ietf
[Top] [All Lists]

Re: Last Call: <draft-farrell-decade-ni-07.txt> (Naming Things with Hashes) to Proposed Standard

2012-06-12 09:21:25

Hi Dale,

On 06/12/2012 03:04 PM, Worley, Dale R (Dale) wrote:
Having never heard of this proposal before, I found the concept
interesting, but the exposition in the draft was difficult to grasp in
certain places.  I believe that it is because the text assumes that
the reader already knows the underlying theory of what the process is
intended to accomplish.

I'm not sure there's a theory:-)

For example, in section 3, the syntax of the "ni" URI scheme is
spelled out with admirable clarity and exactness, including:

   Digest Value [Required]  The digest value MUST be encoded using the
      base64url [RFC4648] encoding.

Hmmm, "the digest value"...  The digest value *of what*?

The input to the digest is not defined by this draft, except
in the case of public keys. (See other comments wrt MIME &
Content Type as well.)

  "Other than in the above special case where public keys are used, we
   do not specify the hash function input here.  Other specifications
   are expected to define this."

Considering the previous section 2, it seems that there is some
implicit string, which when hashed by the algorithm specified in the
"Digest Algorithm" part, produces the "Digest Value".  And given the
discussion, it seems that this string is an *input* to the process of
generating an ni URI, and that the ni URI is really a way of encoding
this string.  The string itself is specified by some external reality,
and seems to be expected to represent or specify some object in some
way, and thus the ni URI is a "name" for that object.

So far, so good, although it would have been better if this was
spelled out explicitly.

Going back to section 2 for a moment, there is:

   When the input to the hash algorithm is a public key value, as may be
   used by various security protocols, the hash SHOULD be calculated
   over the public key in an X.509 SubjectPublicKeyInfo structure
   (Section 4.1 of [RFC5280]).

I can see what this means, but it's not very clear.  A better way to
write it would be:

    When the input is intended to be a public key value, as may be
    used by various security protocols, the input to the hash SHOULD
    be an X.509 SubjectPublicKeyInfo structure (Section 4.1 of
    [RFC5280]) containing the public key rather than the public key
    value itself.

Have to say I prefer the existing text.


In section 8 is:

   The following ni URI references the text "Hello World!" (without the
   quotes, being 12 characters), [...]

But the term "references" seems not to have been used in this sense
before in the draft.  More clear would be:

   The following ni URI is generated from the string "Hello World!"
   (without the quotes, being 12 characters), [...]

Ack. Thanks.


Unfortunately, the example is somewhat incongruous, as "Hello World!"
is not obviously a name or reference to any object.  

In this case the object named is just those 12 characters.

Thus while it
still is clear how it can be input to the processes that are described
in the draft, it doesn't seem to be a conceptually typical example.

Well, I could have said a file that contains "Hello World!" (12 chars:-)

But I don't think its much clearer, maybe less.

Then we get to:

   Given the SubjectPublicKeyInfo in Figure 6 we derive the names shown
   in Figure 7 for this value.

I can't tell what this means. What is "this value"?  Is it the
immediately preceding URI
(http://example.com/.well-known/ni/sha-256/f4OxZX_x_FO5LcGBSKHWXfwtSx-j1ncoSt3SABJtkGk)?
In what manner does the "given" SubjectPublicKeyInfo affect the names?

No, the input value is the DER encoding of the SPKI as stated earlier.
I guess the following is a little more correct so I've changed it to:

   Given the DER-encoded SubjectPublicKeyInfo in Figure 6 we derive
   the names shown in Figure 7 for this value.

If the input value was meant to be the SubjectPublicKeyInfo itself,
the sentence would not add "this value", which strongly suggests a
*different* value than the one mentioned just before in the same
sentence.  Rather, one would say:

   We derive the names shown in Figure 7 from the SubjectPublicKeyInfo
   in Figure 6.

I don't get the difference to be honest.

Cheers,
S.


Dale