On Mon, May 27, 2024 at 10:39:27PM +0200, Dennis Jackson wrote:
> Hi Ryan,
> 
> On 27/05/2024 19:23, Ryan Hurst wrote:
> > I don't understand your position on the verifier, the faith one can put
> > in the chain of signatures is only the faith appropriate for the weakest
> > signature. As such if a classical key is used to sign a PQ chain, an
> > attacker would go after the classical signature ignoring the others.
> 
> That's not quite right.
> 
> Let's imagine we have a leaf public key L1, a PQ Public Key M1 and a
> Classical Public Key N1 and use <- to indicate 'signed by'. Consider the
> certificate chains:
> 
>     (1) L1 <- M1
> 
>     (2) N1 -> L1 <- M1  (N1 and M1 are both intermediates signing the same
> leaf)
> 
>     (3) L1 <- M1 <- N1 (N1 cross-signs M1).
> 
> Have we made things worse in (2) by adding a classical signature? No. Any
> verifier that would output accept on (1), will also output accept on (2)
> without even checking N1. So we cannot have made security worse for anyone
> that would accept (1). The opposite is also true, anyone that would trust N1
> will not need to verify M1. So (2) strictly improves availability without
> reducing security for anyone. (This was my proposed design in the initial
> mail).

Except handling (2) is only SHOULD in TLS 1.3, and there are clients
that don't implement that and blow up if presented with such "chain".

Implementing such support is risky, because it makes certificate
verification code much more complex, increasing probability of nasty
security bugs (beyond just memory safety).

Also, it makes the server Certificate message bigger, and that message
is in the best place to hurt performance.


Also, the incentives look to be very wicked. As long as clients keep
accepting classical certificates, there is incentive to keep using
those. And until CRQC exists, that does not even hurt security.

That is worse than SHA-1 to SHA-2 transition, where there was really
no difference beyond client support (and that could be negotiated, but
server support was poor). And yet that transition took over a decade,
really ending only because browsers stopped accepting SHA-1
certificates.




-Ilari

_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to