Hi Mike, Please review the revised security considerations section https://github.com/tireddy2/slhdsa-tls1.3/blob/main/draft-reddy-tls-slhdsa.md to address your comment.
Best Regards, -Tiru On Mon, 19 May 2025 at 11:58, tirumal reddy <kond...@gmail.com> wrote: > Including TLS WG mailing list. > > Thanks Mike for the feedback. The long-lived TLS connections will undergo > periodic > re-authentication to check the certificate validity. In a typical 3GPP > deployment, the certificate will expire and be replaced with a new > certificate with a new key pair well before the SLH-DSA signature limit is > approached. For example, if a server certificate is valid for 1 year and each > connection re-authenticates every 12 hours, this results in approximately 730 > signatures per client connection. Even when scaled to many clients, the total > number of signatures generated over the lifetime of a single key remains > vastly > below the SLH-DSA signature limit > > It is an important security aspect to be discussed in the draft. I will > raise PR to address it. > > Cheers, > -Tiru > > On Sat, 17 May 2025 at 19:30, Mike Ounsworth <ounsworth+i...@gmail.com> > wrote: > >> (my messages are not making it to the list; hoping someone will reply-all >> to get it on the record) >> >> @Martin, would you object to adoption less if there were fewer algorithms >> being registered ... like 1 or 2? >> >> @Tiru, @JohnMattsson -- My objection to this draft in its current form is >> that there is a lack of discussion about that 2^64 signature limit. I am >> aware of the size of the number "2^64", and that this simply won't be >> reached in a long-lived TLS connections, but once we allow SLH-DSA in TLS, >> it's allowed, and Moore's Law scaling over the coming decades could make it >> conceivable to see 2^64 handshakes on a single key, especially with massive >> horizontal scaling and CSR key reuse across cert renewals. How do you solve >> that? Do we require operators to roughly track the number of signatures >> performed? How? So IMO this draft NEEDS a well-worded Security >> Consideration about this limit and I want to see at least roughly what that >> text looks like as part of adoption because to me SLH-DSA is appropriate >> for TLS if and only if we can find something reasonable to say about this. >> >> On Sat, 17 May 2025 at 07:23, Salz, Rich <rsalz= >> 40akamai....@dmarc.ietf.org> wrote: >> >>> So far we’ve heard that 3GPP is considering using this (presumably for >>> thinks like station-to-station, as it were), but they need a stable >>> reference like an RFC. I’d say that “stable reference” is their problem. Do >>> they consider the TLS registries a stable reference? >>> _______________________________________________ >>> TLS mailing list -- tls@ietf.org >>> To unsubscribe send an email to tls-le...@ietf.org >>> >>
_______________________________________________ TLS mailing list -- tls@ietf.org To unsubscribe send an email to tls-le...@ietf.org