Re: draft-ietf-dnsext-dnssec-gost

2010-02-19 Thread Olafur Gudmundsson

On 15/02/2010 7:43 PM, Olafur Gudmundsson wrote:

On 15/02/2010 6:37 PM, Martin Rex wrote:

Mark Andrews wrote:


In message201002151420.o1fekcmx024...@fs4113.wdf.sap.corp, Martin
Rex writes
:

OK, I'm sorry. For the DNSsec GOST signature I-D, the
default/prefered (?)
parameter sets are explicitly listed in last paragraph of section 2
of draft-ietf-dnsext-dnssec-gost-06. However, it does _NOT_ say what to
do if GOST R34.10-2001 signatures with other parameter sets are
encountered.


Since each end adds the parameters and they are NOT transmitted this
can never happen. If one end was to change the parameters then nothing
would validate.



OK. I didn't know anything abouth DNSSEC when I entered the disussion...


Having scanned some of the available document (rfc-4034,rfc-4035,rfc-2536
and the expired I-D draft-ietf-dnsext-ecc-key-10.txt) I'm wondering
about the following:

- the DNS security algorithm tag ought to be GOST R34.10-2001
and not just GOST


This is a good point, adding a version label is a possiblity in this
case or just in the future cases, but I think slapping one on
this is fine.



- DSA and the expired ECC draft spell out the entire algorithm
parameters in the key RRs, which preclues having to assign
additional algorithm identifiers if a necessity comes up to
use different algorithm parameters.

DSA did not cover the case if the key is  1024 bit.
ECC draft was killed due to the fact it was impossible to guarantee that
a implementation supporting ECC would be able to handle all the
possible curves that the proposal allowed.




Wouldn't it be sensible to do the same for GOST R34.10-2001 keys --
i.e. list the parameter set as part of the public key data?
Given the procedure of the standardization body that defines GOST
the parameter set OID could be used in alternative to spelling
out each of the element in the parameter set in full.
Implying the paramter set A for the GOST R34.10-2001 algorithm does
not seem very agile, given the limited number range for the algorithm
field in DNS security.


For interoperability reasons we WANT MINIMAL flexibility for
implementors/users. Thus we stripped all that out and picked ONE
possible GOST/2001 curve.


Given the differences between -1994 and -2001 versions,
any successor GOST R34.10-201X standard may not be able to reuse
the DNSKEY record anyway and need a new algorithm identifier.
And at that point, an unqualified label GOST would become
ambiguous.


see above,


Olafur (document shepeard)


Martin,

Based on your comments and the possible confusion over registering the
memonic GOST for DNSSEC, I think it would be wise to change the DNSKEY 
Memonic to ECC-GOST.


Olafur (document shepeard)
PS: orignally we registered RSA for RSA/MD5 combination, then we got 
RSASHA1, RSASH256, RSASHA1NSEC3 .., thus the first registered should 
not get a special shoter name than later variants :-)





___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: draft-ietf-dnsext-dnssec-gost [Was: Re: IAB statement on the RPKI. ]

2010-02-17 Thread Alfred Hönes
Martin,

(Apparently, the subject lines have been messed up entirely
on this list these days.  I tried to return to the actual
subject, GOST signatures for DNSSEC.)


I fear you are in danger of drawing the wrong conclusions based
on incomplete information.


(1)  non-protocol issues

 ... that Zones can carry both, a mandatory to implement signature
 (algorithm) and interoperable world-wide, and one that might
 be prefered in particular regions (or legislations) and can
 be evaluated in those areas by those who care (or which are
 obliged to care).

If I understand correctly, the basic issue of those under GOST-related
regulatory restrictions is that they are legally constrained to
MUST NOT use other algorithms than GOST to produce digital signatures.

That makes your smart proposal moot, AFAICS.  :-(

I have no idea whether or not geo-diversity of secondary
servers and/or anycast server instances providing signatures
with a generally accepted signature algorithm on the same zone
content could be an option ...
-- routing might do the right thing, and the necessary details
for the root could be worked out ...


(2)  protocol issues

 (are signatures and DNS KEYs in DNSsec really designed to be
 highlanders, i.e. there can only be one?)

No, DNSSEC can use and carry multiple signatures.

That's necessary for rekeying and algorithm agility (phased
introduction of new signature algorithms) anyway.

The drawbacks are twofold:

   -  The protocol does not allow the clients to select what
  they would like to get; they only can set a flag to say
  I do understand DNSSEC, please send the DNSSEC records
  you have with the answer.  So the authority or cache
  needs to send all signatures to every DNSSEC-aware client.

   -  Keys and signatures add significantly to the size of
  DNS responses, and there (still) are lots of obstacles
  out there in the wild to proper use the protocol mechanisms
  standardized long ago to cope with responses longer than
  512 octets:  EDNS, and DNS transport over TCP.
  Too many network elements raise sad hurdles, and IP
  fragmentation is a minefield.

Thus, widespread practice of regular double- (or triple-)signing
of DNS RRsets would most likely increase the order of magnitude of
failures to receive answers that lead to DNSSEC-verifiable results.

Hard luck.  Sigh!


Kind regards,
  Alfred Hönes.

-- 

+++
| TR-Sys Alfred Hoenes   |  Alfred Hoenes   Dipl.-Math., Dipl.-Phys.  |
| Gerlinger Strasse 12   |  Phone: (+49)7156/9635-0, Fax: -18 |
| D-71254  Ditzingen |  E-Mail:  a...@tr-sys.de |
+++

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: draft-ietf-dnsext-dnssec-gost

2010-02-16 Thread Basil Dolmatov



Martin Rex пишет:





What I don't understand is whether the deprecation applies to
GOST R34.10-1994 in general, 

Yes.

or only to GOST R34.10-1994 as a
signature algorithm.

No.



I am somewhat illiterate to crypto math, so I'm wondering whether
it is technicall possible to use a GOST R34.10-1994 key agreement
(ephemeral keys) in conjunction with GOST R34.10-2001 certssignatures,

Never ever interested. ;)

and if yes -- whether that is still permitted by russian authorities.

No.


I should correct myself, the check against relevant documentation showed 
that it was more prolonged grace period allowed by authorities.


The usage of GOST R 34.10-94 is fully prohibited starting 1 of January 2008.
With one exception: it is allowed to check signatures under already 
signed archived documents using this algorithm.


As for TLS, using GOST R 34.10-94, this is fully non-compliant to 
Russian standards and should not be used.


Definitely, noone can be obliged to follow this outside the Russia or 
when using crypto in home environment or something of the kind.


Nevertheless, I would consider following this as a strong guideline 
because of two thoughts:
 - first of all, I think there was some reason for creating and putting 
into operation of new standard, spending a lot on its preparation and 
transition to it (consider GOST 28147-89, which is active for 20 years)
 - no certified software/hardware will support deprecated algorithm, so 
there definitely will interoperability problems.


I would like to return to topic, which concerns with the document 
describing the DNSSec extension with GOST algoritm.
This document quotes RFC4357 as a reference to the used parameter set. 
Nothing more.


This document uses the only valid set of GOST algorithms for the purpose 
of usage in the DNSSec . In this document no TLS is used, no key 
agreement procedures are used, etc.


dol@

 new topic 

I think that the representation of GOST algorithms in IETF is relatively 
poor now. There should be several other documents which makes the 
structure and usage of these algorithms more clear for those who will be 
willing to implement it and for those who suddenly found it been 
implemented in his/her software/hardware already.
This work has been already started from publication of standards' 
translation to English as Informational RFCs to have some basiv 
reference point. Then, there should be other document, describing 
implementation of GOST algorithm in detail in the manner to which IETF 
community is used to (The style of Russian standards is really hard for 
comprehension). There will be a lot of issues (defining scopes, fixing 
parameter sets, setting OIDs, ensuring non-controversity with existing 
implementations, etc.) which have to be solved when preparing this 
document, some of them were quoted in different GOST-relevant 
discussions. All of these comments are carefully collected and I hope 
will help a lot when preparing this document.


dol@





-Martin


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: draft-ietf-dnsext-dnssec-gost

2010-02-16 Thread Andrew Sullivan
No hat.

On Tue, Feb 16, 2010 at 01:18:48PM +0300, Basil Dolmatov wrote:


 Martin Rex пишет:

 I am somewhat illiterate to crypto math, so I'm wondering whether
 it is technicall possible to use a GOST R34.10-1994 key agreement
 (ephemeral keys) in conjunction with GOST R34.10-2001 certssignatures,
 Never ever interested. ;)

To address Martin Rex's point, however, we would not need to know
whether the draft's editors were ever interested, but whether it is
technically possible.  This seems like a good (and so far unanswered)
question.

 The usage of GOST R 34.10-94 is fully prohibited starting 1 of January 2008.

Certainly, this prohibition is irrelevant.  We are not offering
technical interoperation documents _for a particular legal framework_,
but technical interoperation documents _for the Internet_.  The
documents must therefore assume that, if someone can come up with a
bad idea that is nevertheless consistent with the document in
question, someone will.  (If you doubt this, please examine the
Internet -- pretty much any part of it you like -- more carefully.)

So I think Martin's question is appropriate, and his suggestion
up-thread to be a good one.  The more specific the document can be
made, the better for all concerned.

A

-- 
Andrew Sullivan
a...@shinkuro.com
Shinkuro, Inc.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: draft-ietf-dnsext-dnssec-gost

2010-02-16 Thread Martin Rex
Andrew Sullivan wrote:
 
 On Tue, Feb 16, 2010 at 01:18:48PM +0300, Basil Dolmatov wrote:
 
  Martin Rex пишет:
  
  I am somewhat illiterate to crypto math, so I'm wondering whether
  it is technicall possible to use a GOST R34.10-1994 key agreement
  (ephemeral keys) in conjunction with GOST R34.10-2001 certssignatures,
  Never ever interested. ;)
 
 To address Martin Rex's point, however, we would not need to know
 whether the draft's editors were ever interested, but whether it is
 technically possible.  This seems like a good (and so far unanswered)
 question.

I'm sorry for the confusion and off-topic that I created in the discussion.

The dnssec-gost document appears to be OK in being very explicit and
constrained in its usage of GOST, requiring the GOST R34.10-2001
signature algorithm and implying a single parameter set (A) for
the signatures.

The deprecated GOST R34.10-1994 algorithm is a non-issue for dnssec-gost.
Ensuring that no reference to GOST signatures is without R34.10-2001
qualifier in the document should be sufficient to prevent any potential
confusion.

The use of GOST R34.11 for the hash algorithm should probably also be
changed to include the year GOST R34.11 to prevent confusion with
any future hash algorithms in the GOST R34.11 series.


Mandating a particular parameter set for an ECC crypto algorithm
is perfectly OK for interop.  Whether or not to include
a parameter set identifier in the DNS KEY RR is up to the DNSext
working group (Implementations of GOST are likely to know
all three GOST R34.10-2001 parameter sets listed in rfc-4357).


The byte order of GOST-related values seems to be confusing:

http://tools.ietf.org/html/draft-ietf-dnsext-dnssec-gost-06#section-3

   Quoting RFC 4490:

   The signature algorithm GOST R 34.10-2001 generates a digital
   signature in the form of two 256-bit numbers, r and s.  Its octet
   string representation consists of 64 octets, where the first 32
   octets contain the big-endian representation of s and the second 32
   octets contain the big-endian representation of r.


http://tools.ietf.org/html/draft-ietf-dnsext-dnssec-gost-06#section-4

   4. DS Resource Records

   GOST R 34.11-94 digest algorithm is denoted in DS RRs by the digest
   type {TBA2}.The wire format of a digest value is compatible with
   RFC4490 [RFC4490], that is digest is in little-endian representation.


Since there are already RFCs out there using GOST (CMS) and there
are implementations based on drafts (TLS) and maybe some under
evaluation (XMLsec) it seems a little late to ask for pure
ordering at this point in time.  Re-using the format/ordering
that is used in existing documents/protocols and implementations
appear to be OK to _me_.  IETF protocols provide more flexibility
at this point than e.g. ASN.1.  To me, it looks like there is
a little mess in GOST byte ordering in various usage scenarios,
so _I_ would not expect interop without interop testing, no matter
what ordering DNSsec defines. :-/


I really appreciate the mentioning of key and hash sizes in the
dnssec-gost document in section 5, because one can not easily
look it up in rfc-4357.  (It's in there, but not easy to determine).


-Martin
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: draft-ietf-dnsext-dnssec-gost

2010-02-16 Thread Ran Atkinson
All,

hHere are at least 2 issues under discussion within this thread.
I'd like to address them separately, but in the same note.

(1) Quality of GOST specification

While I'm very happy to see any algorithm publicly documented
in an I-D or RFC, I agree with Martin Rex that the current
RFC-4357 on GOST 3410-2001 is not sufficiently clear and 
complete to easily lead to entirely-independent interoperable 
implementations.  It ought to be possible for a non-Russian,
non-certified, implementation to interoperate with any other
implementation of the same algorithm -- from an implementer 
reading the RFC alone.

Martin Rex's notes to the IETF list:
A) http://www.ietf.org/mail-archive/web/ietf/current/msg60250.html
B) http://www.ietf.org/mail-archive/web/ietf/current/msg60253.html

I share Martin Rex's desire for some clarifications to that
fundamental document, and I also share his concern that the 
RFC specifying GOST does not specify what an implementation 
ought to do when it encounters signatures with other parameter 
sets.  Such a revision ought to make more clear, perhaps
in Security Considerations as Martin Rex earlier suggested,
that GOST-3410-2001 is entirely separate from GOST 3410-94.
That fact is NOT obvious from reading RFC-4357 and is quite
relevant to implementers (of either version) of GOST 3410.
In that revision to RFC-4357, I'd love to see an Appendix with 
some test vectors for GOST, as well.  Documenting a wide range
of suitable test vectors can be extremely helpful in verifying 
that a particular implementation of some algorithm is operating 
correctly, which in turn is fundamental to protocol interoperability.  
(RFC-4231 provides an example of test vectors for some other 
openly specified algorithms.)


(2) DNSsec use of GOST specification

For the several reasons various folks have already expressed 
on the IETF list, and also for the reasons above in (1), 
I share the view that GOST should be MAY rather than SHOULD 
for use in DNS Security.

Yours,

R. Atkinson


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: draft-ietf-dnsext-dnssec-gost

2010-02-16 Thread Phillip Hallam-baker

Perhaps it would help elucidate matters if we knew the precise criteria

In particular, is the requirement to support Gost or is it that all  
the algs used be approved


If the second case 1) what would be the root zone criteria and 2)  
would these regulation issues disappear if the root zone were  
differently managed?



Sent from my iPhone

On Feb 15, 2010, at 10:09 AM, Rex, Martin martin@sap.com wrote:





-Original Message-
   This document:


http://tools.ietf.org/html/draft-dolmatov-cryptocom-gost34102001-08

   says

   section 1.1:

  4. GOST R 34.10-2001 replaces GOST R 34.10-94.

   section 1,2:

  GOST R 34.10-2001 is developed to replace GOST R 34.10-94.


Both statement are right.


:-)

Both statements are completely useless.

AES is a replacement/successor to DES.
SHA-2 is a replacement to SHA-1.  So what?

Getting rfc-4357 published without the slightest indication
that the acceptibility of GOST R34.10-1994 had already expired
2 years before is a serious problem in that document.

What really confuses me is that software that there are
GOST toolkits shipped even today that support GOST R34.10-1994.

OpenSSL also contains an implementation of GOST R34.10-1994
and the GOST TLS ciphersuites draft also contains a ciphersuite
with a GOST R34.10-1994 signaturer algorithm.


In effect, whether and how much GOST R34.10-1994 is deprecated
remains a complete mystery.





2. GOST R 34.10-2001 was accepted and activated by the Act 380-st of
  12.09.2001 issued by the Russian federal committee for standards.

  ...

4. GOST R 34.10-2001 replaces GOST R 34.10-94.

So, GOST -1994 for digital signature _is_ deprecated and
replaced from 12.09.2001.

The transition period is not stated explicitly because it is
obvious from standard procedure of certification in Russia.



I would like to remind you that we are the IETF here, and
that implementations of DNS-SEC must remain possible without
an official certification in Russia.

DNS-SEC would not make much sense if it could not be used
by implementations that are _not_ certified in Russia.




   That information OUGHT to have been added to rfc-4357
and it ought to be
   added to draft-dolmatov-cryptocom-gost34102001-08.

Why?
Now is 2010, and all implementations of -1994 standard have
been completely phased out more than 5 years ago.



There seems to be a disagreement between this statement and
reality.

The GOST crypto toolkit shipped by the Company CryptoPro
(author behind rfc-4357 and draft-chudov-cryptopro-cptls-04)
still implements GOST R34.10-1994, and both documents
list GOST R34.10-1994 in a fashion that does _NOT_
suggest that this algorithm may no longer be used.

The GOST implementation in OpenSSL, provided by a different
russian company, also implements/provides GOST R34.10-1994.




This statement was inserted following the advice of Russ Housley.

The main reason for that was that this text is a
_translation_ of the text of official Russian state standard.
At the moment of its creation this text was thoroughly
checked with authors of original standard for consistency.
Any editorial changes/corrections could diverge the
translation from the original, which is undesirable.

I agreed with this Russ's reasoning.



I agree to the intent.

The words that were used are very inadequate and misleading.

This is not the first RFC that represents a republication of
a standard controlled by a different standardization body
or private entity.

Just use something like your explanation instead, and
it will likely have the desired effect on the comments
you receive for this document.

Random other example for how other RFCs have done this:

RFC-2986 (PKCS-10) http://tools.ietf.org/html/rfc2986

  Abstract

  This memo represents a republication of PKCS #10 v1.7 from RSA
  Laboratories' Public-Key Cryptography Standards (PKCS) series, and
  change control is retained within the PKCS process.  The body of  
this

  document, except for the security considerations section, is taken
  directly from the PKCS #9 v2.0 or the PKCS #10 v1.7 document.




I do understand that the structure and the style of these
documents are unfamiliar to the significant part of
community, but this is because of the fact it is
_a_translation_ of official standard text.
It is not a retelliing or compilation, it is a _translation_.

And it is intended to exist as a reference to the  origin,
when creating further IETF documents, which will be pure IETF
documents and will be commented and edited when necessary.



A republication only makes sense if it is sufficient to
understand and implement the technology.  If you respond
to a request for clarification with

because it is obvious from standard procedure of
certification in Russia.

then there may be a significant misunderstanding about
the purpose of informational RFC documents.  That only
makes sense if it is sufficiently complete and clear
to allow for independent interoperable implementations
of IETF 

Re: draft-ietf-dnsext-dnssec-gost

2010-02-16 Thread Phillip Hallam-baker
One point that seems to be ambiguous here is what the role of an rfc  
is with respect to defacto standards status


In theory informational rfc do not establish or modify standards. In  
practice the broken process that stops anything being a standard and  
makes those we do have obsolete means that this is not obvious


In my view a should or must in an informational rfc only has scope to  
the document itself. So the gost draft should use MUST or Should in my  
view


But I can see how this could confuse


Sent from my iPhone

On Feb 15, 2010, at 9:52 AM, Spencer Dawkins spen...@wonderhamster.org 
 wrote:



On one point in this discussion...

I'm not saying that everyone will SEE it, but there actually is an  
errata process for RFCs, and the omission of the year-version suffix  
in RFC 4357 seems like something that would be really helpful to  
submit an errata for.


Submission page is at http://www.rfc-editor.org/errata.php.

The errata link does show up on many hyperlinked versions of RFCs,  
so things aren't as bleak as they were ten years ago, to pick an  
interval.


Thanks,

Spencer

- Original Message - From: Martin Rex m...@sap.com
To: Basil Dolmatov d...@cryptocom.ru
Cc: ietf@ietf.org
Sent: Monday, February 15, 2010 8:20 AM
Subject: Re: draft-ietf-dnsext-dnssec-gost

 IMHO, rfc4357 should have been completely stripped from GOST  
R34.10-1994
 before publication if what you describes really applies to this   
algorithm.


I think that is a question to authors of RFC4357 and I think that
corrections should be issued.


There is no correction process for RFCs.

Preferably the new document about GOST R34.10 signature algorithms
should be merged with rfc4357 into rfc4357bis, and this time the
GOST R34.10-1994 algorithm should only be mentioned in the Security
Considerations as having been completely retired/phased out in 2004.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: draft-ietf-dnsext-dnssec-gost

2010-02-16 Thread Olafur Gudmundsson

On 15/02/2010 7:43 PM, Olafur Gudmundsson wrote:

On 15/02/2010 6:37 PM, Martin Rex wrote:

Mark Andrews wrote:


In message201002151420.o1fekcmx024...@fs4113.wdf.sap.corp, Martin
Rex writes
:

OK, I'm sorry. For the DNSsec GOST signature I-D, the
default/prefered (?)
parameter sets are explicitly listed in last paragraph of section 2
of draft-ietf-dnsext-dnssec-gost-06. However, it does _NOT_ say what to
do if GOST R34.10-2001 signatures with other parameter sets are
encountered.


Since each end adds the parameters and they are NOT transmitted this
can never happen. If one end was to change the parameters then nothing
would validate.



OK. I didn't know anything abouth DNSSEC when I entered the disussion...


Having scanned some of the available document (rfc-4034,rfc-4035,rfc-2536
and the expired I-D draft-ietf-dnsext-ecc-key-10.txt) I'm wondering
about the following:

- the DNS security algorithm tag ought to be GOST R34.10-2001
and not just GOST


This is a good point, adding a version label is a possiblity in this
case or just in the future cases, but I think slapping one on
this is fine.



- DSA and the expired ECC draft spell out the entire algorithm
parameters in the key RRs, which preclues having to assign
additional algorithm identifiers if a necessity comes up to
use different algorithm parameters.

DSA did not cover the case if the key is  1024 bit.
ECC draft was killed due to the fact it was impossible to guarantee that
a implementation supporting ECC would be able to handle all the
possible curves that the proposal allowed.



To clarify ECC draft killed == draft-ietf-dnsext-ecc-key

Olafur
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: draft-ietf-dnsext-dnssec-gost [Was: Re: IAB statement on the RPKI. ]

2010-02-16 Thread Martin Rex
Alfred =?hp-roman8?B?SM5uZXM=?= wrote:
 
 (Apparently, the subject lines have been messed up entirely
 on this list these days.  I tried to return to the actual
 subject, GOST signatures for DNSSEC.)
 
 
 I fear you are in danger of drawing the wrong conclusions based
 on incomplete information.
 
 (1)  non-protocol issues
 
  ... that Zones can carry both, a mandatory to implement signature
  (algorithm) and interoperable world-wide, and one that might
  be prefered in particular regions (or legislations) and can
  be evaluated in those areas by those who care (or which are
  obliged to care).
 
 If I understand correctly, the basic issue of those under GOST-related
 regulatory restrictions is that they are legally constrained to
 MUST NOT use other algorithms than GOST to produce digital signatures.
 
 That makes your smart proposal moot, AFAICS.  :-(

But they don't need to create digital signatures!

They only need to provide RRSIG RRs with MACs that the rest
of the world can use to perform integrity checks and data
origin authentication based on a common asymmetric crypto
algorithm for the purpose of interoperability when validating
DNS records.

None of registries in Russia needs to provide official
digital signatures (in any legally binding sense) in order
to make DNSsec work at the technical level.  The GOST-signed
RRSIG RRs can be the officially signed records, the other
is just a provision for technical interop of the MAC scheme
with DNSsec for the rest of the internet.

Any other approach just doesn't scale.   

IIRC, IPsec decided somewhere around 1995 that sacrificing interop
to accomodate crypto export regulation was a dead-end road
and not appropriate for an international standardization body.

Although, I might have missed that the IETF reverted its attitude
and is today catering everone and his dog's personal crypto preferences
in their protocols, dropping the burden on the implementors of the
technology, I think it would be the wrong approach.


What is the situation in IPsec with regards to GOST these days?


 
 (2)  protocol issues
 
  (are signatures and DNS KEYs in DNSsec really designed to be
  highlanders, i.e. there can only be one?)
 
 No, DNSSEC can use and carry multiple signatures.
 
 That's necessary for rekeying and algorithm agility (phased
 introduction of new signature algorithms) anyway.

That's what I assumed (and I found it in rfc-4033 3.1).


 
 The drawbacks are twofold:
 
-  The protocol does not allow the clients to select what
   they would like to get; they only can set a flag to say
   I do understand DNSSEC, please send the DNSSEC records
   you have with the answer.  So the authority or cache
   needs to send all signatures to every DNSSEC-aware client.

That looks like a defect in the protocol.

 
-  Keys and signatures add significantly to the size of
   DNS responses, and there (still) are lots of obstacles
   out there in the wild to proper use the protocol mechanisms
   standardized long ago to cope with responses longer than
   512 octets:  EDNS, and DNS transport over TCP.
   Too many network elements raise sad hurdles, and IP
   fragmentation is a minefield.
 
 Thus, widespread practice of regular double- (or triple-)signing
 of DNS RRsets would most likely increase the order of magnitude of
 failures to receive answers that lead to DNSSEC-verifiable results.
 
 Hard luck.  Sigh!


Probably the biggest mistake in DNSsec was to describe the data
that is used to verify RRs as digital signatures instead of
simply MACs based on asymmetric crypto algorithms.

All of the politics and flawed assumptions around PKI have prevented
the existing DNS registries to add RRSIGs to their zones many many
years ago -- which otherwise would have helped to iron out the
problems around the size of the DNS responses over the last decade.


-Martin
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: draft-ietf-dnsext-dnssec-gost

2010-02-15 Thread Martin Rex
Basil Dolmatov wrote:
 
 Martin Rex пишет:
 
  I'm still quite confused.
 
  All references to GOST signature algorithms of the kind
  [GOST3410] ought to be fixed to say [GOST3410-2001].

 I think that can de done, despite the fact that there is no other 
 algorithm coded as GOST 3410, except GOST 34.10-2001.

The problem is that there are IETF documents like rfc-4357 and like
the (currently expired) GOST TLS ciphersuites draft that still list
GOST R34.10-1994 as a valid algorithm.


  It seems it mixed up the (deprecated) signature Algorithm GOST R34.10-1994
  and the hash/digest algorith GOST R34.11-1994 that is still being used
  for signatures with GOST R34.10-2001.
 

 It seems that no mixture takes place. Signature standard has number 
 34.10, hash standard has number 34.11.
 I cannot see how they can be mixed up.

I'm sorry for the typo.  I meant to say that *I* mixed them up because
of their inconsistent naming throughout the GOST-related documents
that have been publshed as I-Ds and RFC.

That comes mainly from the goof-up in rfc4357 that leaves out the
-1994 appendix to the hash algorithm in the section header/contents
and tag name.


 
  IMHO, rfc4357 should have been completely stripped from GOST R34.10-1994
  before publication if what you describes really applies to this algorithm.
   
 I think that is a question to authors of RFC4357 and I think that 
 corrections should be issued.

There is no correction process for RFCs.

Preferably the new document about GOST R34.10 signature algorithms
should be merged with rfc4357 into rfc4357bis, and this time the
GOST R34.10-1994 algorithm should only be mentioned in the Security
Considerations as having been completely retired/phased out in 2004.


 
 
  Which is not really helpful.  Any specification referencing rfc-4357
  will now have to declare which kind of parameter sets (as defined in
  rfc-4357) should be used/accepted for which purpose and which
  parameter set is the default.
   
 Yes. And this is done in the draft text. Read it.

OK, I'm sorry.  For the DNSsec GOST signature I-D, the default/prefered (?)
parameter sets are explicitly listed in last paragraph of section 2
of draft-ietf-dnsext-dnssec-gost-06.  However, it does _NOT_ say what to
do if GOST R34.10-2001 signatures with other parameter sets are encountered.



I was confused by the I-D about the GOST R34.10-2001 digital signature
algorithm, where the possible parameters sets and their meaning are
specified to be pretty unspecified (page 7):

   GOST R 34.10-2001 does not determine the process of generating
   parameters needed for digital signature scheme. Possible sets of
   these parameters are defined for example in [RFC4357].


 
 Document - draft-ietf-dnsext-dnssec-gost-06 does not use any test
 parameters from RFC 4357 and does not reference any of them.


The dnssec document references rfc4357 for the definition of
the parameter sets, but fails to define what to do if signatures
with other parameter sets than the default/preferred one are
received.


-Martin
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: draft-ietf-dnsext-dnssec-gost

2010-02-15 Thread Stephen Kent

At 2:18 PM -0500 2/12/10, Edward Lewis wrote:

At 10:57 -0500 2/12/10, Stephen Kent wrote:


If we look at what the CP developed in the SIDR WG for the RPKI says, the
answer is the IESG (going forward, after an initial set of algs are adopted
based on the SIDR WG process). In the IPSEC, TLS, and SMIME contexts, the WGs
themselves have made the decisions, which the IESG then approves by virtue of
the usual standards track RFC approval process. I do not believe that the
criteria have been documented uniformly across these WGs.


What is CP?


Sorry for the acronym ambiguity. the CP is the certificate policy 
(for the RPKI).  Every major PKI has a CP. These documents follow the 
outline provided in RFC 3647.


Steve
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: draft-ietf-dnsext-dnssec-gost

2010-02-15 Thread Stephen Kent

At 8:50 AM -0800 2/12/10, David Conrad wrote:

On Feb 12, 2010, at 7:57 AM, Stephen Kent wrote:
 Who gets to decide on what algorithms get first class status and 
based on what criteria?
 If we look at what the CP developed in the SIDR WG for the RPKI 
says, the answer is the IESG


So, they're going to flip a coin or what?

Who is largely irrelevant.  The criteria is the interesting bit.


Both issues are relevant. Most of the other WGs dealing with this 
issue have been in  the secruity area and feel comfortable making 
these decisions. The IESG has been comfortable with their decisions. 
Note that change have been made, for other than technical reasons, 
e.g., initially TLS had DH 7 DSA as MUST and RSA as SHOULD, because 
of patent issues.  When the RSA patent expired, the roles were 
reversed. So the IESG has been an active participant in these 
decisions in the past.



  Steve brought up national algorithm, but we have also 
personal algorithms such as curve25519 or threefish.
 WGs like IPsec, TLS, and SMIME have been able to say no to 
personal algs for a long time.


IPsec, TLS, and SMIME are all one-to-one.  DNSSEC (in this context) 
is one-to-many.



Your observation is applicable to IPsec, not to S/MIME, and, for 
practical purposes, not for TLS.  An S/MIME message may be sent to 
multiple recipients, so it is not literally one-to-one. S/MIME 
accommodates algorithm diversity best for the public key algorithms 
used to encrypt the content encryption key.  It also can accommodate 
diversity for the algorithm used to sign the message, but at a higher 
cost. It does poorly if different recipients make use of different 
content encryption algorithms. TLS is nominally 1-1, but in reality, 
the vast majority of TLS use is for access to web sites that have a 
very diverse set of clients. That requires a small set of mandatory 
algorithms, to ensure interoperability.  Finally, the question  posed 
was about how have decisions on which algorithms are mandatory to 
implement have been decided in the IETF in the past. My reply 
addressed that question.




Regards,
-drc

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: draft-ietf-dnsext-dnssec-gost

2010-02-15 Thread Rex, Martin
 

 -Original Message-
   This document:
   
 
 http://tools.ietf.org/html/draft-dolmatov-cryptocom-gost34102001-08
   
   says
   
   section 1.1:
  
  4. GOST R 34.10-2001 replaces GOST R 34.10-94.
   
   section 1,2:
   
  GOST R 34.10-2001 is developed to replace GOST R 34.10-94.
 
 
 Both statement are right.

:-)

Both statements are completely useless.

AES is a replacement/successor to DES.
SHA-2 is a replacement to SHA-1.  So what?

Getting rfc-4357 published without the slightest indication
that the acceptibility of GOST R34.10-1994 had already expired
2 years before is a serious problem in that document.

What really confuses me is that software that there are
GOST toolkits shipped even today that support GOST R34.10-1994.

OpenSSL also contains an implementation of GOST R34.10-1994
and the GOST TLS ciphersuites draft also contains a ciphersuite
with a GOST R34.10-1994 signaturer algorithm.


In effect, whether and how much GOST R34.10-1994 is deprecated
remains a complete mystery.


   
 
 2. GOST R 34.10-2001 was accepted and activated by the Act 380-st of
12.09.2001 issued by the Russian federal committee for standards.
   
...
   
 4. GOST R 34.10-2001 replaces GOST R 34.10-94.
   
 So, GOST -1994 for digital signature _is_ deprecated and
 replaced from 12.09.2001.
   
 The transition period is not stated explicitly because it is
 obvious from standard procedure of certification in Russia.


I would like to remind you that we are the IETF here, and
that implementations of DNS-SEC must remain possible without
an official certification in Russia.

DNS-SEC would not make much sense if it could not be used
by implementations that are _not_ certified in Russia.


   
   That information OUGHT to have been added to rfc-4357 
 and it ought to be
   added to draft-dolmatov-cryptocom-gost34102001-08.
 
 Why? 
 Now is 2010, and all implementations of -1994 standard have 
 been completely phased out more than 5 years ago.


There seems to be a disagreement between this statement and
reality.

The GOST crypto toolkit shipped by the Company CryptoPro
(author behind rfc-4357 and draft-chudov-cryptopro-cptls-04)
still implements GOST R34.10-1994, and both documents
list GOST R34.10-1994 in a fashion that does _NOT_
suggest that this algorithm may no longer be used.

The GOST implementation in OpenSSL, provided by a different
russian company, also implements/provides GOST R34.10-1994.


 
 This statement was inserted following the advice of Russ Housley.
 
 The main reason for that was that this text is a 
 _translation_ of the text of official Russian state standard.
 At the moment of its creation this text was thoroughly 
 checked with authors of original standard for consistency.
 Any editorial changes/corrections could diverge the 
 translation from the original, which is undesirable.
 
 I agreed with this Russ's reasoning.


I agree to the intent.

The words that were used are very inadequate and misleading.

This is not the first RFC that represents a republication of
a standard controlled by a different standardization body
or private entity.

Just use something like your explanation instead, and
it will likely have the desired effect on the comments
you receive for this document.

Random other example for how other RFCs have done this:

RFC-2986 (PKCS-10) http://tools.ietf.org/html/rfc2986

   Abstract

   This memo represents a republication of PKCS #10 v1.7 from RSA
   Laboratories' Public-Key Cryptography Standards (PKCS) series, and
   change control is retained within the PKCS process.  The body of this
   document, except for the security considerations section, is taken
   directly from the PKCS #9 v2.0 or the PKCS #10 v1.7 document.


 
 I do understand that the structure and the style of these 
 documents are unfamiliar to the significant part of 
 community, but this is because of the fact it is 
 _a_translation_ of official standard text.
 It is not a retelliing or compilation, it is a _translation_.
 
 And it is intended to exist as a reference to the  origin, 
 when creating further IETF documents, which will be pure IETF 
 documents and will be commented and edited when necessary.


A republication only makes sense if it is sufficient to
understand and implement the technology.  If you respond
to a request for clarification with

because it is obvious from standard procedure of
 certification in Russia.

then there may be a significant misunderstanding about
the purpose of informational RFC documents.  That only
makes sense if it is sufficiently complete and clear
to allow for independent interoperable implementations
of IETF protocols.


-Martin
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: draft-ietf-dnsext-dnssec-gost

2010-02-15 Thread Spencer Dawkins

On one point in this discussion...

I'm not saying that everyone will SEE it, but there actually is an errata 
process for RFCs, and the omission of the year-version suffix in RFC 4357 
seems like something that would be really helpful to submit an errata for.


Submission page is at http://www.rfc-editor.org/errata.php.

The errata link does show up on many hyperlinked versions of RFCs, so things 
aren't as bleak as they were ten years ago, to pick an interval.


Thanks,

Spencer

- Original Message - 
From: Martin Rex m...@sap.com

To: Basil Dolmatov d...@cryptocom.ru
Cc: ietf@ietf.org
Sent: Monday, February 15, 2010 8:20 AM
Subject: Re: draft-ietf-dnsext-dnssec-gost


 IMHO, rfc4357 should have been completely stripped from GOST R34.10-1994
 before publication if what you describes really applies to this 
 algorithm.


I think that is a question to authors of RFC4357 and I think that
corrections should be issued.


There is no correction process for RFCs.

Preferably the new document about GOST R34.10 signature algorithms
should be merged with rfc4357 into rfc4357bis, and this time the
GOST R34.10-1994 algorithm should only be mentioned in the Security
Considerations as having been completely retired/phased out in 2004. 


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: draft-ietf-dnsext-dnssec-gost

2010-02-15 Thread Martin Rex
Basil Dolmatov wrote:
 
 Martin Rex пишет:
 
  I'm still quite confused.
 
  All references to GOST signature algorithms of the kind [GOST3410]
  ought to be fixed to say [GOST3410-2001].

 I think that can de done, despite the fact that there is no other 
 algorithm coded as GOST 3410, except GOST 34.10-2001.

Slightly OT:

There some more confusing aspect abouth GOST R34.10-

The math behind GOST bears some similarities with Diffie Helman (DH).

RFC-4357 describes VKO GOST R34.10-94 and VKO GOST R34.10-2001 
under a section called Key Derivation Algorithms, and defines
parameter sets for these algorithms.


To me, it looks like the GOST algorithms in RFC4357 would be better
described as Key agreement instead of Key Derivation algorithms
(consistent with the X.509v3 use of the terminology).
In detail, the key exchange algorithm for GOST in TLS seems to
significantly differ from DH key agreement.


What I don't understand is whether the deprecation applies to
GOST R34.10-1994 in general, or only to GOST R34.10-1994 as a
signature algorithm.


I am somewhat illiterate to crypto math, so I'm wondering whether
it is technicall possible to use a GOST R34.10-1994 key agreement
(ephemeral keys) in conjunction with GOST R34.10-2001 certssignatures,
and if yes -- whether that is still permitted by russian authorities.



-Martin
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: draft-ietf-dnsext-dnssec-gost

2010-02-15 Thread Mark Andrews

In message 201002151420.o1fekcmx024...@fs4113.wdf.sap.corp, Martin Rex writes
:
 OK, I'm sorry.  For the DNSsec GOST signature I-D, the default/prefered (?)
 parameter sets are explicitly listed in last paragraph of section 2
 of draft-ietf-dnsext-dnssec-gost-06.  However, it does _NOT_ say what to
 do if GOST R34.10-2001 signatures with other parameter sets are encountered.

Since each end adds the parameters and they are NOT transmitted this
can never happen.  If one end was to change the parameters then nothing
would validate.

Mark
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: draft-ietf-dnsext-dnssec-gost

2010-02-15 Thread Martin Rex
Mark Andrews wrote:
 
 In message 201002151420.o1fekcmx024...@fs4113.wdf.sap.corp, Martin Rex 
 writes
 :
  OK, I'm sorry.  For the DNSsec GOST signature I-D, the default/prefered (?)
  parameter sets are explicitly listed in last paragraph of section 2
  of draft-ietf-dnsext-dnssec-gost-06.  However, it does _NOT_ say what to
  do if GOST R34.10-2001 signatures with other parameter sets are encountered.
 
 Since each end adds the parameters and they are NOT transmitted this
 can never happen.  If one end was to change the parameters then nothing
 would validate.


OK.  I didn't know anything abouth DNSSEC when I entered the disussion...


Having scanned some of the available document (rfc-4034,rfc-4035,rfc-2536
and the expired I-D draft-ietf-dnsext-ecc-key-10.txt) I'm wondering
about the following:

  - the DNS security algorithm tag ought to be GOST R34.10-2001
and not just GOST

  - DSA and the expired ECC draft spell out the entire algorithm
parameters in the key RRs, which preclues having to assign
additional algorithm identifiers if a necessity comes up to
use different algorithm parameters.

Wouldn't it be sensible to do the same for GOST R34.10-2001 keys --
i.e. list the parameter set as part of the public key data?
Given the procedure of the standardization body that defines GOST
the parameter set OID could be used in alternative to spelling
out each of the element in the parameter set in full.
Implying the paramter set A for the GOST R34.10-2001 algorithm does
not seem very agile, given the limited number range for the algorithm
field in DNS security.

Given the differences between -1994 and -2001 versions,
any successor GOST R34.10-201X standard may not be able to reuse
the DNSKEY record anyway and need a new algorithm identifier.
And at that point, an unqualified label GOST would become
ambiguous. 

As previously mentioned, current uses of GOST R34.11 should be
changed to GOST R34.11-1994 as well (prevent ambiguity with a
future/updated hash algorithm for GOST).


-Martin
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: draft-ietf-dnsext-dnssec-gost

2010-02-15 Thread Olafur Gudmundsson

On 15/02/2010 6:37 PM, Martin Rex wrote:

Mark Andrews wrote:


In message201002151420.o1fekcmx024...@fs4113.wdf.sap.corp, Martin Rex writes
:

OK, I'm sorry.  For the DNSsec GOST signature I-D, the default/prefered (?)
parameter sets are explicitly listed in last paragraph of section 2
of draft-ietf-dnsext-dnssec-gost-06.  However, it does _NOT_ say what to
do if GOST R34.10-2001 signatures with other parameter sets are encountered.


Since each end adds the parameters and they are NOT transmitted this
can never happen.  If one end was to change the parameters then nothing
would validate.



OK.  I didn't know anything abouth DNSSEC when I entered the disussion...


Having scanned some of the available document (rfc-4034,rfc-4035,rfc-2536
and the expired I-D draft-ietf-dnsext-ecc-key-10.txt) I'm wondering
about the following:

   - the DNS security algorithm tag ought to be GOST R34.10-2001
 and not just GOST


This is a good point, adding a version label is a possiblity in this
case or just in the future cases, but I think slapping one on
this is fine.



   - DSA and the expired ECC draft spell out the entire algorithm
 parameters in the key RRs, which preclues having to assign
 additional algorithm identifiers if a necessity comes up to
 use different algorithm parameters.

DSA did not cover the case if the key is  1024 bit.
ECC draft was killed due to the fact it was impossible to guarantee that
a implementation supporting ECC would be able to handle all the
possible curves that the proposal allowed.




 Wouldn't it be sensible to do the same for GOST R34.10-2001 keys --
 i.e. list the parameter set as part of the public key data?
 Given the procedure of the standardization body that defines GOST
 the parameter set OID could be used in alternative to spelling
 out each of the element in the parameter set in full.
 Implying the paramter set A for the GOST R34.10-2001 algorithm does
 not seem very agile, given the limited number range for the algorithm
 field in DNS security.

For interoperability reasons we WANT MINIMAL flexibility for 
implementors/users. Thus we stripped all that out and picked ONE

possible GOST/2001 curve.


Given the differences between -1994 and -2001 versions,
any successor GOST R34.10-201X standard may not be able to reuse
the DNSKEY record anyway and need a new algorithm identifier.
And at that point, an unqualified label GOST would become
ambiguous.


see above,


Olafur (document shepeard)
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: draft-ietf-dnsext-dnssec-gost

2010-02-13 Thread Basil Dolmatov




Martin Rex :

  Basil Dolmatov wrote:
  
  
Martin Rex :


  Whether and how much the -1994 version is
deprecated is also a complete mystery.  
  

It is written in the text of GOST -2001

  
  
Which document are you refering to when you say "text of GOST -2001" ?


This document:

  http://tools.ietf.org/html/draft-dolmatov-cryptocom-gost34102001-08

says

section 1.1:
   
   4. GOST R 34.10-2001 replaces GOST R 34.10-94.

section 1,2:

   GOST R 34.10-2001 is developed to replace GOST R 34.10-94.
  

Both statement are right.

  

  
  



   2. GOST R 34.10-2001 was accepted and activated by the Act 380-st of
  

12.09.2001 issued by the Russian federal committee for standards.

...

4. GOST R 34.10-2001 replaces GOST R 34.10-94.

So, GOST -1994 for digital signature _is_ deprecated and replaced from 
12.09.2001.

The transition period is not stated explicitly because it is obvious 
from standard procedure of certification in Russia.

No certificate can be issued for any hardware/software using -1994 
algorithm after 12.09.2001 and the certification period is 3 years.

So, after 12.09.2004 there can be no operating hardware/software using 
-1994 algorithm.

  
  

That information OUGHT to have been added to rfc-4357 and it ought to be
added to draft-dolmatov-cryptocom-gost34102001-08.


  

Why? 
Now is 2010, and all implementations of -1994 standard have been
completely phased out more than 5 years ago.



  I just found the following paragraph in the Copyright Notice of

   http://tools.ietf.org/html/draft-dolmatov-cryptocom-gost34102001-08

on the title page which irritates me:

   This document may not be modified, and derivative works of it may
   not be created, except to format it for publication as an RFC or to
   translate it into languages other than English.


Is there a new trend to have the IETF rubber stamp documents as is?

To me, this statement precludes editorial changes/corrections,
which doesn't sound right.

I boldly assumed the original name of the IETF documents "RFC"
mean "Request For Comment", in the form that the community was
asked for feedback (request for clarifications, correction or
changes) before document was published.

At least this is how I understand "The Tao of the IETF"

http://tools.ietf.org/html/rfc4677#section-8.1


Although the IETF may not have "change control" for the technical
contents described in informational document, a complete absence
of change control of document structure, clarity, detail of
explanation and editorial issues would come as a suprise to me...

  

This statement was inserted following the advice of Russ Housley.

The main reason for that was that this text is a _translation_ of the
text of official Russian state standard.
At the moment of its creation this text was thoroughly checked with
authors of original standard for consistency.
Any editorial changes/corrections could diverge the translation from
the original, which is undesirable.

I agreed with this Russ's reasoning.

I do understand that the structure and the style of these documents are
unfamiliar to the significant part of community, but this is because of
the fact it is _a_translation_ of official standard text.
It is not a retelliing or compilation, it is a _translation_.

And it is intended to exist as a reference to the origin, when
creating further IETF documents, which will be pure IETF documents and
will be commented and edited when necessary.


  
-Martin

  


dol@



___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: draft-ietf-dnsext-dnssec-gost

2010-02-13 Thread Basil Dolmatov

Martin Rex пишет:


I'm still quite confused.

All references to GOST signature algorithms of the kind [GOST3410] ought to be 
fixed to say [GOST3410-2001].
  
I think that can de done, despite the fact that there is no other 
algorithm coded as GOST 3410, except GOST 34.10-2001.

It seems it mixed up the (deprecated) signature Algorithm GOST R34.10-1994
and the hash/digest algorith GOST R34.11-1994 that is still being used
for signatures with GOST R34.10-2001.

  
It seems that no mixture takes place. Signature standard has number 
34.10, hash standard has number 34.11.

I cannot see how they can be mixed up.


RFC-4357 was published in January 2006, i.e. after GOST signature
algorithm R34.10-1994 algorithm was deprecated (12.09.2001) and
after which is must no longer be used (12.09.2004) according to
your description.  The GOST TLS ciphersuite document still defines
and uses the deprecated signature algorithm...


IMHO, rfc4357 should have been completely stripped from GOST R34.10-1994
before publication if what you describes really applies to this algorithm.
  
I think that is a question to authors of RFC4357 and I think that 
corrections should be issued.




Which is not really helpful.  Any specification referencing rfc-4357
will now have to declare which kind of parameter sets (as defined in
rfc-4357) should be used/accepted for which purpose and which
parameter set is the default.
  

Yes. And this is done in the draft text. Read it.


 Corresponding public key parameters are those identified by
   id-GostR3410-2001-CryptoPro-A-ParamSet (1.2.643.2.2.35.1) [RFC4357 
http://tools.ietf.org/html/rfc4357],
   and the digest parameters are those identified by
   id-GostR3411-94-CryptoProParamSet (1.2.643.2.2.30.1) [RFC4357 
http://tools.ietf.org/html/rfc4357].
  

No confusions, no ambiguity.

The purpose, existance and semantics of the test algorithm parameter
sets are particularly confusing.
  


Document -

draft-ietf-dnsext-dnssec-gost-06
does not use any test parameters from RFC 4357 and does not reference 
any of them.



HTH,

dol@

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: draft-ietf-dnsext-dnssec-gost

2010-02-13 Thread ned+ietf

 I agree with Steve and others saying that MAY is appropriate
 for this.

This looks like the right approach to me as well.

Ned
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: draft-ietf-dnsext-dnssec-gost

2010-02-12 Thread Basil Dolmatov



Martin Rex пишет:


Admittedly, I know very little about the cryptographic
details, but there are two GOST signature algorithms
(GOST R34.10-1994 and GOST R34.10-2001). The earlier
appears to bear some similarity with DH, the newer appears to bear
similarity with ECDH.  



Whether and how much the -1994 version is
deprecated is also a complete mystery.  

It is written in the text of GOST -2001




 2. GOST R 34.10-2001 was accepted and activated by the Act 380-st of

   12.09.2001 issued by the Russian federal committee for standards.

   ...

   4. GOST R 34.10-2001 replaces GOST R 34.10-94.

So, GOST -1994 for digital signature _is_ deprecated and replaced from 
12.09.2001.


The transition period is not stated explicitly because it is obvious 
from standard procedure of certification in Russia.


No certificate can be issued for any hardware/software using -1994 
algorithm after 12.09.2001 and the certification period is 3 years.


So, after 12.09.2004 there can be no operating hardware/software using 
-1994 algorithm.


Just that simple. ;)

dol@
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: draft-ietf-dnsext-dnssec-gost

2010-02-12 Thread Basil Dolmatov



Paul Hoffman пишет:



For example, there is already a published attack on the GOST hash function that does not exist in SHA-256 and SHA-512. 


That attack lessens the complexity of building of the collision from 
2**128 operations to 2**109 operations (infinitesimal part of overall 
complexity) and demands padding the meaningful message with several 
kilobytes of additional binary data, which is impossible for any message 
with fixed format.
The GOST algorithms have had much less cryptographic review than other algorithms. 

...have had much less _published_ cryptographic review... I would say. ;)

These algorithms were thoroughly and intensively reviewed by specialists 
 throughout the world during all years of their existence.


The fact that these algorithms are used without changes for 20, 15 and 
10 years respectively shows that these reviews were not successful.



If that attack becomes practical, an attacker can create signatures using GOST 
that he/she could not create in RSA/SHA-256 or RSA/SHA-512.
That attack cannot become practical and you know that as well as 
everyone who works with cryptography.





dol@


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: draft-ietf-dnsext-dnssec-gost

2010-02-12 Thread Stephen Farrell

I agree with Steve and others saying that MAY is appropriate
for this.

S.

Stephen Kent wrote:
 I recommend that the document not be approved by the IESG in its current
 form.  Section 6.1 states:
 
 6.1.  Support for GOST signatures

DNSSEC aware implementations SHOULD be able to support RRSIG and
DNSKEY resource records created with the GOST algorithms as
defined in this document.
 
 There has been considerable discussion on the security area directorate
 list about this aspect of the document. All of the SECDIR members who
 participated in the discussion argued that the text in 6.1 needs to be
 changed to MAY from SHOULD. The general principle cited in the
 discussion has been that national crypto algorithms like GOST ought
 not be cited as MUST or SHOULD in standards like DNESEC. I refer
 interested individuals to the SECDIR archive for details of the discussion.
 
 (http://www.ietf.org/mail-archive/web/secdir/current/maillist.html)
 
 Steve
 ___
 Ietf mailing list
 Ietf@ietf.org
 https://www.ietf.org/mailman/listinfo/ietf
 
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: draft-ietf-dnsext-dnssec-gost

2010-02-12 Thread Andrew Sullivan
On Fri, Feb 12, 2010 at 03:12:30PM +0300, Basil Dolmatov wrote:

 ...have had much less _published_ cryptographic review... I would say. ;)

I am not a security expert, but I've never met one who thought that
unpublished cryptographic review was worth a dime.  Moreover, for the
purposes of the IETF, if something isn't published it might as well
not exist: we have no way of knowing one way or the other.

If you mean published to a limited and vetted community of
NDA-covered experts, that might yield different conclusions about the
value of the review (depending I guess on how free those experts think
they are to disagree).  But it would have no effect on the value of
those reviews for IETF purposes, which just depends on the publication
(and, actually, publication in a language the community can
understand).

I have no feelings about the merits of the algorithm.  But there are
too many side issues in this discussion already without us getting
into a battle of whether the review is adequate: the reviews aren't
apparently available as far as this community is concerned,
unfortunately, even if they've been done

A

-- 
Andrew Sullivan
a...@shinkuro.com
Shinkuro, Inc.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: draft-ietf-dnsext-dnssec-gost

2010-02-12 Thread Stephen Kent

...
As a document shepeard I have made note that this is desired, but at
the same time this is a topic that was outside the scope of the working
group.
This is on the other hand a topic that belongs in the IETF review.

So my questions to the IETF (paraphrashing George Orwell)

Are all crypto algorithms equal, but some are more equal than others?


not all are equal, from a purely cryptanalytic perspective. Among those that
may be equivalent from that perspective, there are other meaningful 
differences, e.g., how widely are the algs implemented and used.


Who gets to decide on what algorithms get first class status and 
based on what criteria?


If we look at what the CP developed in the SIDR WG for the RPKI says, 
the answer is the IESG (going forward, after an initial set of algs 
are adopted based on the SIDR WG process). In the IPSEC, TLS, and 
SMIME contexts, the WGs themselves have made the decisions, which the 
IESG then approves by virtue of the usual standards track RFC 
approval process. I do not believe that the criteria have been 
documented uniformly across these WGs.


Steve brought up national algorithm, but we have also personal 
algorithms such as curve25519 or threefish.


WGs like IPsec, TLS, and SMIME have been able to say no to personal 
algs for a long time.


Steve
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: draft-ietf-dnsext-dnssec-gost

2010-02-12 Thread Martin Rex
Basil Dolmatov wrote:
 
 Martin Rex пишет:
 
  Admittedly, I know very little about the cryptographic
  details, but there are two GOST signature algorithms
  (GOST R34.10-1994 and GOST R34.10-2001). The earlier
  appears to bear some similarity with DH, the newer appears to bear
  similarity with ECDH.  
 
  Whether and how much the -1994 version is
  deprecated is also a complete mystery.  

 It is written in the text of GOST -2001
 
 
 
   2. GOST R 34.10-2001 was accepted and activated by the Act 380-st of
 12.09.2001 issued by the Russian federal committee for standards.
 
 ...
 
 4. GOST R 34.10-2001 replaces GOST R 34.10-94.
 
 So, GOST -1994 for digital signature _is_ deprecated and replaced from 
 12.09.2001.
 
 The transition period is not stated explicitly because it is obvious 
 from standard procedure of certification in Russia.
 
 No certificate can be issued for any hardware/software using -1994 
 algorithm after 12.09.2001 and the certification period is 3 years.
 
 So, after 12.09.2004 there can be no operating hardware/software using 
 -1994 algorithm.
 
 Just that simple. ;)


I'm still quite confused.

All references to GOST signature algorithms of the kind [GOST3410] 
ought to be fixed to say [GOST3410-2001].

It seems it mixed up the (deprecated) signature Algorithm GOST R34.10-1994
and the hash/digest algorith GOST R34.11-1994 that is still being used
for signatures with GOST R34.10-2001.


RFC-4357 was published in January 2006, i.e. after GOST signature
algorithm R34.10-1994 algorithm was deprecated (12.09.2001) and
after which is must no longer be used (12.09.2004) according to
your description.  The GOST TLS ciphersuite document still defines
and uses the deprecated signature algorithm...


IMHO, rfc4357 should have been completely stripped from GOST R34.10-1994
before publication if what you describes really applies to this algorithm.

Unfortunately, rfc-4357 does _not_even_mention_ that GOST R34.10-1994
is deprecated and must no longer be used, and is at the same time
abiguous about the name of the Hash algorithm.  The table of
contents and section heading call it only GOSTR3411.


Regarding key size confusion of the old signature algorithm
in rfc-4357:

GOST R34.10-94:
 non givenRFC-4357  5.1. VKO GOST R 34.10-94
 512 or 1024  RFC-4357  8.3. GOST R 34.10-94 Public Key Algorithm Parameters


GOST R34.10-2001:
 512  RFC-4357  5.2. VKO GOST R 34.10-2001
 none given   RFC-4357  8.4. GOST R 34.10-2001 Public Key Algorithm Parameters


RFC-4357 Security Considerations says the following about the
parameters sets (for signature and the hash algorithm):

   Use of the test parameter sets or parameter sets not described herein
   is NOT RECOMMENDED.  When different parameters are used, it is
   RECOMMENDED that they be subjected to examination by an authorized
   agency with approved methods of cryptographic analysis.


Which is not really helpful.  Any specification referencing rfc-4357
will now have to declare which kind of parameter sets (as defined in
rfc-4357) should be used/accepted for which purpose and which
parameter set is the default.

The purpose, existance and semantics of the test algorithm parameter
sets are particularly confusing.


-Martin
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-ietf-dnsext-dnssec-gost (...) to Proposed Standard

2010-02-12 Thread Alfred Hönes
(1)
There's a serious issue deeply buried in this draft,
   draft-ietf-dnsext-dnssec-gost-06.

Let's start from a general PoV:

The signature algorithm used by this document targeted for PS is an
elliptical curve cryptography (ECC) algorithm.

Most international and national standards, including Standards Track
RFCs, have adopted the generic presentation formats for the parameters
to be passed in and out of the (software/hardware) 'black boxes'
implementing ECC originally specified in the SEC-1 Standard.
What matters for DNSSEC is the representation of ECC public keys.
These are points on an elliptic curve over a finite field.

In DNSEXT I had requested that this draft also make use of the
basic ECpoint format commonly used in other protocols and most
standards for the representation of its public keys in DNSSEC
resource records.  This should further modularity and thus likely
increase software quality and hence security.

However, the authors have harshly rejected this call for uniformity,
based on a few specialized implementations where the implementers
apparently have not been aware of more than a decade of standardization
efforts for ECC.
I did not keep this discussion on namedroppers because IMHO this is
a question at the architectural level that needs to be dealt with in
the IETF at large.

I therefore repeat here my request to replace the ad-hoc representation
of the EC public keys in the draft with the ECpoint format described in
the SEC-1 standard; in particular, Algorithms 2.3.3 and 2.3.4 of SEC-1
describe the conversion of an abstract EC point into an octet string
and vice versa, respectively.  These algorithms should be used to
encode/decode the wire format of the EC points used as publik keys.
The abstraction provided by these algorithms allows implementations
to use any internal representation of EC points they seem fit but
make use of an interface that is not different from that for other
EC algorithms.

Admittedly, the IETF had been lulled some time ago and missed putting
emphasis on homogenous interfaces when RFCs 4490 and 4491 have been
adopted, and these two RFCs suffer from a similar deficiency.
I have filed defect reports as Technical Errata against these RFCs
(EID=1884 and 1885, respectively) to raise awareness of this issue.

I expect that a document that seeks adoption on the Standards Track
does not violate current IETF Full Standards.
STD 13, RFC 1035 specifies the byte order of all numeric quantities
used on the wire in the DNS.  The last paragraph of Section 2.3.2
is rather explicit in specifying network byte order:

   Similarly, whenever a multi-octet field represents a numeric
quantity the left most bit of the whole field is the most
significant bit.  When a multi-octet quantity is transmitted the
most significant octet is transmitted first.

The document in LC, as it stands, introduces mixed endian-ness into
the DNS wire protocol.  This is not explicit in the draft because it
for this purpose refers to another RFC that suffers from a similar
defect.
I strongly oppose to this violation of architectural principles
and request a change of the wire format specification in the draft.

(2)
I also concur with Steve and Paul that it is premature to have a
SHOULD implementation requirement for a combination of cryptographic
algorithms that arguably are less strong than the state-of-the-art
assumes, and that only recently have seen starting in-depth
discussion in the scientific cryptanalytical community.

We should wait until the translations of the old specifications
of the basic GOST algorithms into English have been published
on the Independent Submission stream (all three documents have
already advanced to RFC-EDITOR state this week) and then for the
world-wide international cryptanalytical community having had
sufficient time to scrutinize the fundamental algorithms (or find
[more] weeknesses therein) before we ever consider making SHOULD
or MUST implement requirements for such algorithms' support in
fundamental Internet protocols (like the DNS).

Reportedly there are serious concerns regarding the small block
size used in the GOST hash algorithm.  It sounds strange in the
age of announced dawn of SHA-1 for digital signatures to step back
now that a global open effort is on its way (under the auspices
of NIST) for the development and adoption of a state-of-the-art,
next-generation hash standard (dubbed preliminarily SHA-3).
This is not a concern of practical cryptanalytical threats against
(rather short-lived) DNSSEC, but of a general desire to get rid of
weaker algorithms in crypto-toolkits, in order to avoid their
accidental use (e.g. by misguided poor configuration or as a result
of downgrading attacks) in circumstances where it _does_ matter.

(3)
I also concur with Andrew that having different requirement levels
in a fundamental protocol that does not allow negotiation of
crypto-algorithms also causes severe deployability concerns.
This 'inability to negotiate

Re: draft-ietf-dnsext-dnssec-gost

2010-02-12 Thread David Conrad
On Feb 12, 2010, at 7:57 AM, Stephen Kent wrote:
 Who gets to decide on what algorithms get first class status and based on 
 what criteria?
 If we look at what the CP developed in the SIDR WG for the RPKI says, the 
 answer is the IESG

So, they're going to flip a coin or what?

Who is largely irrelevant.  The criteria is the interesting bit.

 Steve brought up national algorithm, but we have also personal 
 algorithms such as curve25519 or threefish.
 WGs like IPsec, TLS, and SMIME have been able to say no to personal algs 
 for a long time.

IPsec, TLS, and SMIME are all one-to-one.  DNSSEC (in this context) is 
one-to-many.

Regards,
-drc

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


A clarification of what I said (was Re: Last Call: draft-ietf-dnsext-dnssec-gost . . . )

2010-02-12 Thread Andrew Sullivan
On Fri, Feb 12, 2010 at 12:29:00AM +0100, Alfred Hönes wrote:

 (3)
 I also concur with Andrew that having different requirement levels
 in a fundamental protocol that does not allow negotiation of
 crypto-algorithms also causes severe deployability concerns.

I want to be perfectly clear: I did not say that; neither did I imply
it.  I don't know that I believe it.  The statement to which I think
you are referring was merely an attempt to focus the discussion opened
by my esteemed co-Chair, thereby to make sure that we stick to the
question of picking algorithm support levels _for DNSSEC_, and not in
general.  So I was pointing out a feature of DNSSEC that is different
from at least some other contexts.

For the record, I refuse to have a personal opinion one way or the
other on what the IESG should do with the draft in question.  I
believe the WG decided to support its publication, and in my capacity
as Chair I feel duty-bound to promote that support.  I am not the
shepherd for this document, however, and I have no stake in the
outcome.

Best,

A

-- 
Andrew Sullivan
a...@shinkuro.com
Shinkuro, Inc.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: draft-ietf-dnsext-dnssec-gost

2010-02-12 Thread Edward Lewis

At 10:57 -0500 2/12/10, Stephen Kent wrote:


If we look at what the CP developed in the SIDR WG for the RPKI says, the
answer is the IESG (going forward, after an initial set of algs are adopted
based on the SIDR WG process). In the IPSEC, TLS, and SMIME contexts, the WGs
themselves have made the decisions, which the IESG then approves by virtue of
the usual standards track RFC approval process. I do not believe that the
criteria have been documented uniformly across these WGs.


What is CP?


At 15:11 -0500 2/11/10, Olafur Gudmundsson wrote:

Steve brought up national algorithm, but we have also personal
algorithms such as curve25519 or threefish.


WGs like IPsec, TLS, and SMIME have been able to say no to personal algs
for a long time.


I've asked this before (see 
http://www.ops.ietf.org/lists/namedroppers/namedroppers.2009/msg03057.html): 
what is a national algorithm?  I asked that in the DNSEXT WG and 
didn't get a response.  There's a definition in 
http://www.ietf.org/mail-archive/web/secdir/current/msg01343.html but 
from that I can't distinguish between Skipjack (in that it is labeled 
as national) and DES (not-national but published by [US] NIST as 
FIPS).


But in the bigger picture, for different reasons, I think the 
SHOULD in question be removed/changed.  I think it is up to an 
implementor to choose whether they implement something or not, 
support RFC wxyz or not.  And it is up to the RFP write to require it 
or not.  I don't think any RFC can MUST itself into existence.


PS - I think Olafur meant private algorithms not personal 
algorithms.  See 
http://www.iana.org/assignments/dns-sec-alg-numbers/dns-sec-alg-numbers.xhtml, 
registrations for 253 and 254.


--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis 
NeuStarYou can leave a voice message at +1-571-434-5468


As with IPv6, the problem with the deployment of frictionless surfaces is
that they're not getting traction.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: draft-ietf-dnsext-dnssec-gost

2010-02-12 Thread Sean Turner

Edward Lewis wrote:

At 10:57 -0500 2/12/10, Stephen Kent wrote:


If we look at what the CP developed in the SIDR WG for the RPKI says, the
answer is the IESG (going forward, after an initial set of algs are 
adopted
based on the SIDR WG process). In the IPSEC, TLS, and SMIME contexts, 
the WGs
themselves have made the decisions, which the IESG then approves by 
virtue of

the usual standards track RFC approval process. I do not believe that the
criteria have been documented uniformly across these WGs.


What is CP?


Certificate Policy: http://www.ietf.org/id/draft-ietf-sidr-cp-08.txt

spt
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: draft-ietf-dnsext-dnssec-gost

2010-02-12 Thread Olafur Gudmundsson

On 12/02/2010 2:18 PM, Edward Lewis wrote:

At 10:57 -0500 2/12/10, Stephen Kent wrote:



PS - I think Olafur meant private algorithms not personal algorithms.
See
http://www.iana.org/assignments/dns-sec-alg-numbers/dns-sec-alg-numbers.xhtml,
registrations for 253 and 254.

No I meant exaclty what I wrote. Personal algorithm is an algorithm 
develeoped by a person or a group of people that are not state 
sponsored thus the examples I provided.


Olafur


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: draft-ietf-dnsext-dnssec-gost

2010-02-12 Thread Martin Rex
Basil Dolmatov wrote:
 
 Martin Rex пишет:
  
  Whether and how much the -1994 version is
  deprecated is also a complete mystery.  

 It is written in the text of GOST -2001

Which document are you refering to when you say text of GOST -2001 ?


This document:

  http://tools.ietf.org/html/draft-dolmatov-cryptocom-gost34102001-08

says

section 1.1:
   
   4. GOST R 34.10-2001 replaces GOST R 34.10-94.

section 1,2:

   GOST R 34.10-2001 is developed to replace GOST R 34.10-94.


 
 
   2. GOST R 34.10-2001 was accepted and activated by the Act 380-st of
 12.09.2001 issued by the Russian federal committee for standards.
 
 ...
 
 4. GOST R 34.10-2001 replaces GOST R 34.10-94.
 
 So, GOST -1994 for digital signature _is_ deprecated and replaced from 
 12.09.2001.
 
 The transition period is not stated explicitly because it is obvious 
 from standard procedure of certification in Russia.
 
 No certificate can be issued for any hardware/software using -1994 
 algorithm after 12.09.2001 and the certification period is 3 years.
 
 So, after 12.09.2004 there can be no operating hardware/software using 
 -1994 algorithm.


That information OUGHT to have been added to rfc-4357 and it ought to be
added to draft-dolmatov-cryptocom-gost34102001-08.


I just found the following paragraph in the Copyright Notice of

   http://tools.ietf.org/html/draft-dolmatov-cryptocom-gost34102001-08

on the title page which irritates me:

   This document may not be modified, and derivative works of it may
   not be created, except to format it for publication as an RFC or to
   translate it into languages other than English.


Is there a new trend to have the IETF rubber stamp documents as is?

To me, this statement precludes editorial changes/corrections,
which doesn't sound right.

I boldly assumed the original name of the IETF documents RFC
mean Request For Comment, in the form that the community was
asked for feedback (request for clarifications, correction or
changes) before document was published.

At least this is how I understand The Tao of the IETF

http://tools.ietf.org/html/rfc4677#section-8.1


Although the IETF may not have change control for the technical
contents described in informational document, a complete absence
of change control of document structure, clarity, detail of
explanation and editorial issues would come as a suprise to me...


-Martin
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-ietf-dnsext-dnssec-gost (Use of GOST signature algorithms in DNSKEY and RRSIG Resource Records for DNSSEC) to Proposed Standard

2010-02-11 Thread Dmitry Morozovsky
Dear colleagues,

We, RiNet ISP, being one of the middle-sized providers in Moscow RU, would like 
to support the proposed document due to constantly increasing both needs for 
securing (here, in terms of being verifiable) communications and legal issues 
with implementing cryptography in Russian Federation.

Thank you.

-- 
Sincerely,
D.Marck [DM5020, MCK-RIPE, DM3-RIPN]
[ FreeBSD committer: ma...@freebsd.org ]

*** Dmitry Morozovsky --- D.Marck --- Wild Woozle --- ma...@rinet.ru ***

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


draft-ietf-dnsext-dnssec-gost

2010-02-11 Thread Stephen Kent
I recommend that the document not be approved by the IESG in its 
current form.  Section 6.1 states:



6.1.  Support for GOST signatures

   DNSSEC aware implementations SHOULD be able to support RRSIG and
   DNSKEY resource records created with the GOST algorithms as
   defined in this document.


There has been considerable discussion on the security area 
directorate list about this aspect of the document. All of the SECDIR 
members who participated in the discussion argued that the text in 
6.1 needs to be changed to MAY from SHOULD. The general principle 
cited in the discussion has been that national crypto algorithms 
like GOST ought not be cited as MUST or SHOULD in standards like 
DNESEC. I refer interested individuals to the SECDIR archive for 
details of the discussion.


(http://www.ietf.org/mail-archive/web/secdir/current/maillist.html)

Steve
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: draft-ietf-dnsext-dnssec-gost

2010-02-11 Thread Paul Hoffman
At 12:57 PM -0500 2/11/10, Stephen Kent wrote:
I recommend that the document not be approved by the IESG in its current form. 
 Section 6.1 states:

6.1.  Support for GOST signatures

   DNSSEC aware implementations SHOULD be able to support RRSIG and
   DNSKEY resource records created with the GOST algorithms as
   defined in this document.

There has been considerable discussion on the security area directorate list 
about this aspect of the document. All of the SECDIR members who participated 
in the discussion argued that the text in 6.1 needs to be changed to MAY from 
SHOULD. The general principle cited in the discussion has been that national 
crypto algorithms like GOST ought not be cited as MUST or SHOULD in standards 
like DNESEC. I refer interested individuals to the SECDIR archive for details 
of the discussion.

(http://www.ietf.org/mail-archive/web/secdir/current/maillist.html)

As usual, I agree completely with Steve Kent. Further, I note that while there 
was consensus in the DNSEXT WG to put this document on standards track, there 
was no such consensus for making every DNSSEC implementation come under a new 
SHOULD-level requirement.

--Paul Hoffman, Director
--VPN Consortium
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: draft-ietf-dnsext-dnssec-gost

2010-02-11 Thread Olafur Gudmundsson

On 11/02/2010 12:57 PM, Stephen Kent wrote:

I recommend that the document not be approved by the IESG in its current
form. Section 6.1 states:


6.1. Support for GOST signatures

DNSSEC aware implementations SHOULD be able to support RRSIG and
DNSKEY resource records created with the GOST algorithms as
defined in this document.


There has been considerable discussion on the security area directorate
list about this aspect of the document. All of the SECDIR members who
participated in the discussion argued that the text in 6.1 needs to be
changed to MAY from SHOULD. The general principle cited in the
discussion has been that national crypto algorithms like GOST ought
not be cited as MUST or SHOULD in standards like DNESEC. I refer
interested individuals to the SECDIR archive for details of the discussion.

(http://www.ietf.org/mail-archive/web/secdir/current/maillist.html)

Steve



As a document shepeard I have made note that this is desired, but at
the same time this is a topic that was outside the scope of the working
group.
This is on the other hand a topic that belongs in the IETF review.

So my questions to the IETF (paraphrashing George Orwell)

Are all crypto algorithms equal, but some are more equal than others?

Who gets to decide on what algorithms get first class status and based 
on what criteria?


Steve brought up national algorithm, but we have also personal 
algorithms such as curve25519 or threefish.


Olafur


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: draft-ietf-dnsext-dnssec-gost

2010-02-11 Thread Andrew Sullivan
On Thu, Feb 11, 2010 at 03:11:27PM -0500, Olafur Gudmundsson wrote:

 Who gets to decide on what algorithms get first class status and based  
 on what criteria?

Without wanting to put words in Olafur's mouth, it seems to me that a
couple details are needed as background to focus this debate.  

At the moment, the only way to add a new algorithm to DNSSEC is
standards action.  So in order to add GOST, we have to have a
standards-track document.

We also have the problem that DNS clients cannot negotiate their
algorithms with the other end of the communication.  Moreover, the
natural fallback -- use a MAY algorithm by preference, but include a
MUST algorithm so that everyone can verify your signatures -- will
increase the size of DNS responses.  Alternatively, one can use a
MAY algorithm only, but with the knowledge that a substantial number
of people might not be able to validate (so they'll treat the answer
as unsecured, and not get the benefit of DNSSEC).

So the question here is not what algorithms get first class status
in general, but whether we want to have different classes of support
for DNSSEC, given the current conditions.  

Thanks and best regards,

A

-- 
Andrew Sullivan
a...@shinkuro.com
Shinkuro, Inc.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: draft-ietf-dnsext-dnssec-gost

2010-02-11 Thread Paul Hoffman
At 4:04 PM -0500 2/11/10, Andrew Sullivan wrote:
So the question here is not what algorithms get first class status
in general, but whether we want to have different classes of support
for DNSSEC, given the current conditions. 

First off, thank you for better stating the question.

There are a plethora of signing algorithms. Note that a signing algorithm 
consists of a public key algorithm *and* a hash algorithm.

The question here is whether they also have SHOULD-level requirements to 
process every signing algorithm that is in the IANA registry. Having such a 
requirement gives attackers a much wider target: in order to spoof a signature, 
they can pick the weakest of a large collection of algorithms.

For example, there is already a published attack on the GOST hash function that 
does not exist in SHA-256 and SHA-512. The GOST algorithms have had much less 
cryptographic review than other algorithms. If that attack becomes practical, 
an attacker can create signatures using GOST that he/she could not create in 
RSA/SHA-256 or RSA/SHA-512.

Given this, the answer to the question should be no, not all algorithms 
automatically get SHOULD-level requirements. The IETF can, on a case-by-case 
basis, decide if they want to update the base DNSSEC spec to include a 
SHOULD-level or MUST-level requirement for a new signature algorithm.

--Paul Hoffman, Director
--VPN Consortium
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: draft-ietf-dnsext-dnssec-gost

2010-02-11 Thread Richard L. Barnes

I agree with Steve's and Paul's analyses.

In addition, it's not clear to me how this SHOULD-level requirement  
squares with the IANA registration of this algorithm as OPTIONAL (in  
Section 8), since in RFC 2119 OPTIONAL == MAY.  The document that  
defines that registry (draft-ietf-dnsext-dnssec-registry-fixes) does  
not allow algorithms to be RECOMMENDED, so it seems like the  
requirement for support has to be either a MUST or a MAY to be  
consistent with the registry.


--Richard



On Feb 11, 2010, at 4:24 PM, Paul Hoffman wrote:


At 4:04 PM -0500 2/11/10, Andrew Sullivan wrote:

So the question here is not what algorithms get first class status
in general, but whether we want to have different classes of support
for DNSSEC, given the current conditions.


First off, thank you for better stating the question.

There are a plethora of signing algorithms. Note that a signing  
algorithm consists of a public key algorithm *and* a hash algorithm.


The question here is whether they also have SHOULD-level  
requirements to process every signing algorithm that is in the IANA  
registry. Having such a requirement gives attackers a much wider  
target: in order to spoof a signature, they can pick the weakest of  
a large collection of algorithms.


For example, there is already a published attack on the GOST hash  
function that does not exist in SHA-256 and SHA-512. The GOST  
algorithms have had much less cryptographic review than other  
algorithms. If that attack becomes practical, an attacker can create  
signatures using GOST that he/she could not create in RSA/SHA-256 or  
RSA/SHA-512.


Given this, the answer to the question should be no, not all  
algorithms automatically get SHOULD-level requirements. The IETF  
can, on a case-by-case basis, decide if they want to update the base  
DNSSEC spec to include a SHOULD-level or MUST-level requirement for  
a new signature algorithm.


--Paul Hoffman, Director
--VPN Consortium
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: draft-ietf-dnsext-dnssec-gost

2010-02-11 Thread Martin Rex
Stephen Kent wrote:
 
 I recommend that the document not be approved by the IESG in its 
 current form.  Section 6.1 states:
 
 6.1.  Support for GOST signatures
 
 DNSSEC aware implementations SHOULD be able to support RRSIG and
 DNSKEY resource records created with the GOST algorithms as
 defined in this document.
 
 There has been considerable discussion on the security area 
 directorate list about this aspect of the document. All of the SECDIR 
 members who participated in the discussion argued that the text in 
 6.1 needs to be changed to MAY from SHOULD. The general principle 
 cited in the discussion has been that national crypto algorithms 
 like GOST ought not be cited as MUST or SHOULD in standards like 
 DNESEC. I refer interested individuals to the SECDIR archive for 
 details of the discussion.

I agree with Stephen Kent.  That needs to be a MAY.

GOST is IMHO _not_ mature enough and not sufficiently understood and
availble to justify a SHOULD or RECOMMENDED for its support/use
in a core internet protocol.

Over the past year we had our SSL/TLS supplier add support for GOST
TLS ciphersuites to add OEM SSL/TLS implementation (in form of a
third-party crypto plugin that can be certified by the relevant
russian authorities).

One of the problems with GOST is its lack of availability of
documentation/specification and the meaning, purpose and
characteristics of algorithm parameters.

Admittedly, I know very little about the cryptographic
details, but there are two GOST signature algorithms
(GOST R34.10-1994 and GOST R34.10-2001). The earlier
appears to bear some similarity with DH, the newer appears to bear
similarity with ECDH.  Whether and how much the -1994 version is
deprecated is also a complete mystery.  There are IETF documents listing
specific algorithm Identifier parameters (sets), referenced by OIDs,
and those OIDs are issued by one particular company.  I haven't
seen any documentation about the characteristics, purpose of
these algorithm parameters sets and the means/process to define
other parameter (sets).


-Martin
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: draft-ietf-dnsext-dnssec-gost

2010-02-11 Thread Michael Dillon
 One of the problems with GOST is its lack of availability of
 documentation/specification and the meaning, purpose and
 characteristics of algorithm parameters.

A bit of Googling turned up this http://vsegost.com/Catalog/96/9658.shtml
with scanned GIFs of ГОСТ Р34.10-1994. There is a link to the other one,
ГОСТ Р34.10-2001 on that page as well. This does seem to document
the parameters.

Is the real problem the lack of English language documentation?
If so, I'm sure that the people who would like to use these algorithms
could arrange for translations of the two documents, and perhaps even
make that an individual submission as an Internet draft.

  Whether and how much the -1994 version is
 deprecated is also a complete mystery.

That may be explained by its use in card payment systems. As you may
know if you follow the news, a Cambridge team has just found a HUGE hole
in the UK's chip and pin payment system, but a subtext of that announcement
is that other weaknesses documented in previous years still have not been fixed.
Signature algorithms used in payment systems get embedded in all kinds
of devices, and software systems, making it hard to deprecate stuff fast.

--Michael Dillon
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: draft-ietf-dnsext-dnssec-gost

2010-02-11 Thread Sean Turner

Michael Dillon wrote:

One of the problems with GOST is its lack of availability of
documentation/specification and the meaning, purpose and
characteristics of algorithm parameters.


A bit of Googling turned up this http://vsegost.com/Catalog/96/9658.shtml
with scanned GIFs of ГОСТ Р34.10-1994. There is a link to the other one,
ГОСТ Р34.10-2001 on that page as well. This does seem to document
the parameters.

Is the real problem the lack of English language documentation?
If so, I'm sure that the people who would like to use these algorithms
could arrange for translations of the two documents, and perhaps even
make that an individual submission as an Internet draft.


English translation, I don't believe, is the problem.  The following 
drafts are the English translations of the [GOST3410] and [GOST3411] 
references:


http://tools.ietf.org/html/draft-dolmatov-cryptocom-gost341194-07
http://tools.ietf.org/html/draft-dolmatov-cryptocom-gost34102001-08
http://tools.ietf.org/html/draft-dolmatov-cryptocom-gost2814789-06


 Whether and how much the -1994 version is
deprecated is also a complete mystery.


That may be explained by its use in card payment systems. As you may
know if you follow the news, a Cambridge team has just found a HUGE hole
in the UK's chip and pin payment system, but a subtext of that announcement
is that other weaknesses documented in previous years still have not been fixed.
Signature algorithms used in payment systems get embedded in all kinds
of devices, and software systems, making it hard to deprecate stuff fast.

--Michael Dillon
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: draft-ietf-dnsext-dnssec-gost

2010-02-11 Thread Martin Rex
Sean Turner wrote:
 
  
  Is the real problem the lack of English language documentation?
  If so, I'm sure that the people who would like to use these algorithms
  could arrange for translations of the two documents, and perhaps even
  make that an individual submission as an Internet draft.
 
 English translation, I don't believe, is the problem.  The following 
 drafts are the English translations of the [GOST3410] and [GOST3411] 
 references:
 
 http://tools.ietf.org/html/draft-dolmatov-cryptocom-gost341194-07
 http://tools.ietf.org/html/draft-dolmatov-cryptocom-gost34102001-08
 http://tools.ietf.org/html/draft-dolmatov-cryptocom-gost2814789-06

I'm having difficulties to find answers to relatively simple
questions:

 - for which key sizes are the algorithms defined?

 - which parameter of the algorithms (-94, -2001) is used to
   characterize the key size?

-Martin
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: draft-ietf-dnsext-dnssec-gost

2010-02-11 Thread Sean Turner

Martin Rex wrote:

Sean Turner wrote:

Is the real problem the lack of English language documentation?
If so, I'm sure that the people who would like to use these algorithms
could arrange for translations of the two documents, and perhaps even
make that an individual submission as an Internet draft.
English translation, I don't believe, is the problem.  The following 
drafts are the English translations of the [GOST3410] and [GOST3411] 
references:


http://tools.ietf.org/html/draft-dolmatov-cryptocom-gost341194-07
http://tools.ietf.org/html/draft-dolmatov-cryptocom-gost34102001-08
http://tools.ietf.org/html/draft-dolmatov-cryptocom-gost2814789-06


I'm having difficulties to find answers to relatively simple
questions:

 - for which key sizes are the algorithms defined?

 - which parameter of the algorithms (-94, -2001) is used to
   characterize the key size?


Disclaimer: I'm not an expert on GOST.

Section 5 of http://tools.ietf.org/html/draft-ietf-dnsext-dnssec-gost-06 
says the GOST public key size is 512 bits.


spt
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Last Call: draft-ietf-dnsext-dnssec-gost (Use of GOST signature algorithms in DNSKEY and RRSIG Resource Records for DNSSEC) to Proposed Standard

2010-02-10 Thread The IESG
The IESG has received a request from the DNS Extensions WG (dnsext) to 
consider the following document:

- 'Use of GOST signature algorithms in DNSKEY and RRSIG Resource Records 
   for DNSSEC '
   draft-ietf-dnsext-dnssec-gost-06.txt as a Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action.  Please send substantive comments to the
i...@ietf.org mailing lists by 2010-02-24. Exceptionally, 
comments may be sent to i...@ietf.org instead. In either case, please 
retain the beginning of the Subject line to allow automated sorting.

The file can be obtained via
http://www.ietf.org/internet-drafts/draft-ietf-dnsext-dnssec-gost-06.txt


IESG discussion can be tracked via
https://datatracker.ietf.org/public/pidtracker.cgi?command=view_iddTag=19070rfc_flag=0

___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce