Agree with Watson here. Don’t see a use case, or a threat - within TLS context 
- that this would help with. 
—
Regards,
Uri

Secure Resilient Systems and Technologies
MIT Lincoln Laboratory

> On Jun 18, 2025, at 18:41, Watson Ladd <watsonbl...@gmail.com> wrote:
> 
> !-------------------------------------------------------------------|
>  This Message Is From an External Sender
>  This message came from outside the Laboratory.
> |-------------------------------------------------------------------!
> 
>> On Wed, Jun 18, 2025 at 3:33 PM Mike Ounsworth
>> <mike.ounswo...@entrust.com> wrote:
>> 
>> Watson,
>> 
>> 
>> 
>> There is currently no way to request that a server produce a 
>> CertificateVerify containing two signatures. This draft is adding a 
>> mechanism for 2 certificates -> 1 CertificateVerify.
>> 
>> 
>> 
>> Basically, since draft-reddy-tls-composite-mldsa is on the table, we also 
>> wanted to write down the other obvious way of doing hybrid signatures so 
>> that we can have a complete discussion on the topic. Whether or not this is 
>> “needed” is exactly the discussion to have at 123 😊
> 
> It's much easier to make complex arguments over email than in a few
> minutes of time at the mic line.
> 
> More specifically, it's not clear to me why these are desirable
> mechanisms. Unlike confidentiality mechanisms, authentication
> mechanisms cannot be broken retrospectively. We already have a
> mechanism for negotiation that has functioned to enable transition
> from RSA to ECDSA, largely seamlessly. The scope in the document and
> justification of a smooth transition is already demonstrably met with
> no real change to libraries to implement this.  I don't see anything
> in the introduction of the draft that makes the case here, unlike the
> one you cite as an alternative.
> 
> Sincerely,
> Watson
>> 
>> 
>> 
>> ---
>> 
>> Mike Ounsworth
>> 
>> 
>> 
>> From: Watson Ladd <watsonbl...@gmail.com>
>> Sent: Wednesday, June 18, 2025 5:29 PM
>> To: Yaroslav Rosomakho <yrosomakho=40zscaler....@dmarc.ietf.org>
>> Cc: <tls@ietf.org> <tls@ietf.org>; Hannes Tschofenig 
>> <hannes.tschofe...@gmx.net>; Mike Ounsworth <mike.ounswo...@entrust.com>
>> Subject: [EXTERNAL] Re: [TLS] Dual certificates in TLS proposal
>> 
>> 
>> 
>> On Wed, Jun 18, 2025, 3: 19 PM Yaroslav Rosomakho <yrosomakho=40zscaler. 
>> com@ dmarc. ietf. org> wrote: Dear TLS WG, We have just submitted a new 
>> proposal, draft-yusef-tls-dual-certs-00, that extends TLS 1. 3 to support 
>> authentication using two
>> 
>> 
>> 
>> 
>> 
>> On Wed, Jun 18, 2025, 3:19 PM Yaroslav Rosomakho 
>> <yrosomakho=40zscaler....@dmarc.ietf.org> wrote:
>> 
>> Dear TLS WG,
>> 
>> We have just submitted a new proposal, draft-yusef-tls-dual-certs-00, that 
>> extends TLS 1.3 to support authentication using two certificate chains: one 
>> using traditional algorithms and one using post-quantum (PQ) algorithms. 
>> This approach, aimed at closed environments and staged post-quantum 
>> migration, enables stronger session authentication by requiring both 
>> signatures to validate.
>> 
>> The proposal builds on existing TLS 1.3 mechanisms with minimal protocol 
>> changes. It introduces a dual signature algorithm extension and defines how 
>> dual certificate chains and signatures are structured, while preserving 
>> compatibility with Exported Authenticators.
>> 
>> This mechanism complements existing proposals such as composite certificates 
>> (e.g., draft-reddy-tls-composite-mldsa), offering greater deployment 
>> flexibility, especially for systems that require support for independently 
>> validated classical and PQ credentials. It also helps with phased migration 
>> strategies where TLS endpoints have to deal with a mix of opinionated peers 
>> while limiting the need to create a zoo of PKI hierarchies to satisfy 
>> classic, pure PQ as well as all possible compositions of algorithms.
>> 
>> We welcome your feedback and discussion on the proposal and the design 
>> specifics.
>> 
>> 
>> 
>> Why is this needed given the existing signalling of client support for 
>> certificate signature algorithms?
>> 
>> 
>> 
>> 
>> Best Regards,
>> Hannes, Mike, Rifaat, Tiru, Yaron and Yaroslav
>> 
>> 
>> 
>> 
>> 
>> ---------- Forwarded message ---------
>> 
>> A new version of Internet-Draft draft-yusef-tls-pqt-dual-certs-00.txt has 
>> been
>> successfully submitted by Yaroslav Rosomakho and posted to the
>> IETF repository.
>> 
>> Name:     draft-yusef-tls-pqt-dual-certs
>> Revision: 00
>> Title:    Post-Quantum Traditional (PQ/T) Hybrid Authentication with Dual 
>> Certificates in TLS 1.3
>> Date:     2025-06-18
>> Group:    Individual Submission
>> Pages:    27
>> URL:      
>> https://www.ietf.org/archive/id/draft-yusef-tls-pqt-dual-certs-00.txt
>> Status:   https://datatracker.ietf.org/doc/draft-yusef-tls-pqt-dual-certs/
>> HTML:     
>> https://www.ietf.org/archive/id/draft-yusef-tls-pqt-dual-certs-00.html
>> HTMLized: 
>> https://datatracker.ietf.org/doc/html/draft-yusef-tls-pqt-dual-certs
>> 
>> 
>> Abstract:
>> 
>>   This document extends the TLS 1.3 authentication mechanism to allow
>>   the negotiation and use of two signature algorithms to enable dual-
>>   algorithm hybrid authentication, ensuring that an attacker would need
>>   to break both algorithms to compromise the session.  The two
>>   signature algorithms come from two independent certificates that
>>   together produce a single Certificate and CertificateVerify message.
>> 
>> 
>> 
>> The IETF Secretariat
>> 
>> 
>> 
>> 
>> 
>> This communication (including any attachments) is intended for the sole use 
>> of the intended recipient and may contain confidential, non-public, and/or 
>> privileged material. Use, distribution, or reproduction of this 
>> communication by unintended recipients is not authorized. If you received 
>> this communication in error, please immediately notify the sender and then 
>> delete all copies of this communication from your 
>> system._______________________________________________
>> TLS mailing list -- tls@ietf.org
>> To unsubscribe send an email to tls-le...@ietf.org
>> 
>> Any email and files/attachments transmitted with it are intended solely for 
>> the use of the individual or entity to whom they are addressed. If this 
>> message has been sent to you in error, you must not copy, distribute or 
>> disclose of the information it contains. Please notify Entrust immediately 
>> and delete the message from your system.
>> 
> 
> 
> --
> Astra mortemque praestare gradatim
> 
> _______________________________________________
> TLS mailing list -- tls@ietf.org
> To unsubscribe send an email to tls-le...@ietf.org

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to