I support! 

Tried to give a short review below. 
==================
The current document is well prepared. Here are a few comments. 

1) 12 parameter sets for SLH-DSA are introduced in Section 5. It is a lot. 
Possible to reduce them?

2) Section 1 mentioned "backward compatibility". In which sense for "backward 
compatibility"? For my understanding, once one entity uses PQ signatures for 
IKEv2 authentication, if the other just supports traditional signature 
algorithms, they cannot run this algorithm. 

3) Section 3.2.1: " ...., or the underlying network is known to support 
sufficiently large MTUs without fragmentation issues, since PQC public keys and 
signatures can be significantly larger than those used in traditional 
algorithms." Here (IKEv2) is actually about the size of PQC certificates 
(certificate chains) and signatures, not PQC public keys and signatures. 

4) Section 8 (Security Considerations) "PQC signature algorithms are modeled 
under strong unforgeability against an adaptive chosen message attack 
(SUF-CMA). Examples include ML-DSA and SLH-DSA, which adhere to this security 
mode. " 

According to discussions in the past several days, SLH-DSA is actually "likely 
SUF-CMA", not "SUF-CMA" yet. Also, not sure if it is more helpful to add one 
sentence here for telling potential differene when using EUF-CMA and SUF-CMA 
signatures. 
==================

Cheers, 

Guilin

-----Original Message-----
From: Tero Kivinen via Datatracker <[email protected]> 
Sent: Wednesday, 8 October 2025 3:45 pm
To: [email protected]; [email protected]; 
[email protected]
Subject: [IPsec] WG Last Call: draft-ietf-ipsecme-ikev2-pqc-auth-04 (Ends 
2025-10-22)


Subject: WG Last Call: draft-ietf-ipsecme-ikev2-pqc-auth-04 (Ends 2025-10-22)

This message starts a 2-week WG Last Call for this document.

Abstract:
   Signature-based authentication methods are utilized in IKEv2
   [RFC7296].  The current version of the Internet Key Exchange Version
   2 (IKEv2) protocol supports traditional digital signatures.

   This document specifies a generic mechanism for integrating post-
   quantum cryptographic (PQC) digital signature algorithms into the
   IKEv2 protocol.  The approach allows for seamless inclusion of any
   PQC signature scheme within the existing authentication framework of
   IKEv2.  Additionally, it outlines how Module-Lattice-Based Digital
   Signatures (ML-DSA) and Stateless Hash-Based Digital Signatures (SLH-
   DSA), can be employed as authentication methods within the IKEv2
   protocol, as they have been standardized by NIST.

File can be retrieved from:
https://datatracker.ietf.org/doc/draft-ietf-ipsecme-ikev2-pqc-auth/

Please review and indicate your support or objection to proceed with the 
publication of this document by replying to this email keeping [email protected] 
in copy. Objections should be motivated and suggestions to resolve them are 
highly appreciated.

Authors, and WG participants in general, are reminded again of the Intellectual 
Property Rights (IPR) disclosure obligations described in BCP 79 [1]. 
Appropriate IPR disclosures required for full conformance with the provisions 
of BCP 78 [1] and BCP 79 [2] must be filed, if you are aware of any. Sanctions 
available for application to violators of IETF IPR Policy can be found at [3].

Thank you.

[1] https://datatracker.ietf.org/doc/bcp78/
[2] https://datatracker.ietf.org/doc/bcp79/
[3] https://datatracker.ietf.org/doc/rfc6701/



_______________________________________________
IPsec mailing list -- [email protected]
To unsubscribe send an email to [email protected]
_______________________________________________
IPsec mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to