Re: [saag] AD review of draft-iab-crypto-alg-agility-06

Viktor Dukhovni <ietf-dane@dukhovni.org> Sun, 26 July 2015 23:39 UTC

Return-Path: <ietf-dane@dukhovni.org>
X-Original-To: saag@ietfa.amsl.com
Delivered-To: saag@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D95671A8750 for <saag@ietfa.amsl.com>; Sun, 26 Jul 2015 16:39:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.2
X-Spam-Level:
X-Spam-Status: No, score=-1.2 tagged_above=-999 required=5 tests=[BAYES_05=-0.5, RCVD_IN_DNSWL_LOW=-0.7] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Bn7Cpjm1XUjI for <saag@ietfa.amsl.com>; Sun, 26 Jul 2015 16:39:37 -0700 (PDT)
Received: from mournblade.imrryr.org (mournblade.imrryr.org [38.117.134.19]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E96591A8740 for <saag@ietf.org>; Sun, 26 Jul 2015 16:39:36 -0700 (PDT)
Received: by mournblade.imrryr.org (Postfix, from userid 1034) id CE135282FB1; Sun, 26 Jul 2015 23:39:35 +0000 (UTC)
Date: Sun, 26 Jul 2015 23:39:35 +0000
From: Viktor Dukhovni <ietf-dane@dukhovni.org>
To: saag@ietf.org
Message-ID: <20150726233935.GE4347@mournblade.imrryr.org>
References: <55A938F1.9090404@cs.tcd.ie> <20150720044849.GY28047@mournblade.imrryr.org>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <20150720044849.GY28047@mournblade.imrryr.org>
User-Agent: Mutt/1.5.23 (2014-03-12)
Archived-At: <http://mailarchive.ietf.org/arch/msg/saag/GhQ5DjhuNQulqgD1mBpxswwWsyA>
Subject: Re: [saag] AD review of draft-iab-crypto-alg-agility-06
X-BeenThere: saag@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: saag@ietf.org
List-Id: Security Area Advisory Group <saag.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/saag>, <mailto:saag-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/saag/>
List-Post: <mailto:saag@ietf.org>
List-Help: <mailto:saag-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/saag>, <mailto:saag-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 26 Jul 2015 23:39:39 -0000

On Mon, Jul 20, 2015 at 04:48:49AM +0000, Viktor Dukhovni wrote:

> Section 2.9:
> 
>     [...]
>     
> [ Have to stop here for now, have not read the rest yet. ]

Continuing with material that follows after 2.9:

Section 3.1 first paragraph:

    The sentence:

       It seems like the ability to use an algorithm of one's own
       choosing is very desirable; however, the selection is often
       better left to experts.

    is rather imprecise.  I would suggest something more concrete:

	Explicit selection of concrete cryptographic algorithms
	should generally not be left to end-users.  Rather, end-users
	might select between configuration profiles defined by
	experts.

    The next sentence is too confusing to suggest improvements:

	  Further, any and all cryptographic algorithm choices
	  ought not be available in every implementation.

    The rest of the first paragraph:

	s/that it has/that has/
	s/has alway had/has always had/

    The last sentence of the same paragraph:

	In addition, inclusion of too many alternatives may add
	complexity to algorithm selection or negotiation.

    might be better as:

	Finally, standardization of too many alternatives will
	likely hamper security and interoperability.  When
	standardizing new algorithms it is prudent to consider what
	existing algorithms need to deprecated to make room for
	the new.

    [ For example, I'd like to see deprecation of many legacy DNSSEC
      algorithm code points, once new code points appear based on
      CRFG's new curves. (Of the existing algorithms, I'd keep only
      RSASHA256(8) and ECDSAP256SHA256(13)). ]

Last paragraph of 3.1:

	s/Sometime/Sometimes/
	s/depending of/depending on/

Last paragraph of 3.4:
	
	s/roll out/roll-out/  (the first is the verb, the second the noun).

Section 3.4:

    Amen for disabled by default "national" algorithms.  It would
    be nice to explicitly see this recommendation for GOST in DNSSEC,
    SEED in TLS, ...

Section 4:

       Sometimes application layer protocols can make use of transport layer
       security protocols, such as TLS [RFC5246] or DTLS [RFC6347].  This
       insulates the application layer protocol from the details of
       cryptography, but it is likely to still be necessary to handle the
       transition from unprotected traffic to protected traffic in the
       application layer protocol.  In addition, the application layer
       protocol may need to handle the downgrade from encrypted
       communication to plaintext communication.

    What's the relevance of a possible transition from cleartext
    to encryption (and perhaps back again???).

Overall:

    I found the document to be too "hand-wavy".  I think that it
    could be shorter by leaving out more text where no specific
    recommendations are or can be made.

    The wording could use a lot more polish, my list of nits is
    far from comprehensive.

-- 
	Viktor.