Looks good to me.  Thanks.

Russ


> On Jul 8, 2025, at 2:14 PM, Megan Ferguson <mfergu...@staff.rfc-editor.org> 
> wrote:
> 
> Hi Panos (and *AD),
> 
> Thanks for clarifying!  We have updated the previously posted files to 
> include this change as well (please be sure to refresh).
> 
> *AD - Please review and approve the changes highlighted in the “last version 
> to this” diffs below.
> 
> The files have been posted here (please refresh):
>  https://www.rfc-editor.org/authors/rfc9814.txt
>  https://www.rfc-editor.org/authors/rfc9814.pdf
>  https://www.rfc-editor.org/authors/rfc9814.html
>  https://www.rfc-editor.org/authors/rfc9814.xml
> 
> The relevant diff files are here (please refresh):
>  https://www.rfc-editor.org/authors/rfc9814-diff.html
>  https://www.rfc-editor.org/authors/rfc9814-rfcdiff.html (side by side)
> 
>  https://www.rfc-editor.org/authors/rfc9814-auth48diff.html (all AUTH48 
> changes to date)
>  https://www.rfc-editor.org/authors/rfc9814-auth48rfcdiff.html (side by side)
> 
>  https://www.rfc-editor.org/authors/rfc9814-lastdiff.html (last version to 
> this)
>  https://www.rfc-editor.org/authors/rfc9814-lastrfcdiff.html (side by side)
> 
> Please contact us with any further updates/questions/comments you may have.  
> 
> We will await approvals from each of the parties listed on the AUTH48 status 
> page prior to moving forward to publication.  
> 
> The AUTH48 status page for this document is available here:
> 
> https://www.rfc-editor.org/auth48/rfc9814
> 
> Thank you.
> 
> RFC Editor/mf
> 
> 
> 
>> On Jul 7, 2025, at 8:35 PM, Kampanakis, Panos <kpa...@amazon.com> wrote:
>> 
>> Hi Megan, 
>> 
>> Almost everything looked fine, but I revamped the one paragraph below to 
>> make sure we are not missing any of the changes.  
>> 
>>     The digestAlgorithm MUST identify a one-way hash function.  When
>>      signed attributes are absent, the digestAlgorithm identifier 
>>      SHOULD match the hash function used in the SLH-DSA tree (as shown
>>      in the list below). The digestAlgorithm does not have any significance 
>> when 
>>      signed attributes are absent as it is not used to pre-hash the message 
>> with SLH-DSA.  
>>      When there is a concern for failures with legacy implementations that 
>>     do not support all hash functions, signers MAY choose to always use the 
>>      SHA-256 algorithm identifier as the digestAlgorithm when signed 
>>      attributes are absent.
>>    When signed attributes are present, to ensure collision resistance, the
>>      identified hash function MUST produce a hash value that is at
>>      least twice the size of the hash function used in the SLH-DSA
>>      tree.  The hash functions defined in [FIPS180] and [FIPS202] MUST
>>      be supported for use with the variants of 
>>      SLH-DSA as shown below:
>> 
>> 
>> 
>> -----Original Message-----
>> From: Megan Ferguson <mfergu...@staff.rfc-editor.org> 
>> Sent: Monday, July 7, 2025 2:05 PM
>> To: Kampanakis, Panos <kpa...@amazon.com>; Deb Cooley 
>> <debcool...@gmail.com>; lamps-...@ietf.org
>> Cc: Russ Housley <hous...@vigilsec.com>; RFC Editor 
>> <rfc-edi...@rfc-editor.org>; Scott Fluhrer <sfluh...@cisco.com>; 
>> b...@westerbaan.name; lamps-cha...@ietf.org; tim.holleb...@digicert.com; 
>> auth48archive@rfc-editor.org
>> Subject: RE: [EXTERNAL] [AD] AUTH48: RFC-to-be 9814 
>> <draft-ietf-lamps-cms-sphincs-plus-19> for your review
>> 
>> CAUTION: This email originated from outside of the organization. Do not 
>> click links or open attachments unless you can confirm the sender and know 
>> the content is safe.
>> 
>> 
>> 
>> Hi Panos and *ADs,
>> 
>> (*AD - please review the updates in the “last version to this” diff below as 
>> changes to BCP 14 language and code have been requested.)
>> 
>> Thanks for sending along these changes.
>> 
>> We want to clarify the first change you listed as we don’t see the same text 
>> in the document (that is, when searching “legacy” or “pre-hash content”, 
>> nothing comes up).  Can you please resend that change using a section number 
>> and Old/New text so we can be sure to get the document updated as requested?
>> 
>> We believe we have incorporated the other changes as desired, but as there 
>> is some overlap in the changed text, please review carefully and let us know 
>> if further updates are necessary.
>> 
>> NOTE: We believe we are waiting on an author to review and confirm the use 
>> of <sup> but that all other RPC-generated queries have been resolved.
>> 
>>  The files have been posted here (please refresh):
>>   https://www.rfc-editor.org/authors/rfc9814.txt
>>   https://www.rfc-editor.org/authors/rfc9814.pdf
>>   https://www.rfc-editor.org/authors/rfc9814.html
>>   https://www.rfc-editor.org/authors/rfc9814.xml
>> 
>>  The relevant diff files are here (please refresh):
>>   https://www.rfc-editor.org/authors/rfc9814-diff.html
>>   https://www.rfc-editor.org/authors/rfc9814-rfcdiff.html (side by side)
>> 
>>   https://www.rfc-editor.org/authors/rfc9814-auth48diff.html (all AUTH48 
>> changes to date)
>>   https://www.rfc-editor.org/authors/rfc9814-auth48rfcdiff.html (side by 
>> side)
>> 
>>   https://www.rfc-editor.org/authors/rfc9814-lastdiff.html (last version to 
>> this)
>>   https://www.rfc-editor.org/authors/rfc9814-lastrfcdiff.html (side by side)
>> 
>> Please contact us with any further updates/questions/comments you may have.
>> 
>> We will await approvals from each of the parties listed on the AUTH48 status 
>> page prior to moving forward to publication.
>> 
>> The AUTH48 status page for this document is available here:
>> 
>> https://www.rfc-editor.org/auth48/rfc9814
>> 
>> Thank you.
>> 
>> RFC Editor/mf
>> 
>>> On Jul 3, 2025, at 8:28 PM, Kampanakis, Panos <kpa...@amazon.com> wrote:
>>> 
>>> Hi Megan,
>>> 
>>> This looks fine to me as well.
>>> 
>>> We had a few more small changes though, which we had left for AUTH48
>>> 
>>> 
>>> […] When signed attributes are absent, the digestAlgorithm identifier 
>>> does not have any significance as it is not used to pre-hash the CMS 
>>> content with SLH-DSA. So, when signed attributes are absent, verifiers 
>>> MUST NOT use a  digest algorithm to pre-hash the content before 
>>> verifying the signature. Signers SHOULD MUST match the hash function 
>>> used in the SLH-DSA tree (as shown in the list below) use the SHA-256 
>>> algorithm identifier when signed attributes are absent to prevent 
>>> failures with other legacy implementations that do not support hashes 
>>> like SHA-512 or SHAKE256. […]
>>> 
>>>> The digestAlgorithm MUST identify a one-way hash function. When signed 
>>>> attributes are absent, the digestAlgorithm identifier MUST match the hash 
>>>> function used in the SLH-DSA tree (as shown in the list below) and does 
>>>> not have any significance as it is not used to pre-hash the message with 
>>>> SLH-DSA.
>>> 
>>> Plus, make the MUST into SHOULDs in
>>> 
>>>> When signed attributes are absent, the SLH-DSA (pure mode) signature is 
>>>> computed over the content. When signed attributes are present, a hash 
>>>> SHOULD be computed over the content using the same hash function that is 
>>>> used in the SLH-DSA tree.
>>> 
>>> and
>>> 
>>>> When signed attributes are absent, the digestAlgorithm identifier 
>>>> SHOULD match the hash function used in the SLH-DSA tree (as shown in 
>>>> the list below)
>>> 
>>> And  two  nits
>>> 
>>>> […] When signed attributes are present, a hash MUST be computed over 
>>>> the content DER encoded signed attributes using the same hash 
>>>> function […]
>>> 
>>>> ELSE signed attributes message-digest attribute = Hash(content);
>>> 
>>> 
>>> 
>>> -----Original Message-----
>>> From: Megan Ferguson <mfergu...@staff.rfc-editor.org>
>>> Sent: Sunday, June 29, 2025 1:00 PM
>>> To: Russ Housley <hous...@vigilsec.com>
>>> Cc: RFC Editor <rfc-edi...@rfc-editor.org>; Scott Fluhrer 
>>> <sfluh...@cisco.com>; Kampanakis, Panos <kpa...@amazon.com>; 
>>> b...@westerbaan.name; lamps-...@ietf.org; lamps-cha...@ietf.org; 
>>> tim.holleb...@digicert.com; Deb Cooley <debcool...@gmail.com>; 
>>> auth48archive@rfc-editor.org
>>> Subject: RE: [EXTERNAL] AUTH48: RFC-to-be 9814 
>>> <draft-ietf-lamps-cms-sphincs-plus-19> for your review
>>> 
>>> CAUTION: This email originated from outside of the organization. Do not 
>>> click links or open attachments unless you can confirm the sender and know 
>>> the content is safe.
>>> 
>>> 
>>> 
>>> Hi Russ,
>>> 
>>> Thank you for your reply and guidance.  We have updated accordingly (note 
>>> that these files also include the edit revision you previously mentioned).  
>>> We believe all of our queries have been resolved except confirmation of our 
>>> update to use <sup> in the xml.
>>> 
>>> Please review the files carefully as we do not make changes after 
>>> publication.
>>> 
>>> The files have been posted here (please refresh):
>>>   https://www.rfc-editor.org/authors/rfc9814.txt
>>>   https://www.rfc-editor.org/authors/rfc9814.pdf
>>>   https://www.rfc-editor.org/authors/rfc9814.html
>>>   https://www.rfc-editor.org/authors/rfc9814.xml
>>> 
>>> The relevant diff files have been posted here (please refresh):
>>>   https://www.rfc-editor.org/authors/rfc9814-diff.html (comprehensive diff)
>>>   https://www.rfc-editor.org/authors/rfc9814-auth48diff.html (AUTH48 
>>> changes only)
>>> 
>>> Please contact us with any further updates/questions/comments you may have.
>>> 
>>> We will await approvals from each of the parties listed on the AUTH48 
>>> status page prior to moving forward to publication.
>>> 
>>> The AUTH48 status page for this document is available here:
>>> 
>>> https://www.rfc-editor.org/auth48/rfc9814
>>> 
>>> Thank you.
>>> 
>>> RFC Editor/mf
>>> 
>>>> On Jun 28, 2025, at 1:24 PM, Russ Housley <hous...@vigilsec.com> wrote:
>>>> 
>>>> Dear RFC Editor:
>>>> 
>>>>> 1) <!-- [rfced] Please insert any keywords (beyond those that appear in
>>>>>   the title) for use on https://www.rfc-editor.org/search. -->
>>>> 
>>>> Please add:
>>>> stateless hash-based signature algorithm
>>>> 
>>>> 
>>>>> 2) <!--[rfced] We see the following similar sentences repeated throughout
>>>>>   the document.  Please review and let us know if these should be
>>>>>   made uniform.
>>>>> 
>>>>> Original:
>>>>> 
>>>>> SLH-DSA is a stateless hash-based signature scheme. (Abstract)
>>>>> 
>>>>> SLH-DSA is a stateless hash-based signature algorithm. (Intro)
>>>>> 
>>>>> SLH-DSA is a hash-based signature scheme. (Section 2)
>>>>> 
>>>>> SLH-DSA is a stateless hash-based signature algorithm.  (Section 2)
>>>>> -->
>>>> 
>>>> My preference is:
>>>> SLH-DSA is a stateless hash-based signature algorithm
>>>> 
>>>> 
>>>>> 3) <!--[rfced] Might we rephrase to avoid the repeated "using" in this
>>>>>   sentence?
>>>>> 
>>>>> Original:
>>>>> 
>>>>> CMS values are generated using ASN.1 [X680], using the Basic 
>>>>> Encoding  Rules (BER) and the Distinguished Encoding Rules (DER) [X690].
>>>>> 
>>>>> Perhaps:
>>>>> 
>>>>> CMS values are generated with ASN.1 [X680] using the Basic 
>>>>> Encoding Rules (BER) and the Distinguished Encoding Rules (DER) [X690].
>>>>> -->
>>>> 
>>>> Yes, this is fine.
>>>> 
>>>> 
>>>>> 4) <!--[rfced] As WOTS+ includes "one-time signature" in its expansion,
>>>>>   would this update work?
>>>>> 
>>>>> Original:
>>>>> 
>>>>> The FORS tree roots are signed by a WOTS+ one-time signature 
>>>>> private key.
>>>>> 
>>>>> Perhaps:
>>>>> The FORS tree roots are signed by a WOTS+ private key.
>>>>> -->
>>>> 
>>>> Yes, this is fine.
>>>> 
>>>> 
>>>>> 5) <!--[rfced] Please review our updates to this sentence to reduce
>>>>>   redundancy to confirm we have maintained your intended meaning.
>>>>> 
>>>>> Original:
>>>>> A SLH-DSA signature is verified by verifying the FORS signature, 
>>>>> the
>>>>> WOTS+ signatures and the path to the root of each subtree.
>>>>> 
>>>>> Current:
>>>>> An SLH-DSA signature is verified using the FORS signature, the 
>>>>> WOTS+ signatures, and the path to the root of each subtree.
>>>>> -->
>>>> 
>>>> Yes, this is fine.
>>>> 
>>>> 
>>>>> 6) <!--[rfced] There may be text missing in this sentence.  If our
>>>>>   suggested text does not convey your intended meaning, please let
>>>>>   us know how we may rephrase.
>>>>> 
>>>>> Original:
>>>>> Although its security decreases, FORS which is used at the bottom 
>>>>> of the SLH-DSA hypertree does not collapse if the same private key 
>>>>> used to sign two or more different messages like in stateful 
>>>>> hash-based signature schemes.
>>>>> 
>>>>> Perhaps:
>>>>> Although its security decreases, FORS, which is used at the bottom 
>>>>> of the SLH-DSA hypertree, does not collapse if the same private key 
>>>>> used to sign two or more different messages is used (as is the case 
>>>>> in stateful hash-based signature schemes).
>>>>> -->
>>>> 
>>>> I suggest:
>>>> FORS is used at the bottom of the SLH-DSA hypertree.  Security 
>>>> decreases if the same private key is used to sign two or more 
>>>> different messages, but security does not collapse, as is the case 
>>>> in stateful hash-based signature algorithms.
>>>> 
>>>> 
>>>>> 7) <!-- [rfced] FYI, we have used the <sup> element for superscript in
>>>>>   this document.  Please review and let us know any objections.
>>>>> -->
>>>> 
>>>> Scott, you are probably the best one to perform this check.
>>>> 
>>>> 
>>>>> 8) <!--[rfced] We note that "SHA2" does not appear in [FIPS180].  Please
>>>>>   review and confirm this citation:
>>>>> 
>>>>> Original:
>>>>> 
>>>>> The AlgorithmIdentifier for a SLH-DSA public key MUST use one of 
>>>>> the twelve id-slh-dsa object identifiers listed below, based on the 
>>>>> security level used to generate the SLH-DSA hypertree, the small or 
>>>>> fast version of the algorithm, and the use of SHA2 [FIPS180] or 
>>>>> SHAKE [FIPS202].
>>>>> 
>>>>> -->
>>>> 
>>>> FIPS 180 defines the SHA2 family of hash functions.  The SHA3 family came 
>>>> later, so it is not surprising that FIPS 180 does not use that term.  It 
>>>> will not be a problem for implementers.
>>>> 
>>>> 
>>>>> 9) <!-- [rfced] FYI - We have added expansions for abbreviations upon
>>>>>   first use per Section 3.6 of RFC 7322 ("RFC Style Guide"). Please
>>>>>   review each expansion in the document carefully to ensure
>>>>>   correctness.
>>>>> -->
>>>> 
>>>> It looks fine to me.
>>>> 
>>>> Russ
>>>> 
> 

-- 
auth48archive mailing list -- auth48archive@rfc-editor.org
To unsubscribe send an email to auth48archive-le...@rfc-editor.org

Reply via email to