[openpgp] Re: ML-KEM and ML-DSA secret key format
Heiko Schäfer <heiko.schaefer@posteo.de> Sun, 02 March 2025 10:37 UTC
Return-Path: <heiko.schaefer@posteo.de>
X-Original-To: openpgp@mail2.ietf.org
Delivered-To: openpgp@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id D281C4CD7A2 for <openpgp@mail2.ietf.org>; Sun, 2 Mar 2025 02:37:46 -0800 (PST)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -4.396
X-Spam-Level:
X-Spam-Status: No, score=-4.396 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H5=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=posteo.de
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id J7GhOURkGi_3 for <openpgp@mail2.ietf.org>; Sun, 2 Mar 2025 02:37:45 -0800 (PST)
Received: from mout01.posteo.de (mout01.posteo.de [185.67.36.65]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id A6FE94CD79D for <openpgp@ietf.org>; Sun, 2 Mar 2025 02:37:45 -0800 (PST)
Received: from submission (posteo.de [185.67.36.169]) by mout01.posteo.de (Postfix) with ESMTPS id E6CD5240027 for <openpgp@ietf.org>; Sun, 2 Mar 2025 11:37:42 +0100 (CET)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=posteo.de; s=2017; t=1740911862; bh=rwyEDSrRTNXpK+goJ7G0b7ZCboY3sCSUsGlhshYxsqo=; h=Message-ID:Date:MIME-Version:Subject:To:From:Content-Type: Content-Transfer-Encoding:From; b=JFpgWQyWTb9kX7/bwL6KDuRNR9yEW+MsNCj8bpm3SCRg27Iapbc9dpPMGw73Pwaga e3WK9E47yk/fbLy2piqWykwRzG1wvJyOg5o6jUQy8sUImDeyPH5LziO0IMGN9OP+Qg qbPw3jfPq1IKRoY7BhEv0gSRBCM8Cm6mTPRBbTwpxn/jC/pCrGmhXbJieKqTy5SjvE O/hkUJc5S7tMZN13mggClb5XhOLU8DNLaM/xD/Ync6plUgOYdlYCCtq300pyyS6E9o P715V9QbnwpRtJH0vUkx8JDcuNkqbS0o4CqG0SHEnj9oCts9HZlZJx3Xk59jUUhhB+ TnKvSyTp1k5yg==
Received: from customer (localhost [127.0.0.1]) by submission (posteo.de) with ESMTPSA id 4Z5JLG3pC2z6v0m for <openpgp@ietf.org>; Sun, 2 Mar 2025 11:37:42 +0100 (CET)
Received: from services.foundation.hs (services.foundation.hs [192.168.21.4]) by mail.foundation.hs (Postfix) with ESMTP id 358AF705C5 for <openpgp@ietf.org>; Sun, 2 Mar 2025 11:37:42 +0100 (CET)
Message-ID: <25586bad-ade4-4745-9077-63deebdb5937@posteo.de>
Date: Sun, 02 Mar 2025 10:37:41 +0000
MIME-Version: 1.0
To: openpgp@ietf.org
References: <vN75HSFXALBJQMd1A60IEhI_gqmw27cvjvVTK6APPoK-NjROf5a0KTPiRtUC3G04hrX_pb1Yzpu7n2R90yIVYbqJZpRPkkyxLbH6cy7tpjw=@wussler.it> <9ca7ac72-e56b-4ac8-a894-44e31718c046@cs.tcd.ie> <oa-f1kLfj5SY47NIE1x6kqQxWfe-oQZUOsKevSWMfmafdVuLPL06GEWJR9wIjny9tb6FuaGd98pTESiVGrHP2tzWTCYgg_chitIqcGF2Eks=@wussler.it> <2d1d43103913268d6a6e4d1257ff6c842535ac51.camel@redhat.com> <Vng9thV-ERMDuIUawJIDLdf1BWWMl_fIBrSnEYJJ_aEVtw3VM-450tDZEZp0WXgzVokxcawyKPpcuRyqbdzDaL9NN5mJJogYPsQjiynVygI=@wussler.it> <2484.1740769703@obiwan.sandelman.ca> <dyqPyn1cRMvwM3rEiTJjgrPDFCQYaiJx9j9cP4NCpUB-9SxCXLvx2hMP3qOI4BkC-fAJVYp7BRBquo2so7eNkuj-nPcBpKdBNba31Oy9YqE=@protonmail.com>
Content-Language: en-US
From: Heiko Schäfer <heiko.schaefer@posteo.de>
In-Reply-To: <dyqPyn1cRMvwM3rEiTJjgrPDFCQYaiJx9j9cP4NCpUB-9SxCXLvx2hMP3qOI4BkC-fAJVYp7BRBquo2so7eNkuj-nPcBpKdBNba31Oy9YqE=@protonmail.com>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 8bit
Message-ID-Hash: 3MIUKDEHCOSA2YEMPSM236U2L7EKARRQ
X-Message-ID-Hash: 3MIUKDEHCOSA2YEMPSM236U2L7EKARRQ
X-MailFrom: heiko.schaefer@posteo.de
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-openpgp.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [openpgp] Re: ML-KEM and ML-DSA secret key format
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/openpgp/wriuvhYH5yksQ_CDg8FXGUNswrk>
List-Archive: <https://mailarchive.ietf.org/arch/browse/openpgp>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Owner: <mailto:openpgp-owner@ietf.org>
List-Post: <mailto:openpgp@ietf.org>
List-Subscribe: <mailto:openpgp-join@ietf.org>
List-Unsubscribe: <mailto:openpgp-leave@ietf.org>
Hi Michael, Daniel, list, to make one point (which I think both of you have implied) explicit: The "small HSM" OpenPGP card devices that are quite popular with OpenPGP users are all designed so that it's (supposed to be) impossible to retrieve private key material from them. So for all devices in this class, the question of "migrating from hardware-backed to software-backed" key format does not arise, because these cards do not support exporting the private key material. In any format. Separately, like Daniel, I think we should not try to support the exotic use case of exporting private key material from some other type of HSM and transforming it into OpenPGP framing. Expending format-complexity on this use case seems like a bad tradeoff to me. Users of such HSMs can either keep a copy of their key material in safe storage, in an OpenPGP-appropriate format - or rotate to a new subkey when needed. Thanks, Heiko On 3/2/25 10:45 AM, Daniel Huigens wrote: > Hi Michael, > > I agree with most of what you wrote, but I don't think any of it > implies that we need to wait for the decision in LAMPS or base > our own decision (for the OpenPGP wire format) on it (if you even > meant to imply that, perhaps you didn't). > > If we mainly care about importing an OpenPGP key to an HSM, then > storing the key as a seed up until that point is most convenient > as you can go from a seed to an expanded key but not the other way > around. So even if the HSM vendor decides not to support seeds in > any way, we could convert the seed to an expanded key in software > and then import that in whichever format the HSM vendors like > (without specifying an OpenPGP-specific wire format for it). > > If we care about moving keys between HSMs, that can happen again > in some format decided on by the HSM vendors and doesn't need to be > specified by OpenPGP, specifically. > > It's only if we care about exporting an HSM key to a "software-backed" > OpenPGP key that supporting an expanded key wire format could make > sense, but IMHO this is not a use case that we should want to support. > > Best, > Daniel > > > On Friday, February 28th, 2025 at 20:08, Michael Richardson wrote: >> The reason why the PKCS8 discussion in LAMPS is relevant to OPENPGP is >> because one can hope that there will be support in OPENPGP products for >> smaller/personal HSMs (USB tokens). The tokens might get used with a variety >> of protocols. >> >> Today, signing of software is largely a PGP thing not an S/MIME thing. >> (It's different in the MS-MSI space) >> Particularly when it comes to signing git commits. >> >> My opinion is that there are very few situations where it's better to move a >> private key rather than just have two or more signing keys be validated. >> At least -- in an PKIX situation with a certification authority. >> I think that YUM, and APT based systems can now specify a PGP keyring for >> each source, and a signature from any key in that keyring is valid. >> (And we've finally moved beyond mixing all the keys up for the different >> sources) >> >> Having a way to backup a private key from one token to another one seems >> (rather than generating a new key) might be operationally important for in >> the software signing space. >> I don't think the same considerations apply to individual use personal keys. >> >> I also think that OPENPGP key format allows us to have multiple private keys >> attached to a single identity, and for those keys to reside on distinct >> tokens. I admit that I've never tried this, but I ought to already. >> >> >> -- >> Michael Richardson mcr+IETF@sandelman.ca . o O ( IPv6 IøT consulting ) >> >> Sandelman Software Works Inc, Ottawa and Worldwide >> _______________________________________________ >> openpgp mailing list -- openpgp@ietf.org >> To unsubscribe send an email to openpgp-leave@ietf.org > _______________________________________________ > openpgp mailing list -- openpgp@ietf.org > To unsubscribe send an email to openpgp-leave@ietf.org
- [openpgp] ML-KEM and ML-DSA secret key format Aron Wussler
- [openpgp] Re: ML-KEM and ML-DSA secret key format Stephen Farrell
- [openpgp] Re: ML-KEM and ML-DSA secret key format Aron Wussler
- [openpgp] Re: ML-KEM and ML-DSA secret key format Simo Sorce
- [openpgp] Re: ML-KEM and ML-DSA secret key format Aron Wussler
- [openpgp] Re: ML-KEM and ML-DSA secret key format Simo Sorce
- [openpgp] Re: ML-KEM and ML-DSA secret key format Michael Richardson
- [openpgp] Re: ML-KEM and ML-DSA secret key format Daniel Huigens
- [openpgp] Re: ML-KEM and ML-DSA secret key format Heiko Schäfer
- [openpgp] Re: ML-KEM and ML-DSA secret key format Andrew Gallagher