[TLS] Re: Changing WG Mail List Reputation

2024-11-04 Thread Joseph Salowey
On Mon, Nov 4, 2024 at 10:48 AM Salz, Rich wrote: > > While there is overlap between professional behavior and the perceived > focus on browser specific use cases; I think we should try to separate out > the topic. > > My memory, perhaps faulty, is that "will browsers implement this" has been > a

[TLS] Re: Changing WG Mail List Reputation

2024-11-04 Thread Rob Sayre
On Mon, Nov 4, 2024 at 8:25 AM Sean Turner wrote: > > > On Nov 4, 2024, at 15:35, Joseph Salowey wrote: > > > > On Mon, Nov 4, 2024 at 10:48 AM Salz, Rich wrote: > > > While there is overlap between professional behavior and the perceived > focus on browser specific use cases; I think we should

[TLS] Re: New Version Notification for draft-tls-reddy-slhdsa-00.txt

2024-11-04 Thread D. J. Bernstein
Speaking for myself, not on behalf of the SPHINCS+ team (or other teams potentially relevant here). Peter C writes: > Under realistic network conditions, TLS handshakes with full SLH-DSA > certificate chains seem to be about 5-10 times slower than traditional > certificate chains and, in some case

[TLS] Re: New Version Notification for draft-tls-reddy-slhdsa-00.txt

2024-11-04 Thread Bas Westerbaan
On Mon, Nov 4, 2024 at 6:31 PM D. J. Bernstein wrote: > Speaking for myself, not on behalf of the SPHINCS+ team (or other teams > potentially relevant here). > > Peter C writes: > > Under realistic network conditions, TLS handshakes with full SLH-DSA > > certificate chains seem to be about 5-10 t

[TLS] Re: [EXT] Re: New Version Notification for draft-tls-reddy-slhdsa-00.txt

2024-11-04 Thread Blumenthal, Uri - 0553 - MITLL
>> not recommended for use in signature_algorithms > > People deploying TLS can do the performance measurements for themselves > and decide whether high confidence in security is affordable for their > applications. Shouldn't speed be given lower weight than security in > decisions of what to rec

[TLS] Re: Changing WG Mail List Reputation

2024-11-04 Thread Salz, Rich
> While there is overlap between professional behavior and the perceived focus > on browser specific use cases; I think we should try to separate out the > topic. My memory, perhaps faulty, is that "will browsers implement this" has been a process-gating question in the past. Recognizing that

[TLS] Re: Fwd: New Version Notification for draft-tls-reddy-composite-mldsa-00.txt

2024-11-04 Thread Alicja Kario
Hello, I don't think we should go back to signing with PKCS#1 v1.5 in TLSv1.3. I'm opposed to including those two IDs: mldsa44_rsa_pkcs1_sha256 (0x090C), mldsa65_rsa_pkcs1_sha384 (0x090D), Theoretically we could require the RSA part to still make PSS signatures but I think that would b

[TLS] Re: DTLS 1.3 ACK sorting, and when to clear the ACK buffer

2024-11-04 Thread Ilari Liusvaara
On Mon, Nov 04, 2024 at 01:52:06PM +, David Benjamin wrote: > On Sun, Nov 3, 2024 at 3:50 PM Ilari Liusvaara > wrote: > > > On Sun, Nov 03, 2024 at 12:49:59PM +, David Benjamin wrote: > > > > The spec also recommends you keep your older epochs around for a spell in > case of packet reord

[TLS] Re: New Version Notification for draft-tls-reddy-slhdsa-00.txt

2024-11-04 Thread Kampanakis, Panos
From draft-tls-reddy-slhdsa-00 > SLH-DSA can be preferred for CA certificates, making it ideal for long-term > security as a trust anchor. I think the standardized SLH-DSA parameters (designed for 2^64 signatures) still make the ICA cert unnecessarily large. If there is an SLH-DSA argument to

[TLS] Re: New Version Notification for draft-tls-reddy-slhdsa-00.txt

2024-11-04 Thread tirumal reddy
On Mon, 4 Nov 2024 at 02:52, Peter C wrote: > John Mattsson wrote: > > > ”Conversely, the fast version prioritizes speed over > > > signature size, minimizing the time required to generate > > > and verify signatures.” > > > > > > This is incorrect. The “f” versions only have faster key > > > gen

[TLS] Re: New Version Notification for draft-tls-reddy-slhdsa-00.txt

2024-11-04 Thread Peter C
Before this goes any further, perhaps I should clarify the context of my comment. Me: >>> I agree that there’s an argument for using SLH-DSA >>> in root certificates, but I’m surprised it’s being >>> proposed for the full chain. Tiru: >> SLH-DSA is not proposed for the end-entity certificates, >>

[TLS] Re: Fwd: New Version Notification for draft-tls-reddy-slhdsa-00.txt

2024-11-04 Thread tirumal reddy
On Sun, 3 Nov 2024 at 14:34, Ilari Liusvaara wrote: > On Sun, Nov 03, 2024 at 05:45:13AM +0530, tirumal reddy wrote: > > > > This draft https://datatracker.ietf.org/doc/draft-tls-reddy-slhdsa/ > > specifies how the PQC signature scheme SLH-DSA can be used for > > authentication in TLS 1.3. > > I

[TLS] Re: New Version Notification for draft-tls-reddy-slhdsa-00.txt

2024-11-04 Thread Alicja Kario
On Sunday, 3 November 2024 22:22:52 CET, Peter C wrote: John Mattsson wrote: ”Conversely, the fast version prioritizes speed over signature size, minimizing the time required to generate and verify signatures.” This is incorrect. The “f” versions only have faster key generation and signing. The

[TLS] Re: New Version Notification for draft-tls-reddy-slhdsa-00.txt

2024-11-04 Thread Alicja Kario
On Monday, 4 November 2024 14:39:12 CET, Peter C wrote: Tirumal Reddy wrote: SLH-DSA is not proposed for the end-entity certificates, it is preferred for CA certificates (please see the 3rd paragraph in https://www.ietf.org/archive/id/draft-tls-reddy-slhdsa-00.html#section-2) Yes, except the

[TLS] Re: Adoption call for Large Record Sizes for TLS and DTLS

2024-11-04 Thread Sean Turner
Hi! This is just another reminder that this WG adoption call is still ongoing. spt > On Oct 25, 2024, at 03:46, Sean Turner wrote: > > At the TLS meeting at IETF 119 we discussed the Large Record Sizes for TLS > and DTLS I-D; see [0] and [1]. There has been some list discussion; see [2] > and

[TLS] Re: New Version Notification for draft-tls-reddy-slhdsa-00.txt

2024-11-04 Thread Peter C
Tirumal Reddy wrote: > SLH-DSA is not proposed for the end-entity certificates, it is preferred > for CA certificates (please see the 3rd paragraph in > https://www.ietf.org/archive/id/draft-tls-reddy-slhdsa-00.html#section-2) Yes, except the introduction says: "This memo specifies how SLH-DSA

[TLS] Re: DTLS 1.3 ACK sorting, and when to clear the ACK buffer

2024-11-04 Thread David Benjamin
On Sun, Nov 3, 2024 at 3:50 PM Ilari Liusvaara wrote: > On Sun, Nov 03, 2024 at 12:49:59PM +, David Benjamin wrote: > > Hi all, > > > > So, Section 7 says the ACK contains: > > > A list of the records containing handshake messages in the current > flight > > which the endpoint has received an

[TLS] Re: Changing WG Mail List Reputation

2024-11-04 Thread Sean Turner
> On Nov 4, 2024, at 15:35, Joseph Salowey wrote: > > On Mon, Nov 4, 2024 at 10:48 AM Salz, Rich wrote: > > While there is overlap between professional behavior and the perceived > > focus on browser specific use cases; I think we should try to separate out > > the topic. > > My memory, per