Re: [lamps] Call for adoption for the composite-related Internet-Drafts

"Scott Fluhrer (sfluhrer)" <sfluhrer@cisco.com> Wed, 14 June 2023 14:38 UTC

Return-Path: <sfluhrer@cisco.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E72C4C15107C for <spasm@ietfa.amsl.com>; Wed, 14 Jun 2023 07:38:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -11.895
X-Spam-Level:
X-Spam-Status: No, score=-11.895 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b="TIo1nH99"; dkim=pass (1024-bit key) header.d=cisco.com header.b="TcjrbebC"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IKdVtjzxJYBj for <spasm@ietfa.amsl.com>; Wed, 14 Jun 2023 07:38:50 -0700 (PDT)
Received: from rcdn-iport-7.cisco.com (rcdn-iport-7.cisco.com [173.37.86.78]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BE756C14E515 for <spasm@ietf.org>; Wed, 14 Jun 2023 07:38:49 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=36240; q=dns/txt; s=iport; t=1686753529; x=1687963129; h=from:to:subject:date:message-id:references:in-reply-to: mime-version; bh=JkZMM50jp929pK7qJ6CShc92KIGsat9hA4JfZaH+QkA=; b=TIo1nH99HFgPwsNxSKgodxTG/tRf0XdFS/9/v6tagnlqsgwrRHqAKopW nXzmRzr2ncQen7bhGQzcBHfIkWxhHMX5DuRMmOnlOhbLwjnXm+xTC6ela P1xyu81+SYqZcIXK/k2rZC/2p+aF+BKamtgU3LGKTaGNcGFlKgRVGLZkE g=;
X-IPAS-Result: A0AmAAB8z4lkmIENJK1aHQEBAQEJARIBBQUBQCWBFggBCwGBKzEqKHMCWSoSR4gdA4ROX4hVA51uFIERA1YPAQEBDQEBRAQBAYUGAoV2AiU0CQ4BAgICAQEBAQMCAwEBAQEBAQMBAQUBAQECAQcEFAEBAQEBAQEBHhkFEA4nhWgNhgQBAQEBAgEMBggDEBMBATgECwIBCBEEAQEhAQYHMhQJCAIEARIIGoJcAYIVJCMDAaEUAYFAAolwNXiBNIEBgggBAQYEBZ8mCYFCAYkwB4N3gwI0eycbgUlEgRVDgmg+gmICAoEfCgESAQccAxoID4Negi6JFoIOAggEAgeCYoI6T409gShvgR6BIn8CCQIRZ4EICF6BckACDVQLC2WBHFI8gUYCAhE8FU97HQMHBAKBBRAvBwQyCRYJBgkYLycGUQctJAkTFUIEg1kKgQ0/FQ4RglwtNkEbWmAHNgNEHUADC3A9NQYOHwUEIwFJgVcwQIEMAkafHm6BcQFaDiorBwEDFAkFBgcUJA0BWQgGKxE9Kg4DMgiSHwsQAkGOBqFQgTcKhAiTDo4oF4QBjGyGbZEbYpYtgWogolY1hGMCBAIEBQIOAQEGgWM6a3BwFTuCZ1IZD4wsgXQMDQmBBgECDII9j3l1AgE4AgcLAQEDCYZLhH0BAQ
IronPort-PHdr: A9a23:zCPQcRweBfgEcHvXCzMRngc9DxPP8539OgoTr50/hK0LL+Ko/o/pO wrU4vA+xFPKXICO8/tfkKKWqKHvX2Uc/IyM+G4Pap1CVhIJyI0WkgUsDdTDCBjTJ//xZCt8F 8NHBxd+53/uCUFOA47lYkHK5Hi77DocABL6YBF7Ivn1AIPIp8+2zOu1vZbUZlYAiD+0e7gnN Byttk2RrpwPnIJ4I6Atyx3E6ndJYLFQwmVlZBqfyh39/cy3upVk9kxt
IronPort-Data: A9a23:yfQlUKvXDg9xIUh+YQw89Ot9WOfnVC1eMUV32f8akzHdYApBsoF/q tZmKWnTPfeMMDHyfIh2ao2/9h8F7Z+DzYAxHgdt+CFkHyhBgMeUXt7xwmUckM+xwmwvaGo9s q3yv/GZdJhcokf0/0vrav67xZVF/fngqoDUUIYoAQgvA1c8IMsdoUg7wbVh3Nc02YHR7z6l4 LseneWOYDdJ5BYsWo4kw/rrRMRH5amaVJsw5zTSVNgT1LPsvyB94KE3ecldG0DFrrx8RYZWc QpsIIaRpQs19z91Yj+sfy2SnkciGtY+NiDW4pZatjTLbhVq/kQPPqgH2PU0Smx5oGiKlpNN6 fpL7J+6cC4NJY6dsbFIO/VYO3kW0axu8bvDJz20ttaeihyAeHr3yPIoB0YzVWEa0r8oWicVq 7pBc3ZUNEHra+GemNpXTsF3iMA+LNPmJqsUu2prynfSCvNOrZXrHPybtIcHhGpYasZmQtLzV /IZTxxUdCv/JDt9PWszApQXg7L97pX4W2QI9A3KzUYt2EDI1AVq1ZDsPcbbPNuQSq1ocl2wr 2bC+SHyBQsXcY3Zwjue+XXqjejK9c/mZG4MPJ6T2NU3g1TQ+k08DkQVX2KSheKa22frDrqzN Hco0iYpqKEz8mmiQd/8QwC0rRa4Uvg0BoU4/woStVzl90bE3+qKLjNeHmMdNLTKoOdzFGJ3h w7R9z/8LWE32IB5X05x4Vt9QdmaFiEPKWYEaUfopiNavoG/++nfYv8zJ+uP/Ya8itnzXDr32 T3P/W41hq4YiogA0KDTEbH7b9CE+MGhou0dv1q/soeZAuVRONfNi2uAtQCz0Bq4BNzFJmRtR VBd8yRk0MgADIuWiAuGS/gXEbei6p6taWOM3wA/RsF9rG/9oRZPmLy8BhkgfS+F1e5ZKFfUj LP74mu9GbcKZiLxNP8rC25PI51wkfaI+SvZugD8N4oSPccZmP6v9yB1bknYxHH2jEUpiskC1 WSzL66R4YIhIf0/llKeHr5FuZdyn3BW7T2IH/jTkU/4uYdykVbIE9/pxnPUMLBghE5FyS2Im +ti2zyikUgFAbKjOHiIq+b+7zkidBAGOHw/kOQOHsarKQt9E2ZnAPjUqY7NsaQ890iJvo8kJ k2AZ3I=
IronPort-HdrOrdr: A9a23:3hhqF6/GEZiqfSUFnAduk+Fjdb1zdoMgy1knxilNoENuE/Bwxv rBoB1E73DJYW4qKQ0dcLC7UpVoMkmsiqKdgLNhd4tKOTOHhILGFvAb0WKP+UyEJ8S6zJ8h6U 4CSdkyNDSTNykAsS+S2mDReLpQo6jkzEnrv5al854Hd3AMV0gU1XYBNu/tKDwReOApP+tcKH Ob3Kd6jgvlXU5SQtWwB3EDUeSGjcbMjojabRkPAANiwBWSjBuzgYSKXCSw71M7aXdi0L0i+W /Kn0jS/aO4qcy2zRfayiv684lWot380dFObfb8xPT9aw+cyzpAVr4RGIFqjwpF4t1HL2xa1e Ukli1Qf/ibLUmhOl1d7yGdnDUImwxelUMKgWXo8EcL5/aJCA7Tz6F69Ntkmtyz0TtngPhslK 1MxG6XrJxREFfJmzn8/cHBU1VwmlOzumdKq59bs5Vza/poVFZql/1owGpFVJMbWC7q4oEuF+ djSMna+fZNaFufK3TUpHNmztCgVmk6Wk7ueDlIhuWFlzxN2HxpxUoRw8IS2n8G6ZImUpFBo+ DJKL5hmr1CRtIfKah9GOACS82qDXGle2OFDEuCZVD8UK0XMXPErJD6pL0z+eGxYZQNiIA/nZ zQOWkowVLau3iefPFm8Kc7gCwlGl/NLQgF4vsulKREhg==
X-Talos-CUID: 9a23:p5Lmf20Tq1JJaO1ufyliBLxfOesLWSDexTTsAmC+UGVjcZSxUnzB0fYx
X-Talos-MUID: 9a23:rE4xUQiITF8aGqdGm3FChsMpa+NF05yuLmY2iao5/O+2MhBUMTG0k2Hi
X-IronPort-Anti-Spam-Filtered: true
Received: from alln-core-9.cisco.com ([173.36.13.129]) by rcdn-iport-7.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 14 Jun 2023 14:38:47 +0000
Received: from alln-opgw-5.cisco.com (alln-opgw-5.cisco.com [173.37.147.253]) by alln-core-9.cisco.com (8.15.2/8.15.2) with ESMTPS id 35EEcknQ024979 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK) for <spasm@ietf.org>; Wed, 14 Jun 2023 14:38:46 GMT
Authentication-Results: alln-opgw-5.cisco.com; dkim=pass (signature verified) header.i=@cisco.com; spf=Pass smtp.mailfrom=sfluhrer@cisco.com; dmarc=pass (p=quarantine dis=none) d=cisco.com
X-IronPort-AV: E=Sophos;i="6.00,242,1681171200"; d="scan'208,217";a="2995459"
Received: from mail-bn7nam10lp2105.outbound.protection.outlook.com (HELO NAM10-BN7-obe.outbound.protection.outlook.com) ([104.47.70.105]) by alln-opgw-5.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 14 Jun 2023 14:38:45 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=ZQosTGKeAcscp3ye8oNSBYoDnpob8lfX799FO7SAlHRScI+AKYesYiH/TFnybFF5sbwnSXpyQKLPMMt3YzzOYTGq9kcw7ql45gM9DnsO4Yp45Kt2NySnUenwQyOiPJOZ1VtCLROVAsOosOCPWMNeQATy8aJzi6Ot5qhgfFQPjXk4UO6UY1YL3EDRFmpgCkJ7aYr3NocB/DegbQdSBbKwIaRfRrlY3uVzVYLPg55WzLT0xNzauGwzwyOdeV2hXnA3NeY24XwV08ycuzcyTJSUVdIHjpSpC6PPjdNum6EwgcjnDYiYmshp3Sr/R7yLAbDjAWjU/5FRdY6zOChMecxoiA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=gwehEFlJ+luusuPEIycTlm3vFIED/rsTYfFui3yvjHw=; b=CtoQY2EDAC9ZjEHQDyDISv3RdyJPYkV5tQNBWAmRmxzIidnJ+anj3Ul7qSk8C7FqGKve89WZXXJCpa1RVxqHYMwe4IQTmhKjHixlvdlUh2bbFIBKLcwl+VYsZzTDWbQ5EP56oA6SZLGTYF1A7b5bKyhqFZn00sHwLcNnoOY7HUbTH/m+ietOcLqWvMtN3VmVX1mncTJrupZ09J2Od3Ry6htOQy1z69hl5/cO6DooXHb9hL8Sry4TcJRtK7dlrcFOKN4XGzuXryOJ/qF47zP+TWuEi6kKD6uiQzA7MEVok2ko7FPV+8313sR7I1f0bqqKOvuThSXQAkzi+0MTJrnqOw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=gwehEFlJ+luusuPEIycTlm3vFIED/rsTYfFui3yvjHw=; b=TcjrbebC1rVTpbSWn1UBDjtjYmYlZhL8TQPhy10O7fWpSUcYdTcjkc8tZ4l2MrgEXIPe1qW2vJc8xGUS6k6JHFOMdZyP1DiV8a1yqd8Ww5v72zfne3vilwIQz62GSYf2A60qWh52RMA9BwI1pS9J7mXfF/scKV6BppKFG7xLrfk=
Received: from CH0PR11MB5444.namprd11.prod.outlook.com (2603:10b6:610:d3::13) by CO1PR11MB5011.namprd11.prod.outlook.com (2603:10b6:303:6d::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6477.37; Wed, 14 Jun 2023 14:38:43 +0000
Received: from CH0PR11MB5444.namprd11.prod.outlook.com ([fe80::a1a0:6a00:9afe:bebe]) by CH0PR11MB5444.namprd11.prod.outlook.com ([fe80::a1a0:6a00:9afe:bebe%4]) with mapi id 15.20.6477.028; Wed, 14 Jun 2023 14:38:43 +0000
From: "Scott Fluhrer (sfluhrer)" <sfluhrer@cisco.com>
To: Mike Ounsworth <Mike.Ounsworth=40entrust.com@dmarc.ietf.org>, Tim Hollebeek <tim.hollebeek=40digicert.com@dmarc.ietf.org>, Russ Housley <housley@vigilsec.com>, LAMPS <spasm@ietf.org>
Thread-Topic: [lamps] Call for adoption for the composite-related Internet-Drafts
Thread-Index: AQHZky74wx6Q6jYgyUaWyz2HKEz3ha+JPB2AgAAucoCAAQrHwA==
Date: Wed, 14 Jun 2023 14:38:43 +0000
Message-ID: <CH0PR11MB54447A83D97EACB084A68F3DC15AA@CH0PR11MB5444.namprd11.prod.outlook.com>
References: <C5B6AE84-DF32-4A80-92CF-DD51FB622C20@vigilsec.com> <SN7PR14MB6492662BEE24AEF700EF6D068355A@SN7PR14MB6492.namprd14.prod.outlook.com> <CH0PR11MB573940E1B5ED20E3182578DA9F55A@CH0PR11MB5739.namprd11.prod.outlook.com>
In-Reply-To: <CH0PR11MB573940E1B5ED20E3182578DA9F55A@CH0PR11MB5739.namprd11.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: CH0PR11MB5444:EE_|CO1PR11MB5011:EE_
x-ms-office365-filtering-correlation-id: 1fe81c06-d7f9-4c86-ff38-08db6ce50d67
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CH0PR11MB5444.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230028)(346002)(396003)(376002)(136003)(366004)(39860400002)(451199021)(83380400001)(66574015)(55016003)(66899021)(66476007)(76116006)(66946007)(110136005)(316002)(5660300002)(66446008)(52536014)(53546011)(26005)(9686003)(30864003)(2906002)(6506007)(41300700001)(8676002)(8936002)(122000001)(86362001)(38100700002)(64756008)(33656002)(66556008)(38070700005)(478600001)(71200400001)(186003)(7696005); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: q76u7+GQi5GV1/JyTkXGcUmWGFdE3tW/of32ayRGmzRAR8qy7cQo/arBcznz4CMjcblEnjxvO4ZI1aDi2bIKP769uKOgSRZRVsDjclVNNkM7dbm0vetFj5R4Gyaw6imV2phI9x/F7y9YHML5QdGZPrzhQaNlTOS2WDhEKMfekp8o16SBkiLeNcUroDambzRZe4bzh6jOydHkC62wS1yeZGTZmwXd+C/O8r9qgoQGSbPLWtXKwgM8KyFq5B5VWy7q9jSkvCmGzUyZu1aimWHAzh3Css1SPWNto9e8SWB4U/XRPdxg1mfg+RAYYcaMBJpyneVp/nNeOMvLj82oZ8CzN5Me7Wn9b20RKoeBjicagBDuXuWn+mQzTLECWLr4I7m8CAXeQz+gUOQKwc+4Vt2NB2pu5lWXM8kUjW+nh4vVWXgWfWHHOd5Wer7OSurbz/iV5fHRUv1trHy8zGKH/QqNex1xtYKpJWLRULY9YvFA/6t0zbcO/Gkhk8RAUFAt8COlPxnWhRqHgGmbJGypF+gqWvPSiM6601EpGQCJ22t5M7iuEIS2Mo5kftXbOyC1TSYb1qR9InQ0Nwu+ycHu3wHk42DKPdgQ5Jat+3PI5xgy7jhGFhePCLHOCTSSY6AXmSLViJrN+cCtypaPVVPGMtgAs/cnnInry4alfJCPD7Xg7I0BxUKGeOupCuXqMlc/5ZWjU9WMqsyeM81D0UseyRe2FgZvDnnOJfmMu8eQaRznqfpOpnt8yO0QjEKGF3IpUWZtyKLoSBvMyAFgE9XhgUeZGdClRg3wNOrkzXtsdwf9rySgj3Ovpg4pxbRkbzufTLmeSj+S1DAmZFYo5Xgtd7pUtvv8I6CSYrmIUvCq6EGm+9zajSyu+yBSxXvHCCSMKqZZtCbi9VUKjwF9D3sP72UHC7Ah1eywinmgzFdyhSZG+Rgt5rdOYmc1axL59COYXReJHja1VQJWCL2Rs1/r/skpJPNPR3FIcGR3z7k56xpDRvFiCzt0ofspPg9vDXcDIAf8cZ3iH6aIZKYyI7dgrabmzXfCVpNqxOquPCXkos3ipqTAXA8E3JNO/93ExWTRclTogXDl/1ZHnIjZdbGdigXdhG05Sbkm4AvV6mGwOdDUANsQbSrkTAUjkv53Hhhd1m4BrfMmizSl6o4VByuFKHY2MypDjt5VquO41CT0be4u5kHL0VjwEgbsXd3tGQh3sF+ewDZAu7PDzaEswxguJaZLsA0SbGvleihatL5DWJe9IsuzldCr9Io5cd8t/EYmuMGIgy+BahYetHpC84td3yQNO5Ltli1VHFSDEzNWi+kohP+MZJxz+p6rR8BiYacPRUJvdZBohXu2lnDel0OJ9zE34bF022EnI8MD3dA0QHKkBZ8HEfHP0Yd7Ng+wbpkUoDh3ci82e7HTXUW2O0T9kImEU6AduJi8coroghWvy4H/kW6EfHTSIUTExy09p5rhME4wo3sp0shaPVn3rqUOeU0IUanL78CweZh25XpIP2WXN5y5kuTaj4D4Z7Wgc+MPCya1MRMQgwVXZhpfRN7LcGVml6WFifOs/UWHJ4dDaemUWJA=
Content-Type: multipart/alternative; boundary="_000_CH0PR11MB54447A83D97EACB084A68F3DC15AACH0PR11MB5444namp_"
MIME-Version: 1.0
X-OriginatorOrg: cisco.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: CH0PR11MB5444.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 1fe81c06-d7f9-4c86-ff38-08db6ce50d67
X-MS-Exchange-CrossTenant-originalarrivaltime: 14 Jun 2023 14:38:43.0698 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: gvrSx3d+8MWQ9mEY3IXK3uwSTl+aVrTFavBtREiVWL5b/iFBEBdtQNS00UrwQRFYJddQhYU8PaHtZ9HCA1xP1A==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CO1PR11MB5011
X-Outbound-SMTP-Client: 173.37.147.253, alln-opgw-5.cisco.com
X-Outbound-Node: alln-core-9.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/qSPptKIS-C6t7ZWJFOf4JBHQc44>
Subject: Re: [lamps] Call for adoption for the composite-related Internet-Drafts
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 14 Jun 2023 14:38:54 -0000

I also support this draft

From: Spasm <spasm-bounces@ietf.org> On Behalf Of Mike Ounsworth
Sent: Tuesday, June 13, 2023 6:43 PM
To: Tim Hollebeek <tim.hollebeek=40digicert.com@dmarc.ietf.org>; Russ Housley <housley@vigilsec.com>; LAMPS <spasm@ietf.org>
Subject: Re: [lamps] Call for adoption for the composite-related Internet-Drafts

Thank you Tim. I really really appreciate this response, both for the technical guidance on what these drafts should be, and the "chair hat" leadership that it provides.

We should find some time offline to discuss how you imagine these drafts could be split up. For example, what would a minimum-viable and self-contained composite-kems draft look like? I assume there is some minimal set of things we would need to lift over from the composite-keys drafts.

I totally see your point that these drafts are trying to boil the ocean. That string of MAYs in composite-sigs 3.1 is well-called-out. That paragraph is the way it is because over the years people have said:

  *   We want composite keys to be bound all the way down to the keystore.
  *   We want the EC key to come from a FIPS mode hardware module and the PQ to come from *somewhere else*.
  *   We don't want to modify *insert protocol here* to carry two signatures, so could we have two unrelated certificates create a single CompositeSignature - I've even heard it suggested that for cases that already have defined semantics for multiple CMS SignerInfos, you could have a single composite SignerInfo with two Certificates - this avoids the failure mode where the client accepts the RSA signature and doesn't look further to realize that there is also a PQ signature that it would actually have been capable of processing.
Each of those seems it probably has motivating use-cases, so as you say, that leads to a document that tried to do everything and that's completely devoid of meaningful usage guidance because every weird permutation shows up in some use-case somewhere.




> Composite doesn't really offer any other transition benefits I can see, and honestly, was more attractive several years ago before we had as much confidence in PQC algorithms as we have now.

I'd like to offer this benefit; the FIPS certification queue is years long (and has gotten longer since FIPS 140-3). SP 800-208 (XMSS, LMS) was published in 2020 and we still can't can't even start a FIPS certification because there are no CAVP test vectors yet. If we get final NIST PQC specs in 2024, then the first FIPS certification for a PQC HSM will be issued in ... what? ... 2027?

That's where composites come in: as per the NIST PQC FAQ and SP 800-56Cr2, if you have a FIPS certified ECDSA P-256, then you also have a FIPS certified Dilithium3-ECDSA-P256. If you have a FIPS certified ECDH P-256, then you also have a FIPS certified Kyber512-ECDH-P256. Also, while we haven't made much noise about this, if you have a FIPS certified ECDSA, then you also have FIPS-certified GOST-ECDSA and SM2-ECSDA. This is as much about compliance and being able to claim "FIPS mode" for things that are not yet or not ever FIPS approved algorithms.

I'm going to posit that there is literally no way to meet CNSA's aggressive timelines without either CNSA relaxing requirements for FIPS certifications, or applying hybrids.

---
Mike Ounsworth

From: Spasm <spasm-bounces@ietf.org<mailto:spasm-bounces@ietf.org>> On Behalf Of Tim Hollebeek
Sent: Tuesday, June 13, 2023 2:57 PM
To: Russ Housley <housley@vigilsec.com<mailto:housley@vigilsec.com>>; LAMPS <spasm@ietf.org<mailto:spasm@ietf.org>>
Subject: [EXTERNAL] Re: [lamps] Call for adoption for the composite-related Internet-Drafts

WARNING: This email originated outside of Entrust.
DO NOT CLICK links or attachments unless you trust the sender and know the content is safe.
________________________________
I have some rather complicated feelings about these drafts, which is going to be a bit of a challenge to explain.  But I'm going to try.  I think at the end of the day, where I come down is that there really is an important problem to be solved here, but I'm not sure if these drafts have reached the necessary clarity in scope and maturity to be adopted.  I think there's a couple good concrete drafts struggling to get out of these drafts, but they're not there yet.

And to be clear, the problem that I think is important is that falling back to RSA ciphertext instead of plaintext is attractive in some use cases, although it will be increasingly less so with time, as RSA's security value eventually approaches zero.  But we have a significant amount of time before that happens.  Composite doesn't really offer any other transition benefits I can see, and honestly, was more attractive several years ago before we had as much confidence in PQC algorithms as we have now.  But still, I think the idea is attractive, and people will do it, so I think it's important to have guidance about how to do it securely.  And there are a lot of good technical details about that in these drafts.  At the very least, these standards allow people to agree on the various design decisions that need to be made, which enables interoperability.

I actually personally think that, in general, people often have too high a bar for adoption.  But I think that one of the most critical elements for an adoption call is that there is WG consensus on the problem to be solved, and the scope, and several parts of these drafts read like "well, you can maybe do this, or maybe that, but you need to worry about this other thing over there ..."  There are far more MAYs and SHOULDs in these drafts than concrete, explicit specifications about exactly how the technology works and MUST be used.  And this is critical because the drafts themselves actually do a pretty good job calling out some of the serious challenges that need to be overcome to get this technology to work in the real world.  For example, the need to look inside a composite key in order to determine whether the underlying RSA key is reused elsewhere or compromised.  That deserves some explicit consideration and requirements, not just a suggestion that something SHOULD be done about it by implementors, without any concrete guidance.  Another example is the long list of MAYs in section 3.1 of the pq-composite-sigs draft.

As to whether all of this causes PKIX-induced flashbacks or whether it properly complies with the spirit of the "L" in LAMPS ... charters have words and text, not spirits, and I think the chairs and area directors have actually done a pretty good job following the working group consensus as we navigate some pretty challenging issues during preparations for the upcoming post-quantum transition.  As to whether certain individuals are or are not happy with this, I would remind people that here at IETF, we reject kings.  As chairs, we are called to evaluate and follow working group consensus, not the desires of certain individuals who may have historically had certain views when they were in charge.  Having had several long conversations with many of the people involved, I think I can safely say that long conversations about what may or may not have gone horribly wrong with the PKIX working group is not horribly relevant or helpful in solving the problems we are trying to solve today.

Key encapsulation is actually far simpler and less dangerous than signatures, and explicit, standardized design choices about how to do it are useful.  The composite-kem draft is actually significantly more mature and well-scoped than the other two.  It has a dependency on pq-composite-keys, though, which still has a lot of extraneous and unnecessary stuff that I personally would like to see removed.  Getting an good, agreed upon scope for those two and pushing them forward might be a good next step.

Signatures are very complicated, and I actually thank the authors for some very insightful discussions that have helped me understand exactly how tough of a problem they are, and the many challenges of figuring out how they can work with composite keys.  It's possible composite should just be for KEMs, as the draft shows that attempting to do composite signing gets complicated fast.  But as I noted above, there are benefits to composite signatures as well.  I feel like we're not quite to the end of the "design funnel" yet, and there still need to be some serious conversations about exactly what we are trying to achieve, and exactly how it is supposed to work.  Treating signing of certificates, and signing of documents, and signing of code as the same thing feels like a mistake to me.  I think when you get down to how actual signatures work, it actually matters whether you are trying to set up a hierarchy of composite certificates or trying to do a composite legal signature on a document, as the security considerations are very different.  I think I have convinced myself that trying to handle that under a single document that just says "this is how PQ composite signatures work, generically" ... is probably not going to work.  But I could be wrong about that last point.

So I unfortunately think I'm a "no" at this point, though I really do hope that a lot of the great work and details in these documents eventually finds a home, either in later versions that do get adopted, or elsewhere.  There's some really good stuff in here.

-Tim


From: Spasm <spasm-bounces@ietf.org<mailto:spasm-bounces@ietf.org>> On Behalf Of Russ Housley
Sent: Tuesday, May 30, 2023 3:43 PM
To: LAMPS <spasm@ietf.org<mailto:spasm@ietf.org>>
Subject: [lamps] Call for adoption for the composite-related Internet-Drafts

Should the LAMPS WG adopt these three Internet-Drafts ...

1) "Composite Signatures For Use In Internet PKI" in draft-ounsworth-pq-composite-sigs-09?

2) "Composite Public and Private Keys For Use In Internet PKI" in draft-ounsworth-pq-composite-keys-05?

3) "Composite KEM For Use In Internet PKI" in draft-ounsworth-pq-composite-kem-02?

This document was discussed in the LAMPS session at several IETF meetings.  The authors sent a note saying that they incorporated the feedback that they received at IETF 116.

Please reply to this message by Wednesday, 14 June 2023 to voice your agreement or disagreement with adoption by the LAMPS WG.

On behalf of the LAMPS WG Chairs,
Russ

Any email and files/attachments transmitted with it are confidential and are intended solely for the use of the individual or entity to whom they are addressed. If this message has been sent to you in error, you must not copy, distribute or disclose of the information it contains. Please notify Entrust immediately and delete the message from your system.