On Fri, Nov 15, 2024, 9:13 AM John Mattsson <john.mattsson=
40ericsson....@dmarc.ietf.org> wrote:

> >I'm unenthusiastic but don't strongly oppose adoption of this and
>
> >similar drafts, mostly because I think we should try get some WG
>
> >consensus on guidance for when these things may be needed (if ever)
>
> >and what the consequences might be should people deploy 'em in the
>
> >meantime. (By 'em I mean anything with any kind of PQ sig or non
>
> >hybrid PQ key exchange.) That guidance might or might not be in a
>
> >separate document, or be copied into each relevant one.
>
>
>
> More discussion would certainly be welcome. IPSECME is discussing what the
> right solution for hybrid PQC authentication is. The two proposals are
> composite public keys and signatures in a single certificate chain vs. two
> certificate chains. Both approaches have benefits and disadvantages. TLS
> should have the same discussion. Using two certificate chains is already
> possible in TLS with Post-Handshake Certificate-Based Client
> Authentication. Post-Handshake Certificate-Based Server Authentication
> should be added anyway as it is needed for long lasting TLS connections in
> infrastructure.
>

Authentication is not like encryption. Why do you need two chains vs having
a backup algorithm?

>
>
> WebPKI might want to wait but the many infrastructure use cases of TLS,
> DTLS, and QUIC need to migrate very soon. US government new requirement is
> that pure RSASSA, ECDSA, and EdDSA are forbidden from after 2035. European
> countries have similar recommendations/requirements. Country to an earlier
> comment on the list, industry does not like new shiny tools, to the
> contrary, industry loves using existing stuff if possible.
>
> https://csrc.nist.gov/pubs/ir/8547/ipd
>
>
> https://cyber.gouv.fr/sites/default/files/2021/03/anssi-guide-mecanismes_crypto-2.04.pdf
>
> >but don't strongly oppose adoption
>
> Please don’t. TLS is already seen as being behind LAMPS, IPSECME, and
> JOSE. Any further delay would likely end up in a lot of LSs from various
> infrastructure SDOs urging IETF to specify quantum-resistant authentication
> in TLS ;)
>
>
>
> Cheers,
>
> John
>
>
>
> *From: *Stephen Farrell <stephen.farr...@cs.tcd.ie>
> *Date: *Friday, 15 November 2024 at 17:46
> *To: *Bas Westerbaan <bas=40cloudflare....@dmarc.ietf.org>, tls@ietf.org <
> tls@ietf.org>
> *Subject: *[TLS] Re: ML-DSA in TLS
>
>
>
> On 15/11/2024 10:51, Bas Westerbaan wrote:
> > We have posted a -00.
> >
> >
> https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fhtml%2Fdraft-tls-westerbaan-mldsa-00&data=05%7C02%7Cjohn.mattsson%40ericsson.com%7Cb8e9b9505c8a47465c1308dd0594fae8%7C92e84cebfbfd47abbe52080c6b87953f%7C0%7C0%7C638672859618372708%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=CHrEsED8VIB%2FotGnx3i8Es%2BHyquLY6NZAxAaTz8ANnM%3D&reserved=0
> <https://datatracker.ietf.org/doc/html/draft-tls-westerbaan-mldsa-00>
>
> I'm unenthusiastic but don't strongly oppose adoption of this and
> similar drafts, mostly because I think we should try get some WG
> consensus on guidance for when these things may be needed (if ever)
> and what the consequences might be should people deploy 'em in the
> meantime. (By 'em I mean anything with any kind of PQ sig or non
> hybrid PQ key exchange.) That guidance might or might not be in a
> separate document, or be copied into each relevant one.
>
> Cheers,
> S.
> _______________________________________________
> TLS mailing list -- tls@ietf.org
> To unsubscribe send an email to tls-le...@ietf.org
>
_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to