On 2/1/2022 3:35 PM, Tim Wicinski wrote:
All

We were reviewing the Working Group Last Call for this, and we received no comments.  We know there was interest in at least moving this forward, but even Warren concurred we can't send this to the IESG unless there are folks saying they feel it is ready to be published.

Thanks

tim


Hi Tim -

Since you ask, I don't think it's ready to go forward.  Section 2 is particularly opaque.

Section 2.1 - Provide the ASN1 that explains what's going on by adding the prefix to a 64 byte GOST public key.  Ideally identify the various OIDs that match to the key format, and to the signature format.

Section 2.2 - How does the private key in the first part of the example get you to the public key in the second?

The Base 64 in the DNSKEY appears to give you this value:

5E 46 7A 4F  EA 90 F6 D7  8E 32 C0 3F  60 AF A4 4F
31 0B 86 E3  0F 4E C6 20  81 DC B6 6F  EB 1F CC 9E
AD 1F D7 A7  8B 38 8C 5F  78 23 32 75  19 23 2A E7
48 87 21 2E  3B A9 F3 1A  72 F9 45 39  97 51 32 8F

Which appears to be an unparameterized GOST public key which I assume matches the private key.  That may be a valid key or not, but saying that explicitly would be useful.    Or at least "The following DNSKEY RR contains the encoded GOST public key paired with this private key - see xxx for the key pair generation logic"

To fix all this, start from a normal (PEM or PKCS8 or PKCS12 or X509) representation of an example key pair and work from there to map to/form DNSKEY, DS and RRSIG records.

The algorithm number is specified as 23 here and other places, and that's so that the examples could be calculated, but if the IANA doesn't issue them 23 as the number (and they probably won't) most of the examples will have to be redone with the final values.  This is a cart/horse problem and I'd recommend that the IANA do an early  assignment of the signature and digest algorithm values and that the document be redone with the final values prior to IESG submission to prevent a round trip during RFC publication.

Sections 3.1 and 4.1 - show your work.  Show the actual data being hashed or signed so that someone else coming along can verify that a) you did the encoding properly, and b) the hashes match or the signatures match.  This is especially important with algorithms which lack broad international implementation.

Section 5 - these should refer to the GOST specification  (e.g. "MUST be 512 bits per [GOSTxxx]").  As stated, this could be something peculiar to this spec rather than the underlying cryptographic primitive.

Section 6.1 - huh?  In any case, we generally don't have single subheader sections - move the text up.   I think this is supposed to be "The support of this cryptographic suite in DNSSEC-aware systems is OPTIONAL.  Systems that do not support these algorithms may ignore the RRSIG, DNSKEY and DS records created with them."

Section 10: "

I hope this helps -

Mike


---------- Forwarded message ---------

All

With draft-ietf-dnsop-dnssec-iana-cons now in AUTH48 state, it's time to move this document along as well.

This starts a Working Group Last Call for draft-ietf-dnsop-rfc5933-bis,
"Use of GOST 2012 Signature Algorithms in DNSKEY and RRSIG Resource Records for DNSSEC"

Current versions of the draft is available here:
https://www.ietf.org/archive/id/draft-ietf-dnsop-rfc5933-bis-07.html

The Current Intended Status of this document is: Informational

Please review the draft and offer relevant comments.
If this does not seem appropriate please speak out.
If someone feels the document is *not* ready for publication, please speak out with your reasons.

Because of the American holiday, we're going to run the last call process a few days long.   This Working Group Last Call will end on:  10 December 2021

thanks
tim

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to