Skip to content

Commit

Permalink
Script updating gh-pages from c031074. [ci skip]
Browse files Browse the repository at this point in the history
  • Loading branch information
ID Bot committed Dec 13, 2024
1 parent 8a5837c commit 626b54d
Show file tree
Hide file tree
Showing 4 changed files with 16 additions and 16 deletions.
10 changes: 5 additions & 5 deletions mldsa/draft-beck-tls-trust-anchor-ids.html
Original file line number Diff line number Diff line change
Expand Up @@ -1051,7 +1051,7 @@
</tr></thead>
<tfoot><tr>
<td class="left">Beck, et al.</td>
<td class="center">Expires 15 June 2025</td>
<td class="center">Expires 16 June 2025</td>
<td class="right">[Page]</td>
</tr></tfoot>
</table>
Expand All @@ -1064,12 +1064,12 @@
<dd class="internet-draft">draft-beck-tls-trust-anchor-ids-latest</dd>
<dt class="label-published">Published:</dt>
<dd class="published">
<time datetime="2024-12-12" class="published">12 December 2024</time>
<time datetime="2024-12-13" class="published">13 December 2024</time>
</dd>
<dt class="label-intended-status">Intended Status:</dt>
<dd class="intended-status">Standards Track</dd>
<dt class="label-expires">Expires:</dt>
<dd class="expires"><time datetime="2025-06-15">15 June 2025</time></dd>
<dd class="expires"><time datetime="2025-06-16">16 June 2025</time></dd>
<dt class="label-authors">Authors:</dt>
<dd class="authors">
<div class="author">
Expand Down Expand Up @@ -1132,7 +1132,7 @@ <h2 id="name-status-of-this-memo">
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."<a href="#section-boilerplate.1-3" class="pilcrow"></a></p>
<p id="section-boilerplate.1-4">
This Internet-Draft will expire on 15 June 2025.<a href="#section-boilerplate.1-4" class="pilcrow"></a></p>
This Internet-Draft will expire on 16 June 2025.<a href="#section-boilerplate.1-4" class="pilcrow"></a></p>
</section>
</div>
<div id="copyright">
Expand Down Expand Up @@ -1724,7 +1724,7 @@ <h3 id="name-intermediate-elision">
<a href="#section-7.5" class="section-number selfRef">7.5. </a><a href="#name-intermediate-elision" class="section-name selfRef">Intermediate Elision</a>
</h3>
<p id="section-7.5-1">Today, root CAs typically issue shorter-lived intermediate certificates which, in turn, issue end-entity certificates. The long-lived root key is less exposed to attack, while the short-lived intermediate key can be more easily replaced without changes to relying parties.<a href="#section-7.5-1" class="pilcrow"></a></p>
<p id="section-7.5-2">This operational improvement comes at a bandwidth cost: the TLS handshake includes an extra certificate, which includes a public key, signature, and X.509 metadata. An average X.509 name in the Chrome Root Store <span>[<a href="#CHROME-ROOTS" class="cite xref">CHROME-ROOTS</a>]</span> or Mozilla CA Certificate Program <span>[<a href="#MOZILLA-ROOTS" class="cite xref">MOZILLA-ROOTS</a>]</span> is around 100 bytes alone. Post-quantum signature algorithms will dramatically shift this tradeoff. ML-DSA-65 <span>[<a href="#FIPS204" class="cite xref">FIPS204</a>]</span>, for example, has a total public key and signature size of 5,245 bytes.<a href="#section-7.5-2" class="pilcrow"></a></p>
<p id="section-7.5-2">This operational improvement comes at a bandwidth cost: the TLS handshake includes an extra certificate, which includes a public key, signature, and X.509 metadata. An average X.509 name in the Chrome Root Store <span>[<a href="#CHROME-ROOTS" class="cite xref">CHROME-ROOTS</a>]</span> or Mozilla CA Certificate Program <span>[<a href="#MOZILLA-ROOTS" class="cite xref">MOZILLA-ROOTS</a>]</span> is around 100 bytes alone. Post-quantum signature algorithms will dramatically shift this tradeoff. ML-DSA-65 <span>[<a href="#FIPS204" class="cite xref">FIPS204</a>]</span>, for example, has a total public key and signature size of 5,261 bytes.<a href="#section-7.5-2" class="pilcrow"></a></p>
<p id="section-7.5-3"><span>[<a href="#I-D.ietf-tls-cert-abridge" class="cite xref">I-D.ietf-tls-cert-abridge</a>]</span> proposes to predistribute known intermediate certificates to relying parties, as a compression scheme. A multi-certificate deployment model provides another way to achieve this effect. To relying parties, a predistributed intermediate certificate is functionally equivalent to a root certificate. PKIs use intermediate certificates because changing root certificates requires updating relying parties, but predistributed intermediates already presume updated relying parties.<a href="#section-7.5-3" class="pilcrow"></a></p>
<p id="section-7.5-4">A CA operator could provide authenticating parties with two certification paths: a longer path ending at a long-lived trust anchor and shorter path the other ending at a short-lived, revocable root. Relying parties would be configured to trust both the long-lived root and the most recent short-lived root. A server that prioritizes the shorter path would then send the shorter path to up-to-date relying parties and the longer path to older relying parties.<a href="#section-7.5-4" class="pilcrow"></a></p>
<p id="section-7.5-5">This achieves the same effect with a more general-purpose multi-certificate mechanism. It is also more flexible, as the two paths need not be related. For example, root CA public keys are not distributed in each TLS connection, so a post-quantum signature algorithm that optimizes for signature size may be preferable. In this model, both the long-lived and short-lived roots may use such an algorithm. In a compression-based model, the same intermediate must optimize both its compressed and uncompressed size, so such an algorithm may not be suitable.<a href="#section-7.5-5" class="pilcrow"></a></p>
Expand Down
8 changes: 4 additions & 4 deletions mldsa/draft-beck-tls-trust-anchor-ids.txt
Original file line number Diff line number Diff line change
Expand Up @@ -5,10 +5,10 @@
Transport Layer Security B. Beck
Internet-Draft D. Benjamin
Intended status: Standards Track D. O'Brien
Expires: 15 June 2025 Google LLC
Expires: 16 June 2025 Google LLC
K. Nekritz
Meta
12 December 2024
13 December 2024


TLS Trust Anchor Identifiers
Expand Down Expand Up @@ -60,7 +60,7 @@ Status of This Memo
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."

This Internet-Draft will expire on 15 June 2025.
This Internet-Draft will expire on 16 June 2025.

Copyright Notice

Expand Down Expand Up @@ -776,7 +776,7 @@ Table of Contents
[MOZILLA-ROOTS] is around 100 bytes alone. Post-quantum signature
algorithms will dramatically shift this tradeoff. ML-DSA-65
[FIPS204], for example, has a total public key and signature size of
5,245 bytes.
5,261 bytes.

[I-D.ietf-tls-cert-abridge] proposes to predistribute known
intermediate certificates to relying parties, as a compression
Expand Down
8 changes: 4 additions & 4 deletions mldsa/draft-davidben-tls-trust-expr.html
Original file line number Diff line number Diff line change
Expand Up @@ -1049,7 +1049,7 @@
</tr></thead>
<tfoot><tr>
<td class="left">Benjamin, et al.</td>
<td class="center">Expires 15 June 2025</td>
<td class="center">Expires 16 June 2025</td>
<td class="right">[Page]</td>
</tr></tfoot>
</table>
Expand All @@ -1062,12 +1062,12 @@
<dd class="internet-draft">draft-davidben-tls-trust-expr-latest</dd>
<dt class="label-published">Published:</dt>
<dd class="published">
<time datetime="2024-12-12" class="published">12 December 2024</time>
<time datetime="2024-12-13" class="published">13 December 2024</time>
</dd>
<dt class="label-intended-status">Intended Status:</dt>
<dd class="intended-status">Standards Track</dd>
<dt class="label-expires">Expires:</dt>
<dd class="expires"><time datetime="2025-06-15">15 June 2025</time></dd>
<dd class="expires"><time datetime="2025-06-16">16 June 2025</time></dd>
<dt class="label-authors">Authors:</dt>
<dd class="authors">
<div class="author">
Expand Down Expand Up @@ -1125,7 +1125,7 @@ <h2 id="name-status-of-this-memo">
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."<a href="#section-boilerplate.1-3" class="pilcrow"></a></p>
<p id="section-boilerplate.1-4">
This Internet-Draft will expire on 15 June 2025.<a href="#section-boilerplate.1-4" class="pilcrow"></a></p>
This Internet-Draft will expire on 16 June 2025.<a href="#section-boilerplate.1-4" class="pilcrow"></a></p>
</section>
</div>
<div id="copyright">
Expand Down
6 changes: 3 additions & 3 deletions mldsa/draft-davidben-tls-trust-expr.txt
Original file line number Diff line number Diff line change
Expand Up @@ -5,8 +5,8 @@
Transport Layer Security D. Benjamin
Internet-Draft D. O'Brien
Intended status: Standards Track B. Beck
Expires: 15 June 2025 Google LLC
12 December 2024
Expires: 16 June 2025 Google LLC
13 December 2024


TLS Trust Expressions
Expand Down Expand Up @@ -55,7 +55,7 @@ Status of This Memo
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."

This Internet-Draft will expire on 15 June 2025.
This Internet-Draft will expire on 16 June 2025.

Copyright Notice

Expand Down

0 comments on commit 626b54d

Please sign in to comment.