On Tue, Apr 15, 2025 at 01:55:35PM -0700, Andrey Jivsov wrote:
> I don't think that standalone ML-DSA should be adopted.
>
> There is time to move to a non-hybrid X.509 and digital signatures in the
> future.
>
> This topic has implications to availability of X.509 certificates, as
> there is a real risk that CAs will prefer standalone ML-DSA to the
> exclusion of hybrids, and also that other protocols will be limited to
> standalone ML-DSA.
But CAs do not choose EE keys, the key in the CSR is chosen by users.
And CAs can start to use ML-DSA to self-sign trust-anchor certs or sign
intermediate issuer (subordinate CA if you prefer that term)
certificates whether or not ML-DSA is a defined signature algorithm in
TLS.
I support adoption, will review, and don't see a compelling reason to
delay adoption. Are we likely to produce a materially different spec
if this is delayed and for how long?
--
Viktor.
$ posttls-finger -c -Lsummary dukhovni.org
posttls-finger: Verified TLS connection established
... TLSv1.3 with cipher
TLS_AES_256_GCM_SHA384 (256/256 bits)
key-exchange X25519MLKEM768
server-signature ML-DSA-65 (raw public key)
_______________________________________________
TLS mailing list -- [email protected]
To unsubscribe send an email to [email protected]