Re: Channel binding for post-quantum cryptography - Mailing list pgsql-hackers

From Jacob Champion
Subject Re: Channel binding for post-quantum cryptography
Date
Msg-id CAOYmi+ng6BjSrQtqPFH0suP8+rg6w-tiuOzHW7Ms2026_E_31A@mail.gmail.com
Whole thread Raw
In response to Re: Channel binding for post-quantum cryptography  (Michael Paquier <michael@paquier.xyz>)
List pgsql-hackers
On Mon, Oct 27, 2025 at 10:55 PM Michael Paquier <michael@paquier.xyz> wrote:
> Another thing that bugs me is that this patch would force sha-256 for
> everything, without at least checks based on NID_ML_DSA_44,
> NID_ML_DSA_65 or NID_ML_DSA_87.  That may be more flexible, but I'm
> wondering if it could become a problem long-term to enforce blindly
> such a policy every time algo_nid is undefined.

I think it would be a problem, at least if the previous conversations
around X509_get_signature_nid() are any indication.

Filip, you said

> RFC 5929 recommends SHA-256 for unknown/unsupported algorithms

but I don't see any language like that; can you provide a quote? That
doesn't seem like a recommendation that would allow for
interoperability in the long term.

The IETF draft at [1] (which was updated just last month) seems to
provide new signatureAlgorithm IDs for ML-DSA. Is this just a matter
of waiting until the specs are released and OpenSSL implements them?

Thanks,
--Jacob

[1] https://datatracker.ietf.org/doc/draft-ietf-lamps-dilithium-certificates/



pgsql-hackers by date:

Previous
From: Tomas Vondra
Date:
Subject: Re: failed NUMA pages inquiry status: Operation not permitted
Next
From: Christoph Berg
Date:
Subject: Re: failed NUMA pages inquiry status: Operation not permitted