[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [minion-cvs] more minor patches to the spec



Dear All,

Yes I am one of these sad people that reads the commit messages. I am not 
sure about one of the modifications:

> @@ -166,17 +158,7 @@
>  * The address data length is specified by the ``Routing Size'' field
>    contained in the subheader.
>  * Padding of zeroes is used to make the size of the Routing Extension a
> -  multiple of 128 bytes.  
> -
> -  [XXXX Something's wrong here. the routing size limits the routing info
> -        in the first subheader to fit within the 86 byte limit (the
> -        size of the plaintext of a subheader), but here we talk about
> -        128, the size of the crypttext of the subheader. What's up?
> -   -RD]
> - 
> -  [XXXX OAEP padding adds 41 bytes.  Thus, for PK_Encrypt(Foo, K) to
> -        fit in 127 bytes (to be input for RSA), you need Len(Foo)<=86.
> -   -NM]
> +  multiple of 86 bytes.  

I think the original "128 bytes" was right. The Routing extrnsion is not 
encrypted using RSA, but simply using a symmetric cipher. It still needs to 
be the same size as multiple sub headers, therefore a multiple of 128.

>  
>  The Routing Extension corresponding to a particular subheader is
>  encrypted using the Encrypt function with key=Hash(Shared Secret,
> @@ -196,6 +178,9 @@
>  [XXXX They used to be Flags and Address. We do not have a Flags
>  anymore since all the information is contained in the address. -GD]
>  
> +[XXXX so should we remove F and rename A to R? Does SHS include the
> +routing extension blocks? -RD]
> +

Yes it should be changed.

> +[XXXX should we mention david hopwood's remark about 'mailbox' vs
> + 'email address'? -RD]
> +

We should clarify that both paradigms can be supported using LOCAL/SMTP 
final addresses.

>  [XXXX I would add a type field for identification, and I think it is
>  ok -GD]
>  
> +[XXXX That's interesting. My first thought would have been to PK-encrypt
> +      the hop secrets to the recipient. So not even a (separate) password
> +      needs to be remembered. But I guess that takes up a lot of
> +      space. -RD]
> +
> +[XXXX Speaking of which, exactly 32 bytes of what? it looks like the
> +      above proposed 'tag' format has some recognizable plaintext? So
> +      we may need to PK-encrypt it anyway, or otherwise make it always
> +      plausible? -RD]
> +
> +

This was my original idea as well: The client has a 1024 bit RSA key (like 
mixes) and the last sub-header is encrypted under it. It does not 
therefore need to remember anything.

Yours,

George