Re: [lamps] Minutes for the LAMPS Virtual Interim on 20 April 2022

"Blumenthal, Uri - 0553 - MITLL" <uri@ll.mit.edu> Thu, 21 April 2022 22:35 UTC

Return-Path: <prvs=21100197b6=uri@ll.mit.edu>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 20F2C3A10A2 for <spasm@ietfa.amsl.com>; Thu, 21 Apr 2022 15:35:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.905
X-Spam-Level:
X-Spam-Status: No, score=-1.905 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, MIME_QP_LONG_LINE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JwGakoQjiAik for <spasm@ietfa.amsl.com>; Thu, 21 Apr 2022 15:35:17 -0700 (PDT)
Received: from MX2.LL.MIT.EDU (mx2.ll.mit.edu [129.55.12.51]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 04D613A11A1 for <spasm@ietf.org>; Thu, 21 Apr 2022 15:35:11 -0700 (PDT)
Received: from LLEX2019-1.mitll.ad.local (llex2019-1.llan.ll.mit.edu [172.25.4.123]) by MX2.LL.MIT.EDU (8.16.1.2/8.16.1.2) with ESMTPS id 23LMZ9ew219161 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL) for <spasm@ietf.org>; Thu, 21 Apr 2022 18:35:09 -0400
ARC-Seal: i=1; a=rsa-sha256; s=arcselector5401; d=microsoft.com; cv=none; b=idikKHk42UBlvQ3yRzEwQCgjXZjjWWFHkmJRJ1T0Bp6rTKC7pFDO49j5Fj512BSw0aiPU+pTrgT7svla+B6Y6D6Cvin0+jGYBGCOyxssBruG6AkxFy2yUKtisz0coRzXlRdPEfimuP1auBQydc0MSv997xWV2NPmgP95rbIUWP0XrOywIRwGJ7PuX8rN7oj1c0IOLZD0tQpjYkebDJnZ/h7LdEn49jXxBUBX95FoW/mJTd5QKeS2+irC+60rVdh3Dz3+cfC8EdxEB3caEw/uUNdvXG6j4ibYUJ/voz4rFLgh/1Fcuf3i2ZJJc2lQCQq+cVDMW88w6dqaiYGys/qBQA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector5401; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=yBAgP6oaOV7DUbTrWYHZxipfdBtJAzuTvXZBAnt/goA=; b=0tEcuBHCgnesA+7uY5jueVMCsR+M85butfTEaWvwkvKe+g7gHJlfi6W5vaa0ThKgxlwNVXES2jfs7Q40X+MOF7qRVfUtMfZJeeaycU1niVBsr4Ks89/fYNG9zOgKZ8wU6LgIpxTwdyxyaG7Y8lHB+6fYz4+Ts70LOUKVvT6a1xEKc28VXKCxnKuHkQfielRCR8bU5t7TG5HN2KtwJDEXOION/iL5PnrrSsThHtjiAdDrMKF0Gk4RiEy/OsjU6OtLd7WX5+ODPX2/F9zLDS2YlbHPs5SRTXt5Oqe8I9HzkguoCvn+flatb8TOOpOvIinGnZ8h0FQpY1sFizn9trgBvA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ll.mit.edu; dmarc=pass action=none header.from=ll.mit.edu; dkim=pass header.d=ll.mit.edu; arc=none
From: "Blumenthal, Uri - 0553 - MITLL" <uri@ll.mit.edu>
To: LAMPS <spasm@ietf.org>
Thread-Topic: [lamps] Minutes for the LAMPS Virtual Interim on 20 April 2022
Thread-Index: AQHYVct23QL+zw/W3kWSJoNUDhOxBqz6sXWA
Date: Thu, 21 Apr 2022 22:35:07 +0000
Message-ID: <6F33DF64-D358-4FD5-B65A-24CFD5FCFFC5@ll.mit.edu>
References: <184E06B8-74A4-420A-B21E-30655589AEF0@vigilsec.com>
In-Reply-To: <184E06B8-74A4-420A-B21E-30655589AEF0@vigilsec.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.58.22021501
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: d6253ae0-605b-45e4-9a09-08da23e7300b
x-ms-traffictypediagnostic: BN0P110MB1481:EE_
x-microsoft-antispam-prvs: <BN0P110MB14815C4BB2277C4BA383C63E90F49@BN0P110MB1481.NAMP110.PROD.OUTLOOK.COM>
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BN0P110MB1419.NAMP110.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(13230001)(366004)(71200400001)(6486002)(122000001)(26005)(2906002)(75432002)(99936003)(186003)(966005)(76116006)(8936002)(6512007)(33656002)(6506007)(2616005)(66946007)(66476007)(83380400001)(66556008)(5660300002)(64756008)(66446008)(6916009)(508600001)(38100700002)(38070700005)(8676002)(86362001)(45980500001); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 5Fb1OMk6bHiQJlxcOJMqev/050rF+QkfESdpP7CMq41i7HIXyjW54WKb+FhjyS4/IQwhgFk1j00S2YBIwWgyUn0LJsemRPXQCY96oZLtih/hSUPVFAoIFaABFC+RqIzDPDxSKXIpUa+XPmEAPhWz8TPB1QW2BW2NvGXE0PR2NDFNbJTalJ5wOxXyFgIeh7udbVEVMtjyHm/0CkodylfIxmnCHJ2zs6t3jCVTuwDJ7Dfv18suF8uMYSMQVu0T8VqE6JcMbBBhyNw5XiM7dePZTZayPtKiavbIqUWmDL8gesbTT0kKd6FEJIZ3nH9SmrZdW7vMxjQx+sNrlVObXbaB6CXTZ9RFiNGdffr2yPd3IWo0A2qS82D1j9u6BPtLqsKmZSartsPRdNkBoidKbyavZamnGlhb6HlPU75BZYfqtgY=
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg="sha256"; boundary="B_3733410907_1941721697"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BN0P110MB1419.NAMP110.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-Network-Message-Id: d6253ae0-605b-45e4-9a09-08da23e7300b
X-MS-Exchange-CrossTenant-originalarrivaltime: 21 Apr 2022 22:35:07.5737 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 83d1efe3-698e-4819-911b-0a8fbe79d01c
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN0P110MB1481
X-Proofpoint-ORIG-GUID: Poj4SWo9sCGH0xsptI4_FD4NxnhqMbUM
X-Proofpoint-GUID: Poj4SWo9sCGH0xsptI4_FD4NxnhqMbUM
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.486, 18.0.858 definitions=2022-04-21_05:2022-04-21, 2022-04-21 signatures=0
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 phishscore=0 spamscore=0 suspectscore=0 mlxscore=0 mlxlogscore=999 bulkscore=0 malwarescore=0 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2202240000 definitions=main-2204210113
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/2kV3jZwN4p_SnHQGnGeHg11r4Ww>
Subject: Re: [lamps] Minutes for the LAMPS Virtual Interim on 20 April 2022
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 21 Apr 2022 22:35:31 -0000

Corrections. Please

Change
	Uri: I am uncomfortable with the NIST process being the only
     way of choosing PQ algorithms. We should allow key agreement,
     even if NIST does not select a PQ key agreement algorithm.
To
	Uri: I am uncomfortable with the NIST PQC API practically required KEM
     as opposed to Diffie-Hellman type of Key Agreement. I hope that after
     Round 3, NIST might consider standardizing something like SIDH/CSIDH,
     If only for ephemeral. We should allow key agreement, even if NIST
     selects a PQ DH-like key agreement algorithm after Round 3, in the future.

Change
	Uri: In 2 of 3, if the verifier doesn't trust one algorithm and one
     is broken, then the verifier cannot verify
To
	Uri: In 2 of 3, if the verifier doesn't trust one algorithm and one
	is broken, what should the verifier do?

Change
	Uri: I don't think a cross-protocol attack is practical.
To 
	Uri: I don't think a cross-protocol attack is practical in this context.

Thanks
--
V/R,
Uri
 
There are two ways to design a system. One is to make it so simple there are obviously no deficiencies.
The other is to make it so complex there are no obvious deficiencies.
                                                                                                                                     -  C. A. R. Hoare
 

On 4/21/22, 18:02, "Spasm on behalf of Russ Housley" <spasm-bounces@ietf.org on behalf of housley@vigilsec.com> wrote:

    https://datatracker.ietf.org/meeting/interim-2022-lamps-01/materials/minutes-interim-2022-lamps-01-202204201000-00.pdf

    Please send corrections or improvements to the mailing list.

    For the LAMPS WF Chairs,
     Russ

    _______________________________________________
    Spasm mailing list
    Spasm@ietf.org
    https://www.ietf.org/mailman/listinfo/spasm