-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On Jun 2, 2009, at 3:17 PM, Douglas Otis wrote:

>
> On Jun 2, 2009, at 2:38 PM, Jon Callas wrote:
>>
>> The only use I can see of it is the case where you have many live  
>> messages out there, some of them with (e.g.) RSA and others with  
>> (e.g.) ECDSA and you want to make all RSA messages start failing  
>> now, and yet for some reason want to keep the RSA keys still in the  
>> DNS.
>
> This does not represent the intended use the key's algorithm list.
>
> While currently most receivers recognize rsa-sha256, they may not  
> recognize ecdsa-md6. Removing indications of currently used  
> algorithms by the key for a particular domain will allow bad actors  
> to take advantage of a transition period.  Receiving MTAs may make  
> exceptions for ADSP when ecdsa-md6 is recognized as a valid, albeit  
> unsupported algorithm.  Rather than rejecting the message, it might  
> be marked as having an unsupported signature algorithm.  By having  
> the key indicate specifically which algorithms are in current use,  
> then algorithm exceptions do not need to extend across all domains.   
> Just domains indicating the use of the newer algorithm should  
> receive an exception indication.  Just as in the days of base64  
> encoded messages, a post-process can be used to confirm the validity  
> of messages having a newer algorithm signature.  This post process  
> check could even be offered as a web based service.
>
> Without this feature, people may soon find their inbox flooded by  
> bogus messages indicating the use of new algorithm, that could have  
> been mitigated extensively by having the key feature.

Help me understand. Describe the use case where someone will use it.

As a cryptographer, I do not understand how the sketch you give above  
can happen. If the cryptography works, I don't see how the situation  
you describe can occur at all.

Signatures are either valid or invalid. There are many ways it can be  
invalid and only a few it can be valid. By that I mean among other  
things that a signature might be syntactically valid but by policy  
invalid; e.g. in the case of SHA1 collisions.

If an MTA decides that an invalid signature is for some reason  
acceptable anyway -- well, that's daft, but it's *their* MTA. People  
have the right to be stupid.

I don't get it, Doug.

However -- I just wrote a note about the meta-issue. If you want to  
say that you think it should be there because you like it and that  
should be good enough, I'll support you. It's the burden of people to  
convince others why something should go, not why it should stay.

        Jon



-----BEGIN PGP SIGNATURE-----
Version: PGP Universal 2.6.3
Charset: US-ASCII

wj8DBQFKJa3MsTedWZOD3gYRAt3AAKDSwk24E0YhgbB+7z8BUB6Hl7jFPACgrz4U
ucIGma8+/Fuqcm/FWGAxQr0=
=D7jj
-----END PGP SIGNATURE-----
_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to