"#954F72"><div class=3DWordSection1><p =
class=3DMsoPlainText>This message looks at Signature Algorithms.&nbsp; =
Please restrict your discussions to this set of algorithms, I will be =
sending out messages on other algorithms over time.<o:p></o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText>Current Document for S/MIME 3.1<o:p></o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText>MUST:&nbsp;&nbsp; RSA w/ SHA-256<o:p></o:p></p><p =
class=3DMsoPlainText>SHOULD+:&nbsp; DSA w/ SHA-256, RSASSA-PSS w/ =
SHA-256<o:p></o:p></p><p class=3DMsoPlainText>SHOULD-:&nbsp; RSA w/ =
SHA-1, DSA w/SHA-1, RSA w/ MD5<o:p></o:p></p><p =
class=3DMsoPlainText>Historic:<o:p></o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p class=3DMsoPlainText>Key =
Sizes:<o:p></o:p></p><p class=3DMsoPlainText>RSA and DSA - =
sign<o:p></o:p></p><p class=3DMsoPlainText>SHOULD =
NOT&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
Key size &lt;=3D 1023<o:p></o:p></p><p =
class=3DMsoPlainText>SHOULD&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 1024 &lt;=3D =
key size &lt;=3D 2048<o:p></o:p></p><p =
class=3DMsoPlainText>MAY&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp; 2048 &lt; key size&nbsp;&nbsp; <o:p></o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p class=3DMsoPlainText>RSA =
and DSA - Verify<o:p></o:p></p><p =
class=3DMsoPlainText>MAY&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; key size &lt;=3D =
1023<o:p></o:p></p><p =
class=3DMsoPlainText>MUST&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 1024 &lt;=3D key =
size &lt;=3D 2048<o:p></o:p></p><p =
class=3DMsoPlainText>MAY&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 2048 =
&lt; key size<o:p></o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p class=3DMsoPlainText>RSA - =
Certificate Verify<o:p></o:p></p><p =
class=3DMsoPlainText>MAY&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp; key size &lt;=3D 1023<o:p></o:p></p><p =
class=3DMsoPlainText>MUST&nbsp; 1024 &lt;=3D key size &lt;=3D =
4096<o:p></o:p></p><p =
class=3DMsoPlainText>MAY&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 4096&nbsp; &lt; =
key size<o:p></o:p></p><p class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText>DSA - Certificate Verify<o:p></o:p></p><p =
class=3DMsoPlainText>MAY&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp; key size &lt;=3D 1023<o:p></o:p></p><p =
class=3DMsoPlainText>MUST&nbsp;&nbsp;&nbsp; 1024 &lt;=3D key size =
&lt;=3D 3072<o:p></o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText>Proposed for S/MIME 3.5<o:p></o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p class=3DMsoPlainText>MUST: =
RSA-PSS w/ SHA-256, ECDSA P-256 w/ SHA-256, EdDSA25519<o:p></o:p></p><p =
class=3DMsoPlainText>MUST-: RSA w/ SHA-256<o:p></o:p></p><p =
class=3DMsoPlainText>SHOULD+:<o:p></o:p></p><p =
class=3DMsoPlainText>SHOULD:&nbsp; RSA-PSS w/ SHA-512, ECDSA P-521 w/ =
SHA-<s>256</s><b>512</b>, EdDSA448<o:p></o:p></p><p =
class=3DMsoPlainText>SHOULD-: <s>DSA w/ SHA-256</s><o:p></o:p></p><p =
class=3DMsoPlainText>Historic: RSA w/ SHA-1, DSA w/ SHA-1, RSA w/ MD5, =
<b>DSA w/ SHA-256</b><o:p></o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p class=3DMsoPlainText>Key =
Sizes:<o:p></o:p></p><p class=3DMsoPlainText>RSA <s>and DSA</s> - =
sign<o:p></o:p></p><p class=3DMsoPlainText>SHOULD =
NOT&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
Key size &lt;=3D <s>2048</s> <b>2047<o:p></o:p></b></p><p =
class=3DMsoPlainText>SHOULD&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 2048 &lt;=3D =
key size &lt;=3D 4096<o:p></o:p></p><p =
class=3DMsoPlainText>MAY&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp; 4096 &lt; key size&nbsp;&nbsp; <o:p></o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p class=3DMsoPlainText>RSA =
<s>and DSA</s> - Verify<o:p></o:p></p><p =
class=3DMsoPlainText><b>Historic =
</b>MAY&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp; key size &lt;=3D <s>2048</s> =
<b>2047<o:p></o:p></b></p><p =
class=3DMsoPlainText>MUST&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 2048 &lt;=3D key =
size &lt;=3D 4096<o:p></o:p></p><p =
class=3DMsoPlainText>MAY&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 4096 =
&lt; key size<o:p></o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p class=3DMsoPlainText>RSA - =
Certificate Verify<o:p></o:p></p><p class=3DMsoPlainText><b>Historic =
</b>MAY&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp; key size &lt;=3D <s>2048</s> <b>2047<o:p></o:p></b></p><p =
class=3DMsoPlainText>MUST&nbsp; 2048 &lt;=3D key size &lt;=3D =
4096<o:p></o:p></p><p =
class=3DMsoPlainText>MAY&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 4096&nbsp; &lt; =
key size<o:p></o:p></p><p class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText>DSA - Certificate Verify<o:p></o:p></p><p =
class=3DMsoPlainText><b>Historic =
</b>MAY&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp; key size &lt;=3D 1023<o:p></o:p></p><p =
class=3DMsoPlainText><b>Historic </b>MUST&nbsp;&nbsp; 1024 &lt;=3D key =
size &lt;=3D 3072<o:p></o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText>Questions:<o:p></o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p class=3DMsoPlainText =
style=3D'margin-left:.5in;text-indent:-.25in;mso-list:l1 level1 =
lfo2'><![if !supportLists]><span style=3D'mso-list:Ignore'>1.<span =
style=3D'font:7.0pt "Times New Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
</span></span><![endif]>Should DSA be dropped to historic for messages =
and just left as SHOULD- for certificates, I don't know how many DSA =
certificates actually exist.<br><br><b>Take 2 state: </b>I have removed =
all DSA from the current set of algorithms for both messages and =
certificates.&nbsp; This is now historic only<o:p></o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p class=3DMsoPlainText =
style=3D'margin-left:.5in;text-indent:-.25in;mso-list:l1 level1 =
lfo2'><![if !supportLists]><span style=3D'mso-list:Ignore'>2.<span =
style=3D'font:7.0pt "Times New Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
</span></span><![endif]>I have changed to lower limits on RSA but not =
DSA for certificate verification - should it be changed as well?&nbsp; =
Again I don't know how many DSA certificates exist.<br><br><b>Take 2 =
state: </b>I have removed DSA certificates to historic so the question =
is moot.<o:p></o:p></p><p class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText =
style=3D'margin-left:.5in;text-indent:-.25in;mso-list:l1 level1 =
lfo2'><![if !supportLists]><span style=3D'mso-list:Ignore'>3.<span =
style=3D'font:7.0pt "Times New Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
</span></span><![endif]>I don't think that any statements for ECDSA on =
key size need to be made separately from the algorithm support =
list.&nbsp; Does anybody disagree?<br><br><b>Take 2 state:</b>&nbsp; =
Nobody said anything to the contrary.&nbsp; So no plans to make a key =
size section for ECDSA algorithms.<o:p></o:p></p><p =
class=3DMsoListParagraph><o:p>&nbsp;</o:p></p><p class=3DMsoPlainText =
style=3D'margin-left:.5in;text-indent:-.25in;mso-list:l1 level1 =
lfo2'><![if !supportLists]><span style=3D'mso-list:Ignore'>4.<span =
style=3D'font:7.0pt "Times New Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
</span></span><![endif]><b>NEW: </b>SPT suggested that we should not be =
making any statements on doing anything with 512 hash values.&nbsp; =
(Although with tons of standard snark <span =
style=3D'font-family:Wingdings'>J</span>).&nbsp;&nbsp; My reasoning for =
including this was less to do with the fact that I thought the 512-bit =
hash functions were more efficient on 64-bit hardware (a statement that =
I cannot find support for with a quick web search for SHA-2) and =
therefore it made sense from a throughput point of view.&nbsp;&nbsp; I =
don&#8217;t think we need the for security and if they are not more =
efficient I would be in favor not making them SHOULDs<o:p></o:p></p><p =
class=3DMsoListParagraph><o:p>&nbsp;</o:p></p><p class=3DMsoPlainText =
style=3D'margin-left:.5in;text-indent:-.25in;mso-list:l1 level1 =
lfo2'><![if !supportLists]><span style=3D'mso-list:Ignore'>5.<span =
style=3D'font:7.0pt "Times New Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
</span></span><![endif]><b>NEW:</b> &nbsp;Blake has complained about the =
number of MUST algorithms that comes out from this list.&nbsp; There are =
effectively 4 in the list above, as opposed to the 1 that is in the =
current set of documents.&nbsp; We cannot kill the current MUST so it =
has to stay.&nbsp; However, all of the new MUSTs could be downgraded =
from MUST to SHOULD without out any problems.&nbsp; The only issue is =
that one of them needs to be a MUST so that we have a true MUST not just =
a MUST- algorithm.&nbsp; Looking at the list my breakdown would =
be:<o:p></o:p></p><p class=3DMsoListParagraph><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText =
style=3D'margin-left:1.0in;text-indent:-.25in;mso-list:l1 level2 =
lfo2'><![if !supportLists]><span style=3D'font-family:Symbol'><span =
style=3D'mso-list:Ignore'>&middot;<span style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
</span></span></span><![endif]>RSA-PSS &#8211; Given that it has been =
slow on update the only reason to have it be a MUST is that most people =
are probably going to have RSA keys today.&nbsp; There are some =
arguments that say RSA-PSS is no better than RSA-v1.5 when doing =
real-world analysis.&nbsp; I don&#8217;t know that I agree with this as =
I have problems with arguments by analogy.&nbsp;&nbsp; This could easily =
be a SHOULD instead of a MUST<o:p></o:p></p><p class=3DMsoPlainText =
style=3D'margin-left:1.0in;text-indent:-.25in;mso-list:l1 level2 =
lfo2'><![if !supportLists]><span style=3D'font-family:Symbol'><span =
style=3D'mso-list:Ignore'>&middot;<span style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
</span></span></span><![endif]>ECDSA &#8211; This is the world of NIST =
requirements today.&nbsp; I think this justifies it being a =
MUST<o:p></o:p></p><p class=3DMsoPlainText =
style=3D'margin-left:1.0in;text-indent:-.25in;mso-list:l1 level2 =
lfo2'><![if !supportLists]><span style=3D'font-family:Symbol'><span =
style=3D'mso-list:Ignore'>&middot;<span style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
</span></span></span><![endif]>EdDSA &#8211; This is the world of NOT =
MIST requirements today.&nbsp; I think this justifies it being a =
MUST<o:p></o:p></p><p class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText>Jim<o:p></o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p></div></body></html>
------=_NextPart_000_01EC_01D1F0BB.8BE24EF0--


From nobody Sun Aug  7 15:49:25 2016
Return-Path: <mcr+ietf@sandelman.ca>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A116A12D10F for <spasm@ietfa.amsl.com>; Sun,  7 Aug 2016 15:49:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.148
X-Spam-Level: 
X-Spam-Status: No, score=-3.148 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, RP_MATCHES_RCVD=-1.247, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id x3D-234PRvZV for <spasm@ietfa.amsl.com>; Sun,  7 Aug 2016 15:49:23 -0700 (PDT)
Received: from tuna.sandelman.ca (tuna.sandelman.ca [209.87.249.19]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4D3AF12B019 for <spasm@ietf.org>; Sun,  7 Aug 2016 15:49:23 -0700 (PDT)
Received: from sandelman.ca (obiwan.sandelman.ca [IPv6:2607:f0b0:f:2::247]) by tuna.sandelman.ca (Postfix) with ESMTP id 0C2E52009E for <spasm@ietf.org>; Sun,  7 Aug 2016 18:59:55 -0400 (EDT)
Received: from obiwan.sandelman.ca (localhost [IPv6:::1]) by sandelman.ca (Postfix) with ESMTP id 129D7638BE for <spasm@ietf.org>; Sun,  7 Aug 2016 18:49:22 -0400 (EDT)
From: Michael Richardson <mcr+ietf@sandelman.ca>
To: "'SPASM'" <spasm@ietf.org>
In-Reply-To: <01eb01d1f0f6$383f5230$a8bdf690$@augustcellars.com>
References: <01eb01d1f0f6$383f5230$a8bdf690$@augustcellars.com>
X-Mailer: MH-E 8.6; nmh 1.6+dev; GNU Emacs 24.5.1
X-Face: $\n1pF)h^`}$H>Hk{L"x@)JS7<%Az}5RyS@k9X%29-lHB$Ti.V>2bi.~ehC0; <'$9xN5Ub# z!G,p`nR&p7Fz@^UXIn156S8.~^@MJ*mMsD7=QFeq%AL4m<nPbLgmtKK-5dC@#:k
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=-=-="; micalg=pgp-sha1; protocol="application/pgp-signature"
Date: Sun, 07 Aug 2016 18:49:22 -0400
Message-ID: <2146.1470610162@obiwan.sandelman.ca>
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/vAxIjNkIwZe37flLQ4hjnHDgN2Y>
Subject: Re: [Spasm] Change of Algorithms: Signature Algorithms Take 2
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 07 Aug 2016 22:49:24 -0000

--=-=-=
Content-Type: text/plain


Jim Schaad <ietf@augustcellars.com> wrote:
    > This message looks at Signature Algorithms. Please restrict your
    > discussions to this set of algorithms, I will be sending out messages
    > on other algorithms over time.

    > Current Document for S/MIME 3.1

    > MUST: RSA w/ SHA-256

    > SHOULD+: DSA w/ SHA-256,

DSA has been limited to 1024 keys.
I think that this limit was removed, but I'd like to know what you intended
here?  I guess I also don't understand the 3.1/3.5 distinction. That's my
ignorance.

I see that you have been trying to capture a key difference between
encryption at rest (emails on disk) from IPsec/TLS.  We clearly need
to be able to look at email that was encrypted years (decades..) ago.
I think that the presentation of this distinction might need more clarity.

    > Questions:

    > 1. Should DSA be dropped to historic for messages and just left as
    > SHOULD- for certificates, I don't know how many DSA certificates
    > actually exist.

By "DSA certificates", do you mean end-users here?
For awhile, DSA was considered "more secure" by many EU based open source
crypto packages. (Not something I agreed with)
I don't know how many of those keys were used to create S/MIME messages.

--
Michael Richardson <mcr+IETF@sandelman.ca>, Sandelman Software Works
 -= IPv6 IoT consulting =-




--=-=-=
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQEVAwUBV6e674CLcPvd0N1lAQKP0wgAh+cvOlKvMfJwktf0kmr2T8H53jzLYkOP
Qzg30+0XTqIEYSdUG1PXheJ/AKiqvu7eUREZ8jCJ2Z5PSlo3v15UbKz4I4HyAyV9
4fwyDfzfKVbz6dBs/TYvQrgDryzIku8yb0Z3MmDwC0HBQWLL5JHgGNEy8cpl1V79
NtF8hwYkhUs+T70Wy5TxVk9qXEfOuiUc+CumX+Na0RYsjBcoTSXgeeWfC4O/ymj2
DFBZKco6HgluUxC8YKOPsavuPJ67rVZTNMxMgDe3oAUhDmLHRL/a0DkK7N+g0uHV
oYPKCu46saqGBqfzdRFM8jbZi0ep+GkkUMVCamMlv/jqNc+3yEFZXA==
=v2UR
-----END PGP SIGNATURE-----
--=-=-=--


From nobody Sun Aug  7 16:08:39 2016
Return-Path: <ietf@augustcellars.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2561C12D177 for <spasm@ietfa.amsl.com>; Sun,  7 Aug 2016 16:08:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.148
X-Spam-Level: 
X-Spam-Status: No, score=-3.148 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-1.247, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ctjh3oXpSAdo for <spasm@ietfa.amsl.com>; Sun,  7 Aug 2016 16:08:36 -0700 (PDT)
Received: from mail2.augustcellars.com (augustcellars.com [50.45.239.150]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 78BDF12D12E for <spasm@ietf.org>; Sun,  7 Aug 2016 16:08:36 -0700 (PDT)
Received: from hebrews (24.21.96.37) by mail2.augustcellars.com (192.168.0.56) with Microsoft SMTP Server (TLS) id 15.0.1178.4; Sun, 7 Aug 2016 16:20:09 -0700
From: Jim Schaad <ietf@augustcellars.com>
To: 'Michael Richardson' <mcr+ietf@sandelman.ca>, 'SPASM' <spasm@ietf.org>
References: <01eb01d1f0f6$383f5230$a8bdf690$@augustcellars.com> <2146.1470610162@obiwan.sandelman.ca>
In-Reply-To: <2146.1470610162@obiwan.sandelman.ca>
Date: Sun, 7 Aug 2016 16:08:04 -0700
Message-ID: <01ff01d1f100$8eceda30$ac6c8e90$@augustcellars.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Outlook 16.0
thread-index: AQH6Zs1F+AZ+g9clK0MJDseClGlVVAGLZEuon+DWkPA=
Content-Language: en-us
X-Originating-IP: [24.21.96.37]
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/cfxij18phKljzPimHYQo6aEZARo>
Subject: Re: [Spasm] Change of Algorithms: Signature Algorithms Take 2
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 07 Aug 2016 23:08:38 -0000

> -----Original Message-----
> From: Spasm [mailto:spasm-bounces@ietf.org] On Behalf Of Michael
> Richardson
> Sent: Sunday, August 07, 2016 3:49 PM
> To: 'SPASM' <spasm@ietf.org>
> Subject: Re: [Spasm] Change of Algorithms: Signature Algorithms Take 2
> 
> 
> Jim Schaad <ietf@augustcellars.com> wrote:
>     > This message looks at Signature Algorithms. Please restrict your
>     > discussions to this set of algorithms, I will be sending out
messages
>     > on other algorithms over time.
> 
>     > Current Document for S/MIME 3.1
> 
>     > MUST: RSA w/ SHA-256
> 
>     > SHOULD+: DSA w/ SHA-256,
> 
> DSA has been limited to 1024 keys.
> I think that this limit was removed, but I'd like to know what you
intended here?
> I guess I also don't understand the 3.1/3.5 distinction. That's my
ignorance.

Yes, this limit was removed.  NIST defined a DSA key size for use with the
SHA-2 algorithms.

> 
> I see that you have been trying to capture a key difference between
encryption
> at rest (emails on disk) from IPsec/TLS.  We clearly need to be able to
look at
> email that was encrypted years (decades..) ago.
> I think that the presentation of this distinction might need more clarity.

I think you need to be looking at the document rather than these mails to
get this distinction.  S/MIME 3.1 was published as an RFC in 2009.  We are
in the process of doing an update of these RFCs and thus we are looking at
the difference between what was said then (3.1) and what we want to say in
the new document (3.5).

Old email is covered by the category "Historic".

> 
>     > Questions:
> 
>     > 1. Should DSA be dropped to historic for messages and just left as
>     > SHOULD- for certificates, I don't know how many DSA certificates
>     > actually exist.
> 
> By "DSA certificates", do you mean end-users here?
> For awhile, DSA was considered "more secure" by many EU based open source
> crypto packages. (Not something I agreed with) I don't know how many of
those
> keys were used to create S/MIME messages.

No, we are looking at DSA certificates throughout the entire certificate
chain.  When I say certificates, I am talking about certificates and not
email.  This is why the sentence draws a distinction between certificates
and messages.

Jim


> 
> --
> Michael Richardson <mcr+IETF@sandelman.ca>, Sandelman Software Works  -=
> IPv6 IoT consulting =-
> 
> 



From nobody Sun Aug  7 19:35:01 2016
Return-Path: <ietf@augustcellars.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A286F12D50D for <spasm@ietfa.amsl.com>; Sun,  7 Aug 2016 19:34:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.148
X-Spam-Level: 
X-Spam-Status: No, score=-3.148 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-1.247, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1tlo40p7pGi0 for <spasm@ietfa.amsl.com>; Sun,  7 Aug 2016 19:34:58 -0700 (PDT)
Received: from mail2.augustcellars.com (augustcellars.com [50.45.239.150]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1D9A512D1E7 for <spasm@ietf.org>; Sun,  7 Aug 2016 19:34:58 -0700 (PDT)
Received: from hebrews (24.21.96.37) by mail2.augustcellars.com (192.168.0.56) with Microsoft SMTP Server (TLS) id 15.0.1178.4; Sun, 7 Aug 2016 19:46:59 -0700
From: Jim Schaad <ietf@augustcellars.com>
To: 'SPASM' <spasm@ietf.org>
Date: Sun, 7 Aug 2016 19:34:53 -0700
Message-ID: <020d01d1f11d$731ef7d0$595ce770$@augustcellars.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Outlook 16.0
thread-index: AdHxHLkb/WKu8kQbR8mp88+4cNgIfw==
Content-Language: en-us
X-Originating-IP: [24.21.96.37]
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/PUTpFNXjd9n2b5BJB22zheinLU4>
Subject: [Spasm] Change of Algorithms:  Digest Algorithms
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 08 Aug 2016 02:34:59 -0000

This message looks at Digest Algorithms.  Please restrict your discussion to
this set of algorithms.  I will be sending out messages on other algorithms
over time.

Note:  Digest Algorithms are used for computing the digest of the content.
These are not the "same" as the digest algorithms that are used as part of
signature algorithms.  There may be things one wants to try and keep
similar, as we suggest that you use the same digest algorithm, but they are
not the same things.


Current Document for S/MIME 3.1

MUST: SHA-256
SHOULD-: SHA-1, MD5(for backwards compatibility)


Proposed for S/MIME 3.5

MUST: SHA-256
Historic: SHA-1, MD5

Questions:

1.  There is only one MUST and no path forward.  Is this a problem that
needs to be dealt with?  EdDSA25519 uses SHA-512 under the covers, does that
mean we should make SHA-512 at least a SHOULD here?

2.  Is there anybody who wants to standup and argue for adopting in any of
the SHA-3 algorithms?

Jim



From nobody Mon Aug  8 06:36:26 2016
Return-Path: <rsalz@akamai.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 038A312D5CC for <spasm@ietfa.amsl.com>; Mon,  8 Aug 2016 06:36:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.948
X-Spam-Level: 
X-Spam-Status: No, score=-3.948 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RP_MATCHES_RCVD=-1.247, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=akamai.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id r-UazaOLczSk for <spasm@ietfa.amsl.com>; Mon,  8 Aug 2016 06:36:24 -0700 (PDT)
Received: from prod-mail-xrelay05.akamai.com (prod-mail-xrelay05.akamai.com [23.79.238.179]) by ietfa.amsl.com (Postfix) with ESMTP id 03D4712D84B for <spasm@ietf.org>; Mon,  8 Aug 2016 06:36:06 -0700 (PDT)
Received: from prod-mail-xrelay05.akamai.com (localhost.localdomain [127.0.0.1]) by postfix.imss70 (Postfix) with ESMTP id E65FD3F4018; Mon,  8 Aug 2016 13:36:05 +0000 (GMT)
Received: from prod-mail-relay10.akamai.com (prod-mail-relay10.akamai.com [172.27.118.251]) by prod-mail-xrelay05.akamai.com (Postfix) with ESMTP id CF8BE3F4004; Mon,  8 Aug 2016 13:36:05 +0000 (GMT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=akamai.com; s=a1; t=1470663365; bh=+Sa93HmTLh6LJRTXipLFGkHdxtvro2Zk0NZc41huGHM=; l=84; h=From:To:CC:Date:References:In-Reply-To:From; b=Z24ImiSYRRZhkJS41b9YTG9bcuVrUSRVZeGpM18LqIrofuOnZCPOdaFDwmtKaSRdA JBx9pom49HSuQJjoT6YPfto/APz9Us6tSL2ctLji1HnNngnB5LbKZQ27d4QRddLqj5 Hlxmf07/BvCRXTu8kJ87Swl/pcZHQDLfIOhE3qS0=
Received: from email.msg.corp.akamai.com (usma1ex-cas3.msg.corp.akamai.com [172.27.123.32]) by prod-mail-relay10.akamai.com (Postfix) with ESMTP id B3CD21FC8D; Mon,  8 Aug 2016 13:36:05 +0000 (GMT)
Received: from USMA1EX-DAG1MB1.msg.corp.akamai.com (172.27.123.101) by usma1ex-dag1mb2.msg.corp.akamai.com (172.27.123.102) with Microsoft SMTP Server (TLS) id 15.0.1178.4; Mon, 8 Aug 2016 09:36:05 -0400
Received: from USMA1EX-DAG1MB1.msg.corp.akamai.com ([172.27.123.101]) by usma1ex-dag1mb1.msg.corp.akamai.com ([172.27.123.101]) with mapi id 15.00.1178.000; Mon, 8 Aug 2016 09:36:05 -0400
From: "Salz, Rich" <rsalz@akamai.com>
To: Jim Schaad <ietf@augustcellars.com>
Thread-Topic: [Spasm] Change of Algorithms: Content Encryption Algorithms - Take 2
Thread-Index: AdHw7J5OEFMA7q1BRdqlI6xLCewd1gAJL9wAABoZ7KA=
Date: Mon, 8 Aug 2016 13:36:05 +0000
Message-ID: <b3eeb0ca0d7b4b3c96633eebb383e3ea@usma1ex-dag1mb1.msg.corp.akamai.com>
References: <01d801d1f0ef$18a68030$49f38090$@augustcellars.com> <CAB=JzvHH-nP7axm88QTaCzWqBers5bbnToX0=r9Ys6i7VHmDpA@mail.gmail.com>
In-Reply-To: <CAB=JzvHH-nP7axm88QTaCzWqBers5bbnToX0=r9Ys6i7VHmDpA@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [172.19.38.87]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/8CrHZW7X8SBOrWp-PZTiGRImvOs>
Cc: SPASM <spasm@ietf.org>
Subject: Re: [Spasm] Change of Algorithms: Content Encryption Algorithms - Take 2
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 08 Aug 2016 13:36:26 -0000

KzEuICBJIGFzc3VtZSB0aGUgcmF0aW9uYWxlIHdpbGwgbWFrZSBpdCBpbnRvIHRoZSBkcmFmdC4N
Cg0K


From nobody Mon Aug  8 07:07:56 2016
Return-Path: <rsalz@akamai.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DE50212D746 for <spasm@ietfa.amsl.com>; Mon,  8 Aug 2016 07:07:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.948
X-Spam-Level: 
X-Spam-Status: No, score=-3.948 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RP_MATCHES_RCVD=-1.247, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=akamai.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7UltwAxJ9VoN for <spasm@ietfa.amsl.com>; Mon,  8 Aug 2016 07:07:55 -0700 (PDT)
Received: from prod-mail-xrelay06.akamai.com (prod-mail-xrelay06.akamai.com [96.6.114.98]) by ietfa.amsl.com (Postfix) with ESMTP id 0CFFA126D74 for <spasm@ietf.org>; Mon,  8 Aug 2016 07:07:55 -0700 (PDT)
Received: from prod-mail-xrelay06.akamai.com (localhost.localdomain [127.0.0.1]) by postfix.imss70 (Postfix) with ESMTP id 86991496C19; Mon,  8 Aug 2016 14:07:54 +0000 (GMT)
Received: from prod-mail-relay09.akamai.com (prod-mail-relay09.akamai.com [172.27.22.68]) by prod-mail-xrelay06.akamai.com (Postfix) with ESMTP id 70E05496C16; Mon,  8 Aug 2016 14:07:54 +0000 (GMT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=akamai.com; s=a1; t=1470665274; bh=jB5K8mp/pV5kmkTcGvS+cmB6DG5n7LdnH1xrQObdg6M=; l=457; h=From:To:Date:References:In-Reply-To:From; b=cN8nkpeMzzaB3pbC99cMSLPdUVCr2yBeESQFcnUc2gJ5qdgmOq1YhU1Ui63z5wS1F fmTQNi2z/hI1OA0Yh9T2ltkSHRqgkHxwKdp2VFqpQipv22w/rccTa/BFt9mrEtRAD3 DUqWPPhzyxXEOOrliC1ndRnymZo0Hx/xt85UxrRs=
Received: from email.msg.corp.akamai.com (usma1ex-cas2.msg.corp.akamai.com [172.27.123.31]) by prod-mail-relay09.akamai.com (Postfix) with ESMTP id 597151E080; Mon,  8 Aug 2016 14:07:54 +0000 (GMT)
Received: from USMA1EX-DAG1MB1.msg.corp.akamai.com (172.27.123.101) by usma1ex-dag1mb2.msg.corp.akamai.com (172.27.123.102) with Microsoft SMTP Server (TLS) id 15.0.1178.4; Mon, 8 Aug 2016 10:07:53 -0400
Received: from USMA1EX-DAG1MB1.msg.corp.akamai.com ([172.27.123.101]) by usma1ex-dag1mb1.msg.corp.akamai.com ([172.27.123.101]) with mapi id 15.00.1178.000; Mon, 8 Aug 2016 10:07:53 -0400
From: "Salz, Rich" <rsalz@akamai.com>
To: Jim Schaad <ietf@augustcellars.com>, 'SPASM' <spasm@ietf.org>
Thread-Topic: [Spasm] Change of Algorithms:  Digest Algorithms
Thread-Index: AdHxHLkb/WKu8kQbR8mp88+4cNgIfwAYW4fw
Date: Mon, 8 Aug 2016 14:07:52 +0000
Message-ID: <3f325b55fd814e6fb45360550c42f74a@usma1ex-dag1mb1.msg.corp.akamai.com>
References: <020d01d1f11d$731ef7d0$595ce770$@augustcellars.com>
In-Reply-To: <020d01d1f11d$731ef7d0$595ce770$@augustcellars.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [172.19.38.87]
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/k8Mnwjl46obE29QrJsTkujt5KCg>
Subject: Re: [Spasm] Change of Algorithms:  Digest Algorithms
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 08 Aug 2016 14:07:56 -0000

> 1.  There is only one MUST and no path forward.  Is this a problem that n=
eeds
> to be dealt with?  EdDSA25519 uses SHA-512 under the covers, does that
> mean we should make SHA-512 at least a SHOULD here?
>=20
> 2.  Is there anybody who wants to standup and argue for adopting in any o=
f
> the SHA-3 algorithms?

I'd like to see *something* as a should.    I have a slight preference for =
SHA512, but could live with SHA3 if others feel strongly.


From nobody Mon Aug  8 07:21:38 2016
Return-Path: <housley@vigilsec.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1119F12D0D3 for <spasm@ietfa.amsl.com>; Mon,  8 Aug 2016 07:21:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.899
X-Spam-Level: 
X-Spam-Status: No, score=-101.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, USER_IN_WHITELIST=-100] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4Ju2QoCXKaof for <spasm@ietfa.amsl.com>; Mon,  8 Aug 2016 07:21:33 -0700 (PDT)
Received: from mail.smeinc.net (mail.smeinc.net [209.135.209.11]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E689312D125 for <spasm@ietf.org>; Mon,  8 Aug 2016 07:21:32 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mail.smeinc.net (Postfix) with ESMTP id ED504300572 for <spasm@ietf.org>; Mon,  8 Aug 2016 10:21:30 -0400 (EDT)
X-Virus-Scanned: amavisd-new at mail.smeinc.net
Received: from mail.smeinc.net ([127.0.0.1]) by localhost (mail.smeinc.net [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id C8w-dRQmaDb2 for <spasm@ietf.org>; Mon,  8 Aug 2016 10:21:29 -0400 (EDT)
Received: from [192.168.1.28] (nc-71-50-129-15.dyn.embarqhsd.net [71.50.129.15]) by mail.smeinc.net (Postfix) with ESMTPSA id 6A6A73002C2; Mon,  8 Aug 2016 10:21:27 -0400 (EDT)
Content-Type: multipart/alternative; boundary="Apple-Mail=_C33D27C7-9498-419E-903F-458C15EACC20"
Mime-Version: 1.0 (Mac OS X Mail 7.3 \(1878.6\))
From: Russ Housley <housley@vigilsec.com>
In-Reply-To: <01d801d1f0ef$18a68030$49f38090$@augustcellars.com>
Date: Mon, 8 Aug 2016 10:21:13 -0400
Message-Id: <D8AEFACC-4C55-4F34-8CA5-062C35052923@vigilsec.com>
References: <01d801d1f0ef$18a68030$49f38090$@augustcellars.com>
To: Jim Schaad <ietf@augustcellars.com>
X-Mailer: Apple Mail (2.1878.6)
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/bop2zQy2_C3zbU0t-SYXi9kkC9Q>
Cc: SPASM <spasm@ietf.org>
Subject: Re: [Spasm] Change of Algorithms: Content Encryption Algorithms - Take 2
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 08 Aug 2016 14:21:35 -0000

--Apple-Mail=_C33D27C7-9498-419E-903F-458C15EACC20
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

I would like to see AES-128 GCM on the MUST list as well.

Russ


On Aug 7, 2016, at 5:03 PM, Jim Schaad <ietf@augustcellars.com> wrote:

> I have looked at the responses to the original mail and am updating =
the mail to reflect what I thought I saw as comments.
> =20
> This message looks at Content Encryption Algorithms.  Please restrict =
your discussions to this set of algorithms, I will be sending out =
messages on other algorithm times over time.
> =20
> Current Document for S/MIME 3.1
> =20
> MUST: AES-128 CBC
> SHOULD+: AES-192 CBC and AES-256 CBC
> SHOULD-: DES EDE3 CBC (tripleDES)
> Historic: RC2/40
> =20
> Proposed for S/MIME 3.5
> =20
> MUST:  AES-192 CBC, AES-256 CBC, AES-256 GCM
> MUST-: AES-128 CBC
> SHOULD+: ChaCha20/Poly1305 (256-bit)
> SHOULD-: AES-128 CBC
> Historic: RC2/40, DES EDE3 CBC (tripleDES)
> =20
> Take 2 State: With this set we now have two MUST algorithms with the =
same primitive.  We are indicating that we think that ChaCha20/Poly1305 =
will become a MUST in the future so we have stated a potential fail over =
algorithm if AES or GCM go into the tank for any reason.   More comments =
are welcome.
> =20
> Questions:
> 1.      The jump from MUST to SHOULD- may be too aggressive for =
AES-128 CBC, we should potentially state this as MUST- but I think being =
aggressive makes more sense as we want to go to all AEAD algorithms in =
next version.
>=20
> Take 2 state: Russ said that yes I was.  As I suggested on the list I =
have pushed this back up to a MUST-.
> =20
> 2.      No recommendation for: AES-128 GCM or AES-192 GCM, should =
there be?  How do people feel about 128 and 192 bit algorithms?
>=20
> Take 2 state: List appears to say that we should not say anything =
about 192-bit algorithms.  However people did not comment on the -128 vs =
-256 question so I have left the recommendation of AES-256 GCM alone.
> =20
> 3.      Do we want to downgrade all of the CBC algorithms in favor of =
GCM algorithms?
>=20
> Take 2 state:  SPT is the only one who commented on this.  I have a =
tendency to agree with his proposal that we are adding AEAD and we =
should be pushing that as the preferred algorithm.  Making a MUST =
statement about AES-256 CBC seems to counter act this statement so I =
have removed it.
> =20
> Jim
> =20
> =20
> =20
> _______________________________________________
> Spasm mailing list
> Spasm@ietf.org
> https://www.ietf.org/mailman/listinfo/spasm


--Apple-Mail=_C33D27C7-9498-419E-903F-458C15EACC20
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=us-ascii

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Dus-ascii"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space;">I =
would like to see AES-128 GCM on the MUST list as =
well.<div><br></div><div>Russ</div><div><br></div><div><br><div><div>On =
Aug 7, 2016, at 5:03 PM, Jim Schaad &lt;<a =
href=3D"mailto:ietf@augustcellars.com">ietf@augustcellars.com</a>&gt; =
wrote:</div><br class=3D"Apple-interchange-newline"><blockquote =
type=3D"cite"><div lang=3D"EN-US" link=3D"#0563C1" vlink=3D"#954F72" =
style=3D"font-family: Helvetica; font-size: 12px; font-style: normal; =
font-variant: normal; font-weight: normal; letter-spacing: normal; =
line-height: normal; orphans: auto; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; widows: auto; word-spacing: =
0px; -webkit-text-stroke-width: 0px;"><div class=3D"WordSection1" =
style=3D"page: WordSection1;"><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;">I have looked at the =
responses to the original mail and am updating the mail to reflect what =
I thought I saw as comments.<o:p></o:p></div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;"><o:p>&nbsp;</o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;">This =
message looks at Content Encryption Algorithms.&nbsp; Please restrict =
your discussions to this set of algorithms, I will be sending out =
messages on other algorithm times over time.<o:p></o:p></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;"><o:p>&nbsp;</o:p></div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;">Current Document for S/MIME 3.1<o:p></o:p></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;"><o:p>&nbsp;</o:p></div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;">MUST: =
AES-128 CBC<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;">SHOULD+: AES-192 CBC =
and AES-256 CBC<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;">SHOULD-: DES EDE3 =
CBC (tripleDES)<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;">Historic: =
RC2/40<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, =
sans-serif;"><o:p>&nbsp;</o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;">Proposed =
for S/MIME 3.5<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, =
sans-serif;"><o:p>&nbsp;</o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;">MUST:&nbsp;<span =
class=3D"Apple-converted-space">&nbsp;</span><s>AES-192 CBC, AES-256 =
CBC,</s><span class=3D"Apple-converted-space">&nbsp;</span>AES-256 =
GCM<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; font-size: =
11pt; font-family: Calibri, sans-serif;"><b>MUST-: AES-128 =
CBC<o:p></o:p></b></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;">SHOULD+: =
ChaCha20/Poly1305 (256-bit)<s><o:p></o:p></s></div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;"><s>SHOULD-: AES-128 CBC<o:p></o:p></s></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;">Historic: RC2/40, DES EDE3 CBC =
(tripleDES)<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, =
sans-serif;"><o:p>&nbsp;</o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;"><b>Take 2 =
State</b>: With this set we now have two MUST algorithms with the same =
primitive.&nbsp; We are indicating that we think that ChaCha20/Poly1305 =
will become a MUST in the future so we have stated a potential fail over =
algorithm if AES or GCM go into the tank for any reason.&nbsp;&nbsp; =
More comments are welcome.<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;"><o:p>&nbsp;</o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;">Questions:<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt 0.5in; font-size: 11pt; font-family: Calibri, sans-serif; =
text-indent: -0.25in;"><span>1.<span style=3D"font-style: normal; =
font-variant: normal; font-weight: normal; font-size: 7pt; line-height: =
normal; font-family: 'Times New =
Roman';">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3D"Apple-converted-space">&nbsp;</span></span></span>The jump from =
MUST to SHOULD- may be too aggressive for AES-128 CBC, we should =
potentially state this as MUST- but I think being aggressive makes more =
sense as we want to go to all AEAD algorithms in next =
version.<br><br><b>Take 2 state</b>: Russ said that yes I was.&nbsp; As =
I suggested on the list I have pushed this back up to a =
MUST-.<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, =
sans-serif;"><o:p>&nbsp;</o:p></div><div style=3D"margin: 0in 0in =
0.0001pt 0.5in; font-size: 11pt; font-family: Calibri, sans-serif; =
text-indent: -0.25in;"><span>2.<span style=3D"font-style: normal; =
font-variant: normal; font-weight: normal; font-size: 7pt; line-height: =
normal; font-family: 'Times New =
Roman';">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3D"Apple-converted-space">&nbsp;</span></span></span>No =
recommendation for: AES-128 GCM or AES-192 GCM, should there be?&nbsp; =
How do people feel about 128 and 192 bit algorithms?<br><br><b>Take 2 =
state</b>: List appears to say that we should not say anything about =
192-bit algorithms.&nbsp; However people did not comment on the -128 vs =
-256 question so I have left the recommendation of AES-256 GCM =
alone.<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, =
sans-serif;"><o:p>&nbsp;</o:p></div><div style=3D"margin: 0in 0in =
0.0001pt 0.5in; font-size: 11pt; font-family: Calibri, sans-serif; =
text-indent: -0.25in;"><span>3.<span style=3D"font-style: normal; =
font-variant: normal; font-weight: normal; font-size: 7pt; line-height: =
normal; font-family: 'Times New =
Roman';">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3D"Apple-converted-space">&nbsp;</span></span></span>Do we want to =
downgrade all of the CBC algorithms in favor of GCM =
algorithms?<br><br><b>Take 2 state</b>:&nbsp; SPT is the only one who =
commented on this.&nbsp; I have a tendency to agree with his proposal =
that we are adding AEAD and we should be pushing that as the preferred =
algorithm.&nbsp; Making a MUST statement about AES-256 CBC seems to =
counter act this statement so I have removed it.<o:p></o:p></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;"><o:p>&nbsp;</o:p></div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;">Jim<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, =
sans-serif;"><o:p>&nbsp;</o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;"><o:p>&nbsp;</o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;"><o:p>&nbsp;</o:p></div></div>________________________________=
_______________<br>Spasm mailing list<br><a href=3D"mailto:Spasm@ietf.org"=
 style=3D"color: rgb(149, 79, 114); text-decoration: =
underline;">Spasm@ietf.org</a><br><a =
href=3D"https://www.ietf.org/mailman/listinfo/spasm" style=3D"color: =
rgb(149, 79, 114); text-decoration: =
underline;">https://www.ietf.org/mailman/listinfo/spasm</a></div></blockqu=
ote></div><br></div></body></html>=

--Apple-Mail=_C33D27C7-9498-419E-903F-458C15EACC20--


From nobody Mon Aug  8 07:39:32 2016
Return-Path: <housley@vigilsec.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 238FA12D605 for <spasm@ietfa.amsl.com>; Mon,  8 Aug 2016 07:39:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.899
X-Spam-Level: 
X-Spam-Status: No, score=-101.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, USER_IN_WHITELIST=-100] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6-MOeovD846E for <spasm@ietfa.amsl.com>; Mon,  8 Aug 2016 07:39:28 -0700 (PDT)
Received: from mail.smeinc.net (mail.smeinc.net [209.135.209.11]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D012E12D83F for <spasm@ietf.org>; Mon,  8 Aug 2016 07:39:24 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mail.smeinc.net (Postfix) with ESMTP id DF4123005C9 for <spasm@ietf.org>; Mon,  8 Aug 2016 10:39:22 -0400 (EDT)
X-Virus-Scanned: amavisd-new at mail.smeinc.net
Received: from mail.smeinc.net ([127.0.0.1]) by localhost (mail.smeinc.net [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id tolyjC8FGY8P for <spasm@ietf.org>; Mon,  8 Aug 2016 10:39:20 -0400 (EDT)
Received: from [192.168.1.28] (nc-71-50-129-15.dyn.embarqhsd.net [71.50.129.15]) by mail.smeinc.net (Postfix) with ESMTPSA id 14C70300410; Mon,  8 Aug 2016 10:39:19 -0400 (EDT)
Content-Type: multipart/alternative; boundary="Apple-Mail=_6AB281F0-C60C-449E-B60C-4F6126149E45"
Mime-Version: 1.0 (Mac OS X Mail 7.3 \(1878.6\))
From: Russ Housley <housley@vigilsec.com>
In-Reply-To: <01eb01d1f0f6$383f5230$a8bdf690$@augustcellars.com>
Date: Mon, 8 Aug 2016 10:39:12 -0400
Message-Id: <F4778C03-293A-44D4-85C2-5C0649D87E8B@vigilsec.com>
References: <01eb01d1f0f6$383f5230$a8bdf690$@augustcellars.com>
To: Jim Schaad <ietf@augustcellars.com>
X-Mailer: Apple Mail (2.1878.6)
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/Usqq5AXp10wU8PngItqBW5FUqs0>
Cc: SPASM <spasm@ietf.org>
Subject: Re: [Spasm] Change of Algorithms: Signature Algorithms Take 2
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 08 Aug 2016 14:39:31 -0000

--Apple-Mail=_6AB281F0-C60C-449E-B60C-4F6126149E45
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=windows-1252

I would like to see ECDSA P-384 w/ SHA-384 on the SHOULD list.

Russ


On Aug 7, 2016, at 5:54 PM, Jim Schaad <ietf@augustcellars.com> wrote:

> This message looks at Signature Algorithms.  Please restrict your =
discussions to this set of algorithms, I will be sending out messages on =
other algorithms over time.
> =20
> Current Document for S/MIME 3.1
> =20
> MUST:   RSA w/ SHA-256
> SHOULD+:  DSA w/ SHA-256, RSASSA-PSS w/ SHA-256
> SHOULD-:  RSA w/ SHA-1, DSA w/SHA-1, RSA w/ MD5
> Historic:
> =20
> Key Sizes:
> RSA and DSA - sign
> SHOULD NOT            Key size <=3D 1023
> SHOULD      1024 <=3D key size <=3D 2048
> MAY            2048 < key size =20
> =20
> RSA and DSA - Verify
> MAY                key size <=3D 1023
> MUST      1024 <=3D key size <=3D 2048
> MAY        2048 < key size
> =20
> RSA - Certificate Verify
> MAY             key size <=3D 1023
> MUST  1024 <=3D key size <=3D 4096
> MAY      4096  < key size
> =20
> DSA - Certificate Verify
> MAY             key size <=3D 1023
> MUST    1024 <=3D key size <=3D 3072
> =20
> =20
> =20
> Proposed for S/MIME 3.5
> =20
> MUST: RSA-PSS w/ SHA-256, ECDSA P-256 w/ SHA-256, EdDSA25519
> MUST-: RSA w/ SHA-256
> SHOULD+:
> SHOULD:  RSA-PSS w/ SHA-512, ECDSA P-521 w/ SHA-256512, EdDSA448
> SHOULD-: DSA w/ SHA-256
> Historic: RSA w/ SHA-1, DSA w/ SHA-1, RSA w/ MD5, DSA w/ SHA-256
> =20
> Key Sizes:
> RSA and DSA - sign
> SHOULD NOT            Key size <=3D 2048 2047
> SHOULD      2048 <=3D key size <=3D 4096
> MAY             4096 < key size =20
> =20
> RSA and DSA - Verify
> Historic MAY                key size <=3D 2048 2047
> MUST      2048 <=3D key size <=3D 4096
> MAY        4096 < key size
> =20
> RSA - Certificate Verify
> Historic MAY             key size <=3D 2048 2047
> MUST  2048 <=3D key size <=3D 4096
> MAY      4096  < key size
> =20
> DSA - Certificate Verify
> Historic MAY             key size <=3D 1023
> Historic MUST   1024 <=3D key size <=3D 3072
> =20
> =20
> Questions:
> =20
> 1.      Should DSA be dropped to historic for messages and just left =
as SHOULD- for certificates, I don't know how many DSA certificates =
actually exist.
>=20
> Take 2 state: I have removed all DSA from the current set of =
algorithms for both messages and certificates.  This is now historic =
only
> =20
> 2.      I have changed to lower limits on RSA but not DSA for =
certificate verification - should it be changed as well?  Again I don't =
know how many DSA certificates exist.
>=20
> Take 2 state: I have removed DSA certificates to historic so the =
question is moot.
> =20
> 3.      I don't think that any statements for ECDSA on key size need =
to be made separately from the algorithm support list.  Does anybody =
disagree?
>=20
> Take 2 state:  Nobody said anything to the contrary.  So no plans to =
make a key size section for ECDSA algorithms.
> =20
> 4.      NEW: SPT suggested that we should not be making any statements =
on doing anything with 512 hash values.  (Although with tons of standard =
snark J).   My reasoning for including this was less to do with the fact =
that I thought the 512-bit hash functions were more efficient on 64-bit =
hardware (a statement that I cannot find support for with a quick web =
search for SHA-2) and therefore it made sense from a throughput point of =
view.   I don=92t think we need the for security and if they are not =
more efficient I would be in favor not making them SHOULDs
> =20
> 5.      NEW:  Blake has complained about the number of MUST algorithms =
that comes out from this list.  There are effectively 4 in the list =
above, as opposed to the 1 that is in the current set of documents.  We =
cannot kill the current MUST so it has to stay.  However, all of the new =
MUSTs could be downgraded from MUST to SHOULD without out any problems.  =
The only issue is that one of them needs to be a MUST so that we have a =
true MUST not just a MUST- algorithm.  Looking at the list my breakdown =
would be:
> =20
> =B7        RSA-PSS =96 Given that it has been slow on update the only =
reason to have it be a MUST is that most people are probably going to =
have RSA keys today.  There are some arguments that say RSA-PSS is no =
better than RSA-v1.5 when doing real-world analysis.  I don=92t know =
that I agree with this as I have problems with arguments by analogy.   =
This could easily be a SHOULD instead of a MUST
> =B7        ECDSA =96 This is the world of NIST requirements today.  I =
think this justifies it being a MUST
> =B7        EdDSA =96 This is the world of NOT MIST requirements today. =
 I think this justifies it being a MUST
> =20
> Jim
> =20
> _______________________________________________
> Spasm mailing list
> Spasm@ietf.org
> https://www.ietf.org/mailman/listinfo/spasm


--Apple-Mail=_6AB281F0-C60C-449E-B60C-4F6126149E45
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=windows-1252

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Dwindows-1252"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space;">I =
would like to see ECDSA P-384 w/ SHA-384 on the SHOULD =
list.<div><br></div><div>Russ</div><div><br></div><div><br><div><div>On =
Aug 7, 2016, at 5:54 PM, Jim Schaad &lt;<a =
href=3D"mailto:ietf@augustcellars.com">ietf@augustcellars.com</a>&gt; =
wrote:</div><br class=3D"Apple-interchange-newline"><blockquote =
type=3D"cite"><div lang=3D"EN-US" link=3D"#0563C1" vlink=3D"#954F72" =
style=3D"font-family: Helvetica; font-size: 12px; font-style: normal; =
font-variant: normal; font-weight: normal; letter-spacing: normal; =
line-height: normal; orphans: auto; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; widows: auto; word-spacing: =
0px; -webkit-text-stroke-width: 0px;"><div class=3D"WordSection1" =
style=3D"page: WordSection1;"><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;">This message looks =
at Signature Algorithms.&nbsp; Please restrict your discussions to this =
set of algorithms, I will be sending out messages on other algorithms =
over time.<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, =
sans-serif;"><o:p>&nbsp;</o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;">Current =
Document for S/MIME 3.1<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;"><o:p>&nbsp;</o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;">MUST:&nbsp;&nbsp; RSA w/ SHA-256<o:p></o:p></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;">SHOULD+:&nbsp; DSA w/ SHA-256, RSASSA-PSS w/ =
SHA-256<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;">SHOULD-:&nbsp; RSA =
w/ SHA-1, DSA w/SHA-1, RSA w/ MD5<o:p></o:p></div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;">Historic:<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;"><o:p>&nbsp;</o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;">Key =
Sizes:<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;">RSA and DSA - =
sign<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; font-size: =
11pt; font-family: Calibri, sans-serif;">SHOULD =
NOT&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
Key size &lt;=3D 1023<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;">SHOULD&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 1024 &lt;=3D key size =
&lt;=3D 2048<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, =
sans-serif;">MAY&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp; 2048 &lt; key size&nbsp;&nbsp;<o:p></o:p></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;"><o:p>&nbsp;</o:p></div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;">RSA =
and DSA - Verify<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, =
sans-serif;">MAY&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; key size &lt;=3D =
1023<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; font-size: =
11pt; font-family: Calibri, =
sans-serif;">MUST&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 1024 &lt;=3D key size =
&lt;=3D 2048<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, =
sans-serif;">MAY&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 2048 &lt; key =
size<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; font-size: =
11pt; font-family: Calibri, sans-serif;"><o:p>&nbsp;</o:p></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;">RSA - Certificate Verify<o:p></o:p></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: =
Calibri, =
sans-serif;">MAY&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp; key size &lt;=3D 1023<o:p></o:p></div><div style=3D"margin:=
 0in 0in 0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;">MUST&nbsp; 1024 &lt;=3D key size &lt;=3D =
4096<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; font-size: =
11pt; font-family: Calibri, =
sans-serif;">MAY&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 4096&nbsp; &lt; key =
size<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; font-size: =
11pt; font-family: Calibri, sans-serif;"><o:p>&nbsp;</o:p></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;">DSA - Certificate Verify<o:p></o:p></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: =
Calibri, =
sans-serif;">MAY&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp; key size &lt;=3D 1023<o:p></o:p></div><div style=3D"margin:=
 0in 0in 0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;">MUST&nbsp;&nbsp;&nbsp; 1024 &lt;=3D key size &lt;=3D =
3072<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; font-size: =
11pt; font-family: Calibri, sans-serif;"><o:p>&nbsp;</o:p></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;"><o:p>&nbsp;</o:p></div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;"><o:p>&nbsp;</o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;">Proposed =
for S/MIME 3.5<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, =
sans-serif;"><o:p>&nbsp;</o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;">MUST: =
RSA-PSS w/ SHA-256, ECDSA P-256 w/ SHA-256, =
EdDSA25519<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;">MUST-: RSA w/ =
SHA-256<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, =
sans-serif;">SHOULD+:<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;">SHOULD:&nbsp; RSA-PSS w/ SHA-512, ECDSA P-521 w/ =
SHA-<s>256</s><b>512</b>, EdDSA448<o:p></o:p></div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;">SHOULD-:<span =
class=3D"Apple-converted-space">&nbsp;</span><s>DSA w/ =
SHA-256</s><o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;">Historic: RSA w/ =
SHA-1, DSA w/ SHA-1, RSA w/ MD5,<span =
class=3D"Apple-converted-space">&nbsp;</span><b>DSA w/ =
SHA-256</b><o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, =
sans-serif;"><o:p>&nbsp;</o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;">Key =
Sizes:<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;">RSA<span =
class=3D"Apple-converted-space">&nbsp;</span><s>and DSA</s><span =
class=3D"Apple-converted-space">&nbsp;</span>- sign<o:p></o:p></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;">SHOULD =
NOT&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
Key size &lt;=3D<span =
class=3D"Apple-converted-space">&nbsp;</span><s>2048</s><span =
class=3D"Apple-converted-space">&nbsp;</span><b>2047<o:p></o:p></b></div><=
div style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;">SHOULD&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 2048 &lt;=3D =
key size &lt;=3D 4096<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;">MAY&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp; 4096 &lt; key size&nbsp;&nbsp;<o:p></o:p></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;"><o:p>&nbsp;</o:p></div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;">RSA<span class=3D"Apple-converted-space">&nbsp;</span><s>and =
DSA</s><span class=3D"Apple-converted-space">&nbsp;</span>- =
Verify<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;"><b>Historic<span =
class=3D"Apple-converted-space">&nbsp;</span></b>MAY&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; key =
size &lt;=3D<span =
class=3D"Apple-converted-space">&nbsp;</span><s>2048</s><span =
class=3D"Apple-converted-space">&nbsp;</span><b>2047<o:p></o:p></b></div><=
div style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;">MUST&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 2048 &lt;=3D =
key size &lt;=3D 4096<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;">MAY&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 4096 &lt; key =
size<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; font-size: =
11pt; font-family: Calibri, sans-serif;"><o:p>&nbsp;</o:p></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;">RSA - Certificate Verify<o:p></o:p></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;"><b>Historic<span =
class=3D"Apple-converted-space">&nbsp;</span></b>MAY&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; key size &lt;=3D<span =
class=3D"Apple-converted-space">&nbsp;</span><s>2048</s><span =
class=3D"Apple-converted-space">&nbsp;</span><b>2047<o:p></o:p></b></div><=
div style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;">MUST&nbsp; 2048 &lt;=3D key size &lt;=3D =
4096<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; font-size: =
11pt; font-family: Calibri, =
sans-serif;">MAY&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 4096&nbsp; &lt; key =
size<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; font-size: =
11pt; font-family: Calibri, sans-serif;"><o:p>&nbsp;</o:p></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;">DSA - Certificate Verify<o:p></o:p></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;"><b>Historic<span =
class=3D"Apple-converted-space">&nbsp;</span></b>MAY&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; key size &lt;=3D =
1023<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; font-size: =
11pt; font-family: Calibri, sans-serif;"><b>Historic<span =
class=3D"Apple-converted-space">&nbsp;</span></b>MUST&nbsp;&nbsp; 1024 =
&lt;=3D key size &lt;=3D 3072<o:p></o:p></div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;"><o:p>&nbsp;</o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;"><o:p>&nbsp;</o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;">Questions:<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;"><o:p>&nbsp;</o:p></div><div style=3D"margin: 0in 0in =
0.0001pt 0.5in; font-size: 11pt; font-family: Calibri, sans-serif; =
text-indent: -0.25in;"><span>1.<span style=3D"font-style: normal; =
font-variant: normal; font-weight: normal; font-size: 7pt; line-height: =
normal; font-family: 'Times New =
Roman';">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3D"Apple-converted-space">&nbsp;</span></span></span>Should DSA be =
dropped to historic for messages and just left as SHOULD- for =
certificates, I don't know how many DSA certificates actually =
exist.<br><br><b>Take 2 state:<span =
class=3D"Apple-converted-space">&nbsp;</span></b>I have removed all DSA =
from the current set of algorithms for both messages and =
certificates.&nbsp; This is now historic only<o:p></o:p></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;"><o:p>&nbsp;</o:p></div><div style=3D"margin: 0in =
0in 0.0001pt 0.5in; font-size: 11pt; font-family: Calibri, sans-serif; =
text-indent: -0.25in;"><span>2.<span style=3D"font-style: normal; =
font-variant: normal; font-weight: normal; font-size: 7pt; line-height: =
normal; font-family: 'Times New =
Roman';">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3D"Apple-converted-space">&nbsp;</span></span></span>I have =
changed to lower limits on RSA but not DSA for certificate verification =
- should it be changed as well?&nbsp; Again I don't know how many DSA =
certificates exist.<br><br><b>Take 2 state:<span =
class=3D"Apple-converted-space">&nbsp;</span></b>I have removed DSA =
certificates to historic so the question is moot.<o:p></o:p></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;"><o:p>&nbsp;</o:p></div><div style=3D"margin: 0in =
0in 0.0001pt 0.5in; font-size: 11pt; font-family: Calibri, sans-serif; =
text-indent: -0.25in;"><span>3.<span style=3D"font-style: normal; =
font-variant: normal; font-weight: normal; font-size: 7pt; line-height: =
normal; font-family: 'Times New =
Roman';">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3D"Apple-converted-space">&nbsp;</span></span></span>I don't think =
that any statements for ECDSA on key size need to be made separately =
from the algorithm support list.&nbsp; Does anybody =
disagree?<br><br><b>Take 2 state:</b>&nbsp; Nobody said anything to the =
contrary.&nbsp; So no plans to make a key size section for ECDSA =
algorithms.<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt =
0.5in; font-size: 11pt; font-family: Calibri, =
sans-serif;"><o:p>&nbsp;</o:p></div><div style=3D"margin: 0in 0in =
0.0001pt 0.5in; font-size: 11pt; font-family: Calibri, sans-serif; =
text-indent: -0.25in;"><span>4.<span style=3D"font-style: normal; =
font-variant: normal; font-weight: normal; font-size: 7pt; line-height: =
normal; font-family: 'Times New =
Roman';">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3D"Apple-converted-space">&nbsp;</span></span></span><b>NEW:<span =
class=3D"Apple-converted-space">&nbsp;</span></b>SPT suggested that we =
should not be making any statements on doing anything with 512 hash =
values.&nbsp; (Although with tons of standard snark<span =
class=3D"Apple-converted-space">&nbsp;</span><span style=3D"font-family: =
Wingdings;">J</span>).&nbsp;&nbsp; My reasoning for including this was =
less to do with the fact that I thought the 512-bit hash functions were =
more efficient on 64-bit hardware (a statement that I cannot find =
support for with a quick web search for SHA-2) and therefore it made =
sense from a throughput point of view.&nbsp;&nbsp; I don=92t think we =
need the for security and if they are not more efficient I would be in =
favor not making them SHOULDs<o:p></o:p></div><div style=3D"margin: 0in =
0in 0.0001pt 0.5in; font-size: 11pt; font-family: Calibri, =
sans-serif;"><o:p>&nbsp;</o:p></div><div style=3D"margin: 0in 0in =
0.0001pt 0.5in; font-size: 11pt; font-family: Calibri, sans-serif; =
text-indent: -0.25in;"><span>5.<span style=3D"font-style: normal; =
font-variant: normal; font-weight: normal; font-size: 7pt; line-height: =
normal; font-family: 'Times New =
Roman';">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3D"Apple-converted-space">&nbsp;</span></span></span><b>NEW:</b><spa=
n class=3D"Apple-converted-space">&nbsp;</span>&nbsp;Blake has =
complained about the number of MUST algorithms that comes out from this =
list.&nbsp; There are effectively 4 in the list above, as opposed to the =
1 that is in the current set of documents.&nbsp; We cannot kill the =
current MUST so it has to stay.&nbsp; However, all of the new MUSTs =
could be downgraded from MUST to SHOULD without out any problems.&nbsp; =
The only issue is that one of them needs to be a MUST so that we have a =
true MUST not just a MUST- algorithm.&nbsp; Looking at the list my =
breakdown would be:<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt 0.5in; font-size: 11pt; font-family: Calibri, =
sans-serif;"><o:p>&nbsp;</o:p></div><div style=3D"margin: 0in 0in =
0.0001pt 1in; font-size: 11pt; font-family: Calibri, sans-serif; =
text-indent: -0.25in;"><span style=3D"font-family: Symbol;"><span>=B7<span=
 style=3D"font-style: normal; font-variant: normal; font-weight: normal; =
font-size: 7pt; line-height: normal; font-family: 'Times New =
Roman';">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3D"Apple-converted-space">&nbsp;</span></span></span></span>RSA-PSS =
=96 Given that it has been slow on update the only reason to have it be =
a MUST is that most people are probably going to have RSA keys =
today.&nbsp; There are some arguments that say RSA-PSS is no better than =
RSA-v1.5 when doing real-world analysis.&nbsp; I don=92t know that I =
agree with this as I have problems with arguments by =
analogy.&nbsp;&nbsp; This could easily be a SHOULD instead of a =
MUST<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt 1in; =
font-size: 11pt; font-family: Calibri, sans-serif; text-indent: =
-0.25in;"><span style=3D"font-family: Symbol;"><span>=B7<span =
style=3D"font-style: normal; font-variant: normal; font-weight: normal; =
font-size: 7pt; line-height: normal; font-family: 'Times New =
Roman';">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3D"Apple-converted-space">&nbsp;</span></span></span></span>ECDSA =
=96 This is the world of NIST requirements today.&nbsp; I think this =
justifies it being a MUST<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt 1in; font-size: 11pt; font-family: Calibri, sans-serif; =
text-indent: -0.25in;"><span style=3D"font-family: Symbol;"><span>=B7<span=
 style=3D"font-style: normal; font-variant: normal; font-weight: normal; =
font-size: 7pt; line-height: normal; font-family: 'Times New =
Roman';">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3D"Apple-converted-space">&nbsp;</span></span></span></span>EdDSA =
=96 This is the world of NOT MIST requirements today.&nbsp; I think this =
justifies it being a MUST<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;"><o:p>&nbsp;</o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;">Jim<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, =
sans-serif;"><o:p>&nbsp;</o:p></div></div>________________________________=
_______________<br>Spasm mailing list<br><a href=3D"mailto:Spasm@ietf.org"=
 style=3D"color: rgb(149, 79, 114); text-decoration: =
underline;">Spasm@ietf.org</a><br><a =
href=3D"https://www.ietf.org/mailman/listinfo/spasm" style=3D"color: =
rgb(149, 79, 114); text-decoration: =
underline;">https://www.ietf.org/mailman/listinfo/spasm</a></div></blockqu=
ote></div><br></div></body></html>=

--Apple-Mail=_6AB281F0-C60C-449E-B60C-4F6126149E45--


From nobody Mon Aug  8 07:43:56 2016
Return-Path: <rsalz@akamai.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 737EB12D610 for <spasm@ietfa.amsl.com>; Mon,  8 Aug 2016 07:43:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.948
X-Spam-Level: 
X-Spam-Status: No, score=-3.948 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RP_MATCHES_RCVD=-1.247, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=akamai.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id R-7461Intrnn for <spasm@ietfa.amsl.com>; Mon,  8 Aug 2016 07:43:54 -0700 (PDT)
Received: from prod-mail-xrelay05.akamai.com (prod-mail-xrelay05.akamai.com [23.79.238.179]) by ietfa.amsl.com (Postfix) with ESMTP id 5F71E12D83F for <spasm@ietf.org>; Mon,  8 Aug 2016 07:43:54 -0700 (PDT)
Received: from prod-mail-xrelay05.akamai.com (localhost.localdomain [127.0.0.1]) by postfix.imss70 (Postfix) with ESMTP id D0B603F4004; Mon,  8 Aug 2016 14:43:53 +0000 (GMT)
Received: from prod-mail-relay10.akamai.com (prod-mail-relay10.akamai.com [172.27.118.251]) by prod-mail-xrelay05.akamai.com (Postfix) with ESMTP id B9918423704; Mon,  8 Aug 2016 14:43:53 +0000 (GMT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=akamai.com; s=a1; t=1470667433; bh=iJSR19OBD4NPFsLOzTkP3BQMkYjU6w3LaNmE4BpiGQU=; l=102; h=From:To:CC:Date:References:In-Reply-To:From; b=ZWzE9m2PekOCayI1gzWKVcYrOxp0ws2axlsy5vw3ATx8IWQMXN86fP9oq6eY+wuxZ Pgj0bSqTVJViTLd+9bJYVUsTlnJ7qAm3EAI/gvO0Fdra8MqqnwlGDULyueEUWpkfdx 9lGOhvbe8xl3ir2TKgk5G7/B9D91EFRJ76iWB6eE=
Received: from email.msg.corp.akamai.com (ecp.msg.corp.akamai.com [172.27.123.34]) by prod-mail-relay10.akamai.com (Postfix) with ESMTP id 2A09A1FC8D; Mon,  8 Aug 2016 14:43:53 +0000 (GMT)
Received: from USMA1EX-DAG1MB1.msg.corp.akamai.com (172.27.123.101) by usma1ex-dag1mb6.msg.corp.akamai.com (172.27.123.65) with Microsoft SMTP Server (TLS) id 15.0.1178.4; Mon, 8 Aug 2016 07:43:52 -0700
Received: from USMA1EX-DAG1MB1.msg.corp.akamai.com ([172.27.123.101]) by usma1ex-dag1mb1.msg.corp.akamai.com ([172.27.123.101]) with mapi id 15.00.1178.000; Mon, 8 Aug 2016 10:43:52 -0400
From: "Salz, Rich" <rsalz@akamai.com>
To: Russ Housley <housley@vigilsec.com>, Jim Schaad <ietf@augustcellars.com>
Thread-Topic: [Spasm] Change of Algorithms: Signature Algorithms Take 2
Thread-Index: AdHw7zjRr7pNe4uWRVmZLKRppVz4XwAtO9EAAAg6VuA=
Date: Mon, 8 Aug 2016 14:43:52 +0000
Message-ID: <6afd1be131044583ba0962ea82894df9@usma1ex-dag1mb1.msg.corp.akamai.com>
References: <01eb01d1f0f6$383f5230$a8bdf690$@augustcellars.com> <F4778C03-293A-44D4-85C2-5C0649D87E8B@vigilsec.com>
In-Reply-To: <F4778C03-293A-44D4-85C2-5C0649D87E8B@vigilsec.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [172.19.38.87]
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/aJeekAVyWgqSlmlLfHtmP_LTcM4>
Cc: SPASM <spasm@ietf.org>
Subject: Re: [Spasm] Change of Algorithms: Signature Algorithms Take 2
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 08 Aug 2016 14:43:55 -0000

> I would like to see ECDSA P-384 w/ SHA-384 on the SHOULD list.

I'd rather see 256 and 512 only.


From nobody Mon Aug  8 07:49:23 2016
Return-Path: <housley@vigilsec.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7C5AD12D610 for <spasm@ietfa.amsl.com>; Mon,  8 Aug 2016 07:49:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.9
X-Spam-Level: 
X-Spam-Status: No, score=-101.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, USER_IN_WHITELIST=-100] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QCH_fU5owGG5 for <spasm@ietfa.amsl.com>; Mon,  8 Aug 2016 07:49:21 -0700 (PDT)
Received: from mail.smeinc.net (mail.smeinc.net [209.135.209.11]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2BD3212D618 for <spasm@ietf.org>; Mon,  8 Aug 2016 07:49:21 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mail.smeinc.net (Postfix) with ESMTP id 05A7B300538 for <spasm@ietf.org>; Mon,  8 Aug 2016 10:49:19 -0400 (EDT)
X-Virus-Scanned: amavisd-new at mail.smeinc.net
Received: from mail.smeinc.net ([127.0.0.1]) by localhost (mail.smeinc.net [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id hgkZUJoVuK_6 for <spasm@ietf.org>; Mon,  8 Aug 2016 10:49:18 -0400 (EDT)
Received: from [192.168.1.28] (nc-71-50-129-15.dyn.embarqhsd.net [71.50.129.15]) by mail.smeinc.net (Postfix) with ESMTPSA id ABB433002BA; Mon,  8 Aug 2016 10:49:17 -0400 (EDT)
Content-Type: text/plain; charset=windows-1252
Mime-Version: 1.0 (Mac OS X Mail 7.3 \(1878.6\))
From: Russ Housley <housley@vigilsec.com>
In-Reply-To: <020d01d1f11d$731ef7d0$595ce770$@augustcellars.com>
Date: Mon, 8 Aug 2016 10:49:14 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <91486371-D844-4925-9CA9-D712996E597C@vigilsec.com>
References: <020d01d1f11d$731ef7d0$595ce770$@augustcellars.com>
To: Jim Schaad <ietf@augustcellars.com>
X-Mailer: Apple Mail (2.1878.6)
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/ce2rIbKrgma-mkDD2AX-PZC34s4>
Cc: SPASM <spasm@ietf.org>
Subject: Re: [Spasm] Change of Algorithms:  Digest Algorithms
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 08 Aug 2016 14:49:23 -0000

I would like to see SHA-384 on the SHOULD list.

If we are going to have EdDSA25519 on the MUST list for signatures, then =
SHA-512 belongs on the MUST list for digest algorithms.  I=92m also fine =
with both of these being SHOULD+.

Russ

On Aug 7, 2016, at 10:34 PM, Jim Schaad <ietf@augustcellars.com> wrote:

> This message looks at Digest Algorithms.  Please restrict your =
discussion to
> this set of algorithms.  I will be sending out messages on other =
algorithms
> over time.
>=20
> Note:  Digest Algorithms are used for computing the digest of the =
content.
> These are not the "same" as the digest algorithms that are used as =
part of
> signature algorithms.  There may be things one wants to try and keep
> similar, as we suggest that you use the same digest algorithm, but =
they are
> not the same things.
>=20
>=20
> Current Document for S/MIME 3.1
>=20
> MUST: SHA-256
> SHOULD-: SHA-1, MD5(for backwards compatibility)
>=20
>=20
> Proposed for S/MIME 3.5
>=20
> MUST: SHA-256
> Historic: SHA-1, MD5
>=20
> Questions:
>=20
> 1.  There is only one MUST and no path forward.  Is this a problem =
that
> needs to be dealt with?  EdDSA25519 uses SHA-512 under the covers, =
does that
> mean we should make SHA-512 at least a SHOULD here?
>=20
> 2.  Is there anybody who wants to standup and argue for adopting in =
any of
> the SHA-3 algorithms?
>=20
> Jim
>=20
>=20
> _______________________________________________
> Spasm mailing list
> Spasm@ietf.org
> https://www.ietf.org/mailman/listinfo/spasm


From nobody Mon Aug  8 08:02:55 2016
Return-Path: <ietf@augustcellars.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EA69C12D0B1 for <spasm@ietfa.amsl.com>; Mon,  8 Aug 2016 08:02:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.148
X-Spam-Level: 
X-Spam-Status: No, score=-3.148 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-1.247, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id faUYr7_nssrC for <spasm@ietfa.amsl.com>; Mon,  8 Aug 2016 08:02:52 -0700 (PDT)
Received: from mail2.augustcellars.com (augustcellars.com [50.45.239.150]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C51E612D858 for <spasm@ietf.org>; Mon,  8 Aug 2016 08:02:48 -0700 (PDT)
Received: from hebrews (24.21.96.37) by mail2.augustcellars.com (192.168.0.56) with Microsoft SMTP Server (TLS) id 15.0.1178.4; Mon, 8 Aug 2016 08:14:29 -0700
From: Jim Schaad <ietf@augustcellars.com>
To: "'Salz, Rich'" <rsalz@akamai.com>
References: <01d801d1f0ef$18a68030$49f38090$@augustcellars.com> <CAB=JzvHH-nP7axm88QTaCzWqBers5bbnToX0=r9Ys6i7VHmDpA@mail.gmail.com> <b3eeb0ca0d7b4b3c96633eebb383e3ea@usma1ex-dag1mb1.msg.corp.akamai.com>
In-Reply-To: <b3eeb0ca0d7b4b3c96633eebb383e3ea@usma1ex-dag1mb1.msg.corp.akamai.com>
Date: Mon, 8 Aug 2016 08:02:20 -0700
Message-ID: <02a601d1f185$de3ab9b0$9ab02d10$@augustcellars.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Outlook 16.0
thread-index: AQHpc95ztakHMNv8KmlwHM55196SjwE4Wm7jAnWSlsqf8rRzkA==
Content-Language: en-us
X-Originating-IP: [24.21.96.37]
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/5KMl-y5V9_kAaR3iPWSo3hM-s_M>
Cc: 'SPASM' <spasm@ietf.org>
Subject: Re: [Spasm] Change of Algorithms: Content Encryption Algorithms - Take 2
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 08 Aug 2016 15:02:54 -0000

Why should the rationale be in the document?

> -----Original Message-----
> From: Salz, Rich [mailto:rsalz@akamai.com]
> Sent: Monday, August 08, 2016 6:36 AM
> To: Jim Schaad <ietf@augustcellars.com>
> Cc: SPASM <spasm@ietf.org>
> Subject: RE: [Spasm] Change of Algorithms: Content Encryption Algorithms -
> Take 2
> 
> +1.  I assume the rationale will make it into the draft.



From nobody Mon Aug  8 09:51:13 2016
Return-Path: <gilles.vanassche@st.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A574D12D1AC for <spasm@ietfa.amsl.com>; Mon,  8 Aug 2016 09:51:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.601
X-Spam-Level: 
X-Spam-Status: No, score=-2.601 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id W7OYjAIpwdwu for <spasm@ietfa.amsl.com>; Mon,  8 Aug 2016 09:51:10 -0700 (PDT)
Received: from mx07-00178001.pphosted.com (mx07-00178001.pphosted.com [62.209.51.94]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 058D712D0EA for <spasm@ietf.org>; Mon,  8 Aug 2016 09:51:09 -0700 (PDT)
Received: from pps.filterd (m0046668.ppops.net [127.0.0.1]) by mx07-00178001.pphosted.com (8.16.0.11/8.16.0.11) with SMTP id u78GhovV016662; Mon, 8 Aug 2016 18:51:08 +0200
Received: from beta.dmz-eu.st.com (beta.dmz-eu.st.com [164.129.1.35]) by mx07-00178001.pphosted.com with ESMTP id 24n5c0thty-1 (version=TLSv1 cipher=ECDHE-RSA-AES256-SHA bits=256 verify=NOT); Mon, 08 Aug 2016 18:51:08 +0200
Received: from zeta.dmz-eu.st.com (zeta.dmz-eu.st.com [164.129.230.9]) by beta.dmz-eu.st.com (STMicroelectronics) with ESMTP id 7706331; Mon,  8 Aug 2016 16:51:07 +0000 (GMT)
Received: from Webmail-eu.st.com (safex1hubcas6.st.com [10.75.90.73]) by zeta.dmz-eu.st.com (STMicroelectronics) with ESMTP id 2F3FA2B3C; Mon,  8 Aug 2016 16:51:07 +0000 (GMT)
Received: from [10.137.2.67] (10.137.2.67) by webmail-eu.st.com (10.75.90.73) with Microsoft SMTP Server id 8.3.444.0; Mon, 8 Aug 2016 18:51:06 +0200
To: <spasm@ietf.org>
References: <020d01d1f11d$731ef7d0$595ce770$@augustcellars.com>
From: Gilles Van Assche <gilles.vanassche@st.com>
X-Enigmail-Draft-Status: N1110
Message-ID: <57A8B886.9010600@st.com>
Date: Mon, 8 Aug 2016 18:51:18 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101 Thunderbird/38.3.0
MIME-Version: 1.0
In-Reply-To: <020d01d1f11d$731ef7d0$595ce770$@augustcellars.com>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:, , definitions=2016-08-08_13:, , signatures=0
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/-yEYluHpgqqQP03zkfKqMA6zPe0>
Subject: Re: [Spasm] Change of Algorithms: Digest Algorithms
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 08 Aug 2016 16:51:12 -0000

Hi,

Why not consider SHAKE? It has good performance and has been publicly
evaluated.

Kind regards,
Gilles


On 08/08/16 04:34, Jim Schaad wrote:
> This message looks at Digest Algorithms.  Please restrict your discussion to
> this set of algorithms.  I will be sending out messages on other algorithms
> over time.
>
> Note:  Digest Algorithms are used for computing the digest of the content.
> These are not the "same" as the digest algorithms that are used as part of
> signature algorithms.  There may be things one wants to try and keep
> similar, as we suggest that you use the same digest algorithm, but they are
> not the same things.
>
>
> Current Document for S/MIME 3.1
>
> MUST: SHA-256
> SHOULD-: SHA-1, MD5(for backwards compatibility)
>
>
> Proposed for S/MIME 3.5
>
> MUST: SHA-256
> Historic: SHA-1, MD5
>
> Questions:
>
> 1.  There is only one MUST and no path forward.  Is this a problem that
> needs to be dealt with?  EdDSA25519 uses SHA-512 under the covers, does that
> mean we should make SHA-512 at least a SHOULD here?
>
> 2.  Is there anybody who wants to standup and argue for adopting in any of
> the SHA-3 algorithms?
>
> Jim
>
>
>


From nobody Mon Aug  8 19:53:21 2016
Return-Path: <ietf@augustcellars.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CA50612D6B8 for <spasm@ietfa.amsl.com>; Mon,  8 Aug 2016 19:53:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.147
X-Spam-Level: 
X-Spam-Status: No, score=-3.147 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RP_MATCHES_RCVD=-1.247, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LJR_IUvHWTPc for <spasm@ietfa.amsl.com>; Mon,  8 Aug 2016 19:53:19 -0700 (PDT)
Received: from mail2.augustcellars.com (augustcellars.com [50.45.239.150]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5634212D6B3 for <spasm@ietf.org>; Mon,  8 Aug 2016 19:53:18 -0700 (PDT)
Received: from hebrews (24.21.96.37) by mail2.augustcellars.com (192.168.0.56) with Microsoft SMTP Server (TLS) id 15.0.1178.4; Mon, 8 Aug 2016 20:04:58 -0700
From: Jim Schaad <ietf@augustcellars.com>
To: 'Russ Housley' <housley@vigilsec.com>
References: <01d801d1f0ef$18a68030$49f38090$@augustcellars.com> <D8AEFACC-4C55-4F34-8CA5-062C35052923@vigilsec.com>
In-Reply-To: <D8AEFACC-4C55-4F34-8CA5-062C35052923@vigilsec.com>
Date: Mon, 8 Aug 2016 19:52:46 -0700
Message-ID: <004701d1f1e9$1d65f470$5831dd50$@augustcellars.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_0048_01D1F1AE.710C4C90"
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQHpc95ztakHMNv8KmlwHM55196SjwH2Hs33oAE5OvA=
Content-Language: en-us
X-Originating-IP: [24.21.96.37]
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/n55FZrR8zVCF2fjLLU-VaewYBZA>
Cc: 'SPASM' <spasm@ietf.org>
Subject: Re: [Spasm] Change of Algorithms: Content Encryption Algorithms - Take 2
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 09 Aug 2016 02:53:21 -0000

------=_NextPart_000_0048_01D1F1AE.710C4C90
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit

I have no problems with this, however I will channel Blake - what is the
reason for having three must algorithms at this point?  I can see that the
support delta is very small given that both 128 and 256 bit AES primitive is
required already.

 

Jim

 

From: Spasm [mailto:spasm-bounces@ietf.org] On Behalf Of Russ Housley
Sent: Monday, August 08, 2016 7:21 AM
To: Jim Schaad <ietf@augustcellars.com>
Cc: SPASM <spasm@ietf.org>
Subject: Re: [Spasm] Change of Algorithms: Content Encryption Algorithms -
Take 2

 

I would like to see AES-128 GCM on the MUST list as well.

 

Russ

 

 

On Aug 7, 2016, at 5:03 PM, Jim Schaad <ietf@augustcellars.com
<mailto:ietf@augustcellars.com> > wrote:





I have looked at the responses to the original mail and am updating the mail
to reflect what I thought I saw as comments.

 

This message looks at Content Encryption Algorithms.  Please restrict your
discussions to this set of algorithms, I will be sending out messages on
other algorithm times over time.

 

Current Document for S/MIME 3.1

 

MUST: AES-128 CBC

SHOULD+: AES-192 CBC and AES-256 CBC

SHOULD-: DES EDE3 CBC (tripleDES)

Historic: RC2/40

 

Proposed for S/MIME 3.5

 

MUST:  AES-192 CBC, AES-256 CBC, AES-256 GCM

MUST-: AES-128 CBC

SHOULD+: ChaCha20/Poly1305 (256-bit)

SHOULD-: AES-128 CBC

Historic: RC2/40, DES EDE3 CBC (tripleDES)

 

Take 2 State: With this set we now have two MUST algorithms with the same
primitive.  We are indicating that we think that ChaCha20/Poly1305 will
become a MUST in the future so we have stated a potential fail over
algorithm if AES or GCM go into the tank for any reason.   More comments are
welcome.

 

Questions:

1.      The jump from MUST to SHOULD- may be too aggressive for AES-128 CBC,
we should potentially state this as MUST- but I think being aggressive makes
more sense as we want to go to all AEAD algorithms in next version.

Take 2 state: Russ said that yes I was.  As I suggested on the list I have
pushed this back up to a MUST-.

 

2.      No recommendation for: AES-128 GCM or AES-192 GCM, should there be?
How do people feel about 128 and 192 bit algorithms?

Take 2 state: List appears to say that we should not say anything about
192-bit algorithms.  However people did not comment on the -128 vs -256
question so I have left the recommendation of AES-256 GCM alone.

 

3.      Do we want to downgrade all of the CBC algorithms in favor of GCM
algorithms?

Take 2 state:  SPT is the only one who commented on this.  I have a tendency
to agree with his proposal that we are adding AEAD and we should be pushing
that as the preferred algorithm.  Making a MUST statement about AES-256 CBC
seems to counter act this statement so I have removed it.

 

Jim

 

 

 

_______________________________________________
Spasm mailing list
 <mailto:Spasm@ietf.org> Spasm@ietf.org
 <https://www.ietf.org/mailman/listinfo/spasm>
https://www.ietf.org/mailman/listinfo/spasm

 


------=_NextPart_000_0048_01D1F1AE.710C4C90
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" =
xmlns=3D"http://www.w3.org/TR/REC-html40"><head><META =
HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Dus-ascii"><meta name=3DGenerator content=3D"Microsoft Word 15 =
(filtered medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:Helvetica;
	panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman",serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.msonormal0, li.msonormal0, div.msonormal0
	{mso-style-name:msonormal;
	mso-margin-top-alt:auto;
	margin-right:0in;
	mso-margin-bottom-alt:auto;
	margin-left:0in;
	font-size:12.0pt;
	font-family:"Times New Roman",serif;}
span.apple-converted-space
	{mso-style-name:apple-converted-space;}
span.EmailStyle19
	{mso-style-type:personal-reply;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US link=3Dblue =
vlink=3Dpurple><div class=3DWordSection1><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>I have no =
problems with this, however I will channel Blake &#8211; what is the =
reason for having three must algorithms at this point?&nbsp; I can see =
that the support delta is very small given that both 128 and 256 bit AES =
primitive is required already.<o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'><o:p>&nbsp;</=
o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>Jim<o:p></o:p=
></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'><o:p>&nbsp;</=
o:p></span></p><div style=3D'border:none;border-left:solid blue =
1.5pt;padding:0in 0in 0in 4.0pt'><div><div =
style=3D'border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in'><p class=3DMsoNormal><b><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>From:</span><=
/b><span style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'> =
Spasm [mailto:spasm-bounces@ietf.org] <b>On Behalf Of </b>Russ =
Housley<br><b>Sent:</b> Monday, August 08, 2016 7:21 AM<br><b>To:</b> =
Jim Schaad &lt;ietf@augustcellars.com&gt;<br><b>Cc:</b> SPASM =
&lt;spasm@ietf.org&gt;<br><b>Subject:</b> Re: [Spasm] Change of =
Algorithms: Content Encryption Algorithms - Take =
2<o:p></o:p></span></p></div></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>I would like =
to see AES-128 GCM on the MUST list as well.<o:p></o:p></p><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>Russ<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><div><div><p class=3DMsoNormal>On =
Aug 7, 2016, at 5:03 PM, Jim Schaad &lt;<a =
href=3D"mailto:ietf@augustcellars.com">ietf@augustcellars.com</a>&gt; =
wrote:<o:p></o:p></p></div><p =
class=3DMsoNormal><br><br><o:p></o:p></p><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>I have =
looked at the responses to the original mail and am updating the mail to =
reflect what I thought I saw as =
comments.<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>&nbsp;<o:p></=
o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>This message =
looks at Content Encryption Algorithms.&nbsp; Please restrict your =
discussions to this set of algorithms, I will be sending out messages on =
other algorithm times over time.<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>&nbsp;<o:p></=
o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>Current =
Document for S/MIME 3.1<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>&nbsp;<o:p></=
o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>MUST: =
AES-128 CBC<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>SHOULD+: =
AES-192 CBC and AES-256 CBC<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>SHOULD-: DES =
EDE3 CBC (tripleDES)<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>Historic: =
RC2/40<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>&nbsp;<o:p></=
o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>Proposed for =
S/MIME 3.5<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>&nbsp;<o:p></=
o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>MUST:&nbsp;<s=
pan class=3Dapple-converted-space>&nbsp;</span><s>AES-192 CBC, AES-256 =
CBC,</s><span class=3Dapple-converted-space>&nbsp;</span>AES-256 =
GCM<o:p></o:p></span></p></div><div><p class=3DMsoNormal><b><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>MUST-: =
AES-128 CBC</span></b><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'><o:p></o:p></=
span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>SHOULD+: =
ChaCha20/Poly1305 (256-bit)<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><s><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>SHOULD-: =
AES-128 CBC</span></s><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'><o:p></o:p></=
span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>Historic: =
RC2/40, DES EDE3 CBC (tripleDES)<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>&nbsp;<o:p></=
o:p></span></p></div><div><p class=3DMsoNormal><b><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>Take 2 =
State</span></b><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>: With this =
set we now have two MUST algorithms with the same primitive.&nbsp; We =
are indicating that we think that ChaCha20/Poly1305 will become a MUST =
in the future so we have stated a potential fail over algorithm if AES =
or GCM go into the tank for any reason.&nbsp;&nbsp; More comments are =
welcome.<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>&nbsp;<o:p></=
o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>Questions:<o:=
p></o:p></span></p></div><div style=3D'margin-left:.5in'><p =
class=3DMsoNormal style=3D'text-indent:-.25in'><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>1.</span><spa=
n style=3D'font-size:7.0pt'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3Dapple-converted-space>&nbsp;</span></span><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>The jump =
from MUST to SHOULD- may be too aggressive for AES-128 CBC, we should =
potentially state this as MUST- but I think being aggressive makes more =
sense as we want to go to all AEAD algorithms in next =
version.<br><br><b>Take 2 state</b>: Russ said that yes I was.&nbsp; As =
I suggested on the list I have pushed this back up to a =
MUST-.<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>&nbsp;<o:p></=
o:p></span></p></div><div style=3D'margin-left:.5in'><p =
class=3DMsoNormal style=3D'text-indent:-.25in'><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>2.</span><spa=
n style=3D'font-size:7.0pt'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3Dapple-converted-space>&nbsp;</span></span><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>No =
recommendation for: AES-128 GCM or AES-192 GCM, should there be?&nbsp; =
How do people feel about 128 and 192 bit algorithms?<br><br><b>Take 2 =
state</b>: List appears to say that we should not say anything about =
192-bit algorithms.&nbsp; However people did not comment on the -128 vs =
-256 question so I have left the recommendation of AES-256 GCM =
alone.<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>&nbsp;<o:p></=
o:p></span></p></div><div style=3D'margin-left:.5in'><p =
class=3DMsoNormal style=3D'text-indent:-.25in'><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>3.</span><spa=
n style=3D'font-size:7.0pt'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3Dapple-converted-space>&nbsp;</span></span><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>Do we want =
to downgrade all of the CBC algorithms in favor of GCM =
algorithms?<br><br><b>Take 2 state</b>:&nbsp; SPT is the only one who =
commented on this.&nbsp; I have a tendency to agree with his proposal =
that we are adding AEAD and we should be pushing that as the preferred =
algorithm.&nbsp; Making a MUST statement about AES-256 CBC seems to =
counter act this statement so I have removed =
it.<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>&nbsp;<o:p></=
o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>Jim<o:p></o:p=
></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>&nbsp;<o:p></=
o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>&nbsp;<o:p></=
o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>&nbsp;<o:p></=
o:p></span></p></div><p class=3DMsoNormal><span =
style=3D'font-size:9.0pt;font-family:"Helvetica",sans-serif'>____________=
___________________________________<br>Spasm mailing list<br><a =
href=3D"mailto:Spasm@ietf.org"><span =
style=3D'color:#954F72'>Spasm@ietf.org</span></a><br><a =
href=3D"https://www.ietf.org/mailman/listinfo/spasm"><span =
style=3D'color:#954F72'>https://www.ietf.org/mailman/listinfo/spasm</span=
></a><o:p></o:p></span></p></div></blockquote></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div></div></div></body></html>
------=_NextPart_000_0048_01D1F1AE.710C4C90--


From nobody Mon Aug  8 20:00:03 2016
Return-Path: <ietf@augustcellars.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D57AF12D69E for <spasm@ietfa.amsl.com>; Mon,  8 Aug 2016 20:00:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.147
X-Spam-Level: 
X-Spam-Status: No, score=-3.147 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RP_MATCHES_RCVD=-1.247, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rlCAs-rf5R0C for <spasm@ietfa.amsl.com>; Mon,  8 Aug 2016 19:59:59 -0700 (PDT)
Received: from mail2.augustcellars.com (augustcellars.com [50.45.239.150]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EE40612B031 for <spasm@ietf.org>; Mon,  8 Aug 2016 19:59:58 -0700 (PDT)
Received: from hebrews (24.21.96.37) by mail2.augustcellars.com (192.168.0.56) with Microsoft SMTP Server (TLS) id 15.0.1178.4; Mon, 8 Aug 2016 20:12:04 -0700
From: Jim Schaad <ietf@augustcellars.com>
To: 'Russ Housley' <housley@vigilsec.com>
References: <01eb01d1f0f6$383f5230$a8bdf690$@augustcellars.com> <F4778C03-293A-44D4-85C2-5C0649D87E8B@vigilsec.com>
In-Reply-To: <F4778C03-293A-44D4-85C2-5C0649D87E8B@vigilsec.com>
Date: Mon, 8 Aug 2016 19:59:52 -0700
Message-ID: <005101d1f1ea$1b9de930$52d9bb90$@augustcellars.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_0052_01D1F1AF.6F4308D0"
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQH6Zs1F+AZ+g9clK0MJDseClGlVVAJmgV7vn9vSdzA=
Content-Language: en-us
X-Originating-IP: [24.21.96.37]
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/XwPpjHu1vwKTdt4Ywbt0clfGt1E>
Cc: 'SPASM' <spasm@ietf.org>
Subject: Re: [Spasm] Change of Algorithms: Signature Algorithms Take 2
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 09 Aug 2016 03:00:02 -0000

------=_NextPart_000_0052_01D1F1AF.6F4308D0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit

It seems to me that the same argument you made on 192 would apply here as
well.

 

Jim

 

 

From: Spasm [mailto:spasm-bounces@ietf.org] On Behalf Of Russ Housley
Sent: Monday, August 08, 2016 7:39 AM
To: Jim Schaad <ietf@augustcellars.com>
Cc: SPASM <spasm@ietf.org>
Subject: Re: [Spasm] Change of Algorithms: Signature Algorithms Take 2

 

I would like to see ECDSA P-384 w/ SHA-384 on the SHOULD list.

 

Russ

 

 

On Aug 7, 2016, at 5:54 PM, Jim Schaad <ietf@augustcellars.com
<mailto:ietf@augustcellars.com> > wrote:





This message looks at Signature Algorithms.  Please restrict your
discussions to this set of algorithms, I will be sending out messages on
other algorithms over time.

 

Current Document for S/MIME 3.1

 

MUST:   RSA w/ SHA-256

SHOULD+:  DSA w/ SHA-256, RSASSA-PSS w/ SHA-256

SHOULD-:  RSA w/ SHA-1, DSA w/SHA-1, RSA w/ MD5

Historic:

 

Key Sizes:

RSA and DSA - sign

SHOULD NOT            Key size <= 1023

SHOULD      1024 <= key size <= 2048

MAY            2048 < key size  

 

RSA and DSA - Verify

MAY                key size <= 1023

MUST      1024 <= key size <= 2048

MAY        2048 < key size

 

RSA - Certificate Verify

MAY             key size <= 1023

MUST  1024 <= key size <= 4096

MAY      4096  < key size

 

DSA - Certificate Verify

MAY             key size <= 1023

MUST    1024 <= key size <= 3072

 

 

 

Proposed for S/MIME 3.5

 

MUST: RSA-PSS w/ SHA-256, ECDSA P-256 w/ SHA-256, EdDSA25519

MUST-: RSA w/ SHA-256

SHOULD+:

SHOULD:  RSA-PSS w/ SHA-512, ECDSA P-521 w/ SHA-256512, EdDSA448

SHOULD-: DSA w/ SHA-256

Historic: RSA w/ SHA-1, DSA w/ SHA-1, RSA w/ MD5, DSA w/ SHA-256

 

Key Sizes:

RSA and DSA - sign

SHOULD NOT            Key size <= 2048 2047

SHOULD      2048 <= key size <= 4096

MAY             4096 < key size  

 

RSA and DSA - Verify

Historic MAY                key size <= 2048 2047

MUST      2048 <= key size <= 4096

MAY        4096 < key size

 

RSA - Certificate Verify

Historic MAY             key size <= 2048 2047

MUST  2048 <= key size <= 4096

MAY      4096  < key size

 

DSA - Certificate Verify

Historic MAY             key size <= 1023

Historic MUST   1024 <= key size <= 3072

 

 

Questions:

 

1.      Should DSA be dropped to historic for messages and just left as
SHOULD- for certificates, I don't know how many DSA certificates actually
exist.

Take 2 state: I have removed all DSA from the current set of algorithms for
both messages and certificates.  This is now historic only

 

2.      I have changed to lower limits on RSA but not DSA for certificate
verification - should it be changed as well?  Again I don't know how many
DSA certificates exist.

Take 2 state: I have removed DSA certificates to historic so the question is
moot.

 

3.      I don't think that any statements for ECDSA on key size need to be
made separately from the algorithm support list.  Does anybody disagree?

Take 2 state:  Nobody said anything to the contrary.  So no plans to make a
key size section for ECDSA algorithms.

 

4.      NEW: SPT suggested that we should not be making any statements on
doing anything with 512 hash values.  (Although with tons of standard snark
:)).   My reasoning for including this was less to do with the fact that I
thought the 512-bit hash functions were more efficient on 64-bit hardware (a
statement that I cannot find support for with a quick web search for SHA-2)
and therefore it made sense from a throughput point of view.   I don't think
we need the for security and if they are not more efficient I would be in
favor not making them SHOULDs

 

5.      NEW:  Blake has complained about the number of MUST algorithms that
comes out from this list.  There are effectively 4 in the list above, as
opposed to the 1 that is in the current set of documents.  We cannot kill
the current MUST so it has to stay.  However, all of the new MUSTs could be
downgraded from MUST to SHOULD without out any problems.  The only issue is
that one of them needs to be a MUST so that we have a true MUST not just a
MUST- algorithm.  Looking at the list my breakdown would be:

 

*        RSA-PSS - Given that it has been slow on update the only reason to
have it be a MUST is that most people are probably going to have RSA keys
today.  There are some arguments that say RSA-PSS is no better than RSA-v1.5
when doing real-world analysis.  I don't know that I agree with this as I
have problems with arguments by analogy.   This could easily be a SHOULD
instead of a MUST

*        ECDSA - This is the world of NIST requirements today.  I think this
justifies it being a MUST

*        EdDSA - This is the world of NOT MIST requirements today.  I think
this justifies it being a MUST

 

Jim

 

_______________________________________________
Spasm mailing list
 <mailto:Spasm@ietf.org> Spasm@ietf.org
 <https://www.ietf.org/mailman/listinfo/spasm>
https://www.ietf.org/mailman/listinfo/spasm

 


------=_NextPart_000_0052_01D1F1AF.6F4308D0
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" =
xmlns=3D"http://www.w3.org/TR/REC-html40"><head><META =
HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Dus-ascii"><meta name=3DGenerator content=3D"Microsoft Word 15 =
(filtered medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:Helvetica;
	panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman",serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.msonormal0, li.msonormal0, div.msonormal0
	{mso-style-name:msonormal;
	mso-margin-top-alt:auto;
	margin-right:0in;
	mso-margin-bottom-alt:auto;
	margin-left:0in;
	font-size:12.0pt;
	font-family:"Times New Roman",serif;}
span.apple-converted-space
	{mso-style-name:apple-converted-space;}
span.EmailStyle19
	{mso-style-type:personal-reply;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US link=3Dblue =
vlink=3Dpurple><div class=3DWordSection1><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>It seems to =
me that the same argument you made on 192 would apply here as =
well.<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'><o:p>&nbsp;</=
o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>Jim<o:p></o:p=
></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'><o:p>&nbsp;</=
o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'><o:p>&nbsp;</=
o:p></span></p><div style=3D'border:none;border-left:solid blue =
1.5pt;padding:0in 0in 0in 4.0pt'><div><div =
style=3D'border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in'><p class=3DMsoNormal><b><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>From:</span><=
/b><span style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'> =
Spasm [mailto:spasm-bounces@ietf.org] <b>On Behalf Of </b>Russ =
Housley<br><b>Sent:</b> Monday, August 08, 2016 7:39 AM<br><b>To:</b> =
Jim Schaad &lt;ietf@augustcellars.com&gt;<br><b>Cc:</b> SPASM =
&lt;spasm@ietf.org&gt;<br><b>Subject:</b> Re: [Spasm] Change of =
Algorithms: Signature Algorithms Take =
2<o:p></o:p></span></p></div></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>I would like =
to see ECDSA P-384 w/ SHA-384 on the SHOULD list.<o:p></o:p></p><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>Russ<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><div><div><p class=3DMsoNormal>On =
Aug 7, 2016, at 5:54 PM, Jim Schaad &lt;<a =
href=3D"mailto:ietf@augustcellars.com">ietf@augustcellars.com</a>&gt; =
wrote:<o:p></o:p></p></div><p =
class=3DMsoNormal><br><br><o:p></o:p></p><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>This message =
looks at Signature Algorithms.&nbsp; Please restrict your discussions to =
this set of algorithms, I will be sending out messages on other =
algorithms over time.<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>&nbsp;<o:p></=
o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>Current =
Document for S/MIME 3.1<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>&nbsp;<o:p></=
o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>MUST:&nbsp;&n=
bsp; RSA w/ SHA-256<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>SHOULD+:&nbsp=
; DSA w/ SHA-256, RSASSA-PSS w/ =
SHA-256<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>SHOULD-:&nbsp=
; RSA w/ SHA-1, DSA w/SHA-1, RSA w/ =
MD5<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>Historic:<o:p=
></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>&nbsp;<o:p></=
o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>Key =
Sizes:<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>RSA and DSA =
- sign<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>SHOULD =
NOT&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
Key size &lt;=3D 1023<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>SHOULD&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp; 1024 &lt;=3D key size &lt;=3D =
2048<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>MAY&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 2048 &lt; key =
size&nbsp;&nbsp;<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>&nbsp;<o:p></=
o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>RSA and DSA =
- Verify<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>MAY&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp; key size &lt;=3D 1023<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>MUST&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp; 1024 &lt;=3D key size &lt;=3D =
2048<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>MAY&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 2048 &lt; key =
size<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>&nbsp;<o:p></=
o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>RSA - =
Certificate Verify<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>MAY&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; key size =
&lt;=3D 1023<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>MUST&nbsp; =
1024 &lt;=3D key size &lt;=3D 4096<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>MAY&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp; 4096&nbsp; &lt; key =
size<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>&nbsp;<o:p></=
o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>DSA - =
Certificate Verify<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>MAY&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; key size =
&lt;=3D 1023<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>MUST&nbsp;&nb=
sp;&nbsp; 1024 &lt;=3D key size &lt;=3D =
3072<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>&nbsp;<o:p></=
o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>&nbsp;<o:p></=
o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>&nbsp;<o:p></=
o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>Proposed for =
S/MIME 3.5<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>&nbsp;<o:p></=
o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>MUST: =
RSA-PSS w/ SHA-256, ECDSA P-256 w/ SHA-256, =
EdDSA25519<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>MUST-: RSA =
w/ SHA-256<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>SHOULD+:<o:p>=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>SHOULD:&nbsp;=
 RSA-PSS w/ SHA-512, ECDSA P-521 w/ SHA-<s>256</s><b>512</b>, =
EdDSA448<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>SHOULD-:<span=
 class=3Dapple-converted-space>&nbsp;</span><s>DSA w/ =
SHA-256</s><o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>Historic: =
RSA w/ SHA-1, DSA w/ SHA-1, RSA w/ MD5,<span =
class=3Dapple-converted-space>&nbsp;</span><b>DSA w/ =
SHA-256</b><o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>&nbsp;<o:p></=
o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>Key =
Sizes:<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>RSA<span =
class=3Dapple-converted-space>&nbsp;</span><s>and DSA</s><span =
class=3Dapple-converted-space>&nbsp;</span>- =
sign<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>SHOULD =
NOT&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
Key size &lt;=3D<span =
class=3Dapple-converted-space>&nbsp;</span><s>2048</s><span =
class=3Dapple-converted-space>&nbsp;</span><b>2047</b><o:p></o:p></span><=
/p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>SHOULD&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp; 2048 &lt;=3D key size &lt;=3D =
4096<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>MAY&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 4096 &lt; =
key size&nbsp;&nbsp;<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>&nbsp;<o:p></=
o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>RSA<span =
class=3Dapple-converted-space>&nbsp;</span><s>and DSA</s><span =
class=3Dapple-converted-space>&nbsp;</span>- =
Verify<o:p></o:p></span></p></div><div><p class=3DMsoNormal><b><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>Historic<span=
 class=3Dapple-converted-space>&nbsp;</span></span></b><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>MAY&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp; key size &lt;=3D<span =
class=3Dapple-converted-space>&nbsp;</span><s>2048</s><span =
class=3Dapple-converted-space>&nbsp;</span><b>2047</b><o:p></o:p></span><=
/p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>MUST&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp; 2048 &lt;=3D key size &lt;=3D =
4096<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>MAY&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 4096 &lt; key =
size<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>&nbsp;<o:p></=
o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>RSA - =
Certificate Verify<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><b><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>Historic<span=
 class=3Dapple-converted-space>&nbsp;</span></span></b><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>MAY&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; key size =
&lt;=3D<span class=3Dapple-converted-space>&nbsp;</span><s>2048</s><span =
class=3Dapple-converted-space>&nbsp;</span><b>2047</b><o:p></o:p></span><=
/p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>MUST&nbsp; =
2048 &lt;=3D key size &lt;=3D 4096<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>MAY&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp; 4096&nbsp; &lt; key =
size<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>&nbsp;<o:p></=
o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>DSA - =
Certificate Verify<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><b><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>Historic<span=
 class=3Dapple-converted-space>&nbsp;</span></span></b><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>MAY&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; key size =
&lt;=3D 1023<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><b><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>Historic<span=
 class=3Dapple-converted-space>&nbsp;</span></span></b><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>MUST&nbsp;&nb=
sp; 1024 &lt;=3D key size &lt;=3D =
3072<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>&nbsp;<o:p></=
o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>&nbsp;<o:p></=
o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>Questions:<o:=
p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>&nbsp;<o:p></=
o:p></span></p></div><div style=3D'margin-left:.5in'><p =
class=3DMsoNormal style=3D'text-indent:-.25in'><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>1.</span><spa=
n style=3D'font-size:7.0pt'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3Dapple-converted-space>&nbsp;</span></span><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>Should DSA =
be dropped to historic for messages and just left as SHOULD- for =
certificates, I don't know how many DSA certificates actually =
exist.<br><br><b>Take 2 state:<span =
class=3Dapple-converted-space>&nbsp;</span></b>I have removed all DSA =
from the current set of algorithms for both messages and =
certificates.&nbsp; This is now historic =
only<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>&nbsp;<o:p></=
o:p></span></p></div><div style=3D'margin-left:.5in'><p =
class=3DMsoNormal style=3D'text-indent:-.25in'><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>2.</span><spa=
n style=3D'font-size:7.0pt'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3Dapple-converted-space>&nbsp;</span></span><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>I have =
changed to lower limits on RSA but not DSA for certificate verification =
- should it be changed as well?&nbsp; Again I don't know how many DSA =
certificates exist.<br><br><b>Take 2 state:<span =
class=3Dapple-converted-space>&nbsp;</span></b>I have removed DSA =
certificates to historic so the question is =
moot.<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>&nbsp;<o:p></=
o:p></span></p></div><div style=3D'margin-left:.5in'><p =
class=3DMsoNormal style=3D'text-indent:-.25in'><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>3.</span><spa=
n style=3D'font-size:7.0pt'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3Dapple-converted-space>&nbsp;</span></span><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>I don't =
think that any statements for ECDSA on key size need to be made =
separately from the algorithm support list.&nbsp; Does anybody =
disagree?<br><br><b>Take 2 state:</b>&nbsp; Nobody said anything to the =
contrary.&nbsp; So no plans to make a key size section for ECDSA =
algorithms.<o:p></o:p></span></p></div><div =
style=3D'margin-left:.5in'><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>&nbsp;<o:p></=
o:p></span></p></div><div style=3D'margin-left:.5in'><p =
class=3DMsoNormal style=3D'text-indent:-.25in'><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>4.</span><spa=
n style=3D'font-size:7.0pt'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3Dapple-converted-space>&nbsp;</span></span><b><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>NEW:<span =
class=3Dapple-converted-space>&nbsp;</span></span></b><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>SPT =
suggested that we should not be making any statements on doing anything =
with 512 hash values.&nbsp; (Although with tons of standard snark<span =
class=3Dapple-converted-space>&nbsp;</span></span><span =
style=3D'font-size:11.0pt;font-family:Wingdings'>J</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>).&nbsp;&nbsp=
; My reasoning for including this was less to do with the fact that I =
thought the 512-bit hash functions were more efficient on 64-bit =
hardware (a statement that I cannot find support for with a quick web =
search for SHA-2) and therefore it made sense from a throughput point of =
view.&nbsp;&nbsp; I don&#8217;t think we need the for security and if =
they are not more efficient I would be in favor not making them =
SHOULDs<o:p></o:p></span></p></div><div style=3D'margin-left:.5in'><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>&nbsp;<o:p></=
o:p></span></p></div><div style=3D'margin-left:.5in'><p =
class=3DMsoNormal style=3D'text-indent:-.25in'><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>5.</span><spa=
n style=3D'font-size:7.0pt'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3Dapple-converted-space>&nbsp;</span></span><b><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>NEW:</span></=
b><span class=3Dapple-converted-space><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>&nbsp;</span>=
</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>&nbsp;Blake =
has complained about the number of MUST algorithms that comes out from =
this list.&nbsp; There are effectively 4 in the list above, as opposed =
to the 1 that is in the current set of documents.&nbsp; We cannot kill =
the current MUST so it has to stay.&nbsp; However, all of the new MUSTs =
could be downgraded from MUST to SHOULD without out any problems.&nbsp; =
The only issue is that one of them needs to be a MUST so that we have a =
true MUST not just a MUST- algorithm.&nbsp; Looking at the list my =
breakdown would be:<o:p></o:p></span></p></div><div =
style=3D'margin-left:.5in'><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>&nbsp;<o:p></=
o:p></span></p></div><div style=3D'margin-left:1.0in'><p =
class=3DMsoNormal style=3D'text-indent:-.25in'><span =
style=3D'font-size:11.0pt;font-family:Symbol'>&middot;</span><span =
style=3D'font-size:7.0pt'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span=
 class=3Dapple-converted-space>&nbsp;</span></span><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>RSA-PSS =
&#8211; Given that it has been slow on update the only reason to have it =
be a MUST is that most people are probably going to have RSA keys =
today.&nbsp; There are some arguments that say RSA-PSS is no better than =
RSA-v1.5 when doing real-world analysis.&nbsp; I don&#8217;t know that I =
agree with this as I have problems with arguments by =
analogy.&nbsp;&nbsp; This could easily be a SHOULD instead of a =
MUST<o:p></o:p></span></p></div><div style=3D'margin-left:1.0in'><p =
class=3DMsoNormal style=3D'text-indent:-.25in'><span =
style=3D'font-size:11.0pt;font-family:Symbol'>&middot;</span><span =
style=3D'font-size:7.0pt'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span=
 class=3Dapple-converted-space>&nbsp;</span></span><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>ECDSA =
&#8211; This is the world of NIST requirements today.&nbsp; I think this =
justifies it being a MUST<o:p></o:p></span></p></div><div =
style=3D'margin-left:1.0in'><p class=3DMsoNormal =
style=3D'text-indent:-.25in'><span =
style=3D'font-size:11.0pt;font-family:Symbol'>&middot;</span><span =
style=3D'font-size:7.0pt'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span=
 class=3Dapple-converted-space>&nbsp;</span></span><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>EdDSA =
&#8211; This is the world of NOT MIST requirements today.&nbsp; I think =
this justifies it being a MUST<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>&nbsp;<o:p></=
o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>Jim<o:p></o:p=
></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>&nbsp;<o:p></=
o:p></span></p></div><p class=3DMsoNormal><span =
style=3D'font-size:9.0pt;font-family:"Helvetica",sans-serif'>____________=
___________________________________<br>Spasm mailing list<br><a =
href=3D"mailto:Spasm@ietf.org"><span =
style=3D'color:#954F72'>Spasm@ietf.org</span></a><br><a =
href=3D"https://www.ietf.org/mailman/listinfo/spasm"><span =
style=3D'color:#954F72'>https://www.ietf.org/mailman/listinfo/spasm</span=
></a><o:p></o:p></span></p></div></blockquote></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div></div></div></body></html>
------=_NextPart_000_0052_01D1F1AF.6F4308D0--


From nobody Mon Aug  8 20:07:17 2016
Return-Path: <ietf@augustcellars.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5734A12D69E for <spasm@ietfa.amsl.com>; Mon,  8 Aug 2016 20:07:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.148
X-Spam-Level: 
X-Spam-Status: No, score=-3.148 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-1.247, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BZJRKzdU8qUy for <spasm@ietfa.amsl.com>; Mon,  8 Aug 2016 20:07:15 -0700 (PDT)
Received: from mail2.augustcellars.com (augustcellars.com [50.45.239.150]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E808912B031 for <spasm@ietf.org>; Mon,  8 Aug 2016 20:07:14 -0700 (PDT)
Received: from hebrews (24.21.96.37) by mail2.augustcellars.com (192.168.0.56) with Microsoft SMTP Server (TLS) id 15.0.1178.4; Mon, 8 Aug 2016 20:19:00 -0700
From: Jim Schaad <ietf@augustcellars.com>
To: 'Gilles Van Assche' <gilles.vanassche@st.com>, <spasm@ietf.org>
References: <020d01d1f11d$731ef7d0$595ce770$@augustcellars.com> <57A8B886.9010600@st.com>
In-Reply-To: <57A8B886.9010600@st.com>
Date: Mon, 8 Aug 2016 20:06:48 -0700
Message-ID: <006001d1f1eb$13390e90$39ab2bb0$@augustcellars.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQHWFVA45DH236BAKjdHgAKf0jipKAOM5yixoBtC3lA=
Content-Language: en-us
X-Originating-IP: [24.21.96.37]
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/brAlXByHGCMG40cIRfZFmPrV0nI>
Subject: Re: [Spasm] Change of Algorithms: Digest Algorithms
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 09 Aug 2016 03:07:16 -0000

Given that SHAKE is really the same as SHA3, that would be part of the last
question that I asked.  SHAKE is not considered to be a hash algorithm, but
is instead an XOF (Extendable Output Function).  These do not have the quite
the same security claims as digest algorithms due to the arbitrary sized
output.  (I will modify the previous statement as saying this is my
understanding and may have nothing to do with reality.)

SHAKE256(M, d) is almost the same as SHA3-256.  (The only difference is the
unique algorithm marker).

Jim


> -----Original Message-----
> From: Spasm [mailto:spasm-bounces@ietf.org] On Behalf Of Gilles Van Assche
> Sent: Monday, August 08, 2016 9:51 AM
> To: spasm@ietf.org
> Subject: Re: [Spasm] Change of Algorithms: Digest Algorithms
> 
> Hi,
> 
> Why not consider SHAKE? It has good performance and has been publicly
> evaluated.
> 
> Kind regards,
> Gilles
> 
> 
> On 08/08/16 04:34, Jim Schaad wrote:
> > This message looks at Digest Algorithms.  Please restrict your
> > discussion to this set of algorithms.  I will be sending out messages
> > on other algorithms over time.
> >
> > Note:  Digest Algorithms are used for computing the digest of the
content.
> > These are not the "same" as the digest algorithms that are used as
> > part of signature algorithms.  There may be things one wants to try
> > and keep similar, as we suggest that you use the same digest
> > algorithm, but they are not the same things.
> >
> >
> > Current Document for S/MIME 3.1
> >
> > MUST: SHA-256
> > SHOULD-: SHA-1, MD5(for backwards compatibility)
> >
> >
> > Proposed for S/MIME 3.5
> >
> > MUST: SHA-256
> > Historic: SHA-1, MD5
> >
> > Questions:
> >
> > 1.  There is only one MUST and no path forward.  Is this a problem
> > that needs to be dealt with?  EdDSA25519 uses SHA-512 under the
> > covers, does that mean we should make SHA-512 at least a SHOULD here?
> >
> > 2.  Is there anybody who wants to standup and argue for adopting in
> > any of the SHA-3 algorithms?
> >
> > Jim
> >
> >
> >
> 
> _______________________________________________
> Spasm mailing list
> Spasm@ietf.org
> https://www.ietf.org/mailman/listinfo/spasm


From nobody Tue Aug  9 05:33:31 2016
Return-Path: <gilles.vanassche@st.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AA0EC12D68F for <spasm@ietfa.amsl.com>; Tue,  9 Aug 2016 05:33:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.601
X-Spam-Level: 
X-Spam-Status: No, score=-2.601 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nrJgyb0te44h for <spasm@ietfa.amsl.com>; Tue,  9 Aug 2016 05:33:28 -0700 (PDT)
Received: from mx07-00178001.pphosted.com (mx07-00178001.pphosted.com [62.209.51.94]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4BC7212D7E7 for <spasm@ietf.org>; Tue,  9 Aug 2016 05:17:17 -0700 (PDT)
Received: from pps.filterd (m0046037.ppops.net [127.0.0.1]) by m0046037.ppops.net (8.16.0.11/8.16.0.11) with SMTP id u79CF4kl017260; Tue, 9 Aug 2016 14:16:52 +0200
Received: from beta.dmz-eu.st.com (beta.dmz-eu.st.com [164.129.1.35]) by m0046037.ppops.net with ESMTP id 24n5nrpka4-1 (version=TLSv1 cipher=ECDHE-RSA-AES256-SHA bits=256 verify=NOT); Tue, 09 Aug 2016 14:16:52 +0200
Received: from zeta.dmz-eu.st.com (zeta.dmz-eu.st.com [164.129.230.9]) by beta.dmz-eu.st.com (STMicroelectronics) with ESMTP id 8548E31; Tue,  9 Aug 2016 12:16:51 +0000 (GMT)
Received: from Webmail-eu.st.com (safex1hubcas6.st.com [10.75.90.73]) by zeta.dmz-eu.st.com (STMicroelectronics) with ESMTP id D958224EE; Tue,  9 Aug 2016 12:16:50 +0000 (GMT)
Received: from [10.137.2.67] (10.137.2.67) by webmail-eu.st.com (10.75.90.73) with Microsoft SMTP Server id 8.3.444.0; Tue, 9 Aug 2016 14:16:50 +0200
To: Jim Schaad <ietf@augustcellars.com>, "spasm@ietf.org" <spasm@ietf.org>
References: <020d01d1f11d$731ef7d0$595ce770$@augustcellars.com> <57A8B886.9010600@st.com> <006001d1f1eb$13390e90$39ab2bb0$@augustcellars.com>
From: Gilles Van Assche <gilles.vanassche@st.com>
X-Enigmail-Draft-Status: N1110
Message-ID: <57A9C9BE.4070002@st.com>
Date: Tue, 9 Aug 2016 14:17:02 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101 Thunderbird/38.3.0
MIME-Version: 1.0
In-Reply-To: <006001d1f1eb$13390e90$39ab2bb0$@augustcellars.com>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:, , definitions=2016-08-09_04:, , signatures=0
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/9GhPMShreH0PQYd7C-A5D8OKR7Q>
Subject: Re: [Spasm] Change of Algorithms: Digest Algorithms
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 09 Aug 2016 12:33:30 -0000

On 09/08/16 05:07, Jim Schaad wrote:
> Given that SHAKE is really the same as SHA3, that would be part of the
> last question that I asked. SHAKE is not considered to be a hash
> algorithm, but is instead an XOF (Extendable Output Function).

Indeed. However, when restricted to a particular output length, the XOF
becomes a traditional hash function.

> These do not have the quite the same security claims as digest
> algorithms due to the arbitrary sized output. (I will modify the
> previous statement as saying this is my understanding and may have
> nothing to do with reality.)
>
> SHAKE256(M, d) is almost the same as SHA3-256. (The only difference is
> the unique algorithm marker).

The reason I mention SHAKE as opposed to the SHA3-* hash functions is
that SHAKE128 and SHAKE256 are faster for a given security strength.
I.e., SHAKE128 is faster than SHA3-256 for 128-bit security, and
SHAKE256 is faster than SHA3-512 for 256-bit security.

Kind regards,
Gilles


From nobody Tue Aug  9 16:46:09 2016
Return-Path: <dev+ietf@seantek.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 645A912D8FB for <spasm@ietfa.amsl.com>; Tue,  9 Aug 2016 16:46:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.601
X-Spam-Level: 
X-Spam-Status: No, score=-2.601 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6TponWaJfd16 for <spasm@ietfa.amsl.com>; Tue,  9 Aug 2016 16:46:07 -0700 (PDT)
Received: from mxout-08.mxes.net (mxout-08.mxes.net [216.86.168.183]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 86D5F12D1CA for <spasm@ietf.org>; Tue,  9 Aug 2016 16:46:07 -0700 (PDT)
Received: from [192.168.123.7] (unknown [75.83.2.34]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by smtp.mxes.net (Postfix) with ESMTPSA id 9D32A50A84 for <spasm@ietf.org>; Tue,  9 Aug 2016 19:46:06 -0400 (EDT)
To: spasm@ietf.org
References: <020d01d1f11d$731ef7d0$595ce770$@augustcellars.com> <3f325b55fd814e6fb45360550c42f74a@usma1ex-dag1mb1.msg.corp.akamai.com>
From: Sean Leonard <dev+ietf@seantek.com>
Message-ID: <3b80d361-3134-6328-1a97-ea8dc17260a6@seantek.com>
Date: Tue, 9 Aug 2016 16:44:35 -0700
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:45.0) Gecko/20100101 Thunderbird/45.2.0
MIME-Version: 1.0
In-Reply-To: <3f325b55fd814e6fb45360550c42f74a@usma1ex-dag1mb1.msg.corp.akamai.com>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/KmUJKMmi_nt83mK4lW_ZvvOlzf8>
Subject: Re: [Spasm] Change of Algorithms: Digest Algorithms
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 09 Aug 2016 23:46:08 -0000

On 8/8/2016 7:07 AM, Salz, Rich wrote:
>> 1.  There is only one MUST and no path forward.  Is this a problem that needs
>> to be dealt with?  EdDSA25519 uses SHA-512 under the covers, does that
>> mean we should make SHA-512 at least a SHOULD here?
>>
>> 2.  Is there anybody who wants to standup and argue for adopting in any of
>> the SHA-3 algorithms?
> I'd like to see *something* as a should.    I have a slight preference for SHA512, but could live with SHA3 if others feel strongly.

I think SHA-3 should be SHOULD-.

Sean


From nobody Tue Aug  9 18:07:32 2016
Return-Path: <ietf@augustcellars.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CD69B12B012 for <spasm@ietfa.amsl.com>; Tue,  9 Aug 2016 18:07:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.148
X-Spam-Level: 
X-Spam-Status: No, score=-3.148 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-1.247, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QCD-oI2qd1dO for <spasm@ietfa.amsl.com>; Tue,  9 Aug 2016 18:07:29 -0700 (PDT)
Received: from mail2.augustcellars.com (augustcellars.com [50.45.239.150]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A2D5A12D533 for <spasm@ietf.org>; Tue,  9 Aug 2016 18:07:28 -0700 (PDT)
Received: from hebrews (24.21.96.37) by mail2.augustcellars.com (192.168.0.56) with Microsoft SMTP Server (TLS) id 15.0.1178.4; Tue, 9 Aug 2016 18:19:19 -0700
From: Jim Schaad <ietf@augustcellars.com>
To: 'Sean Leonard' <dev+ietf@seantek.com>, <spasm@ietf.org>
References: <020d01d1f11d$731ef7d0$595ce770$@augustcellars.com> <3f325b55fd814e6fb45360550c42f74a@usma1ex-dag1mb1.msg.corp.akamai.com> <3b80d361-3134-6328-1a97-ea8dc17260a6@seantek.com>
In-Reply-To: <3b80d361-3134-6328-1a97-ea8dc17260a6@seantek.com>
Date: Tue, 9 Aug 2016 18:07:03 -0700
Message-ID: <016201d1f2a3$82fc7830$88f56890$@augustcellars.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQHWFVA45DH236BAKjdHgAKf0jipKAGLcmltAkDHdEigGrpX8A==
Content-Language: en-us
X-Originating-IP: [24.21.96.37]
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/jfBcaWANAs1dumyCax5kf6xsnhQ>
Subject: Re: [Spasm] Change of Algorithms: Digest Algorithms
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 10 Aug 2016 01:07:31 -0000

Why not just make it a MAY in that case or not mention it?

SHOULD-    This term means the same as SHOULD. However, the authors expect
that a requirement marked as SHOULD- will be demoted to a MAY in a future
version of this document.

Are you really saying it is going to go away in future versions?

jim

> -----Original Message-----
> From: Spasm [mailto:spasm-bounces@ietf.org] On Behalf Of Sean Leonard
> Sent: Tuesday, August 09, 2016 4:45 PM
> To: spasm@ietf.org
> Subject: Re: [Spasm] Change of Algorithms: Digest Algorithms
> 
> On 8/8/2016 7:07 AM, Salz, Rich wrote:
> >> 1.  There is only one MUST and no path forward.  Is this a problem
> >> that needs to be dealt with?  EdDSA25519 uses SHA-512 under the
> >> covers, does that mean we should make SHA-512 at least a SHOULD here?
> >>
> >> 2.  Is there anybody who wants to standup and argue for adopting in
> >> any of the SHA-3 algorithms?
> > I'd like to see *something* as a should.    I have a slight preference
for
> SHA512, but could live with SHA3 if others feel strongly.
> 
> I think SHA-3 should be SHOULD-.
> 
> Sean
> 
> _______________________________________________
> Spasm mailing list
> Spasm@ietf.org
> https://www.ietf.org/mailman/listinfo/spasm


From nobody Tue Aug  9 21:17:50 2016
Return-Path: <dev+ietf@seantek.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C128F12D5EC for <spasm@ietfa.amsl.com>; Tue,  9 Aug 2016 21:17:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.601
X-Spam-Level: 
X-Spam-Status: No, score=-2.601 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1wOvSng0qZQ7 for <spasm@ietfa.amsl.com>; Tue,  9 Aug 2016 21:17:47 -0700 (PDT)
Received: from mxout-08.mxes.net (mxout-08.mxes.net [216.86.168.183]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6B60A12D581 for <spasm@ietf.org>; Tue,  9 Aug 2016 21:17:47 -0700 (PDT)
Received: from [192.168.123.7] (unknown [75.83.2.34]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by smtp.mxes.net (Postfix) with ESMTPSA id 79C56509B5 for <spasm@ietf.org>; Wed, 10 Aug 2016 00:17:46 -0400 (EDT)
To: spasm@ietf.org
References: <020d01d1f11d$731ef7d0$595ce770$@augustcellars.com> <3f325b55fd814e6fb45360550c42f74a@usma1ex-dag1mb1.msg.corp.akamai.com> <3b80d361-3134-6328-1a97-ea8dc17260a6@seantek.com> <016201d1f2a3$82fc7830$88f56890$@augustcellars.com>
From: Sean Leonard <dev+ietf@seantek.com>
Message-ID: <0a055590-65d1-3d99-5f06-805f38b70f76@seantek.com>
Date: Tue, 9 Aug 2016 21:16:15 -0700
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:45.0) Gecko/20100101 Thunderbird/45.2.0
MIME-Version: 1.0
In-Reply-To: <016201d1f2a3$82fc7830$88f56890$@augustcellars.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/nbWWEQxNWozapgKjikoOunzUPRQ>
Subject: Re: [Spasm] Change of Algorithms: Digest Algorithms
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 10 Aug 2016 04:17:49 -0000

whoops, my bad. I guess I meant SHOULD- to mean "not really SHOULD right 
now, but it's going to be SHOULD soon", which I guess would be like a 
MAY+ or SHOULD↑↑.

But there are no MAY+ or SHOULD↑↑ keywords. So, I suppose, just 
"SHOULD"? Unless you want to propose a new term.

Sean

On 8/9/2016 6:07 PM, Jim Schaad wrote:
> Why not just make it a MAY in that case or not mention it?
>
> SHOULD-    This term means the same as SHOULD. However, the authors expect
> that a requirement marked as SHOULD- will be demoted to a MAY in a future
> version of this document.
>
> Are you really saying it is going to go away in future versions?
>
> jim
>
>> -----Original Message-----
>> From: Spasm [mailto:spasm-bounces@ietf.org] On Behalf Of Sean Leonard
>> Sent: Tuesday, August 09, 2016 4:45 PM
>> To: spasm@ietf.org
>> Subject: Re: [Spasm] Change of Algorithms: Digest Algorithms
>>
>> On 8/8/2016 7:07 AM, Salz, Rich wrote:
>>>> 1.  There is only one MUST and no path forward.  Is this a problem
>>>> that needs to be dealt with?  EdDSA25519 uses SHA-512 under the
>>>> covers, does that mean we should make SHA-512 at least a SHOULD here?
>>>>
>>>> 2.  Is there anybody who wants to standup and argue for adopting in
>>>> any of the SHA-3 algorithms?
>>> I'd like to see *something* as a should.    I have a slight preference
> for
>> SHA512, but could live with SHA3 if others feel strongly.
>>
>> I think SHA-3 should be SHOULD-.
>>
>> Sean
>>
>> _______________________________________________
>> Spasm mailing list
>> Spasm@ietf.org
>> https://www.ietf.org/mailman/listinfo/spasm
> _______________________________________________
> Spasm mailing list
> Spasm@ietf.org
> https://www.ietf.org/mailman/listinfo/spasm



From nobody Wed Aug 10 09:15:00 2016
Return-Path: <sean@sn3rd.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C851812D7B4 for <spasm@ietfa.amsl.com>; Wed, 10 Aug 2016 09:14:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.701
X-Spam-Level: 
X-Spam-Status: No, score=-2.701 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=sn3rd.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id p4MjJcb452RM for <spasm@ietfa.amsl.com>; Wed, 10 Aug 2016 09:14:57 -0700 (PDT)
Received: from mail-qk0-x234.google.com (mail-qk0-x234.google.com [IPv6:2607:f8b0:400d:c09::234]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 147B612D739 for <spasm@ietf.org>; Wed, 10 Aug 2016 09:14:57 -0700 (PDT)
Received: by mail-qk0-x234.google.com with SMTP id t7so48506621qkh.0 for <spasm@ietf.org>; Wed, 10 Aug 2016 09:14:57 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sn3rd.com; s=google; h=mime-version:subject:from:in-reply-to:date :content-transfer-encoding:message-id:references:to; bh=a3I5dd2K/LEyIu+b6a48Lw2670HhDR3FYOxz/baRfkU=; b=NQjN112mmbU3VV7Eai4EzO0TuzWrKrX0J8c2PDOmaxM/T+gURPd6DHmKkjkTK17MCb itQok2uEZ9eGpxcNBMnfIq61XB9qjYiELdB3Q6hxnj6xSmAnV78foOb2cPpch1GF+Sdx v6j3cPj9LPEjjeMk/5zaJja3IzMgMfKOnZfxI=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date :content-transfer-encoding:message-id:references:to; bh=a3I5dd2K/LEyIu+b6a48Lw2670HhDR3FYOxz/baRfkU=; b=RZ7BFSAooOejZHMeo1GwiRxGIdgUhBAJ5I1bXXDf2qfInke2NuWbda8yqWgULmJEPv aGSM4p6XATceiE7fowBPVHYwJmqWYBwZvoCq/J539BgpIJnu3RoaV7S0qewSTvzlQAcH Y0HZbKX3TufOE1okAg3qKSkCE2iHW98alLi4oWoHoyiWJwcayKlEIgB6uXOcWyd+od9i xUGgUgORPsakPrUTmmDPzoX7BiO0vSECHKHpjsC9bzTdXHsaWxCxmz0Lb59564H/Wkku RPicsD4ZHASe6qmgjJ1p3N+SGOR7oDXuNQyk3OyMsYIM3tCRBAGajtt396JzmFCLEU5e dmbA==
X-Gm-Message-State: AEkoouuCu6JbWS50gM1Elgqp73LUP5ftEBGfy2d6yTtAeAuUpVMP/Bp8Anpc3jc5e01a5w==
X-Received: by 10.233.235.143 with SMTP id b137mr5637149qkg.144.1470845696085;  Wed, 10 Aug 2016 09:14:56 -0700 (PDT)
Received: from [172.16.0.112] (pool-173-73-123-93.washdc.east.verizon.net. [173.73.123.93]) by smtp.gmail.com with ESMTPSA id w185sm23679912qkd.23.2016.08.10.09.14.55 for <spasm@ietf.org> (version=TLS1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Wed, 10 Aug 2016 09:14:55 -0700 (PDT)
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\))
From: Sean Turner <sean@sn3rd.com>
In-Reply-To: <57A8B886.9010600@st.com>
Date: Wed, 10 Aug 2016 12:14:53 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <275EA92F-2101-4C33-85F8-FAE12F61D783@sn3rd.com>
References: <020d01d1f11d$731ef7d0$595ce770$@augustcellars.com> <57A8B886.9010600@st.com>
To: SPASM <spasm@ietf.org>
X-Mailer: Apple Mail (2.3124)
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/NHwzbOUpdjrLxtKnsogArPmh5AQ>
Subject: Re: [Spasm] Change of Algorithms: Digest Algorithms
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 10 Aug 2016 16:14:59 -0000

I=E2=80=99m half expecting a lmgtfy link, but is SHAKE available in =
OpenSSL or on Widows or Macs?  Having folks generate code for a new =
content type to support AEAD algorithms is one thing and maybe a pretty =
big thing at that.  Being the first (correct me if I=E2=80=99m wrong =
here) IETF protocol to have a SHOULD SHAKE requirement seems like a =
requirement that=E2=80=99s going to get ignored.  If implementers =
don=E2=80=99t respond with a resounding chorus of "oh yeah! we were =
going to do that in our next release of product X" then I think that we =
should leave driving the SHAKE adoption train to some other more widely =
deployed/used protocol for now and S/MIME can piggy back off of it =
later.

spt

> On Aug 08, 2016, at 12:51, Gilles Van Assche <gilles.vanassche@st.com> =
wrote:
>=20
> Hi,
>=20
> Why not consider SHAKE? It has good performance and has been publicly
> evaluated.
>=20
> Kind regards,
> Gilles
>=20
>=20
> On 08/08/16 04:34, Jim Schaad wrote:
>> This message looks at Digest Algorithms.  Please restrict your =
discussion to
>> this set of algorithms.  I will be sending out messages on other =
algorithms
>> over time.
>>=20
>> Note:  Digest Algorithms are used for computing the digest of the =
content.
>> These are not the "same" as the digest algorithms that are used as =
part of
>> signature algorithms.  There may be things one wants to try and keep
>> similar, as we suggest that you use the same digest algorithm, but =
they are
>> not the same things.
>>=20
>>=20
>> Current Document for S/MIME 3.1
>>=20
>> MUST: SHA-256
>> SHOULD-: SHA-1, MD5(for backwards compatibility)
>>=20
>>=20
>> Proposed for S/MIME 3.5
>>=20
>> MUST: SHA-256
>> Historic: SHA-1, MD5
>>=20
>> Questions:
>>=20
>> 1.  There is only one MUST and no path forward.  Is this a problem =
that
>> needs to be dealt with?  EdDSA25519 uses SHA-512 under the covers, =
does that
>> mean we should make SHA-512 at least a SHOULD here?
>>=20
>> 2.  Is there anybody who wants to standup and argue for adopting in =
any of
>> the SHA-3 algorithms?
>>=20
>> Jim
>>=20
>>=20
>>=20
>=20
> _______________________________________________
> Spasm mailing list
> Spasm@ietf.org
> https://www.ietf.org/mailman/listinfo/spasm


From nobody Wed Aug 10 10:58:49 2016
Return-Path: <ynir.ietf@gmail.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F02F712D60E for <spasm@ietfa.amsl.com>; Wed, 10 Aug 2016 10:58:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.7
X-Spam-Level: 
X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5EO79hf_wBh7 for <spasm@ietfa.amsl.com>; Wed, 10 Aug 2016 10:58:46 -0700 (PDT)
Received: from mail-wm0-x234.google.com (mail-wm0-x234.google.com [IPv6:2a00:1450:400c:c09::234]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 55D9912D0F6 for <spasm@ietf.org>; Wed, 10 Aug 2016 10:58:46 -0700 (PDT)
Received: by mail-wm0-x234.google.com with SMTP id i5so120825027wmg.0 for <spasm@ietf.org>; Wed, 10 Aug 2016 10:58:46 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=pl8BG94wSiLIIqeMp3C/CRQJuR4cf0eQTeGIk0bJwF4=; b=1I50LSg8xhIZZ3s3rUqT9pGB7w24GtlqiOx6lIKIVsAJ+88BLFJNTPJwLDDetIewi+ wpfJjpfQ7z5yoIrHAx+LH3h9CntUA+zthsU5hN6JNSTKPJGtqXxXY5Cp0+rM3078ifSS MpUh5P9DJdOeHwBF4D6FGPu1U0fz6hYDwE/eS2COjXPdVukqxHsnZUgdkb2oTXZiLbqK prhUGbxWNsqWuSWvjhFPLqvv30YkZe5SG6UqtvtZHYrZ+xS87q3q1jnyAoUdUxeuBhGi /DaSpJwUu9BJLgn3RXSquKAmNt+1beF/0tsHVcbZDwFKKl4YlDWGvkmZfbcaDPzo9Iqj CvSA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=pl8BG94wSiLIIqeMp3C/CRQJuR4cf0eQTeGIk0bJwF4=; b=cLxKjV5kBzw0RkJsD0sfpSo5A3N+u4I7ehNCsL1pP1dXtGZWNqojVTT87QvQemLkBw +D+OyRy9CJG/rYYOFTEmyiAXn98z9rbL0keIYqLvUSOL4mCITStaiGRYs+UgJUMbDdFG n6kG9eRuosA9p0qQCP7DGZnQpT/0R9itSe3rk5bY13LN3Z44cNz2CLkIAj1ARWFDvU/f /dKGUpwRVK7y2Eh7ZLLDj98hbqQ2cA8Mh2MIsfvmpLdMurV+r50tDiJ0fgi/7MJlIFtL 7gWOE8eOtq9BW0DdxPMwry8rUiKYYgW0/mzTJlAuOywBKBaBQKdKBnXmKDxLl2TSdoLZ 4uKw==
X-Gm-Message-State: AEkoousDKPqLQzTwN1D/0tPvTDnQS3OnU6/L+zUMb+VyB0ZuM3DXkoeiMyhxwpMiRk8/QQ==
X-Received: by 10.194.139.34 with SMTP id qv2mr5294271wjb.50.1470851924734; Wed, 10 Aug 2016 10:58:44 -0700 (PDT)
Received: from [192.168.1.14] ([46.120.57.147]) by smtp.gmail.com with ESMTPSA id v189sm9468274wmv.12.2016.08.10.10.58.43 (version=TLS1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Wed, 10 Aug 2016 10:58:43 -0700 (PDT)
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\))
From: Yoav Nir <ynir.ietf@gmail.com>
In-Reply-To: <275EA92F-2101-4C33-85F8-FAE12F61D783@sn3rd.com>
Date: Wed, 10 Aug 2016 20:58:41 +0300
Content-Transfer-Encoding: quoted-printable
Message-Id: <84916CC1-AE92-4566-B500-A5E8BC8B1468@gmail.com>
References: <020d01d1f11d$731ef7d0$595ce770$@augustcellars.com> <57A8B886.9010600@st.com> <275EA92F-2101-4C33-85F8-FAE12F61D783@sn3rd.com>
To: Sean Turner <sean@sn3rd.com>
X-Mailer: Apple Mail (2.3124)
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/WyWrl7kLYFy3xIBgCCBetl8SZ94>
Cc: SPASM <spasm@ietf.org>
Subject: Re: [Spasm] Change of Algorithms: Digest Algorithms
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 10 Aug 2016 17:58:48 -0000

> On 10 Aug 2016, at 7:14 PM, Sean Turner <sean@sn3rd.com> wrote:
>=20
> I=E2=80=99m half expecting a lmgtfy link, but is SHAKE available in =
OpenSSL or on Widows or Macs?  Having folks generate code for a new =
content type to support AEAD algorithms is one thing and maybe a pretty =
big thing at that.  Being the first (correct me if I=E2=80=99m wrong =
here) IETF protocol to have a SHOULD SHAKE requirement seems like a =
requirement that=E2=80=99s going to get ignored.  If implementers =
don=E2=80=99t respond with a resounding chorus of "oh yeah! we were =
going to do that in our next release of product X" then I think that we =
should leave driving the SHAKE adoption train to some other more widely =
deployed/used protocol for now and S/MIME can piggy back off of it =
later.

Not in OpenSSL. AFAICT not in Windows or Mac library. You can find code =
online if you want to, though.

Looking at other places in the IETF, nobody=E2=80=99s rushing to write a =
=E2=80=9CSHA-3 and its use in xxx=E2=80=9D documents. In fact, there are =
none. Compare and contrast with SHA-2 documents when that algorithm was =
new or with ChaCha20/Poly1305 or Curve25519 documents more recently.=20

The only document I=E2=80=99ve seen that uses SHA-3 is the EdDSA =
document where for Curve448 SHAKE256 is used internally.

So in a word, the IETF response to SHA-3 is =E2=80=9Cmeh=E2=80=9D

Yoav=


From nobody Wed Aug 10 12:11:03 2016
Return-Path: <ietf@augustcellars.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A703312D0D1 for <spasm@ietfa.amsl.com>; Wed, 10 Aug 2016 12:11:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.148
X-Spam-Level: 
X-Spam-Status: No, score=-3.148 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-1.247, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id e4LGTpg_ddnz for <spasm@ietfa.amsl.com>; Wed, 10 Aug 2016 12:11:00 -0700 (PDT)
Received: from mail2.augustcellars.com (augustcellars.com [50.45.239.150]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C2D8512B029 for <spasm@ietf.org>; Wed, 10 Aug 2016 12:10:59 -0700 (PDT)
Received: from hebrews (50.39.87.30) by mail2.augustcellars.com (192.168.0.56) with Microsoft SMTP Server (TLS) id 15.0.1178.4; Wed, 10 Aug 2016 12:23:12 -0700
From: Jim Schaad <ietf@augustcellars.com>
To: 'Yoav Nir' <ynir.ietf@gmail.com>, 'Sean Turner' <sean@sn3rd.com>
References: <020d01d1f11d$731ef7d0$595ce770$@augustcellars.com> <57A8B886.9010600@st.com> <275EA92F-2101-4C33-85F8-FAE12F61D783@sn3rd.com> <84916CC1-AE92-4566-B500-A5E8BC8B1468@gmail.com>
In-Reply-To: <84916CC1-AE92-4566-B500-A5E8BC8B1468@gmail.com>
Date: Wed, 10 Aug 2016 12:10:51 -0700
Message-ID: <023801d1f33a$ecc23ba0$c646b2e0$@augustcellars.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQHWFVA45DH236BAKjdHgAKf0jipKAOM5yixAwUkYkIDO2h1gZ/r30bQ
Content-Language: en-us
X-Originating-IP: [50.39.87.30]
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/VJe8rYq_uxj6MqnRfrgixKq5Ww4>
Cc: 'SPASM' <spasm@ietf.org>
Subject: Re: [Spasm] Change of Algorithms: Digest Algorithms
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 10 Aug 2016 19:11:01 -0000

> -----Original Message-----
> From: Spasm [mailto:spasm-bounces@ietf.org] On Behalf Of Yoav Nir
> Sent: Wednesday, August 10, 2016 10:59 AM
> To: Sean Turner <sean@sn3rd.com>
> Cc: SPASM <spasm@ietf.org>
> Subject: Re: [Spasm] Change of Algorithms: Digest Algorithms
>=20
>=20
> > On 10 Aug 2016, at 7:14 PM, Sean Turner <sean@sn3rd.com> wrote:
> >
> > I=E2=80=99m half expecting a lmgtfy link, but is SHAKE available in =
OpenSSL or on
> Widows or Macs?  Having folks generate code for a new content type to =
support
> AEAD algorithms is one thing and maybe a pretty big thing at that.  =
Being the
> first (correct me if I=E2=80=99m wrong here) IETF protocol to have a =
SHOULD SHAKE
> requirement seems like a requirement that=E2=80=99s going to get =
ignored.  If
> implementers don=E2=80=99t respond with a resounding chorus of "oh =
yeah! we were
> going to do that in our next release of product X" then I think that =
we should
> leave driving the SHAKE adoption train to some other more widely
> deployed/used protocol for now and S/MIME can piggy back off of it =
later.
>=20
> Not in OpenSSL. AFAICT not in Windows or Mac library. You can find =
code online
> if you want to, though.
>=20
> Looking at other places in the IETF, nobody=E2=80=99s rushing to write =
a =E2=80=9CSHA-3 and its
> use in xxx=E2=80=9D documents. In fact, there are none. Compare and =
contrast with SHA-
> 2 documents when that algorithm was new or with ChaCha20/Poly1305 or
> Curve25519 documents more recently.
>=20
> The only document I=E2=80=99ve seen that uses SHA-3 is the EdDSA =
document where for
> Curve448 SHAKE256 is used internally.

This is the only place that I have seen it yet.  There is also an issue =
of having OIDs created.  They exist for the SHA3 algorithms, but the =
level of OIDs needed to treat SHAKE as a hash algorithm don't exist the =
last time I went on a search.

Jim

>=20
> So in a word, the IETF response to SHA-3 is =E2=80=9Cmeh=E2=80=9D
>=20
> Yoav
> _______________________________________________
> Spasm mailing list
> Spasm@ietf.org
> https://www.ietf.org/mailman/listinfo/spasm


From nobody Wed Aug 10 14:32:47 2016
Return-Path: <sean@sn3rd.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EA2BB12D877 for <spasm@ietfa.amsl.com>; Wed, 10 Aug 2016 14:32:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level: 
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=sn3rd.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Kr-S4XlvcX_s for <spasm@ietfa.amsl.com>; Wed, 10 Aug 2016 14:32:44 -0700 (PDT)
Received: from mail-yw0-x22c.google.com (mail-yw0-x22c.google.com [IPv6:2607:f8b0:4002:c05::22c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1E8C812D873 for <spasm@ietf.org>; Wed, 10 Aug 2016 14:32:44 -0700 (PDT)
Received: by mail-yw0-x22c.google.com with SMTP id j12so33160277ywb.2 for <spasm@ietf.org>; Wed, 10 Aug 2016 14:32:44 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sn3rd.com; s=google; h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=iTxT2+9EmXJATIGEqYoNvKnm4hKDiWYO8GGzAxpTY5g=; b=PEIx1v8NhE7lyUe+t2Cz2vGQeLdYruVQjGUaMOTTXbP/k+L+FjcCi9W7Z2CgFExbgu RKKE9oxcNjZoUy5wwi7cg7BUVQbwf1EnSLY5s5v6E2CrvXFmgJbvEfVIStKXlCcLuY74 JF1Qpi/G6bze7C94EsN2HQoO6p5Ka7y8k7crY=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=iTxT2+9EmXJATIGEqYoNvKnm4hKDiWYO8GGzAxpTY5g=; b=Dwe0ptxteWIPWQO9BN6q5ZqN/s0p32LXZauFwAf8YdoLRfW106EQnm+cBPYpy0W8n6 E+6xzh+mfbBKuG08Q4valTB+K8MinJmegeIDEP6psTTXGsQgoEuYxT5xQLpp9dLmJhD5 pppSa54xQ2GPgFGNLAb4N1zIiG1SrhkDmYdfnNRpf5ObR0HQ2YMcAhNOUsXBFw5clBvs n/JYLagduEgx4xz9vfKrqaL9Nv/IhU3bS6+vOaK/Q/ll7qHWhwb/+l+y9wLC0CDXnB8n I2G0Xvb3g94/k9KdYEi+eyVhKgEf8+8kglLKnQsO/pJPqFL6EGTXslov8QFqsnHvn5Nu eIXg==
X-Gm-Message-State: AEkooutzJmtqXUGMIgvhUtFScUdqIOwSaFqAsMSTbq4QU8r+9a22kzYtZEry4NCpYxrafA==
X-Received: by 10.129.108.194 with SMTP id h185mr4094671ywc.153.1470864763247;  Wed, 10 Aug 2016 14:32:43 -0700 (PDT)
Received: from [10.84.208.254] ([166.170.33.139]) by smtp.gmail.com with ESMTPSA id y85sm19343640ywy.23.2016.08.10.14.32.41 (version=TLS1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Wed, 10 Aug 2016 14:32:42 -0700 (PDT)
Content-Type: multipart/alternative; boundary=Apple-Mail-6D181A29-5C9D-4E16-9928-F6970031D890
Mime-Version: 1.0 (1.0)
From: Sean Turner <sean@sn3rd.com>
X-Mailer: iPhone Mail (13G35)
In-Reply-To: <023801d1f33a$ecc23ba0$c646b2e0$@augustcellars.com>
Date: Wed, 10 Aug 2016 17:32:40 -0400
Content-Transfer-Encoding: 7bit
Message-Id: <CD153376-B825-46A9-8AEA-C0221799F3AD@sn3rd.com>
References: <020d01d1f11d$731ef7d0$595ce770$@augustcellars.com> <57A8B886.9010600@st.com> <275EA92F-2101-4C33-85F8-FAE12F61D783@sn3rd.com> <84916CC1-AE92-4566-B500-A5E8BC8B1468@gmail.com> <023801d1f33a$ecc23ba0$c646b2e0$@augustcellars.com>
To: Jim Schaad <ietf@augustcellars.com>
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/NRjsExxUW8GTQC9WuvaytVQiWtY>
Cc: SPASM <spasm@ietf.org>, Yoav Nir <ynir.ietf@gmail.com>
Subject: Re: [Spasm] Change of Algorithms: Digest Algorithms
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 10 Aug 2016 21:32:46 -0000

--Apple-Mail-6D181A29-5C9D-4E16-9928-F6970031D890
Content-Type: text/plain;
	charset=utf-8
Content-Transfer-Encoding: quoted-printable


> On Aug 10, 2016, at 15:10, Jim Schaad <ietf@augustcellars.com> wrote:
>=20
>=20
>=20
>> -----Original Message-----
>> From: Spasm [mailto:spasm-bounces@ietf.org] On Behalf Of Yoav Nir
>> Sent: Wednesday, August 10, 2016 10:59 AM
>> To: Sean Turner <sean@sn3rd.com>
>> Cc: SPASM <spasm@ietf.org>
>> Subject: Re: [Spasm] Change of Algorithms: Digest Algorithms
>>=20
>>=20
>>> On 10 Aug 2016, at 7:14 PM, Sean Turner <sean@sn3rd.com> wrote:
>>>=20
>>> I=E2=80=99m half expecting a lmgtfy link, but is SHAKE available in Open=
SSL or on
>> Widows or Macs?  Having folks generate code for a new content type to sup=
port
>> AEAD algorithms is one thing and maybe a pretty big thing at that.  Being=
 the
>> first (correct me if I=E2=80=99m wrong here) IETF protocol to have a SHOU=
LD SHAKE
>> requirement seems like a requirement that=E2=80=99s going to get ignored.=
  If
>> implementers don=E2=80=99t respond with a resounding chorus of "oh yeah! w=
e were
>> going to do that in our next release of product X" then I think that we s=
hould
>> leave driving the SHAKE adoption train to some other more widely
>> deployed/used protocol for now and S/MIME can piggy back off of it later.=

>>=20
>> Not in OpenSSL. AFAICT not in Windows or Mac library. You can find code o=
nline
>> if you want to, though.
>>=20
>> Looking at other places in the IETF, nobody=E2=80=99s rushing to write a =E2=
=80=9CSHA-3 and its
>> use in xxx=E2=80=9D documents. In fact, there are none. Compare and contr=
ast with SHA-
>> 2 documents when that algorithm was new or with ChaCha20/Poly1305 or
>> Curve25519 documents more recently.
>>=20
>> The only document I=E2=80=99ve seen that uses SHA-3 is the EdDSA document=
 where for
>> Curve448 SHAKE256 is used internally.
>=20
> This is the only place that I have seen it yet.  There is also an issue of=
 having OIDs created.  They exist for the SHA3 algorithms, but the level of O=
IDs needed to treat SHAKE as a hash algorithm don't exist the last time I we=
nt on a search.
>=20
> Jim
>=20
>>=20
>> So in a word, the IETF response to SHA-3 is =E2=80=9Cmeh=E2=80=9D
>>=20
>> Yoav

I knew I had seen some oids (if we need them):

http://csrc.nist.gov/groups/ST/crypto_apps_infra/csor/algorithms.html

spt=

--Apple-Mail-6D181A29-5C9D-4E16-9928-F6970031D890
Content-Type: text/html;
	charset=utf-8
Content-Transfer-Encoding: quoted-printable

<html><head><meta http-equiv=3D"content-type" content=3D"text/html; charset=3D=
utf-8"></head><body dir=3D"auto"><div><br></div><div>On Aug 10, 2016, at 15:=
10, Jim Schaad &lt;<a href=3D"mailto:ietf@augustcellars.com">ietf@augustcell=
ars.com</a>&gt; wrote:<br><br></div><blockquote type=3D"cite"><span></span><=
br><span></span><br><blockquote type=3D"cite"><span>-----Original Message---=
--</span><br></blockquote><blockquote type=3D"cite"><span>From: Spasm [<a hr=
ef=3D"mailto:spasm-bounces@ietf.org">mailto:spasm-bounces@ietf.org</a>] On B=
ehalf Of Yoav Nir</span><br></blockquote><blockquote type=3D"cite"><span>Sen=
t: Wednesday, August 10, 2016 10:59 AM</span><br></blockquote><blockquote ty=
pe=3D"cite"><span>To: Sean Turner &lt;<a href=3D"mailto:sean@sn3rd.com">sean=
@sn3rd.com</a>&gt;</span><br></blockquote><blockquote type=3D"cite"><span>Cc=
: SPASM &lt;<a href=3D"mailto:spasm@ietf.org">spasm@ietf.org</a>&gt;</span><=
br></blockquote><blockquote type=3D"cite"><span>Subject: Re: [Spasm] Change o=
f Algorithms: Digest Algorithms</span><br></blockquote><blockquote type=3D"c=
ite"><span></span><br></blockquote><blockquote type=3D"cite"><span></span><b=
r></blockquote><blockquote type=3D"cite"><blockquote type=3D"cite"><span>On 1=
0 Aug 2016, at 7:14 PM, Sean Turner &lt;<a href=3D"mailto:sean@sn3rd.com">se=
an@sn3rd.com</a>&gt; wrote:</span><br></blockquote></blockquote><blockquote t=
ype=3D"cite"><blockquote type=3D"cite"><span></span><br></blockquote></block=
quote><blockquote type=3D"cite"><blockquote type=3D"cite"><span>I=E2=80=99m h=
alf expecting a lmgtfy link, but is SHAKE available in OpenSSL or on</span><=
br></blockquote></blockquote><blockquote type=3D"cite"><span>Widows or Macs?=
 &nbsp;Having folks generate code for a new content type to support</span><b=
r></blockquote><blockquote type=3D"cite"><span>AEAD algorithms is one thing a=
nd maybe a pretty big thing at that. &nbsp;Being the</span><br></blockquote>=
<blockquote type=3D"cite"><span>first (correct me if I=E2=80=99m wrong here)=
 IETF protocol to have a SHOULD SHAKE</span><br></blockquote><blockquote typ=
e=3D"cite"><span>requirement seems like a requirement that=E2=80=99s going t=
o get ignored. &nbsp;If</span><br></blockquote><blockquote type=3D"cite"><sp=
an>implementers don=E2=80=99t respond with a resounding chorus of "oh yeah! w=
e were</span><br></blockquote><blockquote type=3D"cite"><span>going to do th=
at in our next release of product X" then I think that we should</span><br><=
/blockquote><blockquote type=3D"cite"><span>leave driving the SHAKE adoption=
 train to some other more widely</span><br></blockquote><blockquote type=3D"=
cite"><span>deployed/used protocol for now and S/MIME can piggy back off of i=
t later.</span><br></blockquote><blockquote type=3D"cite"><span></span><br><=
/blockquote><blockquote type=3D"cite"><span>Not in OpenSSL. AFAICT not in Wi=
ndows or Mac library. You can find code online</span><br></blockquote><block=
quote type=3D"cite"><span>if you want to, though.</span><br></blockquote><bl=
ockquote type=3D"cite"><span></span><br></blockquote><blockquote type=3D"cit=
e"><span>Looking at other places in the IETF, nobody=E2=80=99s rushing to wr=
ite a =E2=80=9CSHA-3 and its</span><br></blockquote><blockquote type=3D"cite=
"><span>use in xxx=E2=80=9D documents. In fact, there are none. Compare and c=
ontrast with SHA-</span><br></blockquote><blockquote type=3D"cite"><span>2 d=
ocuments when that algorithm was new or with ChaCha20/Poly1305 or</span><br>=
</blockquote><blockquote type=3D"cite"><span>Curve25519 documents more recen=
tly.</span><br></blockquote><blockquote type=3D"cite"><span></span><br></blo=
ckquote><blockquote type=3D"cite"><span>The only document I=E2=80=99ve seen t=
hat uses SHA-3 is the EdDSA document where for</span><br></blockquote><block=
quote type=3D"cite"><span>Curve448 SHAKE256 is used internally.</span><br></=
blockquote><span></span><br><span>This is the only place that I have seen it=
 yet. &nbsp;There is also an issue of having OIDs created. &nbsp;They exist f=
or the SHA3 algorithms, but the level of OIDs needed to treat SHAKE as a has=
h algorithm don't exist the last time I went on a search.</span><br><span></=
span><br><span>Jim</span><br><span></span><br><blockquote type=3D"cite"><spa=
n></span><br></blockquote><blockquote type=3D"cite"><span>So in a word, the I=
ETF response to SHA-3 is =E2=80=9Cmeh=E2=80=9D</span><br></blockquote><block=
quote type=3D"cite"><span></span><br></blockquote><blockquote type=3D"cite">=
<span>Yoav</span></blockquote></blockquote><div><br></div>I knew I had seen s=
ome oids (if we need them):<div><br><div><a href=3D"http://csrc.nist.gov/gro=
ups/ST/crypto_apps_infra/csor/algorithms.html">http://csrc.nist.gov/groups/S=
T/crypto_apps_infra/csor/algorithms.html</a></div></div><div><br></div><div>=
spt</div></body></html>=

--Apple-Mail-6D181A29-5C9D-4E16-9928-F6970031D890--


From nobody Wed Aug 10 14:48:06 2016
Return-Path: <sean@sn3rd.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D5CA112D868 for <spasm@ietfa.amsl.com>; Wed, 10 Aug 2016 14:48:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=sn3rd.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3X5TQU8E89F0 for <spasm@ietfa.amsl.com>; Wed, 10 Aug 2016 14:48:04 -0700 (PDT)
Received: from mail-yb0-x22a.google.com (mail-yb0-x22a.google.com [IPv6:2607:f8b0:4002:c09::22a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 47313126579 for <spasm@ietf.org>; Wed, 10 Aug 2016 14:48:04 -0700 (PDT)
Received: by mail-yb0-x22a.google.com with SMTP id x196so18534021ybe.1 for <spasm@ietf.org>; Wed, 10 Aug 2016 14:48:04 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sn3rd.com; s=google; h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=78fmdz6iN0nkYUpwKngb6WgDgszrlzKqrheoKgTgV3Q=; b=jouX8e42Jlii+yoBER2DS7MiLH6oN8OKBWP4dfUO6gukqEKe3QHAC58qwGbBWO8SIb rEahTn4lA2RvZPfqBZ/iC43pEGbUsONcKMGimsoKANxrTcSpmzk8CdR0vVfb2tmoCZwA 0sZ/jLpvtGnZkNTWRl74uMUjsdytMBpTVI0OM=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=78fmdz6iN0nkYUpwKngb6WgDgszrlzKqrheoKgTgV3Q=; b=DyC58G/fK5kg3QA9bd0OGOdBGxtQK+kKWYEPeyC2U0sp3Od9RdA0rp752uTxXlwHGC 51bYWaA6rVT4egVBGVZYQkDD7CMpRyrk5TwRg2RDc6OZE6IdgL0B+xQ6qrEhjy67L5dP 0mrO3cJy6npU2Bhb+atmm7rztCRBDnCra/P+VAwrDr+DW+fP7zC1P6AP+MBbWKxIDQEs go+1iQOsYSUC6a4WgynFGdmRo1iDY6CL8xNWMU2Ny4YaoFxqDDQtLtE+ph3PwzymMxjN 5pW4eUP3tV2LWscYyef6P+tp7+HB2mT+Zs+fGVL5R5J2tvBmJQ0CjyTjSiwP/8JGFLGk nRfQ==
X-Gm-Message-State: AEkoouuO3z/BmTaaFM9zNcUek9nwE3Q/7r6bTViYSvnoH0ypSpZJbCwFN7N1Ki68HCF4qA==
X-Received: by 10.37.44.7 with SMTP id s7mr3787503ybs.99.1470865683464; Wed, 10 Aug 2016 14:48:03 -0700 (PDT)
Received: from [10.84.208.254] ([166.170.33.139]) by smtp.gmail.com with ESMTPSA id r186sm19344541ywr.38.2016.08.10.14.48.02 (version=TLS1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Wed, 10 Aug 2016 14:48:02 -0700 (PDT)
Content-Type: multipart/alternative; boundary=Apple-Mail-6432A602-E63E-440D-857C-220D9055D955
Mime-Version: 1.0 (1.0)
From: Sean Turner <sean@sn3rd.com>
X-Mailer: iPhone Mail (13G35)
In-Reply-To: <84916CC1-AE92-4566-B500-A5E8BC8B1468@gmail.com>
Date: Wed, 10 Aug 2016 17:48:01 -0400
Content-Transfer-Encoding: 7bit
Message-Id: <17767718-1822-4C81-9B75-615A1ED389D8@sn3rd.com>
References: <020d01d1f11d$731ef7d0$595ce770$@augustcellars.com> <57A8B886.9010600@st.com> <275EA92F-2101-4C33-85F8-FAE12F61D783@sn3rd.com> <84916CC1-AE92-4566-B500-A5E8BC8B1468@gmail.com>
To: Yoav Nir <ynir.ietf@gmail.com>
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/Ie_8K5SwbLbdGnoGpjqpQTLLgqw>
Cc: SPASM <spasm@ietf.org>
Subject: Re: [Spasm] Change of Algorithms: Digest Algorithms
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 10 Aug 2016 21:48:06 -0000

--Apple-Mail-6432A602-E63E-440D-857C-220D9055D955
Content-Type: text/plain;
	charset=utf-8
Content-Transfer-Encoding: quoted-printable


> On Aug 10, 2016, at 13:58, Yoav Nir <ynir.ietf@gmail.com> wrote:
>=20
>=20
>> On 10 Aug 2016, at 7:14 PM, Sean Turner <sean@sn3rd.com> wrote:
>>=20
>> I=E2=80=99m half expecting a lmgtfy link, but is SHAKE available in OpenS=
SL or on Widows or Macs?  Having folks generate code for a new content type t=
o support AEAD algorithms is one thing and maybe a pretty big thing at that.=
  Being the first (correct me if I=E2=80=99m wrong here) IETF protocol to ha=
ve a SHOULD SHAKE requirement seems like a requirement that=E2=80=99s going t=
o get ignored.  If implementers don=E2=80=99t respond with a resounding chor=
us of "oh yeah! we were going to do that in our next release of product X" t=
hen I think that we should leave driving the SHAKE adoption train to some ot=
her more widely deployed/used protocol for now and S/MIME can piggy back off=
 of it later.
>=20
> Not in OpenSSL. AFAICT not in Windows or Mac library. You can find code on=
line if you want to, though.
>=20
> Looking at other places in the IETF, nobody=E2=80=99s rushing to write a =E2=
=80=9CSHA-3 and its use in xxx=E2=80=9D documents. In fact, there are none. C=
ompare and contrast with SHA-2 documents when that algorithm was new or with=
 ChaCha20/Poly1305 or Curve25519 documents more recently.=20
>=20
> The only document I=E2=80=99ve seen that uses SHA-3 is the EdDSA document w=
here for Curve448 SHAKE256 is used internally.
>=20
> So in a word, the IETF response to SHA-3 is =E2=80=9Cmeh=E2=80=9D

There's also a handful of validated products too:
http://csrc.nist.gov/groups/STM/cavp/documents/sha3/sha3val.html

But, yeah I'm still thinking SHAKE shouldn't be a SHOULD.

spt=

--Apple-Mail-6432A602-E63E-440D-857C-220D9055D955
Content-Type: text/html;
	charset=utf-8
Content-Transfer-Encoding: quoted-printable

<html><head><meta http-equiv=3D"content-type" content=3D"text/html; charset=3D=
utf-8"></head><body dir=3D"auto"><div><br></div><div>On Aug 10, 2016, at 13:=
58, Yoav Nir &lt;<a href=3D"mailto:ynir.ietf@gmail.com">ynir.ietf@gmail.com<=
/a>&gt; wrote:<br><br></div><blockquote type=3D"cite"><span></span><br><bloc=
kquote type=3D"cite"><span>On 10 Aug 2016, at 7:14 PM, Sean Turner &lt;<a hr=
ef=3D"mailto:sean@sn3rd.com">sean@sn3rd.com</a>&gt; wrote:</span><br></block=
quote><blockquote type=3D"cite"><span></span><br></blockquote><blockquote ty=
pe=3D"cite"><span>I=E2=80=99m half expecting a lmgtfy link, but is SHAKE ava=
ilable in OpenSSL or on Widows or Macs? &nbsp;Having folks generate code for=
 a new content type to support AEAD algorithms is one thing and maybe a pret=
ty big thing at that. &nbsp;Being the first (correct me if I=E2=80=99m wrong=
 here) IETF protocol to have a SHOULD SHAKE requirement seems like a require=
ment that=E2=80=99s going to get ignored. &nbsp;If implementers don=E2=80=99=
t respond with a resounding chorus of "oh yeah! we were going to do that in o=
ur next release of product X" then I think that we should leave driving the S=
HAKE adoption train to some other more widely deployed/used protocol for now=
 and S/MIME can piggy back off of it later.</span><br></blockquote><span></s=
pan><br><span>Not in OpenSSL. AFAICT not in Windows or Mac library. You can f=
ind code online if you want to, though.</span><br><span></span><br><span>Loo=
king at other places in the IETF, nobody=E2=80=99s rushing to write a =E2=80=
=9CSHA-3 and its use in xxx=E2=80=9D documents. In fact, there are none. Com=
pare and contrast with SHA-2 documents when that algorithm was new or with C=
haCha20/Poly1305 or Curve25519 documents more recently. </span><br><span></s=
pan><br><span>The only document I=E2=80=99ve seen that uses SHA-3 is the EdD=
SA document where for Curve448 SHAKE256 is used internally.</span><br><span>=
</span><br><span>So in a word, the IETF response to SHA-3 is =E2=80=9Cmeh=E2=
=80=9D</span><br></blockquote><br><div>There's also a handful of validated p=
roducts too:</div><div><a href=3D"http://csrc.nist.gov/groups/STM/cavp/docum=
ents/sha3/sha3val.html">http://csrc.nist.gov/groups/STM/cavp/documents/sha3/=
sha3val.html</a></div><div><br></div><div>But, yeah I'm still thinking SHAKE=
 shouldn't be a SHOULD.</div><div><br></div><div>spt</div></body></html>=

--Apple-Mail-6432A602-E63E-440D-857C-220D9055D955--


From nobody Wed Aug 10 15:07:54 2016
Return-Path: <ietf@augustcellars.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2F32412D880 for <spasm@ietfa.amsl.com>; Wed, 10 Aug 2016 15:07:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.147
X-Spam-Level: 
X-Spam-Status: No, score=-3.147 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RP_MATCHES_RCVD=-1.247, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id v10cpjP7dZ2M for <spasm@ietfa.amsl.com>; Wed, 10 Aug 2016 15:07:52 -0700 (PDT)
Received: from mail2.augustcellars.com (augustcellars.com [50.45.239.150]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 63BF312D87E for <spasm@ietf.org>; Wed, 10 Aug 2016 15:07:51 -0700 (PDT)
Received: from hebrews (192.168.1.152) by mail2.augustcellars.com (192.168.1.201) with Microsoft SMTP Server (TLS) id 15.0.1178.4; Wed, 10 Aug 2016 15:20:02 -0700
From: Jim Schaad <ietf@augustcellars.com>
To: 'Sean Turner' <sean@sn3rd.com>
References: <020d01d1f11d$731ef7d0$595ce770$@augustcellars.com> <57A8B886.9010600@st.com> <275EA92F-2101-4C33-85F8-FAE12F61D783@sn3rd.com> <84916CC1-AE92-4566-B500-A5E8BC8B1468@gmail.com> <023801d1f33a$ecc23ba0$c646b2e0$@augustcellars.com> <CD153376-B825-46A9-8AEA-C0221799F3AD@sn3rd.com>
In-Reply-To: <CD153376-B825-46A9-8AEA-C0221799F3AD@sn3rd.com>
Date: Wed, 10 Aug 2016 15:07:46 -0700
Message-ID: <025c01d1f353$a1501430$e3f03c90$@augustcellars.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_025D_01D1F318.F4F2C2D0"
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQHWFVA45DH236BAKjdHgAKf0jipKAOM5yixAwUkYkIDO2h1gQIkrFdoARUtC9Kf0kIHEA==
Content-Language: en-us
X-Originating-IP: [192.168.1.152]
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/KHDPuJkRn5CG2So50D4TX0qkgK8>
Cc: 'SPASM' <spasm@ietf.org>, 'Yoav Nir' <ynir.ietf@gmail.com>
Subject: Re: [Spasm] Change of Algorithms: Digest Algorithms
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 10 Aug 2016 22:07:54 -0000

------=_NextPart_000_025D_01D1F318.F4F2C2D0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

=20

=20

From: Spasm [mailto:spasm-bounces@ietf.org] On Behalf Of Sean Turner
Sent: Wednesday, August 10, 2016 2:33 PM
To: Jim Schaad <ietf@augustcellars.com>
Cc: SPASM <spasm@ietf.org>; Yoav Nir <ynir.ietf@gmail.com>
Subject: Re: [Spasm] Change of Algorithms: Digest Algorithms

=20

=20

On Aug 10, 2016, at 15:10, Jim Schaad <ietf@augustcellars.com =
<mailto:ietf@augustcellars.com> > wrote:






-----Original Message-----

From: Spasm [mailto:spasm-bounces@ietf.org] On Behalf Of Yoav Nir

Sent: Wednesday, August 10, 2016 10:59 AM

To: Sean Turner <sean@sn3rd.com <mailto:sean@sn3rd.com> >

Cc: SPASM <spasm@ietf.org <mailto:spasm@ietf.org> >

Subject: Re: [Spasm] Change of Algorithms: Digest Algorithms

=20

=20

On 10 Aug 2016, at 7:14 PM, Sean Turner <sean@sn3rd.com =
<mailto:sean@sn3rd.com> > wrote:

=20

I=E2=80=99m half expecting a lmgtfy link, but is SHAKE available in =
OpenSSL or on

Widows or Macs?  Having folks generate code for a new content type to =
support

AEAD algorithms is one thing and maybe a pretty big thing at that.  =
Being the

first (correct me if I=E2=80=99m wrong here) IETF protocol to have a =
SHOULD SHAKE

requirement seems like a requirement that=E2=80=99s going to get =
ignored.  If

implementers don=E2=80=99t respond with a resounding chorus of "oh yeah! =
we were

going to do that in our next release of product X" then I think that we =
should

leave driving the SHAKE adoption train to some other more widely

deployed/used protocol for now and S/MIME can piggy back off of it =
later.

=20

Not in OpenSSL. AFAICT not in Windows or Mac library. You can find code =
online

if you want to, though.

=20

Looking at other places in the IETF, nobody=E2=80=99s rushing to write a =
=E2=80=9CSHA-3 and its

use in xxx=E2=80=9D documents. In fact, there are none. Compare and =
contrast with SHA-

2 documents when that algorithm was new or with ChaCha20/Poly1305 or

Curve25519 documents more recently.

=20

The only document I=E2=80=99ve seen that uses SHA-3 is the EdDSA =
document where for

Curve448 SHAKE256 is used internally.


This is the only place that I have seen it yet.  There is also an issue =
of having OIDs created.  They exist for the SHA3 algorithms, but the =
level of OIDs needed to treat SHAKE as a hash algorithm don't exist the =
last time I went on a search.

Jim




=20

So in a word, the IETF response to SHA-3 is =E2=80=9Cmeh=E2=80=9D

=20

Yoav

=20

I knew I had seen some oids (if we need them):

=20

http://csrc.nist.gov/groups/ST/crypto_apps_infra/csor/algorithms.html

=20

Yes =E2=80=93 that gives you the OIDs for doing SHA3.  But if you are =
doing SHAKE, where are you encoding the length of the output?  That is =
what I meant by the OIDs for SHAKE do not exist.

=20

Jim

=20

=20

spt


------=_NextPart_000_025D_01D1F318.F4F2C2D0
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" =
xmlns=3D"http://www.w3.org/TR/REC-html40"><head><meta =
http-equiv=3DContent-Type content=3D"text/html; charset=3Dutf-8"><meta =
name=3DGenerator content=3D"Microsoft Word 15 (filtered =
medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman",serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.msonormal0, li.msonormal0, div.msonormal0
	{mso-style-name:msonormal;
	mso-margin-top-alt:auto;
	margin-right:0in;
	mso-margin-bottom-alt:auto;
	margin-left:0in;
	font-size:12.0pt;
	font-family:"Times New Roman",serif;}
span.EmailStyle18
	{mso-style-type:personal-reply;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US link=3Dblue =
vlink=3Dpurple><div class=3DWordSection1><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'><o:p>&nbsp;</=
o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'><o:p>&nbsp;</=
o:p></span></p><div style=3D'border:none;border-left:solid blue =
1.5pt;padding:0in 0in 0in 4.0pt'><div><div =
style=3D'border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in'><p class=3DMsoNormal><b><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>From:</span><=
/b><span style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'> =
Spasm [mailto:spasm-bounces@ietf.org] <b>On Behalf Of </b>Sean =
Turner<br><b>Sent:</b> Wednesday, August 10, 2016 2:33 PM<br><b>To:</b> =
Jim Schaad &lt;ietf@augustcellars.com&gt;<br><b>Cc:</b> SPASM =
&lt;spasm@ietf.org&gt;; Yoav Nir =
&lt;ynir.ietf@gmail.com&gt;<br><b>Subject:</b> Re: [Spasm] Change of =
Algorithms: Digest Algorithms<o:p></o:p></span></p></div></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p class=3DMsoNormal =
style=3D'margin-bottom:12.0pt'>On Aug 10, 2016, at 15:10, Jim Schaad =
&lt;<a =
href=3D"mailto:ietf@augustcellars.com">ietf@augustcellars.com</a>&gt; =
wrote:<o:p></o:p></p></div><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><p =
class=3DMsoNormal><br><br><br><o:p></o:p></p><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><p =
class=3DMsoNormal>-----Original =
Message-----<o:p></o:p></p></blockquote><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><p =
class=3DMsoNormal>From: Spasm [<a =
href=3D"mailto:spasm-bounces@ietf.org">mailto:spasm-bounces@ietf.org</a>]=
 On Behalf Of Yoav Nir<o:p></o:p></p></blockquote><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><p =
class=3DMsoNormal>Sent: Wednesday, August 10, 2016 10:59 =
AM<o:p></o:p></p></blockquote><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><p class=3DMsoNormal>To: =
Sean Turner &lt;<a =
href=3D"mailto:sean@sn3rd.com">sean@sn3rd.com</a>&gt;<o:p></o:p></p></blo=
ckquote><blockquote style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><p =
class=3DMsoNormal>Cc: SPASM &lt;<a =
href=3D"mailto:spasm@ietf.org">spasm@ietf.org</a>&gt;<o:p></o:p></p></blo=
ckquote><blockquote style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><p =
class=3DMsoNormal>Subject: Re: [Spasm] Change of Algorithms: Digest =
Algorithms<o:p></o:p></p></blockquote><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></blockquote><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></blockquote><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><p class=3DMsoNormal>On =
10 Aug 2016, at 7:14 PM, Sean Turner &lt;<a =
href=3D"mailto:sean@sn3rd.com">sean@sn3rd.com</a>&gt; =
wrote:<o:p></o:p></p></blockquote></blockquote><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></blockquote></blockquote><blockqu=
ote style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><p =
class=3DMsoNormal>I=E2=80=99m half expecting a lmgtfy link, but is SHAKE =
available in OpenSSL or =
on<o:p></o:p></p></blockquote></blockquote><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><p =
class=3DMsoNormal>Widows or Macs? &nbsp;Having folks generate code for a =
new content type to support<o:p></o:p></p></blockquote><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><p class=3DMsoNormal>AEAD =
algorithms is one thing and maybe a pretty big thing at that. =
&nbsp;Being the<o:p></o:p></p></blockquote><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><p =
class=3DMsoNormal>first (correct me if I=E2=80=99m wrong here) IETF =
protocol to have a SHOULD SHAKE<o:p></o:p></p></blockquote><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><p =
class=3DMsoNormal>requirement seems like a requirement that=E2=80=99s =
going to get ignored. &nbsp;If<o:p></o:p></p></blockquote><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><p =
class=3DMsoNormal>implementers don=E2=80=99t respond with a resounding =
chorus of &quot;oh yeah! we were<o:p></o:p></p></blockquote><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><p =
class=3DMsoNormal>going to do that in our next release of product =
X&quot; then I think that we =
should<o:p></o:p></p></blockquote><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><p =
class=3DMsoNormal>leave driving the SHAKE adoption train to some other =
more widely<o:p></o:p></p></blockquote><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><p =
class=3DMsoNormal>deployed/used protocol for now and S/MIME can piggy =
back off of it later.<o:p></o:p></p></blockquote><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></blockquote><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><p class=3DMsoNormal>Not =
in OpenSSL. AFAICT not in Windows or Mac library. You can find code =
online<o:p></o:p></p></blockquote><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><p class=3DMsoNormal>if =
you want to, though.<o:p></o:p></p></blockquote><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></blockquote><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><p =
class=3DMsoNormal>Looking at other places in the IETF, nobody=E2=80=99s =
rushing to write a =E2=80=9CSHA-3 and =
its<o:p></o:p></p></blockquote><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><p class=3DMsoNormal>use =
in xxx=E2=80=9D documents. In fact, there are none. Compare and contrast =
with SHA-<o:p></o:p></p></blockquote><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><p class=3DMsoNormal>2 =
documents when that algorithm was new or with ChaCha20/Poly1305 =
or<o:p></o:p></p></blockquote><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><p =
class=3DMsoNormal>Curve25519 documents more =
recently.<o:p></o:p></p></blockquote><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></blockquote><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><p class=3DMsoNormal>The =
only document I=E2=80=99ve seen that uses SHA-3 is the EdDSA document =
where for<o:p></o:p></p></blockquote><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><p =
class=3DMsoNormal>Curve448 SHAKE256 is used =
internally.<o:p></o:p></p></blockquote><p class=3DMsoNormal><br>This is =
the only place that I have seen it yet. &nbsp;There is also an issue of =
having OIDs created. &nbsp;They exist for the SHA3 algorithms, but the =
level of OIDs needed to treat SHAKE as a hash algorithm don't exist the =
last time I went on a =
search.<br><br>Jim<br><br><br><o:p></o:p></p><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></blockquote><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><p class=3DMsoNormal>So =
in a word, the IETF response to SHA-3 is =
=E2=80=9Cmeh=E2=80=9D<o:p></o:p></p></blockquote><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></blockquote><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><p =
class=3DMsoNormal>Yoav<o:p></o:p></p></blockquote></blockquote><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><p class=3DMsoNormal>I knew =
I had seen some oids (if we need them):<o:p></o:p></p><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><div><p class=3DMsoNormal><a =
href=3D"http://csrc.nist.gov/groups/ST/crypto_apps_infra/csor/algorithms.=
html">http://csrc.nist.gov/groups/ST/crypto_apps_infra/csor/algorithms.ht=
ml</a><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'><o:p>&nbsp;</=
o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>Yes =
=E2=80=93 that gives you the OIDs for doing SHA3.=C2=A0 But if you are =
doing SHAKE, where are you encoding the length of the output?=C2=A0 That =
is what I meant by the OIDs for SHAKE do not =
exist.<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'><o:p>&nbsp;</=
o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>Jim<o:p></o:p=
></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'><o:p>&nbsp;</=
o:p></span></p></div></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>spt<o:p></o:p></p></div></div></div></body></html>
------=_NextPart_000_025D_01D1F318.F4F2C2D0--


From nobody Thu Aug 11 03:04:55 2016
Return-Path: <gilles.vanassche@st.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D1DFF12B014 for <spasm@ietfa.amsl.com>; Thu, 11 Aug 2016 03:04:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.601
X-Spam-Level: 
X-Spam-Status: No, score=-2.601 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8YPxQilrb16i for <spasm@ietfa.amsl.com>; Thu, 11 Aug 2016 03:04:52 -0700 (PDT)
Received: from mx07-00178001.pphosted.com (mx08-00178001.pphosted.com [91.207.212.93]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E90C6126579 for <spasm@ietf.org>; Thu, 11 Aug 2016 03:04:51 -0700 (PDT)
Received: from pps.filterd (m0046660.ppops.net [127.0.0.1]) by mx08-00178001.pphosted.com (8.16.0.11/8.16.0.11) with SMTP id u7BA1Knf023255; Thu, 11 Aug 2016 12:04:50 +0200
Received: from beta.dmz-eu.st.com (beta.dmz-eu.st.com [164.129.1.35]) by mx08-00178001.pphosted.com with ESMTP id 24n515jbwu-1 (version=TLSv1 cipher=ECDHE-RSA-AES256-SHA bits=256 verify=NOT); Thu, 11 Aug 2016 12:04:50 +0200
Received: from zeta.dmz-eu.st.com (zeta.dmz-eu.st.com [164.129.230.9]) by beta.dmz-eu.st.com (STMicroelectronics) with ESMTP id 9D48831; Thu, 11 Aug 2016 10:04:49 +0000 (GMT)
Received: from Webmail-eu.st.com (safex1hubcas6.st.com [10.75.90.73]) by zeta.dmz-eu.st.com (STMicroelectronics) with ESMTP id 4542F1579; Thu, 11 Aug 2016 10:04:49 +0000 (GMT)
Received: from [10.137.2.67] (10.137.2.67) by webmail-eu.st.com (10.75.90.73) with Microsoft SMTP Server id 8.3.444.0; Thu, 11 Aug 2016 12:04:48 +0200
To: <spasm@ietf.org>
References: <020d01d1f11d$731ef7d0$595ce770$@augustcellars.com> <57A8B886.9010600@st.com> <275EA92F-2101-4C33-85F8-FAE12F61D783@sn3rd.com> <84916CC1-AE92-4566-B500-A5E8BC8B1468@gmail.com> <17767718-1822-4C81-9B75-615A1ED389D8@sn3rd.com>
From: Gilles Van Assche <gilles.vanassche@st.com>
X-Enigmail-Draft-Status: N1110
Message-ID: <57AC4DCD.1070306@st.com>
Date: Thu, 11 Aug 2016 12:05:01 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101 Thunderbird/38.3.0
MIME-Version: 1.0
In-Reply-To: <17767718-1822-4C81-9B75-615A1ED389D8@sn3rd.com>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:, , definitions=2016-08-11_06:, , signatures=0
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/scEBoLxZeocaAh8-cYG14gQCHc4>
Subject: Re: [Spasm] Change of Algorithms: Digest Algorithms
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Aug 2016 10:04:54 -0000

It still surprises me that people stick to SHA-2, a family of algorithms
designed by NSA behind closed doors, while SHA-3
- comes with a design rationale;
- received many years of public scrutiny before it became a standard;
- has a thicker safety margin;
- has software performances similar to SHA-2 (or better performance at a
comparable safety margin);
- offers much better performance in many cases (e.g., hardware,
side-channel protections);
- excels at flexibility with simpler and more efficient solutions for
mask generating functions, PRF, MAC, PRNG, etc.

Kind regards,
Gilles


On 10/08/16 23:48, Sean Turner wrote:
>
> On Aug 10, 2016, at 13:58, Yoav Nir <ynir.ietf@gmail.com
> <mailto:ynir.ietf@gmail.com>> wrote:
>
>>
>>> On 10 Aug 2016, at 7:14 PM, Sean Turner <sean@sn3rd.com
>>> <mailto:sean@sn3rd.com>> wrote:
>>>
>>> I’m half expecting a lmgtfy link, but is SHAKE available in OpenSSL
>>> or on Widows or Macs?  Having folks generate code for a new content
>>> type to support AEAD algorithms is one thing and maybe a pretty big
>>> thing at that.  Being the first (correct me if I’m wrong here) IETF
>>> protocol to have a SHOULD SHAKE requirement seems like a requirement
>>> that’s going to get ignored.  If implementers don’t respond with a
>>> resounding chorus of "oh yeah! we were going to do that in our next
>>> release of product X" then I think that we should leave driving the
>>> SHAKE adoption train to some other more widely deployed/used
>>> protocol for now and S/MIME can piggy back off of it later.
>>
>> Not in OpenSSL. AFAICT not in Windows or Mac library. You can find
>> code online if you want to, though.
>>
>> Looking at other places in the IETF, nobody’s rushing to write a
>> “SHA-3 and its use in xxx” documents. In fact, there are none.
>> Compare and contrast with SHA-2 documents when that algorithm was new
>> or with ChaCha20/Poly1305 or Curve25519 documents more recently.
>>
>> The only document I’ve seen that uses SHA-3 is the EdDSA document
>> where for Curve448 SHAKE256 is used internally.
>>
>> So in a word, the IETF response to SHA-3 is “meh”
>
> There's also a handful of validated products too:
> http://csrc.nist.gov/groups/STM/cavp/documents/sha3/sha3val.html
>
> But, yeah I'm still thinking SHAKE shouldn't be a SHOULD.
>
> spt


From nobody Thu Aug 11 03:24:43 2016
Return-Path: <quynh.dang@nist.gov>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0D5D712D0A1 for <spasm@ietfa.amsl.com>; Thu, 11 Aug 2016 03:24:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level: 
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nistgov.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aMLtLf2FTi-S for <spasm@ietfa.amsl.com>; Thu, 11 Aug 2016 03:24:38 -0700 (PDT)
Received: from gcc01-dm2-obe.outbound.protection.outlook.com (mail-dm2gcc01on0128.outbound.protection.outlook.com [23.103.201.128]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E3B0B12B069 for <spasm@ietf.org>; Thu, 11 Aug 2016 03:24:37 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nistgov.onmicrosoft.com; s=selector1-nist-gov; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=MvxsFI3zHJM9U9qoKtDrstV+iZa5OGFhei+nJf0zuGU=; b=MzSoxk14tyf+Q4IZu5ZqxYcb9l8P86Bp6eg/jmOK6VQZak3ttnWM7d7b5iEczJ5EQ9CZCuyDODUsTdF+rKeAy3RMMq+zyFJnkwbHDm6/KAwofqqsGSg7sNdlAdUOQgC/55XB2FerzNi3U9uEvULcbSA+7x94Gnwa5ojEdQ9z8pE=
Received: from MWHPR09MB1390.namprd09.prod.outlook.com (10.172.51.16) by MWHPR09MB1390.namprd09.prod.outlook.com (10.172.51.16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384) id 15.1.549.15; Thu, 11 Aug 2016 10:24:34 +0000
Received: from MWHPR09MB1390.namprd09.prod.outlook.com ([10.172.51.16]) by MWHPR09MB1390.namprd09.prod.outlook.com ([10.172.51.16]) with mapi id 15.01.0549.025; Thu, 11 Aug 2016 10:24:34 +0000
From: "Dang, Quynh (Fed)" <quynh.dang@nist.gov>
To: Jim Schaad <ietf@augustcellars.com>, 'Sean Turner' <sean@sn3rd.com>
Thread-Topic: [Spasm] Change of Algorithms: Digest Algorithms
Thread-Index: AQHR8ZUU0gvUKfqt3UaAyC8x2q/k8qBCYX2AgAAdAICAABQqgIAAJ58AgAAJzwCAAIrMAA==
Date: Thu, 11 Aug 2016 10:24:33 +0000
Message-ID: <D3D1C5DC.2883E%qdang@nist.gov>
References: <020d01d1f11d$731ef7d0$595ce770$@augustcellars.com> <57A8B886.9010600@st.com> <275EA92F-2101-4C33-85F8-FAE12F61D783@sn3rd.com> <84916CC1-AE92-4566-B500-A5E8BC8B1468@gmail.com> <023801d1f33a$ecc23ba0$c646b2e0$@augustcellars.com> <CD153376-B825-46A9-8AEA-C0221799F3AD@sn3rd.com> <025c01d1f353$a1501430$e3f03c90$@augustcellars.com>
In-Reply-To: <025c01d1f353$a1501430$e3f03c90$@augustcellars.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/14.6.3.160329
authentication-results: spf=none (sender IP is ) smtp.mailfrom=quynh.dang@nist.gov; 
x-ms-exchange-messagesentrepresentingtype: 1
x-originating-ip: [129.6.220.213]
x-ms-office365-filtering-correlation-id: e338b153-84e3-4578-ebdc-08d3c1d1b0b2
x-microsoft-exchange-diagnostics: 1; MWHPR09MB1390; 6:xoANIeuzqaTtNXHLA+Fs0c7HBnDeICIQCYozn4beFciUftbjuydBN+FgWM4xsyotkLrsj7qMIqwFT5XvN3VGR1GHmBeqRJmmJcp/6acwzDbhvRk4Y8I/Jq9OkRy/6JGlzdB0fzOQ5GBzcn6BYEhzuCLt28IUEGt6UMVisRFfob+EU86AFXsPUlWubnS8ld2GfZdGj/kbJBjI1xJ7aTUe5E70KhCgkTZ7d43m4NgfkrKChhENR2TgIu/ThTTWAfVJnOs9Ul2vhfb+OYHsPsmggQPWoTcD53G9jecJ88oXI4oR1zTzAuUK3RNVvhlwVmO3qpULyT72DCr1tbIGKf+L5g==; 5:zmq19XRZ+FlS/iWqn49XnM9DbjPAygpz+sVy/tRgH9SlnJVsuwmnfHA51qXbw5+wUpWAaoLQVQvR42IAds8Vt8qKjTgz1K4CxGS3lOBVeaNhIjTH4TokB+0jM1DKtDo8kZo9bE9g20rbdTllQDBCHA==; 24:xRSQiH049ecCuJPoZ4F+7URZ8fZwvheQnu23ddBuAZcU5e/YDeVo+F90HTIjxvWsxhjCj1uST6KkKfSS8DJLxRYnqmJLZZCtVPbu0mO8KDg=; 7:UnhIVfneH3hr4hCF5xceE+ukV2uudtucdgZ/WUMKxI0QI7urJTfXxgf2IAbYKel3BPQltzgCjNUVexn7be6fq37RFm42EzQlDyZr4EBBOAOhSn/vqo9p7wyhLrxNmGvLdKwGPkKfi0JhX7YtpMBa3DD5Z0FVn6oiaMNutrPn3Xw7O/icxLSgg1g6SSzgH12MSm1uRk9i9ROpcugiBWEkEk0yQwWo25S9iAF9T0vxBxbekGH9SFDUQAWvopyJL4km
x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:MWHPR09MB1390;
x-microsoft-antispam-prvs: <MWHPR09MB1390F9966933E63643315247F31E0@MWHPR09MB1390.namprd09.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(65766998875637)(209352067349851)(131022147185803)(21748063052155)(17755550239193);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040171)(601004)(2401047)(8121501046)(5005006)(3002001)(10201501046)(6055026); SRVR:MWHPR09MB1390; BCL:0; PCL:0; RULEID:; SRVR:MWHPR09MB1390; 
x-forefront-prvs: 0031A0FFAF
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(7916002)(51444003)(189002)(377454003)(13464003)(199003)(18543002)(24454002)(101416001)(87936001)(93886004)(10400500002)(19617315012)(5002640100001)(86362001)(19580395003)(19625215002)(36756003)(77096005)(66066001)(76176999)(54356999)(16236675004)(122556002)(50986999)(7906003)(8676002)(2900100001)(2950100001)(105586002)(15975445007)(5001770100001)(3280700002)(99286002)(4326007)(2906002)(92566002)(790700001)(189998001)(586003)(7846002)(7736002)(19580405001)(3846002)(6116002)(4001350100001)(102836003)(3660700001)(68736007)(19300405004)(97736004)(81166006)(106116001)(83506001)(8936002)(106356001)(11100500001)(81156014); DIR:OUT; SFP:1102; SCL:1; SRVR:MWHPR09MB1390; H:MWHPR09MB1390.namprd09.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords;  MX:1; A:1; LANG:en; 
received-spf: None (protection.outlook.com: nist.gov does not designate permitted sender hosts)
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_D3D1C5DC2883Eqdangnistgov_"
MIME-Version: 1.0
X-OriginatorOrg: nist.gov
X-MS-Exchange-CrossTenant-originalarrivaltime: 11 Aug 2016 10:24:33.7085 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 2ab5d82f-d8fa-4797-a93e-054655c61dec
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MWHPR09MB1390
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/54A0LAsvauNRo7lJKIG7frIQUIk>
Cc: 'SPASM' <spasm@ietf.org>, 'Yoav Nir' <ynir.ietf@gmail.com>
Subject: Re: [Spasm] Change of Algorithms: Digest Algorithms
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Aug 2016 10:24:41 -0000

--_000_D3D1C5DC2883Eqdangnistgov_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Hi Jim,

I can get SHAKE128/256 and SHAKE256/512 (256-bit and 512-bit hash outputs r=
espectively) assigned with new OIDs for you and the working group.

One of the beauties of the SHAKEs is that one can use a SHAKE  (1) to do fu=
ll-domain hash RSA signatures or  (2) as a MGF very efficiently because the=
 SHAKEs are one-pass construction.

SHAKEs are also very efficient PRFs, MACs and KDFs because they are one-pas=
s construction; not like HMAC and other PRFs.  One can also have authentica=
ted ciphers from the Keccak permuation inside the SHAKES and more.

Regards,
Quynh.

From: Spasm <spasm-bounces@ietf.org<mailto:spasm-bounces@ietf.org>> on beha=
lf of Jim Schaad <ietf@augustcellars.com<mailto:ietf@augustcellars.com>>
Date: Wednesday, August 10, 2016 at 6:07 PM
To: 'Sean Turner' <sean@sn3rd.com<mailto:sean@sn3rd.com>>
Cc: 'SPASM' <spasm@ietf.org<mailto:spasm@ietf.org>>, 'Yoav Nir' <ynir.ietf@=
gmail.com<mailto:ynir.ietf@gmail.com>>
Subject: Re: [Spasm] Change of Algorithms: Digest Algorithms



From: Spasm [mailto:spasm-bounces@ietf.org] On Behalf Of Sean Turner
Sent: Wednesday, August 10, 2016 2:33 PM
To: Jim Schaad <ietf@augustcellars.com<mailto:ietf@augustcellars.com>>
Cc: SPASM <spasm@ietf.org<mailto:spasm@ietf.org>>; Yoav Nir <ynir.ietf@gmai=
l.com<mailto:ynir.ietf@gmail.com>>
Subject: Re: [Spasm] Change of Algorithms: Digest Algorithms


On Aug 10, 2016, at 15:10, Jim Schaad <ietf@augustcellars.com<mailto:ietf@a=
ugustcellars.com>> wrote:



-----Original Message-----
From: Spasm [mailto:spasm-bounces@ietf.org] On Behalf Of Yoav Nir
Sent: Wednesday, August 10, 2016 10:59 AM
To: Sean Turner <sean@sn3rd.com<mailto:sean@sn3rd.com>>
Cc: SPASM <spasm@ietf.org<mailto:spasm@ietf.org>>
Subject: Re: [Spasm] Change of Algorithms: Digest Algorithms


On 10 Aug 2016, at 7:14 PM, Sean Turner <sean@sn3rd.com<mailto:sean@sn3rd.c=
om>> wrote:

I'm half expecting a lmgtfy link, but is SHAKE available in OpenSSL or on
Widows or Macs?  Having folks generate code for a new content type to suppo=
rt
AEAD algorithms is one thing and maybe a pretty big thing at that.  Being t=
he
first (correct me if I'm wrong here) IETF protocol to have a SHOULD SHAKE
requirement seems like a requirement that's going to get ignored.  If
implementers don't respond with a resounding chorus of "oh yeah! we were
going to do that in our next release of product X" then I think that we sho=
uld
leave driving the SHAKE adoption train to some other more widely
deployed/used protocol for now and S/MIME can piggy back off of it later.

Not in OpenSSL. AFAICT not in Windows or Mac library. You can find code onl=
ine
if you want to, though.

Looking at other places in the IETF, nobody's rushing to write a "SHA-3 and=
 its
use in xxx" documents. In fact, there are none. Compare and contrast with S=
HA-
2 documents when that algorithm was new or with ChaCha20/Poly1305 or
Curve25519 documents more recently.

The only document I've seen that uses SHA-3 is the EdDSA document where for
Curve448 SHAKE256 is used internally.

This is the only place that I have seen it yet.  There is also an issue of =
having OIDs created.  They exist for the SHA3 algorithms, but the level of =
OIDs needed to treat SHAKE as a hash algorithm don't exist the last time I =
went on a search.

Jim



So in a word, the IETF response to SHA-3 is "meh"

Yoav

I knew I had seen some oids (if we need them):

http://csrc.nist.gov/groups/ST/crypto_apps_infra/csor/algorithms.html

Yes - that gives you the OIDs for doing SHA3.  But if you are doing SHAKE, =
where are you encoding the length of the output?  That is what I meant by t=
he OIDs for SHAKE do not exist.

Jim


spt

--_000_D3D1C5DC2883Eqdangnistgov_
Content-Type: text/html; charset="iso-8859-1"
Content-ID: <65C136DDAE098F4F8D2CCF64C66EBB41@namprd09.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
</head>
<body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-lin=
e-break: after-white-space; color: rgb(0, 0, 0); font-size: 14px; font-fami=
ly: Calibri, sans-serif;">
<div>Hi Jim,</div>
<div><br>
</div>
<div>I can get SHAKE128/256 and SHAKE256/512 (256-bit and 512-bit hash outp=
uts respectively) assigned with new OIDs for you and the working group.</di=
v>
<div><br>
</div>
<div>One of the beauties of the SHAKEs is that one can use a SHAKE &nbsp;(1=
) to do full-domain hash RSA signatures or &nbsp;(2) as a MGF very efficien=
tly because the SHAKEs are one-pass construction.&nbsp;</div>
<div><br>
</div>
<div>SHAKEs are also very efficient PRFs, MACs and KDFs because they are on=
e-pass construction; not like HMAC and other PRFs. &nbsp;One can also have =
authenticated ciphers from the Keccak permuation inside the SHAKES and more=
.</div>
<div><br>
</div>
<div>Regards,</div>
<div>Quynh.&nbsp;</div>
<div><br>
</div>
<span id=3D"OLK_SRC_BODY_SECTION">
<div style=3D"font-family:Calibri; font-size:11pt; text-align:left; color:b=
lack; BORDER-BOTTOM: medium none; BORDER-LEFT: medium none; PADDING-BOTTOM:=
 0in; PADDING-LEFT: 0in; PADDING-RIGHT: 0in; BORDER-TOP: #b5c4df 1pt solid;=
 BORDER-RIGHT: medium none; PADDING-TOP: 3pt">
<span style=3D"font-weight:bold">From: </span>Spasm &lt;<a href=3D"mailto:s=
pasm-bounces@ietf.org">spasm-bounces@ietf.org</a>&gt; on behalf of Jim Scha=
ad &lt;<a href=3D"mailto:ietf@augustcellars.com">ietf@augustcellars.com</a>=
&gt;<br>
<span style=3D"font-weight:bold">Date: </span>Wednesday, August 10, 2016 at=
 6:07 PM<br>
<span style=3D"font-weight:bold">To: </span>'Sean Turner' &lt;<a href=3D"ma=
ilto:sean@sn3rd.com">sean@sn3rd.com</a>&gt;<br>
<span style=3D"font-weight:bold">Cc: </span>'SPASM' &lt;<a href=3D"mailto:s=
pasm@ietf.org">spasm@ietf.org</a>&gt;, 'Yoav Nir' &lt;<a href=3D"mailto:yni=
r.ietf@gmail.com">ynir.ietf@gmail.com</a>&gt;<br>
<span style=3D"font-weight:bold">Subject: </span>Re: [Spasm] Change of Algo=
rithms: Digest Algorithms<br>
</div>
<div><br>
</div>
<div xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micro=
soft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" x=
mlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:/=
/www.w3.org/TR/REC-html40">
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman",serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.msonormal0, li.msonormal0, div.msonormal0
	{mso-style-name:msonormal;
	mso-margin-top-alt:auto;
	margin-right:0in;
	mso-margin-bottom-alt:auto;
	margin-left:0in;
	font-size:12.0pt;
	font-family:"Times New Roman",serif;}
span.EmailStyle18
	{mso-style-type:personal-reply;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
<div lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size: 11pt; font-family: Calibri=
, sans-serif;"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size: 11pt; font-family: Calibri=
, sans-serif;"><o:p>&nbsp;</o:p></span></p>
<div style=3D"border:none;border-left:solid blue 1.5pt;padding:0in 0in 0in =
4.0pt">
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size: 11pt; font-family: Cali=
bri, sans-serif;">From:</span></b><span style=3D"font-size: 11pt; font-fami=
ly: Calibri, sans-serif;"> Spasm [<a href=3D"mailto:spasm-bounces@ietf.org"=
>mailto:spasm-bounces@ietf.org</a>]
<b>On Behalf Of </b>Sean Turner<br>
<b>Sent:</b> Wednesday, August 10, 2016 2:33 PM<br>
<b>To:</b> Jim Schaad &lt;<a href=3D"mailto:ietf@augustcellars.com">ietf@au=
gustcellars.com</a>&gt;<br>
<b>Cc:</b> SPASM &lt;<a href=3D"mailto:spasm@ietf.org">spasm@ietf.org</a>&g=
t;; Yoav Nir &lt;<a href=3D"mailto:ynir.ietf@gmail.com">ynir.ietf@gmail.com=
</a>&gt;<br>
<b>Subject:</b> Re: [Spasm] Change of Algorithms: Digest Algorithms<o:p></o=
:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">On Aug 10, 2016, at 1=
5:10, Jim Schaad &lt;<a href=3D"mailto:ietf@augustcellars.com">ietf@augustc=
ellars.com</a>&gt; wrote:<o:p></o:p></p>
</div>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<p class=3D"MsoNormal"><br>
<br>
<br>
<o:p></o:p></p>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<p class=3D"MsoNormal">-----Original Message-----<o:p></o:p></p>
</blockquote>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<p class=3D"MsoNormal">From: Spasm [<a href=3D"mailto:spasm-bounces@ietf.or=
g">mailto:spasm-bounces@ietf.org</a>] On Behalf Of Yoav Nir<o:p></o:p></p>
</blockquote>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<p class=3D"MsoNormal">Sent: Wednesday, August 10, 2016 10:59 AM<o:p></o:p>=
</p>
</blockquote>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<p class=3D"MsoNormal">To: Sean Turner &lt;<a href=3D"mailto:sean@sn3rd.com=
">sean@sn3rd.com</a>&gt;<o:p></o:p></p>
</blockquote>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<p class=3D"MsoNormal">Cc: SPASM &lt;<a href=3D"mailto:spasm@ietf.org">spas=
m@ietf.org</a>&gt;<o:p></o:p></p>
</blockquote>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<p class=3D"MsoNormal">Subject: Re: [Spasm] Change of Algorithms: Digest Al=
gorithms<o:p></o:p></p>
</blockquote>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</blockquote>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</blockquote>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<p class=3D"MsoNormal">On 10 Aug 2016, at 7:14 PM, Sean Turner &lt;<a href=
=3D"mailto:sean@sn3rd.com">sean@sn3rd.com</a>&gt; wrote:<o:p></o:p></p>
</blockquote>
</blockquote>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</blockquote>
</blockquote>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<p class=3D"MsoNormal">I&#8217;m half expecting a lmgtfy link, but is SHAKE=
 available in OpenSSL or on<o:p></o:p></p>
</blockquote>
</blockquote>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<p class=3D"MsoNormal">Widows or Macs? &nbsp;Having folks generate code for=
 a new content type to support<o:p></o:p></p>
</blockquote>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<p class=3D"MsoNormal">AEAD algorithms is one thing and maybe a pretty big =
thing at that. &nbsp;Being the<o:p></o:p></p>
</blockquote>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<p class=3D"MsoNormal">first (correct me if I&#8217;m wrong here) IETF prot=
ocol to have a SHOULD SHAKE<o:p></o:p></p>
</blockquote>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<p class=3D"MsoNormal">requirement seems like a requirement that&#8217;s go=
ing to get ignored. &nbsp;If<o:p></o:p></p>
</blockquote>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<p class=3D"MsoNormal">implementers don&#8217;t respond with a resounding c=
horus of &quot;oh yeah! we were<o:p></o:p></p>
</blockquote>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<p class=3D"MsoNormal">going to do that in our next release of product X&qu=
ot; then I think that we should<o:p></o:p></p>
</blockquote>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<p class=3D"MsoNormal">leave driving the SHAKE adoption train to some other=
 more widely<o:p></o:p></p>
</blockquote>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<p class=3D"MsoNormal">deployed/used protocol for now and S/MIME can piggy =
back off of it later.<o:p></o:p></p>
</blockquote>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</blockquote>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<p class=3D"MsoNormal">Not in OpenSSL. AFAICT not in Windows or Mac library=
. You can find code online<o:p></o:p></p>
</blockquote>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<p class=3D"MsoNormal">if you want to, though.<o:p></o:p></p>
</blockquote>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</blockquote>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<p class=3D"MsoNormal">Looking at other places in the IETF, nobody&#8217;s =
rushing to write a &#8220;SHA-3 and its<o:p></o:p></p>
</blockquote>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<p class=3D"MsoNormal">use in xxx&#8221; documents. In fact, there are none=
. Compare and contrast with SHA-<o:p></o:p></p>
</blockquote>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<p class=3D"MsoNormal">2 documents when that algorithm was new or with ChaC=
ha20/Poly1305 or<o:p></o:p></p>
</blockquote>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<p class=3D"MsoNormal">Curve25519 documents more recently.<o:p></o:p></p>
</blockquote>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</blockquote>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<p class=3D"MsoNormal">The only document I&#8217;ve seen that uses SHA-3 is=
 the EdDSA document where for<o:p></o:p></p>
</blockquote>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<p class=3D"MsoNormal">Curve448 SHAKE256 is used internally.<o:p></o:p></p>
</blockquote>
<p class=3D"MsoNormal"><br>
This is the only place that I have seen it yet. &nbsp;There is also an issu=
e of having OIDs created. &nbsp;They exist for the SHA3 algorithms, but the=
 level of OIDs needed to treat SHAKE as a hash algorithm don't exist the la=
st time I went on a search.<br>
<br>
Jim<br>
<br>
<br>
<o:p></o:p></p>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</blockquote>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<p class=3D"MsoNormal">So in a word, the IETF response to SHA-3 is &#8220;m=
eh&#8221;<o:p></o:p></p>
</blockquote>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</blockquote>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<p class=3D"MsoNormal">Yoav<o:p></o:p></p>
</blockquote>
</blockquote>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<p class=3D"MsoNormal">I knew I had seen some oids (if we need them):<o:p><=
/o:p></p>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal"><a href=3D"http://csrc.nist.gov/groups/ST/crypto_app=
s_infra/csor/algorithms.html">http://csrc.nist.gov/groups/ST/crypto_apps_in=
fra/csor/algorithms.html</a><o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size: 11pt; font-family: Calibri=
, sans-serif;"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size: 11pt; font-family: Calibri=
, sans-serif;">Yes &#8211; that gives you the OIDs for doing SHA3.&nbsp; Bu=
t if you are doing SHAKE, where are you encoding the length of the output?&=
nbsp; That is what I meant by the OIDs for SHAKE do
 not exist.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size: 11pt; font-family: Calibri=
, sans-serif;"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size: 11pt; font-family: Calibri=
, sans-serif;">Jim<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size: 11pt; font-family: Calibri=
, sans-serif;"><o:p>&nbsp;</o:p></span></p>
</div>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">spt<o:p></o:p></p>
</div>
</div>
</div>
</div>
</div>
</span>
</body>
</html>

--_000_D3D1C5DC2883Eqdangnistgov_--


From nobody Thu Aug 11 07:14:44 2016
Return-Path: <housley@vigilsec.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0F25912D608 for <spasm@ietfa.amsl.com>; Thu, 11 Aug 2016 07:14:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.9
X-Spam-Level: 
X-Spam-Status: No, score=-101.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, USER_IN_WHITELIST=-100] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LDXKgx05JKnu for <spasm@ietfa.amsl.com>; Thu, 11 Aug 2016 07:14:38 -0700 (PDT)
Received: from mail.smeinc.net (mail.smeinc.net [209.135.209.11]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6714E12D727 for <spasm@ietf.org>; Thu, 11 Aug 2016 07:10:33 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mail.smeinc.net (Postfix) with ESMTP id 5BD8E3002C4 for <spasm@ietf.org>; Thu, 11 Aug 2016 10:10:31 -0400 (EDT)
X-Virus-Scanned: amavisd-new at mail.smeinc.net
Received: from mail.smeinc.net ([127.0.0.1]) by localhost (mail.smeinc.net [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id B62q5pjDxakN for <spasm@ietf.org>; Thu, 11 Aug 2016 10:10:30 -0400 (EDT)
Received: from [192.168.1.28] (nc-71-50-129-15.dyn.embarqhsd.net [71.50.129.15]) by mail.smeinc.net (Postfix) with ESMTPSA id CB0E53002BA; Thu, 11 Aug 2016 10:10:29 -0400 (EDT)
Content-Type: text/plain; charset=windows-1252
Mime-Version: 1.0 (Mac OS X Mail 7.3 \(1878.6\))
From: Russ Housley <housley@vigilsec.com>
In-Reply-To: <57AC4DCD.1070306@st.com>
Date: Thu, 11 Aug 2016 10:10:29 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <56EE8864-1678-4C32-B243-EAC654F82F7F@vigilsec.com>
References: <020d01d1f11d$731ef7d0$595ce770$@augustcellars.com> <57A8B886.9010600@st.com> <275EA92F-2101-4C33-85F8-FAE12F61D783@sn3rd.com> <84916CC1-AE92-4566-B500-A5E8BC8B1468@gmail.com> <17767718-1822-4C81-9B75-615A1ED389D8@sn3rd.com> <57AC4DCD.1070306@st.com>
To: Gilles Van Assche <gilles.vanassche@st.com>
X-Mailer: Apple Mail (2.1878.6)
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/pwCSB7Y-yPn9xpZN1vfs9XN770E>
Cc: spasm@ietf.org
Subject: Re: [Spasm] Change of Algorithms: Digest Algorithms
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Aug 2016 14:14:42 -0000

Gilles:

I recognize some of the these advantages you point out.  last time I =
looked, SHA3 is less widely implemented and slower than SHA2.  You say =
it is faster.  Can you point me to the measurements?

Russ


On Aug 11, 2016, at 6:05 AM, Gilles Van Assche <gilles.vanassche@st.com> =
wrote:

> It still surprises me that people stick to SHA-2, a family of =
algorithms
> designed by NSA behind closed doors, while SHA-3
> - comes with a design rationale;
> - received many years of public scrutiny before it became a standard;
> - has a thicker safety margin;
> - has software performances similar to SHA-2 (or better performance at =
a
> comparable safety margin);
> - offers much better performance in many cases (e.g., hardware,
> side-channel protections);
> - excels at flexibility with simpler and more efficient solutions for
> mask generating functions, PRF, MAC, PRNG, etc.
>=20
> Kind regards,
> Gilles
>=20
>=20
> On 10/08/16 23:48, Sean Turner wrote:
>>=20
>> On Aug 10, 2016, at 13:58, Yoav Nir <ynir.ietf@gmail.com
>> <mailto:ynir.ietf@gmail.com>> wrote:
>>=20
>>>=20
>>>> On 10 Aug 2016, at 7:14 PM, Sean Turner <sean@sn3rd.com
>>>> <mailto:sean@sn3rd.com>> wrote:
>>>>=20
>>>> I=92m half expecting a lmgtfy link, but is SHAKE available in =
OpenSSL
>>>> or on Widows or Macs?  Having folks generate code for a new content
>>>> type to support AEAD algorithms is one thing and maybe a pretty big
>>>> thing at that.  Being the first (correct me if I=92m wrong here) =
IETF
>>>> protocol to have a SHOULD SHAKE requirement seems like a =
requirement
>>>> that=92s going to get ignored.  If implementers don=92t respond =
with a
>>>> resounding chorus of "oh yeah! we were going to do that in our next
>>>> release of product X" then I think that we should leave driving the
>>>> SHAKE adoption train to some other more widely deployed/used
>>>> protocol for now and S/MIME can piggy back off of it later.
>>>=20
>>> Not in OpenSSL. AFAICT not in Windows or Mac library. You can find
>>> code online if you want to, though.
>>>=20
>>> Looking at other places in the IETF, nobody=92s rushing to write a
>>> =93SHA-3 and its use in xxx=94 documents. In fact, there are none.
>>> Compare and contrast with SHA-2 documents when that algorithm was =
new
>>> or with ChaCha20/Poly1305 or Curve25519 documents more recently.
>>>=20
>>> The only document I=92ve seen that uses SHA-3 is the EdDSA document
>>> where for Curve448 SHAKE256 is used internally.
>>>=20
>>> So in a word, the IETF response to SHA-3 is =93meh=94
>>=20
>> There's also a handful of validated products too:
>> http://csrc.nist.gov/groups/STM/cavp/documents/sha3/sha3val.html
>>=20
>> But, yeah I'm still thinking SHAKE shouldn't be a SHOULD.
>>=20
>> spt
>=20
> _______________________________________________
> Spasm mailing list
> Spasm@ietf.org
> https://www.ietf.org/mailman/listinfo/spasm


From nobody Thu Aug 11 07:17:26 2016
Return-Path: <housley@vigilsec.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 515A912D612 for <spasm@ietfa.amsl.com>; Thu, 11 Aug 2016 07:17:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.9
X-Spam-Level: 
X-Spam-Status: No, score=-101.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, USER_IN_WHITELIST=-100] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vvEO8T0Q1Z8L for <spasm@ietfa.amsl.com>; Thu, 11 Aug 2016 07:17:21 -0700 (PDT)
Received: from mail.smeinc.net (mail.smeinc.net [209.135.209.11]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4F39612D0E4 for <spasm@ietf.org>; Thu, 11 Aug 2016 07:13:31 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mail.smeinc.net (Postfix) with ESMTP id 4F7543002BA for <spasm@ietf.org>; Thu, 11 Aug 2016 10:13:29 -0400 (EDT)
X-Virus-Scanned: amavisd-new at mail.smeinc.net
Received: from mail.smeinc.net ([127.0.0.1]) by localhost (mail.smeinc.net [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id HKTjkfUBMns7 for <spasm@ietf.org>; Thu, 11 Aug 2016 10:13:28 -0400 (EDT)
Received: from [192.168.1.28] (nc-71-50-129-15.dyn.embarqhsd.net [71.50.129.15]) by mail.smeinc.net (Postfix) with ESMTPSA id B4EED3005A7; Thu, 11 Aug 2016 10:13:27 -0400 (EDT)
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 7.3 \(1878.6\))
From: Russ Housley <housley@vigilsec.com>
In-Reply-To: <0a055590-65d1-3d99-5f06-805f38b70f76@seantek.com>
Date: Thu, 11 Aug 2016 10:13:27 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <26155D71-EAB2-4D0E-90D2-0DDF37083E02@vigilsec.com>
References: <020d01d1f11d$731ef7d0$595ce770$@augustcellars.com> <3f325b55fd814e6fb45360550c42f74a@usma1ex-dag1mb1.msg.corp.akamai.com> <3b80d361-3134-6328-1a97-ea8dc17260a6@seantek.com> <016201d1f2a3$82fc7830$88f56890$@augustcellars.com> <0a055590-65d1-3d99-5f06-805f38b70f76@seantek.com>
To: Sean Leonard <dev+ietf@seantek.com>
X-Mailer: Apple Mail (2.1878.6)
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/srEAsBX2FPRZlQ6Y_X1lOfjpTBg>
Cc: spasm@ietf.org
Subject: Re: [Spasm] Change of Algorithms: Digest Algorithms
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Aug 2016 14:17:25 -0000

Sean:

Please see RFC 7696 for the definitions being used here:


      SHOULD+  This term means the same as SHOULD.  However, it is
               likely that an algorithm marked as SHOULD+ will be
               promoted to a MUST in the future.

      SHOULD-  This term means the same as SHOULD.  However, it is
               likely that an algorithm marked as SHOULD- will be
               deprecated to a MAY or worse in the future.

      MUST-    This term means the same as MUST.  However, it is
               expected that an algorithm marked as MUST- will be
               downgraded in the future.  Although the status of the
               algorithm will be determined at a later time, it is
               reasonable to expect that a the status of a MUST-
               algorithm will remain at least a SHOULD or a SHOULD-.

Russ


On Aug 10, 2016, at 12:16 AM, Sean Leonard <dev+ietf@seantek.com> wrote:

> whoops, my bad. I guess I meant SHOULD- to mean "not really SHOULD =
right now, but it's going to be SHOULD soon", which I guess would be =
like a MAY+ or SHOULD=E2=86=91=E2=86=91.
>=20
> But there are no MAY+ or SHOULD=E2=86=91=E2=86=91 keywords. So, I =
suppose, just "SHOULD"? Unless you want to propose a new term.
>=20
> Sean
>=20
> On 8/9/2016 6:07 PM, Jim Schaad wrote:
>> Why not just make it a MAY in that case or not mention it?
>>=20
>> SHOULD-    This term means the same as SHOULD. However, the authors =
expect
>> that a requirement marked as SHOULD- will be demoted to a MAY in a =
future
>> version of this document.
>>=20
>> Are you really saying it is going to go away in future versions?
>>=20
>> jim
>>=20
>>> -----Original Message-----
>>> From: Spasm [mailto:spasm-bounces@ietf.org] On Behalf Of Sean =
Leonard
>>> Sent: Tuesday, August 09, 2016 4:45 PM
>>> To: spasm@ietf.org
>>> Subject: Re: [Spasm] Change of Algorithms: Digest Algorithms
>>>=20
>>> On 8/8/2016 7:07 AM, Salz, Rich wrote:
>>>>> 1.  There is only one MUST and no path forward.  Is this a problem
>>>>> that needs to be dealt with?  EdDSA25519 uses SHA-512 under the
>>>>> covers, does that mean we should make SHA-512 at least a SHOULD =
here?
>>>>>=20
>>>>> 2.  Is there anybody who wants to standup and argue for adopting =
in
>>>>> any of the SHA-3 algorithms?
>>>> I'd like to see *something* as a should.    I have a slight =
preference
>> for
>>> SHA512, but could live with SHA3 if others feel strongly.
>>>=20
>>> I think SHA-3 should be SHOULD-.
>>>=20
>>> Sean
>>>=20
>>> _______________________________________________
>>> Spasm mailing list
>>> Spasm@ietf.org
>>> https://www.ietf.org/mailman/listinfo/spasm
>> _______________________________________________
>> Spasm mailing list
>> Spasm@ietf.org
>> https://www.ietf.org/mailman/listinfo/spasm
>=20
>=20
> _______________________________________________
> Spasm mailing list
> Spasm@ietf.org
> https://www.ietf.org/mailman/listinfo/spasm


From nobody Thu Aug 11 07:32:50 2016
Return-Path: <mcr@sandelman.ca>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 287DF12D791 for <spasm@ietfa.amsl.com>; Thu, 11 Aug 2016 07:32:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.148
X-Spam-Level: 
X-Spam-Status: No, score=-3.148 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-1.247, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Du9glu0u5yvR for <spasm@ietfa.amsl.com>; Thu, 11 Aug 2016 07:32:43 -0700 (PDT)
Received: from tuna.sandelman.ca (tuna.sandelman.ca [IPv6:2607:f0b0:f:3:216:3eff:fe7c:d1f3]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B596C12D766 for <spasm@ietf.org>; Thu, 11 Aug 2016 07:32:11 -0700 (PDT)
Received: from sandelman.ca (obiwan.sandelman.ca [IPv6:2607:f0b0:f:2::247]) by tuna.sandelman.ca (Postfix) with ESMTP id B4E0C2015D; Thu, 11 Aug 2016 10:42:55 -0400 (EDT)
Received: from obiwan.sandelman.ca (localhost [IPv6:::1]) by sandelman.ca (Postfix) with ESMTP id 8C592638D1; Thu, 11 Aug 2016 10:32:10 -0400 (EDT)
From: Michael Richardson <mcr@sandelman.ca>
To: Gilles Van Assche <gilles.vanassche@st.com>
In-Reply-To: <57AC4DCD.1070306@st.com>
References: <020d01d1f11d$731ef7d0$595ce770$@augustcellars.com> <57A8B886.9010600@st.com> <275EA92F-2101-4C33-85F8-FAE12F61D783@sn3rd.com> <84916CC1-AE92-4566-B500-A5E8BC8B1468@gmail.com> <17767718-1822-4C81-9B75-615A1ED389D8@sn3rd.com> <57AC4DCD.1070306@st.com>
X-Mailer: MH-E 8.6; nmh 1.6+dev; GNU Emacs 24.5.1
X-Face: $\n1pF)h^`}$H>Hk{L"x@)JS7<%Az}5RyS@k9X%29-lHB$Ti.V>2bi.~ehC0; <'$9xN5Ub# z!G,p`nR&p7Fz@^UXIn156S8.~^@MJ*mMsD7=QFeq%AL4m<nPbLgmtKK-5dC@#:k
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=-=-="; micalg=pgp-sha1; protocol="application/pgp-signature"
Date: Thu, 11 Aug 2016 10:32:10 -0400
Message-ID: <19624.1470925930@obiwan.sandelman.ca>
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/PuDWXN7UfgrftIsesM0yRNV_Gg8>
Cc: spasm@ietf.org
Subject: Re: [Spasm] Change of Algorithms: Digest Algorithms
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Aug 2016 14:32:48 -0000

--=-=-=
Content-Type: text/plain


Gilles Van Assche <gilles.vanassche@st.com> wrote:
    > It still surprises me that people stick to SHA-2, a family of
    > algorithms designed by NSA behind closed doors, while SHA-3 - comes

I tend to agree.

--
]               Never tell me the odds!                 | ipv6 mesh networks [
]   Michael Richardson, Sandelman Software Works        | network architect  [
]     mcr@sandelman.ca  http://www.sandelman.ca/        |   ruby on rails    [


--=-=-=
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQEVAwUBV6yMZ4CLcPvd0N1lAQIDkwgAkQZKnoH+VmuDhYSzZLPgEaEhKwDvOd4x
1VzE1z981ij1o2nUy5sh6M1WaZEq8PpKNDh9bs1yvvVjtjeQB6zUye1t+2JHjK8a
e5Zpbp+xJG/nSAhgKKJ4ubNhC+F5o0FNYiCL4LMhze+FE0wUpZSY2+ncLoePGkz7
Cpqm18FR2HTS5RtX0sJOsRGjnM7BRAruaeCGRspLVJ3axqmo+OnVhcmRAY19m5hK
THHsGNbta90cy3BAikq0vAmJE6gdGgRYnbbo1Xt8G8TuhK46Jrp+lmYuHH14WVOA
WthQXJShrS8+/GCvFUYpPuDxP9R5piB4mmNkb+kcSD2rJ8RNEYsonQ==
=olSU
-----END PGP SIGNATURE-----
--=-=-=--


From nobody Thu Aug 11 15:44:54 2016
Return-Path: <dev+ietf@seantek.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EF5F412D746 for <spasm@ietfa.amsl.com>; Thu, 11 Aug 2016 15:44:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.601
X-Spam-Level: 
X-Spam-Status: No, score=-2.601 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id infVRv4FXA-2 for <spasm@ietfa.amsl.com>; Thu, 11 Aug 2016 15:44:51 -0700 (PDT)
Received: from mxout-08.mxes.net (mxout-08.mxes.net [216.86.168.183]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 648D512D16F for <spasm@ietf.org>; Thu, 11 Aug 2016 15:44:51 -0700 (PDT)
Received: from [192.168.123.7] (unknown [75.83.2.34]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by smtp.mxes.net (Postfix) with ESMTPSA id 68D7F509B6 for <spasm@ietf.org>; Thu, 11 Aug 2016 18:44:50 -0400 (EDT)
To: spasm@ietf.org
References: <020d01d1f11d$731ef7d0$595ce770$@augustcellars.com> <3f325b55fd814e6fb45360550c42f74a@usma1ex-dag1mb1.msg.corp.akamai.com> <3b80d361-3134-6328-1a97-ea8dc17260a6@seantek.com> <016201d1f2a3$82fc7830$88f56890$@augustcellars.com> <0a055590-65d1-3d99-5f06-805f38b70f76@seantek.com> <26155D71-EAB2-4D0E-90D2-0DDF37083E02@vigilsec.com>
From: Sean Leonard <dev+ietf@seantek.com>
Message-ID: <07fe682e-c8de-6e3c-5943-ac06a73eef9b@seantek.com>
Date: Thu, 11 Aug 2016 15:42:55 -0700
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:45.0) Gecko/20100101 Thunderbird/45.2.0
MIME-Version: 1.0
In-Reply-To: <26155D71-EAB2-4D0E-90D2-0DDF37083E02@vigilsec.com>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/emhpyByyv46uQqrOonDEZ7PY7mk>
Subject: Re: [Spasm] Change of Algorithms: Digest Algorithms
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Aug 2016 22:44:53 -0000

Yes.

As I pointed out, I was going for "MAY+", which is not actually a term 
that exists (yet). Not sure if a MAY+ should be added to the 
definitions, or just leave it alone. My preferences are:
#1 MAY+
#2 SHOULD
#3 (omit)

As Gilles Van Assche mentioned, SHA-3 has a lot of design advantages. 
Given that SHA-1 is waning, it would be better to get ahead of the 
curve. But this industry has a tendency to be very reactionary: "don't 
add new stuff if the old stuff is not obviously broken". It took 11+ 
years to get SHA-1 just starting to be phased out. Just something to 
think about.

Sean

On 8/11/2016 7:13 AM, Russ Housley wrote:
> Sean:
>
> Please see RFC 7696 for the definitions being used here:
>
>
>        SHOULD+  This term means the same as SHOULD.  However, it is
>                 likely that an algorithm marked as SHOULD+ will be
>                 promoted to a MUST in the future.
>
>        SHOULD-  This term means the same as SHOULD.  However, it is
>                 likely that an algorithm marked as SHOULD- will be
>                 deprecated to a MAY or worse in the future.
>
>        MUST-    This term means the same as MUST.  However, it is
>                 expected that an algorithm marked as MUST- will be
>                 downgraded in the future.  Although the status of the
>                 algorithm will be determined at a later time, it is
>                 reasonable to expect that a the status of a MUST-
>                 algorithm will remain at least a SHOULD or a SHOULD-.
>
> Russ
>
>
> On Aug 10, 2016, at 12:16 AM, Sean Leonard <dev+ietf@seantek.com> wrote:
>
>> whoops, my bad. I guess I meant SHOULD- to mean "not really SHOULD right now, but it's going to be SHOULD soon", which I guess would be like a MAY+ or SHOULD↑↑.
>>
>> But there are no MAY+ or SHOULD↑↑ keywords. So, I suppose, just "SHOULD"? Unless you want to propose a new term.
>>
>> Sean
>>


From nobody Fri Aug 12 01:06:01 2016
Return-Path: <gilles.vanassche@st.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 842EA12D9D9 for <spasm@ietfa.amsl.com>; Fri, 12 Aug 2016 01:06:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.601
X-Spam-Level: 
X-Spam-Status: No, score=-2.601 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id A0pCE0JozM6X for <spasm@ietfa.amsl.com>; Fri, 12 Aug 2016 01:05:58 -0700 (PDT)
Received: from mx07-00178001.pphosted.com (mx07-00178001.pphosted.com [62.209.51.94]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 58DCA12D9C9 for <spasm@ietf.org>; Fri, 12 Aug 2016 01:05:57 -0700 (PDT)
Received: from pps.filterd (m0046668.ppops.net [127.0.0.1]) by mx07-00178001.pphosted.com (8.16.0.11/8.16.0.11) with SMTP id u7C7vhUO025003; Fri, 12 Aug 2016 10:05:56 +0200
Received: from beta.dmz-eu.st.com (beta.dmz-eu.st.com [164.129.1.35]) by mx07-00178001.pphosted.com with ESMTP id 24ruw8kg95-1 (version=TLSv1 cipher=ECDHE-RSA-AES256-SHA bits=256 verify=NOT); Fri, 12 Aug 2016 10:05:56 +0200
Received: from zeta.dmz-eu.st.com (zeta.dmz-eu.st.com [164.129.230.9]) by beta.dmz-eu.st.com (STMicroelectronics) with ESMTP id 2D99831; Fri, 12 Aug 2016 08:05:54 +0000 (GMT)
Received: from Webmail-eu.st.com (safex1hubcas6.st.com [10.75.90.73]) by zeta.dmz-eu.st.com (STMicroelectronics) with ESMTP id 9A50313DA; Fri, 12 Aug 2016 08:05:54 +0000 (GMT)
Received: from [10.137.2.67] (10.137.2.67) by webmail-eu.st.com (10.75.90.73) with Microsoft SMTP Server id 8.3.444.0; Fri, 12 Aug 2016 10:05:53 +0200
To: Russ Housley <housley@vigilsec.com>
References: <020d01d1f11d$731ef7d0$595ce770$@augustcellars.com> <57A8B886.9010600@st.com> <275EA92F-2101-4C33-85F8-FAE12F61D783@sn3rd.com> <84916CC1-AE92-4566-B500-A5E8BC8B1468@gmail.com> <17767718-1822-4C81-9B75-615A1ED389D8@sn3rd.com> <57AC4DCD.1070306@st.com> <56EE8864-1678-4C32-B243-EAC654F82F7F@vigilsec.com>
From: Gilles Van Assche <gilles.vanassche@st.com>
X-Enigmail-Draft-Status: N1110
Message-ID: <57AD836E.901@st.com>
Date: Fri, 12 Aug 2016 10:06:06 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101 Thunderbird/38.3.0
MIME-Version: 1.0
In-Reply-To: <56EE8864-1678-4C32-B243-EAC654F82F7F@vigilsec.com>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:, , definitions=2016-08-12_02:, , signatures=0
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/3rznwIJz8QVwmIb-_LIcQDYT3zw>
Cc: "spasm@ietf.org" <spasm@ietf.org>
Subject: Re: [Spasm] Change of Algorithms: Digest Algorithms
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 12 Aug 2016 08:06:00 -0000

Hi Russ,

For hardware performance, you can have a look at the reports made during
the SHA-3 competition (including comparisons with SHA-2), e.g., [1] [2].

For software performance, eBASH contains benchmarks on several machines.
You may also want to run "KeccakTests --speed" with the Keccak code
package [3], which contains some more recent implementations. (It is on
our ever-growing to-do list to submit those to eBASH.)

E.g., on Sandy Bridge [4]:
SHAKE128 (keccakc256): 8.81 c/b
SHAKE256 (keccakc512): 10.87 c/b
SHA-512: 10.94 c/b
SHA-256: 14.12 c/b

E.g., on Skylake [5]:
SHA-512: 5.08 c/b
SHAKE128: 7.01 c/b
SHA-256: 7.62 c/b
SHAKE256: 8.64 c/b

Kind regards,
Gilles

[1]
http://csrc.nist.gov/groups/ST/hash/sha-3/Round3/March2012/documents/papers/GURKAYNAK_paper.pdf
[2] http://eprint.iacr.org/2012/368.pdf
[3] https://github.com/gvanas/KeccakCodePackage
[4] http://bench.cr.yp.to/results-hash.html#amd64-h6sandy
[5] http://bench.cr.yp.to/results-hash.html#amd64-skylake


On 11/08/16 16:10, Russ Housley wrote:
> Gilles:
>
> I recognize some of the these advantages you point out.  last time I looked, SHA3 is less widely implemented and slower than SHA2.  You say it is faster.  Can you point me to the measurements?
>
> Russ
>
>
> On Aug 11, 2016, at 6:05 AM, Gilles Van Assche <gilles.vanassche@st.com> wrote:
>
>> It still surprises me that people stick to SHA-2, a family of algorithms
>> designed by NSA behind closed doors, while SHA-3
>> - comes with a design rationale;
>> - received many years of public scrutiny before it became a standard;
>> - has a thicker safety margin;
>> - has software performances similar to SHA-2 (or better performance at a
>> comparable safety margin);
>> - offers much better performance in many cases (e.g., hardware,
>> side-channel protections);
>> - excels at flexibility with simpler and more efficient solutions for
>> mask generating functions, PRF, MAC, PRNG, etc.
>>
>> Kind regards,
>> Gilles
>>
>>
>> On 10/08/16 23:48, Sean Turner wrote:
>>> On Aug 10, 2016, at 13:58, Yoav Nir <ynir.ietf@gmail.com
>>> <mailto:ynir.ietf@gmail.com>> wrote:
>>>
>>>>> On 10 Aug 2016, at 7:14 PM, Sean Turner <sean@sn3rd.com
>>>>> <mailto:sean@sn3rd.com>> wrote:
>>>>>
>>>>> I’m half expecting a lmgtfy link, but is SHAKE available in OpenSSL
>>>>> or on Widows or Macs?  Having folks generate code for a new content
>>>>> type to support AEAD algorithms is one thing and maybe a pretty big
>>>>> thing at that.  Being the first (correct me if I’m wrong here) IETF
>>>>> protocol to have a SHOULD SHAKE requirement seems like a requirement
>>>>> that’s going to get ignored.  If implementers don’t respond with a
>>>>> resounding chorus of "oh yeah! we were going to do that in our next
>>>>> release of product X" then I think that we should leave driving the
>>>>> SHAKE adoption train to some other more widely deployed/used
>>>>> protocol for now and S/MIME can piggy back off of it later.
>>>> Not in OpenSSL. AFAICT not in Windows or Mac library. You can find
>>>> code online if you want to, though.
>>>>
>>>> Looking at other places in the IETF, nobody’s rushing to write a
>>>> “SHA-3 and its use in xxx” documents. In fact, there are none.
>>>> Compare and contrast with SHA-2 documents when that algorithm was new
>>>> or with ChaCha20/Poly1305 or Curve25519 documents more recently.
>>>>
>>>> The only document I’ve seen that uses SHA-3 is the EdDSA document
>>>> where for Curve448 SHAKE256 is used internally.
>>>>
>>>> So in a word, the IETF response to SHA-3 is “meh”
>>> There's also a handful of validated products too:
>>> http://csrc.nist.gov/groups/STM/cavp/documents/sha3/sha3val.html
>>>
>>> But, yeah I'm still thinking SHAKE shouldn't be a SHOULD.
>>>
>>> spt
>> _______________________________________________
>> Spasm mailing list
>> Spasm@ietf.org
>> https://www.ietf.org/mailman/listinfo/spasm
>


From nobody Tue Aug 16 10:23:26 2016
Return-Path: <session_request_developers@ietf.org>
X-Original-To: spasm@ietf.org
Delivered-To: spasm@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id A4F2A12D129; Tue, 16 Aug 2016 10:23:25 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: "\"IETF Meeting Session Request Tool\"" <session_request_developers@ietf.org>
To: <session-request@ietf.org>
X-Test-IDTracker: no
X-IETF-IDTracker: 6.29.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <147136820563.22928.2476033573179146793.idtracker@ietfa.amsl.com>
Date: Tue, 16 Aug 2016 10:23:25 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/EIxjmVouxfrDRL-a_oQGJK3KLaI>
Cc: spasm@ietf.org, lamps-chairs@ietf.org, housley@vigilsec.com, stephen.farrell@cs.tcd.ie
Subject: [Spasm] lamps - New Meeting Session Request for IETF 97
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 16 Aug 2016 17:23:26 -0000

A new meeting session request has just been submitted by Russ Housley, a Chair of the lamps working group.


---------------------------------------------------------
Working Group Name: Limited Additional Mechanisms for PKIX and SMIME
Area Name: Security Area
Session Requester: Russ Housley

Number of Sessions: 1
Length of Session(s):  1 Hour
Number of Attendees: 50
Conflicts to Avoid: 
 First Priority:  curdle cose dane ianaplan jose perc saag sidr sipbrandy stir tls rtcweb acme openpgp sidrops its
 Second Priority:  ntp cfrg dprive ecrit oauth quic sacm mile modern
 Third Priority:  mtgvenue


Special Requests:
  
---------------------------------------------------------


From nobody Tue Aug 16 11:27:03 2016
Return-Path: <session_request_developers@ietf.org>
X-Original-To: spasm@ietf.org
Delivered-To: spasm@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 3E20012D123; Tue, 16 Aug 2016 11:27:02 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: "\"IETF Meeting Session Request Tool\"" <session_request_developers@ietf.org>
To: <session-request@ietf.org>
X-Test-IDTracker: no
X-IETF-IDTracker: 6.29.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <147137202221.22994.15639644615800214195.idtracker@ietfa.amsl.com>
Date: Tue, 16 Aug 2016 11:27:02 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/hi_hcTtmzp-YJ_BnvuEDS5wCH7I>
Cc: spasm@ietf.org, lamps-chairs@ietf.org, housley@vigilsec.com, stephen.farrell@cs.tcd.ie
Subject: [Spasm] lamps - Update to a Meeting Session Request for IETF 97
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 16 Aug 2016 18:27:02 -0000

An update to a meeting session request has just been submitted by Russ Housley, a Chair of the lamps working group.


---------------------------------------------------------
Working Group Name: Limited Additional Mechanisms for PKIX and SMIME
Area Name: Security Area
Session Requester: Russ Housley

Number of Sessions: 1
Length of Session(s):  1 Hour
Number of Attendees: 50
Conflicts to Avoid: 
 First Priority: curdle cose dane ianaplan jose perc saag sidr sipbrandy stir tls rtcweb acme openpgp sidrops its radext
 Second Priority: ntp cfrg dprive ecrit oauth quic sacm mile modern
 Third Priority: mtgvenue


Special Requests:
  
---------------------------------------------------------


From nobody Tue Aug 16 14:18:16 2016
Return-Path: <ietf@augustcellars.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D34D012D181 for <spasm@ietfa.amsl.com>; Tue, 16 Aug 2016 14:18:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.147
X-Spam-Level: 
X-Spam-Status: No, score=-3.147 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RP_MATCHES_RCVD=-1.247, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DyJ7Mm3WoK4p for <spasm@ietfa.amsl.com>; Tue, 16 Aug 2016 14:18:11 -0700 (PDT)
Received: from mail2.augustcellars.com (augustcellars.com [50.45.239.150]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4783D12B024 for <spasm@ietf.org>; Tue, 16 Aug 2016 14:18:10 -0700 (PDT)
Received: from hebrews (192.168.1.152) by mail2.augustcellars.com (192.168.1.201) with Microsoft SMTP Server (TLS) id 15.0.1178.4; Tue, 16 Aug 2016 14:29:58 -0700
From: Jim Schaad <ietf@augustcellars.com>
To: 'SPASM' <spasm@ietf.org>
Date: Tue, 16 Aug 2016 14:17:40 -0700
Message-ID: <05da01d1f803$a0d885f0$e28991d0$@augustcellars.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_05DB_01D1F7C8.F47BA9C0"
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AdH3/qUvnAntdyxAQhmptO9SjNvC7w==
Content-Language: en-us
X-Originating-IP: [192.168.1.152]
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/qwIFoL1oLbKBBX0IBt-AA4yDC5s>
Subject: [Spasm] Change of Algorithms: Take 3
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 16 Aug 2016 21:18:14 -0000

------=_NextPart_000_05DB_01D1F7C8.F47BA9C0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable

This message looks at Signature Algorithms.  Please restrict your =
discussions to this set of algorithms, I will be sending out messages on =
other algorithms over time.

=20

I have started doing the editing work on this.  The pull request can be =
found at https://github.com/lamps-wg/smime/pull/21

=20

=20

Current Document for S/MIME 3.1

=20

MUST:   RSA w/ SHA-256

SHOULD+:  DSA w/ SHA-256, RSASSA-PSS w/ SHA-256

SHOULD-:  RSA w/ SHA-1, DSA w/SHA-1, RSA w/ MD5

Historic:

=20

Key Sizes:

RSA and DSA - sign

SHOULD NOT            Key size <=3D 1023

SHOULD      1024 <=3D key size <=3D 2048

MAY            2048 < key size  =20

=20

RSA and DSA - Verify

MAY                key size <=3D 1023

MUST      1024 <=3D key size <=3D 2048

MAY        2048 < key size

=20

RSA - Certificate Verify

MAY             key size <=3D 1023

MUST  1024 <=3D key size <=3D 4096

MAY      4096  < key size

=20

DSA - Certificate Verify

MAY             key size <=3D 1023

MUST    1024 <=3D key size <=3D 3072

=20

=20

=20

Proposed for S/MIME 3.5

=20

MUST: RSA-PSS w/ SHA-256, ECDSA P-256 w/ SHA-256, EdDSA25519

MUST-: RSA w/ SHA-256

SHOULD+:

SHOULD:  RSA-PSS w/ SHA-512, ECDSA P-521 w/ SHA-512, EdDSA448

SHOULD-:=20

Historic: RSA w/ SHA-1, DSA w/ SHA-1, RSA w/ MD5, DSA w/ SHA-256

=20

Key Sizes:

RSA - sign

SHOULD NOT            Key size <=3D 2047

SHOULD      2048 <=3D key size <=3D 4096

MAY             4096 < key size  =20

=20

RSA - Verify

Historic MAY                key size <=3D 2047

MUST      2048 <=3D key size <=3D 4096

MAY        4096 < key size

=20

RSA - Certificate Verify

Historic MAY             key size <=3D 2047

MUST  2048 <=3D key size <=3D 4096

MAY      4096  < key size

=20

DSA - Certificate Verify

Historic MAY             key size <=3D 1023

Historic MUST   1024 <=3D key size <=3D 3072

=20

=20

Questions:

=20

1.                Should DSA be dropped to historic for messages and =
just left as SHOULD- for certificates, I don't know how many DSA =
certificates actually exist.

Take 2 state: I have removed all DSA from the current set of algorithms =
for both messages and certificates.  This is now historic only

=20

2.                I have changed to lower limits on RSA but not DSA for =
certificate verification - should it be changed as well?  Again I don't =
know how many DSA certificates exist.

Take 2 state: I have removed DSA certificates to historic so the =
question is moot.

=20

3.                I don't think that any statements for ECDSA on key =
size need to be made separately from the algorithm support list.  Does =
anybody disagree?

Take 2 state:  Nobody said anything to the contrary.  So no plans to =
make a key size section for ECDSA algorithms.

=20

4.                SPT suggested that we should not be making any =
statements on doing anything with 512 hash values.  (Although with tons =
of standard snark =EF=81=8A).   My reasoning for including this was less =
to do with the fact that I thought the 512-bit hash functions were more =
efficient on 64-bit hardware (a statement that I cannot find support for =
with a quick web search for SHA-2) and therefore it made sense from a =
throughput point of view.   I don=E2=80=99t think we need the for =
security and if they are not more efficient I would be in favor not =
making them SHOULDs

Take 3 state: Since nobody said anything to the contrary, I have removed =
all of the SHA-512 hash algorithms.  Russ stated that he would like to =
add ECDSA P-384 w/SHA-384 but I have seen no support for this position =
on the list.

=20

5.                Blake has complained about the number of MUST =
algorithms that comes out from this list.  There are effectively 4 in =
the list above, as opposed to the 1 that is in the current set of =
documents.  We cannot kill the current MUST so it has to stay.  However, =
all of the new MUSTs could be downgraded from MUST to SHOULD without out =
any problems.  The only issue is that one of them needs to be a MUST so =
that we have a true MUST not just a MUST- algorithm.  Looking at the =
list my breakdown would be:

=20

=E2=80=A2                 RSA-PSS =E2=80=93 Given that it has been slow =
on update the only reason to have it be a MUST is that most people are =
probably going to have RSA keys today.  There are some arguments that =
say RSA-PSS is no better than RSA-v1.5 when doing real-world analysis.  =
I don=E2=80=99t know that I agree with this as I have problems with =
arguments by analogy.   This could easily be a SHOULD instead of a MUST

=E2=80=A2                 ECDSA =E2=80=93 This is the world of NIST =
requirements today.  I think this justifies it being a MUST

=E2=80=A2                 EdDSA =E2=80=93 This is the world of NOT MIST =
requirements today.  I think this justifies it being a MUST


Take 3 state: I have modified this to be all on receive and one on send, =
but I have not changed any of these to be SHOULD rather than MUST.

=20

Jim

=20


------=_NextPart_000_05DB_01D1F7C8.F47BA9C0
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" =
xmlns=3D"http://www.w3.org/TR/REC-html40"><head><meta =
http-equiv=3DContent-Type content=3D"text/html; charset=3Dutf-8"><meta =
name=3DGenerator content=3D"Microsoft Word 15 (filtered =
medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:#0563C1;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:#954F72;
	text-decoration:underline;}
p.MsoPlainText, li.MsoPlainText, div.MsoPlainText
	{mso-style-priority:99;
	mso-style-link:"Plain Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
	{mso-style-priority:34;
	margin-top:0in;
	margin-right:0in;
	margin-bottom:0in;
	margin-left:.5in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
span.PlainTextChar
	{mso-style-name:"Plain Text Char";
	mso-style-priority:99;
	mso-style-link:"Plain Text";
	font-family:"Calibri",sans-serif;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri",sans-serif;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:79646366;
	mso-list-type:hybrid;
	mso-list-template-ids:1177697910 67698703 -1118824676 67698715 67698703 =
67698713 67698715 67698703 67698713 67698715;}
@list l0:level1
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level2
	{mso-level-start-at:5;
	mso-level-number-format:bullet;
	mso-level-text:=E2=80=A2;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:1.25in;
	text-indent:-.5in;
	font-family:"Calibri",sans-serif;
	mso-fareast-font-family:Calibri;
	mso-bidi-font-family:"Times New Roman";}
@list l0:level3
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
@list l0:level4
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level5
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level6
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
@list l0:level7
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level8
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level9
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
@list l1
	{mso-list-id:1823690499;
	mso-list-type:hybrid;
	mso-list-template-ids:-918772048 1220178178 67698713 67698715 67698703 =
67698713 67698715 67698703 67698713 67698715;}
@list l1:level1
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:.75in;
	text-indent:-.5in;}
@list l1:level2
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l1:level3
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
@list l1:level4
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l1:level5
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l1:level6
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
@list l1:level7
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l1:level8
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l1:level9
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
ol
	{margin-bottom:0in;}
ul
	{margin-bottom:0in;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US =
link=3D"#0563C1" vlink=3D"#954F72"><div class=3DWordSection1><p =
class=3DMsoPlainText>This message looks at Signature Algorithms.=C2=A0 =
Please restrict your discussions to this set of algorithms, I will be =
sending out messages on other algorithms over time.<o:p></o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p class=3DMsoPlainText>I have =
started doing the editing work on this.=C2=A0 The pull request can be =
found at <a =
href=3D"https://github.com/lamps-wg/smime/pull/21">https://github.com/lam=
ps-wg/smime/pull/21</a><o:p></o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText>Current Document for S/MIME 3.1<o:p></o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText>MUST:=C2=A0=C2=A0 RSA w/ SHA-256<o:p></o:p></p><p =
class=3DMsoPlainText>SHOULD+:=C2=A0 DSA w/ SHA-256, RSASSA-PSS w/ =
SHA-256<o:p></o:p></p><p class=3DMsoPlainText>SHOULD-:=C2=A0 RSA w/ =
SHA-1, DSA w/SHA-1, RSA w/ MD5<o:p></o:p></p><p =
class=3DMsoPlainText>Historic:<o:p></o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p class=3DMsoPlainText>Key =
Sizes:<o:p></o:p></p><p class=3DMsoPlainText>RSA and DSA - =
sign<o:p></o:p></p><p class=3DMsoPlainText>SHOULD =
NOT=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 =
Key size &lt;=3D 1023<o:p></o:p></p><p =
class=3DMsoPlainText>SHOULD=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 1024 &lt;=3D =
key size &lt;=3D 2048<o:p></o:p></p><p =
class=3DMsoPlainText>MAY=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0 2048 &lt; key size=C2=A0=C2=A0 <o:p></o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p class=3DMsoPlainText>RSA =
and DSA - Verify<o:p></o:p></p><p =
class=3DMsoPlainText>MAY=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 key size &lt;=3D =
1023<o:p></o:p></p><p =
class=3DMsoPlainText>MUST=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 1024 &lt;=3D key =
size &lt;=3D 2048<o:p></o:p></p><p =
class=3DMsoPlainText>MAY=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 2048 =
&lt; key size<o:p></o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p class=3DMsoPlainText>RSA - =
Certificate Verify<o:p></o:p></p><p =
class=3DMsoPlainText>MAY=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0 key size &lt;=3D 1023<o:p></o:p></p><p =
class=3DMsoPlainText>MUST=C2=A0 1024 &lt;=3D key size &lt;=3D =
4096<o:p></o:p></p><p =
class=3DMsoPlainText>MAY=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 4096=C2=A0 &lt; =
key size<o:p></o:p></p><p class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText>DSA - Certificate Verify<o:p></o:p></p><p =
class=3DMsoPlainText>MAY=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0 key size &lt;=3D 1023<o:p></o:p></p><p =
class=3DMsoPlainText>MUST=C2=A0=C2=A0=C2=A0 1024 &lt;=3D key size =
&lt;=3D 3072<o:p></o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText>Proposed for S/MIME 3.5<o:p></o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p class=3DMsoPlainText>MUST: =
RSA-PSS w/ SHA-256, ECDSA P-256 w/ SHA-256, EdDSA25519<o:p></o:p></p><p =
class=3DMsoPlainText>MUST-: RSA w/ SHA-256<o:p></o:p></p><p =
class=3DMsoPlainText>SHOULD+:<o:p></o:p></p><p =
class=3DMsoPlainText>SHOULD:=C2=A0 <s>RSA-PSS w/ SHA-512, ECDSA P-521 w/ =
SHA-512, EdDSA448</s><o:p></o:p></p><p class=3DMsoPlainText>SHOULD-: =
<o:p></o:p></p><p class=3DMsoPlainText>Historic: RSA w/ SHA-1, DSA w/ =
SHA-1, RSA w/ MD5, DSA w/ SHA-256<o:p></o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p class=3DMsoPlainText>Key =
Sizes:<o:p></o:p></p><p class=3DMsoPlainText>RSA - sign<o:p></o:p></p><p =
class=3DMsoPlainText>SHOULD =
NOT=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 =
Key size &lt;=3D 2047<o:p></o:p></p><p =
class=3DMsoPlainText>SHOULD=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 2048 &lt;=3D =
key size &lt;=3D 4096<o:p></o:p></p><p =
class=3DMsoPlainText>MAY=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0 4096 &lt; key size=C2=A0=C2=A0 <o:p></o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p class=3DMsoPlainText>RSA - =
Verify<o:p></o:p></p><p class=3DMsoPlainText>Historic =
MAY=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0 key size &lt;=3D 2047<o:p></o:p></p><p =
class=3DMsoPlainText>MUST=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 2048 &lt;=3D key =
size &lt;=3D 4096<o:p></o:p></p><p =
class=3DMsoPlainText>MAY=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 4096 =
&lt; key size<o:p></o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p class=3DMsoPlainText>RSA - =
Certificate Verify<o:p></o:p></p><p class=3DMsoPlainText>Historic =
MAY=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
 key size &lt;=3D 2047<o:p></o:p></p><p class=3DMsoPlainText>MUST=C2=A0 =
2048 &lt;=3D key size &lt;=3D 4096<o:p></o:p></p><p =
class=3DMsoPlainText>MAY=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 4096=C2=A0 &lt; =
key size<o:p></o:p></p><p class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText>DSA - Certificate Verify<o:p></o:p></p><p =
class=3DMsoPlainText>Historic =
MAY=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
 key size &lt;=3D 1023<o:p></o:p></p><p class=3DMsoPlainText>Historic =
MUST=C2=A0=C2=A0 1024 &lt;=3D key size &lt;=3D 3072<o:p></o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText>Questions:<o:p></o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p class=3DMsoPlainText =
style=3D'margin-left:.75in;text-indent:-.5in;mso-list:l1 level1 =
lfo2'><![if !supportLists]><span style=3D'mso-list:Ignore'>1.<span =
style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp; </span></span><![endif]>Should DSA be dropped =
to historic for messages and just left as SHOULD- for certificates, I =
don't know how many DSA certificates actually exist.<br><br><b>Take 2 =
state:</b> I have removed all DSA from the current set of algorithms for =
both messages and certificates.=C2=A0 This is now historic =
only<o:p></o:p></p><p class=3DMsoPlainText =
style=3D'margin-left:.75in'><o:p>&nbsp;</o:p></p><p class=3DMsoPlainText =
style=3D'margin-left:.75in;text-indent:-.5in;mso-list:l1 level1 =
lfo2'><![if !supportLists]><span style=3D'mso-list:Ignore'>2.<span =
style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp; </span></span><![endif]>I have changed to =
lower limits on RSA but not DSA for certificate verification - should it =
be changed as well?=C2=A0 Again I don't know how many DSA certificates =
exist.<br><br><b>Take 2 state:</b> I have removed DSA certificates to =
historic so the question is moot.<o:p></o:p></p><p =
class=3DMsoListParagraph><o:p>&nbsp;</o:p></p><p class=3DMsoPlainText =
style=3D'margin-left:.75in;text-indent:-.5in;mso-list:l1 level1 =
lfo2'><![if !supportLists]><span style=3D'mso-list:Ignore'>3.<span =
style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp; </span></span><![endif]>I don't think that any =
statements for ECDSA on key size need to be made separately from the =
algorithm support list.=C2=A0 Does anybody disagree?<br><br><b>Take 2 =
state: </b>=C2=A0Nobody said anything to the contrary.=C2=A0 So no plans =
to make a key size section for ECDSA algorithms.<o:p></o:p></p><p =
class=3DMsoListParagraph><o:p>&nbsp;</o:p></p><p class=3DMsoPlainText =
style=3D'margin-left:.75in;text-indent:-.5in;mso-list:l1 level1 =
lfo2'><![if !supportLists]><span style=3D'mso-list:Ignore'>4.<span =
style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp; </span></span><![endif]>SPT suggested that we =
should not be making any statements on doing anything with 512 hash =
values.=C2=A0 (Although with tons of standard snark =
=EF=81=8A).=C2=A0=C2=A0 My reasoning for including this was less to do =
with the fact that I thought the 512-bit hash functions were more =
efficient on 64-bit hardware (a statement that I cannot find support for =
with a quick web search for SHA-2) and therefore it made sense from a =
throughput point of view.=C2=A0=C2=A0 I don=E2=80=99t think we need the =
for security and if they are not more efficient I would be in favor not =
making them SHOULDs<br><br><b>Take 3 state: </b>Since nobody said =
anything to the contrary, I have removed all of the SHA-512 hash =
algorithms.=C2=A0 Russ stated that he would like to add ECDSA P-384 =
w/SHA-384 but I have seen no support for this position on the =
list.<o:p></o:p></p><p class=3DMsoListParagraph><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText =
style=3D'margin-left:.75in;text-indent:-.5in;mso-list:l1 level1 =
lfo2'><![if !supportLists]><span style=3D'mso-list:Ignore'>5.<span =
style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp; </span></span><![endif]>Blake has complained =
about the number of MUST algorithms that comes out from this list.=C2=A0 =
There are effectively 4 in the list above, as opposed to the 1 that is =
in the current set of documents.=C2=A0 We cannot kill the current MUST =
so it has to stay.=C2=A0 However, all of the new MUSTs could be =
downgraded from MUST to SHOULD without out any problems.=C2=A0 The only =
issue is that one of them needs to be a MUST so that we have a true MUST =
not just a MUST- algorithm.=C2=A0 Looking at the list my breakdown would =
be:<o:p></o:p></p><p class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText =
style=3D'margin-left:1.25in;text-indent:-.5in;mso-list:l0 level2 =
lfo1'><![if !supportLists]><span =
style=3D'mso-list:Ignore'>=E2=80=A2<span style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span><![endif]>RSA-PSS =
=E2=80=93 Given that it has been slow on update the only reason to have =
it be a MUST is that most people are probably going to have RSA keys =
today.=C2=A0 There are some arguments that say RSA-PSS is no better than =
RSA-v1.5 when doing real-world analysis.=C2=A0 I don=E2=80=99t know that =
I agree with this as I have problems with arguments by =
analogy.=C2=A0=C2=A0 This could easily be a SHOULD instead of a =
MUST<o:p></o:p></p><p class=3DMsoPlainText =
style=3D'margin-left:1.25in;text-indent:-.5in;mso-list:l0 level2 =
lfo1'><![if !supportLists]><span =
style=3D'mso-list:Ignore'>=E2=80=A2<span style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span><![endif]>ECDSA =E2=80=93 =
This is the world of NIST requirements today.=C2=A0 I think this =
justifies it being a MUST<o:p></o:p></p><p class=3DMsoPlainText =
style=3D'margin-left:1.25in;text-indent:-.5in;mso-list:l0 level2 =
lfo1'><![if !supportLists]><span =
style=3D'mso-list:Ignore'>=E2=80=A2<span style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span><![endif]>EdDSA =E2=80=93 =
This is the world of NOT MIST requirements today.=C2=A0 I think this =
justifies it being a MUST<o:p></o:p></p><p class=3DMsoPlainText =
style=3D'margin-left:.75in'><br><b>Take 3 state: </b>I have modified =
this to be all on receive and one on send, but I have not changed any of =
these to be SHOULD rather than MUST.<o:p></o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText>Jim<o:p></o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p></div></body></html>
------=_NextPart_000_05DB_01D1F7C8.F47BA9C0--


From nobody Tue Aug 16 14:18:45 2016
Return-Path: <ietf@augustcellars.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AC12212D0AB for <spasm@ietfa.amsl.com>; Tue, 16 Aug 2016 14:18:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.147
X-Spam-Level: 
X-Spam-Status: No, score=-3.147 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RP_MATCHES_RCVD=-1.247, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MXjW5MNZPTnQ for <spasm@ietfa.amsl.com>; Tue, 16 Aug 2016 14:18:41 -0700 (PDT)
Received: from mail2.augustcellars.com (augustcellars.com [50.45.239.150]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 998BC12B024 for <spasm@ietf.org>; Tue, 16 Aug 2016 14:18:40 -0700 (PDT)
Received: from hebrews (192.168.1.152) by mail2.augustcellars.com (192.168.1.201) with Microsoft SMTP Server (TLS) id 15.0.1178.4; Tue, 16 Aug 2016 14:30:53 -0700
From: Jim Schaad <ietf@augustcellars.com>
To: 'Russ Housley' <housley@vigilsec.com>
References: <01d801d1f0ef$18a68030$49f38090$@augustcellars.com> <D8AEFACC-4C55-4F34-8CA5-062C35052923@vigilsec.com> <004701d1f1e9$1d65f470$5831dd50$@augustcellars.com>
In-Reply-To: <004701d1f1e9$1d65f470$5831dd50$@augustcellars.com>
Date: Tue, 16 Aug 2016 14:18:35 -0700
Message-ID: <05df01d1f803$c1805b20$44811160$@augustcellars.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_05E0_01D1F7C9.15274F80"
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQHpc95ztakHMNv8KmlwHM55196SjwH2Hs33AmC9pXOf+miwEA==
Content-Language: en-us
X-Originating-IP: [192.168.1.152]
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/cOc0Tdh5v9MqZwTfErZ5n9wPPQs>
Cc: 'SPASM' <spasm@ietf.org>
Subject: Re: [Spasm] Change of Algorithms: Content Encryption Algorithms - Take 2
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 16 Aug 2016 21:18:44 -0000

------=_NextPart_000_05E0_01D1F7C9.15274F80
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit

I have merged in my pull request for content encryption algorithms.   I did
add AES-128 GCM as part of that merge.

 

Jim

 

 

From: Spasm [mailto:spasm-bounces@ietf.org] On Behalf Of Jim Schaad
Sent: Monday, August 08, 2016 7:53 PM
To: 'Russ Housley' <housley@vigilsec.com>
Cc: 'SPASM' <spasm@ietf.org>
Subject: Re: [Spasm] Change of Algorithms: Content Encryption Algorithms -
Take 2

 

I have no problems with this, however I will channel Blake - what is the
reason for having three must algorithms at this point?  I can see that the
support delta is very small given that both 128 and 256 bit AES primitive is
required already.

 

Jim

 

From: Spasm [mailto:spasm-bounces@ietf.org] On Behalf Of Russ Housley
Sent: Monday, August 08, 2016 7:21 AM
To: Jim Schaad <ietf@augustcellars.com <mailto:ietf@augustcellars.com> >
Cc: SPASM <spasm@ietf.org <mailto:spasm@ietf.org> >
Subject: Re: [Spasm] Change of Algorithms: Content Encryption Algorithms -
Take 2

 

I would like to see AES-128 GCM on the MUST list as well.

 

Russ

 

 

On Aug 7, 2016, at 5:03 PM, Jim Schaad <ietf@augustcellars.com
<mailto:ietf@augustcellars.com> > wrote:

 

I have looked at the responses to the original mail and am updating the mail
to reflect what I thought I saw as comments.

 

This message looks at Content Encryption Algorithms.  Please restrict your
discussions to this set of algorithms, I will be sending out messages on
other algorithm times over time.

 

Current Document for S/MIME 3.1

 

MUST: AES-128 CBC

SHOULD+: AES-192 CBC and AES-256 CBC

SHOULD-: DES EDE3 CBC (tripleDES)

Historic: RC2/40

 

Proposed for S/MIME 3.5

 

MUST:  AES-192 CBC, AES-256 CBC, AES-256 GCM

MUST-: AES-128 CBC

SHOULD+: ChaCha20/Poly1305 (256-bit)

SHOULD-: AES-128 CBC

Historic: RC2/40, DES EDE3 CBC (tripleDES)

 

Take 2 State: With this set we now have two MUST algorithms with the same
primitive.  We are indicating that we think that ChaCha20/Poly1305 will
become a MUST in the future so we have stated a potential fail over
algorithm if AES or GCM go into the tank for any reason.   More comments are
welcome.

 

Questions:

1.      The jump from MUST to SHOULD- may be too aggressive for AES-128 CBC,
we should potentially state this as MUST- but I think being aggressive makes
more sense as we want to go to all AEAD algorithms in next version.

Take 2 state: Russ said that yes I was.  As I suggested on the list I have
pushed this back up to a MUST-.

 

2.      No recommendation for: AES-128 GCM or AES-192 GCM, should there be?
How do people feel about 128 and 192 bit algorithms?

Take 2 state: List appears to say that we should not say anything about
192-bit algorithms.  However people did not comment on the -128 vs -256
question so I have left the recommendation of AES-256 GCM alone.

 

3.      Do we want to downgrade all of the CBC algorithms in favor of GCM
algorithms?

Take 2 state:  SPT is the only one who commented on this.  I have a tendency
to agree with his proposal that we are adding AEAD and we should be pushing
that as the preferred algorithm.  Making a MUST statement about AES-256 CBC
seems to counter act this statement so I have removed it.

 

Jim

 

 

 

_______________________________________________
Spasm mailing list
 <mailto:Spasm@ietf.org> Spasm@ietf.org
 <https://www.ietf.org/mailman/listinfo/spasm>
https://www.ietf.org/mailman/listinfo/spasm

 


------=_NextPart_000_05E0_01D1F7C9.15274F80
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" =
xmlns=3D"http://www.w3.org/TR/REC-html40"><head><META =
HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Dus-ascii"><meta name=3DGenerator content=3D"Microsoft Word 15 =
(filtered medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:Helvetica;
	panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman",serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.msonormal0, li.msonormal0, div.msonormal0
	{mso-style-name:msonormal;
	mso-margin-top-alt:auto;
	margin-right:0in;
	mso-margin-bottom-alt:auto;
	margin-left:0in;
	font-size:12.0pt;
	font-family:"Times New Roman",serif;}
span.apple-converted-space
	{mso-style-name:apple-converted-space;}
span.EmailStyle19
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
span.EmailStyle20
	{mso-style-type:personal-reply;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US link=3Dblue =
vlink=3Dpurple><div class=3DWordSection1><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>I have =
merged in my pull request for content encryption algorithms.&nbsp;&nbsp; =
I did add AES-128 GCM as part of that merge.<o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'><o:p>&nbsp;</=
o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>Jim<o:p></o:p=
></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'><o:p>&nbsp;</=
o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'><o:p>&nbsp;</=
o:p></span></p><div style=3D'border:none;border-left:solid blue =
1.5pt;padding:0in 0in 0in 4.0pt'><div><div =
style=3D'border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in'><p class=3DMsoNormal><b><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>From:</span><=
/b><span style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'> =
Spasm [mailto:spasm-bounces@ietf.org] <b>On Behalf Of </b>Jim =
Schaad<br><b>Sent:</b> Monday, August 08, 2016 7:53 PM<br><b>To:</b> =
'Russ Housley' &lt;housley@vigilsec.com&gt;<br><b>Cc:</b> 'SPASM' =
&lt;spasm@ietf.org&gt;<br><b>Subject:</b> Re: [Spasm] Change of =
Algorithms: Content Encryption Algorithms - Take =
2<o:p></o:p></span></p></div></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>I have no =
problems with this, however I will channel Blake &#8211; what is the =
reason for having three must algorithms at this point?&nbsp; I can see =
that the support delta is very small given that both 128 and 256 bit AES =
primitive is required already.<o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'><o:p>&nbsp;</=
o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>Jim<o:p></o:p=
></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'><o:p>&nbsp;</=
o:p></span></p><div style=3D'border:none;border-left:solid blue =
1.5pt;padding:0in 0in 0in 4.0pt'><div><div =
style=3D'border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in'><p class=3DMsoNormal><b><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>From:</span><=
/b><span style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'> =
Spasm [<a =
href=3D"mailto:spasm-bounces@ietf.org">mailto:spasm-bounces@ietf.org</a>]=
 <b>On Behalf Of </b>Russ Housley<br><b>Sent:</b> Monday, August 08, =
2016 7:21 AM<br><b>To:</b> Jim Schaad &lt;<a =
href=3D"mailto:ietf@augustcellars.com">ietf@augustcellars.com</a>&gt;<br>=
<b>Cc:</b> SPASM &lt;<a =
href=3D"mailto:spasm@ietf.org">spasm@ietf.org</a>&gt;<br><b>Subject:</b> =
Re: [Spasm] Change of Algorithms: Content Encryption Algorithms - Take =
2<o:p></o:p></span></p></div></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>I would like =
to see AES-128 GCM on the MUST list as well.<o:p></o:p></p><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>Russ<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><div><div><p class=3DMsoNormal>On =
Aug 7, 2016, at 5:03 PM, Jim Schaad &lt;<a =
href=3D"mailto:ietf@augustcellars.com">ietf@augustcellars.com</a>&gt; =
wrote:<o:p></o:p></p></div><p class=3DMsoNormal =
style=3D'margin-bottom:12.0pt'><o:p>&nbsp;</o:p></p><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>I have =
looked at the responses to the original mail and am updating the mail to =
reflect what I thought I saw as =
comments.<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>&nbsp;<o:p></=
o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>This message =
looks at Content Encryption Algorithms.&nbsp; Please restrict your =
discussions to this set of algorithms, I will be sending out messages on =
other algorithm times over time.<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>&nbsp;<o:p></=
o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>Current =
Document for S/MIME 3.1<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>&nbsp;<o:p></=
o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>MUST: =
AES-128 CBC<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>SHOULD+: =
AES-192 CBC and AES-256 CBC<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>SHOULD-: DES =
EDE3 CBC (tripleDES)<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>Historic: =
RC2/40<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>&nbsp;<o:p></=
o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>Proposed for =
S/MIME 3.5<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>&nbsp;<o:p></=
o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>MUST:&nbsp;<s=
pan class=3Dapple-converted-space>&nbsp;</span><s>AES-192 CBC, AES-256 =
CBC,</s><span class=3Dapple-converted-space>&nbsp;</span>AES-256 =
GCM<o:p></o:p></span></p></div><div><p class=3DMsoNormal><b><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>MUST-: =
AES-128 CBC</span></b><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'><o:p></o:p></=
span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>SHOULD+: =
ChaCha20/Poly1305 (256-bit)<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><s><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>SHOULD-: =
AES-128 CBC</span></s><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'><o:p></o:p></=
span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>Historic: =
RC2/40, DES EDE3 CBC (tripleDES)<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>&nbsp;<o:p></=
o:p></span></p></div><div><p class=3DMsoNormal><b><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>Take 2 =
State</span></b><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>: With this =
set we now have two MUST algorithms with the same primitive.&nbsp; We =
are indicating that we think that ChaCha20/Poly1305 will become a MUST =
in the future so we have stated a potential fail over algorithm if AES =
or GCM go into the tank for any reason.&nbsp;&nbsp; More comments are =
welcome.<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>&nbsp;<o:p></=
o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>Questions:<o:=
p></o:p></span></p></div><div style=3D'margin-left:.5in'><p =
class=3DMsoNormal style=3D'text-indent:-.25in'><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>1.</span><spa=
n style=3D'font-size:7.0pt'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3Dapple-converted-space>&nbsp;</span></span><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>The jump =
from MUST to SHOULD- may be too aggressive for AES-128 CBC, we should =
potentially state this as MUST- but I think being aggressive makes more =
sense as we want to go to all AEAD algorithms in next =
version.<br><br><b>Take 2 state</b>: Russ said that yes I was.&nbsp; As =
I suggested on the list I have pushed this back up to a =
MUST-.<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>&nbsp;<o:p></=
o:p></span></p></div><div style=3D'margin-left:.5in'><p =
class=3DMsoNormal style=3D'text-indent:-.25in'><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>2.</span><spa=
n style=3D'font-size:7.0pt'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3Dapple-converted-space>&nbsp;</span></span><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>No =
recommendation for: AES-128 GCM or AES-192 GCM, should there be?&nbsp; =
How do people feel about 128 and 192 bit algorithms?<br><br><b>Take 2 =
state</b>: List appears to say that we should not say anything about =
192-bit algorithms.&nbsp; However people did not comment on the -128 vs =
-256 question so I have left the recommendation of AES-256 GCM =
alone.<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>&nbsp;<o:p></=
o:p></span></p></div><div style=3D'margin-left:.5in'><p =
class=3DMsoNormal style=3D'text-indent:-.25in'><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>3.</span><spa=
n style=3D'font-size:7.0pt'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3Dapple-converted-space>&nbsp;</span></span><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>Do we want =
to downgrade all of the CBC algorithms in favor of GCM =
algorithms?<br><br><b>Take 2 state</b>:&nbsp; SPT is the only one who =
commented on this.&nbsp; I have a tendency to agree with his proposal =
that we are adding AEAD and we should be pushing that as the preferred =
algorithm.&nbsp; Making a MUST statement about AES-256 CBC seems to =
counter act this statement so I have removed =
it.<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>&nbsp;<o:p></=
o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>Jim<o:p></o:p=
></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>&nbsp;<o:p></=
o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>&nbsp;<o:p></=
o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>&nbsp;<o:p></=
o:p></span></p></div><p class=3DMsoNormal><span =
style=3D'font-size:9.0pt;font-family:"Helvetica",sans-serif'>____________=
___________________________________<br>Spasm mailing list<br><a =
href=3D"mailto:Spasm@ietf.org"><span =
style=3D'color:#954F72'>Spasm@ietf.org</span></a><br><a =
href=3D"https://www.ietf.org/mailman/listinfo/spasm"><span =
style=3D'color:#954F72'>https://www.ietf.org/mailman/listinfo/spasm</span=
></a><o:p></o:p></span></p></div></blockquote></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div></div></div></div></body></h=
tml>
------=_NextPart_000_05E0_01D1F7C9.15274F80--


From nobody Tue Aug 16 14:46:02 2016
Return-Path: <ietf@augustcellars.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8D2F712B024 for <spasm@ietfa.amsl.com>; Tue, 16 Aug 2016 14:46:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.147
X-Spam-Level: 
X-Spam-Status: No, score=-3.147 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RP_MATCHES_RCVD=-1.247, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VAyKlHLtAQR9 for <spasm@ietfa.amsl.com>; Tue, 16 Aug 2016 14:46:00 -0700 (PDT)
Received: from mail2.augustcellars.com (augustcellars.com [50.45.239.150]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BDAB212B044 for <spasm@ietf.org>; Tue, 16 Aug 2016 14:45:59 -0700 (PDT)
Received: from hebrews (192.168.1.152) by mail2.augustcellars.com (192.168.1.201) with Microsoft SMTP Server (TLS) id 15.0.1178.4; Tue, 16 Aug 2016 14:57:52 -0700
From: Jim Schaad <ietf@augustcellars.com>
To: 'SPASM' <spasm@ietf.org>
Date: Tue, 16 Aug 2016 14:45:34 -0700
Message-ID: <05fb01d1f807$866599c0$9330cd40$@augustcellars.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_05FC_01D1F7CC.DA090BB0"
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AdH4A+TtdWIliWV6Q1GUZN+XiKINig==
Content-Language: en-us
X-Originating-IP: [192.168.1.152]
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/SLCqCPkbP-s2ocwkSpau31VzEXk>
Subject: [Spasm] Change of Algorithms: Digest Algorithms Take 2
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 16 Aug 2016 21:46:01 -0000

------=_NextPart_000_05FC_01D1F7CC.DA090BB0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit

This message looks at Digest Algorithms.  Please restrict your discussion to
this set of algorithms.  I will be sending out messages on other algorithms
over time.

 

Note:  Digest Algorithms are used for computing the digest of the content.

These are not the "same" as the digest algorithms that are used as part of
signature algorithms.  There may be things one wants to try and keep
similar, as we suggest that you use the same digest algorithm, but they are
not the same things.

 

 

Current Document for S/MIME 3.1

 

MUST: SHA-256

SHOULD-: SHA-1, MD5(for backwards compatibility)

 

 

Proposed for S/MIME 3.5

 

MUST: SHA-256

SHOULD: SHA-512

Historic: SHA-1, MD5

 

Questions:

 

1.      There is only one MUST and no path forward.  Is this a problem that
needs to be dealt with?  EdDSA25519 uses SHA-512 under the covers, does that
mean we should make SHA-512 at least a SHOULD here?

Take 2 status:  I have added SHA-512 to the list of SHOULDs because it
vaguely matches what is used by EdDSA 25519.  It is not really needed as
EdDSA 25519 is targeted as the 128-bit level which is what SHA-256 supports
but an implementation of EdDSA 25519 is probably going to have it available.

 

2.      Is there anybody who wants to standup and argue for adopting in any
of the SHA-3 algorithms?

Take 2 status:  There have been a couple of pro SHAKE people, a couple of
anti SHA-3 people and a larger segment that seems to say 'Meh'.  My take at
this time is that there does not seem to be support to adding this right
now.

 

Jim

 

 


------=_NextPart_000_05FC_01D1F7CC.DA090BB0
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" =
xmlns=3D"http://www.w3.org/TR/REC-html40"><head><meta =
http-equiv=3DContent-Type content=3D"text/html; =
charset=3Dus-ascii"><meta name=3DGenerator content=3D"Microsoft Word 15 =
(filtered medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:#0563C1;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:#954F72;
	text-decoration:underline;}
p.MsoPlainText, li.MsoPlainText, div.MsoPlainText
	{mso-style-priority:99;
	mso-style-link:"Plain Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
span.PlainTextChar
	{mso-style-name:"Plain Text Char";
	mso-style-priority:99;
	mso-style-link:"Plain Text";
	font-family:"Calibri",sans-serif;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri",sans-serif;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:27683452;
	mso-list-type:hybrid;
	mso-list-template-ids:-581282456 67698703 67698713 67698715 67698703 =
67698713 67698715 67698703 67698713 67698715;}
@list l0:level1
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level2
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level3
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
@list l0:level4
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level5
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level6
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
@list l0:level7
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level8
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level9
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
@list l1
	{mso-list-id:1872648049;
	mso-list-type:hybrid;
	mso-list-template-ids:-1255111274 67698703 67698713 67698715 67698703 =
67698713 67698715 67698703 67698713 67698715;}
@list l1:level1
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l1:level2
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l1:level3
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
@list l1:level4
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l1:level5
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l1:level6
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
@list l1:level7
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l1:level8
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l1:level9
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
ol
	{margin-bottom:0in;}
ul
	{margin-bottom:0in;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US =
link=3D"#0563C1" vlink=3D"#954F72"><div class=3DWordSection1><p =
class=3DMsoPlainText>This message looks at Digest Algorithms.&nbsp; =
Please restrict your discussion to this set of algorithms.&nbsp; I will =
be sending out messages on other algorithms over time.<o:p></o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText>Note:&nbsp; Digest Algorithms are used for =
computing the digest of the content.<o:p></o:p></p><p =
class=3DMsoPlainText>These are not the &quot;same&quot; as the digest =
algorithms that are used as part of signature algorithms.&nbsp; There =
may be things one wants to try and keep similar, as we suggest that you =
use the same digest algorithm, but they are not the same =
things.<o:p></o:p></p><p class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText>Current Document for S/MIME 3.1<o:p></o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p class=3DMsoPlainText>MUST: =
SHA-256<o:p></o:p></p><p class=3DMsoPlainText>SHOULD-: SHA-1, MD5(for =
backwards compatibility)<o:p></o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText>Proposed for S/MIME 3.5<o:p></o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p class=3DMsoPlainText>MUST: =
SHA-256<o:p></o:p></p><p class=3DMsoPlainText><b>SHOULD: =
SHA-512<o:p></o:p></b></p><p class=3DMsoPlainText>Historic: SHA-1, =
MD5<o:p></o:p></p><p class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText>Questions:<o:p></o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p class=3DMsoPlainText =
style=3D'margin-left:.5in;text-indent:-.25in;mso-list:l1 level1 =
lfo2'><![if !supportLists]><span style=3D'mso-list:Ignore'>1.<span =
style=3D'font:7.0pt "Times New Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
</span></span><![endif]>There is only one MUST and no path =
forward.&nbsp; Is this a problem that needs to be dealt with?&nbsp; =
EdDSA25519 uses SHA-512 under the covers, does that mean we should make =
SHA-512 at least a SHOULD here?<br><br><b>Take 2 status: &nbsp;</b>I =
have added SHA-512 to the list of SHOULDs because it vaguely matches =
what is used by EdDSA 25519.&nbsp; It is not really needed as EdDSA =
25519 is targeted as the 128-bit level which is what SHA-256 supports =
but an implementation of EdDSA 25519 is probably going to have it =
available.<o:p></o:p></p><p class=3DMsoPlainText =
style=3D'margin-left:.5in'><o:p>&nbsp;</o:p></p><p class=3DMsoPlainText =
style=3D'margin-left:.5in;text-indent:-.25in;mso-list:l1 level1 =
lfo2'><![if !supportLists]><span style=3D'mso-list:Ignore'>2.<span =
style=3D'font:7.0pt "Times New Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
</span></span><![endif]>Is there anybody who wants to standup and argue =
for adopting in any of the SHA-3 algorithms?<br><br><b>Take 2 =
status:&nbsp; </b>There have been a couple of pro SHAKE people, a couple =
of anti SHA-3 people and a larger segment that seems to say =
&#8216;Meh&#8217;.&nbsp; My take at this time is that there does not =
seem to be support to adding this right now.<o:p></o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText>Jim<o:p></o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p></div></body></html>
------=_NextPart_000_05FC_01D1F7CC.DA090BB0--


From nobody Tue Aug 16 14:46:48 2016
Return-Path: <housley@vigilsec.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1086412D763 for <spasm@ietfa.amsl.com>; Tue, 16 Aug 2016 14:46:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.899
X-Spam-Level: 
X-Spam-Status: No, score=-101.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, USER_IN_WHITELIST=-100] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id if6CjnjoCJjn for <spasm@ietfa.amsl.com>; Tue, 16 Aug 2016 14:46:45 -0700 (PDT)
Received: from mail.smeinc.net (mail.smeinc.net [209.135.209.11]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DCB7112B044 for <spasm@ietf.org>; Tue, 16 Aug 2016 14:46:44 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mail.smeinc.net (Postfix) with ESMTP id C755A3005AB for <spasm@ietf.org>; Tue, 16 Aug 2016 17:46:42 -0400 (EDT)
X-Virus-Scanned: amavisd-new at mail.smeinc.net
Received: from mail.smeinc.net ([127.0.0.1]) by localhost (mail.smeinc.net [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id BdP9D0R5NHaq for <spasm@ietf.org>; Tue, 16 Aug 2016 17:46:41 -0400 (EDT)
Received: from [192.168.2.100] (pool-108-51-128-219.washdc.fios.verizon.net [108.51.128.219]) by mail.smeinc.net (Postfix) with ESMTPSA id 1524C300293; Tue, 16 Aug 2016 17:46:41 -0400 (EDT)
Content-Type: multipart/alternative; boundary="Apple-Mail=_07D25C0E-8526-4978-9538-08A8B04EA9E0"
Mime-Version: 1.0 (Mac OS X Mail 7.3 \(1878.6\))
From: Russ Housley <housley@vigilsec.com>
In-Reply-To: <05da01d1f803$a0d885f0$e28991d0$@augustcellars.com>
Date: Tue, 16 Aug 2016 17:46:50 -0400
Message-Id: <8849812E-0338-4A33-A6F9-E2627AAF3AB4@vigilsec.com>
References: <05da01d1f803$a0d885f0$e28991d0$@augustcellars.com>
To: Jim Schaad <ietf@augustcellars.com>
X-Mailer: Apple Mail (2.1878.6)
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/rw73xjelgpHyoXj2UC6sfQQOR0M>
Cc: SPASM <spasm@ietf.org>
Subject: Re: [Spasm] Change of Algorithms: Take 3
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 16 Aug 2016 21:46:47 -0000

--Apple-Mail=_07D25C0E-8526-4978-9538-08A8B04EA9E0
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8

Jim:

> Questions:
> =20
> 1.                Should DSA be dropped to historic for messages and =
just left as SHOULD- for certificates, I don't know how many DSA =
certificates actually exist.
>=20
> Take 2 state: I have removed all DSA from the current set of =
algorithms for both messages and certificates.  This is now historic =
only

The only DSA certificates that I know about used 1024-bit keys.  Those =
should be historic.  Can=E2=80=99t we just say historic for all key =
sizes?
=20
> 2.                I have changed to lower limits on RSA but not DSA =
for certificate verification - should it be changed as well?  Again I =
don't know how many DSA certificates exist.
>=20
> Take 2 state: I have removed DSA certificates to historic so the =
question is moot.

Okay.

> 3.                I don't think that any statements for ECDSA on key =
size need to be made separately from the algorithm support list.  Does =
anybody disagree?
>=20
> Take 2 state:  Nobody said anything to the contrary.  So no plans to =
make a key size section for ECDSA algorithms.

I think that we should only support named curves, and each one of those =
comes with an implied key size.
=20
> 4.                SPT suggested that we should not be making any =
statements on doing anything with 512 hash values.  (Although with tons =
of standard snark =EF=81=8A).   My reasoning for including this was less =
to do with the fact that I thought the 512-bit hash functions were more =
efficient on 64-bit hardware (a statement that I cannot find support for =
with a quick web search for SHA-2) and therefore it made sense from a =
throughput point of view.   I don=E2=80=99t think we need the for =
security and if they are not more efficient I would be in favor not =
making them SHOULDs
>=20
> Take 3 state: Since nobody said anything to the contrary, I have =
removed all of the SHA-512 hash algorithms.  Russ stated that he would =
like to add ECDSA P-384 w/SHA-384 but I have seen no support for this =
position on the list.

I would still like to see ECDSA P-384 w/SHA-384 as a SHOULD algorithm.

> 5.                Blake has complained about the number of MUST =
algorithms that comes out from this list.  There are effectively 4 in =
the list above, as opposed to the 1 that is in the current set of =
documents.  We cannot kill the current MUST so it has to stay.  However, =
all of the new MUSTs could be downgraded from MUST to SHOULD without out =
any problems.  The only issue is that one of them needs to be a MUST so =
that we have a true MUST not just a MUST- algorithm.  Looking at the =
list my breakdown would be:
> =20
> =E2=80=A2                 RSA-PSS =E2=80=93 Given that it has been =
slow on update the only reason to have it be a MUST is that most people =
are probably going to have RSA keys today.  There are some arguments =
that say RSA-PSS is no better than RSA-v1.5 when doing real-world =
analysis.  I don=E2=80=99t know that I agree with this as I have =
problems with arguments by analogy.   This could easily be a SHOULD =
instead of a MUST
> =E2=80=A2                 ECDSA =E2=80=93 This is the world of NIST =
requirements today.  I think this justifies it being a MUST
> =E2=80=A2                 EdDSA =E2=80=93 This is the world of NOT =
MIST requirements today.  I think this justifies it being a MUST
>=20
> Take 3 state: I have modified this to be all on receive and one on =
send, but I have not changed any of these to be SHOULD rather than MUST.

I agree with Blake.  I suggest:

MUST: ECDSA P-256 w/ SHA-256
MUST-: RSA w/ SHA-256
SHOULD+: RSA-PSS w/ SHA-256, EdDSA25519
SHOULD: ECDSA P-384 w/SHA-384

Russ


--Apple-Mail=_07D25C0E-8526-4978-9538-08A8B04EA9E0
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=utf-8

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Dutf-8"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: =
after-white-space;">Jim:<br><div><br =
class=3D"Apple-interchange-newline"><blockquote type=3D"cite"><div =
lang=3D"EN-US" link=3D"#0563C1" vlink=3D"#954F72" style=3D"font-family: =
Helvetica; font-size: 12px; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; line-height: normal; =
orphans: auto; text-align: start; text-indent: 0px; text-transform: =
none; white-space: normal; widows: auto; word-spacing: 0px; =
-webkit-text-stroke-width: 0px;"><div class=3D"WordSection1" =
style=3D"page: WordSection1;"><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;"><span =
style=3D"font-size: 11pt;">Questions:</span></div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;"><o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, =
sans-serif;"><o:p>&nbsp;</o:p></div><div style=3D"margin: 0in 0in =
0.0001pt 0.75in; font-size: 11pt; font-family: Calibri, sans-serif; =
text-indent: -0.5in;"><span>1.<span style=3D"font-style: normal; =
font-variant: normal; font-weight: normal; font-size: 7pt; line-height: =
normal; font-family: 'Times New =
Roman';">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3D"Apple-converted-space">&nbsp;</span></span></span>Should DSA be =
dropped to historic for messages and just left as SHOULD- for =
certificates, I don't know how many DSA certificates actually =
exist.<br><br><b>Take 2 state:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>I have removed all DSA from =
the current set of algorithms for both messages and certificates.&nbsp; =
This is now historic =
only</div></div></div></blockquote><div><br></div>The only DSA =
certificates that I know about used 1024-bit keys. &nbsp;Those should be =
historic. &nbsp;Can=E2=80=99t we just say historic for all key =
sizes?</div><div><span style=3D"font-family: Calibri, sans-serif; =
font-size: 11pt;">&nbsp;</span><br><blockquote type=3D"cite"><div =
lang=3D"EN-US" link=3D"#0563C1" vlink=3D"#954F72" style=3D"font-family: =
Helvetica; font-size: 12px; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; line-height: normal; =
orphans: auto; text-align: start; text-indent: 0px; text-transform: =
none; white-space: normal; widows: auto; word-spacing: 0px; =
-webkit-text-stroke-width: 0px;"><div class=3D"WordSection1" =
style=3D"page: WordSection1;"><div style=3D"margin: 0in 0in 0.0001pt =
0.75in; font-size: 11pt; font-family: Calibri, sans-serif; text-indent: =
-0.5in;"><span>2.<span style=3D"font-style: normal; font-variant: =
normal; font-weight: normal; font-size: 7pt; line-height: normal; =
font-family: 'Times New =
Roman';">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3D"Apple-converted-space">&nbsp;</span></span></span>I have =
changed to lower limits on RSA but not DSA for certificate verification =
- should it be changed as well?&nbsp; Again I don't know how many DSA =
certificates exist.<br><br><b>Take 2 state:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>I have removed DSA =
certificates to historic so the question is =
moot.</div></div></div></blockquote><div><br></div>Okay.</div><div><br><bl=
ockquote type=3D"cite"><div lang=3D"EN-US" link=3D"#0563C1" =
vlink=3D"#954F72" style=3D"font-family: Helvetica; font-size: 12px; =
font-style: normal; font-variant: normal; font-weight: normal; =
letter-spacing: normal; line-height: normal; orphans: auto; text-align: =
start; text-indent: 0px; text-transform: none; white-space: normal; =
widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px;"><div =
class=3D"WordSection1" style=3D"page: WordSection1;"><div style=3D"margin:=
 0in 0in 0.0001pt 0.75in; font-size: 11pt; font-family: Calibri, =
sans-serif; text-indent: -0.5in;"><o:p></o:p></div><div style=3D"margin: =
0in 0in 0.0001pt 0.75in; font-size: 11pt; font-family: Calibri, =
sans-serif; text-indent: -0.5in;"><span>3.<span style=3D"font-style: =
normal; font-variant: normal; font-weight: normal; font-size: 7pt; =
line-height: normal; font-family: 'Times New =
Roman';">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3D"Apple-converted-space">&nbsp;</span></span></span>I don't think =
that any statements for ECDSA on key size need to be made separately =
from the algorithm support list.&nbsp; Does anybody =
disagree?<br><br><b>Take 2 state:<span =
class=3D"Apple-converted-space">&nbsp;</span></b>&nbsp;Nobody said =
anything to the contrary.&nbsp; So no plans to make a key size section =
for ECDSA algorithms.</div></div></div></blockquote><div><br></div>I =
think that we should only support named curves, and each one of those =
comes with an implied key size.</div><div><span style=3D"font-family: =
Calibri, sans-serif; font-size: 11pt;">&nbsp;</span><br><blockquote =
type=3D"cite"><div lang=3D"EN-US" link=3D"#0563C1" vlink=3D"#954F72" =
style=3D"font-family: Helvetica; font-size: 12px; font-style: normal; =
font-variant: normal; font-weight: normal; letter-spacing: normal; =
line-height: normal; orphans: auto; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; widows: auto; word-spacing: =
0px; -webkit-text-stroke-width: 0px;"><div class=3D"WordSection1" =
style=3D"page: WordSection1;"><div style=3D"margin: 0in 0in 0.0001pt =
0.75in; font-size: 11pt; font-family: Calibri, sans-serif; text-indent: =
-0.5in;"><span>4.<span style=3D"font-style: normal; font-variant: =
normal; font-weight: normal; font-size: 7pt; line-height: normal; =
font-family: 'Times New =
Roman';">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3D"Apple-converted-space">&nbsp;</span></span></span>SPT suggested =
that we should not be making any statements on doing anything with 512 =
hash values.&nbsp; (Although with tons of standard snark =
=EF=81=8A).&nbsp;&nbsp; My reasoning for including this was less to do =
with the fact that I thought the 512-bit hash functions were more =
efficient on 64-bit hardware (a statement that I cannot find support for =
with a quick web search for SHA-2) and therefore it made sense from a =
throughput point of view.&nbsp;&nbsp; I don=E2=80=99t think we need the =
for security and if they are not more efficient I would be in favor not =
making them SHOULDs<br><br><b>Take 3 state:<span =
class=3D"Apple-converted-space">&nbsp;</span></b>Since nobody said =
anything to the contrary, I have removed all of the SHA-512 hash =
algorithms.&nbsp; Russ stated that he would like to add ECDSA P-384 =
w/SHA-384 but I have seen no support for this position on the =
list.</div></div></div></blockquote><div><br></div><div>I would still =
like to see&nbsp;ECDSA P-384 w/SHA-384 as a SHOULD =
algorithm.</div><br><blockquote type=3D"cite"><div lang=3D"EN-US" =
link=3D"#0563C1" vlink=3D"#954F72" style=3D"font-family: Helvetica; =
font-size: 12px; font-style: normal; font-variant: normal; font-weight: =
normal; letter-spacing: normal; line-height: normal; orphans: auto; =
text-align: start; text-indent: 0px; text-transform: none; white-space: =
normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: =
0px;"><div class=3D"WordSection1" style=3D"page: WordSection1;"><div =
style=3D"margin: 0in 0in 0.0001pt 0.75in; font-size: 11pt; font-family: =
Calibri, sans-serif; text-indent: -0.5in;"><o:p></o:p></div><div =
style=3D"margin: 0in 0in 0.0001pt 0.75in; font-size: 11pt; font-family: =
Calibri, sans-serif; text-indent: -0.5in;"><span>5.<span =
style=3D"font-style: normal; font-variant: normal; font-weight: normal; =
font-size: 7pt; line-height: normal; font-family: 'Times New =
Roman';">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3D"Apple-converted-space">&nbsp;</span></span></span>Blake has =
complained about the number of MUST algorithms that comes out from this =
list.&nbsp; There are effectively 4 in the list above, as opposed to the =
1 that is in the current set of documents.&nbsp; We cannot kill the =
current MUST so it has to stay.&nbsp; However, all of the new MUSTs =
could be downgraded from MUST to SHOULD without out any problems.&nbsp; =
The only issue is that one of them needs to be a MUST so that we have a =
true MUST not just a MUST- algorithm.&nbsp; Looking at the list my =
breakdown would be:<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;"><o:p>&nbsp;</o:p></div><div style=3D"margin: 0in 0in =
0.0001pt 1.25in; font-size: 11pt; font-family: Calibri, sans-serif; =
text-indent: -0.5in;"><span>=E2=80=A2<span style=3D"font-style: normal; =
font-variant: normal; font-weight: normal; font-size: 7pt; line-height: =
normal; font-family: 'Times New =
Roman';">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3D"Apple-converted-space">&nbsp;</span></span></span>RSA-PSS =E2=80=93=
 Given that it has been slow on update the only reason to have it be a =
MUST is that most people are probably going to have RSA keys =
today.&nbsp; There are some arguments that say RSA-PSS is no better than =
RSA-v1.5 when doing real-world analysis.&nbsp; I don=E2=80=99t know that =
I agree with this as I have problems with arguments by =
analogy.&nbsp;&nbsp; This could easily be a SHOULD instead of a =
MUST<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt 1.25in; =
font-size: 11pt; font-family: Calibri, sans-serif; text-indent: =
-0.5in;"><span>=E2=80=A2<span style=3D"font-style: normal; font-variant: =
normal; font-weight: normal; font-size: 7pt; line-height: normal; =
font-family: 'Times New =
Roman';">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3D"Apple-converted-space">&nbsp;</span></span></span>ECDSA =E2=80=93=
 This is the world of NIST requirements today.&nbsp; I think this =
justifies it being a MUST<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt 1.25in; font-size: 11pt; font-family: Calibri, sans-serif; =
text-indent: -0.5in;"><span>=E2=80=A2<span style=3D"font-style: normal; =
font-variant: normal; font-weight: normal; font-size: 7pt; line-height: =
normal; font-family: 'Times New =
Roman';">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3D"Apple-converted-space">&nbsp;</span></span></span>EdDSA =E2=80=93=
 This is the world of NOT MIST requirements today.&nbsp; I think this =
justifies it being a MUST<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt 0.75in; font-size: 11pt; font-family: Calibri, =
sans-serif;"><br><b>Take 3 state:<span =
class=3D"Apple-converted-space">&nbsp;</span></b>I have modified this to =
be all on receive and one on send, but I have not changed any of these =
to be SHOULD rather than =
MUST.<o:p></o:p></div></div></div></blockquote><br></div><div>I agree =
with Blake. &nbsp;I suggest:</div><div><br></div><div><div>MUST: ECDSA =
P-256 w/ SHA-256</div><div>MUST-: RSA w/ SHA-256</div><div>SHOULD+: =
RSA-PSS w/ SHA-256, EdDSA25519</div><div>SHOULD: ECDSA P-384 =
w/SHA-384</div></div><br><div>Russ</div><div><br></div></body></html>=

--Apple-Mail=_07D25C0E-8526-4978-9538-08A8B04EA9E0--


From nobody Tue Aug 16 14:50:54 2016
Return-Path: <housley@vigilsec.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 35CD912D829 for <spasm@ietfa.amsl.com>; Tue, 16 Aug 2016 14:50:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.899
X-Spam-Level: 
X-Spam-Status: No, score=-101.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, USER_IN_WHITELIST=-100] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mdXwaxti1f1w for <spasm@ietfa.amsl.com>; Tue, 16 Aug 2016 14:50:51 -0700 (PDT)
Received: from mail.smeinc.net (mail.smeinc.net [209.135.209.11]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 88F7B12D828 for <spasm@ietf.org>; Tue, 16 Aug 2016 14:50:50 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mail.smeinc.net (Postfix) with ESMTP id 8B7643005B4 for <spasm@ietf.org>; Tue, 16 Aug 2016 17:50:48 -0400 (EDT)
X-Virus-Scanned: amavisd-new at mail.smeinc.net
Received: from mail.smeinc.net ([127.0.0.1]) by localhost (mail.smeinc.net [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id Wr3XES1C8EYd for <spasm@ietf.org>; Tue, 16 Aug 2016 17:50:47 -0400 (EDT)
Received: from [192.168.2.100] (pool-108-51-128-219.washdc.fios.verizon.net [108.51.128.219]) by mail.smeinc.net (Postfix) with ESMTPSA id 5F167300289; Tue, 16 Aug 2016 17:50:47 -0400 (EDT)
Content-Type: multipart/alternative; boundary="Apple-Mail=_55874271-8C11-47F0-A608-AF898D5F2AFB"
Mime-Version: 1.0 (Mac OS X Mail 7.3 \(1878.6\))
From: Russ Housley <housley@vigilsec.com>
In-Reply-To: <05fb01d1f807$866599c0$9330cd40$@augustcellars.com>
Date: Tue, 16 Aug 2016 17:50:56 -0400
Message-Id: <9841C267-6CFF-4029-A47E-EE1D9DEECACE@vigilsec.com>
References: <05fb01d1f807$866599c0$9330cd40$@augustcellars.com>
To: Jim Schaad <ietf@augustcellars.com>
X-Mailer: Apple Mail (2.1878.6)
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/r_7Qpw-vx-ZTJt5p7Lxm32Knfps>
Cc: SPASM <spasm@ietf.org>
Subject: Re: [Spasm] Change of Algorithms: Digest Algorithms Take 2
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 16 Aug 2016 21:50:53 -0000

--Apple-Mail=_55874271-8C11-47F0-A608-AF898D5F2AFB
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

Jim:

Just responding to the first question.

> 1.      There is only one MUST and no path forward.  Is this a problem =
that needs to be dealt with?  EdDSA25519 uses SHA-512 under the covers, =
does that mean we should make SHA-512 at least a SHOULD here?
>=20
> Take 2 status:  I have added SHA-512 to the list of SHOULDs because it =
vaguely matches what is used by EdDSA 25519.  It is not really needed as =
EdDSA 25519 is targeted as the 128-bit level which is what SHA-256 =
supports but an implementation of EdDSA 25519 is probably going to have =
it available.

I think that EdDSA25519 and SHA-512 should both be SHOULD algorithms.  =
Your other message has EdDSA25519 at the MUST level, and I suggested =
moving it to the SHOULD level to make these match.

Russ


--Apple-Mail=_55874271-8C11-47F0-A608-AF898D5F2AFB
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=us-ascii

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Dus-ascii"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: =
after-white-space;">Jim:<div><br></div><div>Just responding to the first =
question.<br><div><br class=3D"Apple-interchange-newline"><blockquote =
type=3D"cite"><div lang=3D"EN-US" link=3D"#0563C1" vlink=3D"#954F72" =
style=3D"font-family: Helvetica; font-size: 12px; font-style: normal; =
font-variant: normal; font-weight: normal; letter-spacing: normal; =
line-height: normal; orphans: auto; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; widows: auto; word-spacing: =
0px; -webkit-text-stroke-width: 0px;"><div class=3D"WordSection1" =
style=3D"page: WordSection1;"><div style=3D"margin: 0in 0in 0.0001pt =
0.5in; font-size: 11pt; font-family: Calibri, sans-serif; text-indent: =
-0.25in;"><span>1.<span style=3D"font-style: normal; font-variant: =
normal; font-weight: normal; font-size: 7pt; line-height: normal; =
font-family: 'Times New Roman';">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3D"Apple-converted-space">&nbsp;</span></span></span>There is only =
one MUST and no path forward.&nbsp; Is this a problem that needs to be =
dealt with?&nbsp; EdDSA25519 uses SHA-512 under the covers, does that =
mean we should make SHA-512 at least a SHOULD here?<br><br><b>Take 2 =
status: &nbsp;</b>I have added SHA-512 to the list of SHOULDs because it =
vaguely matches what is used by EdDSA 25519.&nbsp; It is not really =
needed as EdDSA 25519 is targeted as the 128-bit level which is what =
SHA-256 supports but an implementation of EdDSA 25519 is probably going =
to have it available.</div></div></div></blockquote><div><br></div>I =
think that&nbsp;EdDSA25519 and SHA-512 should both be SHOULD algorithms. =
&nbsp;Your other message has&nbsp;EdDSA25519 at the MUST level, and I =
suggested moving it to the SHOULD level to make these =
match.</div><div><br></div><div>Russ</div><div><br></div></div></body></ht=
ml>=

--Apple-Mail=_55874271-8C11-47F0-A608-AF898D5F2AFB--


From nobody Tue Aug 16 14:56:23 2016
Return-Path: <ietf@augustcellars.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F3DF312D828 for <spasm@ietfa.amsl.com>; Tue, 16 Aug 2016 14:56:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.147
X-Spam-Level: 
X-Spam-Status: No, score=-3.147 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RP_MATCHES_RCVD=-1.247, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Hlo9zSXM-u5J for <spasm@ietfa.amsl.com>; Tue, 16 Aug 2016 14:56:18 -0700 (PDT)
Received: from mail2.augustcellars.com (augustcellars.com [50.45.239.150]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 31DD312D511 for <spasm@ietf.org>; Tue, 16 Aug 2016 14:56:18 -0700 (PDT)
Received: from hebrews (192.168.1.152) by mail2.augustcellars.com (192.168.1.201) with Microsoft SMTP Server (TLS) id 15.0.1178.4; Tue, 16 Aug 2016 15:08:09 -0700
From: Jim Schaad <ietf@augustcellars.com>
To: 'Russ Housley' <housley@vigilsec.com>
References: <05fb01d1f807$866599c0$9330cd40$@augustcellars.com> <9841C267-6CFF-4029-A47E-EE1D9DEECACE@vigilsec.com>
In-Reply-To: <9841C267-6CFF-4029-A47E-EE1D9DEECACE@vigilsec.com>
Date: Tue, 16 Aug 2016 14:55:52 -0700
Message-ID: <060f01d1f808$f694d1b0$e3be7510$@augustcellars.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_0610_01D1F7CE.4A38DFE0"
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQLx1VyogwVYktLYzIqd8gnhoT47wQHbb9jrnf2K/eA=
Content-Language: en-us
X-Originating-IP: [192.168.1.152]
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/BYUjfAEE1tWMI6MyVVKBIXZaFP8>
Cc: 'SPASM' <spasm@ietf.org>
Subject: Re: [Spasm] Change of Algorithms: Digest Algorithms Take 2
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 16 Aug 2016 21:56:23 -0000

------=_NextPart_000_0610_01D1F7CE.4A38DFE0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit

 

 

From: Spasm [mailto:spasm-bounces@ietf.org] On Behalf Of Russ Housley
Sent: Tuesday, August 16, 2016 2:51 PM
To: Jim Schaad <ietf@augustcellars.com>
Cc: SPASM <spasm@ietf.org>
Subject: Re: [Spasm] Change of Algorithms: Digest Algorithms Take 2

 

Jim:

 

Just responding to the first question.





1.      There is only one MUST and no path forward.  Is this a problem that
needs to be dealt with?  EdDSA25519 uses SHA-512 under the covers, does that
mean we should make SHA-512 at least a SHOULD here?

Take 2 status:  I have added SHA-512 to the list of SHOULDs because it
vaguely matches what is used by EdDSA 25519.  It is not really needed as
EdDSA 25519 is targeted as the 128-bit level which is what SHA-256 supports
but an implementation of EdDSA 25519 is probably going to have it available.

 

I think that EdDSA25519 and SHA-512 should both be SHOULD algorithms.  Your
other message has EdDSA25519 at the MUST level, and I suggested moving it to
the SHOULD level to make these match.

 

[JLS] It is not clear to me that there is an advantage from a security
impedance matching to say that one needs to use SHA-512 with EdDSA25519.
As I said above, SHA-256 matches up just fine with EdDSA25519.  The story
would be different if we had required support for EdDSA448.   Do you have a
different understanding?  Is there a reasoning to making these two items
match?

Jim

 

 

Russ

 


------=_NextPart_000_0610_01D1F7CE.4A38DFE0
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" =
xmlns=3D"http://www.w3.org/TR/REC-html40"><head><META =
HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Dus-ascii"><meta name=3DGenerator content=3D"Microsoft Word 15 =
(filtered medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:Helvetica;
	panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman",serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:#0563C1;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:#954F72;
	text-decoration:underline;}
p.msonormal0, li.msonormal0, div.msonormal0
	{mso-style-name:msonormal;
	mso-margin-top-alt:auto;
	margin-right:0in;
	mso-margin-bottom-alt:auto;
	margin-left:0in;
	font-size:12.0pt;
	font-family:"Times New Roman",serif;}
span.apple-converted-space
	{mso-style-name:apple-converted-space;}
span.EmailStyle19
	{mso-style-type:personal-reply;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US =
link=3D"#0563C1" vlink=3D"#954F72"><div class=3DWordSection1><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'><o:p>&nbsp;</=
o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'><o:p>&nbsp;</=
o:p></span></p><div style=3D'border:none;border-left:solid blue =
1.5pt;padding:0in 0in 0in 4.0pt'><div><div =
style=3D'border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in'><p class=3DMsoNormal><b><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>From:</span><=
/b><span style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'> =
Spasm [mailto:spasm-bounces@ietf.org] <b>On Behalf Of </b>Russ =
Housley<br><b>Sent:</b> Tuesday, August 16, 2016 2:51 PM<br><b>To:</b> =
Jim Schaad &lt;ietf@augustcellars.com&gt;<br><b>Cc:</b> SPASM =
&lt;spasm@ietf.org&gt;<br><b>Subject:</b> Re: [Spasm] Change of =
Algorithms: Digest Algorithms Take 2<o:p></o:p></span></p></div></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p =
class=3DMsoNormal>Jim:<o:p></o:p></p><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>Just responding to the first =
question.<o:p></o:p></p><div><p =
class=3DMsoNormal><br><br><o:p></o:p></p><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><div><div =
style=3D'margin-left:.5in'><p class=3DMsoNormal =
style=3D'text-indent:-.25in'><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>1.</span><spa=
n style=3D'font-size:7.0pt'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3Dapple-converted-space>&nbsp;</span></span><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>There is =
only one MUST and no path forward.&nbsp; Is this a problem that needs to =
be dealt with?&nbsp; EdDSA25519 uses SHA-512 under the covers, does that =
mean we should make SHA-512 at least a SHOULD here?<br><br><b>Take 2 =
status: &nbsp;</b>I have added SHA-512 to the list of SHOULDs because it =
vaguely matches what is used by EdDSA 25519.&nbsp; It is not really =
needed as EdDSA 25519 is targeted as the 128-bit level which is what =
SHA-256 supports but an implementation of EdDSA 25519 is probably going =
to have it =
available.<o:p></o:p></span></p></div></div></blockquote><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><p class=3DMsoNormal>I =
think that&nbsp;EdDSA25519 and SHA-512 should both be SHOULD algorithms. =
&nbsp;Your other message has&nbsp;EdDSA25519 at the MUST level, and I =
suggested moving it to the SHOULD level to make these =
match.<o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'><o:p>&nbsp;</=
o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>[JLS] It is =
not clear to me that there is an advantage from a security impedance =
matching to say that one needs to use SHA-512 with =
EdDSA25519.&nbsp;&nbsp; As I said above, SHA-256 matches up just fine =
with EdDSA25519.&nbsp; The story would be different if we had required =
support for EdDSA448.&nbsp;&nbsp; Do you have a different =
understanding?&nbsp; Is there a reasoning to making these two items =
match?<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>Jim<o:p></o:p=
></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'><o:p>&nbsp;</=
o:p></span></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>Russ<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div></div></div></div></body></h=
tml>
------=_NextPart_000_0610_01D1F7CE.4A38DFE0--


From nobody Tue Aug 16 17:39:34 2016
Return-Path: <ietf@augustcellars.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C37A412D5F7 for <spasm@ietfa.amsl.com>; Tue, 16 Aug 2016 17:39:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.147
X-Spam-Level: 
X-Spam-Status: No, score=-3.147 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RP_MATCHES_RCVD=-1.247, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id k3TKVFEXJFlk for <spasm@ietfa.amsl.com>; Tue, 16 Aug 2016 17:39:29 -0700 (PDT)
Received: from mail2.augustcellars.com (augustcellars.com [50.45.239.150]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 97D6312D783 for <spasm@ietf.org>; Tue, 16 Aug 2016 17:39:28 -0700 (PDT)
Received: from hebrews (192.168.1.152) by mail2.augustcellars.com (192.168.1.201) with Microsoft SMTP Server (TLS) id 15.0.1178.4; Tue, 16 Aug 2016 17:51:14 -0700
From: Jim Schaad <ietf@augustcellars.com>
To: 'Russ Housley' <housley@vigilsec.com>
References: <05da01d1f803$a0d885f0$e28991d0$@augustcellars.com> <8849812E-0338-4A33-A6F9-E2627AAF3AB4@vigilsec.com>
In-Reply-To: <8849812E-0338-4A33-A6F9-E2627AAF3AB4@vigilsec.com>
Date: Tue, 16 Aug 2016 17:38:56 -0700
Message-ID: <062901d1f81f$be5e70f0$3b1b52d0$@augustcellars.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_062A_01D1F7E5.12047AF0"
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQFqf6LeWjM2uSNf0fCQLOEbNhx7IgIgVBhCoQozciA=
Content-Language: en-us
X-Originating-IP: [192.168.1.152]
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/VGsG4Cg4O-9yqxfVZnVUqwr_Vf8>
Cc: 'SPASM' <spasm@ietf.org>
Subject: Re: [Spasm] Change of Algorithms: Take 3
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Aug 2016 00:39:32 -0000

------=_NextPart_000_062A_01D1F7E5.12047AF0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable

=20

=20

From: Spasm [mailto:spasm-bounces@ietf.org] On Behalf Of Russ Housley
Sent: Tuesday, August 16, 2016 2:47 PM
To: Jim Schaad <ietf@augustcellars.com>
Cc: SPASM <spasm@ietf.org>
Subject: Re: [Spasm] Change of Algorithms: Take 3

=20

Jim:





Questions:

=20

1.                Should DSA be dropped to historic for messages and =
just left as SHOULD- for certificates, I don't know how many DSA =
certificates actually exist.

Take 2 state: I have removed all DSA from the current set of algorithms =
for both messages and certificates.  This is now historic only

=20

The only DSA certificates that I know about used 1024-bit keys.  Those =
should be historic.  Can=E2=80=99t we just say historic for all key =
sizes?

=20

[JLS] This is what I did.  I saw no reason to keep DSA around as it does =
not seem to be a) used or b) any more quantum resistant than ECDSA is.

=20



2.                I have changed to lower limits on RSA but not DSA for =
certificate verification - should it be changed as well?  Again I don't =
know how many DSA certificates exist.

Take 2 state: I have removed DSA certificates to historic so the =
question is moot.

=20

Okay.





3.                I don't think that any statements for ECDSA on key =
size need to be made separately from the algorithm support list.  Does =
anybody disagree?

Take 2 state:  Nobody said anything to the contrary.  So no plans to =
make a key size section for ECDSA algorithms.

=20

I think that we should only support named curves, and each one of those =
comes with an implied key size.

=20



4.                SPT suggested that we should not be making any =
statements on doing anything with 512 hash values.  (Although with tons =
of standard snark J).   My reasoning for including this was less to do =
with the fact that I thought the 512-bit hash functions were more =
efficient on 64-bit hardware (a statement that I cannot find support for =
with a quick web search for SHA-2) and therefore it made sense from a =
throughput point of view.   I don=E2=80=99t think we need the for =
security and if they are not more efficient I would be in favor not =
making them SHOULDs

Take 3 state: Since nobody said anything to the contrary, I have removed =
all of the SHA-512 hash algorithms.  Russ stated that he would like to =
add ECDSA P-384 w/SHA-384 but I have seen no support for this position =
on the list.

=20

I would still like to see ECDSA P-384 w/SHA-384 as a SHOULD algorithm.





5.                Blake has complained about the number of MUST =
algorithms that comes out from this list.  There are effectively 4 in =
the list above, as opposed to the 1 that is in the current set of =
documents.  We cannot kill the current MUST so it has to stay.  However, =
all of the new MUSTs could be downgraded from MUST to SHOULD without out =
any problems.  The only issue is that one of them needs to be a MUST so =
that we have a true MUST not just a MUST- algorithm.  Looking at the =
list my breakdown would be:

=20

=E2=80=A2                 RSA-PSS =E2=80=93 Given that it has been slow =
on update the only reason to have it be a MUST is that most people are =
probably going to have RSA keys today.  There are some arguments that =
say RSA-PSS is no better than RSA-v1.5 when doing real-world analysis.  =
I don=E2=80=99t know that I agree with this as I have problems with =
arguments by analogy.   This could easily be a SHOULD instead of a MUST

=E2=80=A2                 ECDSA =E2=80=93 This is the world of NIST =
requirements today.  I think this justifies it being a MUST

=E2=80=A2                 EdDSA =E2=80=93 This is the world of NOT MIST =
requirements today.  I think this justifies it being a MUST


Take 3 state: I have modified this to be all on receive and one on send, =
but I have not changed any of these to be SHOULD rather than MUST.

=20

I agree with Blake.  I suggest:

=20

MUST: ECDSA P-256 w/ SHA-256

MUST-: RSA w/ SHA-256

SHOULD+: RSA-PSS w/ SHA-256, EdDSA25519

SHOULD: ECDSA P-384 w/SHA-384

=20

[JLS] Privileging ECDSA over EdDSA is almost surely going to lead to =
some pushback among some communities as they see the NIST curves as =
being anathema since they do not have the desired property of =
transparency.  What would be the argument that you would put forward to =
calm the waters over this?

=20

[JLS] Do we really see RSA-PSS as being pushed to a MUST at that point?  =
The world seems to be rushing headlong into the world of EC and leaving =
RSA behind.  I don=E2=80=99t see a good reason to keep it at SHOULD+ =
unless we think this would become the standard going forward.  It makes =
more sense to me for it to be either MUST, because we think that it will =
be used a lot, or SHOULD, because RSA is now somewhat in the slow lane.  =
 The only reason that I know to support RSA is quantum support.  Today =
it is believed that RSA is more resistant to quantum cryptography =
breakages.

=20

Jim

=20

=20

Russ

=20


------=_NextPart_000_062A_01D1F7E5.12047AF0
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" =
xmlns=3D"http://www.w3.org/TR/REC-html40"><head><meta =
http-equiv=3DContent-Type content=3D"text/html; charset=3Dutf-8"><meta =
name=3DGenerator content=3D"Microsoft Word 15 (filtered =
medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:Helvetica;
	panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman",serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:#0563C1;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:#954F72;
	text-decoration:underline;}
p.msonormal0, li.msonormal0, div.msonormal0
	{mso-style-name:msonormal;
	mso-margin-top-alt:auto;
	margin-right:0in;
	mso-margin-bottom-alt:auto;
	margin-left:0in;
	font-size:12.0pt;
	font-family:"Times New Roman",serif;}
span.apple-converted-space
	{mso-style-name:apple-converted-space;}
span.EmailStyle19
	{mso-style-type:personal-reply;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US =
link=3D"#0563C1" vlink=3D"#954F72"><div class=3DWordSection1><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'><o:p>&nbsp;</=
o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'><o:p>&nbsp;</=
o:p></span></p><div style=3D'border:none;border-left:solid blue =
1.5pt;padding:0in 0in 0in 4.0pt'><div><div =
style=3D'border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in'><p class=3DMsoNormal><b><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>From:</span><=
/b><span style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'> =
Spasm [mailto:spasm-bounces@ietf.org] <b>On Behalf Of </b>Russ =
Housley<br><b>Sent:</b> Tuesday, August 16, 2016 2:47 PM<br><b>To:</b> =
Jim Schaad &lt;ietf@augustcellars.com&gt;<br><b>Cc:</b> SPASM =
&lt;spasm@ietf.org&gt;<br><b>Subject:</b> Re: [Spasm] Change of =
Algorithms: Take 3<o:p></o:p></span></p></div></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p =
class=3DMsoNormal>Jim:<o:p></o:p></p><div><p =
class=3DMsoNormal><br><br><o:p></o:p></p><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>Questions:<o:=
p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>&nbsp;<o:p></=
o:p></span></p></div><div style=3D'margin-left:.75in'><p =
class=3DMsoNormal style=3D'text-indent:-.5in'><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>1.</span><spa=
n =
style=3D'font-size:7.0pt'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3Dapple-converted-space>&nbsp;</span></span><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>Should DSA =
be dropped to historic for messages and just left as SHOULD- for =
certificates, I don't know how many DSA certificates actually =
exist.<br><br><b>Take 2 state:</b><span =
class=3Dapple-converted-space>&nbsp;</span>I have removed all DSA from =
the current set of algorithms for both messages and certificates.&nbsp; =
This is now historic =
only<o:p></o:p></span></p></div></div></blockquote><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><p class=3DMsoNormal>The =
only DSA certificates that I know about used 1024-bit keys. &nbsp;Those =
should be historic. &nbsp;Can=E2=80=99t we just say historic for all key =
sizes?<o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'><o:p>&nbsp;</=
o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>[JLS] This =
is what I did.=C2=A0 I saw no reason to keep DSA around as it does not =
seem to be a) used or b) any more quantum resistant than ECDSA =
is.<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>&nbsp;</span>=
<br><br><o:p></o:p></p><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><div><div =
style=3D'margin-left:.75in'><p class=3DMsoNormal =
style=3D'text-indent:-.5in'><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>2.</span><spa=
n =
style=3D'font-size:7.0pt'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3Dapple-converted-space>&nbsp;</span></span><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>I have =
changed to lower limits on RSA but not DSA for certificate verification =
- should it be changed as well?&nbsp; Again I don't know how many DSA =
certificates exist.<br><br><b>Take 2 state:</b><span =
class=3Dapple-converted-space>&nbsp;</span>I have removed DSA =
certificates to historic so the question is =
moot.<o:p></o:p></span></p></div></div></blockquote><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><p =
class=3DMsoNormal>Okay.<o:p></o:p></p></div><div><p =
class=3DMsoNormal><br><br><o:p></o:p></p><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><div><div =
style=3D'margin-left:.75in'><p class=3DMsoNormal =
style=3D'text-indent:-.5in'><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>3.</span><spa=
n =
style=3D'font-size:7.0pt'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3Dapple-converted-space>&nbsp;</span></span><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>I don't =
think that any statements for ECDSA on key size need to be made =
separately from the algorithm support list.&nbsp; Does anybody =
disagree?<br><br><b>Take 2 state:<span =
class=3Dapple-converted-space>&nbsp;</span></b>&nbsp;Nobody said =
anything to the contrary.&nbsp; So no plans to make a key size section =
for ECDSA =
algorithms.<o:p></o:p></span></p></div></div></blockquote><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><p class=3DMsoNormal>I =
think that we should only support named curves, and each one of those =
comes with an implied key size.<o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>&nbsp;</span>=
<br><br><o:p></o:p></p><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><div><div =
style=3D'margin-left:.75in'><p class=3DMsoNormal =
style=3D'text-indent:-.5in'><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>4.</span><spa=
n =
style=3D'font-size:7.0pt'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3Dapple-converted-space>&nbsp;</span></span><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>SPT =
suggested that we should not be making any statements on doing anything =
with 512 hash values.&nbsp; (Although with tons of standard snark =
</span><span style=3D'font-size:11.0pt;font-family:Symbol'>J</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>).&nbsp;&nbsp=
; My reasoning for including this was less to do with the fact that I =
thought the 512-bit hash functions were more efficient on 64-bit =
hardware (a statement that I cannot find support for with a quick web =
search for SHA-2) and therefore it made sense from a throughput point of =
view.&nbsp;&nbsp; I don=E2=80=99t think we need the for security and if =
they are not more efficient I would be in favor not making them =
SHOULDs<br><br><b>Take 3 state:<span =
class=3Dapple-converted-space>&nbsp;</span></b>Since nobody said =
anything to the contrary, I have removed all of the SHA-512 hash =
algorithms.&nbsp; Russ stated that he would like to add ECDSA P-384 =
w/SHA-384 but I have seen no support for this position on the =
list.<o:p></o:p></span></p></div></div></blockquote><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p class=3DMsoNormal>I =
would still like to see&nbsp;ECDSA P-384 w/SHA-384 as a SHOULD =
algorithm.<o:p></o:p></p></div><p =
class=3DMsoNormal><br><br><o:p></o:p></p><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><div><div =
style=3D'margin-left:.75in'><p class=3DMsoNormal =
style=3D'text-indent:-.5in'><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>5.</span><spa=
n =
style=3D'font-size:7.0pt'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3Dapple-converted-space>&nbsp;</span></span><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>Blake has =
complained about the number of MUST algorithms that comes out from this =
list.&nbsp; There are effectively 4 in the list above, as opposed to the =
1 that is in the current set of documents.&nbsp; We cannot kill the =
current MUST so it has to stay.&nbsp; However, all of the new MUSTs =
could be downgraded from MUST to SHOULD without out any problems.&nbsp; =
The only issue is that one of them needs to be a MUST so that we have a =
true MUST not just a MUST- algorithm.&nbsp; Looking at the list my =
breakdown would be:<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>&nbsp;<o:p></=
o:p></span></p></div><div style=3D'margin-left:1.25in'><p =
class=3DMsoNormal style=3D'text-indent:-.5in'><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>=E2=80=A2</sp=
an><span =
style=3D'font-size:7.0pt'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3Dapple-converted-space>&nbsp;</span></span><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>RSA-PSS =
=E2=80=93 Given that it has been slow on update the only reason to have =
it be a MUST is that most people are probably going to have RSA keys =
today.&nbsp; There are some arguments that say RSA-PSS is no better than =
RSA-v1.5 when doing real-world analysis.&nbsp; I don=E2=80=99t know that =
I agree with this as I have problems with arguments by =
analogy.&nbsp;&nbsp; This could easily be a SHOULD instead of a =
MUST<o:p></o:p></span></p></div><div style=3D'margin-left:1.25in'><p =
class=3DMsoNormal style=3D'text-indent:-.5in'><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>=E2=80=A2</sp=
an><span =
style=3D'font-size:7.0pt'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3Dapple-converted-space>&nbsp;</span></span><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>ECDSA =
=E2=80=93 This is the world of NIST requirements today.&nbsp; I think =
this justifies it being a MUST<o:p></o:p></span></p></div><div =
style=3D'margin-left:1.25in'><p class=3DMsoNormal =
style=3D'text-indent:-.5in'><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>=E2=80=A2</sp=
an><span =
style=3D'font-size:7.0pt'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3Dapple-converted-space>&nbsp;</span></span><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>EdDSA =
=E2=80=93 This is the world of NOT MIST requirements today.&nbsp; I =
think this justifies it being a MUST<o:p></o:p></span></p></div><div =
style=3D'margin-left:.75in'><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'><br><b>Take =
3 state:<span class=3Dapple-converted-space>&nbsp;</span></b>I have =
modified this to be all on receive and one on send, but I have not =
changed any of these to be SHOULD rather than =
MUST.<o:p></o:p></span></p></div></div></blockquote><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p class=3DMsoNormal>I =
agree with Blake. &nbsp;I suggest:<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><div><p =
class=3DMsoNormal>MUST: ECDSA P-256 w/ =
SHA-256<o:p></o:p></p></div><div><p class=3DMsoNormal>MUST-: RSA w/ =
SHA-256<o:p></o:p></p></div><div><p class=3DMsoNormal>SHOULD+: RSA-PSS =
w/ SHA-256, EdDSA25519<o:p></o:p></p></div><div><p =
class=3DMsoNormal>SHOULD: ECDSA P-384 w/SHA-384<o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'><o:p>&nbsp;</=
o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>[JLS] =
Privileging ECDSA over EdDSA is almost surely going to lead to some =
pushback among some communities as they see the NIST curves as being =
anathema since they do not have the desired property of =
transparency.=C2=A0 What would be the argument that you would put =
forward to calm the waters over this?<o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'><o:p>&nbsp;</=
o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>[JLS] Do we =
really see RSA-PSS as being pushed to a MUST at that point?=C2=A0 The =
world seems to be rushing headlong into the world of EC and leaving RSA =
behind.=C2=A0 I don=E2=80=99t see a good reason to keep it at SHOULD+ =
unless we think this would become the standard going forward.=C2=A0 It =
makes more sense to me for it to be either MUST, because we think that =
it will be used a lot, or SHOULD, because RSA is now somewhat in the =
slow lane.=C2=A0=C2=A0 The only reason that I know to support RSA is =
quantum support.=C2=A0 Today it is believed that RSA is more resistant =
to quantum cryptography breakages.<o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'><o:p>&nbsp;</=
o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>Jim<o:p></o:p=
></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'><o:p>&nbsp;</=
o:p></span></p></div></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><div><p =
class=3DMsoNormal>Russ<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div></div></div></body></html>
------=_NextPart_000_062A_01D1F7E5.12047AF0--


From nobody Wed Aug 17 12:59:35 2016
Return-Path: <housley@vigilsec.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CD39612D155 for <spasm@ietfa.amsl.com>; Wed, 17 Aug 2016 12:59:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.899
X-Spam-Level: 
X-Spam-Status: No, score=-101.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, USER_IN_WHITELIST=-100] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GEpZXONfyWLO for <spasm@ietfa.amsl.com>; Wed, 17 Aug 2016 12:59:32 -0700 (PDT)
Received: from mail.smeinc.net (mail.smeinc.net [209.135.209.11]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3356312B076 for <spasm@ietf.org>; Wed, 17 Aug 2016 12:59:32 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mail.smeinc.net (Postfix) with ESMTP id 1C70030050D for <spasm@ietf.org>; Wed, 17 Aug 2016 15:59:30 -0400 (EDT)
X-Virus-Scanned: amavisd-new at mail.smeinc.net
Received: from mail.smeinc.net ([127.0.0.1]) by localhost (mail.smeinc.net [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id DTKUo3Niop78 for <spasm@ietf.org>; Wed, 17 Aug 2016 15:59:28 -0400 (EDT)
Received: from [192.168.2.100] (pool-108-51-128-219.washdc.fios.verizon.net [108.51.128.219]) by mail.smeinc.net (Postfix) with ESMTPSA id CC400300086; Wed, 17 Aug 2016 15:59:28 -0400 (EDT)
Content-Type: multipart/alternative; boundary="Apple-Mail=_E54BA142-FC28-48B0-8A70-9ED92BBE5B71"
Mime-Version: 1.0 (Mac OS X Mail 7.3 \(1878.6\))
From: Russ Housley <housley@vigilsec.com>
In-Reply-To: <060f01d1f808$f694d1b0$e3be7510$@augustcellars.com>
Date: Wed, 17 Aug 2016 15:59:38 -0400
Message-Id: <867D20C0-402F-4F63-AC50-1E97AA717633@vigilsec.com>
References: <05fb01d1f807$866599c0$9330cd40$@augustcellars.com> <9841C267-6CFF-4029-A47E-EE1D9DEECACE@vigilsec.com> <060f01d1f808$f694d1b0$e3be7510$@augustcellars.com>
To: Jim Schaad <ietf@augustcellars.com>
X-Mailer: Apple Mail (2.1878.6)
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/9j9wvh50zfb6V6eSZCvvTVHKsds>
Cc: SPASM <spasm@ietf.org>
Subject: Re: [Spasm] Change of Algorithms: Digest Algorithms Take 2
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Aug 2016 19:59:34 -0000

--Apple-Mail=_E54BA142-FC28-48B0-8A70-9ED92BBE5B71
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

Jim:

> Just responding to the first question.
>=20
>=20
> 1.      There is only one MUST and no path forward.  Is this a problem =
that needs to be dealt with?  EdDSA25519 uses SHA-512 under the covers, =
does that mean we should make SHA-512 at least a SHOULD here?
>=20
> Take 2 status:  I have added SHA-512 to the list of SHOULDs because it =
vaguely matches what is used by EdDSA 25519.  It is not really needed as =
EdDSA 25519 is targeted as the 128-bit level which is what SHA-256 =
supports but an implementation of EdDSA 25519 is probably going to have =
it available.
> =20
> I think that EdDSA25519 and SHA-512 should both be SHOULD algorithms.  =
Your other message has EdDSA25519 at the MUST level, and I suggested =
moving it to the SHOULD level to make these match.
> =20
> [JLS] It is not clear to me that there is an advantage from a security =
impedance matching to say that one needs to use SHA-512 with EdDSA25519. =
  As I said above, SHA-256 matches up just fine with EdDSA25519.  The =
story would be different if we had required support for EdDSA448.   Do =
you have a different understanding?  Is there a reasoning to making =
these two items match?

My reading of section 5.1 of draft-irtf-cfrg-eddsa-06 is that SHA-512 is =
mandated.  It is fully baked into the algorithm description.  For this =
reason, not the security impedance match, I think that both EdDSA25519 =
and SHA-512 ought to be SHOULD algorithms (or they could both be MUST =
algorithms).  Your recent proposal had one as a SHOULD and the other as =
a MUST.

Russ


--Apple-Mail=_E54BA142-FC28-48B0-8A70-9ED92BBE5B71
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=us-ascii

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Dus-ascii"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: =
after-white-space;">Jim:<br><div><br =
class=3D"Apple-interchange-newline"><blockquote type=3D"cite"><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;">Just responding to the first =
question.<o:p></o:p></div><div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif; font-style: =
normal; font-variant: normal; font-weight: normal; letter-spacing: =
normal; line-height: normal; orphans: auto; text-align: start; =
text-indent: 0px; text-transform: none; white-space: normal; widows: =
auto; word-spacing: 0px; -webkit-text-stroke-width: =
0px;"><br><br><o:p></o:p></div><blockquote style=3D"font-family: =
Helvetica; font-size: 12px; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; line-height: normal; =
orphans: auto; text-align: start; text-indent: 0px; text-transform: =
none; white-space: normal; widows: auto; word-spacing: 0px; =
-webkit-text-stroke-width: 0px; margin-top: 5pt; margin-bottom: =
5pt;"><div style=3D"margin-left: 0.5in;"><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif; =
text-indent: -0.25in;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">1.</span><span style=3D"font-size: =
7pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3D"apple-converted-space">&nbsp;</span></span><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">There is =
only one MUST and no path forward.&nbsp; Is this a problem that needs to =
be dealt with?&nbsp; EdDSA25519 uses SHA-512 under the covers, does that =
mean we should make SHA-512 at least a SHOULD here?<br><br><b>Take 2 =
status: &nbsp;</b>I have added SHA-512 to the list of SHOULDs because it =
vaguely matches what is used by EdDSA 25519.&nbsp; It is not really =
needed as EdDSA 25519 is targeted as the 128-bit level which is what =
SHA-256 supports but an implementation of EdDSA 25519 is probably going =
to have it available.<o:p></o:p></span></div></div></blockquote><div =
style=3D"font-family: Helvetica; font-size: 12px; font-style: normal; =
font-variant: normal; font-weight: normal; letter-spacing: normal; =
line-height: normal; orphans: auto; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; widows: auto; word-spacing: =
0px; -webkit-text-stroke-width: 0px;"><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><o:p>&nbsp;</o:p></div></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif; =
font-style: normal; font-variant: normal; font-weight: normal; =
letter-spacing: normal; line-height: normal; orphans: auto; text-align: =
start; text-indent: 0px; text-transform: none; white-space: normal; =
widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px;">I =
think that&nbsp;EdDSA25519 and SHA-512 should both be SHOULD algorithms. =
&nbsp;Your other message has&nbsp;EdDSA25519 at the MUST level, and I =
suggested moving it to the SHOULD level to make these =
match.<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif; font-style: =
normal; font-variant: normal; font-weight: normal; letter-spacing: =
normal; line-height: normal; orphans: auto; text-align: start; =
text-indent: 0px; text-transform: none; white-space: normal; widows: =
auto; word-spacing: 0px; -webkit-text-stroke-width: 0px;"><span =
style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&nbsp;</span></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif; font-style: =
normal; font-variant: normal; font-weight: normal; letter-spacing: =
normal; line-height: normal; orphans: auto; text-align: start; =
text-indent: 0px; text-transform: none; white-space: normal; widows: =
auto; word-spacing: 0px; -webkit-text-stroke-width: 0px;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">[JLS] It is =
not clear to me that there is an advantage from a security impedance =
matching to say that one needs to use SHA-512 with =
EdDSA25519.&nbsp;&nbsp; As I said above, SHA-256 matches up just fine =
with EdDSA25519.&nbsp; The story would be different if we had required =
support for EdDSA448.&nbsp;&nbsp; Do you have a different =
understanding?&nbsp; Is there a reasoning to making these two items =
match?</span></div></div></blockquote></div><br><div>My reading of =
section 5.1 of draft-irtf-cfrg-eddsa-06 is that SHA-512 is mandated. =
&nbsp;It is fully baked into the algorithm description. &nbsp;For this =
reason, not the security impedance match, I think that both EdDSA25519 =
and SHA-512 ought to be SHOULD algorithms (or they could both be MUST =
algorithms). &nbsp;Your recent proposal had one as a SHOULD and the =
other as a =
MUST.</div><div><br></div><div>Russ</div><div><br></div></body></html>=

--Apple-Mail=_E54BA142-FC28-48B0-8A70-9ED92BBE5B71--


From nobody Wed Aug 17 13:10:38 2016
Return-Path: <housley@vigilsec.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E854412D5A2 for <spasm@ietfa.amsl.com>; Wed, 17 Aug 2016 13:10:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.899
X-Spam-Level: 
X-Spam-Status: No, score=-101.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, USER_IN_WHITELIST=-100] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id V3_bfKMTzO2W for <spasm@ietfa.amsl.com>; Wed, 17 Aug 2016 13:10:35 -0700 (PDT)
Received: from mail.smeinc.net (mail.smeinc.net [209.135.209.11]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B7EF112D594 for <spasm@ietf.org>; Wed, 17 Aug 2016 13:10:35 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mail.smeinc.net (Postfix) with ESMTP id BD8573005AE for <spasm@ietf.org>; Wed, 17 Aug 2016 16:10:33 -0400 (EDT)
X-Virus-Scanned: amavisd-new at mail.smeinc.net
Received: from mail.smeinc.net ([127.0.0.1]) by localhost (mail.smeinc.net [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id LV-ZVkE_YPD1 for <spasm@ietf.org>; Wed, 17 Aug 2016 16:10:32 -0400 (EDT)
Received: from [192.168.2.100] (pool-108-51-128-219.washdc.fios.verizon.net [108.51.128.219]) by mail.smeinc.net (Postfix) with ESMTPSA id 625FF3004CA; Wed, 17 Aug 2016 16:10:32 -0400 (EDT)
Content-Type: multipart/alternative; boundary="Apple-Mail=_CB494400-ACD4-4473-8D2A-6FAB9E074FA2"
Mime-Version: 1.0 (Mac OS X Mail 7.3 \(1878.6\))
From: Russ Housley <housley@vigilsec.com>
In-Reply-To: <062901d1f81f$be5e70f0$3b1b52d0$@augustcellars.com>
Date: Wed, 17 Aug 2016 16:10:45 -0400
Message-Id: <A3CA1DA2-2F1D-4427-837A-30A641FC7E33@vigilsec.com>
References: <05da01d1f803$a0d885f0$e28991d0$@augustcellars.com> <8849812E-0338-4A33-A6F9-E2627AAF3AB4@vigilsec.com> <062901d1f81f$be5e70f0$3b1b52d0$@augustcellars.com>
To: Jim Schaad <ietf@augustcellars.com>
X-Mailer: Apple Mail (2.1878.6)
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/ManPILCQ4yPOIw5vRtcCbxgZ4O8>
Cc: SPASM <spasm@ietf.org>
Subject: Re: [Spasm] Change of Algorithms: Take 3
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Aug 2016 20:10:37 -0000

--Apple-Mail=_CB494400-ACD4-4473-8D2A-6FAB9E074FA2
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=windows-1252

Jim:

> MUST: ECDSA P-256 w/ SHA-256
> MUST-: RSA w/ SHA-256
> SHOULD+: RSA-PSS w/ SHA-256, EdDSA25519
> SHOULD: ECDSA P-384 w/SHA-384
> =20
> [JLS] Privileging ECDSA over EdDSA is almost surely going to lead to =
some pushback among some communities as they see the NIST curves as =
being anathema since they do not have the desired property of =
transparency.  What would be the argument that you would put forward to =
calm the waters over this?

I would like to see RSA-PSS w/ SHA-256 and EdDSA25519 at the MUST level, =
but I do not see enough implementation to support either of them at that =
level.  Frankly, RSA w/ SHA-256 enjoys much greater deployment than all =
of the rest.  However, it is time to signal that we need to move to the =
others.  Right now, ECDSA P-256 w/ SHA-256 enjoys greater deployment =
than either RSA-PSS w/ SHA-256 or EdDSA25519.  I expect TL 1.3 =
deployment to improve the deployment situation for all of these, but we =
are not seeing those impacts yet.

> [JLS] Do we really see RSA-PSS as being pushed to a MUST at that =
point?  The world seems to be rushing headlong into the world of EC and =
leaving RSA behind.  I don=92t see a good reason to keep it at SHOULD+ =
unless we think this would become the standard going forward.  It makes =
more sense to me for it to be either MUST, because we think that it will =
be used a lot, or SHOULD, because RSA is now somewhat in the slow lane.  =
 The only reason that I know to support RSA is quantum support.  Today =
it is believed that RSA is more resistant to quantum cryptography =
breakages.

TLS 1.3 is going to require RSA-PSS for the signature on the Finished =
message.  So, as I said above, I expect TL 1.3 deployment to improve the =
deployment situation for RSA-PSS.  Further, as you know, most existing =
RSA certificates can be used with RSA-PSS.

Russ


--Apple-Mail=_CB494400-ACD4-4473-8D2A-6FAB9E074FA2
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=windows-1252

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Dwindows-1252"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: =
after-white-space;">Jim:<br><div><br =
class=3D"Apple-interchange-newline"><blockquote type=3D"cite"><div =
style=3D"font-family: Helvetica; font-size: 12px; font-style: normal; =
font-variant: normal; font-weight: normal; letter-spacing: normal; =
line-height: normal; orphans: auto; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; widows: auto; word-spacing: =
0px; -webkit-text-stroke-width: 0px;"><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 12pt;">MUST: ECDSA P-256 w/ =
SHA-256</span></div></div><div style=3D"font-family: Helvetica; =
font-size: 12px; font-style: normal; font-variant: normal; font-weight: =
normal; letter-spacing: normal; line-height: normal; orphans: auto; =
text-align: start; text-indent: 0px; text-transform: none; white-space: =
normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: =
0px;"><div><div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif;"><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;">MUST-: RSA w/ =
SHA-256<o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;">SHOULD+: RSA-PSS w/ SHA-256, =
EdDSA25519<o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;">SHOULD: ECDSA P-384 w/SHA-384<o:p></o:p></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&nbsp;</span></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">[JLS] =
Privileging ECDSA over EdDSA is almost surely going to lead to some =
pushback among some communities as they see the NIST curves as being =
anathema since they do not have the desired property of =
transparency.&nbsp; What would be the argument that you would put =
forward to calm the waters over =
this?</span></div></div></div></blockquote><div><br></div><div>I would =
like to see&nbsp;RSA-PSS w/ SHA-256 and EdDSA25519 at the MUST level, =
but I do not see enough implementation to support either of them at that =
level. &nbsp;Frankly, RSA w/ SHA-256 enjoys much greater deployment than =
all of the rest. &nbsp;However, it is time to signal that we need to =
move to the others. &nbsp;Right now, ECDSA P-256 w/ SHA-256 enjoys =
greater deployment than either RSA-PSS w/ SHA-256 or EdDSA25519. &nbsp;I =
expect TL 1.3 deployment to improve the deployment situation for all of =
these, but we are not seeing those impacts yet.</div><br><blockquote =
type=3D"cite"><div style=3D"font-family: Helvetica; font-size: 12px; =
font-style: normal; font-variant: normal; font-weight: normal; =
letter-spacing: normal; line-height: normal; orphans: auto; text-align: =
start; text-indent: 0px; text-transform: none; white-space: normal; =
widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px;"><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;"><o:p></o:p></span></div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-family: Calibri, sans-serif; font-size: =
11pt;">[JLS] Do we really see RSA-PSS as being pushed to a MUST at that =
point?&nbsp; The world seems to be rushing headlong into the world of EC =
and leaving RSA behind.&nbsp; I don=92t see a good reason to keep it at =
SHOULD+ unless we think this would become the standard going =
forward.&nbsp; It makes more sense to me for it to be either MUST, =
because we think that it will be used a lot, or SHOULD, because RSA is =
now somewhat in the slow lane.&nbsp;&nbsp; The only reason that I know =
to support RSA is quantum support.&nbsp; Today it is believed that RSA =
is more resistant to quantum cryptography =
breakages.</span></div></div></blockquote></div><br><div>TLS 1.3 is =
going to require RSA-PSS for the signature on the Finished message. =
&nbsp;So, as I said above, I expect TL 1.3 deployment to improve the =
deployment situation for RSA-PSS. &nbsp;Further, as you know, most =
existing RSA certificates can be used with =
RSA-PSS.</div><div><br></div><div>Russ</div><div><br></div></body></html>=

--Apple-Mail=_CB494400-ACD4-4473-8D2A-6FAB9E074FA2--


From nobody Mon Aug 22 21:31:59 2016
Return-Path: <ietf@augustcellars.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4761F12D0B6 for <spasm@ietfa.amsl.com>; Mon, 22 Aug 2016 21:31:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.449
X-Spam-Level: 
X-Spam-Status: No, score=-2.449 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.548, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id p8ZLSuoQCWIK for <spasm@ietfa.amsl.com>; Mon, 22 Aug 2016 21:31:56 -0700 (PDT)
Received: from mail2.augustcellars.com (augustcellars.com [50.45.239.150]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C65D612D7E3 for <spasm@ietf.org>; Mon, 22 Aug 2016 21:31:55 -0700 (PDT)
Received: from hebrews (24.21.96.37) by mail2.augustcellars.com (192.168.0.56) with Microsoft SMTP Server (TLS) id 15.0.1178.4; Mon, 22 Aug 2016 21:44:09 -0700
From: Jim Schaad <ietf@augustcellars.com>
To: 'SPASM' <spasm@ietf.org>
Date: Mon, 22 Aug 2016 21:31:51 -0700
Message-ID: <01c401d1fcf7$4633da20$d29b8e60$@augustcellars.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AdH89JrIj2HC7PffQ2uezOBS2H7zcA==
Content-Language: en-us
X-Originating-IP: [24.21.96.37]
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/rrv0ad_954eSSNQ_zrvOsR-YJLk>
Subject: [Spasm] Change of Algorithms: Key Management Algorithms
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 23 Aug 2016 04:31:57 -0000

This message looks at Key Management Algorithms.  Please restrict your
discussions to this set of algorithms, I will be sending out messages on
other algorithms over time.

Current Document for S/MIME 3.1

MUST: RSA Encryption
MUST: AES-128 Key Wrap
SHOULD+: RSAES-OAEP
SHOULD-: ECDH-ES w/ DH

Key Sizes:
RSA and DH - Encrypt
SHOULD NOT          key <= 1023
SHOULD           1024 <= key <= 2048
MAY                  2048 < size

RSA and DH - Decryption
MAY                     key <= 1023
MUST    1024 <= key < 2048
MAY       2048 < key

Proposed for S/MIME 3.5

MUST:   ECDH-ES w/ P-256, ECDH-ES w/ X25519
MUST: AES-128 KW, AES-256 KW (Language - must match key size of CEK
algorithm and KW algorithm)
MUST-:  RSA Encryption
SHOULD+: RSAES-OAEP
Historic: ECDH-ES w/ DH

Sizes:
RSA - Encrypt and Decrypt
Historic       key size < 2048
MUST       2048 <= key size <= 4096   ( if RSA supported)
MAY       4098 < key size

Reasoning:
Assuming that the world is currently headed in the ECDH world rather than
RSA-OAEP.
Assume that there is enough not NIST sediment that both key types are
needed.

Questions:

At this time, I have no specific questions.

Jim




From nobody Tue Aug 23 08:19:03 2016
Return-Path: <housley@vigilsec.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 258FF12D193 for <spasm@ietfa.amsl.com>; Tue, 23 Aug 2016 08:19:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.9
X-Spam-Level: 
X-Spam-Status: No, score=-101.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, USER_IN_WHITELIST=-100] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nCyj_8u4QY_m for <spasm@ietfa.amsl.com>; Tue, 23 Aug 2016 08:18:57 -0700 (PDT)
Received: from mail.smeinc.net (mail.smeinc.net [209.135.209.11]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A50ED12DBDC for <spasm@ietf.org>; Tue, 23 Aug 2016 07:51:41 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mail.smeinc.net (Postfix) with ESMTP id 6A2A23005CA for <spasm@ietf.org>; Tue, 23 Aug 2016 10:51:39 -0400 (EDT)
X-Virus-Scanned: amavisd-new at mail.smeinc.net
Received: from mail.smeinc.net ([127.0.0.1]) by localhost (mail.smeinc.net [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id 1fnvU7erZjV6 for <spasm@ietf.org>; Tue, 23 Aug 2016 10:51:38 -0400 (EDT)
Received: from [192.168.2.100] (pool-108-51-128-219.washdc.fios.verizon.net [108.51.128.219]) by mail.smeinc.net (Postfix) with ESMTPSA id 155A930050E; Tue, 23 Aug 2016 10:51:37 -0400 (EDT)
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 7.3 \(1878.6\))
From: Russ Housley <housley@vigilsec.com>
In-Reply-To: <01c401d1fcf7$4633da20$d29b8e60$@augustcellars.com>
Date: Tue, 23 Aug 2016 10:51:39 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <AE50965B-9983-4AA5-B3E0-E58321D966FF@vigilsec.com>
References: <01c401d1fcf7$4633da20$d29b8e60$@augustcellars.com>
To: Jim Schaad <ietf@augustcellars.com>
X-Mailer: Apple Mail (2.1878.6)
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/IMrUXMYzfNgH2oAJDRFJ30emN7g>
Cc: SPASM <spasm@ietf.org>
Subject: Re: [Spasm] Change of Algorithms: Key Management Algorithms
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 23 Aug 2016 15:19:02 -0000

Jim:

> This message looks at Key Management Algorithms.  Please restrict your
> discussions to this set of algorithms, I will be sending out messages =
on
> other algorithms over time.

I appreciate the desire to divide and conquer.  However, I think the new =
CFRG curves should appear at the same level across all of the =
algorithms.

So, if X25519 is a MUST for key management, then EdDSA with the same =
curve should also be a MUST.

On the other hand, if X25519 is a SHOULD+ for key management, then EdDSA =
with the same curve should also be a SHOULD+.

Russ=


From nobody Tue Aug 23 08:51:09 2016
Return-Path: <housley@vigilsec.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2C85512B03F for <spasm@ietfa.amsl.com>; Tue, 23 Aug 2016 08:51:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.9
X-Spam-Level: 
X-Spam-Status: No, score=-101.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, USER_IN_WHITELIST=-100] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mkUtrhF_tvEZ for <spasm@ietfa.amsl.com>; Tue, 23 Aug 2016 08:51:06 -0700 (PDT)
Received: from mail.smeinc.net (mail.smeinc.net [209.135.209.11]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C1CA712D0F7 for <spasm@ietf.org>; Tue, 23 Aug 2016 08:51:05 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mail.smeinc.net (Postfix) with ESMTP id C664A3005AC for <spasm@ietf.org>; Tue, 23 Aug 2016 11:51:03 -0400 (EDT)
X-Virus-Scanned: amavisd-new at mail.smeinc.net
Received: from mail.smeinc.net ([127.0.0.1]) by localhost (mail.smeinc.net [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id IiU_EBFQJcUi for <spasm@ietf.org>; Tue, 23 Aug 2016 11:51:02 -0400 (EDT)
Received: from [192.168.2.100] (pool-108-51-128-219.washdc.fios.verizon.net [108.51.128.219]) by mail.smeinc.net (Postfix) with ESMTPSA id B1FA73002C2 for <spasm@ietf.org>; Tue, 23 Aug 2016 11:51:02 -0400 (EDT)
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 7.3 \(1878.6\))
From: Russ Housley <housley@vigilsec.com>
In-Reply-To: <00a701d1e42c$89112070$9b336150$@augustcellars.com>
Date: Tue, 23 Aug 2016 11:48:57 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <47CCE396-2613-4152-A8AF-9C577FB2D914@vigilsec.com>
References: <20160722134707.12260.17545.idtracker@ietfa.amsl.com> <00a701d1e42c$89112070$9b336150$@augustcellars.com>
To: SPASM <spasm@ietf.org>
X-Mailer: Apple Mail (2.1878.6)
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/jLfi5iqt40QM21hKVfYaQu_91zU>
Subject: Re: [Spasm] New Version Notification for draft-schaad-lamps-rfc5750-bis-00.txt
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 23 Aug 2016 15:51:08 -0000

Several people have spoken for adoption, and no one has spoken against =
adoption.  Jim, please post draft-ietf-lamps-rfc5750-bis-00 when th next =
version is ready to go.

Russ



On Jul 22, 2016, at 11:20 AM, Jim Schaad <ietf@augustcellars.com> wrote:

> Since Russ is going to be a stickler for details, here is a candidate =
draft for updating RFC 5750.
>=20
> Jim
>=20
>=20
>> -----Original Message-----
>> From: internet-drafts@ietf.org [mailto:internet-drafts@ietf.org]
>> Sent: Friday, July 22, 2016 3:47 PM
>> To: Blake Ramsdell <blaker@gmail.com>; Sean Turner <sean@sn3rd.com>;
>> Blake C. Ramsdell <blaker@gmail.com>; Jim Schaad =
<ietf@augustcellars.com>
>> Subject: New Version Notification for =
draft-schaad-lamps-rfc5750-bis-00.txt
>>=20
>>=20
>> A new version of I-D, draft-schaad-lamps-rfc5750-bis-00.txt
>> has been successfully submitted by Jim Schaad and posted to the IETF
>> repository.
>>=20
>> Name:		draft-schaad-lamps-rfc5750-bis
>> Revision:	00
>> Title:		Secure/Multipurpose Internet Mail Extensions (S/ =
MIME)
>> Version 3.2 Certificate Handling
>> Document date:	2016-07-22
>> Group:		Individual Submission
>> Pages:		21
>> URL:            =
https://www.ietf.org/internet-drafts/draft-schaad-lamps-rfc5750-
>> bis-00.txt
>> Status:         =
https://datatracker.ietf.org/doc/draft-schaad-lamps-rfc5750-bis/
>> Htmlized:       =
https://tools.ietf.org/html/draft-schaad-lamps-rfc5750-bis-00
>>=20
>>=20
>> Abstract:
>>   This document specifies conventions for X.509 certificate usage by
>>   Secure/Multipurpose Internet Mail Extensions (S/MIME) v3.2 agents.
>>   S/MIME provides a method to send and receive secure MIME messages,
>>   and certificates are an integral part of S/MIME agent processing.
>>   S/MIME agents validate certificates as described in RFC 5280, the
>>   Internet X.509 Public Key Infrastructure Certificate and CRL =
Profile.
>>   S/MIME agents must meet the certificate processing requirements in
>>   this document as well as those in RFC 5280.  This document =
obsoletes
>>   RFC 3850.
>>=20
>>=20
>>=20
>>=20
>> Please note that it may take a couple of minutes from the time of =
submission
>> until the htmlized version and diff are available at tools.ietf.org.
>>=20
>> The IETF Secretariat
>=20
>=20
> _______________________________________________
> Spasm mailing list
> Spasm@ietf.org
> https://www.ietf.org/mailman/listinfo/spasm


From nobody Tue Aug 23 17:47:24 2016
Return-Path: <sean@sn3rd.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 62B5012D5A4 for <spasm@ietfa.amsl.com>; Tue, 23 Aug 2016 17:47:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.701
X-Spam-Level: 
X-Spam-Status: No, score=-2.701 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=sn3rd.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Racc4zvSv4mH for <spasm@ietfa.amsl.com>; Tue, 23 Aug 2016 17:47:22 -0700 (PDT)
Received: from mail-qk0-x22d.google.com (mail-qk0-x22d.google.com [IPv6:2607:f8b0:400d:c09::22d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 650B412D12E for <spasm@ietf.org>; Tue, 23 Aug 2016 17:47:22 -0700 (PDT)
Received: by mail-qk0-x22d.google.com with SMTP id t7so1414461qkh.1 for <spasm@ietf.org>; Tue, 23 Aug 2016 17:47:22 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sn3rd.com; s=google; h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=fDt/QU8jVkYcMWcXn87j+7eXL9Jr06g2rWxhgnf6uF8=; b=lOV0yw1jjYGC6EgX8Spaj8MuRsb4O+iPevrR8HfUkeTnuhucDaq1ufL4GkQ2lfWrIR wfq1fuM7aA51YfNnDgrGItTyL+f+v7EHP+gWWb8xEfdk7+EDmo1P9f0kpUwLgQSm8HFb 9veOBXpO3he/nI5ECoInRQdo/5pskFsPXinlI=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=fDt/QU8jVkYcMWcXn87j+7eXL9Jr06g2rWxhgnf6uF8=; b=Cdw6Y7+AXqPhUByKUR67jQ3tF5vsVcE0Sqlmi/ME3YX9ATelBzJuaFXcEZira6GU79 9mS2z+Mey1iV3ifual0kWJf4MFIprA55RFpOR8EDvMv82MK4zqv+0/7lOQleJ6k2MPg4 VSEUk/AFuEIvh2X/EAZ5RRcADmp0zV75c9iQEIF7EdunUff70NjZpuMpKd4rdjx+GvPU U8eiRI7to26O7YiRbNzQ+gvElaFPjTczAaFx7A8F7k886FNRFCyl9BQEWStc+ogwj5eI hxA7zlqiW8CkcIFaOEl0HE97vKyLYjBKj1ryRAfm2Jvky1nQuW9uLgUA2hZJUyTt7oOg hffw==
X-Gm-Message-State: AE9vXwN6c5TeaELoTs9XCXEXBc5UZDOdZzM3CzxvSH8OYdsI13fJWOkzBy412EAIeBx3HA==
X-Received: by 10.55.165.138 with SMTP id o132mr313530qke.90.1471999641576; Tue, 23 Aug 2016 17:47:21 -0700 (PDT)
Received: from [172.16.0.112] (pool-173-73-120-170.washdc.east.verizon.net. [173.73.120.170]) by smtp.gmail.com with ESMTPSA id r10sm3267403qtc.5.2016.08.23.17.47.20 (version=TLS1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Tue, 23 Aug 2016 17:47:20 -0700 (PDT)
Content-Type: text/plain; charset=windows-1252
Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\))
From: Sean Turner <sean@sn3rd.com>
In-Reply-To: <A3CA1DA2-2F1D-4427-837A-30A641FC7E33@vigilsec.com>
Date: Tue, 23 Aug 2016 20:47:18 -0400
Content-Transfer-Encoding: 7bit
Message-Id: <8DD7493C-7E2F-45B5-81D4-400261A3770E@sn3rd.com>
References: <05da01d1f803$a0d885f0$e28991d0$@augustcellars.com> <8849812E-0338-4A33-A6F9-E2627AAF3AB4@vigilsec.com> <062901d1f81f$be5e70f0$3b1b52d0$@augustcellars.com> <A3CA1DA2-2F1D-4427-837A-30A641FC7E33@vigilsec.com>
To: Jim Schaad <ietf@augustcellars.com>
X-Mailer: Apple Mail (2.3124)
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/DCp6jAjKbfZ3r4IoTPTCCkWsVvM>
Cc: SPASM <spasm@ietf.org>
Subject: Re: [Spasm] Change of Algorithms: Take 3
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 24 Aug 2016 00:47:23 -0000

> On Aug 17, 2016, at 16:10, Russ Housley <housley@vigilsec.com> wrote:
> 
>> MUST: ECDSA P-256 w/ SHA-256
>> MUST-: RSA w/ SHA-256
>> SHOULD+: RSA-PSS w/ SHA-256, EdDSA25519
>> SHOULD: ECDSA P-384 w/SHA-384

I can live with this.

spt


From nobody Tue Aug 23 18:02:15 2016
Return-Path: <sean@sn3rd.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8EE3312D635 for <spasm@ietfa.amsl.com>; Tue, 23 Aug 2016 18:02:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.701
X-Spam-Level: 
X-Spam-Status: No, score=-2.701 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=sn3rd.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3-tbEjShiCN3 for <spasm@ietfa.amsl.com>; Tue, 23 Aug 2016 18:02:12 -0700 (PDT)
Received: from mail-qk0-x22c.google.com (mail-qk0-x22c.google.com [IPv6:2607:f8b0:400d:c09::22c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 485A212D5A4 for <spasm@ietf.org>; Tue, 23 Aug 2016 18:02:12 -0700 (PDT)
Received: by mail-qk0-x22c.google.com with SMTP id v123so1625970qkh.2 for <spasm@ietf.org>; Tue, 23 Aug 2016 18:02:12 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sn3rd.com; s=google; h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=m7Cs9Q4kMiX8mDd94XaK2Vf2F+IOWu3QN2HlXLbRf8A=; b=mOwQtcYwh1LxEHMeAJyX9TPhs9eU5MnhdgQhzdUkDhEvQWcus0RAgxgmbF36CLaRGX 4r2MKHCpafAVrl3GMwkbKLcKw26QYcYKwKOafJL3g1zxWr2t/CVwV+2AQjOoUChkgRf1 TCJwRKzmuLL7MLs8bSFpvbyfJDOppDWisRWtY=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=m7Cs9Q4kMiX8mDd94XaK2Vf2F+IOWu3QN2HlXLbRf8A=; b=GtMqSwpnItP6z/ppkWrJaex64lKz5F9r1bAELIfcoghdxFuwEQ/u1BgsEfZYS/R0Aw Il0Z0fywvp5S1cRpJGVM5Gvf1qx9AUNbDVWz+ARH7b8NP7kA0NN/HYg1dqQkqbbE97xr bsZZ1SzP3YqeEi5wXwKG3IwnfjeR3wokGCatBmpfgNyKPZj0c4jQt2ICcUuQmbKIBR96 3ItzS16R39/CJUw3Ka9SUB2KNx3YF68dKZ2wCfOpPJeAIyHkXkgS+tPzfK838PIM4iVB Z6cnWV2elX8dJy93zBdmNh/HvlQa1/x309UU3oe6ch+jx0xTVUqsdO/RRunQJnngrTSu npoQ==
X-Gm-Message-State: AE9vXwPUdP6KBa2t5NJvuso/2fjstc+BwE/duVsTdrYj2hncfiPG2ebF8oj3su/FPegTuw==
X-Received: by 10.55.148.193 with SMTP id w184mr300869qkd.181.1472000531437; Tue, 23 Aug 2016 18:02:11 -0700 (PDT)
Received: from [172.16.0.112] (pool-173-73-120-170.washdc.east.verizon.net. [173.73.120.170]) by smtp.gmail.com with ESMTPSA id o5sm3294008qko.12.2016.08.23.18.02.10 (version=TLS1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Tue, 23 Aug 2016 18:02:10 -0700 (PDT)
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\))
From: Sean Turner <sean@sn3rd.com>
In-Reply-To: <01c401d1fcf7$4633da20$d29b8e60$@augustcellars.com>
Date: Tue, 23 Aug 2016 21:02:08 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <74445045-9C3B-4E13-A767-B1E04CF0646A@sn3rd.com>
References: <01c401d1fcf7$4633da20$d29b8e60$@augustcellars.com>
To: Jim Schaad <ietf@augustcellars.com>
X-Mailer: Apple Mail (2.3124)
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/BjGsZ1-INRrpSzByX5fUY3slfAQ>
Cc: SPASM <spasm@ietf.org>
Subject: Re: [Spasm] Change of Algorithms: Key Management Algorithms
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 24 Aug 2016 01:02:13 -0000

> On Aug 23, 2016, at 00:31, Jim Schaad <ietf@augustcellars.com> wrote:
>=20
> SHOULD+: RSAES-OAEP
>=20
> Reasoning:
> Assuming that the world is currently headed in the ECDH world rather =
than
> RSA-OAEP.

If we=E2=80=99re thinking folks are moving towards ECDH-ES (w/ either =
X25519 or P-256) shouldn=E2=80=99t we be making RSAES-OAEP a SHOULD-? I =
mean are really thinking that it=E2=80=99ll be =E2=80=9Cpromoted=E2=80=9D =
to a MUST?

spt


From nobody Tue Aug 23 19:59:25 2016
Return-Path: <ietf@augustcellars.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 43DC012D5FB for <spasm@ietfa.amsl.com>; Tue, 23 Aug 2016 19:59:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.449
X-Spam-Level: 
X-Spam-Status: No, score=-2.449 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.548, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id X6vBW34V6rmd for <spasm@ietfa.amsl.com>; Tue, 23 Aug 2016 19:59:24 -0700 (PDT)
Received: from mail2.augustcellars.com (augustcellars.com [50.45.239.150]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2C0CF12D10C for <spasm@ietf.org>; Tue, 23 Aug 2016 19:59:24 -0700 (PDT)
Received: from hebrews (24.21.96.37) by mail2.augustcellars.com (192.168.0.56) with Microsoft SMTP Server (TLS) id 15.0.1178.4; Tue, 23 Aug 2016 20:11:09 -0700
From: Jim Schaad <ietf@augustcellars.com>
To: 'Russ Housley' <housley@vigilsec.com>
References: <01c401d1fcf7$4633da20$d29b8e60$@augustcellars.com> <AE50965B-9983-4AA5-B3E0-E58321D966FF@vigilsec.com>
In-Reply-To: <AE50965B-9983-4AA5-B3E0-E58321D966FF@vigilsec.com>
Date: Tue, 23 Aug 2016 19:58:51 -0700
Message-ID: <030b01d1fdb3$734eea60$59ecbf20$@augustcellars.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQI/fsd1GEnfLFMO3Eor1tj2EL8RVAH2j+Ymn2y0niA=
Content-Language: en-us
X-Originating-IP: [24.21.96.37]
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/9SRrJ0gCxvcxTiM0Qo7RKUPHddg>
Cc: 'SPASM' <spasm@ietf.org>
Subject: Re: [Spasm] Change of Algorithms: Key Management Algorithms
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 24 Aug 2016 02:59:25 -0000

This corresponds to what is currently in my document for signature
algorithms - 

MUST support EdDSA  25519.

Jim


> -----Original Message-----
> From: Russ Housley [mailto:housley@vigilsec.com]
> Sent: Tuesday, August 23, 2016 7:52 AM
> To: Jim Schaad <ietf@augustcellars.com>
> Cc: SPASM <spasm@ietf.org>
> Subject: Re: [Spasm] Change of Algorithms: Key Management Algorithms
> 
> Jim:
> 
> > This message looks at Key Management Algorithms.  Please restrict your
> > discussions to this set of algorithms, I will be sending out messages
> > on other algorithms over time.
> 
> I appreciate the desire to divide and conquer.  However, I think the new
CFRG
> curves should appear at the same level across all of the algorithms.
> 
> So, if X25519 is a MUST for key management, then EdDSA with the same curve
> should also be a MUST.
> 
> On the other hand, if X25519 is a SHOULD+ for key management, then EdDSA
> with the same curve should also be a SHOULD+.
> 
> Russ=


From nobody Thu Aug 25 15:23:44 2016
Return-Path: <ietf@augustcellars.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7A85212D647 for <spasm@ietfa.amsl.com>; Thu, 25 Aug 2016 15:23:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.448
X-Spam-Level: 
X-Spam-Status: No, score=-2.448 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RP_MATCHES_RCVD=-0.548, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Bd4RsPHTQd8g for <spasm@ietfa.amsl.com>; Thu, 25 Aug 2016 15:23:41 -0700 (PDT)
Received: from mail2.augustcellars.com (augustcellars.com [50.45.239.150]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8D83012D13B for <spasm@ietf.org>; Thu, 25 Aug 2016 15:23:40 -0700 (PDT)
Received: from hebrews (192.168.1.152) by mail2.augustcellars.com (192.168.1.201) with Microsoft SMTP Server (TLS) id 15.0.1178.4; Thu, 25 Aug 2016 15:35:32 -0700
From: Jim Schaad <ietf@augustcellars.com>
To: 'Russ Housley' <housley@vigilsec.com>
References: <05da01d1f803$a0d885f0$e28991d0$@augustcellars.com> <8849812E-0338-4A33-A6F9-E2627AAF3AB4@vigilsec.com> <062901d1f81f$be5e70f0$3b1b52d0$@augustcellars.com> <A3CA1DA2-2F1D-4427-837A-30A641FC7E33@vigilsec.com>
In-Reply-To: <A3CA1DA2-2F1D-4427-837A-30A641FC7E33@vigilsec.com>
Date: Thu, 25 Aug 2016 15:23:14 -0700
Message-ID: <079a01d1ff1f$473b4230$d5b1c690$@augustcellars.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_079B_01D1FEE4.9ADF9E80"
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQFqf6LeWjM2uSNf0fCQLOEbNhx7IgIgVBhCA44bSe4B463hJaDrSErQ
Content-Language: en-us
X-Originating-IP: [192.168.1.152]
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/2s68ht3U6NLLf-TbWvpV_nhGfoM>
Cc: 'SPASM' <spasm@ietf.org>
Subject: Re: [Spasm] Change of Algorithms: Take 3
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 25 Aug 2016 22:23:43 -0000

------=_NextPart_000_079B_01D1FEE4.9ADF9E80
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit

Russ,

 

I agree with you that the most common of the signing algorithms that we are
looking at is RSA w/SHA-256.  Sometimes I wished that I could just have a
full domain hash of RSA and go forward from there.  The amount of pushback
that I get from efforts to remove RSA v1.5 is tiring.

 

There are times when I feel MUST statements need to be aspirational as well
as practical.  For this reason, I am willing to look at what I would feel is
the paths going forward as well as what is currently done.  I believe that
there is a great deal of support that is either currently in existence or
will shortly be in existence for EdDSA25519.  Today EdDSA25519 is in
BouncyCastle and X25519 is in the next release of OpenSSL and I expect that
EdDSA25519 will in included as well (they are in need of the curdle draft).
I am sure that it is going into the crypto libraries for Mozilla and Google
due to its inclusion in the TLS 1.3 specifications.  I would be surprised if
they are not setup to use it today in testing.  I have also found it in one
embedded cryptographic package that I am working with.  I am not sure how
fast Microsoft and Apple are going to pick these up, but I would not be
surprised if Google tries to get and pushes EdDSA in all of its websites
pushing this for quicker adoption. 

 

The slow point is going to be getting CAs to accept it as an algorithm, but
I believe that having pressure from Firefox and Chrome is going to make this
something relatively quickly accepted.  On the other half of this is the
question of how fast people are going to update and roll out any updates to
S/MIME.  I would expect this to be on the order of a couple of years before
a reasonable amount of roll out is done.  By then the world will not look
the same as it is today.

 

One of the ways that I can think of to make sure that one segment of people
decide that they do not want to move from PGP to S/MIME is to stay with the
NIST algorithms as the core EC curves.  I do not believe that there are any
problems with them, but there is a not insignificant group of people who are
more than willing to make the claim that there might be.  Putting both
curves on a par means both that people are going to use the EC algorithms
and that they will be able to use the one of their choice.   I think this
would be good news for Microsoft.  There is also the question of how long do
you think it is going to take for NIST to bless EdDSA25519 and X25519.
Since these are generally thought of as being both faster and less likely to
have timing leaks (maybe true, maybe not) there will be people who perceive
them as being better even if they do not believe that the current NIST
curves are tainted.

 

Given politics, I believe that 25519 is going to win long term over P-256.
I don't want to go through this process again in 3-5 years to deal with
that.  Making both EC curves musts means that we don't need to.

 

The only reason that I see RSA-PSS winning is if we have a quantum computing
problem.  If it was not for that I would make this a SHOULD algorithm and
promptly forget about it.  People who use RSA are most likely to stay with
1.5 because it is what they currently have and until we do another update at
some future point not going to go away.  Again, I am not sure that an update
is a likely event given the question of market support.

 

Based on the above, I am strongly in favor of keeping EdDSA25519 as a must
along with P256.

 

Jim

 

 

 

From: Spasm [mailto:spasm-bounces@ietf.org] On Behalf Of Russ Housley
Sent: Wednesday, August 17, 2016 1:11 PM
To: Jim Schaad <ietf@augustcellars.com>
Cc: SPASM <spasm@ietf.org>
Subject: Re: [Spasm] Change of Algorithms: Take 3

 

Jim:





MUST: ECDSA P-256 w/ SHA-256

MUST-: RSA w/ SHA-256

SHOULD+: RSA-PSS w/ SHA-256, EdDSA25519

SHOULD: ECDSA P-384 w/SHA-384

 

[JLS] Privileging ECDSA over EdDSA is almost surely going to lead to some
pushback among some communities as they see the NIST curves as being
anathema since they do not have the desired property of transparency.  What
would be the argument that you would put forward to calm the waters over
this?

 

I would like to see RSA-PSS w/ SHA-256 and EdDSA25519 at the MUST level, but
I do not see enough implementation to support either of them at that level.
Frankly, RSA w/ SHA-256 enjoys much greater deployment than all of the rest.
However, it is time to signal that we need to move to the others.  Right
now, ECDSA P-256 w/ SHA-256 enjoys greater deployment than either RSA-PSS w/
SHA-256 or EdDSA25519.  I expect TL 1.3 deployment to improve the deployment
situation for all of these, but we are not seeing those impacts yet.





[JLS] Do we really see RSA-PSS as being pushed to a MUST at that point?  The
world seems to be rushing headlong into the world of EC and leaving RSA
behind.  I don't see a good reason to keep it at SHOULD+ unless we think
this would become the standard going forward.  It makes more sense to me for
it to be either MUST, because we think that it will be used a lot, or
SHOULD, because RSA is now somewhat in the slow lane.   The only reason that
I know to support RSA is quantum support.  Today it is believed that RSA is
more resistant to quantum cryptography breakages.

 

TLS 1.3 is going to require RSA-PSS for the signature on the Finished
message.  So, as I said above, I expect TL 1.3 deployment to improve the
deployment situation for RSA-PSS.  Further, as you know, most existing RSA
certificates can be used with RSA-PSS.

 

Russ

 


------=_NextPart_000_079B_01D1FEE4.9ADF9E80
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" =
xmlns=3D"http://www.w3.org/TR/REC-html40"><head><meta =
http-equiv=3DContent-Type content=3D"text/html; =
charset=3Dus-ascii"><meta name=3DGenerator content=3D"Microsoft Word 15 =
(filtered medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman",serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:#0563C1;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:#954F72;
	text-decoration:underline;}
p.msonormal0, li.msonormal0, div.msonormal0
	{mso-style-name:msonormal;
	mso-margin-top-alt:auto;
	margin-right:0in;
	mso-margin-bottom-alt:auto;
	margin-left:0in;
	font-size:12.0pt;
	font-family:"Times New Roman",serif;}
span.EmailStyle18
	{mso-style-type:personal-reply;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US =
link=3D"#0563C1" vlink=3D"#954F72"><div class=3DWordSection1><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>Russ,<o:p></o=
:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'><o:p>&nbsp;</=
o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>I agree with =
you that the most common of the signing algorithms that we are looking =
at is RSA w/SHA-256. &nbsp;Sometimes I wished that I could just have a =
full domain hash of RSA and go forward from there.&nbsp; The amount of =
pushback that I get from efforts to remove RSA v1.5 is =
tiring.<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'><o:p>&nbsp;</=
o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>There are =
times when I feel MUST statements need to be aspirational as well as =
practical.&nbsp; For this reason, I am willing to look at what I would =
feel is the paths going forward as well as what is currently done.&nbsp; =
I believe that there is a great deal of support that is either currently =
in existence or will shortly be in existence for EdDSA25519.&nbsp; Today =
EdDSA25519 is in BouncyCastle and X25519 is in the next release of =
OpenSSL and I expect that EdDSA25519 will in included as well (they are =
in need of the curdle draft).&nbsp; I am sure that it is going into the =
crypto libraries for Mozilla and Google due to its inclusion in the TLS =
1.3 specifications.&nbsp; I would be surprised if they are not setup to =
use it today in testing.&nbsp; I have also found it in one embedded =
cryptographic package that I am working with.&nbsp; I am not sure how =
fast Microsoft and Apple are going to pick these up, but I would not be =
surprised if Google tries to get and pushes EdDSA in all of its websites =
pushing this for quicker adoption. <o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'><o:p>&nbsp;</=
o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>The slow =
point is going to be getting CAs to accept it as an algorithm, but I =
believe that having pressure from Firefox and Chrome is going to make =
this something relatively quickly accepted.&nbsp; On the other half of =
this is the question of how fast people are going to update and roll out =
any updates to S/MIME.&nbsp; I would expect this to be on the order of a =
couple of years before a reasonable amount of roll out is done.&nbsp; By =
then the world will not look the same as it is =
today.<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'><o:p>&nbsp;</=
o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>One of the =
ways that I can think of to make sure that one segment of people decide =
that they do not want to move from PGP to S/MIME is to stay with the =
NIST algorithms as the core EC curves.&nbsp; I do not believe that there =
are any problems with them, but there is a not insignificant group of =
people who are more than willing to make the claim that there might =
be.&nbsp; Putting both curves on a par means both that people are going =
to use the EC algorithms and that they will be able to use the one of =
their choice.&nbsp;&nbsp; I think this would be good news for =
Microsoft.&nbsp; There is also the question of how long do you think it =
is going to take for NIST to bless EdDSA25519 and X25519.&nbsp; Since =
these are generally thought of as being both faster and less likely to =
have timing leaks (maybe true, maybe not) there will be people who =
perceive them as being better even if they do not believe that the =
current NIST curves are tainted.<o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'><o:p>&nbsp;</=
o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>Given =
politics, I believe that 25519 is going to win long term over =
P-256.&nbsp; I don&#8217;t want to go through this process again in 3-5 =
years to deal with that.&nbsp; Making both EC curves musts means that we =
don&#8217;t need to.<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'><o:p>&nbsp;</=
o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>The only =
reason that I see RSA-PSS winning is if we have a quantum computing =
problem.&nbsp; If it was not for that I would make this a SHOULD =
algorithm and promptly forget about it.&nbsp; People who use RSA are =
most likely to stay with 1.5 because it is what they currently have and =
until we do another update at some future point not going to go =
away.&nbsp; Again, I am not sure that an update is a likely event given =
the question of market support.<o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'><o:p>&nbsp;</=
o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>Based on the =
above, I am strongly in favor of keeping EdDSA25519 as a must along with =
P256.<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'><o:p>&nbsp;</=
o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>Jim<o:p></o:p=
></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'><o:p>&nbsp;</=
o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'><o:p>&nbsp;</=
o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'><o:p>&nbsp;</=
o:p></span></p><div style=3D'border:none;border-left:solid blue =
1.5pt;padding:0in 0in 0in 4.0pt'><div><div =
style=3D'border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in'><p class=3DMsoNormal><b><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>From:</span><=
/b><span style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'> =
Spasm [mailto:spasm-bounces@ietf.org] <b>On Behalf Of </b>Russ =
Housley<br><b>Sent:</b> Wednesday, August 17, 2016 1:11 PM<br><b>To:</b> =
Jim Schaad &lt;ietf@augustcellars.com&gt;<br><b>Cc:</b> SPASM =
&lt;spasm@ietf.org&gt;<br><b>Subject:</b> Re: [Spasm] Change of =
Algorithms: Take 3<o:p></o:p></span></p></div></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p =
class=3DMsoNormal>Jim:<o:p></o:p></p><div><p =
class=3DMsoNormal><br><br><o:p></o:p></p><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><div><div><p =
class=3DMsoNormal>MUST: ECDSA P-256 w/ =
SHA-256<o:p></o:p></p></div></div><div><div><div><p =
class=3DMsoNormal>MUST-: RSA w/ =
SHA-256<o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal>SHOULD+: RSA-PSS w/ SHA-256, =
EdDSA25519<o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal>SHOULD: ECDSA P-384 =
w/SHA-384<o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>&nbsp;</span>=
<o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>[JLS] =
Privileging ECDSA over EdDSA is almost surely going to lead to some =
pushback among some communities as they see the NIST curves as being =
anathema since they do not have the desired property of =
transparency.&nbsp; What would be the argument that you would put =
forward to calm the waters over =
this?</span><o:p></o:p></p></div></div></div></blockquote><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p class=3DMsoNormal>I =
would like to see&nbsp;RSA-PSS w/ SHA-256 and EdDSA25519 at the MUST =
level, but I do not see enough implementation to support either of them =
at that level. &nbsp;Frankly, RSA w/ SHA-256 enjoys much greater =
deployment than all of the rest. &nbsp;However, it is time to signal =
that we need to move to the others. &nbsp;Right now, ECDSA P-256 w/ =
SHA-256 enjoys greater deployment than either RSA-PSS w/ SHA-256 or =
EdDSA25519. &nbsp;I expect TL 1.3 deployment to improve the deployment =
situation for all of these, but we are not seeing those impacts =
yet.<o:p></o:p></p></div><p =
class=3DMsoNormal><br><br><o:p></o:p></p><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>[JLS] Do we =
really see RSA-PSS as being pushed to a MUST at that point?&nbsp; The =
world seems to be rushing headlong into the world of EC and leaving RSA =
behind.&nbsp; I don&#8217;t see a good reason to keep it at SHOULD+ =
unless we think this would become the standard going forward.&nbsp; It =
makes more sense to me for it to be either MUST, because we think that =
it will be used a lot, or SHOULD, because RSA is now somewhat in the =
slow lane.&nbsp;&nbsp; The only reason that I know to support RSA is =
quantum support.&nbsp; Today it is believed that RSA is more resistant =
to quantum cryptography =
breakages.</span><o:p></o:p></p></div></div></blockquote></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><div><p class=3DMsoNormal>TLS 1.3 =
is going to require RSA-PSS for the signature on the Finished message. =
&nbsp;So, as I said above, I expect TL 1.3 deployment to improve the =
deployment situation for RSA-PSS. &nbsp;Further, as you know, most =
existing RSA certificates can be used with =
RSA-PSS.<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>Russ<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div></div></div></body></html>
------=_NextPart_000_079B_01D1FEE4.9ADF9E80--


From nobody Thu Aug 25 17:16:56 2016
Return-Path: <housley@vigilsec.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BD16612D578 for <spasm@ietfa.amsl.com>; Thu, 25 Aug 2016 17:16:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.899
X-Spam-Level: 
X-Spam-Status: No, score=-101.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, USER_IN_WHITELIST=-100] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IwjsuL_qqa8J for <spasm@ietfa.amsl.com>; Thu, 25 Aug 2016 17:16:53 -0700 (PDT)
Received: from mail.smeinc.net (mail.smeinc.net [209.135.209.11]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7DCB612D529 for <spasm@ietf.org>; Thu, 25 Aug 2016 17:16:53 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mail.smeinc.net (Postfix) with ESMTP id 421263005B6 for <spasm@ietf.org>; Thu, 25 Aug 2016 20:16:51 -0400 (EDT)
X-Virus-Scanned: amavisd-new at mail.smeinc.net
Received: from mail.smeinc.net ([127.0.0.1]) by localhost (mail.smeinc.net [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id hq2nEiYG2oO0 for <spasm@ietf.org>; Thu, 25 Aug 2016 20:16:50 -0400 (EDT)
Received: from [192.168.2.100] (pool-108-51-128-219.washdc.fios.verizon.net [108.51.128.219]) by mail.smeinc.net (Postfix) with ESMTPSA id 65024300451; Thu, 25 Aug 2016 20:16:50 -0400 (EDT)
Content-Type: multipart/alternative; boundary="Apple-Mail=_3DE135F8-95AD-40B3-B7E0-BFD4F5E1B6E9"
Mime-Version: 1.0 (Mac OS X Mail 7.3 \(1878.6\))
From: Russ Housley <housley@vigilsec.com>
In-Reply-To: <079a01d1ff1f$473b4230$d5b1c690$@augustcellars.com>
Date: Thu, 25 Aug 2016 20:16:55 -0400
Message-Id: <81175F43-9D2B-413F-AD3D-D107792360B9@vigilsec.com>
References: <05da01d1f803$a0d885f0$e28991d0$@augustcellars.com> <8849812E-0338-4A33-A6F9-E2627AAF3AB4@vigilsec.com> <062901d1f81f$be5e70f0$3b1b52d0$@augustcellars.com> <A3CA1DA2-2F1D-4427-837A-30A641FC7E33@vigilsec.com> <079a01d1ff1f$473b4230$d5b1c690$@augustcellars.com>
To: Jim Schaad <ietf@augustcellars.com>
X-Mailer: Apple Mail (2.1878.6)
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/rRm8zHI14n4y3ZDVCDsWVR5yH5Y>
Cc: SPASM <spasm@ietf.org>
Subject: Re: [Spasm] Change of Algorithms: Take 3
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 26 Aug 2016 00:16:55 -0000

--Apple-Mail=_3DE135F8-95AD-40B3-B7E0-BFD4F5E1B6E9
Content-Transfer-Encoding: 7bit
Content-Type: text/plain;
	charset=us-ascii

Jim:

I think your last message is saying:

MUST: ECDSA P-256 w/ SHA-256, EdDSA25519
MUST-: RSA w/ SHA-256
SHOULD: RSA-PSS w/ SHA-256, ECDSA P-384 w/SHA-384

Did I follow you logic correctly?

Russ
--Apple-Mail=_3DE135F8-95AD-40B3-B7E0-BFD4F5E1B6E9
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=us-ascii

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Dus-ascii"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: =
after-white-space;">Jim:<div><br></div><div>I think your last message is =
saying:<br><div><br class=3D"Apple-interchange-newline"><div =
style=3D"font-family: Helvetica; font-size: 12px; font-style: normal; =
font-variant: normal; font-weight: normal; letter-spacing: normal; =
line-height: normal; orphans: auto; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; widows: auto; word-spacing: =
0px; -webkit-text-stroke-width: 0px;"><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;">MUST: =
ECDSA P-256 w/ SHA-256<o:p></o:p>, EdDSA25519</div></div><div =
style=3D"font-family: Helvetica; font-size: 12px; font-style: normal; =
font-variant: normal; font-weight: normal; letter-spacing: normal; =
line-height: normal; orphans: auto; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; widows: auto; word-spacing: =
0px; -webkit-text-stroke-width: 0px;"><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;">MUST-: RSA w/ SHA-256<o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;">SHOULD: RSA-PSS w/ SHA-256,<span style=3D"font-size: =
12pt;">&nbsp;ECDSA P-384 =
w/SHA-384</span></div></div></div></div><br></div><div>Did I follow you =
logic correctly?</div><div><br></div><div>Russ</div></body></html>=

--Apple-Mail=_3DE135F8-95AD-40B3-B7E0-BFD4F5E1B6E9--


From nobody Thu Aug 25 17:35:32 2016
Return-Path: <ietf@augustcellars.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C54D912D144 for <spasm@ietfa.amsl.com>; Thu, 25 Aug 2016 17:35:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.448
X-Spam-Level: 
X-Spam-Status: No, score=-2.448 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RP_MATCHES_RCVD=-0.548, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sbhaogzQY_mY for <spasm@ietfa.amsl.com>; Thu, 25 Aug 2016 17:35:28 -0700 (PDT)
Received: from mail2.augustcellars.com (augustcellars.com [50.45.239.150]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BF6BD12B016 for <spasm@ietf.org>; Thu, 25 Aug 2016 17:35:27 -0700 (PDT)
Received: from hebrews (192.168.1.152) by mail2.augustcellars.com (192.168.1.201) with Microsoft SMTP Server (TLS) id 15.0.1178.4; Thu, 25 Aug 2016 17:47:19 -0700
From: Jim Schaad <ietf@augustcellars.com>
To: 'Russ Housley' <housley@vigilsec.com>
References: <05da01d1f803$a0d885f0$e28991d0$@augustcellars.com> <8849812E-0338-4A33-A6F9-E2627AAF3AB4@vigilsec.com> <062901d1f81f$be5e70f0$3b1b52d0$@augustcellars.com> <A3CA1DA2-2F1D-4427-837A-30A641FC7E33@vigilsec.com> <079a01d1ff1f$473b4230$d5b1c690$@augustcellars.com> <81175F43-9D2B-413F-AD3D-D107792360B9@vigilsec.com>
In-Reply-To: <81175F43-9D2B-413F-AD3D-D107792360B9@vigilsec.com>
Date: Thu, 25 Aug 2016 17:35:02 -0700
Message-ID: <07c201d1ff31$b08f5980$11ae0c80$@augustcellars.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_07C3_01D1FEF7.04327D50"
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQFqf6LeWjM2uSNf0fCQLOEbNhx7IgIgVBhCA44bSe4B463hJQH/XMI2AlyeB8mgyfNEwA==
Content-Language: en-us
X-Originating-IP: [192.168.1.152]
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/wkMbWYcdJUiHnw-NXWVZGNTLQ9E>
Cc: 'SPASM' <spasm@ietf.org>
Subject: Re: [Spasm] Change of Algorithms: Take 3
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 26 Aug 2016 00:35:30 -0000

------=_NextPart_000_07C3_01D1FEF7.04327D50
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit

With the proviso that I am not sure on P-384, yes.

 

Jim

 

 

From: Spasm [mailto:spasm-bounces@ietf.org] On Behalf Of Russ Housley
Sent: Thursday, August 25, 2016 5:17 PM
To: Jim Schaad <ietf@augustcellars.com>
Cc: SPASM <spasm@ietf.org>
Subject: Re: [Spasm] Change of Algorithms: Take 3

 

Jim:

 

I think your last message is saying:

 

MUST: ECDSA P-256 w/ SHA-256, EdDSA25519

MUST-: RSA w/ SHA-256

SHOULD: RSA-PSS w/ SHA-256, ECDSA P-384 w/SHA-384

 

Did I follow you logic correctly?

 

Russ


------=_NextPart_000_07C3_01D1FEF7.04327D50
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" =
xmlns=3D"http://www.w3.org/TR/REC-html40"><head><META =
HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Dus-ascii"><meta name=3DGenerator content=3D"Microsoft Word 15 =
(filtered medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman",serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:#0563C1;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:#954F72;
	text-decoration:underline;}
p.msonormal0, li.msonormal0, div.msonormal0
	{mso-style-name:msonormal;
	mso-margin-top-alt:auto;
	margin-right:0in;
	mso-margin-bottom-alt:auto;
	margin-left:0in;
	font-size:12.0pt;
	font-family:"Times New Roman",serif;}
span.EmailStyle18
	{mso-style-type:personal-reply;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US =
link=3D"#0563C1" vlink=3D"#954F72"><div class=3DWordSection1><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>With the =
proviso that I am not sure on P-384, yes.<o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'><o:p>&nbsp;</=
o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>Jim<o:p></o:p=
></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'><o:p>&nbsp;</=
o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'><o:p>&nbsp;</=
o:p></span></p><div style=3D'border:none;border-left:solid blue =
1.5pt;padding:0in 0in 0in 4.0pt'><div><div =
style=3D'border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in'><p class=3DMsoNormal><b><span =
style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'>From:</span><=
/b><span style=3D'font-size:11.0pt;font-family:"Calibri",sans-serif'> =
Spasm [mailto:spasm-bounces@ietf.org] <b>On Behalf Of </b>Russ =
Housley<br><b>Sent:</b> Thursday, August 25, 2016 5:17 PM<br><b>To:</b> =
Jim Schaad &lt;ietf@augustcellars.com&gt;<br><b>Cc:</b> SPASM =
&lt;spasm@ietf.org&gt;<br><b>Subject:</b> Re: [Spasm] Change of =
Algorithms: Take 3<o:p></o:p></span></p></div></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p =
class=3DMsoNormal>Jim:<o:p></o:p></p><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p class=3DMsoNormal>I =
think your last message is saying:<o:p></o:p></p><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><div><div><p =
class=3DMsoNormal>MUST: ECDSA P-256 w/ SHA-256, =
EdDSA25519<o:p></o:p></p></div></div><div><div><div><p =
class=3DMsoNormal>MUST-: RSA w/ =
SHA-256<o:p></o:p></p></div></div><div><div><p class=3DMsoNormal>SHOULD: =
RSA-PSS w/ SHA-256,&nbsp;ECDSA P-384 =
w/SHA-384<o:p></o:p></p></div></div></div></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>Did I follow you logic =
correctly?<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>Russ<o:p></o:p></p></div></div></div></body></html>
------=_NextPart_000_07C3_01D1FEF7.04327D50--


From nobody Mon Aug 29 21:04:57 2016
Return-Path: <internet-drafts@ietf.org>
X-Original-To: spasm@ietf.org
Delivered-To: spasm@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 6D4A312D0FF; Mon, 29 Aug 2016 21:04:55 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
X-Test-IDTracker: no
X-IETF-IDTracker: 6.31.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <147252989540.19045.14451060202052338375.idtracker@ietfa.amsl.com>
Date: Mon, 29 Aug 2016 21:04:55 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/lznKs3dZAWnxoHiG0aKX2KdWkCI>
Cc: spasm@ietf.org
Subject: [Spasm] I-D Action: draft-ietf-lamps-rfc5751-bis-01.txt
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 30 Aug 2016 04:04:55 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Limited Additional Mechanisms for PKIX and SMIME of the IETF.

        Title           : Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 3.5 Message Specification 
        Authors         : Jim Schaad
                          Blake Ramsdell
                          Sean Turner
	Filename        : draft-ietf-lamps-rfc5751-bis-01.txt
	Pages           : 53
	Date            : 2016-08-29

Abstract:
   This document defines Secure/Multipurpose Internet Mail Extensions
   (S/MIME) version 3.5.  S/MIME provides a consistent way to send and
   receive secure MIME data.  Digital signatures provide authentication,
   message integrity, and non-repudiation with proof of origin.
   Encryption provides data confidentiality.  Compression can be used to
   reduce data size.  This document obsoletes RFC 5751.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-lamps-rfc5751-bis/

There's also a htmlized version available at:
https://tools.ietf.org/html/draft-ietf-lamps-rfc5751-bis-01

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-lamps-rfc5751-bis-01


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Mon Aug 29 21:29:23 2016
Return-Path: <housley@vigilsec.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9D1CB12B026 for <spasm@ietfa.amsl.com>; Mon, 29 Aug 2016 21:29:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.9
X-Spam-Level: 
X-Spam-Status: No, score=-101.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, USER_IN_WHITELIST=-100] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id reZIqiC0YpOP for <spasm@ietfa.amsl.com>; Mon, 29 Aug 2016 21:29:21 -0700 (PDT)
Received: from mail.smeinc.net (mail.smeinc.net [209.135.209.11]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 767DC127A90 for <spasm@ietf.org>; Mon, 29 Aug 2016 21:29:21 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mail.smeinc.net (Postfix) with ESMTP id 450AE3004C3 for <spasm@ietf.org>; Tue, 30 Aug 2016 00:29:19 -0400 (EDT)
X-Virus-Scanned: amavisd-new at mail.smeinc.net
Received: from mail.smeinc.net ([127.0.0.1]) by localhost (mail.smeinc.net [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id yQfOvQknuVEz for <spasm@ietf.org>; Tue, 30 Aug 2016 00:29:18 -0400 (EDT)
Received: from [192.168.2.100] (pool-108-51-128-219.washdc.fios.verizon.net [108.51.128.219]) by mail.smeinc.net (Postfix) with ESMTPSA id 74ACD3002B1 for <spasm@ietf.org>; Tue, 30 Aug 2016 00:29:18 -0400 (EDT)
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 7.3 \(1878.6\))
From: Russ Housley <housley@vigilsec.com>
In-Reply-To: <147252989540.19045.14451060202052338375.idtracker@ietfa.amsl.com>
Date: Tue, 30 Aug 2016 00:29:18 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <A3199D5E-7495-47F8-9C6F-F2AC26B103CA@vigilsec.com>
References: <147252989540.19045.14451060202052338375.idtracker@ietfa.amsl.com>
To: SPASM <spasm@ietf.org>
X-Mailer: Apple Mail (2.1878.6)
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/3DR6jCG_iovajpm00_B4v7Fvvic>
Subject: Re: [Spasm] I-D Action: draft-ietf-lamps-rfc5751-bis-01.txt
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 30 Aug 2016 04:29:22 -0000

I did a very quick skim of the -01 version.  Thanks.

I expected Section 2.3 to include ECDH and X25519.  If they are added, =
some related guidance will be needed in Sections 4.4 and 4.5.

Section 4 offers guidance about RSA, RSASSA-PSS, RSAES-OAEP, and DH =
algorithms.  It used to contain some guidance about DSA.  Is there any =
reason to remove DSA guidance from 4.2 and 4.3?  I think we need to add =
guidance in Sections 4.2 and 4.3 for ECDSA and EdDSA.

Russ


From nobody Mon Aug 29 21:29:44 2016
Return-Path: <ietf@augustcellars.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CDDF012D0B3 for <spasm@ietfa.amsl.com>; Mon, 29 Aug 2016 21:29:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.449
X-Spam-Level: 
X-Spam-Status: No, score=-2.449 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.548, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Dma_lJWWcTLh for <spasm@ietfa.amsl.com>; Mon, 29 Aug 2016 21:29:40 -0700 (PDT)
Received: from mail2.augustcellars.com (augustcellars.com [50.45.239.150]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CB18B12B026 for <spasm@ietf.org>; Mon, 29 Aug 2016 21:29:39 -0700 (PDT)
Received: from hebrews (24.21.96.37) by mail2.augustcellars.com (192.168.0.56) with Microsoft SMTP Server (TLS) id 15.0.1210.3; Mon, 29 Aug 2016 21:41:26 -0700
From: Jim Schaad <ietf@augustcellars.com>
To: 'SPASM' <spasm@ietf.org>
References: <147252989540.19045.14451060202052338375.idtracker@ietfa.amsl.com>
In-Reply-To: <147252989540.19045.14451060202052338375.idtracker@ietfa.amsl.com>
Date: Mon, 29 Aug 2016 21:29:09 -0700
Message-ID: <034101d20277$0f4130a0$2dc391e0$@augustcellars.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQF7yRrIX3D59W/UrgspUBkr1mAzQ6ENWu0w
Content-Language: en-us
X-Originating-IP: [24.21.96.37]
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/3bW_B942vPbmqUEZvk38BCg8ptU>
Subject: [Spasm] FW:  I-D Action: draft-ietf-lamps-rfc5751-bis-01.txt
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 30 Aug 2016 04:29:42 -0000

This update has the algorithm updates with the following exceptions:

1.  The key management changes have not been done yet.
2.  The signature algorithms doesn't have P-384 listed in them.

The first is just a timing issue.
The second is because at this time the only person that I have seen arguing
for this is Russ.  I would like to see some additional support or some
additional reasoning to add this.  I am not sure that this does not fall
into the same category as the arguments about doing 192 bit AES, would
people really use 384 or just jump to 448 and 521?

The update to the certs draft has also been submitted with the same set of
changes and should be coming out shortly.

Jim


> -----Original Message-----
> From: Spasm [mailto:spasm-bounces@ietf.org] On Behalf Of internet-
> drafts@ietf.org
> Sent: Monday, August 29, 2016 9:05 PM
> To: i-d-announce@ietf.org
> Cc: spasm@ietf.org
> Subject: [Spasm] I-D Action: draft-ietf-lamps-rfc5751-bis-01.txt
> 
> 
> A New Internet-Draft is available from the on-line Internet-Drafts
directories.
> This draft is a work item of the Limited Additional Mechanisms for PKIX
and
> SMIME of the IETF.
> 
>         Title           : Secure/Multipurpose Internet Mail Extensions
(S/MIME) Version
> 3.5 Message Specification
>         Authors         : Jim Schaad
>                           Blake Ramsdell
>                           Sean Turner
> 	Filename        : draft-ietf-lamps-rfc5751-bis-01.txt
> 	Pages           : 53
> 	Date            : 2016-08-29
> 
> Abstract:
>    This document defines Secure/Multipurpose Internet Mail Extensions
>    (S/MIME) version 3.5.  S/MIME provides a consistent way to send and
>    receive secure MIME data.  Digital signatures provide authentication,
>    message integrity, and non-repudiation with proof of origin.
>    Encryption provides data confidentiality.  Compression can be used to
>    reduce data size.  This document obsoletes RFC 5751.
> 
> 
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-ietf-lamps-rfc5751-bis/
> 
> There's also a htmlized version available at:
> https://tools.ietf.org/html/draft-ietf-lamps-rfc5751-bis-01
> 
> A diff from the previous version is available at:
> https://www.ietf.org/rfcdiff?url2=draft-ietf-lamps-rfc5751-bis-01
> 
> 
> Please note that it may take a couple of minutes from the time of
submission
> until the htmlized version and diff are available at tools.ietf.org.
> 
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
> 
> _______________________________________________
> Spasm mailing list
> Spasm@ietf.org
> https://www.ietf.org/mailman/listinfo/spasm


From nobody Mon Aug 29 21:29:59 2016
Return-Path: <internet-drafts@ietf.org>
X-Original-To: spasm@ietf.org
Delivered-To: spasm@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 363D0127A90; Mon, 29 Aug 2016 21:29:57 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
X-Test-IDTracker: no
X-IETF-IDTracker: 6.31.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <147253139718.19081.4964460077559707435.idtracker@ietfa.amsl.com>
Date: Mon, 29 Aug 2016 21:29:57 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/d3_PGIpNnrnhvX3HH5ucb07OhqY>
Cc: spasm@ietf.org
Subject: [Spasm] I-D Action: draft-ietf-lamps-rfc5750-bis-00.txt
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 30 Aug 2016 04:29:57 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Limited Additional Mechanisms for PKIX and SMIME of the IETF.

        Title           : Secure/Multipurpose Internet Mail Extensions (S/ MIME) Version 3.2 Certificate Handling
        Authors         : Jim Schaad
                          Blake Ramsdell
                          Sean Turner
	Filename        : draft-ietf-lamps-rfc5750-bis-00.txt
	Pages           : 23
	Date            : 2016-08-29

Abstract:
   This document specifies conventions for X.509 certificate usage by
   Secure/Multipurpose Internet Mail Extensions (S/MIME) v3.2 agents.
   S/MIME provides a method to send and receive secure MIME messages,
   and certificates are an integral part of S/MIME agent processing.
   S/MIME agents validate certificates as described in RFC 5280, the
   Internet X.509 Public Key Infrastructure Certificate and CRL Profile.
   S/MIME agents must meet the certificate processing requirements in
   this document as well as those in RFC 5280.  This document obsoletes
   RFC 3850.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-lamps-rfc5750-bis/

There's also a htmlized version available at:
https://tools.ietf.org/html/draft-ietf-lamps-rfc5750-bis-00


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Mon Aug 29 21:32:56 2016
Return-Path: <housley@vigilsec.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1D17812D0A1 for <spasm@ietfa.amsl.com>; Mon, 29 Aug 2016 21:32:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.9
X-Spam-Level: 
X-Spam-Status: No, score=-101.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, USER_IN_WHITELIST=-100] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4gfpEwdotwaR for <spasm@ietfa.amsl.com>; Mon, 29 Aug 2016 21:32:54 -0700 (PDT)
Received: from mail.smeinc.net (mail.smeinc.net [209.135.209.11]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 32A39127A90 for <spasm@ietf.org>; Mon, 29 Aug 2016 21:32:54 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mail.smeinc.net (Postfix) with ESMTP id 3343630051F for <spasm@ietf.org>; Tue, 30 Aug 2016 00:32:52 -0400 (EDT)
X-Virus-Scanned: amavisd-new at mail.smeinc.net
Received: from mail.smeinc.net ([127.0.0.1]) by localhost (mail.smeinc.net [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id YpRvPlS7EmB6 for <spasm@ietf.org>; Tue, 30 Aug 2016 00:32:51 -0400 (EDT)
Received: from [192.168.2.100] (pool-108-51-128-219.washdc.fios.verizon.net [108.51.128.219]) by mail.smeinc.net (Postfix) with ESMTPSA id 4B5A23002B1; Tue, 30 Aug 2016 00:32:51 -0400 (EDT)
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 7.3 \(1878.6\))
From: Russ Housley <housley@vigilsec.com>
In-Reply-To: <034101d20277$0f4130a0$2dc391e0$@augustcellars.com>
Date: Tue, 30 Aug 2016 00:32:52 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <86411335-B429-468D-9ABB-6740E922FFF6@vigilsec.com>
References: <147252989540.19045.14451060202052338375.idtracker@ietfa.amsl.com> <034101d20277$0f4130a0$2dc391e0$@augustcellars.com>
To: Jim Schaad <ietf@augustcellars.com>
X-Mailer: Apple Mail (2.1878.6)
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/xFMhTAvxMkR-me5cRnJ1FEwgGWw>
Cc: SPASM <spasm@ietf.org>
Subject: Re: [Spasm] FW:  I-D Action: draft-ietf-lamps-rfc5751-bis-01.txt
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 30 Aug 2016 04:32:55 -0000

Jim:

Thanks for the updated draft.

> This update has the algorithm updates with the following exceptions:
>=20
> 1.  The key management changes have not been done yet.
> 2.  The signature algorithms doesn't have P-384 listed in them.
>=20
> The first is just a timing issue.
> The second is because at this time the only person that I have seen =
arguing
> for this is Russ.  I would like to see some additional support or some
> additional reasoning to add this.  I am not sure that this does not =
fall
> into the same category as the arguments about doing 192 bit AES, would
> people really use 384 or just jump to 448 and 521?

I will point out that the Suite B community will use P-384.  I do not =
know if there are others.

Russ


From nobody Tue Aug 30 11:20:26 2016
Return-Path: <ietf@augustcellars.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 114F912D7BD for <spasm@ietfa.amsl.com>; Tue, 30 Aug 2016 11:20:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.449
X-Spam-Level: 
X-Spam-Status: No, score=-2.449 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.548, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yAdWihlIbQ0p for <spasm@ietfa.amsl.com>; Tue, 30 Aug 2016 11:20:16 -0700 (PDT)
Received: from mail2.augustcellars.com (augustcellars.com [50.45.239.150]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 63CD912D7B6 for <spasm@ietf.org>; Tue, 30 Aug 2016 11:20:14 -0700 (PDT)
Received: from hebrews (192.168.1.152) by mail2.augustcellars.com (192.168.1.201) with Microsoft SMTP Server (TLS) id 15.0.1210.3; Tue, 30 Aug 2016 11:32:30 -0700
From: Jim Schaad <ietf@augustcellars.com>
To: 'Russ Housley' <housley@vigilsec.com>, 'SPASM' <spasm@ietf.org>
References: <147252989540.19045.14451060202052338375.idtracker@ietfa.amsl.com> <A3199D5E-7495-47F8-9C6F-F2AC26B103CA@vigilsec.com>
In-Reply-To: <A3199D5E-7495-47F8-9C6F-F2AC26B103CA@vigilsec.com>
Date: Tue, 30 Aug 2016 11:20:00 -0700
Message-ID: <03fe01d202eb$205c84b0$61158e10$@augustcellars.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQF7yRrIX3D59W/UrgspUBkr1mAzQwJwpiDuoPqwUXA=
Content-Language: en-us
X-Originating-IP: [192.168.1.152]
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/5kAaP2am8CfGbB8fIOwLp7wWzgk>
Subject: Re: [Spasm] I-D Action: draft-ietf-lamps-rfc5751-bis-01.txt
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 30 Aug 2016 18:20:22 -0000

> -----Original Message-----
> From: Spasm [mailto:spasm-bounces@ietf.org] On Behalf Of Russ Housley
> Sent: Monday, August 29, 2016 9:29 PM
> To: SPASM <spasm@ietf.org>
> Subject: Re: [Spasm] I-D Action: draft-ietf-lamps-rfc5751-bis-01.txt
> 
> I did a very quick skim of the -01 version.  Thanks.
> 
> I expected Section 2.3 to include ECDH and X25519.  If they are added,
some
> related guidance will be needed in Sections 4.4 and 4.5.

Our messages much have crossed where I said that this wasn't done for timing
issues.
I am not sure what type of guidance needs to be added to section 4.4. and
4.5 though, there is no concept of having different sized keys as the MUST
requirements in section 2.3 are going to require a specific key size.

> 
> Section 4 offers guidance about RSA, RSASSA-PSS, RSAES-OAEP, and DH
> algorithms.  It used to contain some guidance about DSA.  Is there any
reason to
> remove DSA guidance from 4.2 and 4.3?  I think we need to add guidance in
> Sections 4.2 and 4.3 for ECDSA and EdDSA.

I am in the process of trying to remove all DSA guidance to section B.2 for
clarity.  It is just going to take a while to  go through section 4.1 and
clean that one up.  

As above since they section 4.2-4.5 are all dealing with key sizes, what
guidance do you think needs to be in there given that we are dealing with
fixed sized keys for ECDSA and EdDSA in requirements.
  It would make more sense to list specific curves as may in section 2.x

Jim

> 
> Russ
> 
> _______________________________________________
> Spasm mailing list
> Spasm@ietf.org
> https://www.ietf.org/mailman/listinfo/spasm


From nobody Tue Aug 30 12:48:21 2016
Return-Path: <housley@vigilsec.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CD98912D7AA for <spasm@ietfa.amsl.com>; Tue, 30 Aug 2016 12:48:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.9
X-Spam-Level: 
X-Spam-Status: No, score=-101.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, USER_IN_WHITELIST=-100] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bZeIPtJFeALA for <spasm@ietfa.amsl.com>; Tue, 30 Aug 2016 12:48:18 -0700 (PDT)
Received: from mail.smeinc.net (mail.smeinc.net [209.135.209.11]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B36FC12B03D for <spasm@ietf.org>; Tue, 30 Aug 2016 12:48:17 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mail.smeinc.net (Postfix) with ESMTP id 96A603005B4 for <spasm@ietf.org>; Tue, 30 Aug 2016 15:48:15 -0400 (EDT)
X-Virus-Scanned: amavisd-new at mail.smeinc.net
Received: from mail.smeinc.net ([127.0.0.1]) by localhost (mail.smeinc.net [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id GAPbAOMq7nV8 for <spasm@ietf.org>; Tue, 30 Aug 2016 15:48:14 -0400 (EDT)
Received: from [192.168.2.100] (pool-108-51-128-219.washdc.fios.verizon.net [108.51.128.219]) by mail.smeinc.net (Postfix) with ESMTPSA id A1C9A300411; Tue, 30 Aug 2016 15:48:14 -0400 (EDT)
Content-Type: text/plain; charset=windows-1252
Mime-Version: 1.0 (Mac OS X Mail 7.3 \(1878.6\))
From: Russ Housley <housley@vigilsec.com>
In-Reply-To: <03fe01d202eb$205c84b0$61158e10$@augustcellars.com>
Date: Tue, 30 Aug 2016 15:48:14 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <B0D025D2-DCB8-49AF-A3B9-3023C6781C52@vigilsec.com>
References: <147252989540.19045.14451060202052338375.idtracker@ietfa.amsl.com> <A3199D5E-7495-47F8-9C6F-F2AC26B103CA@vigilsec.com> <03fe01d202eb$205c84b0$61158e10$@augustcellars.com>
To: Jim Schaad <ietf@augustcellars.com>
X-Mailer: Apple Mail (2.1878.6)
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/jgaWf2mhyDBXJ5IqsFhSRKwB2QY>
Cc: SPASM <spasm@ietf.org>
Subject: Re: [Spasm] I-D Action: draft-ietf-lamps-rfc5751-bis-01.txt
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 30 Aug 2016 19:48:20 -0000

Jim:

>> I did a very quick skim of the -01 version.  Thanks.
>>=20
>> I expected Section 2.3 to include ECDH and X25519.  If they are =
added,some
>> related guidance will be needed in Sections 4.4 and 4.5.
>=20
> Our messages much have crossed where I said that this wasn't done for =
timing
> issues.

Yes, I think so.

> I am not sure what type of guidance needs to be added to section 4.4. =
and
> 4.5 though, there is no concept of having different sized keys as the =
MUST
> requirements in section 2.3 are going to require a specific key size.

For Section 4.4, I was thinking about something like =85

   An S/MIME agent when establishing keys for content encryption using =
the
   ECDH MUST support P-256, and MAY support other curves as well.

For there CFRG curves, maybe we only say that X25519 MUST be supported
that X448 MAY be supported.

Russ


From nobody Tue Aug 30 14:49:57 2016
Return-Path: <ietf@augustcellars.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3FFBD12D817 for <spasm@ietfa.amsl.com>; Tue, 30 Aug 2016 14:49:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.449
X-Spam-Level: 
X-Spam-Status: No, score=-2.449 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.548, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CM21XE2YBMar for <spasm@ietfa.amsl.com>; Tue, 30 Aug 2016 14:49:53 -0700 (PDT)
Received: from mail2.augustcellars.com (augustcellars.com [50.45.239.150]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3CC0D12D80F for <spasm@ietf.org>; Tue, 30 Aug 2016 14:49:53 -0700 (PDT)
Received: from hebrews (192.168.1.152) by mail2.augustcellars.com (192.168.1.201) with Microsoft SMTP Server (TLS) id 15.0.1210.3; Tue, 30 Aug 2016 15:02:30 -0700
From: Jim Schaad <ietf@augustcellars.com>
To: 'Russ Housley' <housley@vigilsec.com>
References: <147252989540.19045.14451060202052338375.idtracker@ietfa.amsl.com> <A3199D5E-7495-47F8-9C6F-F2AC26B103CA@vigilsec.com> <03fe01d202eb$205c84b0$61158e10$@augustcellars.com> <B0D025D2-DCB8-49AF-A3B9-3023C6781C52@vigilsec.com>
In-Reply-To: <B0D025D2-DCB8-49AF-A3B9-3023C6781C52@vigilsec.com>
Date: Tue, 30 Aug 2016 14:49:46 -0700
Message-ID: <045a01d20308$6e4568f0$4ad03ad0$@augustcellars.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQF7yRrIX3D59W/UrgspUBkr1mAzQwJwpiDuAizUfTIBU3v4X6De9pxQ
Content-Language: en-us
X-Originating-IP: [192.168.1.152]
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/olz7JPVaDWP4jrbhXORZB5yZ0BU>
Cc: 'SPASM' <spasm@ietf.org>
Subject: Re: [Spasm] I-D Action: draft-ietf-lamps-rfc5751-bis-01.txt
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 30 Aug 2016 21:49:55 -0000

> -----Original Message-----
> From: Spasm [mailto:spasm-bounces@ietf.org] On Behalf Of Russ Housley
> Sent: Tuesday, August 30, 2016 12:48 PM
> To: Jim Schaad <ietf@augustcellars.com>
> Cc: SPASM <spasm@ietf.org>
> Subject: Re: [Spasm] I-D Action: draft-ietf-lamps-rfc5751-bis-01.txt
> 
> Jim:
> 
> >> I did a very quick skim of the -01 version.  Thanks.
> >>
> >> I expected Section 2.3 to include ECDH and X25519.  If they are
> >> added,some related guidance will be needed in Sections 4.4 and 4.5.
> >
> > Our messages much have crossed where I said that this wasn't done for
> > timing issues.
> 
> Yes, I think so.
> 
> > I am not sure what type of guidance needs to be added to section 4.4.
> > and
> > 4.5 though, there is no concept of having different sized keys as the
> > MUST requirements in section 2.3 are going to require a specific key
size.
> 
> For Section 4.4, I was thinking about something like .
> 
>    An S/MIME agent when establishing keys for content encryption using the
>    ECDH MUST support P-256, and MAY support other curves as well.
> 
> For there CFRG curves, maybe we only say that X25519 MUST be supported
that
> X448 MAY be supported.

But why would that not be in section 2.X instead?  It is not like X25519
supports different key sizes which is what is currently documented in
section 4.

Jim

> 
> Russ
> 
> _______________________________________________
> Spasm mailing list
> Spasm@ietf.org
> https://www.ietf.org/mailman/listinfo/spasm


From nobody Tue Aug 30 14:56:45 2016
Return-Path: <housley@vigilsec.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CD6A112B044 for <spasm@ietfa.amsl.com>; Tue, 30 Aug 2016 14:56:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.9
X-Spam-Level: 
X-Spam-Status: No, score=-101.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, USER_IN_WHITELIST=-100] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NYlFTbF_CQaP for <spasm@ietfa.amsl.com>; Tue, 30 Aug 2016 14:56:42 -0700 (PDT)
Received: from mail.smeinc.net (mail.smeinc.net [209.135.209.11]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5F97612B043 for <spasm@ietf.org>; Tue, 30 Aug 2016 14:56:42 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mail.smeinc.net (Postfix) with ESMTP id 3AC033004B7 for <spasm@ietf.org>; Tue, 30 Aug 2016 17:56:40 -0400 (EDT)
X-Virus-Scanned: amavisd-new at mail.smeinc.net
Received: from mail.smeinc.net ([127.0.0.1]) by localhost (mail.smeinc.net [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id Jbf_-91xusKS for <spasm@ietf.org>; Tue, 30 Aug 2016 17:56:39 -0400 (EDT)
Received: from [192.168.2.100] (pool-108-51-128-219.washdc.fios.verizon.net [108.51.128.219]) by mail.smeinc.net (Postfix) with ESMTPSA id 2D2D1300411; Tue, 30 Aug 2016 17:56:39 -0400 (EDT)
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 7.3 \(1878.6\))
From: Russ Housley <housley@vigilsec.com>
In-Reply-To: <045a01d20308$6e4568f0$4ad03ad0$@augustcellars.com>
Date: Tue, 30 Aug 2016 17:55:22 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <52D1D1F9-F672-4232-A19C-EA8A5675A4B0@vigilsec.com>
References: <147252989540.19045.14451060202052338375.idtracker@ietfa.amsl.com> <A3199D5E-7495-47F8-9C6F-F2AC26B103CA@vigilsec.com> <03fe01d202eb$205c84b0$61158e10$@augustcellars.com> <B0D025D2-DCB8-49AF-A3B9-3023C6781C52@vigilsec.com> <045a01d20308$6e4568f0$4ad03ad0$@augustcellars.com>
To: Jim Schaad <ietf@augustcellars.com>
X-Mailer: Apple Mail (2.1878.6)
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/KaacefUnh9eRcQL2Pj-xH3-_wYI>
Cc: SPASM <spasm@ietf.org>
Subject: Re: [Spasm] I-D Action: draft-ietf-lamps-rfc5751-bis-01.txt
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 30 Aug 2016 21:56:44 -0000

Jim:

>>=20
>>>> I did a very quick skim of the -01 version.  Thanks.
>>>>=20
>>>> I expected Section 2.3 to include ECDH and X25519.  If they are
>>>> added,some related guidance will be needed in Sections 4.4 and 4.5.
>>>=20
>>> Our messages much have crossed where I said that this wasn't done =
for
>>> timing issues.
>>=20
>> Yes, I think so.
>>=20
>>> I am not sure what type of guidance needs to be added to section =
4.4.
>>> and
>>> 4.5 though, there is no concept of having different sized keys as =
the
>>> MUST requirements in section 2.3 are going to require a specific key
> size.
>>=20
>> For Section 4.4, I was thinking about something like .
>>=20
>>   An S/MIME agent when establishing keys for content encryption using =
the
>>   ECDH MUST support P-256, and MAY support other curves as well.
>>=20
>> For there CFRG curves, maybe we only say that X25519 MUST be =
supported
> that
>> X448 MAY be supported.
>=20
> But why would that not be in section 2.X instead?  It is not like =
X25519
> supports different key sizes which is what is currently documented in
> section 4.

This seems to be the place that the document says you MAY do stronger =
things too.

Russ

