[TLS] Re: Working Group Last Call for TLS 1.2 is in Feature Freeze

2024-12-10 Thread Yaron Sheffer
I honestly think it is not, given the context – not until you read the IANA section. I would suggest: no changes (including any extensions). On 10/12/2024, 17:18, "Salz, Rich"  wrote:English is hard. :). I think "no new features" is clear, given the context of the words around it. I could change it to "no changes" without changing the intended meaning if people prefer that.   ___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org


[TLS] Re: Working Group Last Call for TLS 1.2 is in Feature Freeze

2024-12-10 Thread Salz, Rich
Does this diff address your concern? What about the title?  As I recall, the 
draft originally said “TLS 1.2 is frozen” but there were some who wanted it 
changed.

--- a/draft-ietf-tls-tls12-frozen.md
+++ b/draft-ietf-tls-tls12-frozen.md
@@ -70,7 +70,7 @@ Use of TLS 1.3 is growing and fixes some known deficiencies 
in TLS 1.2.
 This document specifies that outside of
 urgent security fixes, new TLS Exporter Labels, or new
 Application-Layer Protocol Negotiation (ALPN) Protocol IDs,
-no new features will be approved for TLS 1.2.
+no changes will be approved for TLS 1.2.
 This prescription does not pertain to DTLS (in any DTLS version); it pertains 
to
 TLS only.

@@ -88,7 +88,7 @@ Both versions have several extension points, so items like 
new cryptographic
 algorithms, new supported groups (formerly "named curves"),  etc., can be
 added without defining a new protocol. This document specifies that outside of
 urgent security fixes, and the exceptions listed in {{iana}},
-no new features will be approved for TLS 1.2.
+no changes will be approved for TLS 1.2.
 This prescription does not pertain to DTLS (in any DTLS version); it pertains 
to
 TLS only.


___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org


[TLS] Re: Working Group Last Call for TLS 1.2 is in Feature Freeze

2024-12-10 Thread Salz, Rich
The point of this draft was to go on the record (“it’s an RFC it must be true”) 
and say explicitly what the IETF will NOT be doing, and enforcing that by 
directing IANA (and the experts).  Will this stop someone from re-using 
codepoints and backporting to their TLS 1.2 stack? Nope. It even work since TLS 
1.3 handshake looks like TLS 1.2 :)

We can’t prevent people from coloring outside the lines, but we can make it 
clear where the lines are. And I don’t see how we can do anything else, since 
the WG clearly has near-zero interest in saying “use this for TLS 1.2” I 
believe that not all the reasons for that are strictly technical, but I don’t 
care.
___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org


[TLS] Re: [EXTERNAL] Re: Post-quantum hybrid ECDHE-MLKEM Key Agreement for TLSv1.3

2024-12-10 Thread Kris Kwiatkowski

Hello,



1. **Alignment of NamedGroup X25519MLKEM768** with the order of shared 
secrets, as per Section 3.2 of draft-ietf-tls-hybrid-design.
   - I suggest updating the name to mlkem768_x25519, while keeping the 
codepoint unchanged (if that is acceptable). If
 this change is made, I also recommend changing the name of 
Secp256r1MLKEM768 to align with x25519.


Following the feedback from the last TLS meeting at IETF@121, I have opened 
this PR to change the name from X25519MLKEM768 to MLKEM768X25519. This change 
aligns with draft-ietf-tls-hybrid-design-11 (section 3.2).

https://github.com/post-quantum-cryptography/draft-kwiatkowski-tls-ecdhe-mlkem/pull/26



2. **Changing the order of shares in Secp256r1MLKEM768**.
   - The current order is based on requirements from SP800-56C-r2, and it 
was chosen to facilitate the migration of the TLSv1.3
 handshake in a flow requiring FIPS certification. Although the switched 
order of shares aligns with FIPS, it necessitates
 the re-certification of the cryptographic module. The current order 
supports modules that are already deployed in the field.
 My (slight) personal preference would be to proceed with adoption but 
switch the order only if NIST relaxes the requirement
 regarding the order of shares in SP800-56C-r2, which we know is under 
discussion. Otherwise, I believe the current choice
 better supports migration to non-hybrid MLKEM, but I would appreciate 
feedback on this decision (ideally from others who

 have a requirement for FIPS).

According to the message from 
https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/ST_yMzYyMl0, NIST 
plans to permit the ordering of shares in either direction. This approach 
addresses the previously mentioned issue, so no further changes are needed in 
this regard. I believe it is now appropriate to register an additional code 
point for Secp384r1MLKEM1024, as currently outlined in the draft.




3. **Setting RECOMMENDED=Y for Secp256r1MLKEM768**.

I think this can only be done once draft if adopted. Hence, no change here 
(for now).


> On 11/11/2024 23:14, Andrei Popov wrote:
> I support adoption. The question of explicitly prohibiting key share reuse 
is orthogonal; this can be done in a separate document.
I agree that the PR was submitted to change the text in the draft, but I think 
it would be better to include this text in draft-ietf-tls-hybrid-design. I 
have opened this PR

https://github.com/dstebila/draft-ietf-tls-hybrid-design/pull/39.

With that I hope the draft is ready for adoption.
Any feedback is more then welcome.

Kind regards,
Kris

___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org


[TLS] Re: [EXTERNAL] Re: Post-quantum hybrid ECDHE-MLKEM Key Agreement for TLSv1.3

2024-12-10 Thread Rob Sayre
On Tue, Dec 10, 2024 at 4:28 PM Kris Kwiatkowski 
wrote:

> Following the feedback from the last TLS meeting at IETF@121, I have
> opened this PR to change the name from X25519MLKEM768 to MLKEM768X25519.
> This change aligns with draft-ietf-tls-hybrid-design-11 (section 3.2).
>

Well, maybe the Spanish phrase "¿Por Qué No Los Dos?” (why not both?) is
appropriate here. It seems like there's no way that either will collide
with something else.

thanks,
Rob
___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org


[TLS] Re: Adoption call for RFC 9147bis

2024-12-10 Thread Joseph Salowey
This document has consensus to adopt, please post a 00 draft
named draft-ietf-tls-rfc9147bis to be included as a working group document.

On Mon, Dec 2, 2024 at 9:38 AM Joseph Salowey  wrote:

> This is a call for adoption of draft-rescorla-tls-rfc9147bis-00[1] as the
> basis for an RFC9147 bis document.  This document is seeded with the
> content of RFC 9147.  If you object to the adoption of this document please
> respond to this thread by December, 9 2024.
>
> Cheers,
>
> Joe, Deirdre, and Sean
>
> [1] https://datatracker.ietf.org/doc/html/draft-rescorla-tls-rfc9147bis-00
>
>
___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org


[TLS] The TLS WG has placed draft-rescorla-tls-rfc9147bis in state "Adopted by a WG"

2024-12-10 Thread IETF Secretariat

The TLS WG has placed draft-rescorla-tls-rfc9147bis in state
Adopted by a WG (entered by Sean Turner)

The document is available at
https://datatracker.ietf.org/doc/draft-rescorla-tls-rfc9147bis/


___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org


[TLS] Re: Working Group Last Call for TLS 1.2 is in Feature Freeze

2024-12-10 Thread Thom Wiggers
Hi all,

I think this document is ready for publication.

Cheers,

Thom Wiggers

Op ma 9 dec 2024 om 17:53 schreef Sean Turner :

> Just a reminder that this WG last call is still ongoing.
>
> spt
>
> > On Dec 3, 2024, at 16:26, Sean Turner  wrote:
> >
> > This is the working group last call for TLS 1.2 is in Feature Freeze.
> Please review draft-ietf-tls-tls12-frozen [1] and reply to this thread
> indicating if you think it is ready for publication or not.  If you do not
> think it is ready please indicate why.  This call will end on December 17,
> 2024.
> >
> > Cheers,
> > spt
> >
> > [1] https://datatracker.ietf.org/doc/draft-ietf-tls-tls12-frozen/
>
> ___
> TLS mailing list -- tls@ietf.org
> To unsubscribe send an email to tls-le...@ietf.org
>
___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org


[TLS] Re: draft-connolly-tls-mlkem-key-agreement

2024-12-10 Thread Salz, Rich
As for it accidentally becoming “MTI”, well I’m pretty sure that won’t happen 
(barring Q-day happening and the current hybrid key exchanges no longer making 
sense).

Since the draft has “N” for the recommended column, I’m also pretty sanguine 
about it.

As for people implementing it instead of hybrid, well, the working group can 
help to prevent that by moving ahead with the hybrid draft (hint, hint).

Which one?  Yours or Panos et al? :)
___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org


[TLS] Re: Working Group Last Call for TLS 1.2 is in Feature Freeze

2024-12-10 Thread Salz, Rich
jQcmQRYFpfptBannerEnd
For the second paragraph, I would prefer “no changes and no new extension 
values”. I don’t have a better idea for the title, so even if I think it’s not 
100% precise, I’m good with keeping it.
How about this?

This document specifies that outside of
urgent security fixes, and the exceptions listed in {{iana}},
no changes *or new registry entries* will be approved for TLS 1.2

___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org


[TLS] Re: Working Group Last Call for TLS 1.2 is in Feature Freeze

2024-12-10 Thread Yaron Sheffer
Looks good. Thanks! From: Salz, Rich Date: Tuesday, 10 December 2024 at 18:41To: Yaron Sheffer , Alicja Kario Cc: TLS List Subject: Re: [TLS] Re: Working Group Last Call for TLS 1.2 is in Feature FreezejQcmQRYFpfptBannerEndFor the second paragraph, I would prefer “no changes and no new extension values”. I don’t have a better idea for the title, so even if I think it’s not 100% precise, I’m good with keeping it.How about this? This document specifies that outside ofurgent security fixes, and the exceptions listed in {{iana}},no changes *or new registry entries* will be approved for TLS 1.2 ___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org


[TLS] Re: Working Group Last Call for TLS 1.2 is in Feature Freeze

2024-12-10 Thread Salz, Rich

I would suggest "For TLS, it is important to note that PQC efforts are 
exclusively for TLS 1.3 or later."

To me, the draft (even v3) is not clear on this point. At some point in future, 
PQ will become an urgent security issue, and the wording "outside of urgent 
security fixes" in the draft seems to imply that then we will start working on 
PQC for TLS 1.2. I suggest being explicit on this point.

How about this:

For TLS it is important to note that the focus of these efforts is exclusively 
TLS 1.3 or later. Put bluntly, post-quantum cryptography for TLS 1.2 WILL NOT 
be supported (see {{iana}}) at any time and anyone wishing to deploy 
post-quantum cryptography should expect to be using TLS 1.3.


___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org


[TLS] Re: I-D Action: draft-ietf-tls-tls12-frozen-03.txt

2024-12-10 Thread Salz, Rich
Thanks for the update. Just a quick reminder that my questions at the bottom of 
email [1] remain unaddressed.

Usama

[1] https://mailarchive.ietf.org/arch/msg/tls/6QoaLDE3_2UQTcawV2QQznQ5Pbs/

Aha, I missed that, sorry. I will reply on-thread now.
___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org


[TLS] Re: Working Group Last Call for TLS 1.2 is in Feature Freeze

2024-12-10 Thread Salz, Rich
Considering the following two statements in I-D, I have two questions:

>   For TLS it is important to note that the focus of these efforts is

>   TLS 1.3 or later.  Put bluntly, post-quantum cryptography for TLS 1.2

>   WILL NOT be supported.

To me the two sentences are contradicting. Which one of the following is 
intended?

The second sentence is intended to be a clarification and emphasis of the 
first. I’m not aware of any TLS WG efforts to define PQC and register them for 
TLS 1.2 and I believe the WG assumption – perhaps unstated? – is that these 
things require and assume TLS 1.3.  It’s not just crypto suites, but also 
things like David Benjamin’s proposed keyshare draft, and other stuff. If you 
have a wording suggestion, I’d love to hear it.
1.  (My understanding from 2nd sentence) We will exclusively work on PQC 
for TLS 1.3 or later.

What does the capitalization of WILL NOT mean? I did not find any such 
capitalization in RFC 2119 and RFC 8174. Please add the relevant RFC in section 
2 or define it.

2119/8174 doesn’t limit all other uses of uppercase letters :). It’s just for 
emphasis.

>   This

>   document specifies that outside of urgent security fixes, no new

>   features will be approved for TLS 1.2.
If the intention of draft was #2 above, cross-reading with this sentence, are 
we implying that PQC is not an urgent security issue?

Given our finite resources, regardless of the urgency of the issue, the IETF 
TLS WG is not spending effort to “fix” TLS 1.2 And this document is intended to 
inform the community of that.  So if you want to be PQ, step is one make sure 
you are using TLS 1.3

___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org


[TLS] Re: Working Group Last Call for TLS 1.2 is in Feature Freeze

2024-12-10 Thread Tim Hollebeek
One of the things we need to be honest with ourselves about is that telling 
people not to do it won’t prevent them from doing it.

 

So this decision is saying that WHEN people decide do PQC with TLS 1.2, they 
will be doing so without IETF guidance about how to do it. If this is the path 
we choose, we need to be ok with that.

 

I’m somewhat ok with that, but it does concern me and cause me to wonder if 
there’s something better we can do.

 

-Tim

 

From: Salz, Rich  
Sent: Tuesday, December 10, 2024 11:48 AM
To: Muhammad Usama Sardar ; Valery Smyslov 
; 'Sean Turner' ; 'TLS List' 

Subject: [TLS] Re: Working Group Last Call for TLS 1.2 is in Feature Freeze

 

 

I would suggest "For TLS, it is important to note that PQC efforts are 
exclusively for TLS 1.3 or later." 

To me, the draft (even v3) is not clear on this point. At some point in future, 
PQ will become an urgent security issue, and the wording "outside of urgent 
security fixes" in the draft seems to imply that then we will start working on 
PQC for TLS 1.2. I suggest being explicit on this point. 

How about this:

For TLS it is important to note that the focus of these efforts is exclusively 
TLS 1.3 or later. Put bluntly, post-quantum cryptography for TLS 1.2 WILL NOT 
be supported (see {{iana}}) at any time and anyone wishing to deploy 
post-quantum cryptography should expect to be using TLS 1.3.

 



smime.p7s
Description: S/MIME cryptographic signature
___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org


[TLS] Re: Working Group Last Call for TLS 1.2 is in Feature Freeze

2024-12-10 Thread Muhammad Usama Sardar

On 10.12.24 16:02, Salz, Rich wrote:

The second sentence is intended to be a clarification and emphasis of 
the first. I’m not aware of any TLS WG efforts to define PQC and 
register them for TLS 1.2 and I believe the WG assumption – perhaps 
unstated? – is that these things require and assume TLS 1.3.  It’s not 
just crypto suites, but also things like David Benjamin’s proposed 
keyshare draft, and other stuff. If you have a wording suggestion, I’d 
love to hear it.
I would suggest "For TLS, it is important to note that PQC efforts are 
exclusively for TLS 1.3 or later."


>   This
>   document specifies that outside of urgent security fixes, no new
>   features will be approved for TLS 1.2.

If the intention of draft was #2 above, cross-reading with this 
sentence, are we implying that PQC is not an urgent security issue?


Given our finite resources, regardless of the urgency of the issue, 
the IETF TLS WG is not spending effort to “fix” TLS 1.2 And this 
document is intended to inform the community of that.  So if you want 
to be PQ, step is one make sure you are using TLS 1.3


To me, the draft (even v3) is not clear on this point. At some point in 
future, PQ will become an urgent security issue, and the wording 
"outside of urgent security fixes" in the draft seems to imply that then 
we will start working on PQC for TLS 1.2. I suggest being explicit on 
this point.


Usama



smime.p7s
Description: S/MIME Cryptographic Signature
___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org


[TLS] Re: Working Group Last Call for TLS 1.2 is in Feature Freeze

2024-12-10 Thread Yaron Sheffer
For the second paragraph, I would prefer “no changes and no new extension values”. I don’t have a better idea for the title, so even if I think it’s not 100% precise, I’m good with keeping it. From: Salz, Rich Date: Tuesday, 10 December 2024 at 17:45To: Yaron Sheffer , Alicja Kario Cc: TLS List Subject: Re: [TLS] Re: Working Group Last Call for TLS 1.2 is in Feature FreezeDoes this diff address your concern? What about the title?  As I recall, the draft originally said “TLS 1.2 is frozen” but there were some who wanted it changed. --- a/draft-ietf-tls-tls12-frozen.md+++ b/draft-ietf-tls-tls12-frozen.md@@ -70,7 +70,7 @@ Use of TLS 1.3 is growing and fixes some known deficiencies in TLS 1.2. This document specifies that outside of urgent security fixes, new TLS Exporter Labels, or new Application-Layer Protocol Negotiation (ALPN) Protocol IDs,-no new features will be approved for TLS 1.2.+no changes will be approved for TLS 1.2. This prescription does not pertain to DTLS (in any DTLS version); it pertains to TLS only. @@ -88,7 +88,7 @@ Both versions have several extension points, so items like new cryptographic algorithms, new supported groups (formerly "named curves"),  etc., can be added without defining a new protocol. This document specifies that outside of urgent security fixes, and the exceptions listed in {{iana}},-no new features will be approved for TLS 1.2.+no changes will be approved for TLS 1.2. This prescription does not pertain to DTLS (in any DTLS version); it pertains to TLS only.  ___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org


[TLS] Re: Working Group Last Call for TLS 1.2 is in Feature Freeze

2024-12-10 Thread Muhammad Usama Sardar

On 10.12.24 17:47, Salz, Rich wrote:


How about this:

For TLS it is important to note that the focus of these efforts is 
exclusively TLS 1.3 or later. Put bluntly, post-quantum cryptography 
for TLS 1.2 WILL NOT be supported (see {{iana}}) at any time and 
anyone wishing to deploy post-quantum cryptography should expect to be 
using TLS 1.3.



This is fine, thanks.


smime.p7s
Description: S/MIME Cryptographic Signature
___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org


[TLS] Re: Working Group Last Call for TLS 1.2 is in Feature Freeze

2024-12-10 Thread Salz, Rich
English is hard. :). I think "no new features" is clear, given the context of 
the words around it. I could change it to "no changes" without changing the 
intended meaning if people prefer that.


___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org


[TLS] Re: I-D Action: draft-ietf-tls-tls12-frozen-03.txt

2024-12-10 Thread Muhammad Usama Sardar
Thanks for the update. Just a quick reminder that my questions at the 
bottom of email [1] remain unaddressed.


Usama

[1] https://mailarchive.ietf.org/arch/msg/tls/6QoaLDE3_2UQTcawV2QQznQ5Pbs/



smime.p7s
Description: S/MIME Cryptographic Signature
___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org


[TLS] Re: Working Group Last Call for TLS 1.2 is in Feature Freeze

2024-12-10 Thread Yaron Sheffer
I think the draft is confusing to the point of almost being misleading, in particular with its use of the word “feature”. Based on the words “feature freeze” people on this list have interpreted it as merely “the TLS WG will no longer work on TLS 1.2”. But by blocking IANA registrations, this has much broader implications on real-world use of TLS 1.2. This confusion is true for the document’s title, as well as the introduction, quoting: Both [TLS] versions have several extension points, so items like new cryptographic algorithms, new supported groups (formerly "named curves"), etc., can be added without defining a new protocol.  This document specifies that outside of urgent security fixes, and the exceptions listed in Section 4, no new features will be approved for TLS 1.2. Most people would read it to mean that no new *features* (e.g. new TLS messages) will be added, but that the “extension points” (e.g. new ciphersuites) continue to be available. Thanks,    Yaron On 09/12/2024, 21:01, "Alicja Kario"  wrote:I think it's ready for publication. On Tuesday, 3 December 2024 22:26:30 CET, Sean Turner wrote:> This is the working group last call for TLS 1.2 is in Feature > Freeze. Please review draft-ietf-tls-tls12-frozen [1] and reply > to this thread indicating if you think it is ready for > publication or not.  If you do not think it is ready please > indicate why.  This call will end on December 17, 2024.> > Cheers,> spt> > [1] https://datatracker.ietf.org/doc/draft-ietf-tls-tls12-frozen/ -- Regards,Alicja (nee Hubert) KarioPrincipal Quality Engineer, RHEL Crypto teamWeb: www.cz.redhat.comRed Hat Czech s.r.o., Purkyňova 115, 612 00, Brno, Czech Republic ___TLS mailing list -- tls@ietf.orgTo unsubscribe send an email to tls-le...@ietf.org ___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org


[TLS] Re: Working Group Last Call for TLS 1.2 is in Feature Freeze

2024-12-10 Thread Alicja Kario

No, support for a new ciphersuite, especially one that uses new primitives,
is a _new feature._

At least, that's how we operate, and I am not aware of any discussions 
about
that being confusing to customers... So I'm pretty sure that "Most people" 
is

not correct.

On Tuesday, 10 December 2024 12:44:44 CET, Yaron Sheffer wrote:
I think the draft is confusing to the point of almost being 
misleading, in particular with its use of the word “feature”. 
Based on the words “feature freeze” people on this list have 
interpreted it as merely “the TLS WG will no longer work on TLS 
1.2”. But by blocking IANA registrations, this has much broader 
implications on real-world use of TLS 1.2.
 
This confusion is true for the document’s title, as well as the 
introduction, quoting:
 
Both [TLS] versions have several extension points, so items 
like new cryptographic algorithms, new supported groups 
(formerly "named curves"), etc., can be added without defining a 
new protocol.  This document specifies that outside of urgent 
security fixes, and the exceptions listed in Section 4, no new 
features will be approved for TLS 1.2.
 
Most people would read it to mean that no new *features* (e.g. 
new TLS messages) will be added, but that the “extension points” 
(e.g. new ciphersuites) continue to be available.
 
Thanks,

Yaron
 
On 09/12/2024, 21:01, "Alicja Kario"  wrote:


I think it's ready for publication.
 
On Tuesday, 3 December 2024 22:26:30 CET, Sean Turner wrote:

This is the working group last call for TLS 1.2 is in Feature
Freeze. Please review draft-ietf-tls-tls12-frozen [1] and reply
to this thread indicating if you think it is ready for
publication or not.  If you do not think it is ready please
indicate why.  This call will end on December 17, 2024.

Cheers,
spt

[1] https://datatracker.ietf.org/doc/draft-ietf-tls-tls12-frozen/
 
--

Regards,
Alicja (nee Hubert) Kario
Principal Quality Engineer, RHEL Crypto team
Web: www.cz.redhat.com
Red Hat Czech s.r.o., Purkyňova 115, 612 00, Brno, Czech Republic
 


--
Regards,
Alicja (nee Hubert) Kario
Principal Quality Engineer, RHEL Crypto team
Web: www.cz.redhat.com
Red Hat Czech s.r.o., Purkyňova 115, 612 00, Brno, Czech Republic

___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org


[TLS] Re: draft-connolly-tls-mlkem-key-agreement

2024-12-10 Thread Jay Daley
Daniel

I’m writing in response to your request below.  I am told that your email 
server may require me to agree to terms before delivery, which I will not be 
doing, so it may be that this response is not delivered directly.

While I am an author of RFC 9680 it is an IETF consensus document and therefore 
represents the view of IETF community as a whole.  

If your concern is that the IETF processes contain an overlooked antitrust 
risk, then please note that it is the view of the IETF, as stated in RFC 9680, 
that "the IETF structure and processes are designed to mitigate antitrust 
risks" and that "compliance with BCPs and other relevant policies … facilitates 
compliance with antitrust law".  This is a view that has been thoroughly 
checked with multiple sets of counsel [1].  If you want to see a change to the 
IETF processes to address a perceived antitrust risk then you should follow the 
IETF process for making that happen. 

If, on the other hand, your concern is that there has been a failure of IETF 
processes that has created an antitrust risk, then the appropriate course of 
action is to follow the appropriate IETF process for addressing that. 

Given my role is only to support the IETF standards process, any more detailed 
explanation of any of that process, is best left to others.

[1]  
https://mailarchive.ietf.org/arch/msg/antitrust-policy/f1iHM9p8N-U8p_pXen2ruDqjPPQ/

Jay

> On 7 Dec 2024, at 15:19, D. J. Bernstein  wrote:
> 
> I'm adding an RFC 9680 coauthor to the To line to request IETF LLC
> attention to the antitrust issues here.
> 
> Scott Fluhrer (sfluhrer) writes:
>> There are people whose cryptographic expertise I cannot doubt who say
>> that pure ML-KEM is the right trade-off for them
> 
> Please note that antitrust law forces standardization organizations to
> follow procedures that prevent anti-competitive activities. Here's an
> introduction to the topic from the American Bar Association:
> 
>
> https://www.google.com/books/edition/Handbook_on_Antitrust_Aspects_of_Standar/zin5tgAACAAJ
> 
> Having a company influencing IETF decisions by making claims about what
> customers are demanding---with no explanation of _why_ those demands are
> being made, and no opportunity for IETF review of the merits of those
> rationales---is exposing IETF to antitrust litigation. Even if the
> specific incident at hand isn't meant to suppress competition, it shows
> that IETF doesn't have the requisite procedural protections in place, so
> it provides evidence helpful for _anyone_ who decides to sue IETF about
> _any_ standardization topic.
> 
> As a side note, the "could still be construed as representing their
> employer" part of RFC 9680 is certainly triggered by a message that's
> adding weight to its argument by explicitly invoking the company's name
> (in this case: "Cisco will implement it").
> 
>> I am essentially just asking for code points.
> 
> Hmmm. If the only request were for allocation from an open namespace
> (which apparently has been done already), then why make claims about the
> supposed desirability of omitting normal hybrid defenses? I also don't
> see how the collective-action text ("I understand that people want to
> discuss the hybrid KEM draft more (because there are more options there)
> - can we at least get the less controversial part done?") can be
> interpreted as merely an administrative allocation request. One followup
> said "Can we start an adoption call?" and another said "+1".
> 
> Furthermore, email dated 24 Oct 2024 03:15:38 +, in the analogous
> context of ML-DSA, said that "Cisco" has "some customers who want ML-DSA
> only", and concluded that "we'll end up standardizing" that.
> 
> The ML-DSA discussion sounded like some people think that NSA refuses to
> authorize U.S. government purchasing of hybrids (outside some special
> circumstances). I asked whether that's true---whether NSA has in fact
> banned hybrids. I quoted an official NSA statement saying "hybrid
> solutions may be allowed or required due to protocol standards, product
> availability, or interoperability requirements"; I said this "will be
> triggered if, e.g., the TLS WG issues an RFC requiring all PQ in TLS to
> be hybrid"; I haven't seen a counterargument.
> 
> Now the WG is again being told, again without a rationale, that some
> unspecified cryptographic experts with money are demanding non-hybrids.
> Even if it's true that NSA is banning hybrids (is it?), I'm opposed to
> non-hybrids on security grounds and on BCP 188 grounds. But the more
> basic point is that IETF's decisions on the topic have to comply with
> IETF's procedural obligations under antitrust law.
> 
> ---D. J. Bernstein

-- 
Jay Daley
IETF Executive Director
exec-direc...@ietf.org

___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org