On Tue, Oct 23, 2018 at 3:58 AM Scott Kitterman <skl...@kitterman.com>
wrote:

> Last time I looked at this particular issue, ARC could use any algorithm
> that
> DKIM uses.


Still correct.


>   As I recall, that was once of the stimuli for the DCRUP working
> group (to avoid having rsa-sha1 be valid for ARC by obsoleting it in DKIM).
>

I don't think that ARC drove the DCRUP work as much as the desire to get
badness officially obsoleted :-)


> It looks like this discussion has been moved to a new draft,
> https://tools.ietf.org/html/draft-ietf-dmarc-arc-multi-01 (although the
> reference is wrong,
> https://tools.ietf.org/html/draft-ietf-dmarc-arc-multi-02
> is current.
>

Yes that's correct.


> Unfortunately, I don't find any actual guidance on what algorithms are
> currently used.


Any that are valid for DKIM - see first sentence above.


> Secion 6, Phases of Algorithm Evolution, gives some process
> (which seriously needs revision - I thought we all knew flag days don't
> work
> at Internet scale), but no actual guidance.
>

Correct - we've deferred any real attention on this until we got the ARC
protocol document nailed down. With the request to publish being a few
hours old now from Barry, this might be an excellent topic to pursue next
:-)


> DKIM, as updated by the DCRUP work, has two valid crypto algorithms:
>
> rsa-sha256
> ed25119-sha256
>
> One has been obsoleted:
>
> rsa-sha1
>
> Which among those is valid for ARC and how do I know?
>

The same ones that are valid for DKIM (as updated by DCRUP). What we
haven't worked out is how to handle mixed algorithm chains.

--Kurt
_______________________________________________
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc

Reply via email to