Re: [TLS] Legacy RSASSA-PKCS1-v1_5 codepoints for TLS 1.3

2023-11-09 Thread Loganaden Velvindron
I support moving forward with this document. On Wed, 25 Oct 2023 at 04:49, Andrei Popov wrote: > > Hi TLS, > > > > We would like to re-introduce > https://datatracker.ietf.org/doc/draft-davidben-tls13-pkcs1/ > > (it’s intended for the TLS WG and the Standards track, despite what the > document

Re: [TLS] [EXTERNAL] Re: Legacy RSASSA-PKCS1-v1_5 codepoints for TLS 1.3

2023-11-09 Thread Deb Cooley
I've done a tiny bit of checking on the situation of where we (USG DOD) have smartcards doing client auth TLS. To my knowledge, most (all?) are currently TLS 1.2 w/ PKCS1v1.5 certs. So, I would be in favor of this update (when I wrote RFC9151 I had long discussions about this, because I was worr

[TLS] The qpack_static_table_version TLS extension (Draft version 02)

2023-11-09 Thread Rory Hewitt
Hey folks, Following my presentation at the meeting at IETF 118 today (thanks for taking it easy on me, as this was my first IETF appearance as well as being my first I-D), I have created another version of my I-D: https://www.ietf.org/archive/id/draft-hewitt-ietf-qpack-static-table-version-02.ht

Re: [TLS] What is the TLS WG plan for quantum-resistant algorithms?

2023-11-09 Thread Thom Wiggers
Hi, I remembered that this discussion was somewhat summarised in https://datatracker.ietf.org/doc/html/draft-ietf-tls-hybrid-design-03#appendix-B, which might be helpful. Cheers, Thom > Op 9 nov 2023, om 12:00 heeft Scott Fluhrer (sfluhrer) > het volgende geschreven: > > We had that argum

Re: [TLS] What is the TLS WG plan for quantum-resistant algorithms?

2023-11-09 Thread D. J. Bernstein
Sophie Schmieg writes: > NTRU being chosen for non-security related criteria that have since > materially changed. I recommend discussing the patent issues explicitly, including public analysis of the patent threats. For example, Yunlei Zhao in https://groups.google.com/a/list.nist.gov/g/pqc-

Re: [TLS] What is the TLS WG plan for quantum-resistant algorithms?

2023-11-09 Thread John Mattsson
Scott Fluhrer wrote: >We had that argument several IETF’s ago (IETF 105?), and the clear consensus >of the working group was that explicit named hybrid combinations (e.g. one for >ML-KEM-512 + X25519) was the way to go. I think it is bit problematic that the discussion was so long ago before any

Re: [TLS] What is the TLS WG plan for quantum-resistant algorithms?

2023-11-09 Thread Deirdre Connolly
There are several documents in a cluster that define new hybrid `NamedGroup`s and how those operate / are combined, abstracted away from the rest of the TLS handshake. Treating hybrid schemes (key establishment, signatures) as /separate and distinct from their component algorithms/ is a good idea.

Re: [TLS] What is the TLS WG plan for quantum-resistant algorithms?

2023-11-09 Thread Scott Fluhrer (sfluhrer)
We had that argument several IETF's ago (IETF 105?), and the clear consensus of the working group was that explicit named hybrid combinations (e.g. one for ML-KEM-512 + X25519) was the way to go. Do we want to reopen that argument? Now, I was on the other side (and I still think it would be a

Re: [TLS] What is the TLS WG plan for quantum-resistant algorithms?

2023-11-09 Thread Ilari Liusvaara
On Thu, Nov 09, 2023 at 08:48:07AM +, John Mattsson wrote: > > Everybody seem to agree that hybrids should be specified. Looking in > my crystal ball, I predict that registering hybrids as code points > will be a big mess with way too many opinions and registrations > similar to the TLS 1.2 ci

Re: [TLS] What is the TLS WG plan for quantum-resistant algorithms?

2023-11-09 Thread John Mattsson
Hi, Everybody seem to agree that hybrids should be specified. Looking in my crystal ball, I predict that registering hybrids as code points will be a big mess with way too many opinions and registrations similar to the TLS 1.2 cipher suites. The more I think about it, the more I think TLS 1.3 s