Dear colleagues,

We came across the following scenario:
Server has 2 cert chains, PQ and classical, and prefers PQ.

A client doesn't have any PQ CAs configured, but at the handshake
sends PQ sigalgs among others. The server replies with the PQ chain,
the client can't verify it, and the connection can't be established.

We've discussed it and see the following scenarios:

1. Consider it to be a client misconfiguration. To prevent this from
happening, the client is better not to send PQ algos in sigalgs. To
not send PQ algos, clients should scan CAs and stop sending PQ algos
if no PQ CAs are available.

2. "Smart" clients (e.g. web browsers) should implement fallback from
PQ to classical algorithms if PQ connection can't be established. I
vaguely recollect that there were browsers downgrading the protocol
from TLS 1.3 to TLS 1.2 (and may be lower) at least several years ago
but couldn't find the description of this behavior.

3. Cross-signing PQ certs with classic crypto algorithms, as it
happened before. It ensures the best client experience. The downside
of this behavior is that we have to sign a stronger cert with a weaker
CA, and personally I suspect some browsers forbid such chains.

Are there any other scenarios we are missing? Is this topic relevant
for TLS, PQUIP, or some other community (e.g. CA/Browser forum)?

-- 
SY, Dmitry Belyavsky

_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to