On 22/05/17 11:14, Eran Messeri wrote:
+1 for switching to RSA PSS.
I don't have any insight into why RSA was originally in 6962, so can't argue strongly in favour of keeping it.

I think RSA PKCS#1 v1.5 was permitted by RFC6962 simply because the authors believed (and were proven correct) that some log operators might not be able to use ECDSA.

I'm in favour of dropping RSA PKCS#1 v1.5 from 6962-bis. In 2017, it's not unreasonable to expect all log operators to be able to use ECDSA.

I'm _not_ in favour of adding RSA PSS, for the reasons Brian mentioned...
  "RSA signatures in general are difficult for some devices to process
   due to their large size. It would be frustrating to have used a pure
   ECC infrastructure with no RSA involved at all, only to need to
   implement RSA for the purpose of verifying signatures from logs."
...and because I'm pretty sure that, today, ECDSA is supported more widely (by deployed OSes and crypto toolkits) than RSA PSS.

On Fri, May 12, 2017 at 8:18 PM, Richard Barnes <[email protected] <mailto:[email protected]>> wrote:

    +1


    On Fri, May 12, 2017 at 2:51 PM, Brian Smith <[email protected]
    <mailto:[email protected]>> wrote:

        Hi,

        PKCS#1 1.5 signatures are obsolete. New specifications should not
        mandate support for them.

        RSA signatures in general are difficult for some devices to process
        due to their large size. It would be frustrating to have used a pure
        ECC infrastructure with no RSA involved at all, only to need to
        implement RSA for the purpose of verifying signatures from logs.
        Thus
        I think the group should consider dropping any mention of RSA
        signatures from section 10.4.so <http://10.4.so> that log
        clients do not have to
        implement RSA.

        If it really is important to have RSA signatures, then RSA PSS
        should
        be used instead. In particular, it would be good to require the same
        restricted form specified for TLS, where the same digest algorithm
        must be used for all parts of the signature. Note that RSA PSS
        can be
        made deterministic by using a fixed salt, and most
        implementations of
        RSA PSS seem to support fixed salts if the salt length is set to
        zero.
        As mentioned in the RSA PSS specification, PSS signatures are more
        secure than PKCS#1 1.5 signatures even with a zero-length salt.

        Cheers,
        Brian
        --
        https://briansmith.org/

        _______________________________________________
        Trans mailing list
        [email protected] <mailto:[email protected]>
        https://www.ietf.org/mailman/listinfo/trans
        <https://www.ietf.org/mailman/listinfo/trans>



    _______________________________________________
    Trans mailing list
    [email protected] <mailto:[email protected]>
    https://www.ietf.org/mailman/listinfo/trans
    <https://www.ietf.org/mailman/listinfo/trans>




_______________________________________________
Trans mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/trans


--
Rob Stradling
Senior Research & Development Scientist
COMODO - Creating Trust Online
Office Tel: +44.(0)1274.730505
Office Fax: +44.(0)1274.730909
www.comodo.com

COMODO CA Limited, Registered in England No. 04058690
Registered Office:
  3rd Floor, 26 Office Village, Exchange Quay,
  Trafford Road, Salford, Manchester M5 3EQ

This e-mail and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. If you have received this email in error please notify the sender by replying to the e-mail containing this attachment. Replies to this email may be monitored by COMODO for operational or business reasons. Whilst every endeavour is taken to ensure that e-mails are free from viruses, no liability can be accepted and the recipient is requested to use their own virus checking software.

_______________________________________________
Trans mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/trans

Reply via email to