On Mon, 3 Feb 2025 at 10:45, tirumal reddy <kond...@gmail.com> wrote: > > Hi all, > > The document https://datatracker.ietf.org/doc/draft-reddy-uta-pqc-app/ > discusses Quantum-Ready usage profiles for TLS-based Applications to defend > against passive and on-path attacks employing CRQCs. > > Comments and Suggestions are welcome.
Quote from section 4.1: "Middleboxes that do not handle fragmented ClientHello messages properly may drop them, as this behavior is uncommon." It might be a good idea to reference such behaviour. https://tldr.fail/. Quote from Section 4: " X25519MLKEM768: Combines the classical X25519 key exchange with the ML-KEM-768 Post-Quantum Key Encapsulation Mechanism. SecP256r1MLKEM768: Combines the classical SecP256r1 key exchange with the ML-KEM-768 Post-Quantum Key Encapsulation Mechanism." " There is no mention of SecP384r1MLKEM1024. Please consider adding something like ?: SecP384r1MLKEM1024: Combines the classical SecP384r1 key exchange with the ML-KEM-1024 Post-Quantum Key Encapsulation Mechanism > > Best Regards, > -Tiru > > ---------- Forwarded message --------- > From: <internet-dra...@ietf.org> > Date: Thu, 30 Jan 2025 at 10:40 > Subject: New Version Notification for draft-reddy-uta-pqc-app-05.txt > To: Tirumaleswar Reddy.K <kond...@gmail.com>, Hannes Tschofenig > <hannes.tschofe...@gmx.net> > > > A new version of Internet-Draft draft-reddy-uta-pqc-app-05.txt has been > successfully submitted by Tirumaleswar Reddy and posted to the > IETF repository. > > Name: draft-reddy-uta-pqc-app > Revision: 05 > Title: Post-Quantum Cryptography Recommendations for TLS-based Applications > Date: 2025-01-30 > Group: Individual Submission > Pages: 17 > URL: https://www.ietf.org/archive/id/draft-reddy-uta-pqc-app-05.txt > Status: https://datatracker.ietf.org/doc/draft-reddy-uta-pqc-app/ > HTML: https://www.ietf.org/archive/id/draft-reddy-uta-pqc-app-05.html > HTMLized: https://datatracker.ietf.org/doc/html/draft-reddy-uta-pqc-app > Diff: https://author-tools.ietf.org/iddiff?url2=draft-reddy-uta-pqc-app-05 > > Abstract: > > Post-quantum cryptography presents new challenges for applications, > end users, and system administrators. This document highlights the > unique characteristics of applications and offers best practices for > implementing quantum-ready usage profiles in applications that use > TLS and key supporting protocols such as DNS. > > > > The IETF Secretariat > > > _______________________________________________ > TLS mailing list -- t...@ietf.org > To unsubscribe send an email to tls-le...@ietf.org _______________________________________________ Uta mailing list -- uta@ietf.org To unsubscribe send an email to uta-le...@ietf.org