Elliptic Curve Cryptography (ECC) in OpenPGP
RFC 6637
Yes
(Sean Turner)
No Objection
(Adrian Farrel)
(Benoît Claise)
(Brian Haberman)
(Gonzalo Camarillo)
(Robert Sparks)
(Ron Bonica)
(Stewart Bryant)
(Wesley Eddy)
Note: This ballot was opened for revision 10 and is now closed.
Barry Leiba Former IESG member
Yes
Yes
(2012-04-11 for -12)
Unknown
Some very minor comments [UPDATE: adequately addressed in -12]: Section 2: Any implementation MAY adhere to the format and methods specified in this document, in which case such an implementation is called a compliant application. That seems a bit of a silly use of 2119 language. I think what you really mean is this: Any implementation that adheres to the format and methods specified in this document is called a compliant application. The sentence after that seems silly as well: the normative language here only applies to applications that want it to apply to them. We don't lock people up if they don't comply with our specs. It's a small point, and I completely don't mind if you ignore me here, but I suggest removing the sentence.
Sean Turner Former IESG member
Yes
Yes
(for -10)
Unknown
Stephen Farrell Former IESG member
Yes
Yes
(2012-04-11 for -12)
Unknown
Please also consider the (very recent) comments from the secdir review. [1] [1] http://www.ietf.org/mail-archive/web/secdir/current/msg03228.html My previous comments are below but from a quick glance seem to be addressed in -12. Two substantive comments and a bunch of nits, but this is good stuff. #1 The write up talks about running code which is great. Did the implementers of both take a look at this version of the document? I don't recall any last-minute changes but no harm checking. #2 I was left wondering about pkcs#1.5 and bleichenbacher's TLS attack and other side-channel attacks, e.g. based on timing or power. Those are not mentioned here, but are not things about which every coder would know. Is there a good document covering such side-channels against PGP, and/or ECC that could be added to section 13? (I'd bet there is, doesn't need to be an RFC.) I think that'd be a good addition. If there's no good document at least some mention of side channels as a security consideration would be good. Nits: - 1st para of section 5 reads as if the ECDH variant here is not interoperable with 6090, is that the case or not? If not (as I hope) then fixing that would be good. - the 2119 language at the end of section 6 is odd, better to say you MUST NOT use another format if there's any doubt that any recipient doesn't support the new format. - Does the 2119 lanaguage in section 7 mean that implementations MUST support all of sha-256, sha-384 and sha-512? I've no problem with that but making it clear would be better for interop. Section 12 sort of says otherwise but its a little confusing. Maybe add a forward reference to section 12 from 7? (Is the section 13 forward reference there correct?) - start of p7 s/respecfully/respectively/ nice typo:-) same typo elsewhere as well - the pesudocode on p7 would be better as a figure so it can be referenced. - "the" is missing in various places, I skipped over a bunch until it got to me;-) that was in section 10: s/applying KDF/applying the KDF/ - section 11 could confuse a coder as to whether the truncated form or usual encoding of the OIDs is used in the protocol. Making that clearer would be good, e.g., by saying that the non-truncated form is never used in this protocol (but would be found in e.g., x.509 certs for keys concerned). - The reference to TripleDES in section 13 can I guess be deleted and probably refers to earlier text that's no longer present.
Adrian Farrel Former IESG member
No Objection
No Objection
(for -11)
Unknown
Benoît Claise Former IESG member
No Objection
No Objection
(for -13)
Unknown
Brian Haberman Former IESG member
No Objection
No Objection
(for -11)
Unknown
Gonzalo Camarillo Former IESG member
No Objection
No Objection
()
Unknown
Pete Resnick Former IESG member
No Objection
No Objection
(2012-04-12)
Unknown
[Thanks for address my comments]
Robert Sparks Former IESG member
No Objection
No Objection
(for -12)
Unknown
Ron Bonica Former IESG member
No Objection
No Objection
(for -11)
Unknown
Russ Housley Former IESG member
No Objection
No Objection
(2012-04-09 for -11)
Unknown
Thanks for addressing issues raised in the Gen-ART Review by Christer Holmberg on 19-Mar-2012. I suggest an update to the Abstract: This document defines an Elliptic Curve Cryptography extension to the OpenPGP public key format and specifies three Elliptic Curves that enjoy broad support by other standards, including standards published by the US National Institute of Standards and Technology. The document specifies the conventions for interoperability between compliant OpenPGP implementations that make use of this extension and these Elliptic Curves.
Stewart Bryant Former IESG member
No Objection
No Objection
()
Unknown
Wesley Eddy Former IESG member
No Objection
No Objection
(for -12)
Unknown