Hi, Watson

On 18 Nov 2016, at 9:18, Watson Ladd <[email protected]> wrote:

> Dear all,
> 
> In reviewing the proceedings now online I noticed that someone is
> proposing to support using the same key with multiple signature
> algorithms. This is a bad idea that makes everyone sad. Showing that a
> signature under one algorithm cannot be abused to obtain another
> signature with a different algorithm is not something that is done.

I don’t know where you got that, but I haven’t reviewed the proceedings. I 
believe you mean what I said about contexts in Ed448 (and possibly Ed25519ctx) 
from the CFRG draft.

The question raised in IPsec (and TLS and in 30 minutes also in Curdle) was 
whether to specify a non-empty context string fro Ed448 (like “IKEv2”), or 
whether to just use the empty string. 

The argument for adding the string is that people use the same keys for 
different purposes (not different algorithms) anyway, even if we tell them not 
to, and by adding a context string we’re preventing signing oracles between 
IKEv2 and other protocols. 

The argument against is that this encourages the bad practice of using the same 
key for different purposes. We could end up with people regularly re-using keys 
and then they do it with RSA. Or EDCSA. Or any algorithm that does not feature 
contexts.

At no point did anyone propose support for the same key with multiple signature 
algorithms or even for multiple purposes.

HTH

Yoav

_______________________________________________
IPsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to