Dear Viktor,

On Wed, Aug 6, 2025 at 4:14 PM Viktor Dukhovni <ietf-d...@dukhovni.org> wrote:
>
> On Wed, Aug 06, 2025 at 09:28:07AM +0200, Dmitry Belyavsky wrote:
>
> > We came across the following scenario: Server has 2 cert chains, PQ
> > and classical, and prefers PQ.
>
> If this is for a public HTTPS server, my take is that it is premature
> for the server to offer PQ certificates signed by non-WebPKI CAs.  Since
> there are no PQ roots in the WebPKI trust bundle, PQ HTTP server server
> certificates are best avoided for now.

This is a test setup as of now and a not so long shot for the future.
I understand your reasoning, but isn't it a sort of Catch-22?

> So basically, the onus to do the interoperable thing is primarily on the
> server: don't deploy certs the expected client community can't verify,
> be they PQ or "classical".

IRL web clients would have to do smth, I suppose?


-- 
SY, Dmitry Belyavsky

_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to