2025-03-21 0600-0730 UTC (Boromphimarn 1/2)
Chairs:
Responsible AD:
Notetaker(s):
NTRUPrime, WGLC phase ended (main focus on IANA registry reference,
and document status)
up next: WGLC on chacha20-poly1305, ssh-agent, or ml-kem-hybrid-kex
?
Paul Wouters: what if client and server don't agree on strict KEX
protection?
Paul: should the client or server reject the connection if it
doesn't have these protections? do we have guidance in the spec?
Guilin WANG: do we need an academic expert to review the fix? do we
need formal analysis?
Dierdre: yes, if we look at a full transcript hash in the future
would be performant, and use a real KDF as well.
Tero: if we move to full KDF hash of transcript, can't we use the
same hack of a pseudo-KEX message? That'd give you this, plus
backward compatibility. No need for a new SSH revision.
Job: John, if Ericsson disables chacha20-poly1305, does this draft
address your willingness to re-enable chacha20?
Stephen: do you want to offer this for WG adoption?
Hannes: slide 11: type is just key usage -- there are only two key
usages defined? (Answer: yes) first line is the certificate format
identifier.
How is string list (e.g. extensiosn) constructed?
DKG: Is behavior common across implenmentatins? What's in them?
Hannes: key_id: is it just human-readable?
Deb: what about signature algorithms? always ed25519?
Scott: signature is the full key of the CA? i recommend using a hash
of the pubkey. ML-DSA will make each cert very tiny.
Job: string stuff what? Please include some examples. test vectors
are helpful. Adding a version is useful/confusing based on rPKI
experience
Adjourn 80 seconds early