Skip to main content

A New Cryptographic Signature Method for DomainKeys Identified Mail (DKIM)
draft-ietf-dcrup-dkim-crypto-14

Revision differences

Document history

Date Rev. By Action
2018-09-11
14 (System) RFC Editor state changed to AUTH48-DONE from AUTH48
2018-09-07
14 (System) RFC Editor state changed to AUTH48 from RFC-EDITOR
2018-08-14
14 (System) RFC Editor state changed to RFC-EDITOR from EDIT
2018-07-10
14 (System) RFC Editor state changed to EDIT
2018-07-10
14 (System) IESG state changed to RFC Ed Queue from Approved-announcement sent
2018-07-10
14 (System) Announcement was received by RFC Editor
2018-07-10
14 (System) IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor
2018-07-09
14 (System) IANA Action state changed to Waiting on RFC Editor from Waiting on Authors
2018-07-06
14 (System) IANA Action state changed to Waiting on Authors from In Progress
2018-07-06
14 (System) IANA Action state changed to In Progress
2018-07-06
14 Amy Vezza IESG has approved the document
2018-07-06
14 Amy Vezza Closed "Approve" ballot
2018-07-06
14 Amy Vezza Ballot approval text was generated
2018-06-29
14 Alexey Melnikov IESG state changed to Approved-announcement sent from Approved-announcement to be sent::Point Raised - writeup needed
2018-06-21
14 Cindy Morgan IESG state changed to Approved-announcement to be sent::Point Raised - writeup needed from IESG Evaluation
2018-06-21
14 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed
2018-06-21
14 John Levine New version available: draft-ietf-dcrup-dkim-crypto-14.txt
2018-06-21
14 (System) New version approved
2018-06-21
14 (System) Request for posting confirmation emailed to previous authors: John Levine
2018-06-21
14 John Levine Uploaded new revision
2018-06-21
13 Martin Vigoureux [Ballot Position Update] New position, No Objection, has been recorded for Martin Vigoureux
2018-06-20
13 Ignas Bagdonas [Ballot Position Update] New position, No Objection, has been recorded for Ignas Bagdonas
2018-06-20
13 Alissa Cooper
[Ballot comment]
Seems like this can be removed from Sec. 1:
"Discussion Venue:    Discussion about this draft is directed to the
      …
[Ballot comment]
Seems like this can be removed from Sec. 1:
"Discussion Venue:    Discussion about this draft is directed to the
      dcrup@ietf.org [1] mailing list."
2018-06-20
13 Alissa Cooper [Ballot Position Update] New position, No Objection, has been recorded for Alissa Cooper
2018-06-20
13 Spencer Dawkins
[Ballot comment]
Just one nit. In

  DKIM [RFC6376] signs e-mail messages, by creating hashes of the
  message headers and body and …
[Ballot comment]
Just one nit. In

  DKIM [RFC6376] signs e-mail messages, by creating hashes of the
  message headers and body and signing the header hash with a digital
  signature. 

would it be more correct to say

  DKIM [RFC6376] is used to sign e-mail messages, by creating hashes of the
  message headers and body and signing the header hash with a digital
  signature. 

?
2018-06-20
13 Spencer Dawkins [Ballot Position Update] New position, Yes, has been recorded for Spencer Dawkins
2018-06-20
13 Alvaro Retana [Ballot Position Update] New position, No Objection, has been recorded for Alvaro Retana
2018-06-19
13 Terry Manderson [Ballot Position Update] New position, Yes, has been recorded for Terry Manderson
2018-06-19
13 Suresh Krishnan [Ballot Position Update] New position, No Objection, has been recorded for Suresh Krishnan
2018-06-19
13 Ben Campbell [Ballot comment]
Adam beat me to the RFC 8174 boilerplate comment.
2018-06-19
13 Ben Campbell [Ballot Position Update] New position, Yes, has been recorded for Ben Campbell
2018-06-19
13 Amanda Baber IANA Review state changed to IANA OK - Actions Needed from Version Changed - Review Needed
2018-06-19
13 Deborah Brungard [Ballot Position Update] New position, No Objection, has been recorded for Deborah Brungard
2018-06-18
13 Adam Roach
[Ballot comment]
Thanks to the authors and working group for the work put in on this document.
I have two editorial updates to suggest.

--------------------------------------------------------------------------- …
[Ballot comment]
Thanks to the authors and working group for the work put in on this document.
I have two editorial updates to suggest.

---------------------------------------------------------------------------

The draft header indicates that this document updates RFC 6376, but the
abstract doesn't seem to mention this, which it should.

---------------------------------------------------------------------------

§2:

>  The capitalized key words "MUST", "MUST NOT", "REQUIRED", "SHALL",
>  "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and
>  "OPTIONAL" in this document are to be interpreted as described in
>  [RFC8174].

This text is almost, but not quite, the boilerplate from RFC 8174. Please update
this paragraph to match the boilerplate.
2018-06-18
13 Adam Roach [Ballot Position Update] New position, Yes, has been recorded for Adam Roach
2018-06-18
13 Eric Rescorla [Ballot Position Update] New position, No Objection, has been recorded for Eric Rescorla
2018-06-18
13 Warren Kumari
[Ballot comment]
Section 7.  Security Considerations
"Ed25519 is a widely used cryptographic technique, so the security of DKIM signatures using new signing algorithms should be …
[Ballot comment]
Section 7.  Security Considerations
"Ed25519 is a widely used cryptographic technique, so the security of DKIM signatures using new signing algorithms should be at least as good as those using old algorithms."

Could this be reworded? This might just be a pet peeve, but as it is written, it is, I believe, false[0].

This says that, because lots of people use something, it must be good / secure. That's like saying that because lots of people drink instant coffee it must be at least as good as real coffee.  Adding something like "and has received lots of review from the cryptographic community", or "doesn't seem to have any weaknesses", or something would help.
Oh, the Change Log "11 to 12" entry wins!
W

[0]: I bought a box of commas on sale this weekend.
2018-06-18
13 Warren Kumari Ballot comment text updated for Warren Kumari
2018-06-18
13 Warren Kumari
[Ballot comment]
Section 7.  Security Considerations
"Ed25519 is a widely used cryptographic technique, so the security of DKIM signatures using new signing algorithms should be …
[Ballot comment]
Section 7.  Security Considerations
"Ed25519 is a widely used cryptographic technique, so the security of DKIM signatures using new signing algorithms should be at least as good as those using old algorithms."

Could this be reworded? This might just be a pet peeve, but as it is written, it is, I believe, false[0].

This says that, because lots of people use something, it must be good / secure. That's like saying that because lots of people drink instant coffee it must be at least as good as real coffee.  Adding something like "and has received lots of review from the cryptographic community", or "doesn't seem to have any weaknesses", or something would help.

Oh, the Change Log "11 to 12" entry wins!
W

[0]: I bought a box of commas on sale this weekend.
2018-06-18
13 Warren Kumari [Ballot Position Update] New position, No Objection, has been recorded for Warren Kumari
2018-06-18
13 Alexey Melnikov IESG state changed to IESG Evaluation from Waiting for AD Go-Ahead
2018-06-18
13 Mirja Kühlewind [Ballot Position Update] New position, No Objection, has been recorded for Mirja Kühlewind
2018-06-16
13 Benjamin Kaduk
[Ballot comment]
Thanks for the quick update letting me resolve my DISCUSS!

Thanks for writing this document; it will be good to have ed25519 available …
[Ballot comment]
Thanks for the quick update letting me resolve my DISCUSS!

Thanks for writing this document; it will be good to have ed25519 available for DKIM.

There were some remarks in the secdir review that I don't remember seeing a response
to yet (though I'm not sure about the "DKIM Hash Algorithms Registry" part) -- it would be
good to see a reply to them as well as the updates already made.
2018-06-16
13 Benjamin Kaduk [Ballot Position Update] Position for Benjamin Kaduk has been changed to No Objection from Discuss
2018-06-15
13 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed
2018-06-15
13 John Levine New version available: draft-ietf-dcrup-dkim-crypto-13.txt
2018-06-15
13 (System) New version approved
2018-06-15
13 (System) Request for posting confirmation emailed to previous authors: John Levine
2018-06-15
13 John Levine Uploaded new revision
2018-06-15
12 Benjamin Kaduk
[Ballot discuss]
This is basically pro-forma and should be easy to resolve: as pointed out in the secdir review,
"this is widely used, therefore it …
[Ballot discuss]
This is basically pro-forma and should be easy to resolve: as pointed out in the secdir review,
"this is widely used, therefore it must be secure" does  not hold any weight.  The security
considerations should be adjusted to provide some actual justification of the primitive's
security or not make such a claim.
2018-06-15
12 Benjamin Kaduk
[Ballot comment]
Thanks for writing this document; it will be good to have ed25519 available for DKIM.

In addition to the above DISCUSS point, there …
[Ballot comment]
Thanks for writing this document; it will be good to have ed25519 available for DKIM.

In addition to the above DISCUSS point, there were some other good remarks in the secdir
review (though I'm not sure about the "DKIM Hash Algorithms Registry" part) -- it would be
good to see a reply to them as well.

Section 3's Note may want to clarify that it is the public keys that
are 256 bits long (the relevant part, since those are what go in the
DNS).

In Section 4.2:

Typo, "mignt" for "might".
And maybe there's a better way to format the example than with a
selector of just "s"?
2018-06-15
12 Benjamin Kaduk [Ballot Position Update] New position, Discuss, has been recorded for Benjamin Kaduk
2018-06-12
12 (System) IESG state changed to Waiting for AD Go-Ahead from In Last Call
2018-06-11
12 (System) IANA Review state changed to IANA OK - Actions Needed from IANA - Review Needed
2018-06-11
12 Sabrina Tanamal
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

The IANA Functions Operator has completed its review of draft-ietf-dcrup-dkim-crypto-12. If any part of this review is inaccurate, please let …
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

The IANA Functions Operator has completed its review of draft-ietf-dcrup-dkim-crypto-12. If any part of this review is inaccurate, please let us know.

The IANA Services Operator understands that, upon approval of this document, there is a single action which we must complete.

In the DKIM Key Type registry on the DomainKeys Identified Mail (DKIM) Parameters registry page located at:

https://www.iana.org/assignments/dkim-parameters/

a single, new Key Type is to be registered as follows:

Type: ed25519
Reference: [RFC8032]
Status: active

The IANA Services Operator understands that this is the only action required to be completed upon approval of this document.

Note:  The actions requested in this document will not be completed until the document has been approved for publication as an RFC. This message is meant only to confirm the list of actions that will be performed.

Thank you,

Sabrina Tanamal
Senior IANA Services Specialist
2018-06-11
12 Paul Wouters Request for Last Call review by SECDIR Completed: Has Nits. Reviewer: Paul Wouters. Sent review to list.
2018-06-11
12 Pete Resnick Request for Last Call review by GENART Completed: Ready with Nits. Reviewer: Pete Resnick. Sent review to list.
2018-06-06
12 John Levine New version available: draft-ietf-dcrup-dkim-crypto-12.txt
2018-06-06
12 (System) New version approved
2018-06-06
12 (System) Request for posting confirmation emailed to previous authors: John Levine
2018-06-06
12 John Levine Uploaded new revision
2018-06-05
11 John Levine New version available: draft-ietf-dcrup-dkim-crypto-11.txt
2018-06-05
11 (System) New version approved
2018-06-05
11 (System) Request for posting confirmation emailed to previous authors: John Levine
2018-06-05
11 John Levine Uploaded new revision
2018-06-05
10 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Fred Baker
2018-06-05
10 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Fred Baker
2018-06-01
10 Amy Vezza Placed on agenda for telechat - 2018-06-21
2018-06-01
10 Alexey Melnikov Ballot has been issued
2018-06-01
10 Alexey Melnikov [Ballot Position Update] New position, Yes, has been recorded for Alexey Melnikov
2018-06-01
10 Alexey Melnikov Created "Approve" ballot
2018-06-01
10 Alexey Melnikov Ballot writeup was changed
2018-05-31
10 Jean Mahoney Request for Last Call review by GENART is assigned to Pete Resnick
2018-05-31
10 Jean Mahoney Request for Last Call review by GENART is assigned to Pete Resnick
2018-05-31
10 Tero Kivinen Request for Last Call review by SECDIR is assigned to Paul Wouters
2018-05-31
10 Tero Kivinen Request for Last Call review by SECDIR is assigned to Paul Wouters
2018-05-29
10 John Levine New version available: draft-ietf-dcrup-dkim-crypto-10.txt
2018-05-29
10 (System) New version approved
2018-05-29
10 (System) Request for posting confirmation emailed to previous authors: John Levine
2018-05-29
10 John Levine Uploaded new revision
2018-05-29
Jenny Bui Posted related IPR disclosure: Jim Fenton's Statement about IPR related to draft-ietf-dcrup-dkim-crypto belonging to Cisco Technology Inc.
2018-05-29
09 Amy Vezza IANA Review state changed to IANA - Review Needed
2018-05-29
09 Amy Vezza
The following Last Call announcement was sent out (ends 2018-06-12):

From: The IESG
To: IETF-Announce
CC: draft-ietf-dcrup-dkim-crypto@ietf.org, alexey.melnikov@isode.com, dcrup@ietf.org, fenton@bluepopcorn.net, dcrup-chairs@ietf.org …
The following Last Call announcement was sent out (ends 2018-06-12):

From: The IESG
To: IETF-Announce
CC: draft-ietf-dcrup-dkim-crypto@ietf.org, alexey.melnikov@isode.com, dcrup@ietf.org, fenton@bluepopcorn.net, dcrup-chairs@ietf.org
Reply-To: ietf@ietf.org
Sender:
Subject: Last Call:  (A new cryptographic signature method for DKIM) to Proposed Standard


The IESG has received a request from the DKIM Crypto Update WG (dcrup) to
consider the following document: - 'A new cryptographic signature method for
DKIM'
  as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2018-06-12. Exceptionally, comments may be
sent to iesg@ietf.org instead. In either case, please retain the beginning of
the Subject line to allow automated sorting.

Abstract


  This document adds a new signing algorithm to DKIM.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-dcrup-dkim-crypto/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-dcrup-dkim-crypto/ballot/

The following IPR Declarations may be related to this I-D:

  https://datatracker.ietf.org/ipr/3025/





2018-05-29
09 Amy Vezza IESG state changed to In Last Call from Last Call Requested
2018-05-29
09 Amy Vezza Last call announcement was changed
2018-05-27
09 Alexey Melnikov Last call was requested
2018-05-27
09 Alexey Melnikov Last call announcement was generated
2018-05-27
09 Alexey Melnikov Ballot approval text was generated
2018-05-27
09 Alexey Melnikov Ballot writeup was generated
2018-05-27
09 Alexey Melnikov IESG state changed to Last Call Requested from AD Evaluation
2018-05-27
09 Alexey Melnikov IESG state changed to AD Evaluation from Publication Requested
2018-05-22
09 Rich Salz
Document shepherd writeup for draft-ietf-dcrup-dkim-crypto-09

1. Summary

The Document Shepherd for this document is Jim Fenton. The responsible Area Director is Alexey Melnikov.

DKIM [ …
Document shepherd writeup for draft-ietf-dcrup-dkim-crypto-09

1. Summary

The Document Shepherd for this document is Jim Fenton. The responsible Area Director is Alexey Melnikov.

DKIM [RFC6376] signs e-mail messages, by creating hashes of the message headers and body and signing the header hash with a digital signature.  Message recipients fetch the signature verification key from the DNS.  The defining documents specify a single signing algorithm, RSA [RFC3447].

This document adds a new stronger signing algorithm, Edwards-Curve Digital Signature Algorithm using the Curve25519 curve (ed25519), which has much shorter keys than RSA for similar levels of security. This is important in overcoming the practical limitations in storing long keys in DNS.

Publication is being requested as a Proposed Standard ("Standards Track" in the draft).

2. Review and Consensus

This document represents the consensus of the dcrup working group. The need for longer DKIM signing keys has become more acute as compute power (and therefore the ability to factor short RSA keys) increases. Initially, two approaches were considered: (1) publication of key fingerprints (hashes), rather than RSA keys in DNS; (2) use of the ed25519 signing algorithm, which has shorter keys for equivalent cryptographic strength. Ultimately, approach (1) was discarded because (2) was sufficient to satisfy the goals of the specification. There was also significant dicussion on the format to be used for publishing ed25529 public keys in DNS; a "raw key" format was adopted (without ASN1/DER wrapping).

The specification has received extensive review from significant members of the email community and input (such as algorithm selection) from WG technical advisor Eric Rescorla.

Multiple interoperating implementations exist, including dkimpy-milter, exim, NoSpamProxy, and OpenDKIM.

3. Intellectual property

One IPR disclosure (#3025) was filed regarding this draft, but this is no longer applicable because the disclosure related to the use of RSA fingerprints, which has been removed in an earlier revision.

No other IPR claims are known.

4. Other Points

This document contains a normative reference to RFC 8032, an informational RFC that describes ed25519. This is consistent with current practice; RFC 8032 is already listed on the Downref Registry because of a similar reference in RFC 8037.

This document also contains a normative reference to RFC 3447, which has been obsoleted by RFC 8017.

All references are listed as normative; it is possible that there is at least one informative reference (most likely the reference to RFC 3447).

There is also a reference to a NIST FIPS standard. While not an IETF document, we consider it sufficiently stable to be normatively referenced in a standards-track document.

Section 9.2 (URIs) and the Discussion Venue reference in the introduction should be removed by the RFC editor at publication.

In the opinion of the shepherd, the document is ready for publication.
2018-05-22
09 Rich Salz Responsible AD changed to Alexey Melnikov
2018-05-22
09 Rich Salz IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up
2018-05-22
09 Rich Salz IESG state changed to Publication Requested
2018-05-22
09 Rich Salz IESG process started in state Publication Requested
2018-05-22
09 Rich Salz Notification list changed to none from Barry Leiba <barryleiba@computer.org>, Jim Fenton <fenton@bluepopcorn.net>
2018-05-22
09 Jim Fenton Changed document writeup
2018-05-17
09 Rich Salz Notification list changed to Barry Leiba <barryleiba@computer.org>, Jim Fenton <fenton@bluepopcorn.net> from Barry Leiba <barryleiba@computer.org>
2018-05-17
09 Rich Salz Document shepherd changed to Jim Fenton
2018-05-11
09 John Levine New version available: draft-ietf-dcrup-dkim-crypto-09.txt
2018-05-11
09 (System) New version approved
2018-05-11
09 (System) Request for posting confirmation emailed to previous authors: John Levine
2018-05-11
09 John Levine Uploaded new revision
2018-04-19
08 Murray Kucherawy IETF WG state changed to WG Consensus: Waiting for Write-Up from Waiting for WG Chair Go-Ahead
2018-01-22
08 John Levine New version available: draft-ietf-dcrup-dkim-crypto-08.txt
2018-01-22
08 (System) New version approved
2018-01-22
08 (System) Request for posting confirmation emailed to previous authors: John Levine
2018-01-22
08 John Levine Uploaded new revision
2017-12-18
07 Murray Kucherawy Only one WGLC review.  Sad.
2017-12-18
07 Murray Kucherawy IETF WG state changed to Waiting for WG Chair Go-Ahead from In WG Last Call
2017-12-01
07 Murray Kucherawy IETF WG state changed to In WG Last Call from WG Document
2017-12-01
07 John Levine New version available: draft-ietf-dcrup-dkim-crypto-07.txt
2017-12-01
07 (System) New version approved
2017-12-01
07 (System) Request for posting confirmation emailed to previous authors: John Levine
2017-12-01
07 John Levine Uploaded new revision
2017-11-14
06 Murray Kucherawy Added to session: IETF-100: dcrup  Wed-0930
2017-11-14
06 Murray Kucherawy Changed consensus to Yes from Unknown
2017-11-14
06 Murray Kucherawy Intended Status changed to Proposed Standard from None
2017-11-14
06 Murray Kucherawy Notification list changed to Barry Leiba <barryleiba@computer.org>
2017-11-14
06 Murray Kucherawy Document shepherd changed to Barry Leiba
2017-09-13
06 John Levine New version available: draft-ietf-dcrup-dkim-crypto-06.txt
2017-09-13
06 (System) New version approved
2017-09-13
06 (System) Request for posting confirmation emailed to previous authors: John Levine
2017-09-13
06 John Levine Uploaded new revision
2017-08-06
05 John Levine New version available: draft-ietf-dcrup-dkim-crypto-05.txt
2017-08-06
05 (System) New version approved
2017-08-06
05 (System) Request for posting confirmation emailed to previous authors: John Levine
2017-08-06
05 John Levine Uploaded new revision
2017-07-28
04 John Levine New version available: draft-ietf-dcrup-dkim-crypto-04.txt
2017-07-28
04 (System) New version approved
2017-07-28
04 (System) Request for posting confirmation emailed to previous authors: John Levine
2017-07-28
04 John Levine Uploaded new revision
2017-07-07
03 Alexey Melnikov This document now replaces draft-levine-dcrup-dkim-crypto instead of None
2017-07-03
Jasmine Magallanes Posted related IPR disclosure: Jim Fenton's Statement about IPR related to draft-ietf-dcrup-dkim-crypto belonging to Cisco Technology Inc.
2017-07-01
03 John Levine New version available: draft-ietf-dcrup-dkim-crypto-03.txt
2017-07-01
03 (System) New version approved
2017-07-01
03 (System) Request for posting confirmation emailed to previous authors: John Levine
2017-07-01
03 John Levine Uploaded new revision
2017-06-20
02 John Levine New version available: draft-ietf-dcrup-dkim-crypto-02.txt
2017-06-20
02 (System) New version approved
2017-06-20
02 (System) Request for posting confirmation emailed to previous authors: John Levine
2017-06-20
02 John Levine Uploaded new revision
2017-06-12
01 John Levine New version available: draft-ietf-dcrup-dkim-crypto-01.txt
2017-06-12
01 (System) New version approved
2017-06-12
01 (System) Request for posting confirmation emailed to previous authors: John Levine
2017-06-12
01 John Levine Uploaded new revision
2017-04-28
00 John Levine New version available: draft-ietf-dcrup-dkim-crypto-00.txt
2017-04-28
00 (System) WG -00 approved
2017-04-28
00 John Levine Set submitter to "John Levine ", replaces to (none) and sent approval email to group chairs: dcrup-chairs@ietf.org
2017-04-28
00 John Levine Uploaded new revision