A New Cryptographic Signature Method for DomainKeys Identified Mail (DKIM)
draft-ietf-dcrup-dkim-crypto-14
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2018-09-11
|
14 | (System) | RFC Editor state changed to AUTH48-DONE from AUTH48 |
2018-09-07
|
14 | (System) | RFC Editor state changed to AUTH48 from RFC-EDITOR |
2018-08-14
|
14 | (System) | RFC Editor state changed to RFC-EDITOR from EDIT |
2018-07-10
|
14 | (System) | RFC Editor state changed to EDIT |
2018-07-10
|
14 | (System) | IESG state changed to RFC Ed Queue from Approved-announcement sent |
2018-07-10
|
14 | (System) | Announcement was received by RFC Editor |
2018-07-10
|
14 | (System) | IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor |
2018-07-09
|
14 | (System) | IANA Action state changed to Waiting on RFC Editor from Waiting on Authors |
2018-07-06
|
14 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2018-07-06
|
14 | (System) | IANA Action state changed to In Progress |
2018-07-06
|
14 | Amy Vezza | IESG has approved the document |
2018-07-06
|
14 | Amy Vezza | Closed "Approve" ballot |
2018-07-06
|
14 | Amy Vezza | Ballot approval text was generated |
2018-06-29
|
14 | Alexey Melnikov | IESG state changed to Approved-announcement sent from Approved-announcement to be sent::Point Raised - writeup needed |
2018-06-21
|
14 | Cindy Morgan | IESG state changed to Approved-announcement to be sent::Point Raised - writeup needed from IESG Evaluation |
2018-06-21
|
14 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed |
2018-06-21
|
14 | John Levine | New version available: draft-ietf-dcrup-dkim-crypto-14.txt |
2018-06-21
|
14 | (System) | New version approved |
2018-06-21
|
14 | (System) | Request for posting confirmation emailed to previous authors: John Levine |
2018-06-21
|
14 | John Levine | Uploaded new revision |
2018-06-21
|
13 | Martin Vigoureux | [Ballot Position Update] New position, No Objection, has been recorded for Martin Vigoureux |
2018-06-20
|
13 | Ignas Bagdonas | [Ballot Position Update] New position, No Objection, has been recorded for Ignas Bagdonas |
2018-06-20
|
13 | Alissa Cooper | [Ballot comment] Seems like this can be removed from Sec. 1: "Discussion Venue: Discussion about this draft is directed to the … [Ballot comment] Seems like this can be removed from Sec. 1: "Discussion Venue: Discussion about this draft is directed to the dcrup@ietf.org [1] mailing list." |
2018-06-20
|
13 | Alissa Cooper | [Ballot Position Update] New position, No Objection, has been recorded for Alissa Cooper |
2018-06-20
|
13 | Spencer Dawkins | [Ballot comment] Just one nit. In DKIM [RFC6376] signs e-mail messages, by creating hashes of the message headers and body and … [Ballot comment] Just one nit. In DKIM [RFC6376] signs e-mail messages, by creating hashes of the message headers and body and signing the header hash with a digital signature. would it be more correct to say DKIM [RFC6376] is used to sign e-mail messages, by creating hashes of the message headers and body and signing the header hash with a digital signature. ? |
2018-06-20
|
13 | Spencer Dawkins | [Ballot Position Update] New position, Yes, has been recorded for Spencer Dawkins |
2018-06-20
|
13 | Alvaro Retana | [Ballot Position Update] New position, No Objection, has been recorded for Alvaro Retana |
2018-06-19
|
13 | Terry Manderson | [Ballot Position Update] New position, Yes, has been recorded for Terry Manderson |
2018-06-19
|
13 | Suresh Krishnan | [Ballot Position Update] New position, No Objection, has been recorded for Suresh Krishnan |
2018-06-19
|
13 | Ben Campbell | [Ballot comment] Adam beat me to the RFC 8174 boilerplate comment. |
2018-06-19
|
13 | Ben Campbell | [Ballot Position Update] New position, Yes, has been recorded for Ben Campbell |
2018-06-19
|
13 | Amanda Baber | IANA Review state changed to IANA OK - Actions Needed from Version Changed - Review Needed |
2018-06-19
|
13 | Deborah Brungard | [Ballot Position Update] New position, No Objection, has been recorded for Deborah Brungard |
2018-06-18
|
13 | Adam Roach | [Ballot comment] Thanks to the authors and working group for the work put in on this document. I have two editorial updates to suggest. --------------------------------------------------------------------------- … [Ballot comment] Thanks to the authors and working group for the work put in on this document. I have two editorial updates to suggest. --------------------------------------------------------------------------- The draft header indicates that this document updates RFC 6376, but the abstract doesn't seem to mention this, which it should. --------------------------------------------------------------------------- §2: > The capitalized key words "MUST", "MUST NOT", "REQUIRED", "SHALL", > "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and > "OPTIONAL" in this document are to be interpreted as described in > [RFC8174]. This text is almost, but not quite, the boilerplate from RFC 8174. Please update this paragraph to match the boilerplate. |
2018-06-18
|
13 | Adam Roach | [Ballot Position Update] New position, Yes, has been recorded for Adam Roach |
2018-06-18
|
13 | Eric Rescorla | [Ballot Position Update] New position, No Objection, has been recorded for Eric Rescorla |
2018-06-18
|
13 | Warren Kumari | [Ballot comment] Section 7. Security Considerations "Ed25519 is a widely used cryptographic technique, so the security of DKIM signatures using new signing algorithms should be … [Ballot comment] Section 7. Security Considerations "Ed25519 is a widely used cryptographic technique, so the security of DKIM signatures using new signing algorithms should be at least as good as those using old algorithms." Could this be reworded? This might just be a pet peeve, but as it is written, it is, I believe, false[0]. This says that, because lots of people use something, it must be good / secure. That's like saying that because lots of people drink instant coffee it must be at least as good as real coffee. Adding something like "and has received lots of review from the cryptographic community", or "doesn't seem to have any weaknesses", or something would help. Oh, the Change Log "11 to 12" entry wins! W [0]: I bought a box of commas on sale this weekend. |
2018-06-18
|
13 | Warren Kumari | Ballot comment text updated for Warren Kumari |
2018-06-18
|
13 | Warren Kumari | [Ballot comment] Section 7. Security Considerations "Ed25519 is a widely used cryptographic technique, so the security of DKIM signatures using new signing algorithms should be … [Ballot comment] Section 7. Security Considerations "Ed25519 is a widely used cryptographic technique, so the security of DKIM signatures using new signing algorithms should be at least as good as those using old algorithms." Could this be reworded? This might just be a pet peeve, but as it is written, it is, I believe, false[0]. This says that, because lots of people use something, it must be good / secure. That's like saying that because lots of people drink instant coffee it must be at least as good as real coffee. Adding something like "and has received lots of review from the cryptographic community", or "doesn't seem to have any weaknesses", or something would help. Oh, the Change Log "11 to 12" entry wins! W [0]: I bought a box of commas on sale this weekend. |
2018-06-18
|
13 | Warren Kumari | [Ballot Position Update] New position, No Objection, has been recorded for Warren Kumari |
2018-06-18
|
13 | Alexey Melnikov | IESG state changed to IESG Evaluation from Waiting for AD Go-Ahead |
2018-06-18
|
13 | Mirja Kühlewind | [Ballot Position Update] New position, No Objection, has been recorded for Mirja Kühlewind |
2018-06-16
|
13 | Benjamin Kaduk | [Ballot comment] Thanks for the quick update letting me resolve my DISCUSS! Thanks for writing this document; it will be good to have ed25519 available … [Ballot comment] Thanks for the quick update letting me resolve my DISCUSS! Thanks for writing this document; it will be good to have ed25519 available for DKIM. There were some remarks in the secdir review that I don't remember seeing a response to yet (though I'm not sure about the "DKIM Hash Algorithms Registry" part) -- it would be good to see a reply to them as well as the updates already made. |
2018-06-16
|
13 | Benjamin Kaduk | [Ballot Position Update] Position for Benjamin Kaduk has been changed to No Objection from Discuss |
2018-06-15
|
13 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed |
2018-06-15
|
13 | John Levine | New version available: draft-ietf-dcrup-dkim-crypto-13.txt |
2018-06-15
|
13 | (System) | New version approved |
2018-06-15
|
13 | (System) | Request for posting confirmation emailed to previous authors: John Levine |
2018-06-15
|
13 | John Levine | Uploaded new revision |
2018-06-15
|
12 | Benjamin Kaduk | [Ballot discuss] This is basically pro-forma and should be easy to resolve: as pointed out in the secdir review, "this is widely used, therefore it … [Ballot discuss] This is basically pro-forma and should be easy to resolve: as pointed out in the secdir review, "this is widely used, therefore it must be secure" does not hold any weight. The security considerations should be adjusted to provide some actual justification of the primitive's security or not make such a claim. |
2018-06-15
|
12 | Benjamin Kaduk | [Ballot comment] Thanks for writing this document; it will be good to have ed25519 available for DKIM. In addition to the above DISCUSS point, there … [Ballot comment] Thanks for writing this document; it will be good to have ed25519 available for DKIM. In addition to the above DISCUSS point, there were some other good remarks in the secdir review (though I'm not sure about the "DKIM Hash Algorithms Registry" part) -- it would be good to see a reply to them as well. Section 3's Note may want to clarify that it is the public keys that are 256 bits long (the relevant part, since those are what go in the DNS). In Section 4.2: Typo, "mignt" for "might". And maybe there's a better way to format the example than with a selector of just "s"? |
2018-06-15
|
12 | Benjamin Kaduk | [Ballot Position Update] New position, Discuss, has been recorded for Benjamin Kaduk |
2018-06-12
|
12 | (System) | IESG state changed to Waiting for AD Go-Ahead from In Last Call |
2018-06-11
|
12 | (System) | IANA Review state changed to IANA OK - Actions Needed from IANA - Review Needed |
2018-06-11
|
12 | Sabrina Tanamal | (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: The IANA Functions Operator has completed its review of draft-ietf-dcrup-dkim-crypto-12. If any part of this review is inaccurate, please let … (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: The IANA Functions Operator has completed its review of draft-ietf-dcrup-dkim-crypto-12. If any part of this review is inaccurate, please let us know. The IANA Services Operator understands that, upon approval of this document, there is a single action which we must complete. In the DKIM Key Type registry on the DomainKeys Identified Mail (DKIM) Parameters registry page located at: https://www.iana.org/assignments/dkim-parameters/ a single, new Key Type is to be registered as follows: Type: ed25519 Reference: [RFC8032] Status: active The IANA Services Operator understands that this is the only action required to be completed upon approval of this document. Note: The actions requested in this document will not be completed until the document has been approved for publication as an RFC. This message is meant only to confirm the list of actions that will be performed. Thank you, Sabrina Tanamal Senior IANA Services Specialist |
2018-06-11
|
12 | Paul Wouters | Request for Last Call review by SECDIR Completed: Has Nits. Reviewer: Paul Wouters. Sent review to list. |
2018-06-11
|
12 | Pete Resnick | Request for Last Call review by GENART Completed: Ready with Nits. Reviewer: Pete Resnick. Sent review to list. |
2018-06-06
|
12 | John Levine | New version available: draft-ietf-dcrup-dkim-crypto-12.txt |
2018-06-06
|
12 | (System) | New version approved |
2018-06-06
|
12 | (System) | Request for posting confirmation emailed to previous authors: John Levine |
2018-06-06
|
12 | John Levine | Uploaded new revision |
2018-06-05
|
11 | John Levine | New version available: draft-ietf-dcrup-dkim-crypto-11.txt |
2018-06-05
|
11 | (System) | New version approved |
2018-06-05
|
11 | (System) | Request for posting confirmation emailed to previous authors: John Levine |
2018-06-05
|
11 | John Levine | Uploaded new revision |
2018-06-05
|
10 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Fred Baker |
2018-06-05
|
10 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Fred Baker |
2018-06-01
|
10 | Amy Vezza | Placed on agenda for telechat - 2018-06-21 |
2018-06-01
|
10 | Alexey Melnikov | Ballot has been issued |
2018-06-01
|
10 | Alexey Melnikov | [Ballot Position Update] New position, Yes, has been recorded for Alexey Melnikov |
2018-06-01
|
10 | Alexey Melnikov | Created "Approve" ballot |
2018-06-01
|
10 | Alexey Melnikov | Ballot writeup was changed |
2018-05-31
|
10 | Jean Mahoney | Request for Last Call review by GENART is assigned to Pete Resnick |
2018-05-31
|
10 | Jean Mahoney | Request for Last Call review by GENART is assigned to Pete Resnick |
2018-05-31
|
10 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Paul Wouters |
2018-05-31
|
10 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Paul Wouters |
2018-05-29
|
10 | John Levine | New version available: draft-ietf-dcrup-dkim-crypto-10.txt |
2018-05-29
|
10 | (System) | New version approved |
2018-05-29
|
10 | (System) | Request for posting confirmation emailed to previous authors: John Levine |
2018-05-29
|
10 | John Levine | Uploaded new revision |
2018-05-29
|
Jenny Bui | Posted related IPR disclosure: Jim Fenton's Statement about IPR related to draft-ietf-dcrup-dkim-crypto belonging to Cisco Technology Inc. | |
2018-05-29
|
09 | Amy Vezza | IANA Review state changed to IANA - Review Needed |
2018-05-29
|
09 | Amy Vezza | The following Last Call announcement was sent out (ends 2018-06-12): From: The IESG To: IETF-Announce CC: draft-ietf-dcrup-dkim-crypto@ietf.org, alexey.melnikov@isode.com, dcrup@ietf.org, fenton@bluepopcorn.net, dcrup-chairs@ietf.org … The following Last Call announcement was sent out (ends 2018-06-12): From: The IESG To: IETF-Announce CC: draft-ietf-dcrup-dkim-crypto@ietf.org, alexey.melnikov@isode.com, dcrup@ietf.org, fenton@bluepopcorn.net, dcrup-chairs@ietf.org Reply-To: ietf@ietf.org Sender: Subject: Last Call: (A new cryptographic signature method for DKIM) to Proposed Standard The IESG has received a request from the DKIM Crypto Update WG (dcrup) to consider the following document: - 'A new cryptographic signature method for DKIM' as Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the ietf@ietf.org mailing lists by 2018-06-12. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract This document adds a new signing algorithm to DKIM. The file can be obtained via https://datatracker.ietf.org/doc/draft-ietf-dcrup-dkim-crypto/ IESG discussion can be tracked via https://datatracker.ietf.org/doc/draft-ietf-dcrup-dkim-crypto/ballot/ The following IPR Declarations may be related to this I-D: https://datatracker.ietf.org/ipr/3025/ |
2018-05-29
|
09 | Amy Vezza | IESG state changed to In Last Call from Last Call Requested |
2018-05-29
|
09 | Amy Vezza | Last call announcement was changed |
2018-05-27
|
09 | Alexey Melnikov | Last call was requested |
2018-05-27
|
09 | Alexey Melnikov | Last call announcement was generated |
2018-05-27
|
09 | Alexey Melnikov | Ballot approval text was generated |
2018-05-27
|
09 | Alexey Melnikov | Ballot writeup was generated |
2018-05-27
|
09 | Alexey Melnikov | IESG state changed to Last Call Requested from AD Evaluation |
2018-05-27
|
09 | Alexey Melnikov | IESG state changed to AD Evaluation from Publication Requested |
2018-05-22
|
09 | Rich Salz | Document shepherd writeup for draft-ietf-dcrup-dkim-crypto-09 1. Summary The Document Shepherd for this document is Jim Fenton. The responsible Area Director is Alexey Melnikov. DKIM [ … Document shepherd writeup for draft-ietf-dcrup-dkim-crypto-09 1. Summary The Document Shepherd for this document is Jim Fenton. The responsible Area Director is Alexey Melnikov. DKIM [RFC6376] signs e-mail messages, by creating hashes of the message headers and body and signing the header hash with a digital signature. Message recipients fetch the signature verification key from the DNS. The defining documents specify a single signing algorithm, RSA [RFC3447]. This document adds a new stronger signing algorithm, Edwards-Curve Digital Signature Algorithm using the Curve25519 curve (ed25519), which has much shorter keys than RSA for similar levels of security. This is important in overcoming the practical limitations in storing long keys in DNS. Publication is being requested as a Proposed Standard ("Standards Track" in the draft). 2. Review and Consensus This document represents the consensus of the dcrup working group. The need for longer DKIM signing keys has become more acute as compute power (and therefore the ability to factor short RSA keys) increases. Initially, two approaches were considered: (1) publication of key fingerprints (hashes), rather than RSA keys in DNS; (2) use of the ed25519 signing algorithm, which has shorter keys for equivalent cryptographic strength. Ultimately, approach (1) was discarded because (2) was sufficient to satisfy the goals of the specification. There was also significant dicussion on the format to be used for publishing ed25529 public keys in DNS; a "raw key" format was adopted (without ASN1/DER wrapping). The specification has received extensive review from significant members of the email community and input (such as algorithm selection) from WG technical advisor Eric Rescorla. Multiple interoperating implementations exist, including dkimpy-milter, exim, NoSpamProxy, and OpenDKIM. 3. Intellectual property One IPR disclosure (#3025) was filed regarding this draft, but this is no longer applicable because the disclosure related to the use of RSA fingerprints, which has been removed in an earlier revision. No other IPR claims are known. 4. Other Points This document contains a normative reference to RFC 8032, an informational RFC that describes ed25519. This is consistent with current practice; RFC 8032 is already listed on the Downref Registry because of a similar reference in RFC 8037. This document also contains a normative reference to RFC 3447, which has been obsoleted by RFC 8017. All references are listed as normative; it is possible that there is at least one informative reference (most likely the reference to RFC 3447). There is also a reference to a NIST FIPS standard. While not an IETF document, we consider it sufficiently stable to be normatively referenced in a standards-track document. Section 9.2 (URIs) and the Discussion Venue reference in the introduction should be removed by the RFC editor at publication. In the opinion of the shepherd, the document is ready for publication. |
2018-05-22
|
09 | Rich Salz | Responsible AD changed to Alexey Melnikov |
2018-05-22
|
09 | Rich Salz | IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up |
2018-05-22
|
09 | Rich Salz | IESG state changed to Publication Requested |
2018-05-22
|
09 | Rich Salz | IESG process started in state Publication Requested |
2018-05-22
|
09 | Rich Salz | Notification list changed to none from Barry Leiba <barryleiba@computer.org>, Jim Fenton <fenton@bluepopcorn.net> |
2018-05-22
|
09 | Jim Fenton | Changed document writeup |
2018-05-17
|
09 | Rich Salz | Notification list changed to Barry Leiba <barryleiba@computer.org>, Jim Fenton <fenton@bluepopcorn.net> from Barry Leiba <barryleiba@computer.org> |
2018-05-17
|
09 | Rich Salz | Document shepherd changed to Jim Fenton |
2018-05-11
|
09 | John Levine | New version available: draft-ietf-dcrup-dkim-crypto-09.txt |
2018-05-11
|
09 | (System) | New version approved |
2018-05-11
|
09 | (System) | Request for posting confirmation emailed to previous authors: John Levine |
2018-05-11
|
09 | John Levine | Uploaded new revision |
2018-04-19
|
08 | Murray Kucherawy | IETF WG state changed to WG Consensus: Waiting for Write-Up from Waiting for WG Chair Go-Ahead |
2018-01-22
|
08 | John Levine | New version available: draft-ietf-dcrup-dkim-crypto-08.txt |
2018-01-22
|
08 | (System) | New version approved |
2018-01-22
|
08 | (System) | Request for posting confirmation emailed to previous authors: John Levine |
2018-01-22
|
08 | John Levine | Uploaded new revision |
2017-12-18
|
07 | Murray Kucherawy | Only one WGLC review. Sad. |
2017-12-18
|
07 | Murray Kucherawy | IETF WG state changed to Waiting for WG Chair Go-Ahead from In WG Last Call |
2017-12-01
|
07 | Murray Kucherawy | IETF WG state changed to In WG Last Call from WG Document |
2017-12-01
|
07 | John Levine | New version available: draft-ietf-dcrup-dkim-crypto-07.txt |
2017-12-01
|
07 | (System) | New version approved |
2017-12-01
|
07 | (System) | Request for posting confirmation emailed to previous authors: John Levine |
2017-12-01
|
07 | John Levine | Uploaded new revision |
2017-11-14
|
06 | Murray Kucherawy | Added to session: IETF-100: dcrup Wed-0930 |
2017-11-14
|
06 | Murray Kucherawy | Changed consensus to Yes from Unknown |
2017-11-14
|
06 | Murray Kucherawy | Intended Status changed to Proposed Standard from None |
2017-11-14
|
06 | Murray Kucherawy | Notification list changed to Barry Leiba <barryleiba@computer.org> |
2017-11-14
|
06 | Murray Kucherawy | Document shepherd changed to Barry Leiba |
2017-09-13
|
06 | John Levine | New version available: draft-ietf-dcrup-dkim-crypto-06.txt |
2017-09-13
|
06 | (System) | New version approved |
2017-09-13
|
06 | (System) | Request for posting confirmation emailed to previous authors: John Levine |
2017-09-13
|
06 | John Levine | Uploaded new revision |
2017-08-06
|
05 | John Levine | New version available: draft-ietf-dcrup-dkim-crypto-05.txt |
2017-08-06
|
05 | (System) | New version approved |
2017-08-06
|
05 | (System) | Request for posting confirmation emailed to previous authors: John Levine |
2017-08-06
|
05 | John Levine | Uploaded new revision |
2017-07-28
|
04 | John Levine | New version available: draft-ietf-dcrup-dkim-crypto-04.txt |
2017-07-28
|
04 | (System) | New version approved |
2017-07-28
|
04 | (System) | Request for posting confirmation emailed to previous authors: John Levine |
2017-07-28
|
04 | John Levine | Uploaded new revision |
2017-07-07
|
03 | Alexey Melnikov | This document now replaces draft-levine-dcrup-dkim-crypto instead of None |
2017-07-03
|
Jasmine Magallanes | Posted related IPR disclosure: Jim Fenton's Statement about IPR related to draft-ietf-dcrup-dkim-crypto belonging to Cisco Technology Inc. | |
2017-07-01
|
03 | John Levine | New version available: draft-ietf-dcrup-dkim-crypto-03.txt |
2017-07-01
|
03 | (System) | New version approved |
2017-07-01
|
03 | (System) | Request for posting confirmation emailed to previous authors: John Levine |
2017-07-01
|
03 | John Levine | Uploaded new revision |
2017-06-20
|
02 | John Levine | New version available: draft-ietf-dcrup-dkim-crypto-02.txt |
2017-06-20
|
02 | (System) | New version approved |
2017-06-20
|
02 | (System) | Request for posting confirmation emailed to previous authors: John Levine |
2017-06-20
|
02 | John Levine | Uploaded new revision |
2017-06-12
|
01 | John Levine | New version available: draft-ietf-dcrup-dkim-crypto-01.txt |
2017-06-12
|
01 | (System) | New version approved |
2017-06-12
|
01 | (System) | Request for posting confirmation emailed to previous authors: John Levine |
2017-06-12
|
01 | John Levine | Uploaded new revision |
2017-04-28
|
00 | John Levine | New version available: draft-ietf-dcrup-dkim-crypto-00.txt |
2017-04-28
|
00 | (System) | WG -00 approved |
2017-04-28
|
00 | John Levine | Set submitter to "John Levine ", replaces to (none) and sent approval email to group chairs: dcrup-chairs@ietf.org |
2017-04-28
|
00 | John Levine | Uploaded new revision |