Type-2 cannot be used with other protocols like TLS without protocol
changes, assuming a network function uses both TLS and IPSec protocols, it
will have to support both Type-1 and Type-2. Hence, the preference for
Type-1.

On Tue, 5 Nov 2024 at 22:51, Daniel Van Geest <
daniel.vange...@cryptonext-security.com> wrote:

> I don't think Type-1 precludes Type-2 or vice-versa and there are use
> cases for either.
>
> In both cases, assuming that hybridization is not permanent and not a
> flag-day, during the transition period two certificate chains will need to
> be managed, always a traditional one and either a composite one (Type-1) or
> a pure PQ one (Type-2).
>
> With Type-2, once the transition is complete you already have deployed
> pure PQ roots and chains and don't have to do anything but turn off hybrid
> and enforce PQ.
>
> With Type-1, you have to deploy pure PQ roots and chains after the hybrid
> transition (or have deployed them during the transition in which case you
> had to deal with 3 chains).
>
> So, if hybridization is going to be permanent then I think that Type-1.
>
> If hybridization is going to be a step towards pure PQ authentication then
> I think Type-2 is probably better, but would want to see some security
> analysis of draft-hu-ipsecme-pqt-hybrid-auth Type-2,
> draft-guthrie-ipsecme-ikev2-hybrid-auth and/or RFC 4379.  But then, if
> hybridization is temporary then maybe we don't need to do all this protocol
> work and just go with Type-1 as the easy way out.  This probably depends on
> your opinion of how often new algorithm transitions will occur and whether
> hybridization will be needed at each transition.
>
> A question, is the opposition to RFC 4379 only about the additional round
> trip, or are there security concerns?  Perhaps the negotiation of
> draft-guthrie-ipsecme-ikev2-hybrid-auth could be applied to RFC 4379
> instead to ensure that hybridization is guaranteed.  RFC 4379 has the
> advantage of being able to verify different entities (e.g. the user and the
> machine) as well as, it seems to me, providing hybridization for a single
> entity.  Of course, RFC 4379 could be used in combination with composite
> signatures or maybe
> draft-hu-ipsecme-pqt-hybrid-auth-Type-2/draft-guthrie-ipsecme-ikev2-hybrid-auth
> to get both hybridization and multiple-entity authentication.
>
> If both types are specified, I don't think they should be done in the same
> draft, Type-1 can be more or less a copy-paste of
> draft-reddy-ipsecme-ikev2-pqc-auth with different OIDs and can progress
> quickly while Type-2 needs more thought and implementations would probably
> be slower to roll it out.
>
> Daniel
>
>
> With Type-2, whether it be draft-hu-ipsecme-pqt-hybrid-auth
> On 2024-11-05 3:42 p.m., Blumenthal, Uri - 0553 - MITLL wrote:
>
> I prefer Type-2, as it seems a more straightforward approach overall, with
> fewer chances of “cross-interruptions”.
> —
> Regards,
> Uri
>
> Secure Resilient Systems and Technologies
> MIT Lincoln Laboratory
>
> On Nov 5, 2024, at 09:28, tirumal reddy <kond...@gmail.com>
> <kond...@gmail.com> wrote:
>
> 
> I prefer Type-1 over Type-2, it seems more complicated to manage
> multiple certificates and the possibility of a downgrade attack . -Tiru On
> Tue, 5 Nov 2024 at 15: 40, Scott Fluhrer (sfluhrer) <sfluhrer=40cisco.
> com@ dmarc. ietf. org>
> <sfluhrer=40cisco.%E2%80%8Acom@%E2%80%8Admarc.%E2%80%8Aietf.%E2%80%8Aorg>
> wrote:
> ZjQcmQRYFpfptBannerStart
> This Message Is From an External Sender
> This message came from outside the Laboratory.
>
> ZjQcmQRYFpfptBannerEnd
> I prefer Type-1 over Type-2, it seems more complicated to manage
> multiple certificates and the possibility of a downgrade attack .
>
> -Tiru
>
> On Tue, 5 Nov 2024 at 15:40, Scott Fluhrer (sfluhrer) <sfluhrer=
> 40cisco....@dmarc.ietf.org> wrote:
>
>> While I support the goals of this draft, I do not believe that the
>> methods proposed are the most effective.
>>
>>
>>
>> It tries to merge Type-1 (certificates that include both classical and PQ
>> keys) and Type-2 (two separate certificates) methods of providing public
>> keys, however I believe it would be cleaner to keep them separate.
>>
>>
>>
>> For Type-1, if we use the ietf-lamps-pq-composite-sigs certificate
>> format, then it is easy.  That defines a new signature algorithm (which
>> internally consists of a classical signature and a PQ signature pasted
>> together, but we can ignore the internal details).  We can use that as the
>> signature method within the Auth payload, and hence the only changes we
>> need to make to IKE is to recognize this new signature method.
>>
>>
>>
>> For Type-2 (multiple certificates), we need to request multiple
>> certificates (which you do with the current proposal).  However, it would
>> be cleaner i(IMHO) if the other side just provided multiple CERT payloads
>> and multiple AUTH payloads (rather than try to combine them).  Each AUTH
>> payload would contain the signature (based on the public key from the
>> corresponding CERT payload) of the same data which is being signed now.
>> The idea is that if we keep the fundamental structure of IKE authentication
>> (just having multiple payloads when necessary), it may be easier for an
>> existing IKE implementation to be extended.
>>
>>
>>
>>
>> _______________________________________________
>> IPsec mailing list -- ipsec@ietf.org
>> To unsubscribe send an email to ipsec-le...@ietf.org
>>
> _______________________________________________
> IPsec mailing list -- ipsec@ietf.org
> To unsubscribe send an email to ipsec-le...@ietf.org
>
>
> _______________________________________________
> IPsec mailing list -- ipsec@ietf.org
> To unsubscribe send an email to ipsec-le...@ietf.org
>
>
_______________________________________________
IPsec mailing list -- ipsec@ietf.org
To unsubscribe send an email to ipsec-le...@ietf.org

Reply via email to