Re: [lamps] [EXTERNAL]Re: Call for Presentations at the LAMPS Interim Meeting on 28 Jan 2021

Mike Ounsworth <Mike.Ounsworth@entrust.com> Wed, 13 January 2021 19:04 UTC

Return-Path: <Mike.Ounsworth@entrust.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 969323A129A for <spasm@ietfa.amsl.com>; Wed, 13 Jan 2021 11:04:32 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.101
X-Spam-Level:
X-Spam-Status: No, score=-2.101 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=entrust.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ba2O_RzIR7Vm for <spasm@ietfa.amsl.com>; Wed, 13 Jan 2021 11:04:29 -0800 (PST)
Received: from NAM12-DM6-obe.outbound.protection.outlook.com (mail-dm6nam12on2113.outbound.protection.outlook.com [40.107.243.113]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B58043A1298 for <spasm@ietf.org>; Wed, 13 Jan 2021 11:04:29 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=MpAwDW2Wk6CPSHPbuuUtzslIlENgZnnmrcYzDp7KFfOIxL11y+wqdEk4YVXeI+SUXKWNqCjsmzuvXaWruz7iuTj7xrCUBpOE0xVHer9Fd6C/sY/OgkTEksfA+Jlb5Ye2cU6Qe1t+p6JG0BLYWR1aWACkUMOBu67TC9LocBDQ1A0+TKrQS5C79plIkPTdy1k9oP1qdGS8tAkHhQF2e3Pna/4PMc781ip1y7sn2BnRX7CMs4yBmY/uRTkEmu//VJlzPcnVFVSeup39EfQCreM5XYDXKBLBxhRq74Z+AuieqVeAfR18pHajHC+gMlzMXL0lXdYkSUMo1bG2yh33O9HCGg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=y2ty0hVhHmVn0qCBZ7/iprEzUJ25zDoJzja3BYHSOuY=; b=ZoFG5lyLXZMkmUqw6ZCl77oLjNWupAFnaXKOPYPvPon/9tMwG3Y1LhLd1kMlx2KD9AaIMOy5RxW+6lm/CGj5irb8k9psRpcJ+5rCqp+8kgGeuQhIX0W9owPO04GtWUB9O2mU7xJLML3wqG9QSHzhaHytP3hzNRiqGwngUXqt0mcQ16gu+Qx/XkMKwhsh5xuXnJ77Ny50Hts+Bh9h12pM0izGw8Nom2NLUMwuBgcL3Rv5lgx7dfq9KnSLcEXlf4SOW1JLboD7fmQpR3/ceLADbcFLLnFPFcmUAvDvoRK5aGMhDaaaUx9mJYVWspsf02InQAk0UMECjmzp43Se8GzuEw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=entrust.com; dmarc=pass action=none header.from=entrust.com; dkim=pass header.d=entrust.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=entrust.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=y2ty0hVhHmVn0qCBZ7/iprEzUJ25zDoJzja3BYHSOuY=; b=PAVzp/e4oA020EPRVYyE63fjHZ1NM+vqsNTRzp+j+uYcgF1XMZ2s2fAKnqaPLEuh0OXd5li7p3UZS/6EVN9CgBxt7eOYHO0rdTs9b674E2wJuEhnGy7qgSRuAPkB7gKzTCuJvMFCLpdrbgtgH3phmQXntvsPF0a57kVNI2i9I7Vw07Gl9IOsbOItaUu3CypyLyGUW0/AYMuWfS76DazUD+BgO00DYzRqfDAGbFMpEqxw/fIgkw+l/AXm8nXaPAK97fbvBWVlQ9XABEcqd1cYUWGbeYA/nIYjGhAtWhHkHl55kUbQT04quwG53G/A7Zkj9e9eQxUQaPSuRJ4OsY1hQg==
Received: from DM6PR11MB4380.namprd11.prod.outlook.com (2603:10b6:5:14e::20) by DM6PR11MB4394.namprd11.prod.outlook.com (2603:10b6:5:202::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3763.10; Wed, 13 Jan 2021 19:04:28 +0000
Received: from DM6PR11MB4380.namprd11.prod.outlook.com ([fe80::15ab:1cac:c06:c1f8]) by DM6PR11MB4380.namprd11.prod.outlook.com ([fe80::15ab:1cac:c06:c1f8%7]) with mapi id 15.20.3742.012; Wed, 13 Jan 2021 19:04:28 +0000
From: Mike Ounsworth <Mike.Ounsworth@entrust.com>
To: Michael Richardson <mcr+ietf@sandelman.ca>, LAMPS <spasm@ietf.org>
Thread-Topic: [EXTERNAL]Re: [lamps] Call for Presentations at the LAMPS Interim Meeting on 28 Jan 2021
Thread-Index: AQHW6VxU2VU/0CQXxkeOjfCPsxBhR6ol17YAgAAPeDA=
Date: Wed, 13 Jan 2021 19:04:28 +0000
Message-ID: <DM6PR11MB4380C66B31D31C4B13912D859FA90@DM6PR11MB4380.namprd11.prod.outlook.com>
References: <2C7FE71D-D3DA-49CF-B133-EAC979309951@vigilsec.com> <D95BD95A-ED8C-4275-AE4F-463A41A6C85C@vigilsec.com> <BN7PR11MB254730455D173EB9769B6632C9A90@BN7PR11MB2547.namprd11.prod.outlook.com> <6452.1610560502@localhost>
In-Reply-To: <6452.1610560502@localhost>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: sandelman.ca; dkim=none (message not signed) header.d=none;sandelman.ca; dmarc=none action=none header.from=entrust.com;
x-originating-ip: [72.139.200.247]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 4ae5d1f1-c9b4-4239-c65d-08d8b7f60d12
x-ms-traffictypediagnostic: DM6PR11MB4394:
x-microsoft-antispam-prvs: <DM6PR11MB439415569635B05CB89FEEC89FA90@DM6PR11MB4394.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:9508;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DM6PR11MB4380.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(396003)(376002)(366004)(39860400002)(136003)(346002)(8936002)(6506007)(53546011)(76116006)(26005)(83080400002)(316002)(2906002)(186003)(52536014)(8676002)(33656002)(66476007)(66946007)(64756008)(86362001)(66556008)(66446008)(66574015)(7696005)(966005)(9686003)(55016002)(478600001)(5660300002)(83380400001)(110136005)(71200400001); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata: nUt4+lesvwKrjpiTt48cEcByxmDhmTTpbLiTIviAn2IU5hYZNAJi1sU6B/VOhBJWiY1+a5nl845/y5VFiz25RZS5JVrIPMCx8D+udE/2PFNRmV1b4xjA7YGkmkUOfmqsKMY/wviXQFEx+fktqxO3/oZ8wRbhWnh3Kj/BYCMvE06cysZPP47z7ZO+QA2jS/lwloxWKIiJhxHQt7mlveXXXayojToBhY+A88ghZ3WgEkTOBtOdFlybNJU+bVMvV4RmPzqVm0YQXf1WRC3qlrYu1j+PJ9oQL/cwjnkaxDBX0MKjjLZeZt7KqisJRwpAC0NCMEHQ6Leuam6aldkoPhy0MVlqW/9Ss2RhR9356f96l7SzNO4rtW7gLuln6JUTnx0W2DndoickHRPveCBb4NHjqIRAIEalyd443G5FutjmJ5RYm8SIREoNZD9VDaLb+oKijmE9S5sdK9AQ7ZGVRGKMH1ZN4krAAtj8SwsdHaRWqYRG0g2Dgx5W2m91UDnwtmOCoSywbDx3ZJv0lMFI7ccag6C+QVrKjk/5LrqzyTbnAdlPkaD5uDaWPx6bF89V+NUe1ZKVeYUFBZvTCJib0HMP0JNpVO1zC1wpl8LtD5uIUDP+ATZeDh+lhhu9U+4c6RMTpfDYjvtYaekOyv9CKENqQYdAkCalxBBEH6ICZdC+DAsDPeQiDu8nZw00juzPtuaeCSQWjDzW87HPQUjz+z7hwYRKeeg6NZ+iG9+o1/asAoEMV0vYbF0nPKtbUjtPqmjA2ndvJN1qR+YnW8y7E9XKLxRoe6S8QwlrB/Nnu2UPi4E/BW4RNaL6Pd4en8XfD0pmeWeW5xX8dp8lxSDhM7y3Olym5do4MEmH4eVBMvIgMyHcGyItr1sj61BpHOO6msqQBzhO6Py7+1ht/++Y1swxjE3xmUIaysNL1TzQw5kj0X//mCmqq4AeDiIcciVjEeGjT+q5wM/bSO4TJ9/Jjt1jl2CdC8eoZEru8vL9iS3vBNE=
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: entrust.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DM6PR11MB4380.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 4ae5d1f1-c9b4-4239-c65d-08d8b7f60d12
X-MS-Exchange-CrossTenant-originalarrivaltime: 13 Jan 2021 19:04:28.1537 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: f46cf439-27ef-4acf-a800-15072bb7ddc1
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: FpOIOEs/5jk17PLwUL3Coz7M9u0IzVgUeiKcN2rwd4u4reliooZjOJVm6s2T+fL277SpXtDZ/9nXD7+BlkckvSHvEjGnUJCJUuF8sicP1d0=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR11MB4394
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/MN_2YZA6ba20UdbWI2vmrJlwmYs>
Subject: Re: [lamps] [EXTERNAL]Re: Call for Presentations at the LAMPS Interim Meeting on 28 Jan 2021
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Jan 2021 19:04:33 -0000

At the risk of over-complicating everything, we see the One-Cert vs Two-Cert discussion as in some senses orthogonal to our composite keys and signatures draft (draft-ounsworth-pq-composite-sigs).

I think that shoehorning this into a "one-cert vs two-cert" discussion is missing some of the potential value of the Composite proposal.

In writing the composite draft, we were careful to not make it a certificates draft, and instead stick strictly to public key, private key, and signature OIDs and ASN.1 encodings. At present, we are just looking at composite key and signature formats so that there is an obvious and standardized way to meet the NIST call for putting dual signatures on <thing>; whatever <thing> is.

For example, someone way want to combine both approaches and have a Two-Cert ecosystem where one of the certs is Composite:

Cert1: {RSA}
Cert2: {RSA, PQ}


Another example of them being orthogonal is a case where you have separate certificates {RSA}, {PQ}, but for protocol simplicity you want to use the composite signature structure {RSA,PQ} on the wire.

Our draft (draft-ounsworth-pq-composite-sigs) is really trying to be orthogonal from the One-Cert vs Two-Cert question.

---
Mike Ounsworth

-----Original Message-----
From: Spasm <spasm-bounces@ietf.org> On Behalf Of Michael Richardson
Sent: January 13, 2021 11:55 AM
To: LAMPS <spasm@ietf.org>
Subject: [EXTERNAL]Re: [lamps] Call for Presentations at the LAMPS Interim Meeting on 28 Jan 2021


Panos Kampanakis \(pkampana\) <pkampana=40cisco.com@dmarc.ietf.org> wrote:
    > I have been on both sides of the argument, Classical+PQ signatures or
    > parallel (classical, PQ). Recently I have been thinking that we probably
    > can't avoid keeping classical PKI for backwards compatibility which probably
    > makes the Classical+PQ sigs less appealing.

First, I think that we need better terms to explain the two options.
Russ has used "One Certificate" and "Two Certificate".

I think that in the "One Certificate" case, that the PQC and traditional (He said "traditional", and Panos said "classical", btw) CA signers would sign both BQC and traditional keys.  Right?


    > Especially for live protocols
    > like TLS, this argument is even more relevant especially since the big cert
    > would be penalizing the classical peer with unnecessary PQ sig data.

It seems that for live protocols we can negotiate, and the server can send only what is needed, so there are really no byte-size issues.

    > But I have heard some arguments for classical+PQ for non-TLS usecases. An
    > example could be SW Signing. I would argue that PKCS#7/CMS can include
    > multiple sigs (in SignerInfo) in the SignedData as clarified in RFC4853, so
    > even for SW Signing we may not need Composite or Hybrid Classical+PQ
    > Signatures.

That seems to be the parallel case, isn't it?

I have a different concern to ask as well:
  Are hash-based signatures in the classical or PQC category?

    > I gave this presentation at the NIST NCCoE Virtual Workshop on
    > Considerations in Migrating to Post-Quantum Cryptographic Algorithms:
    > https://www.nccoe.nist.gov/sites/default/files/10-Housley-NCCoE-Workshop-Tra
    > nsition-to-PQC-Certificates.pdf

    > This short presentation still captures my view.  Are there people with a
    > different view that would like time on the agenda at the LAMPS Interim on 28
    > Jan?  I would like to make sure that all point of view are heard.

Russ' preference is for "Two Certificate" case.
I think that it is equivalent to having RSA and ECDSA ecosystems alive, which I think we have managed reasonably well.
So I don't think that I have a diverging view.

--
Michael Richardson <mcr+IETF@sandelman.ca>   . o O ( IPv6 IøT consulting )
           Sandelman Software Works Inc, Ottawa and Worldwide