On Fri, 15 Nov 2024 at 23:10, Andrey Jivsov <cry...@brainhub.org> wrote:

> I am curious why this draft exclusively proposes ML-DSA, instead of
> adopting a composite signature approach as outlined in
> draft-ounsworth-pq-composite-sigs, at least as an option. For instance,
> id-MLDSA87-ECDSA-P384-SHA512 defined in the draft aligns with CNSA 2.0.
>
> Could supporters of the draft elaborate on the rationale to favor or
> exclusively offer (?) a standalone ML-DSA? Or, will a hybrid ML-DSA be in
> another draft?
>
The hybrid ML-DSA draft (see
https://datatracker.ietf.org/doc/draft-reddy-tls-composite-mldsa/) was
published before the standalone ML-DSA and we published a revised draft to
address the comments from the WG.

-Tiru


> On Fri, Nov 15, 2024 at 9:13 AM John Mattsson <john.mattsson=
> 40ericsson....@dmarc.ietf.org> wrote:
>
>> >I'm unenthusiastic but don't strongly oppose adoption of this and
>>
>> >similar drafts, mostly because I think we should try get some WG
>>
>> >consensus on guidance for when these things may be needed (if ever)
>>
>> >and what the consequences might be should people deploy 'em in the
>>
>> >meantime. (By 'em I mean anything with any kind of PQ sig or non
>>
>> >hybrid PQ key exchange.) That guidance might or might not be in a
>>
>> >separate document, or be copied into each relevant one.
>>
>>
>>
>> More discussion would certainly be welcome. IPSECME is discussing what
>> the right solution for hybrid PQC authentication is. The two proposals are
>> composite public keys and signatures in a single certificate chain vs. two
>> certificate chains. Both approaches have benefits and disadvantages. TLS
>> should have the same discussion. Using two certificate chains is already
>> possible in TLS with Post-Handshake Certificate-Based Client
>> Authentication. Post-Handshake Certificate-Based Server Authentication
>> should be added anyway as it is needed for long lasting TLS connections in
>> infrastructure.
>>
>> WebPKI might want to wait but the many infrastructure use cases of TLS,
>> DTLS, and QUIC need to migrate very soon. US government new requirement is
>> that pure RSASSA, ECDSA, and EdDSA are forbidden from after 2035. European
>> countries have similar recommendations/requirements. Country to an earlier
>> comment on the list, industry does not like new shiny tools, to the
>> contrary, industry loves using existing stuff if possible.
>>
>> https://csrc.nist.gov/pubs/ir/8547/ipd
>>
>>
>> https://cyber.gouv.fr/sites/default/files/2021/03/anssi-guide-mecanismes_crypto-2.04.pdf
>>
>> >but don't strongly oppose adoption
>>
>> Please don’t. TLS is already seen as being behind LAMPS, IPSECME, and
>> JOSE. Any further delay would likely end up in a lot of LSs from various
>> infrastructure SDOs urging IETF to specify quantum-resistant authentication
>> in TLS ;)
>>
>>
>>
>> Cheers,
>>
>> John
>>
>>
>>
>> *From: *Stephen Farrell <stephen.farr...@cs.tcd.ie>
>> *Date: *Friday, 15 November 2024 at 17:46
>> *To: *Bas Westerbaan <bas=40cloudflare....@dmarc.ietf.org>, tls@ietf.org
>> <tls@ietf.org>
>> *Subject: *[TLS] Re: ML-DSA in TLS
>>
>>
>>
>> On 15/11/2024 10:51, Bas Westerbaan wrote:
>> > We have posted a -00.
>> >
>> >
>> https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fhtml%2Fdraft-tls-westerbaan-mldsa-00&data=05%7C02%7Cjohn.mattsson%40ericsson.com%7Cb8e9b9505c8a47465c1308dd0594fae8%7C92e84cebfbfd47abbe52080c6b87953f%7C0%7C0%7C638672859618372708%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=CHrEsED8VIB%2FotGnx3i8Es%2BHyquLY6NZAxAaTz8ANnM%3D&reserved=0
>> <https://datatracker.ietf.org/doc/html/draft-tls-westerbaan-mldsa-00>
>>
>> I'm unenthusiastic but don't strongly oppose adoption of this and
>> similar drafts, mostly because I think we should try get some WG
>> consensus on guidance for when these things may be needed (if ever)
>> and what the consequences might be should people deploy 'em in the
>> meantime. (By 'em I mean anything with any kind of PQ sig or non
>> hybrid PQ key exchange.) That guidance might or might not be in a
>> separate document, or be copied into each relevant one.
>>
>> Cheers,
>> S.
>> _______________________________________________
>> TLS mailing list -- tls@ietf.org
>> To unsubscribe send an email to tls-le...@ietf.org
>>
> _______________________________________________
> TLS mailing list -- tls@ietf.org
> To unsubscribe send an email to tls-le...@ietf.org
>
_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to