I also believe this should move forward.

> On Sep 10, 2024, at 4:05 PM, Bas Westerbaan 
> <bas=40cloudflare....@dmarc.ietf.org> wrote:
> 
> Same.
> 
> On Tue, Sep 10, 2024 at 11:51 PM Andrei Popov 
> <Andrei.Popov=40microsoft....@dmarc.ietf.org> wrote:
> I support staying the course, continuing work on the key share prediction 
> draft and allocating the code point.
>  Cheers,
>  Andrei
>   From: David Benjamin <david...@chromium.org> 
> Sent: Tuesday, September 10, 2024 2:40 PM
> To: <tls@ietf.org> <tls@ietf.org>
> Subject: [EXTERNAL] [TLS] draft-ietf-tls-key-share-prediction next steps
>   Hi all,
>   Now that we're working through the Kyber to ML-KEM transition, TLS 1.3's 
> awkwardness around key share prediction is becoming starkly visible. (It is 
> difficult for clients to efficiently offer both Kyber and ML-KEM, but a hard 
> transition loses PQ coverage for some clients. Kyber was a draft standard, 
> just deployed by early adopters, so while not ideal, I think the hard 
> transition is not the end of the world. ML-KEM is expected to be durable, so 
> a coverage-interrupting transition to FancyNewKEM would be a problem.)
>   We adopted draft-ietf-tls-key-share-prediction in June to address this. 
> There hasn't been a whole lot to do on it since. I've cut a new draft, 
> draft-ietf-tls-key-share-prediction-01, with some very minor changes that 
> were queued up in GitHub. I'd like to sort out next steps and move forward.
>   Beyond that, there are a couple of minor issues in the issue tracker. I 
> don't believe either of these need to block getting a codepoint.
> https://github.com/tlswg/tls-key-share-prediction/issues/4 - unless folks 
> think otherwise, I plan to just leave this alone and close this
> https://github.com/tlswg/tls-key-share-prediction/issues/7 - unless folks 
> think otherwise, I plan to just leave this alone and not require the receiver 
> to check
>   Finally, there's the question of downgrade protection:
> https://github.com/tlswg/tls-key-share-prediction/issues/11
>   For some background if folks have forgotten, the original key share 
> prediction draft included a ton of complexity to accommodate existing server 
> behavior that would preferentially pick groups out of key_share even if an 
> otherwise more preferred group was in supported_groups. Depending on what the 
> server was trying to do there, this could be perfectly fine (if the server 
> believes the groups are comparable in security) or a downgrade risk (if the 
> server actually believed they were in different security classes---PQ vs 
> classical---but implemented a key_share-first selection algorithm anyway). 
> Pre-adoption, my original draft took the position that it was ambiguous and 
> we cannot safely assume the server knew what it was doing. It designed a 
> scheme to clarify the semantics going forward and use codepoints to ratchet 
> in whether the server implemented the new semantics.
> https://www.ietf.org/archive/id/draft-davidben-tls-key-share-prediction-00.html
>   After WG discussion, I think we broadly concluded the semantics were 
> actually already present in RFC 8446, and it was not worth the trouble to 
> second-guess the servers here. That led to the much simpler draft, which 
> simply discusses why this is OK in security considerations:
> https://www.ietf.org/archive/id/draft-ietf-tls-key-share-prediction-01.html#name-security-considerations
>   As I wrote that text, I unsurprisingly agree with and am fine with this 
> outcome. :-) But there was some chatter about it in the adoption thread (see 
> GitHub link), so I filed the issue so we continued to discuss it. I think 
> perhaps now is the time to discuss it, if we're going to. Do folks want to 
> discuss it? Are there alternate proposals, or should we just stay the course? 
> Unless we have an alternate proposal, I propose we just stay the course and 
> go with [what I understand the conclusion to be from] the previous WG 
> discussion.
>   If there are no further significant changes that folks want to make, I 
> would like to propose we get a codepoint for this and unblock implementation. 
> The earlier this is ready, the more likely that we will be prepared by the 
> time the next KEM transition happens.
>   Thoughts?
>   David
> _______________________________________________
> TLS mailing list -- tls@ietf.org
> To unsubscribe send an email to tls-le...@ietf.org
> _______________________________________________
> TLS mailing list -- tls@ietf.org
> To unsubscribe send an email to tls-le...@ietf.org

_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to