On Oct 23, 2006, at 10:52 AM, Hallam-Baker, Phillip wrote:

The deployment scenarios do not capture the downgrade attack problem correctly.

As has been repeatedly pointed out on the list and never rebutted the only way you can have a successful transition from a state where the whole world uses algorithm A to one where the whole world uses algorithm B without having a period where one group or the other is unable to achieve their security goals is to:

* Sign messages with both algorithms
* Have a policy statement that specifies that messages are signed with both algorithms.

When more than one algorithm is offered, where the signer is also responding to an attack vector, the following is also desired -

  * Indicate which of algorithms are deprecated.

However, this strategy is not to be handled in the initial specifications.

An optimal location for this information to minimize overhead is within the key records. There is also a desire to eliminate policy references in various scenarios not compatible with preventing this downgrade concern.

-Doug



_______________________________________________
NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to