> What's our plan to mitigate that risk? Slow rollout? Enterprise policy? 
Both? Something else entirely?

We also worked with a variety of vendors to fix incompatibilities that were 
brought to our attention, including Vercel, ZScaler, and PayPal CN (who 
have all since patched prior to any level of stable deployment).

> I'll LGTM once the review gates are flipped

Ack.
On Wednesday, March 20, 2024 at 1:58:33 AM UTC-4 yoav...@chromium.org wrote:

> On Tue, Mar 19, 2024 at 10:23 PM David Benjamin <davi...@chromium.org> 
> wrote:
>
>> > I'm guessing we're talking about MITM middleboxes, is that correct?
>> > What's our plan to mitigate that risk? Slow rollout? Enterprise policy? 
>> Both? Something else entirely?
>>
>> Whether the middlebox MITMs the TLS connection is not terribly important. 
>> As long as they attempt to parse the ClientHello, they will need to handle 
>> the larger ClientHellos. They already do in that there's nothing stopping 
>> session tickets, etc., making the ClientHello large already, but Kyber 
>> makes it more likely.
>>
>> We have already done a slow rollout. This has been running on 10% stable 
>> for several months now, and so far things seem to be fine. Some initial 
>> compat problems, but largely fixed now. We're far, far, *far* past the 
>> point that there's nothing more we can smoke out without proceeding to 100%.
>>
>> And, yeah, the plan to mitigate the remaining risk is an enterprise 
>> policy, PostQuantumKeyAgreementEnabled, that admins can set while their 
>> middlebox vendors become post-quantum-ready. The admin policy has been in 
>> place for quite some time now, and has been communicated in 
>> enterprise release notes. Also the presence of any such incompatibility on 
>> an enterprise network blocks *any* deployment of post-quantum 
>> algorithms, so ultimately the middleboxes will just need to get fixed. The 
>> various ecosystem pressures towards getting to post-quantum are 
>> particularly strong in enterprise anyway, so hopefully admins will be more 
>> likely to understand why it's important for them to fix those.
>> https://chromeenterprise.google/policies/#PostQuantumKeyAgreementEnabled
>>
>
> Makes sense, thanks!!
>
> I'll LGTM once the review gates are flipped.
>  
>
>>
>> On Wed, Mar 20, 2024 at 2:34 AM Yoav Weiss (@Shopify) <
>> yoav...@chromium.org> wrote:
>>
>>>
>>>
>>> On Mon, Mar 18, 2024 at 3:37 PM 'David Adrian' via blink-dev <
>>> blin...@chromium.org> wrote:
>>>
>>>> Contact emailsdad...@google.com
>>>>
>>>> Explainer
>>>> https://www.ietf.org/archive/id/draft-tls-westerbaan-xyber768d00-02.html
>>>>
>>>> Specification
>>>> https://www.ietf.org/archive/id/draft-tls-westerbaan-xyber768d00-02.html
>>>>
>>>> Summary
>>>>
>>>> Protect current Chrome TLS traffic against future quantum cryptanalysis 
>>>> by deploying the Kyber768 quantum-resistant key agreement algorithm. This 
>>>> is a hybrid X25519 + Kyber768 key agreement based on an IETF standard. 
>>>> This 
>>>> specification and launch is outside the scope of W3C. This key agreement 
>>>> will be launched as a TLS cipher, and should be transparent to users. 
>>>> https://blog.chromium.org/2023/08/protecting-chrome-traffic-with-hybrid.html
>>>>
>>>>
>>>> Blink componentInternals>Network>SSL 
>>>> <https://bugs.chromium.org/p/chromium/issues/list?q=component:Internals%3ENetwork%3ESSL>
>>>>
>>>> Search tagstls <https://chromestatus.com/features#tags:tls>, kem 
>>>> <https://chromestatus.com/features#tags:kem>, kyber 
>>>> <https://chromestatus.com/features#tags:kyber>, postquantum 
>>>> <https://chromestatus.com/features#tags:postquantum>
>>>>
>>>> TAG review
>>>>
>>>> TAG review statusNot applicable
>>>>
>>>> Risks
>>>>
>>>>
>>>> Interoperability and Compatibility
>>>>
>>>> Post-quantum secure ciphers are larger than classical ciphers. This may 
>>>> cause compatibility issues with middleboxes.
>>>>
>>>
>>> I'm guessing we're talking about MITM middleboxes, is that correct?
>>> What's our plan to mitigate that risk? Slow rollout? Enterprise policy? 
>>> Both? Something else entirely?
>>>  
>>>
>>>>
>>>>
>>>> *Gecko*: Shipped/Shipping (
>>>> https://github.com/mozilla/standards-positions/issues/874) Firefox is 
>>>> also in the process of rolling this out.
>>>>
>>>> *WebKit*: No signal (
>>>> https://github.com/WebKit/standards-positions/issues/244)
>>>>
>>>> *Web developers*: No signals
>>>>
>>>> *Other signals*:
>>>>
>>>> WebView application risks
>>>>
>>>> Does this intent deprecate or change behavior of existing APIs, such 
>>>> that it has potentially high risk for Android WebView-based applications?
>>>>
>>>>
>>>>
>>>> Debuggability
>>>>
>>>>
>>>>
>>>> Will this feature be supported on all six Blink platforms (Windows, 
>>>> Mac, Linux, ChromeOS, Android, and Android WebView)?Yes
>>>>
>>>> Is this feature fully tested by web-platform-tests 
>>>> <https://chromium.googlesource.com/chromium/src/+/main/docs/testing/web_platform_tests.md>
>>>> ?N/A
>>>>
>>>> Flag name on chrome://flagsenable-tls13-kyber
>>>>
>>>> Finch feature namePostQuantumKyber
>>>>
>>>> Requires code in //chrome?False
>>>>
>>>> Tracking bug
>>>> https://bugs.chromium.org/p/chromium/issues/detail?id=1442377
>>>>
>>>> Launch bughttps://launch.corp.google.com/launch/4252981
>>>>
>>>> Estimated milestones
>>>> Shipping on desktop 124
>>>> Origin trial desktop first 118
>>>> Origin trial desktop last 123
>>>> DevTrial on desktop 115
>>>> Shipping on Android 128
>>>> OriginTrial Android last 128
>>>> OriginTrial Android first 118
>>>> DevTrial on Android 115
>>>> Shipping on WebView 128
>>>> OriginTrial webView last 128
>>>> OriginTrial webView first 118
>>>>
>>>> Link to entry on the Chrome Platform Status
>>>> https://chromestatus.com/feature/5257822742249472
>>>>
>>>> Links to previous Intent discussionsIntent to prototype: 
>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAGkh42%2BgKeCTA6vWwzrE%3DDVR%3DTmQaCyDFQxqnXkOy9GcVyGtnA%40mail.gmail.com
>>>>  Intent 
>>>> to Experiment: 
>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAGkh42%2B37SpGUy9t6bBkP13XQL4mrEaY%2Bu0wAzttjZyr_f2rGA%40mail.gmail.com
>>>>
>>>> We plan to ship Kyber (ML-KEM) by default on *desktop platforms only* 
>>>> starting 
>>>> in M124. Kyber is a quantum-resistant key exchange mechanism for TLS that 
>>>> defends against harvest-now-decrypt-later 
>>>> <https://bughunters.google.com/blog/5108747984306176/google-s-threat-model-for-post-quantum-cryptography>
>>>>  
>>>> attacks. This risk is relevant even if quantum computers do not yet exist.
>>>>
>>>> Due to the structure of TLS 1.3, Kyber key shares are sent on the first 
>>>> ClientHello message regardless of server support. Servers that do not yet 
>>>> support Kyber will ignore it, and select a different algorithm. Servers 
>>>> that do support Kyber, such as GFEs and Cloudflare, will select Kyber and 
>>>> respond with their own Kyber key encapsulation. 
>>>>
>>>> Unfortunately, Kyber key shares are around 35x larger than an X25519 
>>>> key exchange, which increases the latency of the TLS handshake connections 
>>>> by 4-6%. On Desktop platforms, this effect is largely in the noise due to 
>>>> the higher likelihood of a high-bandwidth low-latency connection, and 
>>>> connection pooling reuse (one TLS handshake, many HTTP requests). On 
>>>> Android, this effect is far more noticeable and results in measurable 
>>>> regressions in LCP. 
>>>>
>>>> Therefore, we intend to ship Kyber by default on Desktop platforms 
>>>> while we come up with a broader strategy for when and how to ship 
>>>> post-quantum cryptography on Android.
>>>>
>>>> N.B. This Chrome Status entry is old and predates the new approval 
>>>> system from summer 2023.
>>>>
>>>>
>>>> This intent message was generated by Chrome Platform Status 
>>>> <https://chromestatus.com/>.
>>>>
>>>> -- 
>>>> You received this message because you are subscribed to the Google 
>>>> Groups "blink-dev" group.
>>>> To unsubscribe from this group and stop receiving emails from it, send 
>>>> an email to blink-dev+...@chromium.org.
>>>> To view this discussion on the web visit 
>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAGkh42K4xE5n_Fbt8heqhNMC7-xf3RhNVopguK3YeTVoYM-VzQ%40mail.gmail.com
>>>>  
>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAGkh42K4xE5n_Fbt8heqhNMC7-xf3RhNVopguK3YeTVoYM-VzQ%40mail.gmail.com?utm_medium=email&utm_source=footer>
>>>> .
>>>>
>>> -- 
>>> You received this message because you are subscribed to the Google 
>>> Groups "blink-dev" group.
>>> To unsubscribe from this group and stop receiving emails from it, send 
>>> an email to blink-dev+...@chromium.org.
>>> To view this discussion on the web visit 
>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAOmohS%2BQfNtLkMRmf1o9-1GtVrDh6R2b_ugJeVNvjAQULPsTRA%40mail.gmail.com
>>>  
>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAOmohS%2BQfNtLkMRmf1o9-1GtVrDh6R2b_ugJeVNvjAQULPsTRA%40mail.gmail.com?utm_medium=email&utm_source=footer>
>>> .
>>>
>>

-- 
You received this message because you are subscribed to the Google Groups 
"blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to blink-dev+unsubscr...@chromium.org.
To view this discussion on the web visit 
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/b84864e7-8888-4639-80eb-1c05a3854c0cn%40chromium.org.

Reply via email to