[TLS] Re: ML-KEM IANA and draft-connolly-tls-mlkem-key-agreement codepoint and inconsistencies
Deirdre Connolly <durumcrustulum@gmail.com> Fri, 07 March 2025 17:19 UTC
Return-Path: <neried7@gmail.com>
X-Original-To: tls@mail2.ietf.org
Delivered-To: tls@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 538008E1AA5 for <tls@mail2.ietf.org>; Fri, 7 Mar 2025 09:19:47 -0800 (PST)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -1.848
X-Spam-Level:
X-Spam-Status: No, score=-1.848 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qpWgNC2Wu_JS for <tls@mail2.ietf.org>; Fri, 7 Mar 2025 09:19:45 -0800 (PST)
Received: from mail-ed1-x52d.google.com (mail-ed1-x52d.google.com [IPv6:2a00:1450:4864:20::52d]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id 543C18E18D8 for <tls@ietf.org>; Fri, 7 Mar 2025 09:19:25 -0800 (PST)
Received: by mail-ed1-x52d.google.com with SMTP id 4fb4d7f45d1cf-5e0813bd105so3483619a12.1 for <tls@ietf.org>; Fri, 07 Mar 2025 09:19:25 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1741367963; x=1741972763; darn=ietf.org; h=to:subject:message-id:date:from:in-reply-to:references:mime-version :from:to:cc:subject:date:message-id:reply-to; bh=lq9Qy1gMBy1YRn9ocWWMJaBE5coreeam8nAyBVSi9+A=; b=ktnS1g14KkaI5/u1KXg6g5JqONWnsIEeMkNQp2rqgWApQGfMzdWMxgjmtDgSDYPaeM T5qCulf65Uzg95RKW5HedmjCiSuX6WoXYaJcwyEbmOrtSt7WFNaKg0b2pCARc6usc9nB Z9G/HeS02xljCQwH4AWuDPWPhU2Um/NnGsucvO5pPmLEyaLxG5BpfQ1lyuslwpSCVrNN TaB2Sc5AurKIE3n6ADfSsMqf8k7fRXYnvYyTvluVLKcz0QuNFBRuMfqL+OXwaQQgKDxZ 6umAIN+pKHzG8qZWPUUF9NDBXAWu3OR3Oof9u9Q2olxffY3DLIEEomMo3djsz7bpyhOT I69w==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1741367963; x=1741972763; h=to:subject:message-id:date:from:in-reply-to:references:mime-version :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=lq9Qy1gMBy1YRn9ocWWMJaBE5coreeam8nAyBVSi9+A=; b=TnUq2C/U5MFoUD8Y7j/YSY9E40AyPtA1Yl583+75ZJC1z+GrZwcOS42STRuqy3wHYe 5w0ZBnlwXYDzokUQwifpijms1I80NYEismptBbL17idkItLnjY1lK/gW0CTMeNgFIisG 5wNZ05cRwpvk89qInjF/P49X6psLy5YpYQ3Zwdd0weqsysD0E32ySC2nNrlaFSJtqtNj pnhRju8b3nQHRJt4vy43oMTmRTunOaE6o/uHA5Ms1sK22caaCJuttRQHPMniT3LtrUWe iItoooBWCrSMEz9OwQDz1NO6cm1e1BFZ6CfO/VlgUaprfcjAil5KwVBVNA8Q6cpsVbPh a8ig==
X-Gm-Message-State: AOJu0YxbGLAz3XpdofvlgXQDbVuwCf/g+w8KJ9jUiQUsw4qcMaT0SWe8 JP6J1BCWc0JuspjmNvAkevqPyDyLUk1khMEFEy+4oNqjnsV9gapE8TAgIdjk8ZfQm8FX2KbObnq hneoasSm4oSQJpgmQnBs2IF66NMaCug==
X-Gm-Gg: ASbGnctXVsQKZ23uv0RFUVqAXz/apfQN6XZ2iW1wuKWQDj/F/inTzBJdqO2hL+ZuHHF P6OIebdNryihzL22mrb0ATNOQQXcXR7o4voC1ThQ6u/ibA1x0L/tAUPxWRP8UmQyy3Ct6Fu3yYO p7KLbbu90MXb5cgj3DGtxb+OkfvA==
X-Google-Smtp-Source: AGHT+IENv8n2ZkddzjPJ+J9LyXgkT1jFZ2TuAUd5D+lfDYnyRsrjPBYLdhi02gWNLMIRge3hoXIynLXeB79h7Eg2rLc=
X-Received: by 2002:a05:6402:4011:b0:5e5:e836:71f3 with SMTP id 4fb4d7f45d1cf-5e5e836730fmr3650145a12.29.1741367962663; Fri, 07 Mar 2025 09:19:22 -0800 (PST)
MIME-Version: 1.0
References: <ecbe460a-578e-4c2b-a58b-adecbe63abdf@cryptonext-security.com> <Z8mdhmuunvsHEhkZ@chardros.imrryr.org> <AS5PR07MB96758D66E90B56568326199089CA2@AS5PR07MB9675.eurprd07.prod.outlook.com> <CAMjbhoVhWt6bS0GeMqJDu6goQ=zNXQ_yHLXYukN6Q4O6ij7AtQ@mail.gmail.com> <Z8pv88GK2t_95t2a@chardros.imrryr.org>
In-Reply-To: <Z8pv88GK2t_95t2a@chardros.imrryr.org>
From: Deirdre Connolly <durumcrustulum@gmail.com>
Date: Fri, 07 Mar 2025 12:19:11 -0500
X-Gm-Features: AQ5f1JqUCBgIloMEF4-ikL-FWwG4LOXSo_-UeP29OTNk-fJdlNfjEu8T6T45J2s
Message-ID: <CAFR824xWt_toXvHqsGXc+07X54CgBrnOq-Y1dPDy6h_f_U_j5w@mail.gmail.com>
To: "TLS@ietf.org" <tls@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000d68608062fc3d221"
Message-ID-Hash: TEPC2VCDYBTVGWJGS76S2TL5ZPWPXRCD
X-Message-ID-Hash: TEPC2VCDYBTVGWJGS76S2TL5ZPWPXRCD
X-MailFrom: neried7@gmail.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tls.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [TLS] Re: ML-KEM IANA and draft-connolly-tls-mlkem-key-agreement codepoint and inconsistencies
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/4xNwcMAWXxEqE6emD88sfQTTpuw>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Owner: <mailto:tls-owner@ietf.org>
List-Post: <mailto:tls@ietf.org>
List-Subscribe: <mailto:tls-join@ietf.org>
List-Unsubscribe: <mailto:tls-leave@ietf.org>
This is great news On Thu, Mar 6, 2025, 11:05 PM Viktor Dukhovni <ietf-dane@dukhovni.org> wrote: > On Thu, Mar 06, 2025 at 09:01:13PM +0100, Bas Westerbaan wrote: > > > This is indeed fantastic—congratulations! > > > > Will X25519MLKEM768 be enabled by default? > > Yes, not only enabled, but preferred, with servers sending an HRR when a > client reports support for X25519MLKEM768, but does not send a > corresponding keyshare. > > Similarly, the most preferred sigalgs are ML-DSA-65, ML-DSA-87, and > ML-DSA-44. Of course these don't take effect unless the server is > actually configured with a key+cert of that type. > > $ posttls-finger -Lsummary -c dukhovni.org > posttls-finger: Verified TLS connection established > to mx1.imrryr.org[144.6.86.210]:25: > TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) > key-exchange X25519MLKEM768 > server-signature ML-DSA-65 (raw public key) > > -- > Viktor. > > $ openssl s_server -accept [::1]:12345 -cert ./apps/server.pem -naccept 1 > -groups x25519mlkem768/x25519 -trace > [ ... Client runs: openssl s_client -connect [::1]:12345 -groups > x25519:X25519MLKEM768 -brief ... ] > Received TLS Record > Header: > Version = TLS 1.0 (0x301) > Content Type = Handshake (22) > Length = 287 > ClientHello, Length=283 > ... > extensions, length = 150 > ... > extension_type=supported_groups(10), length=6 > ecdh_x25519 (29) > X25519MLKEM768 (4588) > ... > extension_type=key_share(51), length=38 > NamedGroup: ecdh_x25519 (29) > key_exchange: (len=32): ... > > Sent TLS Record > Header: > Version = TLS 1.2 (0x303) > Content Type = Handshake (22) > Length = 88 > ServerHello, Length=84 > server_version=0x303 (TLS 1.2) > Random: > gmt_unix_time=0xCF21AD74 > random_bytes (len=28): ... > session_id (len=32): ... > cipher_suite {0x13, 0x02} TLS_AES_256_GCM_SHA384 > compression_method: No Compression (0x00) > extensions, length = 12 > extension_type=supported_versions(43), length=2 > TLS 1.3 (772) > extension_type=key_share(51), length=2 > NamedGroup: X25519MLKEM768 (4588) > > Sent TLS Record > Header: > Version = TLS 1.2 (0x303) > Content Type = ChangeCipherSpec (20) > Length = 1 > change_cipher_spec (1) > > Received TLS Record > Header: > Version = TLS 1.2 (0x303) > Content Type = ChangeCipherSpec (20) > Length = 1 > change_cipher_spec (1) > > Received TLS Record > Header: > Version = TLS 1.2 (0x303) > Content Type = Handshake (22) > Length = 1471 > ClientHello, Length=1467 > client_version=0x303 (TLS 1.2) > ... > extensions, length = 1334 > ... > extension_type=supported_groups(10), length=6 > ecdh_x25519 (29) > X25519MLKEM768 (4588) > ... > extension_type=key_share(51), length=1222 > NamedGroup: X25519MLKEM768 (4588) > key_exchange: (len=1216): ... > > ... > > _______________________________________________ > TLS mailing list -- tls@ietf.org > To unsubscribe send an email to tls-leave@ietf.org >
- [TLS] ML-KEM IANA and draft-connolly-tls-mlkem-ke… Daniel Van Geest
- [TLS] Re: ML-KEM IANA and draft-connolly-tls-mlke… Viktor Dukhovni
- [TLS] Re: ML-KEM IANA and draft-connolly-tls-mlke… John Mattsson
- [TLS] Re: ML-KEM IANA and draft-connolly-tls-mlke… Salz, Rich
- [TLS] Re: ML-KEM IANA and draft-connolly-tls-mlke… Tim Hudson
- [TLS] Re: ML-KEM IANA and draft-connolly-tls-mlke… Bas Westerbaan
- [TLS] Re: ML-KEM IANA and draft-connolly-tls-mlke… Daniel Van Geest
- [TLS] Re: ML-KEM IANA and draft-connolly-tls-mlke… Viktor Dukhovni
- [TLS] Re: ML-KEM IANA and draft-connolly-tls-mlke… John Mattsson
- [TLS] Re: ML-KEM IANA and draft-connolly-tls-mlke… Viktor Dukhovni
- [TLS] Re: ML-KEM IANA and draft-connolly-tls-mlke… Kris Kwiatkowski
- [TLS] Re: ML-KEM IANA and draft-connolly-tls-mlke… Viktor Dukhovni
- [TLS] Re: ML-KEM IANA and draft-connolly-tls-mlke… Tim Hudson
- [TLS] Re: ML-KEM IANA and draft-connolly-tls-mlke… Kris Kwiatkowski
- [TLS] Re: ML-KEM IANA and draft-connolly-tls-mlke… Deirdre Connolly