Internet-Draft | IPSECKEY EdDSA | August 2022 |
Moskowitz & Kivinen | Expires 11 February 2023 | [Page] |
This document assigns a value for EdDSA Public Keys to the IPSECKEY IANA registry.¶
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.¶
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.¶
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."¶
This Internet-Draft will expire on 11 February 2023.¶
Copyright (c) 2022 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License.¶
The IPSECKEY IANA Registry specifically enumerates the various Algorithm Types used. This document adds support for the EdDSA algorithm's Public Keys in IPSECKEY.¶
The IPSECKEY RR [RFC4025] defines the 'Algorithm Type' for specifying the PK Algorithm. Herein we are adding the EdDSA algorithm.¶
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.¶
The new EdDSA value uses [RFC8080] for the IPSECKEY encoding:¶
Value Description TBD1 (suggested value 4) An EdDSA Public Key is present, in the format defined in [RFC8080]¶
This document requests IANA to clarify the text in the "Algorithm Type Field" subregistry of the "IPSECKEY Resource Record Parameters" [IANA-IPSECKEY] registry to explicitly state this is for "Public" keys:¶
Value Description Reference 1 A DSA Public Key is present, in the format defined in [RFC2536] [RFC4025] 2 A RSA Public Key is present, in the format defined in [RFC3110] [RFC4025] 3 An ECDSA Public Key is present, in the format defined in [RFC6605] [RFC8005]¶
Futher, this document requests IANA to make the following addition to the "IPSECKEY Resource Record Parameters" [IANA-IPSECKEY] registry:¶
Value Description Reference TBD1 (suggested value 4) [This] An EdDSA Public Key is present, in the format defined in [RFC8080]¶
The following is an example of an IPSECKEY RR with an EdDSA public key base64 encode with no gateway:¶
foo.example.com IN IPSECKEY (10 0 4 . 3WTXgUvpn1RlCXnm80gGY2LZ/ErUUEZtZ33IDi8yfhM= )¶
The associated EdDSA private key (in hex):¶
c7be71a45cbf87785f639dc4fd1c82637c21b5e02488939976ece32b9268d0b7¶
Thanks to Security Area director, Paul Wouters, for initial review.¶