Two comments:
*
In section 5, "the initiator chooses a combination from the responder's
SUPPORTED_AUTH_METHODS"; but no guidance is given about how to make this choice
(and similarly for the responder). Ultimately, the proper choice would depend
on the peer's policy, that is, what sets of signatures the peer would insist on
as a proper validation, and no mechanism exists for communicating that for
multiple certificates (currently, it is implied that any single supported
signature algorithm with a valid certificate is sufficient). When multiple
certificates are in play, then a peer might have either of these policies: "I'd
prefer an RSA cert and an ML-DSA cert, but I'll accept only an RSA cert" (which
the peer might do during a general upgrade), or your policy might be "You must
have an RSA cert and an ML-DSA cert, or I won't talk to you" *which might be
after you've upgraded all your peers). Now, I suppose you can say "choose the
maximal set of certificates, and if that'd not sufficient, the IKE negotiation
would fail" - I believe that a cleaner approach would be to inform the peer of
the policy up front (and if we can't abide by that, the error is more apparent).
*
I personally disagree with bolting into the protocol any characterization of a
cryptographical algorithm beyond the minimal ("it's a signature algorithm").
Your protocol makes an explicit distinction between "traditional" and "PQC"; in
the future, that understanding may change or get more nuanced. I believe it
would be wise if the protocol took a broader and more extensible view.
________________________________
From: Jun Hu (Nokia) <[email protected]>
Sent: Friday, February 27, 2026 3:22 PM
To: IPsecME WG <[email protected]>
Subject: [IPsec] FW: New Version Notification for
draft-hu-ipsecme-pqt-hybrid-auth-04.txt
Hi,
Here is an update to draft-hu-ipsecme-pqt-hybrid-auth, review and comments are
appreciated
What's changed in v04:
* align to draft-ietf-lamps-pq-composite-sigs-14
* add text to clarify two setup types
* add text to describe the example exchange in section 5
* clarify using of pre-hash alg
* clarify sign operation in type-2
* ietf-lamps-cert-binding-for-multi-auth is now RFC9763
* ietf-lamps-dilithium-certificates is now RFC9881
* editorial changes
-----Original Message-----
From: [email protected] <[email protected]>
Sent: Friday, February 27, 2026 11:20 AM
To: Guilin WANG <[email protected]>; Guilin Wang <[email protected]>;
Jun Hu (Nokia) <[email protected]>; Yasufumi Morioka (森岡 康史)
<[email protected]>
Subject: New Version Notification for draft-hu-ipsecme-pqt-hybrid-auth-04.txt
CAUTION: This is an external email. Please be very careful when clicking links
or opening attachments. See the URL nok.it/ext for additional information.
A new version of Internet-Draft draft-hu-ipsecme-pqt-hybrid-auth-04.txt has
been successfully submitted by Jun Hu and posted to the IETF repository.
Name: draft-hu-ipsecme-pqt-hybrid-auth
Revision: 04
Title: Post-Quantum Traditional (PQ/T) Hybrid PKI Authentication in the
Internet Key Exchange Version 2 (IKEv2)
Date: 2026-02-27
Group: Individual Submission
Pages: 14
URL:
https://www.ietf.org/archive/id/draft-hu-ipsecme-pqt-hybrid-auth-04.txt
Status: https://datatracker.ietf.org/doc/draft-hu-ipsecme-pqt-hybrid-auth/
HTML:
https://www.ietf.org/archive/id/draft-hu-ipsecme-pqt-hybrid-auth-04.html
HTMLized: https://datatracker.ietf.org/doc/html/draft-hu-ipsecme-pqt-hybrid-auth
Diff:
https://author-tools.ietf.org/iddiff?url2=draft-hu-ipsecme-pqt-hybrid-auth-04
Abstract:
One IPsec area that would be impacted by Cryptographically Relevant
Quantum Computer (CRQC) is IKEv2 authentication based on traditional
asymmetric cryptographic algorithms: e.g RSA, ECDSA, which are widely
deployed authentication options of IKEv2. There are new Post-Quantum
Cryptographic (PQC) algorithms for digital signature like NIST
[ML-DSA], However, it takes time for new cryptographic algorithms to
mature, There is security risk to use only the new algorithm before
it is field proven. This document describes a hybrid PKI
authentication scheme for IKEv2 that incorporates both traditional
and PQC digital signature algorithms, so that authentication is
secure as long as one algorithm in the hybrid scheme is secure.
The IETF Secretariat
_______________________________________________
IPsec mailing list -- [email protected]
To unsubscribe send an email to [email protected]
_______________________________________________
IPsec mailing list -- [email protected]
To unsubscribe send an email to [email protected]