Internet DRAFT - draft-qu-identifier-sm3-for-tsig

draft-qu-identifier-sm3-for-tsig



Internet Engineering Task Force                              P.Qu
Internet Draft                                               Z.Li
Intended status: Experimental                                J.Chen
Expires: August 27 2023                                         X.Fan
         China Academy of Information and Communications Technology
                                                    February 26, 2023
     ShangMi (SM) cryptographic algorithms for DNS Zone Transfers (TSIG)
              draft-qu-identifier-sm3-for-tsig-00


Abstract

   This document describes how to use a newly added message digest
   algorithm "SM3" in the TSIG protocol. It can be used to calculate
   the digest for the TSIG key by using a hash function. This document
   details the supplementation of the SM3 algorithm in TSIG.

Status of this Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six
   months and may be updated, replaced, or obsoleted by other documents
   at any time.  It is inappropriate to use Internet-Drafts as
   reference material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html

   This Internet-Draft will expire on August 27, 2023.


Copyright Notice

   Copyright (c) 2023 IETF Trust and the persons identified as the
   document authors. All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of

<Qu,etal .>               Expires August 27, 2023              [Page 1]

Internet-Draft               sm for tsig                 February 2023
   publication of this document. Please review these documents
   carefully, as they describe your rights and restrictions with
   respect to this document. Code Components extracted from this
   document must include Simplified BSD License text as described in
   Section 4.e of the Trust Legal Provisions and are provided without
   warranty as described in the Simplified BSD License.

Table of Contents

   1. Introduction..................................................2
      1.1. The SM3 Algorithm........................................2
      1.2. Terminology..............................................2
   2. Algorithm Identifiers.........................................3
   3. SM3 Algorithm application.....................................3
      3.1. Secret Key in TSIG.......................................3
      3.2. TSIG Calculation.........................................3
      3.3. Algorithm Process........................................3
   4. IANA Consideration............................................4
   5. Security Considerations.......................................4
   6. References....................................................4
      6.1. Normative References.....................................4
      6.2. Informative References...................................5
   7. Acknowledgments ........................................... ..5

1. Introduction

   This document describes a newly added message digest algorithm "SM3"
   in the SecretKey Transaction Authentication for DNS(TSIG) protocol.
   It can be used to calculate the digest for the TSIG key by using a
   hash function. This document details the supplementation of the SM3
   algorithm in TSIG.

1.1. The SM3 Algorithm

   This document describes the SM3 algorithm for supplementing the
   existing TSIG protocol by generating output through a hash function
   to compute digests on TSIG keys. SM3 has already been accepted by
   ISO in ISO/IEC 10118-3:2018 [ISO-SM3] and has also been described in
   detailin[GBT.32905-2016].

   The SM3 cryptographic digest algorithm,  as the commercial
   cryptographic hash algorithm standard announced by the State
   Cryptography Administration of China in 2010, is capable of digital
   signature and verification in commercial cryptographic applications.
   It is an improved algorithm based on SHA-256.

1.2. Terminology

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and

<Qu,etal .>               Expires August 27, 2023              [Page 2]

Internet-Draft               sm for tsig                 February 2023
   "OPTIONAL" in this document are to be interpreted as described in
   [RFC2119] and [ISO-SM3] when, and only when, they appear in all
   capitals,as shown here.

2.Algorithm Identifiers

       TSIG_SM3={0xC6};
   The algorithm defined here has the following identifiers:

3. SM3 Algorithm application
   The following is a description of how to use the SM3 algorithm in
   TSIG.

3.1. Secret Key in TSIG

   The authentication mechanism proposed in TSIG [RFC8945] uses shared
   secret keys to establish a trust relationship between two entities.
   Such keys must be protected in a fashion similar to private keys,
   lest a third party masquerade as one of the intended parties (forge
   MACs).

3.2. TSIG Calculation

   The only message digest algorithm specified in TSIG [RFC8945] is
   "HMAC-MD5" (see [RFC1321], [RFC2104]). The "HMAC-MD5" algorithm
   mustbeimplementedforinteroperability.

   Other algorithms, such as SM3, can be specified. Names and 
   definitions of new algorithms MUST be registered with IANA. 
   All multioctet integers in the TSIG record are sent in network 
   byte order(see[RFC10352.3.2]).

3.3. Algorithm Process

   The SM3 algorithm is improved on the basis of SHA-256. The essence
   of the algorithm is to generate a fixed-length hash value after
   filling and iteratively compressing the data of any length. The
   length of the message group is 512 bits, and the length of the
   digestgeneratedbythefinaloutputis256bits.

   1.Padding: Add a 1 to the end of the given message and fill with
      several 0 s, so that the length of the filled message is an
      integermultipleof512.

   2.Grouping:The filled message is grouped into groups of 512 bits.


<Qu,etal .>               Expires August 27, 2023              [Page 3]

Internet-Draft               sm for tsig                 February 2023
   3.Iterative compression: Message extension is performed on each
      group, and the final hash value is obtained with the help of
      registers.

4. IANA Consideration

   As mentioned in TSIG[RFC8945], IANA is expected to create and
   maintain a registry of algorithm names to be used as "Algorithm
   Names" as defined in Section 2.3. Algorithm names are text strings
   encoded using the syntax of a domain name. There is no structure
   required other than names for different algorithms that must be
   unique when compared as DNS names, i.e., comparison is case 
   insensitive.

   Assign the name "TSIG_SM3" to the "TSIG Cipher Suites" registry;
   refertothisdocument:

   Assign the value 0x0708 with the name "TSIG_sm3" to the "TLS
   SignatureScheme"registry:

          Value        Description     Recommended     Reference

          0x0708         TSIG_sm3          No            RFC
   Table1

5. Security Considerations

   At the time of writing, there are no known weak keys to the SM
   family of encryption algorithms such as SM2, SM3, and SM4, and no
   security issues have been identified with these algorithms.

   Thus far,the security of the SM3 algorithm is relatively reliable.

6. References

6.1. Normative References

   [ISO-SM3]  International Organization for Standardization, "IT
              Security techniques -- Hash-functions -- Part 3: Dedicated
              hash-functions", ISO/IEC 10118-3:2018, October 2018,
              <https://www.iso.org/standard/67116.html>.

   [RFC1321] Rivest, R., "The MD5 Message-Digest Algorithm", 
             RFC 1321, DOI 10.17487/RFC1321, April 1992, 
             <https://www.rfc-editor.org/info/rfc1321>.

   [RFC2104] Krawczyk, H., Bellare, M., and R. Canetti, "HMAC: 
             Keyed-Hashing for Message Authentication", RFC 2104,
             DOI 10.17487/RFC2104, February 1997, 
             <https://www.rfc-editor.org/info/rfc2104>.

<Qu,etal .>               Expires August 27, 2023              [Page 4]

Internet-Draft               sm for tsig                 February 2023

   [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
            Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119,
             March 1997, <https://www.rfc-editor.org/info/rfc2119>.

   [RFC8945]  Dupont, F., Morris, S., Vixie, P., Eastlake 3rd, D.,
              Gudmundsson, O., and B. Wellington, "Secret Key
              Transaction Authentication for DNS (TSIG)", STD 93,
              RFC 8945, DOI 10.17487/RFC8945, November 2020,
              <https://www.rfc-editor.org/info/rfc8945>.

6.2.Informative References

   [GBT.32905-2016]
              Standardization Administration of China, "Information
              security technology --- SM3 cryptographic hash algorithm",
              GB/T 32905-2016, March 2017, <http://www.gmbz.org.cn/
              upload/2018-07-24/1532401392982079739.pdf>.

7. Acknowledgments

   Would like to thank X. Fan, J. Chen, Z. Li who provided special
   important suggestions and invaluable comments. This document was
   prepared using 2-Word-v2.0.template.dot.

Authors' Addresses

   Peng Qu
   CAICT
   No.52 Huayuan North Road, Haidian District
   Beijing, Beijing, 100191
   China
   Phone: +86 186 2913 9201
   Email: qupeng@caict.ac.cn
   









<Qu,etal .>               Expires August 27, 2023              [Page 5]

Internet-Draft               sm for tsig                 February 2023


   Jian Chen
   CAICT
   No.52 Huayuan North Road, Haidian District
   Beijing, Beijing, 100191
   China
   Phone: +86 138 1103 3332
   Email: chenjian3@caict.ac.cn


   Xiaotian Fan
   CAICT
   No.52 Huayuan North Road, Haidian District
   Beijing, Beijing, 100191
   China
   Phone: +86 134 0108 6945
   Email: fanxiaotian@caict.ac.cn


   Zhiping Li
   CAICT
   No.52 Huayuan North Road, Haidian District
   Beijing, Beijing, 100191
   China
   Phone: +86 185 1107 1386
   Email: lizhiping@caict.ac.cn


   Jiagui Xie
   CAICT
   No.52 Huayuan North Road, Haidian District
   Beijing, Beijing, 100191
   China
   Phone: +86 150 0138 5070
   Email: xiejiagui@caict.ac.cn














<Qu,etal .>               Expires August 27, 2023              [Page 6]