Cryptographic Algorithm and Key Usage Update to DomainKeys Identified Mail (DKIM)
draft-ietf-dcrup-dkim-usage-06
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2018-01-18
|
06 | (System) | RFC Editor state changed to AUTH48-DONE from AUTH48 |
2017-12-15
|
06 | (System) | RFC Editor state changed to AUTH48 from RFC-EDITOR |
2017-12-04
|
06 | (System) | RFC Editor state changed to RFC-EDITOR from EDIT |
2017-11-08
|
06 | (System) | IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor |
2017-11-07
|
06 | (System) | IANA Action state changed to Waiting on RFC Editor from Waiting on Authors |
2017-11-07
|
06 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2017-11-06
|
06 | (System) | IANA Action state changed to In Progress |
2017-11-06
|
06 | (System) | RFC Editor state changed to EDIT |
2017-11-06
|
06 | (System) | IESG state changed to RFC Ed Queue from Approved-announcement sent |
2017-11-06
|
06 | (System) | Announcement was received by RFC Editor |
2017-11-06
|
06 | Amy Vezza | IESG state changed to Approved-announcement sent from Approved-announcement to be sent::Point Raised - writeup needed |
2017-11-06
|
06 | Amy Vezza | IESG has approved the document |
2017-11-06
|
06 | Amy Vezza | Closed "Approve" ballot |
2017-11-06
|
06 | Amy Vezza | Ballot approval text was generated |
2017-11-04
|
06 | Cindy Morgan | New version available: draft-ietf-dcrup-dkim-usage-06.txt |
2017-11-04
|
06 | (System) | Secretariat manually posting. Approvals already received |
2017-11-04
|
06 | Cindy Morgan | Uploaded new revision |
2017-10-27
|
05 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed |
2017-10-27
|
05 | Scott Kitterman | New version available: draft-ietf-dcrup-dkim-usage-05.txt |
2017-10-27
|
05 | (System) | New version approved |
2017-10-27
|
05 | (System) | Request for posting confirmation emailed to previous authors: "D. Kitterman" |
2017-10-27
|
05 | Scott Kitterman | Uploaded new revision |
2017-09-28
|
04 | Cindy Morgan | IESG state changed to Approved-announcement to be sent::Point Raised - writeup needed from Waiting for Writeup |
2017-09-27
|
04 | Terry Manderson | [Ballot Position Update] New position, No Objection, has been recorded for Terry Manderson |
2017-09-27
|
04 | Ben Campbell | [Ballot comment] -4: "Verifiers MUST verify using rsa-sha256." Should this say "...MUST be able to..."? That is, am I correct in assuming that a verifier … [Ballot comment] -4: "Verifiers MUST verify using rsa-sha256." Should this say "...MUST be able to..."? That is, am I correct in assuming that a verifier will use the scheme specified by the signer if it is capable of doing so, and that it doesn't make sense to try to verify with rsa-sha256 if the signer used something else? |
2017-09-27
|
04 | Ben Campbell | [Ballot Position Update] New position, Yes, has been recorded for Ben Campbell |
2017-09-27
|
04 | Alia Atlas | [Ballot Position Update] New position, No Objection, has been recorded for Alia Atlas |
2017-09-27
|
04 | Kathleen Moriarty | [Ballot comment] Thanks for your response to the SecDir review and addressing the problem in another draft. https://datatracker.ietf.org/doc/review-ietf-dcrup-dkim-usage-04-secdir-lc-nystrom-2017-09-20/ |
2017-09-27
|
04 | Kathleen Moriarty | [Ballot Position Update] New position, Yes, has been recorded for Kathleen Moriarty |
2017-09-27
|
04 | Alvaro Retana | [Ballot Position Update] New position, No Objection, has been recorded for Alvaro Retana |
2017-09-27
|
04 | Benoît Claise | [Ballot Position Update] New position, No Objection, has been recorded for Benoit Claise |
2017-09-26
|
04 | Suresh Krishnan | [Ballot Position Update] New position, No Objection, has been recorded for Suresh Krishnan |
2017-09-26
|
04 | Adam Roach | [Ballot comment] I would have expected section 4 to be explicit in the interaction between the requirement that "rsa-sha1 MUST NOT be used for signing … [Ballot comment] I would have expected section 4 to be explicit in the interaction between the requirement that "rsa-sha1 MUST NOT be used for signing or verifying" and the Authentication-Results header defined in RFC 7001. In particular, I would have expected to see guidance here whether receipt of a message using sha1 should be coded as "neutral" or "policy": as an implementor, I would be unsure which one to use. |
2017-09-26
|
04 | Adam Roach | Ballot comment text updated for Adam Roach |
2017-09-26
|
04 | Adam Roach | [Ballot comment] I would have expected section 4 to be more explicit in the interaction between the requirement that "rsa-sha1 MUST NOT be used for … [Ballot comment] I would have expected section 4 to be more explicit in the interaction between the requirement that "rsa-sha1 MUST NOT be used for signing or verifying" and the Authentication-Results header defined in RFC 7001. In particular, I would have expected to see guidance here whether receipt of a message using sha1 should be coded as "neutral" or "policy": as an implementor, I would be unsure which one to use. |
2017-09-26
|
04 | Adam Roach | [Ballot Position Update] New position, No Objection, has been recorded for Adam Roach |
2017-09-26
|
04 | Warren Kumari | [Ballot Position Update] New position, No Objection, has been recorded for Warren Kumari |
2017-09-26
|
04 | Mirja Kühlewind | [Ballot comment] Please check and address the feedback provided by the gen-art review (Thanks Jari!). My understanding is that the normative language was discussed in … [Ballot comment] Please check and address the feedback provided by the gen-art review (Thanks Jari!). My understanding is that the normative language was discussed in detail for this draft but Jari brought up a point on forward-comparability with future algorithms regarding verification. I would also be interested to at least see a reply to that! |
2017-09-26
|
04 | Mirja Kühlewind | [Ballot Position Update] New position, No Objection, has been recorded for Mirja Kühlewind |
2017-09-26
|
04 | Deborah Brungard | [Ballot Position Update] New position, No Objection, has been recorded for Deborah Brungard |
2017-09-25
|
04 | Spencer Dawkins | [Ballot Position Update] New position, Yes, has been recorded for Spencer Dawkins |
2017-09-24
|
04 | Eric Rescorla | [Ballot Position Update] New position, No Objection, has been recorded for Eric Rescorla |
2017-09-24
|
04 | Alexey Melnikov | Ballot has been issued |
2017-09-24
|
04 | Alexey Melnikov | [Ballot Position Update] New position, Yes, has been recorded for Alexey Melnikov |
2017-09-24
|
04 | Alexey Melnikov | Created "Approve" ballot |
2017-09-24
|
04 | Alexey Melnikov | Ballot writeup was changed |
2017-09-20
|
04 | Tero Kivinen | Request for Last Call review by SECDIR Completed: Has Issues. Reviewer: Magnus Nystrom. |
2017-09-20
|
04 | Gunter Van de Velde | Request for Last Call review by OPSDIR Completed: Ready. Reviewer: Sheng Jiang. |
2017-09-13
|
04 | Jari Arkko | Request for Last Call review by GENART Completed: Ready. Reviewer: Jari Arkko. Sent review to list. |
2017-09-13
|
04 | Alexey Melnikov | Placed on agenda for telechat - 2017-09-28 |
2017-09-13
|
04 | (System) | IESG state changed to Waiting for Writeup from In Last Call |
2017-09-04
|
04 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Sheng Jiang |
2017-09-04
|
04 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Sheng Jiang |
2017-08-31
|
04 | (System) | IANA Review state changed to IANA OK - Actions Needed from IANA - Review Needed |
2017-08-31
|
04 | Amanda Baber | (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: The IANA Services Operator has completed its review of draft-ietf-dcrup-dkim-usage-04. If any part of this review is inaccurate, please let … (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: The IANA Services Operator has completed its review of draft-ietf-dcrup-dkim-usage-04. If any part of this review is inaccurate, please let us know. The IANA Services Operator understands that, upon approval of this document, there is a single action which we must complete. In the DKIM Hash Algorithms registry on the DomainKeys Identified Mail (DKIM) Parameters registry page located at https://www.iana.org/assignments/dkim-parameters/ the existing registration for sha1 will be changed from the current registration to TYPE: sha1 REFERENCE: [ RFC6376 ] STATUS: historic The IANA Services Operator understands that this is the only action required to be completed upon approval of this document. Note: The action requested in this document will not be completed until the document has been approved for publication as an RFC. This message is only to confirm the actions to be performed. Thank you, Amanda Baber Lead IANA Services Specialist |
2017-08-31
|
04 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Magnus Nystrom |
2017-08-31
|
04 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Magnus Nystrom |
2017-08-31
|
04 | Jean Mahoney | Request for Last Call review by GENART is assigned to Jari Arkko |
2017-08-31
|
04 | Jean Mahoney | Request for Last Call review by GENART is assigned to Jari Arkko |
2017-08-30
|
04 | Cindy Morgan | IANA Review state changed to IANA - Review Needed |
2017-08-30
|
04 | Cindy Morgan | The following Last Call announcement was sent out (ends 2017-09-13): From: The IESG To: IETF-Announce CC: dcrup@ietf.org, seth@sethblank.com, dcrup-chairs@ietf.org, alexey.melnikov@isode.com, draft-ietf-dcrup-dkim-usage@ietf.org … The following Last Call announcement was sent out (ends 2017-09-13): From: The IESG To: IETF-Announce CC: dcrup@ietf.org, seth@sethblank.com, dcrup-chairs@ietf.org, alexey.melnikov@isode.com, draft-ietf-dcrup-dkim-usage@ietf.org, Seth Blank Reply-To: ietf@ietf.org Sender: Subject: Last Call: (Cryptographic Algorithm and Key Usage Update to DKIM) to Proposed Standard The IESG has received a request from the DKIM Crypto Update WG (dcrup) to consider the following document: - 'Cryptographic Algorithm and Key Usage Update to DKIM' as Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the ietf@ietf.org mailing lists by 2017-09-13. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract The cryptographic algorithm and key size requirements included when DKIM was designed in the last decade are functionally obsolete and in need of immediate revision. This document updates DKIM requirements to those minimaly suitable for operation with currently specified algorithms. The file can be obtained via https://datatracker.ietf.org/doc/draft-ietf-dcrup-dkim-usage/ IESG discussion can be tracked via https://datatracker.ietf.org/doc/draft-ietf-dcrup-dkim-usage/ballot/ No IPR declarations have been submitted directly on this I-D. The document contains these normative downward references. See RFC 3967 for additional information: rfc8017: PKCS #1: RSA Cryptography Specifications Version 2.2 (Informational - IETF stream) |
2017-08-30
|
04 | Cindy Morgan | IESG state changed to In Last Call from Last Call Requested |
2017-08-30
|
04 | Alexey Melnikov | Last call was requested |
2017-08-30
|
04 | Alexey Melnikov | Last call announcement was generated |
2017-08-30
|
04 | Alexey Melnikov | Ballot approval text was generated |
2017-08-30
|
04 | Alexey Melnikov | Ballot writeup was generated |
2017-08-30
|
04 | Alexey Melnikov | IESG state changed to Last Call Requested from AD Evaluation |
2017-08-30
|
04 | Alexey Melnikov | IESG state changed to AD Evaluation from Publication Requested |
2017-08-22
|
04 | Murray Kucherawy | As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated … As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated 24 February 2012. (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? Proposed Standard. This is appropriate because it is updating a standards track document. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary The cryptographic algorithm and key size requirements included when DKIM was designed in the last decade are functionally obsolete and in need of immediate revision. This document updates DKIM requirements to those minimally suitable for operation with currently specified algorithms. Working Group Summary There were two points which were discussed at length, but consensus was reached and is appropriately reflected in the document. Additional concerns have been moved to other documents. Document Quality This has received security and DKIM community participation. No further expert reviews are warranted. This document removes obsolete protocol elements from a widely deployed and understood standard. Personnel Seth Blank is the Document Shepherd, and Alexey Melnikov is the responsible Area Director. (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. I believe this document is ready for publication. Since this is my first time as document shepherd, I was assisted by DCRUP chair Murray Kucherawy. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? No. (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. No additional expert reviews are warranted. (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. No. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why. Yes. (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. No. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? There was only one contentious issue (MUST NOT vs SHOULD NOT verify for validating rsa-sha1), and the working group reached consensus on MUST NOT after the objectors backed down. The current text survived a WGLC and appears therefore to have consensus. There are roughly 20 active participants of the working group, of which slightly more than half have been active on this document. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No. (11) Identify any ID nits the Document Shepherd has found in this document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. New downreference to 8017. RFC 3447 is an existing downref in RFC 6376 that this draft merely updates to use the newer RFC since 3447 is obsolete. (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. No additional formal reviews are necessary. (13) Have all references within this document been identified as either normative or informative? Yes. (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? No. (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. Yes. There is a downward reference to 8017. (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. No. (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 5226). I have confirmed compliance with all the above or that they do not apply. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. There are none. (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. No such review is necessary. |
2017-08-22
|
04 | Murray Kucherawy | Responsible AD changed to Alexey Melnikov |
2017-08-22
|
04 | Murray Kucherawy | IETF WG state changed to Submitted to IESG for Publication from Waiting for WG Chair Go-Ahead |
2017-08-22
|
04 | Murray Kucherawy | IESG state changed to Publication Requested |
2017-08-22
|
04 | Murray Kucherawy | IESG process started in state Publication Requested |
2017-08-22
|
04 | Murray Kucherawy | Tags Revised I-D Needed - Issue raised by WGLC, Doc Shepherd Follow-up Underway cleared. |
2017-08-22
|
04 | Murray Kucherawy | IETF WG state changed to Waiting for WG Chair Go-Ahead from WG Consensus: Waiting for Write-Up |
2017-08-22
|
04 | Seth Blank | Changed document writeup |
2017-08-21
|
04 | Seth Blank | Changed document writeup |
2017-08-21
|
04 | Seth Blank | Changed document writeup |
2017-08-21
|
04 | Scott Kitterman | New version available: draft-ietf-dcrup-dkim-usage-04.txt |
2017-08-21
|
04 | (System) | New version approved |
2017-08-21
|
04 | (System) | Request for posting confirmation emailed to previous authors: "D. Kitterman" |
2017-08-21
|
04 | Scott Kitterman | Uploaded new revision |
2017-08-20
|
03 | Murray Kucherawy | Changed consensus to Yes from Unknown |
2017-08-20
|
03 | Murray Kucherawy | Intended Status changed to Proposed Standard from None |
2017-08-20
|
03 | Murray Kucherawy | Tags Revised I-D Needed - Issue raised by WGLC, Doc Shepherd Follow-up Underway set. |
2017-08-20
|
03 | Murray Kucherawy | IETF WG state changed to WG Consensus: Waiting for Write-Up from In WG Last Call |
2017-08-18
|
03 | Seth Blank | Changed document writeup |
2017-08-12
|
03 | Rich Salz | IETF WG state changed to In WG Last Call from WG Document |
2017-07-31
|
03 | Scott Kitterman | New version available: draft-ietf-dcrup-dkim-usage-03.txt |
2017-07-31
|
03 | (System) | New version approved |
2017-07-31
|
03 | (System) | Request for posting confirmation emailed to previous authors: "D. Kitterman" |
2017-07-31
|
03 | Scott Kitterman | Uploaded new revision |
2017-07-18
|
02 | Murray Kucherawy | Added to session: IETF-99: dcrup Thu-0930 |
2017-07-18
|
02 | Murray Kucherawy | Notification list changed to Seth Blank <seth@sethblank.com> |
2017-07-18
|
02 | Murray Kucherawy | Document shepherd changed to Seth Blank |
2017-07-07
|
02 | Alexey Melnikov | This document now replaces draft-kitterman-dcrup-dkim-usage instead of None |
2017-06-07
|
02 | Scott Kitterman | New version available: draft-ietf-dcrup-dkim-usage-02.txt |
2017-06-07
|
02 | (System) | New version approved |
2017-06-07
|
02 | (System) | Request for posting confirmation emailed to previous authors: "D. Kitterman" , dcrup-chairs@ietf.org |
2017-06-07
|
02 | Scott Kitterman | Uploaded new revision |
2017-06-05
|
01 | Scott Kitterman | New version available: draft-ietf-dcrup-dkim-usage-01.txt |
2017-06-05
|
01 | (System) | New version approved |
2017-06-05
|
01 | (System) | Request for posting confirmation emailed to previous authors: "D. Kitterman" , dcrup-chairs@ietf.org |
2017-06-05
|
01 | Scott Kitterman | Uploaded new revision |
2017-05-30
|
00 | Scott Kitterman | New version available: draft-ietf-dcrup-dkim-usage-00.txt |
2017-05-30
|
00 | (System) | WG -00 approved |
2017-05-30
|
00 | Scott Kitterman | Set submitter to "Scott Kitterman ", replaces to (none) and sent approval email to group chairs: dcrup-chairs@ietf.org |
2017-05-30
|
00 | Scott Kitterman | Uploaded new revision |