Re: [lamps] PQC X.509 115 Hackathon pre meeting minutes

John Gray <John.Gray@entrust.com> Fri, 04 November 2022 22:22 UTC

Return-Path: <John.Gray@entrust.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BE032C1522A2; Fri, 4 Nov 2022 15:22:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.005
X-Spam-Level:
X-Spam-Status: No, score=-7.005 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=entrust.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id brX4hvA4GZnV; Fri, 4 Nov 2022 15:22:32 -0700 (PDT)
Received: from mx07-0015a003.pphosted.com (mx07-0015a003.pphosted.com [185.132.183.227]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D6AF5C14CEFC; Fri, 4 Nov 2022 15:22:31 -0700 (PDT)
Received: from pps.filterd (m0242864.ppops.net [127.0.0.1]) by mx08-0015a003.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 2A4JDeDK007035; Fri, 4 Nov 2022 17:22:10 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=entrust.com; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : mime-version; s=mail1; bh=hN6OsPfzQ+zTBcFt0kPH/+GMc2CrQVIEOQsb+w68XYE=; b=PZFn0M52Nu9hi64G/p2qCGHDfMIucKu02BJpBvgw5iZ6/gQQQWDIfkuykM6hyGNdh7DE NWLz/5mx70E6HPPYSGR+FHyk8aSr4/zsOCnHTDol8JqKAW3d2fRur27nlDQoNiMhN0jc 9cek4d+b+B7N/p33PFDy9MBUQ0K69A+34XXkYkYvGDOPrJ6zH3Ik8h4pnPtBKFj8rQ77 SZ4+w3hbxYlUiawD0QHYzjKKERrxyc/Tt414cC35MtPtystTKQwdcjm29J7exJ1X9upU E55hi+jaZtt7Oaz1wa0aeRFL9ph4KirjFGWgcW29TRRJojYEMW28UN9NyQiWaE40IkuM eA==
Received: from nam11-dm6-obe.outbound.protection.outlook.com (mail-dm6nam11lp2177.outbound.protection.outlook.com [104.47.57.177]) by mx08-0015a003.pphosted.com (PPS) with ESMTPS id 3kmpfh4e8m-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Fri, 04 Nov 2022 17:22:09 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Tl29EFiiexlIDLCHcPWOjuP5C+adbsghdPWrIn0OG0KEdEQlG/0COfwpfFu06lrLkCng4K4e5InzJ6tpAyTwrENeN8Ue+Xt+ggPVJKOKxTN3WUwu67DtKgjKCS53gVVDw3PqzbH46ucD2xkf3YgX8bWXZSe0ozqCPZvyEsjQEMvdD5vtU6Vcd0CkauRN7NUadU1g95a8wLgsAa/7XwSRRLhzFbh+QCMT5OtUZpRboobK2CzA9NdAInYqOL7IVPNpXTNwya6c7ymQ3ezY3/0soX5VxfKy93j16jaVdiWXu9EBEefsnYvZJ/Dtdec5YWtB6uG1aA1F9d7b2F+fR11ZtQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=hN6OsPfzQ+zTBcFt0kPH/+GMc2CrQVIEOQsb+w68XYE=; b=jWY0kR6u0XvbE7nVOUx4lzI+7MCw9BfyAkUE6iu9SA4Och+6/qcdknczCjj5T19zq7kfgk+nItMspcJzMsW6b5+VK0skkZ/kwud/YvS4V34YBb9Chef3il8VzOlDMhitSNRs+VuSLUYfDQ8t1UUie9Gme/2wfCt5lC5x7DoSjqnfTpUk6ZpzS+s8oFY2WX8bod0AB4W+rcyY2SOVEFAttaMsmyNaE/YSrZzzF5/qq9pn4mWOx2CGSlNL4J37wT9JVnQs6nSEHv82HjgP9jR2/9xLX8lkPEc3oDkmQfylIOq+Ru1fDMvmlh1UpZS3WSjIvKbNpesD1X9o084uKPKbNA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=entrust.com; dmarc=pass action=none header.from=entrust.com; dkim=pass header.d=entrust.com; arc=none
Received: from DM6PR11MB2585.namprd11.prod.outlook.com (2603:10b6:5:ce::22) by BL3PR11MB6529.namprd11.prod.outlook.com (2603:10b6:208:38c::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5791.20; Fri, 4 Nov 2022 22:22:04 +0000
Received: from DM6PR11MB2585.namprd11.prod.outlook.com ([fe80::2f8a:e13d:e9e:ed42]) by DM6PR11MB2585.namprd11.prod.outlook.com ([fe80::2f8a:e13d:e9e:ed42%7]) with mapi id 15.20.5791.022; Fri, 4 Nov 2022 22:22:03 +0000
From: John Gray <John.Gray@entrust.com>
To: 'LAMPS' <spasm@ietf.org>, "hackathon@ietf.org" <hackathon@ietf.org>
CC: "info@baentsch.ch" <info@baentsch.ch>, Felipe Ventura <Felipe.Ventura@entrust.com>, "kris@amongbytes.com" <kris@amongbytes.com>, "Railean, Alexander" <alexander.railean@siemens.com>, "Kretschmer, Andreas" <andreas.kretschmer@siemens.com>, Tim Hollebeek <tim.hollebeek@digicert.com>, Max Pala <M.Pala@cablelabs.com>, Michael Richardson <mcr@sandelman.ca>, Sofía Celi <cherenkov@riseup.net>, "alexandre.petrescu@gmail.com" <alexandre.petrescu@gmail.com>, "Klaußner, Jan" <Jan.Klaussner@d-trust.net>, Florence D <Florence.D@ncsc.gov.uk>, "Vaira, Antonio" <antonio.vaira@siemens.com>, Serge Mister <Serge.Mister@entrust.com>, David Hook <dgh@cryptoworkshop.com>, Carl Wallace <carl@redhoundsoftware.com>, "Markku-Juhani O. Saarinen" <mjos@pqshield.com>, "pat.kelsey@notforadio.com" <pat.kelsey@notforadio.com>
Thread-Topic: PQC X.509 115 Hackathon pre meeting minutes
Thread-Index: AQHY7aLGJtzgem1tgEqE4VLb6whnRK4vWA/Q
Date: Fri, 04 Nov 2022 22:22:03 +0000
Message-ID: <DM6PR11MB2585F8343A09C8DB319D6EC7EA3B9@DM6PR11MB2585.namprd11.prod.outlook.com>
References: <CH0PR11MB5739E98B69C5AD88745F539E9F5D9@CH0PR11MB5739.namprd11.prod.outlook.com> <DM6PR11MB25852409BE2751E34E1E83AAEA259@DM6PR11MB2585.namprd11.prod.outlook.com> <DM6PR11MB25852EC7B6A0715311F0A97EEA2D9@DM6PR11MB2585.namprd11.prod.outlook.com> <DM6PR11MB2585D8CB79C287C4E93D9AB4EA309@DM6PR11MB2585.namprd11.prod.outlook.com> <DM6PR11MB25854090EFBCA469B4E7F833EA369@DM6PR11MB2585.namprd11.prod.outlook.com>
In-Reply-To: <DM6PR11MB25854090EFBCA469B4E7F833EA369@DM6PR11MB2585.namprd11.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: DM6PR11MB2585:EE_|BL3PR11MB6529:EE_
x-ms-office365-filtering-correlation-id: 3c69bab3-084f-4a70-102b-08dabeb3003c
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DM6PR11MB2585.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230022)(346002)(376002)(366004)(39860400002)(396003)(136003)(451199015)(6506007)(55016003)(166002)(86362001)(66899015)(64756008)(122000001)(33656002)(316002)(38100700002)(26005)(966005)(478600001)(71200400001)(7696005)(54906003)(53546011)(186003)(38070700005)(110136005)(76116006)(66946007)(8676002)(66446008)(66574015)(21615005)(52536014)(4326008)(66556008)(66476007)(30864003)(2906002)(9686003)(83380400001)(5930299009)(41300700001)(8936002)(7416002)(5660300002)(15940465004); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: Jbm30T/Ne/B9Y28DRJN3Kpa+9Zt8+nQr5eUdJ2n+6hyZBcCqQmv706vk9t9Q0eGNqJyxUg48kyN/v99F+Ppb9xgeq+Io5HopNJ2po0hbcHbyFSKULx7ymG5PfaItPk3TsuX4zfzUmq11nxf2Ey419UZIsLGX4OTzPHMF+oEmFsMQkUOJINY4+KuzBxN4JvNgFIvCmm6rwmshB9Ym51cuxf8iTTVGOweoP1Plja8/uNMn/6D6pr5C0HfM07zCJfK+wWK2VcJFwH3FKP1HU0aWnzxb9bVER62rDs2mEFH37BtiaXCSppmioFkn0OcmQ4y/lA9056fTJsO4msizHV6m4jmR1eFNKAoJ4QZbCdOYV12S28ttXIl0NRD4IYwO6M8NbSK2WMyP+H2EJEr7E+9ZT9p+EjBCKtr5z0xzuXONB4MdpNO9kpc8Fr2jXoSwW6Yt0c2QjxewxwHj/TMtM4cqWOrhIvgMQdQTmTHV45ajPt0pTXKPKzF3oE1Rc219Q/ZjHIXoFHVhLEoVTE62XGoCLPhZg5l9BQy9pNYhalIG75itAXBq5AJuUbjA+LrXEXstgVZyPu/tbBZSm51vpxz7rjb3+s0+yF2hwg88gLgxWaUcDPmLRvxW/jVm6RI6MwL5QODuzi1BaGUWT7J/zOSRFn3MVRJZZ5o44AQXeTcGGB8eBPf1wQ41+GIplubdIHgrX3CeCG1XrTVTBUlzluDdnBDr4Abva3ENr6/U/aduO5IPkC1DFq5WclGx8zPdG49Nyha2BC7+ihapeB0ADG2OGBT1YrlqNawBYYQwy5z/emOMtuitQewb9MBzcPfJaV41bFj2CtBam36P+vt30yJ1BJk+j9K9CytYTPByFFZnMttg27o9pPZuKyke3EqOd90AWxx4UTPFPQWEleLKeBV+OnokHDFnfFxAwuUoszW+wARmWrI8b7wk/V7C+Cv15hIAOgrctiUloWa3Y9JmLPN6R5ZMkKU3ZnK+bv/QitZkCKt65q5X/a0KwhbDeM6eqJ2Nkb05FZaWcpcpW3KKr9zH4SFWomp9agXxeYBW+Chpi17ojGiPRR5b5ZzCmmLGxZg3gc5EmtFA2F/La0Oa5RvvsvtnF+iMSGLfHgBW/U1V1naSzDLJxZqQnjk8k2yDr8L/jbkRQIc9A9wO7KWb9Z/YoFk++Uhhn14ixpAOYNz2UrSAjH12/le/YeWmNSx7EgFttaiwyFyF4riTxvVi5kOCc9QpJG6gQ9iqmzRaDUgvR2e7yoRT6xkzv9krYjYlkHiPcmRBwb8wrRulZdPONNnxBR92CE+bK7QXbaMXP4+c7sy/fvLRcRzL1gzc7kPBy+hFTnJAZjOAgadO2XisE+pqnuNoCqgDuDszpD3fSrE9RGnqvxzOkXsNq+/axuK+CSjAZoP5AhRM/Mi7mLtEMP1jejD2s4B3isk7g7++YLPM0AGyDgAM7SCHhuQgyrNrI581yFR4/z2dIOFeH+ubCAZ4A3NfdxFdkJrH7eVJg2EWP7WUfbeHa9WSTWzNMDia9x91S+tLYRSEH8Mnxjd9+1+uEL6X8QZ6oFy1pmIU2P1MPhEtgxJvBkfdSI1aPXE2Hyfv
Content-Type: multipart/alternative; boundary="_000_DM6PR11MB2585F8343A09C8DB319D6EC7EA3B9DM6PR11MB2585namp_"
MIME-Version: 1.0
X-OriginatorOrg: entrust.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DM6PR11MB2585.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 3c69bab3-084f-4a70-102b-08dabeb3003c
X-MS-Exchange-CrossTenant-originalarrivaltime: 04 Nov 2022 22:22:03.8549 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: f46cf439-27ef-4acf-a800-15072bb7ddc1
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: taVIPu6H3V2CN3XqKY8VTC8O5Y5kfEMnjNqR2fkWzHUDz4F9ieBFTfqXDnD/p6nqkr802++YJ2ykJwRu4v77mw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL3PR11MB6529
X-Proofpoint-GUID: _iGNergOLqtJAokyvie3LgNZtJFz6spV
X-Proofpoint-ORIG-GUID: _iGNergOLqtJAokyvie3LgNZtJFz6spV
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.219,Aquarius:18.0.895,Hydra:6.0.545,FMLib:17.11.122.1 definitions=2022-11-04_12,2022-11-03_01,2022-06-22_01
X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 impostorscore=0 suspectscore=0 adultscore=0 clxscore=1011 malwarescore=0 bulkscore=0 phishscore=0 lowpriorityscore=0 priorityscore=1501 spamscore=0 mlxlogscore=999 mlxscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2210170000 definitions=main-2211040135
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/jxx1zHltmreCgBq8YbelI692TEE>
X-Mailman-Approved-At: Fri, 04 Nov 2022 18:22:44 -0700
Subject: Re: [lamps] PQC X.509 115 Hackathon pre meeting minutes
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 04 Nov 2022 22:22:36 -0000

I was just looking at the detailed Agenda for the Hackathon.   It looks like the Hackathon onsite doesn’t officially kickoff until 10:30am on MeetEcho, and teams form at 10:45 am.
See:
https://datatracker.ietf.org/meeting/115/materials/agenda-115-hackathon-sessa-00

So for anyone that is remote, lets have our first meet up on gather at around 10:45 AM UTC Tomorrow.

For onsight, I plan to go at 9:30 am to claim a table (or two depending on how many people we get) .

Sorry about the short notice on this one…   I will still try to have my avatar in gather at 10am in case anyone doesn’t get this message….

John Gray

From: John Gray
Sent: Monday, October 31, 2022 11:34 PM
To: 'LAMPS' <spasm@ietf.org>; hackathon@ietf.org
Cc: info@baentsch.ch; Felipe Ventura <Felipe.Ventura@entrust.com>; kris@amongbytes.com; Railean, Alexander <alexander.railean@siemens.com>; Kretschmer, Andreas <andreas.kretschmer@siemens.com>; Tim Hollebeek <tim.hollebeek@digicert.com>; Max Pala <M.Pala@cablelabs.com>; Michael Richardson <mcr@sandelman.ca>; Sofía Celi <cherenkov@riseup.net>; alexandre.petrescu@gmail.com; Klaußner, Jan <Jan.Klaussner@d-trust.net>; Florence D <Florence.D@ncsc.gov.uk>; Vaira, Antonio <antonio.vaira@siemens.com>; Serge Mister <Serge.Mister@entrust.com>; David Hook <dgh@cryptoworkshop.com>; Carl Wallace <carl@redhoundsoftware.com>; Markku-Juhani O. Saarinen <mjos@pqshield.com>; pat.kelsey@notforadio.com
Subject: PQC X.509 115 Hackathon pre meeting minutes

Thanks for attending the pre-meeting today!  I think it was very productive.   For those of you who could not make it, here is a summary:


  1.  We decided to use gather (https://www.ietf.org/how/meetings/gather/) to connect the onsite participants with the remote participants at the following times:

  *   Saturday November 5th at 10am and 4pm GMT (London England Time)
  *   Sunday November 6th at 10am and 1pm GMT (London England Time) – The final presentations are at 2:00 pm on Sunday.

               I also updated the team schedule with the above information:   https://wiki.ietf.org/meeting/115/hackathon/teamschedule


  1.  To foster communication, we decided to use the Hackathon Github to share files, though perhaps there are better IETF tools that would allow us to do this easier.  Pushing and pulling code is always fun, but dropping in files is probably easier if there is such a tool that isn’t too onerous to setup.
  2.  We also talked a bit about the key formats themselves:
     *   For the PQ Public Key, we seemed to agree that having the key encoded as an OCTET_STRING agrees with the current draft standards (dilithium for example).   We understand it uses an extra 4 bytes when it is placed inside the standard SubjectPublicKeyInfo, but for the sake of compatibility it doesn’t seem like a big deal.    It is fairly trivial for encoders and decoders to unwrap these messages.   We can use the same procedure for the other algorithms (Falcon, SPHINCS+ and Kyber).
     *   For the Private Key, we discussed the issue of concatenation of the public key with the private key (as is done in openSSL by default).  Some software implementations need access to the public key.  I also learned from Markku that the Kyber private key already concatenates the full public key.   We seemed to agree that this structure should work in all cases:
PQPrivateKey ::= SEQUENCE {
         version                  Version,
         privateKeyAlgorithm      PrivateKeyAlgorithmIdentifier,
         privateKey               OCTET STRING,
         publicKey                [1] PQPublicKey OPTIONAL
     }

In the case of Kyber, the OPTIONAL publicKey can be omitted as it is already part of the private key.  For the other algorithms it can be included based on application need.   It is also recognized that many applications can just use their own PrivateKey format.  The above is only needed when interchanging private keys (PKCS#12 for example).


     *   For the OIDs, the key seems to be agility.   It seems a number of people are planning to support both sets of OIDS  I sent out earlier (the OQS OIDS and the Entrust OIDS for interoperability).   Carl mentioned he is planning to support all of them, I am working on supporting all of them at once, and I also learned from Michael Baentsch (lead developer for openSSL-oqs) that there is a way to override the OIDS with simple environment variable commands!    He put together this page for us:  at https://github.com/open-quantum-safe/oqs-provider/wiki/Interoperability#ietf-115-hackathon<https://urldefense.com/v3/__https:/github.com/open-quantum-safe/oqs-provider/wiki/Interoperability*ietf-115-hackathon__;Iw!!FJ-Y8qCqXTj2!Y1TcFQZhvY5KvgEPVzmY1p25bL-8eOus0rUxFZtcPdoedImCX9HE0-ZhqEe5exCN8fWgXF2zKZF3AdmZ$>    Ideally we want the ability to drop in whatever OIDs get standardized on short notice, so designing software with that in mind will help collaboration at this time.


  1.  A question on how interactive protocols (CMPv2, SSH, etc) could be tested came up.  Essentially we would need to be able to communicate over an internal network so a server/client can communicate.    Since the event is hosted by Cisco we are assuming there will be some way to accommodate this at the event?   😊
  2.  We also talked about composite, and a few people are interested in testing this format as well, so that is great!
  3.  We briefly touched on signatures, but didn’t get too far into the “hash-then-sign” weeds, as that question comes up.  I imagine it will keep coming up until this issue is fully resolved for the PQ context.   Markku mentioned the XMSS standards do some type of preformatting of the hash, so looking at that may offer some useful guidance.  For our hackathon I think we agree we will stick to full message signing for now.   Obviously there is no reason signing a hash of a message wouldn’t work,  from an algorithms perspective it is just a smaller blob of bits being signed.   😊

I think that about covers everything we talked about today.

See you at the Hackathon on Saturday if you can make it either on gather (online) or in person.

Cheers,

John Gray

From: John Gray
Sent: Tuesday, October 25, 2022 10:16 PM
To: Mike Ounsworth <Mike.Ounsworth=40entrust.com@dmarc.ietf.org<mailto:Mike.Ounsworth=40entrust.com@dmarc.ietf.org>>; 'LAMPS' <spasm@ietf.org<mailto:spasm@ietf.org>>; pqc@ietf.org<mailto:pqc@ietf.org>; hackathon@ietf.org<mailto:hackathon@ietf.org>
Cc: info@baentsch.ch<mailto:info@baentsch.ch>; Felipe Ventura <Felipe.Ventura@entrust.com<mailto:Felipe.Ventura@entrust.com>>; kris@amongbytes.com<mailto:kris@amongbytes.com>; Railean, Alexander <alexander.railean@siemens.com<mailto:alexander.railean@siemens.com>>; Kretschmer, Andreas <andreas.kretschmer@siemens.com<mailto:andreas.kretschmer@siemens.com>>; Tim Hollebeek <tim.hollebeek@digicert.com<mailto:tim.hollebeek@digicert.com>>; Max Pala <M.Pala@cablelabs.com<mailto:M.Pala@cablelabs.com>>; Michael Richardson <mcr@sandelman.ca<mailto:mcr@sandelman.ca>>; Sofía Celi <cherenkov@riseup.net<mailto:cherenkov@riseup.net>>; alexandre.petrescu@gmail.com<mailto:alexandre.petrescu@gmail.com>; Klaußner, Jan <Jan.Klaussner@d-trust.net<mailto:Jan.Klaussner@d-trust.net>>; Florence D <Florence.D@ncsc.gov.uk<mailto:Florence.D@ncsc.gov.uk>>; Vaira, Antonio <antonio.vaira@siemens.com<mailto:antonio.vaira@siemens.com>>; Serge Mister <Serge.Mister@entrust.com<mailto:Serge.Mister@entrust.com>>; David Hook <dgh@cryptoworkshop.com<mailto:dgh@cryptoworkshop.com>>
Subject: PQC X.509 115 Hackathon pre meeting October 31st at 10am EST

I realize I failed to mention a time for our PQC x.509 pre-hackathon meeting.   This is the first hackathon I will be attending, so please forgive my newness of trying to organize this hackathon event…  😊

I am hoping it will be a fun way for us to collaborate with these new PQC key formats.   😊

For the pre-hackathon meeting we will be in gather.town on Monday the 31st in the Hackathon room table G at 10:00am EST (Easter Standard Time).
https://www.ietf.org/how/meetings/gather/

I have made up some slides, but it looks like they were blocked.   My colleague Mike Ounsworth copied the content into this google document

https://docs.google.com/document/d/1A2-D82du0qJjygvBuOlG8Xao3MzDYz1pRDzjT9eY6ls/edit?usp=sharing

Hopefully I covered everything this time.

If you can’t make this pre-meeting that is okay, we look forward to seeing you at the PQC X.509 Hackathon


Cheers,

John Gray
Entrust

From: John Gray
Sent: Friday, October 21, 2022 6:33 PM
To: Mike Ounsworth <Mike.Ounsworth=40entrust.com@dmarc.ietf.org<mailto:Mike.Ounsworth=40entrust.com@dmarc.ietf.org>>; 'LAMPS' <spasm@ietf.org<mailto:spasm@ietf.org>>; pqc@ietf.org<mailto:pqc@ietf.org>; hackathon@ietf.org<mailto:hackathon@ietf.org>
Cc: info@baentsch.ch<mailto:info@baentsch.ch>; Felipe Ventura <Felipe.Ventura@entrust.com<mailto:Felipe.Ventura@entrust.com>>; kris@amongbytes.com<mailto:kris@amongbytes.com>; Railean, Alexander <alexander.railean@siemens.com<mailto:alexander.railean@siemens.com>>; Kretschmer, Andreas <andreas.kretschmer@siemens.com<mailto:andreas.kretschmer@siemens.com>>; Tim Hollebeek <tim.hollebeek@digicert.com<mailto:tim.hollebeek@digicert.com>>; Max Pala <M.Pala@cablelabs.com<mailto:M.Pala@cablelabs.com>>; Michael Richardson <mcr@sandelman.ca<mailto:mcr@sandelman.ca>>; Sofía Celi <cherenkov@riseup.net<mailto:cherenkov@riseup.net>>; alexandre.petrescu@gmail.com<mailto:alexandre.petrescu@gmail.com>; Klaußner, Jan <Jan.Klaussner@d-trust.net<mailto:Jan.Klaussner@d-trust.net>>; Florence D <Florence.D@ncsc.gov.uk<mailto:Florence.D@ncsc.gov.uk>>; Vaira, Antonio <antonio.vaira@siemens.com<mailto:antonio.vaira@siemens.com>>; Serge Mister <Serge.Mister@entrust.com<mailto:Serge.Mister@entrust.com>>; David Hook <dgh@cryptoworkshop.com<mailto:dgh@cryptoworkshop.com>>
Subject: RE: PQC X.509 115 Hackathon

Thanks for your interesting in the PQ Keys and Signatures in X.509 / PKIX Hackathon.   I have tried to cc those people who have expressed interest in the hackathon either via email or by discussion.   Some of you may already know each other, some of you may not.   If I forgot to include you, I apologize.   You are welcome to attend.

We are planning a pre-hackathon meeting Monday October 31st in the IETF’s gather.town in the Hackathon room table G.
https://www.ietf.org/how/meetings/gather/

This will allow everyone to test their A/V and so we can sync up about what we want to hack at.     If you can’t make the meeting, that is okay, let me know and I will send you notes.

Suggested Agenda:

  1.  Introductions
  2.  Discuss Scope (What do people want to test).  I put together this slide deck today which covers much of the scope that I envision.  Hopefully it goes through email without an issue.   Obviously it is not exhaustive, but gives a good starting point for those who may just be starting to take a look at this.

Cheers,

John Gray
Entrust



From: John Gray
Sent: Wednesday, October 12, 2022 8:20 PM
To: Mike Ounsworth <Mike.Ounsworth=40entrust.com@dmarc.ietf.org<mailto:Mike.Ounsworth=40entrust.com@dmarc.ietf.org>>; 'LAMPS' <spasm@ietf.org<mailto:spasm@ietf.org>>; pqc@ietf.org<mailto:pqc@ietf.org>; hackathon@ietf.org<mailto:hackathon@ietf.org>
Subject: RE: PQC X.509 115 Hackathon

Thank you for all your comments and suggestions in regards to a PQC X.509 Hackathon.   We have added the details of this hackathon topic to the IETF Hackathon Wiki located here as ‘PQ keys and signatures in X.509 / PKIX’

https://wiki.ietf.org/en/meeting/115/hackathon

We hope that at least one author for each of these drafts is able to join in some capacity so we can attempt to come to a consensus on the key and signature formats of the PQ finalist algorithms.


  *   https://datatracker.ietf.org/doc/html/draft-uni-qsckeys-00.html
  *   https://datatracker.ietf.org/doc/draft-massimo-lamps-pq-sig-certificates/
We plan to distribute a set of OIDS we will use to identify the key and signature formats (we need those to interoperate with the various X.509 structures like PublicKeyInfo, PrivateKeyInfo, X509Certificate, PKCS10, X509CRL, OSCP, CMS, etc).   Ideally we suggest that these are done in an agile way in software to make it easier to plug in the real OID values once they have been officially registered.  We will use formats already suggested in existing drafts whenever possible.

I know there have already been multiple key format proposals for some of the PQ key and Signature drafts, so we can use different OIDs to designate different formats if we want to test with different key and signature formats for the same algorithms.   If there are key and signature formats that aren’t included in the list we provide, please suggest and add to the list.

I plan to add this information into the IETF GitHub repository in the next week, so stay tuned!

If there is something you think we have missed, please let us know.

Cheers,

John Gray
Entrust




From: Spasm <spasm-bounces@ietf.org<mailto:spasm-bounces@ietf.org>> On Behalf Of Mike Ounsworth
Sent: Tuesday, October 4, 2022 9:01 PM
To: 'LAMPS' <spasm@ietf.org<mailto:spasm@ietf.org>>; pqc@ietf.org<mailto:pqc@ietf.org>
Subject: [EXTERNAL] [lamps] PQC X.509 115 Hackathon

WARNING: This email originated outside of Entrust.
DO NOT CLICK links or attachments unless you trust the sender and know the content is safe.
________________________________
Hi LAMPS and people interested in PQC!

As suggested at 114, my colleague John Gray and I would like to do a 115 Hackathon on PQ keys and signatures in X.509 / PKIX.

We are suggesting to play with Dilithium, Falcon, Sphincs+, and Composite signing algorithms in Certs, CRLs, CSRs, PKCS#12s, CMS SignedData, maybe OCSP Responses, maybe Timestamping, maybe CMP. We can bring: the Entrust Toolkit (which we can hack at), Bounce Castle, OpenQuantumSafe-openssl, OpenCA (easier if Max Pala is there, but we can probably figure out how to build it).

The point of the hackathon, I think, is going to be OIDs, and public key / private key formats (ex.: the differences between Dilithium and Falcon encodings in draft-uni-qsckeys, and draft-massimo-lamps-pq-sig-certificates).



Question 1: are others interested in joining us at the hackathon? (no point is signing up for a hackathon spot if we’re the only ones there)

Question 2: whether or not you're joining, what PQ X.509 / PKIX things would you like to see working with Dilithium, Falcon, Sphincs+, Composite?


---
Mike Ounsworth
Software Security Architect, Entrust

Any email and files/attachments transmitted with it are confidential and are intended solely for the use of the individual or entity to whom they are addressed. If this message has been sent to you in error, you must not copy, distribute or disclose of the information it contains. Please notify Entrust immediately and delete the message from your system.