IPSECME

Internet Engineering Task Force (IETF)                      R. Moskowitz
Internet-Draft
Request for Comments: 9373                                HTT Consulting
Intended status:
Category: Standards Track                                     T. Kivinen
Expires: 7 July 2023
ISSN: 2070-1721
                                                           M. Richardson
                                                               Sandelman
                                                          3 January
                                                              March 2023

                        EdDSA value for IPSECKEY
               draft-moskowitz-ipsecme-ipseckey-eddsa-09

Abstract

   This document assigns a value for EdDSA Edwards-Curve Digital Signature
   Algorithm (EdDSA) Public Keys to the IPSECKEY
   IANA "IPSECKEY Resource Record
   Parameters" registry.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents an Internet Standards Track document.

   This document is a product of the Internet Engineering Task Force
   (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list  It represents the consensus of current Internet-
   Drafts is at https://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid the IETF community.  It has
   received public review and has been approved for a maximum publication by the
   Internet Engineering Steering Group (IESG).  Further information on
   Internet Standards is available in Section 2 of six months RFC 7841.

   Information about the current status of this document, any errata,
   and how to provide feedback on it may be updated, replaced, or obsoleted by other documents obtained at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on 7 July 2023.
   https://www.rfc-editor.org/info/rfc9373.

Copyright Notice

   Copyright (c) 2023 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents (https://trustee.ietf.org/
   license-info)
   (https://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Revised BSD License text as described in Section 4.e of the
   Trust Legal Provisions and are provided without warranty as described
   in the Revised BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
   2.  IPSECKEY support Support for EdDSA  . . . . . . . . . . . . . . . . .   2
   3.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .   2
     3.1.  Update to the IANA IPSECKEY Registry Update . . . . . . . . . . . . . .   2
       3.1.1.  Reformat the Algorithm Type Field Subregistry . . . . . .   3 Registry
       3.1.2.  Add to the Algorithm Type Field Subregistry . . . . . . .   3 Registry
   4.  Security Considerations . . . . . . . . . . . . . . . . . . .   3
   5.  References  . . . . . . . . . . . . . . . . . . . . . . . . .   3
     5.1.  Normative References  . . . . . . . . . . . . . . . . . .   3
     5.2.  Informative References  . . . . . . . . . . . . . . . . .   4
   Appendix A.  IPSECKEY EdDSA example . . . . . . . . . . . . . . .   4 Example
   Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . .   4
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .   4

1.  Introduction

   IPSECKEY [RFC4025) [RFC4025] is a resource record (RR) for the Domain Name
   System (DNS) that is used to store public keys for use in IP security
   (IPsec) systems.  The IPSECKEY RR relies on the IPSECKEY Algorithm "Algorithm
   Type Field Field" registry [IANA-IPSECKEY] to enumerate the permissible
   formats for the public keys.

   This document adds support for Edwards-Curve Digital Security
   Algorithm (EdDSA) public keys in the format defined in [RFC8080] to
   the IPSECKEY RR.

2.  IPSECKEY support Support for EdDSA

   When using the EdDSA public key in the IPSECKEY RR, then the value
   TBD1 4 is
   used as an algorithm and the public key is formatted as specified in Section 3 of the
   "Edwards-Curve Digital Security Algorithm (EdDSA) for DNSSEC" ([RFC8080]) document.
   (Section 3 of [RFC8080]).

    +=======+=====================+======================+===========+
    | Value | Description         | Format description Description   | Reference

   TBD1 |
    +=======+=====================+======================+===========+
    | 4     | An EdDSA Public Key | [RFC8080], Sec. Section 3     [ThisRFC] | This RFC  |
    +-------+---------------------+----------------------+-----------+

                                 Table 1

3.  IANA Considerations

3.1.  Update to the IANA IPSECKEY Registry Update

3.1.1.  Reformat the Algorithm Type Field Subregistry

   This document requests Registry

   Per this document, IANA to add a new field has added the "Format description" Description" field to
   the "Algorithm Type Field" subregistry registry of the "IPSECKEY Resource Record
   Parameters" [IANA-IPSECKEY].  Also, this document requests  In addition, IANA to update has updated the
   "Description" field in existing entries of that registry to
   explicitly state that is they are for "Public" keys:

   +=======+==========================+====================+===========+
   | Value | Description              | Format description Description | Reference |
   +=======+==========================+====================+===========+
   | 0     | No Public key            |                    | [RFC4025] |
   |       | is present                         [RFC4025]               |                    |           |
   +-------+--------------------------+--------------------+-----------+
   | 1     | A DSA Public Key             | [RFC2536], Sec. 2         | [RFC4025] |
   |       | Key                      | Section 2      A          |           |
   +-------+--------------------------+--------------------+-----------+
   | 2     | An RSA Public Key            | [RFC3110], Sec. 2         | [RFC4025] |
   |       | Key                      | Section 2          |           |
   +-------+--------------------------+--------------------+-----------+
   | 3     | An ECDSA                 | [RFC6605],         | [RFC8005] |
   |       | Public Key        [RFC6605], Sec.               | Section 4     [RFC8005]          |           |
   +-------+--------------------------+--------------------+-----------+

                                  Table 2

   IANA is requested to update the added a reference of that registry by adding
   the RFC number to be assigned to this document. document to the "Algorithm Type Field"
   registry.

3.1.2.  Add to the Algorithm Type Field Subregistry Registry

   Further, this document requests IANA to make has made the following addition to the "IPSECKEY Resource Record Parameters" [IANA-IPSECKEY]
   registry:

   IPSECKEY:
      This document defines the new IPSECKEY value TBD1 (suggested: 4)
      (Section 2) in the "Algorithm Type
   Field" subregistry of registry within the "IPSECKEY Resource Record Parameters" registry.
   [IANA-IPSECKEY]:

    +=======+=====================+======================+===========+
    | Value | Description         | Format description Description   | Reference

   TBD1 |
    +=======+=====================+======================+===========+
    | 4     | An EdDSA Public Key | [RFC8080], Sec. Section 3 | This RFC  |
    +-------+---------------------+----------------------+-----------+

                                 Table 3     [ThisRFC]

4.  Security Considerations

   No new issues than

   The security considerations discussed in [RFC4025] describes. apply.  This
   document does not introduce any new security considerations.

5.  References

5.1.  Normative References

   [IANA-IPSECKEY]
              IANA, "IPSECKEY Resource Record Parameters",
              <https://www.iana.org/assignments/ipseckey-rr-parameters/
              ipseckey-rr-parameters.xhtml>.
              <https://www.iana.org/assignments/ipseckey-rr-parameters>.

   [RFC8080]  Sury, O., Edmonds, R., O. and RFC Publisher, R. Edmonds, "Edwards-Curve Digital Security
              Algorithm (EdDSA) for DNSSEC", RFC 8080,
              DOI 10.17487/RFC8080, February 2017,
              <https://www.rfc-editor.org/info/rfc8080>.

5.2.  Informative References

   [RFC4025]  Richardson, M.

   [RFC2536]  Eastlake 3rd, D., "DSA KEYs and SIGs in the Domain Name
              System (DNS)", RFC 2536, DOI 10.17487/RFC2536, March 1999,
              <https://www.rfc-editor.org/info/rfc2536>.

   [RFC3110]  Eastlake 3rd, D., "RSA/SHA-1 SIGs and RSA KEYs in the
              Domain Name System (DNS)", RFC Publisher, 3110, DOI 10.17487/RFC3110,
              May 2001, <https://www.rfc-editor.org/info/rfc3110>.

   [RFC4025]  Richardson, M., "A Method for Storing IPsec Keying
              Material in DNS", RFC 4025, DOI 10.17487/RFC4025, March
              2005, <https://www.rfc-editor.org/info/rfc4025>.

   [RFC6605]  Hoffman, P. and W.C.A. Wijngaards, "Elliptic Curve Digital
              Signature Algorithm (DSA) for DNSSEC", RFC 6605,
              DOI 10.17487/RFC6605, April 2012,
              <https://www.rfc-editor.org/info/rfc6605>.

   [RFC8005]  Laganier, J., "Host Identity Protocol (HIP) Domain Name
              System (DNS) Extension", RFC 8005, DOI 10.17487/RFC8005,
              October 2016, <https://www.rfc-editor.org/info/rfc8005>.

Appendix A.  IPSECKEY EdDSA example Example

   The following is an example of an IPSECKEY RR with no gateway, and an
   EdDSA public
   key base64 encode with no gateway: key.  It uses the IPSECKEY presentation format which is
   base64.

      foo.example.com. IN IPSECKEY (
            10 0 4 . 3WTXgUvpn1RlCXnm80gGY2LZ/ErUUEZtZ33IDi8yfhM= )

   The associated EdDSA private key (in hex): hex) is as follows:

      c7be71a45cbf87785f639dc4fd1c82637c21b5e02488939976ece32b9268d0b7

Acknowledgments

   Thanks to the Security Area director, Director, Paul Wouters, for his initial
   review.
   And  Also, thanks to Security Area director, Director, Roman Danyliw, for
   his final reviews and
   draft document shepherding.

Authors' Addresses

   Robert Moskowitz
   HTT Consulting
   Oak Park, MI 48237
   United States of America
   Email: rgm@labs.htt-consult.com

   Tero Kivinen
   Email: kivinen@iki.fi

   Michael C. Richardson
   Sandelman Software Works
   Email: mcr+ietf@sandelman.ca
   URI:   https://www.sandelman.ca/