Hello Julien,

On Fri, 21 May 2010, Laganier, Julien wrote:

[...]
FWIW - a strawman that seems to fulfill simpler requirements would be:

- define NewSignature and NewCGA options that include the algorithm in use and 
are used in place of CGA and RSA Signature options when the algorithm in use is 
not RSA.
I would need several clarifications on this sentence:
- I do not see why we should define a NewCGA option. RFC 3971 defines a
  CGA Option that carries a CGA PDS (defined in RFC 3972) that is
  agnostic of the Public Key type. As long as the Public Key can be
  formatted as a DER-encoded ASN.1 structure of type
SubjectPublicKeyInfo, this is not a problem. Did I miss something ? - concerning the NewSignature, do you think we should define a new one
  per Signature Algorithm ? So there will be one for RSA (already
  exists), one for ECDSA, as long as there is free value on the "IPv6
  Neighbor Discovery Option Formats" registry. Or do you think there is
  actually some value in our solution that defines an "Universal"
  Signature option that indicates the type of Digital Signature it
  carries.
  Since there is already a reserved field in the RSA Signature Option, I
  would not see why we could not use this field to do just that. Legacy
  nodes will try to process the option and fail when it is not RSA.
  Signature Agility enabled nodes will just do fine. What is you opinion
  on this ?



- NewSignature and NewCGA options will be ignored by legacy nodes (i.e., 
conforming to RFC 3971) and thus messages carrying them will be treated as 
unsecured by these nodes.

- specify NewSignature and NewCGA receiver processing such that a node that 
doesn't support said algorithm treats the message as unsecured.

Thanks (again) for your comments.

Regards,
        Tony
_______________________________________________
CGA-EXT mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/cga-ext

Reply via email to