<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.4.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-sheffer-tls-pqc-continuity-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="PQC Continuity">PQC Continuity: Downgrade Protection for TLS Servers Migrating to PQC</title>
    <seriesInfo name="Internet-Draft" value="draft-sheffer-tls-pqc-continuity-01"/>
    <author fullname="Yaron Sheffer">
      <organization>Intuit</organization>
      <address>
        <email>yaronf.ietf@gmail.com</email>
      </address>
    </author>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>k.tirumaleswar_reddy@nokia.com</email>
      </address>
    </author>
    <date year="2026" month="March" day="01"/>
    <area>Security</area>
    <workgroup>Transport Layer Security</workgroup>
    <keyword>PQC</keyword>
    <keyword>TLS</keyword>
    <keyword>Downgrade Attacks</keyword>
    <abstract>
      <?line 38?>

<t>As the Internet transitions toward post-quantum cryptography (PQC), many TLS servers will continue supporting
traditional certificates to maintain compatibility with legacy clients. However, this coexistence introduces a significant vulnerability: an undetected rollback attack, where a malicious actor strips the PQC or Composite certificate and forces the use of a traditional certificate once quantum-capable adversaries exist.</t>
      <t>To defend against this, this document defines a TLS extension that allows a TLS peer (typically a client) to cache another peer's (typically a server's) declared commitment to present PQC or composite certificates for a specified duration. On subsequent connections, the caching peer enforces that cached commitment and rejects traditional-only certificates that conflict with it. This mechanism, inspired by HTTP Strict Transport Security (HSTS) but operating at the TLS layer, provides PQC downgrade protection without requiring changes to certificate authority (CA) infrastructure. Although we expect the more common use case to be clients caching server commitments, the mechanism applies symmetrically to server caching of client certificate commitments as well.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://yaronf.github.io/draft-sheffer-tls-pqc-continuity/draft-sheffer-tls-pqc-continuity.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-sheffer-tls-pqc-continuity/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/yaronf/draft-sheffer-tls-pqc-continuity"/>.</t>
    </note>
  </front>
  <middle>
    <?line 45?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The migration to post-quantum cryptography (PQC) will be gradual. Servers will
likely host both traditional and PQC (or composite) certificates to maintain
compatibility: legacy clients can still connect, while updated ones benefit
from PQC authentication. The size of the legacy client base often drives the
decision to keep traditional certificates. Relevant PQC work includes
<xref target="I-D.ietf-lamps-dilithium-certificates"/> (ML-DSA),
<xref target="I-D.ietf-lamps-x509-slhdsa"/> (SLH-DSA), and
<xref target="I-D.ietf-lamps-pq-composite-sigs"/> (composites).  Not only must legacy
clients be supported by servers for years, new clients that support PQC are
also incented to accept traditional certificates, to retain connectivity to
legacy servers.</t>
      <t>Once a cryptographically relevant quantum computer (CRQC) emerges publicly,
traditional certificates become insecure
and must be revoked, regardless of legacy disruption. However, a CRQC may remain undisclosed, allowing
attackers to exploit classical algorithms secretly. In such cases, adversaries could strip PQC or composite
certificates, present only traditional ones, and conduct MitM attacks. Relying parties therefore need
mechanisms to detect when servers claiming PQC support revert to traditional credentials only.</t>
      <t>To prevent such downgrade attacks, this document defines a TLS extension that enables a
TLS peer (typically a client) to cache an indication that another peer is able to
present a (Composite or pure) PQC certificate, for some duration of time, e.g. one year. As a result:</t>
      <ul spacing="normal">
        <li>
          <t>Clients reconnecting to an already known server within the validity period are protected
from rollback to classic certificates.</t>
        </li>
        <li>
          <t>A client begins enforcing the server's PQC commitment only after it has
successfully connected to the legitimate server at least once (i.e., a connection
not intercepted by a MitM). Earlier connections that are
intercepted or downgraded do not prevent the client from gaining protection
once it later observes a PQC commitment from a legitimate server.</t>
        </li>
      </ul>
      <t>The explicitly communicated caching time allows peers to implement a caching policy with no risk of sudden
breakage, and allows certificate holders to revert to traditional certificates if they ever see the need to do so.</t>
      <t>This extension is modeled on HSTS <xref target="RFC6797"/>, but whereas HSTS is at the HTTP layer, this extension
is implemented at the TLS layer.</t>
      <t>On the open Web, we expect this extension to be used mainly for caching the fact that a server is
presenting a PQC or composite certificate. However, in other use cases such as service-to-service traffic,
it would often make sense to use it for both clients and servers.</t>
      <t>An alternative approach to downgrade attacks, described in <xref target="I-D.reddy-lamps-x509-pq-commit"/>,
uses specially marked certificates to denote the server's long-term commitment
to use PQC algorithms. See <xref target="solution-comparison"/> for a comparison between the two approaches.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="the-pqcertavailable-extension">
      <name>The pq_cert_available Extension</name>
      <t>The following section defines a TLS extension that describes a TLS peer's commitment to present PQC
credentials.</t>
      <section anchor="extension-definition">
        <name>Extension Definition</name>
        <t>This is a TLS extension, as per sec. 4.2 of <xref target="RFC8446"/>. The extension type for <tt>pq_cert_available</tt> is TBD by IANA.
It <bcp14>MAY</bcp14> appear in the ClientHello (CH) message, CertificateRequest (CR) message and in Certificate (CT) messages sent by either client or server.</t>
        <t>A supporting client <bcp14>MUST</bcp14> include this extension in its ClientHello message, with no extension data.</t>
        <t>If the client indicates support, the server <bcp14>MAY</bcp14> include the extension in its Certificate message.
For symmetry, the server <bcp14>MAY</bcp14> also send an empty <tt>pq_cert_available</tt> extension
in the CertificateRequest to indicate support for this mechanism.
A client <bcp14>MUST NOT</bcp14> include <tt>pq_cert_available</tt> in its Certificate message unless the server has first included the extension in a CertificateRequest message.</t>
        <t>The extension data when sent in the Certificate message is:</t>
        <artwork><![CDATA[
struct {
    SignatureScheme signature_algorithm;
    uint32 algorithm_validity_period;
}
]]></artwork>
        <t>This extension follows the format of TLS 1.3 Certificate message extensions as defined in Sec. 4.4.2 of <xref target="RFC8446"/>.</t>
        <t>Note on terminology: Since the extension may be used by either client or server, the term "sender" is used for the peer that sent the
extension in its Certificate message and "recipient" for the other peer.</t>
        <t>The <tt>signature_algorithm</tt> in this extension <bcp14>MUST</bcp14> be the signature algorithm
that the sender's end-entity certificate is associated with. <tt>SignatureScheme</tt> is defined by
<xref target="RFC8446"/>.</t>
        <t>The <tt>algorithm_validity_period</tt> field is the time duration, in seconds, that the
sender commits to continue to present a certificate that enables this
signature scheme. The time duration is measured starting from the current TLS handshake
and is unrelated to any particular certificate or its lifecycle. A value of zero
indicates no post-handshake commitment.</t>
      </section>
      <section anchor="algorithm-selection">
        <name>Algorithm Selection</name>
        <t>If one of the peers holds unexpired cached information for the other peer:</t>
        <ul spacing="normal">
          <li>
            <t>The peer <bcp14>SHOULD</bcp14> include the cached algorithm in the <tt>signature_algorithms</tt> extension of its
ClientHello (or CertificateRequest for servers),
and <bcp14>MUST NOT</bcp14> include legacy (non-PQC) algorithms.</t>
          </li>
          <li>
            <t>It <bcp14>MAY</bcp14> include other PQC signature algorithms, according to local policy.</t>
          </li>
        </ul>
        <t>As a result, the handshake would fail if a rollback attack is attempted.</t>
      </section>
      <section anchor="recipient-behavior">
        <name>Recipient Behavior</name>
        <t>A recipient that supports this extension <bcp14>MUST</bcp14> behave as follows:</t>
        <ol spacing="normal" type="1"><li>
            <t>If the recipient holds no cached information for the sender, and the sender includes a
non-empty extension:  </t>
            <ul spacing="normal">
              <li>
                <t>If the <tt>algorithm_validity_period</tt> is zero, the recipient <bcp14>MUST NOT</bcp14> cache the information.</t>
              </li>
              <li>
                <t>Otherwise, the recipient <bcp14>SHOULD</bcp14> cache the provided information after the handshake is
completed successfully and after validating that the <tt>signature_algorithm</tt> matches the
sender's certificate and is a PQC algorithm.</t>
              </li>
              <li>
                <t>The recipient <bcp14>MAY</bcp14> choose to cache the signature algorithm for a shorter period than specified.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>If the recipient holds unexpired cached information for the sender, and receives a returned extension from the sender:  </t>
            <ul spacing="normal">
              <li>
                <t>If the <tt>algorithm_validity_period</tt> is zero, the recipient <bcp14>MUST</bcp14> clear the cached information for this sender.</t>
              </li>
              <li>
                <t>Otherwise, the recipient <bcp14>SHOULD</bcp14> validate the <tt>signature_algorithm</tt> relative to the
certificate being presented and <bcp14>SHOULD</bcp14> extend its cache period if the
received time value would expire later than its current cache expiry.</t>
              </li>
              <li>
                <t>It <bcp14>SHOULD NOT</bcp14> accept an <tt>algorithm_validity_period</tt> value if it would decrease
its existing value (within a few seconds' tolerance).</t>
              </li>
              <li>
                <t>It <bcp14>SHOULD</bcp14> replace its cached signature algorithm for the sender by a
different PQC algorithm if such is sent in the extension, and in this case,
it <bcp14>SHOULD</bcp14> use the new validity period from the extension.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>If the recipient holds unexpired cached information for the sender, and
receives no returned extension from the sender, the recipient <bcp14>SHOULD NOT</bcp14>
modify its cache.</t>
          </li>
        </ol>
        <t><cref>OPEN ISSUE: do we discuss how the cache is indexed? Service identity per RFC 9525?</cref></t>
      </section>
      <section anchor="sender-behavior">
        <name>Sender Behavior</name>
        <ol spacing="normal" type="1"><li>
            <t>A TLS client or server that receives an indication that its peer supports this
extension <bcp14>SHOULD</bcp14> send this extension in the Certificate message, provided a
PQC signature algorithm is used.</t>
          </li>
          <li>
            <t>The sender <bcp14>MUST</bcp14> keep track of the time duration it has committed to, and use
a PQC certificate to authenticate itself for that entire duration. The sender
<bcp14>MAY</bcp14> change its certificates and may switch between PQC signature algorithms at
will, provided the peer indicates acceptance of these algorithms.</t>
          </li>
        </ol>
        <t>This obligation is analogous to maintaining HSTS continuity: once a commitment is made,
the sender <bcp14>MUST</bcp14> avoid reverting to classical certificates until expiry of <tt>algorithm_validity_period</tt>.</t>
        <t>If a traditional (non-PQC) certificate is used, the sender <bcp14>SHOULD</bcp14> send the extension with no extension data to indicate support for this mechanism.</t>
      </section>
      <section anchor="operational-considerations">
        <name>Operational Considerations</name>
        <t>This extension establishes a (potentially) long-term commitment of the sender
to support PQC signature algorithms. As such, we recommend that deployers first
experiment with short validity periods (e.g. one day), and only when satisfied
that peers populate and depopulate their cache correctly, they can move to a longer
duration. In the case of HSTS, lifetimes are commonly set to one year.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO Security</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to assign a new value from the “TLS ExtensionType Values” registry.</t>
      <table>
        <thead>
          <tr>
            <th align="right">Value</th>
            <th align="left">Extension Name</th>
            <th align="center">TLS 1.3</th>
            <th align="center">Recommended</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="right">TBD</td>
            <td align="left">pq_cert_available</td>
            <td align="center">CH, CR, CT</td>
            <td align="center">Y</td>
            <td align="left">This document</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="document-history">
      <name>Document History</name>
      <t>RFC Editor: please remove before publication.</t>
      <section anchor="draft-sheffer-tls-pqc-continuity-01">
        <name>draft-sheffer-tls-pqc-continuity-01</name>
        <ul spacing="normal">
          <li>
            <t>Language consistency improvements (terminology, field names, formatting).</t>
          </li>
          <li>
            <t>Technical consistency improvements (bidirectional scope, cache semantics, validation requirements).</t>
          </li>
        </ul>
      </section>
      <section anchor="draft-sheffer-tls-pqc-continuity-00">
        <name>draft-sheffer-tls-pqc-continuity-00</name>
        <t>Initial version.</t>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.ietf-lamps-dilithium-certificates">
          <front>
            <title>Internet X.509 Public Key Infrastructure - Algorithm Identifiers for the Module-Lattice-Based Digital Signature Algorithm (ML-DSA)</title>
            <author fullname="Jake Massimo" initials="J." surname="Massimo">
              <organization>AWS</organization>
            </author>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>AWS</organization>
            </author>
            <author fullname="Sean Turner" initials="S." surname="Turner">
              <organization>sn3rd</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <date day="30" month="September" year="2025"/>
            <abstract>
              <t>   Digital signatures are used within X.509 certificates, Certificate
   Revocation Lists (CRLs), and to sign messages.  This document
   specifies the conventions for using FIPS 204, the Module-Lattice-
   Based Digital Signature Algorithm (ML-DSA) in Internet X.509
   certificates and certificate revocation lists.  The conventions for
   the associated signatures, subject public keys, and private key are
   also described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-dilithium-certificates-13"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-x509-slhdsa">
          <front>
            <title>Internet X.509 Public Key Infrastructure: Algorithm Identifiers for SLH-DSA</title>
            <author fullname="Kaveh Bashiri" initials="K." surname="Bashiri">
              <organization>BSI</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Stefan-Lukas Gazdag" initials="S." surname="Gazdag">
              <organization>genua GmbH</organization>
            </author>
            <author fullname="Daniel Van Geest" initials="D." surname="Van Geest">
              <organization>CryptoNext Security</organization>
            </author>
            <author fullname="Stavros Kousidis" initials="S." surname="Kousidis">
              <organization>BSI</organization>
            </author>
            <date day="30" month="June" year="2025"/>
            <abstract>
              <t>   Digital signatures are used within X.509 Public Key Infrastructure
   such as X.509 certificates, Certificate Revocation Lists (CRLs), and
   to sign messages.  This document specifies the conventions for using
   the Stateless Hash-Based Digital Signature Algorithm (SLH-DSA) in
   X.509 Public Key Infrastructure.  The conventions for the associated
   signatures, subject public keys, and private keys are also specified.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-x509-slhdsa-09"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-pq-composite-sigs">
          <front>
            <title>Composite ML-DSA for use in X.509 Public Key Infrastructure</title>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="John Gray" initials="J." surname="Gray">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Massimiliano Pala" initials="M." surname="Pala">
              <organization>OpenCA Labs</organization>
            </author>
            <author fullname="Jan Klaußner" initials="J." surname="Klaußner">
              <organization>Bundesdruckerei GmbH</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <date day="24" month="February" year="2026"/>
            <abstract>
              <t>   This document defines combinations of US NIST ML-DSA in hybrid with
   traditional algorithms RSASSA-PKCS1-v1.5, RSASSA-PSS, ECDSA, Ed25519,
   and Ed448.  These combinations are tailored to meet regulatory
   guidelines.  Composite ML-DSA is applicable in applications that uses
   X.509 or PKIX data structures that accept ML-DSA, but where the
   operator wants extra protection against breaks or catastrophic bugs
   in ML-DSA, and where EUF-CMA-level security is acceptable.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-pq-composite-sigs-15"/>
        </reference>
        <reference anchor="RFC6797">
          <front>
            <title>HTTP Strict Transport Security (HSTS)</title>
            <author fullname="J. Hodges" initials="J." surname="Hodges"/>
            <author fullname="C. Jackson" initials="C." surname="Jackson"/>
            <author fullname="A. Barth" initials="A." surname="Barth"/>
            <date month="November" year="2012"/>
            <abstract>
              <t>This specification defines a mechanism enabling web sites to declare themselves accessible only via secure connections and/or for users to be able to direct their user agent(s) to interact with given sites only over secure connections. This overall policy is referred to as HTTP Strict Transport Security (HSTS). The policy is declared by web sites via the Strict-Transport-Security HTTP response header field and/or by other means, such as user agent configuration, for example. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6797"/>
          <seriesInfo name="DOI" value="10.17487/RFC6797"/>
        </reference>
        <reference anchor="I-D.reddy-lamps-x509-pq-commit">
          <front>
            <title>X.509 Extensions for PQC or Composite Certificate Hosting Continuity</title>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="John Gray" initials="J." surname="Gray">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Yaron Sheffer" initials="Y." surname="Sheffer">
              <organization>Intuit</organization>
            </author>
            <date day="25" month="February" year="2026"/>
            <abstract>
              <t>   This document specifies a new X.509 certificate extension, Post-
   Quantum or Composite Hosting Continuity (PQCHC), which enables a
   certificate subject to signal a intent to continue serving PQC or
   composite certificates for a defined continuity period after
   certificate expiration.  This extension helps relying parties detect
   downgrade and man-in-the-middle (MitM) attacks during transition
   phases, where a cryptographically relevant quantum computer (CRQC)
   would make traditional certificates insecure.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-reddy-lamps-x509-pq-commit-01"/>
        </reference>
      </references>
    </references>
    <?line 256?>

<section anchor="solution-comparison">
      <name>Comparison with the Certificate-Based Solution</name>
      <t>This section is a comparison with an analogous solution <xref target="I-D.reddy-lamps-x509-pq-commit"/> for the same rollback
problem, one that signals server continuity using certificates rather than the TLS connection itself.</t>
      <ul spacing="normal">
        <li>
          <t>The certificate-based solution does not change the TLS handshake, which potentially makes adoption easier. However, changes
to the Web Public Key Infrastructure would also affect adoption.</t>
        </li>
        <li>
          <t>The certificate-based solution is independent of TLS and thus can be used by other protocols.</t>
        </li>
        <li>
          <t>Operationally, it may be harder to manage the “commitment” through certificates vs. TLS configuration.
For example, in the HSTS space, it is common to experiment first with very short durations, e.g. 1 day,
before moving to a longer commitment. This could have a significant effect on real-life adoption.</t>
        </li>
        <li>
          <t>The revocation checking aspect of the certificate-based solution relies upon other mechanisms
(e.g. CRLs, OCSP) to also be signed with PQC/Composite. Those other RFCs and
implementations are likely to take even longer to materialize.</t>
        </li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
