I'm opposed.  This isn't just one signature algorithm, it is 12.  All 12 of 
which seem ill-suited to TLS.  I get the desire for diversity, but this is not 
the choice I'd make.

On Fri, May 16, 2025, at 23:27, Sean Turner wrote:
> We are continuing with our WG adoption calls for the following I-D: Use 
> of SLH-DSA  in TLS 1.3 [1]; see [2] for more information about this 
> tranche of adoption calls. If you support adoption and are willing to 
> review and contribute text, please send a message to the list. If you 
> do not support adoption of this draft, please send a message to the 
> list and indicate why. This call will close at 2359 UTC on 30 May 2025.
>
> Reminder:  This call for adoption has nothing to do with picking the 
> mandatory-to-implement cipher suites in TLS.
>
> Cheers,
> Joe and Sean
>
> [1] https://datatracker.ietf.org/doc/draft-reddy-tls-slhdsa/
> [2] https://mailarchive.ietf.org/arch/msg/tls/KMOTm_lE5OIAKG8_chDlRKuav7c/
> _______________________________________________
> TLS mailing list -- tls@ietf.org
> To unsubscribe send an email to tls-le...@ietf.org

_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to