Re: [dmarc-ietf] key sizes, was Section [5.2.1] of the ARC draft

2017-01-25 Thread John R Levine
Signing one seems wrong, ie if the arc-seal only signs a single arc-message-signature at a given hop, then the other signature can't be verified, and if I can't handle the algorithm of the one that's covered, then I can't verify the chain. Currently away on a trip, I'll take a closer look when I

Re: [dmarc-ietf] key sizes, was Section [5.2.1] of the ARC draft

2017-01-25 Thread John R Levine
I see a rabbit hole here... So you're transitioning, so you sign twice (one with your old, one with your new) before you send to me and hey, I'm not the end point either, so I need to forward it along, but I'm also transitioning, so I sign both of yours, twice? I would kind of have to, wouldn'

Re: [dmarc-ietf] key sizes, was Section [5.2.1] of the ARC draft

2017-01-25 Thread John R Levine
Sure, with dkim. With arc, it's a bit more complicated, we need to understand exactly how to sign the chain if there are multiple AMS and AS headers. We probably want text about what happens if only one verifies as well, and whether a hop should continue signing both paths or just one. All quit

Re: [dmarc-ietf] key sizes, was Section [5.2.1] of the ARC draft

2017-01-25 Thread Paul Rock
I see a rabbit hole here... So you're transitioning, so you sign twice (one with your old, one with your new) before you send to me and hey, I'm not the end point either, so I need to forward it along, but I'm also transitioning, so I sign both of yours, twice? I would kind of have to, wouldn't

Re: [dmarc-ietf] Section [5.2.1] of the ARC draft

2017-01-25 Thread Peter Goldstein
And as a timely item on this topic, RFC 8032 (Edwards-Curve Digital Signature Algorithm) was just published - https://tools.ietf.org/html/rfc8032 It was specifically published to facilitate adoption in the Internet community. The RFC makes no mention of any IPR claims as far as I can tell from a q