On Tue, Apr 15, 2025 at 01:55:35PM -0700, Andrey Jivsov wrote:

> I don't think that standalone ML-DSA should be adopted.
> 
> There is time to move to a non-hybrid X.509 and digital signatures in the
> future.
> 
> This topic has implications to availability of X.509 certificates, as
> there is a real risk that CAs will prefer standalone ML-DSA to the
> exclusion of hybrids, and also that other protocols will be limited to
> standalone ML-DSA.

But CAs do not choose EE keys, the key in the CSR is chosen by users.
And CAs can start to use ML-DSA to self-sign trust-anchor certs or sign
intermediate issuer (subordinate CA if you prefer that term)
certificates whether or not ML-DSA is a defined signature algorithm in
TLS.

I support adoption, will review, and don't see a compelling reason to
delay adoption.  Are we likely to produce a materially different spec
if this is delayed and for how long?

-- 
    Viktor.

$ posttls-finger -c -Lsummary dukhovni.org
posttls-finger: Verified TLS connection established
    ... TLSv1.3 with cipher
    TLS_AES_256_GCM_SHA384 (256/256 bits)
    key-exchange X25519MLKEM768
    server-signature ML-DSA-65 (raw public key)

_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to