On Thu, Mar 7, 2024 at 2:56 PM David Benjamin <david...@chromium.org> wrote:
>
> Hi all,
>
> With the excitement about, sometime in the far future, possibly transitioning 
> from a hybrid, or to a to-be-developed better PQ algorithm, I thought it 
> would be a good time to remind folks that, right now, we have no way to 
> effectively transition between PQ-sized KEMs at all.
>
> At IETF 118, we discussed draft-davidben-tls-key-share-prediction, which aims 
> to address this. For a refresher, here are some links:
> https://davidben.github.io/tls-key-share-prediction/draft-davidben-tls-key-share-prediction.html
> https://datatracker.ietf.org/meeting/118/materials/slides-118-tls-key-share-prediction-00
> (Apologies, I forgot to cut a draft-01 with some of the outstanding changes 
> in the GitHub, so the link above is probably better than draft-00.)
>
> If I recall, the outcome from IETF 118 was two-fold:
>
> First, we'd clarify in rfc8446bis that the "key_share first" selection 
> algorithm is not quite what you want. This was done in 
> https://github.com/tlswg/tls13-spec/pull/1331
>
> Second, there was some discussion over whether what's in the draft is the 
> best way to resolve a hypothetical future transition, or if there was another 
> formulation. I followed up with folks briefly offline afterwards, but an 
> alternative never came to fruition.
>
> Since we don't have another solution yet, I'd suggest we move forward with 
> what's in the draft as a starting point. (Or if this email inspires folks to 
> come up with a better solution, even better! :-D) In particular, whatever the 
> rfc8446bis guidance is, there are still TLS implementations out there with 
> the problematic selection algorithm. Concretely, OpenSSL's selection 
> algorithm is incompatible with this kind of transition. See 
> https://github.com/openssl/openssl/issues/22203

Is that asking whether or not we want adoption? I want adoption.
>
> Given that, I don't see a clear way to avoid some way to separate the old 
> behavior (which impacts the existing groups) from the new behavior. The draft 
> proposes to do it by keying on the codepoint, and doing our future selves a 
> favor by ensuring that the current generation of PQ codepoints are ready for 
> this. That's still the best solution I see right now for this situation.
>
> Thoughts?

I think letting the DNS signal also be an indicator the server
implements the correct behavior would be a good idea.

Sincerely,
Watson

----
Astra mortemque praestare gradatim

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to