ietf-dkim
[Top] [All Lists]

Re: [ietf-dkim] Issue #1184, 1196, 1271

2006-05-23 16:29:53


Douglas Otis wrote:

On May 22, 2006, at 4:25 PM, Douglas Otis wrote:

It could be helpful for details related to the algorithm's representation in the binary key be posted for review. Resolving the method of representation should allay some possible concerns.

That's too vague to handle. Suggest you raise whatever issues you
see whenever a binary format spec is published.

The review of a strategy for using a key deprecation flag should also be possible. Once there is an assured method to confirm an unknown algorithm is currently offered by a signing domain, detecting removal of a non-deprecated signature during a transition is possible. A signed message must contain at least one non-deprecated signature where the algorithm, even though unsupported by the verifier, must still be confirmed as supported by the signing domain in the referenced key. Without such a strategy, an opportunity to exploit a deprecated algorithm continues over the entire duration for a complete transition to occur, even in cases where both the signing and the verifying domains supported a newer non-exploited algorithm.

Does anyone else see this as a serious issue? On the last jabber [1]
I think it wasn't seen as such and 1184 & 1196 were marked for
closure/rejection (to be confirmed on the list of course).

S.

[1] http://www.ietf.org/meetings/ietf-logs/dkim/2006-05-18.html



_______________________________________________
NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html