Including TLS WG mailing list.

Thanks Mike for the feedback. The long-lived TLS connections will
undergo periodic
re-authentication to check the certificate validity. In a typical 3GPP
deployment, the certificate will expire and be replaced with a new
certificate with a new key pair well before the SLH-DSA signature limit is
approached. For example, if a server certificate is valid for 1 year and each
connection re-authenticates every 12 hours, this results in approximately 730
signatures per client connection. Even when scaled to many clients, the total
number of signatures generated over the lifetime of a single key remains vastly
below the SLH-DSA signature limit

It is an important security aspect to be discussed in the draft. I will
raise PR to address it.

Cheers,
-Tiru

On Sat, 17 May 2025 at 19:30, Mike Ounsworth <ounsworth+i...@gmail.com>
wrote:

> (my messages are not making it to the list; hoping someone will reply-all
> to get it on the record)
>
> @Martin, would you object to adoption less if there were fewer algorithms
> being registered ... like 1 or 2?
>
> @Tiru, @JohnMattsson -- My objection to this draft in its current form is
> that there is a lack of discussion about that 2^64 signature limit. I am
> aware of the size of the number "2^64", and that this simply won't be
> reached in a long-lived TLS connections, but once we allow SLH-DSA in TLS,
> it's allowed, and Moore's Law scaling over the coming decades could make it
> conceivable to see 2^64 handshakes on a single key, especially with massive
> horizontal scaling and CSR key reuse across cert renewals. How do you solve
> that? Do we require operators to roughly track the number of signatures
> performed? How? So IMO this draft NEEDS a well-worded Security
> Consideration about this limit and I want to see at least roughly what that
> text looks like as part of adoption because to me SLH-DSA is appropriate
> for TLS if and only if we can find something reasonable to say about this.
>
> On Sat, 17 May 2025 at 07:23, Salz, Rich <rsalz=
> 40akamai....@dmarc.ietf.org> wrote:
>
>> So far we’ve heard that 3GPP is considering using this (presumably for
>> thinks like station-to-station, as it were), but they need a stable
>> reference like an RFC. I’d say that “stable reference” is their problem. Do
>> they consider the TLS registries a stable reference?
>> _______________________________________________
>> TLS mailing list -- tls@ietf.org
>> To unsubscribe send an email to tls-le...@ietf.org
>>
>
_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to