Updating this thread to say that Kyber has been at 10% stable on all 
platforms since 2023-11-06.

On Friday, September 8, 2023 at 3:32:09 PM UTC-6 David Benjamin wrote:

> On Fri, Sep 8, 2023 at 4:16 PM 'David Adrian' via blink-dev <
> blin...@chromium.org> wrote:
>
>> > LGTM to experiment from M117 - M118 inclusive. I think that's what 
>> you're asking for - please let me know if I'm reading this incorrectly. 
>> Good luck!
>>
>> Thank you!
>>
>> > Any pointers to learn more about this possible compat problem?
>>
>> The basic issue is that the Kyber key exchange pushes the ClientHello 
>> size to be larger than one packet. This makes it more likely that the call 
>> to read() on the TCP socket will not return the entire ClientHello in a 
>> single call. Not all implementations are prepared for this (despite the 
>> fact that the ClientHello TLS record includes the length at the start, and 
>> TCP is stream-based).
>>
>
> It is also conceivable that we run into some system that just caps the 
> ClientHello size too tightly. Though so far all the issues we've seen have 
> been just folks not understanding how to use sockets. An actual size limit 
> would be a very, very tight constraint.
>
> The main difference is that packetization issues will be a little flaky. 
> You may just get (un)lucky and the whole ClientHello is available in one 
> read() anyway. Also they can be made to trigger on smaller ClientHellos 
> too, if we artificially send the ClientHello in two halves with a delay 
> between them. But this difference is mostly only relevant to help diagnose 
> the issue. (I.e. do you need to fix your socket reading logic, or fix some 
> unreasonable size limit in your code?) The actual impact to page loads is 
> about the same.
>  
>
>> On Fri, Sep 1, 2023 at 4:00 PM Mike Taylor <mike...@chromium.org> wrote:
>>
>>> Hi David,
>>>
>>> LGTM to experiment from M117 - M118 inclusive. I think that's what 
>>> you're asking for - please let me know if I'm reading this incorrectly. 
>>> Good luck!
>>>
>>> thanks,
>>> Mike
>>> On 8/28/23 9:18 AM, 'David Adrian' via blink-dev wrote:
>>>
>>> Contact emails dad...@google.com
>>>
>>> Explainer 
>>> https://www.ietf.org/archive/id/draft-tls-westerbaan-xyber768d00-02.html
>>>
>>> Specification 
>>> https://www.ietf.org/archive/id/draft-tls-westerbaan-xyber768d00-02.html
>>>
>>> Summary 
>>>
>>> Protect current Chrome TLS traffic against future quantum cryptanalysis 
>>> by deploying the Kyber768 quantum-resistant key agreement algorithm. This 
>>> is a hybrid X25519 + Kyber768 key agreement based on an IETF standard. This 
>>> specification and launch is outside the scope of W3C. This key agreement 
>>> will be launched as a TLS cipher, and should be transparent to users. 
>>> https://blog.chromium.org/2023/08/protecting-chrome-traffic-with-hybrid.html
>>>
>>>
>>> Blink component Internals>Network>SSL 
>>> <https://bugs.chromium.org/p/chromium/issues/list?q=component:Internals%3ENetwork%3ESSL>
>>>
>>> Search tags tls <https://chromestatus.com/features#tags:tls>, kem 
>>> <https://chromestatus.com/features#tags:kem>, kyber 
>>> <https://chromestatus.com/features#tags:kyber>, postquantum 
>>> <https://chromestatus.com/features#tags:postquantum>
>>>
>>> TAG review 
>>>
>>> TAG review status Pending
>>>
>>> Risks 
>>>
>>>
>>> Interoperability and Compatibility 
>>>
>>> Post-quantum secure ciphers are larger than classical ciphers. This may 
>>> cause compatibility issues with middleboxes.
>>>
>>> Any pointers to learn more about this possible compat problem?
>>>
>>>
>>>
>>> *Gecko*: No signal (
>>> https://github.com/mozilla/standards-positions/issues/874) Firefox is 
>>> also in the process of rolling this out.
>>>
>>> *WebKit*: No signal (
>>> https://github.com/WebKit/standards-positions/issues/244)
>>>
>>> *Web developers*: No signals
>>>
>>> *Other signals*:
>>>
>>> WebView application risks 
>>>
>>> Does this intent deprecate or change behavior of existing APIs, such 
>>> that it has potentially high risk for Android WebView-based applications?
>>>
>>>
>>> Goals for experimentation This is a Finch experiment, not site opt-in.
>>>
>>> We are aiming to shake out bugs and incompatibilities with buggy TLS 
>>> stacks that do not correctly handle large TLS ClientHellos. Announcing a 
>>> public timeline for experimenting on stable provides the necessary 
>>> justification for teams at companies who have buggy TLS stacks to 
>>> prioritize fixing the bugs.
>>>
>>> Ongoing technical constraints 
>>>
>>> Debuggability 
>>>
>>> Will this feature be supported on all six Blink platforms (Windows, Mac, 
>>> Linux, Chrome OS, Android, and Android WebView)? Yes
>>>
>>> Is this feature fully tested by web-platform-tests 
>>> <https://chromium.googlesource.com/chromium/src/+/main/docs/testing/web_platform_tests.md>
>>> ? No
>>>
>>> Flag name on chrome://flags enable-tls13-kyber
>>>
>>> Finch feature name PostQuantumKyber
>>>
>>> Requires code in //chrome? False
>>>
>>> Tracking bug 
>>> https://bugs.chromium.org/p/chromium/issues/detail?id=1442377
>>>
>>> Launch bug https://launch.corp.google.com/launch/4252981
>>>
>>> Estimated milestones 
>>> Shipping on desktop 119 
>>> OriginTrial desktop last 118 
>>> OriginTrial desktop first 117 
>>> DevTrial on desktop 115 
>>> Shipping on Android 119 
>>> OriginTrial Android last 118 
>>> OriginTrial Android first 117 
>>> DevTrial on Android 115 
>>> Shipping on WebView 119 
>>>
>>> Link to entry on the Chrome Platform Status 
>>> https://chromestatus.com/feature/5257822742249472
>>>
>>> Links to previous Intent discussions Intent to prototype: 
>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAGkh42%2BgKeCTA6vWwzrE%3DDVR%3DTmQaCyDFQxqnXkOy9GcVyGtnA%40mail.gmail.com
>>>
>>> This intent message was generated by Chrome Platform Status 
>>> <https://chromestatus.com/>.
>>> -- 
>>> You received this message because you are subscribed to the Google 
>>> Groups "blink-dev" group.
>>> To unsubscribe from this group and stop receiving emails from it, send 
>>> an email to blink-dev+...@chromium.org.
>>> To view this discussion on the web visit 
>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAGkh42%2B37SpGUy9t6bBkP13XQL4mrEaY%2Bu0wAzttjZyr_f2rGA%40mail.gmail.com
>>>  
>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAGkh42%2B37SpGUy9t6bBkP13XQL4mrEaY%2Bu0wAzttjZyr_f2rGA%40mail.gmail.com?utm_medium=email&utm_source=footer>
>>> .
>>>
>>> -- 
>> You received this message because you are subscribed to the Google Groups 
>> "blink-dev" group.
>> To unsubscribe from this group and stop receiving emails from it, send an 
>> email to blink-dev+...@chromium.org.
>>
> To view this discussion on the web visit 
>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAGkh42%2BoZZVLYf3hVfxe9RezK%2B_i26tL6M2r6aFLqd-cvoQvRg%40mail.gmail.com
>>  
>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAGkh42%2BoZZVLYf3hVfxe9RezK%2B_i26tL6M2r6aFLqd-cvoQvRg%40mail.gmail.com?utm_medium=email&utm_source=footer>
>> .
>>
>

-- 
You received this message because you are subscribed to the Google Groups 
"blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to blink-dev+unsubscr...@chromium.org.
To view this discussion on the web visit 
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/9eebd568-28c7-4e17-a20e-dd9a69b1090fn%40chromium.org.

Reply via email to