----- Original Message -----
From: "Eliot Lear" <[EMAIL PROTECTED]>
To: "Ned Freed" <[EMAIL PROTECTED]>
Sent: Wednesday, February 22, 2006 2:59 AM
Subject: Re: [ietf-dkim] Supporting alternate algorithms


> As my colleague Jim Fenton is fond of saying, I am reticent to impose
> restrictions on verifiers.  The issue here is how much they wish to
> trust SHA-1, and there's no need for the IETF to dictate to them on this
> count, and there should be no need for us to update the document when we
> want to pronounce SHA-1 dead.  That to me therefore rates a MAY.  Just
> as Phil mentioned in another note, we're pretty close to a green field
> here.  Had it been otherwise I might consider a SHOULD.

Green Fields ... full of mushrooms.

I think this ought to be part of the Migration Planning.  The past research
we done in regards to login/authorization methods, suggest the experts think
SHA1 is good enough for the next X years but that is should it definitely be
part of your planning to switch to sha-256.

In my opinion, lets remove this thorn from the side now for the new
protocol.  Make SHA1 and SHA-256 part of the default signing choices and
that both are required for DKIM support.  The technical recommendation
"should" be:

      You SHOULD use the highest protection you deem necessary for
      the transaction.

The signer could choose to use SHA1 for less-valuable transactions and
SHA256 for others.  Who knows? He might incorporate "enhanced security" into
his cost/business model.

If a wide spread SHA1 hack does come out,  signers will be able to switch to
SHA-256 on a moments notice.

The key is to make sure verifiers are ready for both.

This resolves it IMO.

--
Hector Santos, Santronics Software, Inc.
http://www.santronics.com


_______________________________________________
NOTE WELL: This list operates according to 
http://dkim.org/ietf-list-rules.html

Reply via email to