Dear Michael, Sorry for a very long delay, as your review was the only one I thought there was not enough interest in this document.
On Wed, Feb 2, 2022 at 12:04 AM Michael StJohns <m...@nthpermutation.com> wrote: > On 2/1/2022 3:35 PM, Tim Wicinski wrote: > > All > > We were reviewing the Working Group Last Call for this, and we received no > comments. We know there was interest in at least moving this forward, but > even Warren concurred we can't send this to the IESG unless there are folks > saying they feel it is ready to be published. > > Thanks > > tim > > > Hi Tim - > > Since you ask, I don't think it's ready to go forward. Section 2 is > particularly opaque. > > Section 2.1 - Provide the ASN1 that explains what's going on by adding the > prefix to a 64 byte GOST public key. Ideally identify the various OIDs > that match to the key format, and to the signature format. > Done > Section 2.2 - How does the private key in the first part of the example > get you to the public key in the second? > > The Base 64 in the DNSKEY appears to give you this value: > > 5E 46 7A 4F EA 90 F6 D7 8E 32 C0 3F 60 AF A4 4F > 31 0B 86 E3 0F 4E C6 20 81 DC B6 6F EB 1F CC 9E > AD 1F D7 A7 8B 38 8C 5F 78 23 32 75 19 23 2A E7 > 48 87 21 2E 3B A9 F3 1A 72 F9 45 39 97 51 32 8F > > Which appears to be an unparameterized GOST public key which I assume > matches the private key. That may be a valid key or not, but saying that > explicitly would be useful. Or at least "The following DNSKEY RR > contains the encoded GOST public key paired with this private key - see xxx > for the key pair generation logic" > Done > To fix all this, start from a normal (PEM or PKCS8 or PKCS12 or X509) > representation of an example key pair and work from there to map to/form > DNSKEY, DS and RRSIG records. > > The algorithm number is specified as 23 here and other places, and that's > so that the examples could be calculated, but if the IANA doesn't issue > them 23 as the number (and they probably won't) most of the examples will > have to be redone with the final values. This is a cart/horse problem and > I'd recommend that the IANA do an early assignment of the signature and > digest algorithm values and that the document be redone with the final > values prior to IESG submission to prevent a round trip during RFC > publication. > Yes, this is a possible way forward. > Sections 3.1 and 4.1 - show your work. Show the actual data being hashed > or signed so that someone else coming along can verify that a) you did the > encoding properly, and b) the hashes match or the signatures match. This > is especially important with algorithms which lack broad international > implementation. > It's the most problematic part for me nowadays. So I provided a reference to my fork of LDNS I used for the DNS part of work and a link to a reference implementation of GOST algorithms. If you think it's not enough, I will try to remember what I did and regenerate the examples with intermediate steps. > Section 5 - these should refer to the GOST specification (e.g. "MUST be > 512 bits per [GOSTxxx]"). As stated, this could be something peculiar to > this spec rather than the underlying cryptographic primitive. > Done. > Section 6.1 - huh? In any case, we generally don't have single subheader > sections - move the text up. I think this is supposed to be "The support > of this cryptographic suite in DNSSEC-aware systems is OPTIONAL. Systems > that do not support these algorithms may ignore the RRSIG, DNSKEY and DS > records created with them." > Done. > Section 10: " > Sorry, didn't get :( > I hope this helps - > > Mike > > > ---------- Forwarded message --------- > > All > > With draft-ietf-dnsop-dnssec-iana-cons now in AUTH48 state, it's time to > move this document along as well. > > This starts a Working Group Last Call for draft-ietf-dnsop-rfc5933-bis, > "Use of GOST 2012 Signature Algorithms in DNSKEY and RRSIG Resource > Records for DNSSEC" > > Current versions of the draft is available here: > https://www.ietf.org/archive/id/draft-ietf-dnsop-rfc5933-bis-07.html > > The Current Intended Status of this document is: Informational > > Please review the draft and offer relevant comments. > If this does not seem appropriate please speak out. > If someone feels the document is *not* ready for publication, please speak > out with your reasons. > > Because of the American holiday, we're going to run the last call process > a few days long. This Working Group Last Call will end on: 10 December > 2021 > > thanks > tim > > _______________________________________________ > DNSOP mailing listDNSOP@ietf.orghttps://www.ietf.org/mailman/listinfo/dnsop > > > _______________________________________________ > DNSOP mailing list > DNSOP@ietf.org > https://www.ietf.org/mailman/listinfo/dnsop > -- SY, Dmitry Belyavsky
_______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop