I have a few comments about
draft-schaad-smime-algorithm-attribute-03.txt:
1) The key question is what should contain the field signatureAlgorithm
?
SignatureAlgorithmIdentifier is defined in section 10.1.2 from RFC
5652:
10.1.2.
SignatureAlgorithmIdentifier Some examples are questionable: is RSA really a "signature algorithm"
?
sha-1withRSA is really a signature mechanism, since it cannot be used for
encryption.
If "real signature algorithms" were being used in the OID, then half
of the problems mentioned in the draft would disappear.
This case should be mentioned in the draft.
The draft should also recommend the use of signature algorithms using both
a hash function and an asymetric algorithm.
2) We come from a point where, 20 years ago, the same certificate
was used for three purposes:
authentication, non repudiation and encipherment. RSA was the single algorithm used in practice. Since then, there are many situations where different certificates are used
for each purpose.
We now should recommend to use "real signature algorithms", which mean an
OID specifying
a combination of a hash function and an asymetric cryptographic algorithm. If a certificate is being used, then an OID specifying the algorithm in the
certificate should be OID
specifying a combination of a hash function and an asymetric cryptographic algorithm. When certificates are being used, when the ESSCertID is being used,
and when "real signature algorithms" are being used
then the new proposed protection attribute is not needed. The current draft does not mention this possibility.
3) There is another draft under discussion in the PKIX WG called: draft-ietf-pkix-ocspagility-09.
Although the field "certIdentifier" below is misnamed, the idea is to say that for Elliptic Curves we need two parameters instead of one. This is what the proposed draft is attempting to say: PreferredSignatureAlgorithm ::= SEQUENCE {
The syntax of AlgorithmIdentifier is defined in section 4.1.1.2 of
sigIdentifier specifies the signature algorithm the client prefers,
certIdentifier specifies the subject public key algorithm identifier
certIdentifier is OPTIONAL and provides means to specify parameters Note the this draft provides a correct example for a signature algorithm
identifier: ecdsa-with-sha256
The draft proposed by Jim should consider the case of OIDs for
Elliptic Curves
4) The draft is missing a risk analysis or examples for real
possibilities of substitution.
For the above reasons, I believe that a new draft should be issued.
Denis
----------
|
_______________________________________________ Ietf mailing list Ietf@xxxxxxxx https://www.ietf.org/mailman/listinfo/ietf