Skip to main content

Use of the HSS and XMSS Hash-Based Signature Algorithms in Internet X.509 Public Key Infrastructure
draft-ietf-lamps-x509-shbs-13

Yes

Deb Cooley
Paul Wouters

No Objection

Erik Kline
Francesca Palombini
Jim Guichard
Murray Kucherawy
Zaheduzzaman Sarker

Note: This ballot was opened for revision 09 and is now closed.

Deb Cooley
Yes
Paul Wouters
Yes
Erik Kline
No Objection
Francesca Palombini
No Objection
Gunter Van de Velde
No Objection
Comment (2024-11-29 for -11) Sent
# Gunter Van de Velde, RTG AD, comments for draft-ietf-lamps-x509-shbs-11

# The line numbers used are rendered from IETF idnits tool: https://author-tools.ietf.org/api/idnits?url=https://www.ietf.org/archive/id/draft-ietf-lamps-x509-shbs-11.txt

# Thank you for the work spending in this document. I found it hard to read, but i suspect that is because of my unfamiliarity with the technologies documented within this text.

# The document does not have a terminology section explaining the abbreviations used in the document. Consider adding such section. Sometimes an abbreviation is expended upon first usage, sometimes it is not, for example "OID" 

#DETAILED COMMENTS
#=================

116	   A stateful HBS private key is a finite collection of OTS keys, hence
117	   only a limited number of messages can be signed and the private key's

GV> The statement "A stateful HBS private key is a finite collection of OTS keys" 
is mostly correct, but it can be made more precise. What about the following:

"
A stateful HBS private key consists of a finite collection of OTS keys, along 
with state information that tracks the usage of these keys to ensure the 
security of the scheme.
"

122	   longer signing time.  Due to the statefulness of the private key and
123	   the limited number of signatures that can be created, stateful HBS
124	   schemes might not be appropriate for use in interactive protocols.

GV> Would the following not be a more digestible textblob to say the same:

"
Because the private key in stateful HBS schemes is stateful and the number 
of signatures that can be generated is limited, these schemes may be 
unsuitable for use in interactive protocols.
"
Jim Guichard
No Objection
Murray Kucherawy
No Objection
Orie Steele
No Objection
Comment (2024-12-04 for -12) Sent
# Orie Steele, ART AD, comments for draft-ietf-lamps-x509-shbs-12
CC @OR13

* line numbers:
  - https://author-tools.ietf.org/api/idnits?url=https://www.ietf.org/archive/id/draft-ietf-lamps-x509-shbs-12.txt&submitcheck=True

* comment syntax:
  - https://github.com/mnot/ietf-comments/blob/main/format.md

* "Handling Ballot Positions":
  - https://ietf.org/about/groups/iesg/statements/handling-ballot-positions/

## Comments

### audited before the signature is published 

```
172	   In each of these cases, the operator is able to control their signing
173	   environment such that signatures are generated in hardware
174	   cryptographic modules and audited before the signature is published,
175	   in order to prevent OTS key reuse.
```

The phrasing here is tripping me up a bit.
I think auditing prevents OTS key reuse, and that audits should be completed before a signature is produced.
I am not sure what publishing a signature means in this context.
Later in the document freezing and auditing is discussed, perhaps this could be explained better with reference to that section.

## Nits

### possible -> practical?

```
192	   stateful HBS public key in the subordinate CA certificate may be
193	   possible.
```
Roman Danyliw
(was Discuss) No Objection
Comment (2024-11-23 for -11) Sent
Thank you to Stewart Bryant for the GENART review.

Thank you Russ Housley and Daniel Van Geest for answering my DISCUSS and COMMENT feedback.
Zaheduzzaman Sarker
No Objection
Éric Vyncke
No Objection
Comment (2024-11-26 for -11) Not sent
Beside the lack of justification for the intended status in the shepherd write-up, no INT specific comments.