Re: [Secdispatch] Problem statement for post-quantum multi-algorithm PKI

Michael Richardson <mcr+ietf@sandelman.ca> Tue, 17 September 2019 17:21 UTC

Return-Path: <mcr+ietf@sandelman.ca>
X-Original-To: secdispatch@ietfa.amsl.com
Delivered-To: secdispatch@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 414121209BA for <secdispatch@ietfa.amsl.com>; Tue, 17 Sep 2019 10:21:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.199
X-Spam-Level:
X-Spam-Status: No, score=-4.199 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oX15at52Us4X for <secdispatch@ietfa.amsl.com>; Tue, 17 Sep 2019 10:21:20 -0700 (PDT)
Received: from tuna.sandelman.ca (tuna.sandelman.ca [IPv6:2607:f0b0:f:3:216:3eff:fe7c:d1f3]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6FAF21209B2 for <secdispatch@ietf.org>; Tue, 17 Sep 2019 10:21:20 -0700 (PDT)
Received: from sandelman.ca (obiwan.sandelman.ca [209.87.249.21]) by tuna.sandelman.ca (Postfix) with ESMTP id 93E423897C for <secdispatch@ietf.org>; Tue, 17 Sep 2019 13:19:38 -0400 (EDT)
Received: from localhost (localhost [IPv6:::1]) by sandelman.ca (Postfix) with ESMTP id 0D678560 for <secdispatch@ietf.org>; Tue, 17 Sep 2019 13:21:18 -0400 (EDT)
From: Michael Richardson <mcr+ietf@sandelman.ca>
To: "secdispatch@ietf.org" <secdispatch@ietf.org>
In-Reply-To: <CAN40gSvy4kcR1RwdJxoD+HSWc6eskTGHkrQ1=7iro2cieB-_rQ@mail.gmail.com>
References: <a2e32c33-8589-f3fb-97e5-c5977dfc64b4@openca.org> <BL0PR11MB317285DF599EC58CCF26FD5EC1B00@BL0PR11MB3172.namprd11.prod.outlook.com> <28224.1568427573@dooku.sandelman.ca> <cf1a301c-47d6-7565-ddc7-69048e3c08f3@cs.tcd.ie> <5F8D32EB-CE27-4ECD-997F-D0AAE4B798B5@akamai.com> <2b87f695-314c-5aed-14a4-9877fe254161@ericsson.com> <CAN40gStdbJ0TNoeL0VFU4Tx1F5ubtAdJnz+QJXYFFAP7W2OV7w@mail.gmail.com> <3cfa21d8-efe2-1a69-5268-0a39e9171fe1@cs.tcd.ie> <CAN40gSseUfKyJo8SZzLVQGnoSOKPHQJysx7zz_w=n_SGuckfSw@mail.gmail.com> <45237418-7C96-4823-A7C6-39E92586756E@akamai.com> <CAN40gSuzC2hQsFmB2SFd8CnicLWfyiqgePf0pTYsHXZ=s5FV-g@mail.gmail.com> <E55FFB18-ABB5-442A-B41A-CC7678076C26@akamai.com> <CAN40gSvy4kcR1RwdJxoD+HSWc6eskTGHkrQ1=7iro2cieB-_rQ@mail.gmail.com>
X-Mailer: MH-E 8.6; nmh 1.7+dev; GNU Emacs 24.5.1
X-Face: $\n1pF)h^`}$H>Hk{L"x@)JS7<%Az}5RyS@k9X%29-lHB$Ti.V>2bi.~ehC0; <'$9xN5Ub# z!G,p`nR&p7Fz@^UXIn156S8.~^@MJ*mMsD7=QFeq%AL4m<nPbLgmtKK-5dC@#:k
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=-=-="; micalg="pgp-sha256"; protocol="application/pgp-signature"
Date: Tue, 17 Sep 2019 13:21:18 -0400
Message-ID: <6013.1568740878@localhost>
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdispatch/ZMVtvgleKP26K5-HlFAK-VL2sug>
Subject: Re: [Secdispatch] Problem statement for post-quantum multi-algorithm PKI
X-BeenThere: secdispatch@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Security Dispatch <secdispatch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdispatch/>
List-Post: <mailto:secdispatch@ietf.org>
List-Help: <mailto:secdispatch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 17 Sep 2019 17:21:22 -0000

The argument is about the timing.
Whether we need to panic now or not.  Some suggest "we have time"

My comment was that automobiles are being designed around ECUs today that will
be built in 2025, which will be on the road until 2040.  So, no, we don't
have the luxury of a lot of time.

I'm personally unaware of a profile of X.509 certificates that permits a
CA to sign multiple public keys with multiple algorithms.  RFC5280 says:

   Certificate  ::=  SEQUENCE  {
        tbsCertificate       TBSCertificate,
        signatureAlgorithm   AlgorithmIdentifier,
        signatureValue       BIT STRING  }

I don't see a SET here, just a sequence.

We (the IETF) can't solve the problem of ECUs having multiple hardware
assists ourselves.  If I were working in that area, I'd already be looking
through all the NIST submissions from last fall and figuring out what I need
to accelerate them, and what operations are in common, and figuring out if I
can accelerate the common operations, can I win regardless of which one is picked?
Or at least, be closer to market to pick one or three variations.

Rotiling RFC5280 so that we can support multiple signature algorithms on
certificates means that we can get new CAs and related things deployed.
I'm with Stephen in asking if the DER encoding is worth keeping at this
point.

Encode ASN.1 in CBOR (CBOR encoding rules for ASN.1) if we think the ASN.1 is
worth keeping, switch to CDDL if not.  We probably need to keep the semantics.

--
Michael Richardson <mcr+IETF@sandelman.ca>, Sandelman Software Works
 -= IPv6 IoT consulting =-