[Servercert-wg] [cabfpub] Interest in Ed25519 and/or Ed448?

Rob Stradling rob at sectigo.com
Fri Dec 21 08:29:34 MST 2018


On 20/12/2018 15:13, Ryan Sleevi wrote:
> On Thu, Dec 20, 2018 at 6:53 AM Rob Stradling wrote:
> 
>     Maybe I can't ask that secondary question until after the Code Signing
>     and S/MIME WGs have been chartered.
> 
> 
> Right, I would expect that even if we had such a list, cross-posting 
> would be discouraged / prohibited, given the nature of both IPR 
> commitments and given that we should not assume all members will be in 
> all WGs. At the present, it seems best that any discussions outside of 
> Forum-level business or chartering of WGs would best be discussed on the 
> applicable WG.

Thanks Ryan.  I hadn't considered that cross-posting might be affected 
by IPR!

> Despite being an "easy" question about what you're asking, there's 
> actually two questions/parts to unpack.
> 
> 1) Do browsers have plans to support Ed25519/Ed448 SPKIs in leaf 
> certificates?
> 2) Do browsers have plans to support Ed25519/Ed448 signatures anywhere 
> in the certificate chain (which implies SPKIs in non-leaf certificates)?
> 
> I think any discussion about what that means has to consider the 
> discussions in the IETF TLS 1.3 WG regarding RSA-PSS, as the nuances and 
> trade-offs are the same. Those discussions highlighted the tendency of 
> some cryptographic libraries to choke on leaf SPKIs they don't recognize 
> - even if the client implementation may allow them - and the challenges 
> with deploying new signature algorithms in certificates vs TLS.
> 
> On the basis of the strong, widespread, International community review 
> and consensus in evaluating these algorithms, as captured through the 
> discussions of the IETF and CFRG, we're supportive of these algorithms 
> and would like to support them in Chrome.
> 
> Regarding the first question, our integration with certain OS 
> cryptographic functions to enable easier administration and "out of the 
> box" experience for Enterprises and home users presents some challenges 
> to that support, as alluded to above, and so we have nothing concrete to 
> share at this time beyond that expression of support and eventual intent.

Understood.

> Regarding the second question, we are still awaiting discussions about 
> how to best produce such signatures while still ensuring the keys used 
> to produce such signatures are reasonably, meaningfully, and 
> demonstrably protected. Until we see work progressing on those 
> protection profiles, we're concerned that shipping such support may be 
> seen as encouraging weaker standards for key protection, given that is 
> the only way to produce such signatures. While the dependencies overlap 
> with those of the first question - that is, they are certainly a 
> technical precondition - we're unlikely to enable support for a 
> signature algorithm prior to it being usable in the contexts we are 
> concerned about, and we're unlikely to support it being usable in the 
> contexts we are concerned about without there being a path to ensure 
> meaningful, widely-accepted key protection in those contexts.

Do you have a clear list of targets that would need to be met for 
Ed25519/Ed448 to be "useable in the contexts" that you "are concerned 
about"?

For example, are you waiting for Ed25519/Ed448 to become incorporated 
into FIPS-140 certifications?  Or would it be enough for just one HSM 
vendor to ship support for Ed25519/Ed448 in at least one model of HSM, 
and for that HSM to be operated in "non FIPS mode"?

Or is it too early to be asking these questions?

-- 
Rob Stradling
Senior Research & Development Scientist
Sectigo Limited



More information about the Servercert-wg mailing list