[tcpm] Re: Feedback on draft-ietf-tcpm-tcp-ao-algs-00

"Bonica, Ron" <ronald.bonica@hpe.com> Tue, 28 April 2026 15:26 UTC

Return-Path: <ronald.bonica@hpe.com>
X-Original-To: tcpm@mail2.ietf.org
Delivered-To: tcpm@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id A2B6BE4D960E; Tue, 28 Apr 2026 08:26:02 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=ietf.org; s=ietf1; t=1777389962; bh=4B6p4O8y0figbiDJN56F5tEPY/Q9Hsu1O43oyqji1aQ=; h=From:To:Subject:Date:References:In-Reply-To; b=pql5pLMmm/1dU8Ub0oWLo32gX9k/TfFf2ufG/Erftr/C+qtvoCtXltCYAgXGzYHPJ gJVyzkhotYpdTrRy90uDaIHVAvUQVra9d+Uq8AE1GD6kiWfEjSWlON/wsepMe0H56R TNaoJd54/JC+skpSTK4c8HsAOPsZnqcNnh73cZn4=
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.794
X-Spam-Level:
X-Spam-Status: No, score=-2.794 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H5=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_VALIDITY_CERTIFIED_BLOCKED=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=hpe.com
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aQx_wLYuN3e0; Tue, 28 Apr 2026 08:26:00 -0700 (PDT)
Received: from mx0b-002e3701.pphosted.com (mx0b-002e3701.pphosted.com [148.163.143.35]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id 76928E4D8EA9; Tue, 28 Apr 2026 08:24:11 -0700 (PDT)
Received: from pps.filterd (m0150245.ppops.net [127.0.0.1]) by mx0b-002e3701.pphosted.com (8.18.1.11/8.18.1.11) with ESMTP id 63SC5eCO2322319; Tue, 28 Apr 2026 15:24:11 GMT
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=hpe.com; h= content-type:date:from:in-reply-to:message-id:mime-version :references:subject:to; s=pps0720; bh=ET3NU/OFW3GS7J5QtE6/l/3AZM 6D2EvED2cGaFKQ+RY=; b=e7Ch3lw5y0tANUs59cwfSK3WZOSjFjnsehtIIh0zRP FwE9eCF9mhNsWzcPWE1J5ryRpGw/BJeWeIfyZJLHY0QNTJ/cR/uBPJrviIN0MIKg uBuy78YH7+jh/XhISUMkZP69BZN7HL9/m+cbtW9d0vGaY+15UifJXhMiAif0eEvX u1LhKN5kYlfUMBNK/+CkX6b6hclAaWSXQfqBa68o/akE24YZZeACaQ1IEiZqfjug EFzXNJt6ncwqWxn2wDqb0OyuVhdU0WFxkc2g7dUqWG8BCTLfMKPf6cr5Houze7Y8 ugEJB4gjdGSWiBNk97pP/O/dxvfmfgE9hdAlj7RPl74A==
Received: from p1lg14881.it.hpe.com (p1lg14881.it.hpe.com [16.230.97.202]) by mx0b-002e3701.pphosted.com (PPS) with ESMTPS id 4dtvkmjgke-1 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NOT); Tue, 28 Apr 2026 15:24:10 +0000 (GMT)
Received: from p1wg14924.americas.hpqcorp.net (unknown [10.119.18.113]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by p1lg14881.it.hpe.com (Postfix) with ESMTPS id DFB4E81DB1C; Tue, 28 Apr 2026 15:24:03 +0000 (UTC)
Received: from p1wg14928.americas.hpqcorp.net (10.119.18.116) by p1wg14924.americas.hpqcorp.net (10.119.18.113) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.17; Tue, 28 Apr 2026 03:24:02 -1200
Received: from p1wg14919.americas.hpqcorp.net (16.230.19.122) by p1wg14928.americas.hpqcorp.net (10.119.18.116) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.17 via Frontend Transport; Tue, 28 Apr 2026 03:24:02 -1200
Received: from DM2PR0701CU001.outbound.protection.outlook.com (192.58.206.38) by edge.it.hpe.com (16.230.19.122) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.17; Tue, 28 Apr 2026 03:24:01 -1200
ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=eA13x4X19m1H7cNogohLt6ouCdQJInYiT8wuS6JhqegFc8n9lLPfputS9UQqxanZTRiJru0B0X+V+5M2rr+hjpmTWsmCmKjDgAcA6IFzVT34LbQPbDNBtPP6kgSgX76+nIEtqsHYdaPOIjTxizibd/YMWSM9zpRJRQYBYMtL4oeBV/YGd8ReGCB8qnhf4F3ZfDXIZPX/zjbdyShL4uj0FEUxadutHKghPZerCRO0sSXNSuu8H5afdAXDYqKLUMfHUTNHu8nch/z/jj5NCWZS5kA5YCfc9vAo9U8Lj8l7IKDHK/ZX3DWCC1555SFNFBtor8l8oMNADsHIJ3CkGLVF6g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=ET3NU/OFW3GS7J5QtE6/l/3AZM6D2EvED2cGaFKQ+RY=; b=bQ70GmxCpojdITJbUTLbBVSedMHR0hmMR/hZFpxtxjk6s44lvrgzB/sOWQ5k3CyAhK01g5KnY2YSu45CG0bDDVWNWQv4bJJ3c7NN3CZbpYuqr3MoMZ9lbyTH72OzLx4re6Vk2TVqxFTt3DdOn62mE2xVZG5S+0/lbATkI7u4tzag893nEvkA+1DtGF673uTTPI+sCP3ecMG6XOGHHyUB5D3F2pQPrXlczDheAv/q5kE5ma4IkxYsv+tve0dyvwtnlh4GqaGmnKBBzmcEu9nKiFdgFrt8Iond3YmmKbjQVa85zs4iwB2udWA/GcWowko9hY26g4sCwidcaI8uCdgwlA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=hpe.com; dmarc=pass action=none header.from=hpe.com; dkim=pass header.d=hpe.com; arc=none
Received: from DM4PR84MB2310.NAMPRD84.PROD.OUTLOOK.COM (2603:10b6:8:51::18) by DS0PR84MB3648.NAMPRD84.PROD.OUTLOOK.COM (2603:10b6:8:1b9::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9870.18; Tue, 28 Apr 2026 15:24:00 +0000
Received: from DM4PR84MB2310.NAMPRD84.PROD.OUTLOOK.COM ([fe80::f9b2:4189:25fa:bd66]) by DM4PR84MB2310.NAMPRD84.PROD.OUTLOOK.COM ([fe80::f9b2:4189:25fa:bd66%3]) with mapi id 15.20.9846.025; Tue, 28 Apr 2026 15:23:59 +0000
From: "Bonica, Ron" <ronald.bonica@hpe.com>
To: Eric Biggers <ebiggers=40google.com@dmarc.ietf.org>, "tcpm@ietf.org" <tcpm@ietf.org>
Thread-Topic: [tcpm] Feedback on draft-ietf-tcpm-tcp-ao-algs-00
Thread-Index: AQHc1t0flqYabqOUrkixIDYX2qeh87X0lhl8
Date: Tue, 28 Apr 2026 15:23:59 +0000
Message-ID: <DM4PR84MB231066C41AAFD689B58D21FFF4372@DM4PR84MB2310.NAMPRD84.PROD.OUTLOOK.COM>
References: <20260428065832.GB3813922@google.com>
In-Reply-To: <20260428065832.GB3813922@google.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels:
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: DM4PR84MB2310:EE_|DS0PR84MB3648:EE_
x-ms-office365-filtering-correlation-id: 26886478-61b1-467f-28ae-08dea53a2bf7
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;ARA:13230040|366016|1800799024|4022899009|376014|38070700021|8096899003|56012099003|22082099003|18002099003;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DM4PR84MB2310.NAMPRD84.PROD.OUTLOOK.COM;PTR:;CAT:NONE;SFS:(13230040)(366016)(1800799024)(4022899009)(376014)(38070700021)(8096899003)(56012099003)(22082099003)(18002099003);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: AoT2rDfrHy+RN2MLJsZgYUYcNyyJg8CZTeFobI+cjen66y7Ew8cCwEuSJMb9wqGbSSzIFYXPCXjDid4fYYM8GWXRTIAAaaow18+wSxcls4oC9inK8H8MnOyCp2Q5Bat7wi0SEsiCeIRJEfQy7CRZXrJvd0ATEmmaMo+BF7brGpuuuqmuH+YE1BC7jE41ojCXpaAJ1yLampt2wa0Z0XyBjZ08jrejmyrLcvWRDCqt9kr4UQD72DiHnmyvHI9ehCqK6qPXWXTLCREFR1F2QLzIJUvJYiycMAeeUalre+2dK8YyxHJCbg+jAYVaCHh36UuMDWQUvSpeLgHGwq0ivUGW5Dy+uzHqzS/SbQUNr/3RgVROPecjFw7WrIaN4xE4YD4WdLMajDSy3sZ3c03+338kOwEjESMfMQrMGyvTsg4ECdWsRcdRz2ScS4zYddfm2S61gG1m4a2mliQyKH0oCBrnoRKc/56CxsJH0xGGfsDO6SIWVjNLKpu1gQjWR6BySnon6lPTJhcfHkXudMfWcUh2UPFRpNxjCaEKAnkLXFGSnbjvUdzJU0Dv45c+xXB4qr65RbwiRWd6ipoHlpnrSi+LHiT5Bw4nUr4vOynPNJPUiFZfBU1QbAckNES+ak38C+NblUUk8A+VKmdciO2IK4VshrGAu7pt80C30ASDyzzjrBN2NRiDoHJRL8LiKu4LrF4S7Xo4ZW0YgzqodL7cEoRoAUl9sP8j9G0gcudMeMbdFDYMiFkubQBxAH+wRroiRVGsh2n39clSDr7xfdbcFK3jle6sWB4+WtlN8m7q0EDHrczZAxTuJWOB3y40aFKM73IopIjQGI6D5nJCkKEfNeI5lbaTOZL3Awi9IE1BSWFfAIqV5G5tSDbB/ckaPDpBBaK4mzfNCK1BiELIIZcP3kIboXLBbeJxJBNXGYLZg9GK+VWytbZf9rO3L+5h65EA9kh9iNnzdjQlpYIhFwsKYNCjXc8hNSwAGFZvzDHzS1ZksHgjVQOza8lZxT2WeKbgizroXvf5muZdjRw59JoMQ3trbbzrAxvrA2xULEg1lSpGL/smRf+aa6u88pc9EK2eFuBispI6GCj37hZqroge7GvHHmj8lEna5fMd3iEMvEWA/GUn/eEJ+cjcYN5RB0qWJdaBP7aVuJzc2bZiOMl2qKhNXSo/B7SxeYl1scRwaCvdQsEkrDH5ran0wrdEpKtOJN794N5z/7SoX3DUmpgJQ58USR431O1HLSSH8odfC1boLw8ZOVbyWo09C7o4XAw5KfQjORv0JzVghBIMXDr17lga9HeYKHzzVwZjYPEbLgkkdsjAQs9rQspWjVWIIfxn1shYxugyRAUfe6RLa8MHBlq8rNFF8Wyz+WxFxTXTBlhmHEClFYHwfKEPhpQiAG+YbsCGt6coewFIREEG83lG0z3MV+rLD40xuv5V/ygeJ1qr6Q+osghuLhnAaKHpJfyowpa1NXP9iBWbbrTCUvHA2F1SlU+PnqlmGrkAMKYbzPOhNFUGe0UC8vxqbxZPz1arQY1MCXoU3uFlfHCgijNi/Pzd3PDp60DcIT3uVObkZrQPecvfLzyIi8ngN4y7HX90gNt8D4MegMufpq/TbAT+psg+Fl0j1NE2EImagEqP5e7X5V5wpauoJPCwkrmJkFnrCM1SDKfwDS2cRg8jRooLD+UKYDMr1GwCLjYeOcdajn1Xv9gclJb3wI1AkiJToQNgfV8B
Content-Type: multipart/alternative; boundary="_000_DM4PR84MB231066C41AAFD689B58D21FFF4372DM4PR84MB2310NAMP_"
MIME-Version: 1.0
X-Exchange-RoutingPolicyChecked: TyJcnT5u0LO7KO94XiqFx32YEoeahr+VuJQmWIx7cQZCPizbg8HlXpnQzf+NhVnvbS3uz/T/LNHgmvey5exZbBXB1GWFrIGLnHMwj23nznIr4N3ERqGNuRfSbQB4nTwwf5HTuHQ06o8hdaXv82HSnaplGXcfuL1VtCDkBhJANHoDfZEdfFmxlGUHa4NqQhzKa0OeS4+F7pF0Wbv6F+E0cUVOuBo9GUNR+L6eyvx7MvbiGodMv9nbvRXha3iaTybmqINwBObWJxeC5mqYMoo8gU5oMeWc/ndYPw8OxtW5SaOiBiJV2EnPLqh6Rd/IL8EC8zPT68dU1WEMEA8i5Gc7ew==
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DM4PR84MB2310.NAMPRD84.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-Network-Message-Id: 26886478-61b1-467f-28ae-08dea53a2bf7
X-MS-Exchange-CrossTenant-originalarrivaltime: 28 Apr 2026 15:23:59.7421 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 105b2061-b669-4b31-92ac-24d304d195dc
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: wUR2w6x0d7dRAZaWo3f4r/epuigVg1OJVqLcn1bm051z8mV7WMi81F+gCrJFqe9FrKPVxrA6NHsd9feNARo1iA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DS0PR84MB3648
X-OriginatorOrg: hpe.com
X-Proofpoint-GUID: hadEcDcZxwNVQ2EeWBqWwHMxni_SZIB_
X-Proofpoint-Spam-Details-Enc: AW1haW4tMjYwNDI4MDE0NiBTYWx0ZWRfXwrDcOIOCDY2E HvJwnHvIcx/MOVBuEFpadIt7QMFyQFo7U3JhmTYgKAGAPr+514jL6f2ORxJiW5YRK2YIPEfe8K3 TnKanWbvaIwpD1thUnsR4LBLc+/VnGpx7eogL8yNEs8EeKw5Po7UZo1n6ioyCWp2b0mIvP/08TL iYYOBhvOAAwrGEnU5r+OPgGJezPcEVXx+1luD44Qm1BW82ULBkvEDEicXVpR9ghvltxEAPmzTUv XAhRq1PP1hYLNjMbgdiSk5leaQ5ifIzD/fQJ26LsblDPdWv/RWhKlJLIR/87GHku/vtgZTwV205 DjHW7SgmprVrEcq6rGMphlr3M6nV9G0teudb7pNbgvVKzSBVh1a+K9xA/V1E4P0aKYBcn2XyAhy w0e1Rtb48gBefhmU7ZweKWP86Wg+mLQtzgtsW9toBW9t5wn5WyFc0hckqGLzBrksi++Mk00+4HD 0gOX7NKWOvoihAMDaZw==
X-Proofpoint-ORIG-GUID: hadEcDcZxwNVQ2EeWBqWwHMxni_SZIB_
X-Authority-Analysis: v=2.4 cv=A61c+aWG c=1 sm=1 tr=0 ts=69f0d11a cx=c_pps a=FAnPgvRYq/vnBSvlTDCQOQ==:117 a=FAnPgvRYq/vnBSvlTDCQOQ==:17 a=z/mQ4Ysz8XfWz/Q5cLBRGdckG28=:19 a=lCpzRmAYbLLaTzLvsPZ7Mbvzbb8=:19 a=xqWC_Br6kY4A:10 a=A5OVakUREuEA:10 a=VkNPw1HP01LnGYTKEx00:22 a=gQcMVamqm3wCPoSYhaRC:22 a=6XKncaru_qjgLvANlS_8:22 a=48vgC7mUAAAA:8 a=b7VWthL0XxUMePueaO8A:9 a=CjuIK1q_8ugA:10 a=D89GmNXoPd9VcNf0:21 a=frz4AuCg-hUA:10 a=_W_S_7VecoQA:10
X-HPE-SCL: -1
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1143,Hydra:6.1.51,FMLib:17.12.100.49 definitions=2026-04-28_04,2026-04-28_01,2025-10-01_01
X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 lowpriorityscore=0 bulkscore=0 impostorscore=0 phishscore=0 suspectscore=0 clxscore=1011 adultscore=0 spamscore=0 classifier=typeunknown authscore=0 authtc= authcc= route=outbound adjust=0 reason=mlx scancount=1 engine=8.22.0-2604200000 definitions=main-2604280146
Message-ID-Hash: KBWOEFZ6JRMGW4LWIKMEVGNN423BHY6C
X-Message-ID-Hash: KBWOEFZ6JRMGW4LWIKMEVGNN423BHY6C
X-MailFrom: ronald.bonica@hpe.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tcpm.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [tcpm] Re: Feedback on draft-ietf-tcpm-tcp-ao-algs-00
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tcpm/FuWv2ap197iFjYQ9ZVC6w_qzOcE>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tcpm>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Owner: <mailto:tcpm-owner@ietf.org>
List-Post: <mailto:tcpm@ietf.org>
List-Subscribe: <mailto:tcpm-join@ietf.org>
List-Unsubscribe: <mailto:tcpm-leave@ietf.org>

Eric,

Thanks for the review. I suspect that we will trim the list of proposed algorithms. Version-00 of the draft was just a starting point.

You say:

"I suggest simplifying the proposal to just HMAC-SHA256 for now.  That's the only one that seems like an obvious choice.  Indeed, SHA-256 is the usual replacement for the outdated SHA-1."

Do you mean HMAC-SHA256-128? Or do you really mean HMAC-SHA256?

I propose HMAC-SHA256 in draft-bonica-tcpm-tcp-ao-long-algs<https://datatracker.ietf.org/doc/draft-bonica-tcpm-tcp-ao-long-algs/>. But if we go there, we need to solve the problem identified in TCP Extended Options<https://datatracker.ietf.org/doc/draft-bonica-tcpm-extended-options/>.

                                                                                                  Ron



________________________________
From: Eric Biggers <ebiggers=40google.com@dmarc.ietf.org>
Sent: Tuesday, April 28, 2026 2:58 AM
To: tcpm@ietf.org <tcpm@ietf.org>
Subject: [tcpm] Feedback on draft-ietf-tcpm-tcp-ao-algs-00

I don't support draft-ietf-tcpm-tcp-ao-algs-00 in its current form.
While adding a new algorithm to TCP-AO would be appropriate, the draft
actually proposes adding six new algorithms.  This will create
fragmentation and difficulty for implementers.

Specific comments on the proposed algorithms:

HMAC-SHA3-256, HMAC-SHA3-384, and HMAC-SHA3-512 are unnecessary.  SHA-3
doesn't require the HMAC construction.  If a SHA-3 based MAC is really
desired, a better choice would be KMAC256.  That would be one algorithm,
not three.  However, this still might not be particularly useful: SHA-3
is very slow on most CPUs, and SHA-2 is still considered secure.

Regarding the SHA-2 offerings: HMAC-SHA256-128, HMAC-SHA384-128, and
HMAC-SHA512-128 are mostly redundant with each other.  They're all part
of the SHA-2 family, and the MAC is being truncated to 128 bits anyway.

SHA-384 and SHA-512 do have higher internal cryptographic strength,
which could provide a small motivation for them.  However, the value of
that seems fairly marginal here, given the MAC truncation.  And either
way, we certainly don't need *both* SHA-384 and SHA-512.

I suggest simplifying the proposal to just HMAC-SHA256 for now.  That's
the only one that seems like an obvious choice.  Indeed, SHA-256 is the
usual replacement for the outdated SHA-1.

It may be reasonable to leave the door open to add HMAC-SHA512 and/or
KMAC256, if they could be strongly motivated.  But please do keep in
mind the costs of fragmentation, interoperability failures, and of
implementers having to implement all these algorithms.

I also suggest bringing this topic to the cfrg
(https://urldefense.com/v3/__https://datatracker.ietf.org/rg/cfrg/about/__;!!NpxR!mLXvbt9EFDrV13n2IrY0E7dVrzxZwExIfG4JTjFx0pWTTrVKpVEgFVodlRpJj7ST0f9PLqv7oEQvizyS3VCawdIRAPqqjw2B$ ) for advice.  There are
many people there who could help choose an appropriate algorithm(s).
They could also help ensure it is used in an appropriate way, including
following current best practices for key derivation which the current
draft appears to overlook.

- Eric

_______________________________________________
tcpm mailing list -- tcpm@ietf.org
To unsubscribe send an email to tcpm-leave@ietf.org