On Wed, 21 May 2025 at 15:59, Alicja Kario <hkario=
40redhat....@dmarc.ietf.org> wrote:

> On Tuesday, 20 May 2025 21:08:51 CEST, Viktor Dukhovni wrote:
> > On Tue, May 20, 2025 at 07:31:23PM +0200, Alicja Kario wrote:
> >
> >> I would like to point out that we need the same kind of
> >> codepoints no matter
> >> if we want to use SLH-DSA in the end entity certificates or in CA
> >> certificates.
> >
> > This assumes that one bothers signalling support for certificate
> > signature algorithms separately from TLS signature algorithms.  AFAIK,
> > that's rarely done in practice.  If SLH-DSA is not enabled for signing
> > the certiificate verify message, I don't expect to see it supported in
> > CA certificates either, at least in the near term.
>
> you're talking about implementation details, I'm talking about operational
> requirements
>
> yes, it may mean the "unfortunate" reality that we need to have
> speficication
> for use of it in CertificateVeriy when the "primary" use case is for certs,
> but as it was already discussed on the list, there are groups that are
> willing
> to pay the performance penalty even for CertificateVerify, so separating
> those definitions isn't really solving anything
>

The draft discusses trade-offs in detail and the SLH-DSA suitability for CA
certs, see
https://www.ietf.org/archive/id/draft-reddy-tls-slhdsa-01.html#section-2.
The overhead of sending intermediate certificates can be avoided by using
techniques like ietf-tls-cert-abridge or draft-kampanakis-tls-scas-latest.

-Tiru


> --
> Regards,
> Alicja Kario
> Principal Quality Engineer, RHEL Crypto team
> Web: www.cz.redhat.com
> Red Hat Czech s.r.o., Purkyňova 115, 612 00, Brno, Czech Republic
>
> _______________________________________________
> TLS mailing list -- tls@ietf.org
> To unsubscribe send an email to tls-le...@ietf.org
>
_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to