Re: draft-ietf-dnsext-dnssec-gost

2010-02-12 Thread Martin Rex
Basil Dolmatov wrote: > > Martin Rex пишет: > > > > Whether and how much the -1994 version is > > deprecated is also a complete mystery. > > It is written in the text of GOST -2001 Which document are you refering to when you say "text of GOST -2001" ? This document: http://tools.ietf

Re: draft-ietf-dnsext-dnssec-gost

2010-02-12 Thread Olafur Gudmundsson
On 12/02/2010 2:18 PM, Edward Lewis wrote: At 10:57 -0500 2/12/10, Stephen Kent wrote: PS - I think Olafur meant "private algorithms" not personal algorithms. See http://www.iana.org/assignments/dns-sec-alg-numbers/dns-sec-alg-numbers.xhtml, registrations for 253 and 254. No I meant exaclty w

Re: IAB statement on the RPKI.

2010-02-12 Thread Mr. James W. Laferriere
Hello All, On Fri, 12 Feb 2010, IAB Chair wrote: IAB statement on the RPKI. = RPKI as a prerequisite for improving the security of the global routing system. To date, the Internet has operated without a secure means to certify the allocation of Internet number resources, particularly

Re: draft-ietf-dnsext-dnssec-gost

2010-02-12 Thread Sean Turner
Edward Lewis wrote: At 10:57 -0500 2/12/10, Stephen Kent wrote: If we look at what the CP developed in the SIDR WG for the RPKI says, the answer is the IESG (going forward, after an initial set of algs are adopted based on the SIDR WG process). In the IPSEC, TLS, and SMIME contexts, the WGs t

Re: draft-ietf-dnsext-dnssec-gost

2010-02-12 Thread Edward Lewis
At 10:57 -0500 2/12/10, Stephen Kent wrote: If we look at what the CP developed in the SIDR WG for the RPKI says, the answer is the IESG (going forward, after an initial set of algs are adopted based on the SIDR WG process). In the IPSEC, TLS, and SMIME contexts, the WGs themselves have made the

A clarification of what I said (was Re: Last Call: draft-ietf-dnsext-dnssec-gost . . . )

2010-02-12 Thread Andrew Sullivan
On Fri, Feb 12, 2010 at 12:29:00AM +0100, Alfred Hönes wrote: > (3) > I also concur with Andrew that having different requirement levels > in a fundamental protocol that does not allow negotiation of > crypto-algorithms also causes severe deployability concerns. I want to be perfectly clear: I di

Re: draft-ietf-dnsext-dnssec-gost

2010-02-12 Thread David Conrad
On Feb 12, 2010, at 7:57 AM, Stephen Kent wrote: >> Who gets to decide on what algorithms get first class status and based on >> what criteria? > If we look at what the CP developed in the SIDR WG for the RPKI says, the > answer is the IESG So, they're going to flip a coin or what? "Who" is lar

Re: Last Call: draft-ietf-dnsext-dnssec-gost (...) to Proposed Standard

2010-02-12 Thread Alfred Hönes
(1) There's a serious issue deeply buried in this draft, draft-ietf-dnsext-dnssec-gost-06. Let's start from a general PoV: The signature algorithm used by this document targeted for PS is an elliptical curve cryptography (ECC) algorithm. Most international and national standards, including St

Re: draft-ietf-dnsext-dnssec-gost

2010-02-12 Thread Martin Rex
Basil Dolmatov wrote: > > Martin Rex пишет: > > > Admittedly, I know very little about the cryptographic > > details, but there are two GOST signature algorithms > > (GOST R34.10-1994 and GOST R34.10-2001). The earlier > > appears to bear some similarity with DH, the newer appears to bear >

Re: draft-ietf-dnsext-dnssec-gost

2010-02-12 Thread Stephen Kent
... As a document shepeard I have made note that this is desired, but at the same time this is a topic that was outside the scope of the working group. This is on the other hand a topic that belongs in the IETF review. So my questions to the IETF (paraphrashing George Orwell) "Are all crypto alg

Re: draft-ietf-dnsext-dnssec-gost

2010-02-12 Thread Andrew Sullivan
On Fri, Feb 12, 2010 at 03:12:30PM +0300, Basil Dolmatov wrote: > ...have had much less _published_ cryptographic review... I would say. ;) I am not a security expert, but I've never met one who thought that unpublished cryptographic review was worth a dime. Moreover, for the purposes of the IET

Call for Comments: draft-livingood-woundy-congestion-mgmt-03

2010-02-12 Thread Jason Livingood
This is a call for comments on an individual draft regarding a protocol-agnostic congestion management system. I and my co-authors would like feedback on the latest revision of this draft at http://tools.ietf.org/html/draft-livingood-woundy-congestion-mgmt-03. If you have any comments, please sen

Call for Comments: draft-livingood-web-notification-01

2010-02-12 Thread Jason Livingood
This is a call for comments on an individual draft regarding providing near-real-time web notifications*. I and my co-authors would like feedback on the latest revision of this draft at http://tools.ietf.org/html/draft-livingood-web-notification-01. If you have any comments, please send them to m

Re: draft-ietf-dnsext-dnssec-gost

2010-02-12 Thread Stephen Farrell
I agree with Steve and others saying that MAY is appropriate for this. S. Stephen Kent wrote: > I recommend that the document not be approved by the IESG in its current > form. Section 6.1 states: > >> 6.1. Support for GOST signatures >> >>DNSSEC aware implementations SHOULD be able to su

Re: draft-ietf-dnsext-dnssec-gost

2010-02-12 Thread Basil Dolmatov
Paul Hoffman пишет: For example, there is already a published attack on the GOST hash function that does not exist in SHA-256 and SHA-512. That "attack" lessens the complexity of building of the collision from 2**128 operations to 2**109 operations (infinitesimal part of overall complexi

Re: draft-ietf-dnsext-dnssec-gost

2010-02-12 Thread Basil Dolmatov
Martin Rex пишет: Admittedly, I know very little about the cryptographic details, but there are two GOST signature algorithms (GOST R34.10-1994 and GOST R34.10-2001). The earlier appears to bear some similarity with DH, the newer appears to bear similarity with ECDH. Whether and how much