On Thu, Feb 5, 2026 at 8:44 AM Yaron Sheffer <[email protected]> wrote:
>
> Hi Yaroslav,
>
> Thank you for raising important operational questions.
>
> Let me start with your concrete questions:
>
> - Who is expected to deploy and benefit from this mechanism?
>
> In this context, I am only interested in the "open Internet". As an aside, I 
> only wish real-life enterprise usage was as well-governed as you present 
> it... But that's beside the point.
>
> - In which environments would it realistically be safe and reliable to use?
>
> If we're talking about the open Internet then this question is meaningless, 
> it has to "just work" no matter what the environment.
>
> - How clients are expected to recover from cache poisoning or environmental 
> changes?
>
> I don't have a good answer on recovery but I think there are good ways to 
> prevent this risk. But let me start by mentioning that in addition to the two 
> failures you mentioned, there was also HSTS which was a success. Arguably, 
> because from a server admin POV it was very simple - just an on/off switch 
> and a time duration. In addition, many of the attacks on HPKP were the result 
> of it being at the application/HTTP layer and would not apply to a TLS-level 
> mechanism.
>
> To address your specific failure mode, I believe this could be managed by 
> indexing the client cache correctly, e.g. including not only the EE 
> certificate fingerprint but also a hash of the entire certificate chain. 
> Alternatively, we could add rules for middlebox behavior but I think you'll 
> agree that would be less effective.

The issue with these mechanisms is that a sufficiently smart attacker
attacks, and a sufficiently screwed up migration or configuration
mistake looks indistinguishable. It's a fundamental problem with these
designs. And no, the DNS people and CDN config people do not
necessarily cooperate. They may not even be in the same division.

Sincerely,
Watson

>
> Thanks,
> Yaron
>
>
>
> From: Yaroslav Rosomakho <[email protected]>
> Date: Thursday, 5 February 2026 at 17:53
> To: Yaron Sheffer <[email protected]>
> Cc: TLS WG <[email protected]>
> Subject: Re: [TLS] PQC Continuity draft
>
> Hi Yaron,
>
> Thanks for the draft and for driving discussion on this important topic.
>
> I have a general question about the intended deployment model and threat 
> environment for this mechanism.
>
> From my perspective, there appear to be two broad classes of TLS usage:
>
> 1. Closed or managed ecosystems.
> These environments typically operate with centrally managed TLS profiles, 
> well-defined trust anchors, and coordinated upgrade paths. Once such an 
> ecosystem migrates to PQC or composite signature schemes, downgrade attacks 
> are largely a configuration and policy problem, not a protocol problem. In 
> these settings, endpoints can be required to enforce PQC-only policies 
> directly, and I am not sure that an additional cache-based continuity 
> mechanism materially improves security.
>
> 2. The open public Web.
> For public web clients, we have substantial historical experience with 
> mechanisms that rely on client-side state to enforce stronger future behavior 
> (HPKP and Token Binding immediately come to mind). In practice, these 
> mechanisms have proven extremely difficult to deploy.
> One concern I have with the proposed approach is the interaction with TLS 
> intermediaries. Some clients operate behind trusted middleboxes such as 
> enterprise proxies, NGFWs, or inspection devices. Such intermediaries could 
> legitimately inject the proposed extension while presenting a locally-issued 
> (non-WebPKI) certificate that the client trusts in that environment. This 
> would effectively "poison" the client's cache with a continuity commitment 
> tied to the intermediary rather than to the origin server.
> If the same client later moves outside that managed environment, it may no 
> longer trust the original server certificate, even though the server is 
> operating correctly. Recovering from this state could be operationally very 
> challenging.
> More generally, public services that migrate to PQC certificates and deploy 
> this extension are likely to see sporadic client failures caused purely by 
> environmental factors. These failures would be intermittent, hard to 
> reproduce, and difficult for operators to troubleshoot.
>
> My concern is that this proposal may run into many of the same practical 
> obstacles that ultimately limited the deployment of HPKP and Token Binding: 
> mechanisms with strong theoretical security properties but problematic 
> real-world failure modes when applied to the heterogeneous public Internet.
>
> Before we pursue this further, it would be helpful to better understand:
>
> - Who is expected to deploy and benefit from this mechanism?
> - In which environments would it realistically be safe and reliable to use?
> - How clients are expected to recover from cache poisoning or environmental 
> changes?
>
> Without clear answers to these questions, I worry that the proposal may be 
> hard to operationalize for the open web, while providing limited additional 
> value and unnecessary complexity for tightly managed ecosystems.
>
> -yaroslav
>
> On Sun, Feb 1, 2026 at 5:04 PM Yaron Sheffer <[email protected]> wrote:
>
> Hi,
>
> A few months ago, Tiru and I published a draft [1] whose goal is to minimize 
> rollback attacks while the Internet is slowly migrating from classic to PQC 
> (or composite) certificates.
>
> It seems that the TLS WG is now ready to turn its attention to PQ resistant 
> signatures, and we would like to present the draft at the upcoming IETF-125. 
> If anybody has had a chance to read the draft in the meantime, we would 
> appreciate your feedback.
>
> People might also want to refer to the earlier discussion on this list [2].
>
> Thanks,
> Yaron
>
> [1] https://datatracker.ietf.org/doc/draft-sheffer-tls-pqc-continuity/
> [2] https://mailarchive.ietf.org/arch/msg/tls/qfmTs0dFq-79aJOkKysIP_3KhEI/
> _______________________________________________
> TLS mailing list -- [email protected]
> To unsubscribe send an email to [email protected]
>
>
>
> This communication (including any attachments) is intended for the sole use 
> of the intended recipient and may contain confidential, non-public, and/or 
> privileged material. Use, distribution, or reproduction of this communication 
> by unintended recipients is not authorized. If you received this 
> communication in error, please immediately notify the sender and then delete 
> all copies of this communication from your system.
> _______________________________________________
> TLS mailing list -- [email protected]
> To unsubscribe send an email to [email protected]



--
Astra mortemque praestare gradatim

_______________________________________________
TLS mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to