On Thu, Jul 24, 2025 at 5:50 AM tirumal reddy <kond...@gmail.com> wrote:
>
> On Thu, 24 Jul 2025 at 13:49, Daniel Van Geest 
> <daniel.vange...@cryptonext-security.com> wrote:
>>
>> Tiru,
>>
>> While you haven't requested codepoints, the draft claims them, e.g.
>>
>> slhdsa_sha2_128s (0x0911),
>>
>> That is my concern regarding process.
>
> These are just placeholders, we haven’t requested IANA to assign codepoints 
> yet. We’ll update the draft to make that clearer.

I generally see people use TBD for them.
>
> -Tiru
>>
>> Daniel
>>
>> On 2025-07-24 12:45 p.m., tirumal reddy wrote:
>>
>> Thanks Daniel for the support. We have not yet requested codepoints, this 
>> was intentional. We wanted to allow for more discussion within the WG, 
>> particularly around the type of codepoints needed.
>>
>> -Tiru
>>
>> On Thu, 24 Jul 2025 at 13:29, Daniel Van Geest 
>> <daniel.vangeest=40cryptonext-security....@dmarc.ietf.org> wrote:
>>>
>>> I support adoption with the applicability statement.
>>>
>>> I am guilty of helping spread OID proliferation in 
>>> draft-ietf-lamps-x509-slhdsa, although that was because we couldn't predict 
>>> all the use cases for SLH-DSA end-entity certificates.  I'm glad this draft 
>>> only uses the pure half of SLH-DSA, but I hope that it can cut down on the 
>>> number of codepoints.  For example, TLS is currently dependent on SHA-2 for 
>>> cipher suites, perhaps the SLH-DSA SHAKE options could be removed.  Some 
>>> thought on whether the small or fast versions would be more appropriate for 
>>> TLS could help then the codepoints to a reasonable number.
>>>
>>> A point of process: I don't think this draft should have claimed any IANA 
>>> codepoints, that is for IANA to assign after a request is made. At least, I 
>>> don't see these in the IANA registry.  Is it too late for the draft to 
>>> remove these values, hopefully reduce the number of codepoints (if 
>>> adopted), and only request those codepoints from IANA?
>>>
>>> Regards,
>>> Daniel
>>>
>>> On 2025-07-14 11:05 p.m., Sean Turner wrote:
>>>
>>> We kicked off an adoption call for Use of SLH-DSA in TLS 1.3; see [0]. We 
>>> called consensus [1], and that decision was appealed. We have reviewed the 
>>> messages and agree that we need to redo the adoption call to get more input.
>>>
>>> What appears to be the most common concern, which we will take from Panos' 
>>> email, is that "SLH-DSA sigs are too large and slow for general use in TLS 
>>> 1.3 applications". One way to address this concern is to add an 
>>> applicablity statement to address this point. We would like to propose that 
>>> this (or something close to this) be added to the I-D:
>>>
>>> Applications that use SLH-DSA need to be aware that the signatures sizes 
>>> are large; the signature sizes for the cipher suites specified herein range 
>>> from 7,856 to 49,856 bytes. Likewise, the cipher suites are considered 
>>> slow. While these costs might be amoritized over the cost of a long lived 
>>> connection, the cipher suites specified herein are not considered for 
>>> general use in TLS 1.3.
>>>
>>> With this addition in mind, we would like to start another WG adoption call 
>>> for draft-reddy-tls-slhdsa. If you support adoption with the above text (or 
>>> something similar) and are willing to review and contribute text, please 
>>> send a message to the list. If you do not support adoption of this draft 
>>> with the above text (or something similar), please send a message to the 
>>> list and indicate why. This call will close at 2359 UTC on 28 July 2025.
>>>
>>> Cheers,
>>> Deirdre, Joe, and Sean
>>>
>>> [0] https://mailarchive.ietf.org/arch/msg/tls/o4KnXjI-OpuHPcB33e8e78rACb0/
>>> [1] https://mailarchive.ietf.org/arch/msg/tls/hhLtBBctK5em6l82m7rgM6_hefo/
>>> [2] https://datatracker.ietf.org/doc/draft-reddy-tls-slhdsa/
>>> _______________________________________________
>>> TLS mailing list -- tls@ietf.org
>>> To unsubscribe send an email to tls-le...@ietf.org
>>>
>>> _______________________________________________
>>> TLS mailing list -- tls@ietf.org
>>> To unsubscribe send an email to tls-le...@ietf.org
>
> _______________________________________________
> TLS mailing list -- tls@ietf.org
> To unsubscribe send an email to tls-le...@ietf.org



-- 
Astra mortemque praestare gradatim

_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to