I prefer Type-1 over Type-2, it seems more complicated to manage
multiple certificates and the possibility of a downgrade attack .

-Tiru

On Tue, 5 Nov 2024 at 15:40, Scott Fluhrer (sfluhrer) <sfluhrer=
40cisco....@dmarc.ietf.org> wrote:

> While I support the goals of this draft, I do not believe that the methods
> proposed are the most effective.
>
>
>
> It tries to merge Type-1 (certificates that include both classical and PQ
> keys) and Type-2 (two separate certificates) methods of providing public
> keys, however I believe it would be cleaner to keep them separate.
>
>
>
> For Type-1, if we use the ietf-lamps-pq-composite-sigs certificate format,
> then it is easy.  That defines a new signature algorithm (which internally
> consists of a classical signature and a PQ signature pasted together, but
> we can ignore the internal details).  We can use that as the signature
> method within the Auth payload, and hence the only changes we need to make
> to IKE is to recognize this new signature method.
>
>
>
> For Type-2 (multiple certificates), we need to request multiple
> certificates (which you do with the current proposal).  However, it would
> be cleaner i(IMHO) if the other side just provided multiple CERT payloads
> and multiple AUTH payloads (rather than try to combine them).  Each AUTH
> payload would contain the signature (based on the public key from the
> corresponding CERT payload) of the same data which is being signed now.
> The idea is that if we keep the fundamental structure of IKE authentication
> (just having multiple payloads when necessary), it may be easier for an
> existing IKE implementation to be extended.
>
>
>
>
> _______________________________________________
> IPsec mailing list -- ipsec@ietf.org
> To unsubscribe send an email to ipsec-le...@ietf.org
>
_______________________________________________
IPsec mailing list -- ipsec@ietf.org
To unsubscribe send an email to ipsec-le...@ietf.org

Reply via email to