[TLS] Re: I-D Action: draft-kwiatkowski-tls-ecdhe-mlkem-03.txt
Kris Kwiatkowski <kris@amongbytes.com> Tue, 18 March 2025 10:33 UTC
Return-Path: <kris@amongbytes.com>
X-Original-To: tls@mail2.ietf.org
Delivered-To: tls@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id AD2F5DC6074 for <tls@mail2.ietf.org>; Tue, 18 Mar 2025 03:33:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level:
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_SBL_A=0.1] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=amongbytes.com
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mBrfk0CnwlEm for <tls@mail2.ietf.org>; Tue, 18 Mar 2025 03:33:04 -0700 (PDT)
Received: from 2.mo579.mail-out.ovh.net (2.mo579.mail-out.ovh.net [178.33.110.43]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id 98682DC50D2 for <tls@ietf.org>; Tue, 18 Mar 2025 03:30:52 -0700 (PDT)
Received: from mxplan8.mail.ovh.net (unknown [10.109.176.197]) by mo579.mail-out.ovh.net (Postfix) with ESMTPS id 4ZH7Qz3Hmgz1M9G; Tue, 18 Mar 2025 10:30:51 +0000 (UTC)
Received: from amongbytes.com (37.59.142.100) by mxplan8.mail.ovh.net (172.16.2.31) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256) id 15.1.2507.44; Tue, 18 Mar 2025 11:30:49 +0100
Authentication-Results: garm.ovh; auth=pass (GARM-100R00342943bab-4b53-43e9-99a7-cc31576fd8cd, 2F3BDFB9BE39FFA33C843EF26A4DEB8C0DD83281) smtp.auth=kris@amongbytes.com
X-OVh-ClientIp: 31.133.130.51
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0 (Mac OS X Mail 16.0 \(3818.100.11.1.3\))
From: Kris Kwiatkowski <kris@amongbytes.com>
In-Reply-To: <GVXPR07MB9678E29CF1D00E59164EB89089D72@GVXPR07MB9678.eurprd07.prod.outlook.com>
Date: Tue, 18 Mar 2025 17:30:36 +0700
Content-Transfer-Encoding: quoted-printable
Message-ID: <85F8F286-84E1-4570-8248-7C9A17F68E34@amongbytes.com>
References: <GVXPR07MB9678E29CF1D00E59164EB89089D72@GVXPR07MB9678.eurprd07.prod.outlook.com>
To: John Mattsson <john.mattsson=40ericsson.com@dmarc.ietf.org>
X-Mailer: Apple Mail (2.3818.100.11.1.3)
X-Ovh-Tracer-GUID: ab3e7c3c-2c4c-4c00-907b-978d43a3bf50
X-Ovh-Tracer-Id: 5429933779111559066
X-VR-SPAMSTATE: OK
X-VR-SPAMSCORE: 49
X-VR-SPAMCAUSE: gggruggvucftvghtrhhoucdtuddrgeefvddrtddtgddugedvvddtucetufdoteggodetrfdotffvucfrrhhofhhilhgvmecuqfggjfdpvefjgfevmfevgfenuceurghilhhouhhtmecuhedttdenucgoufhushhpvggtthffohhmrghinhculdegledmnecujfgurheptggguffhjgffvefgkfhfvffosehtqhhmtdhhtdejnecuhfhrohhmpefmrhhishcumfifihgrthhkohifshhkihcuoehkrhhishesrghmohhnghgshihtvghsrdgtohhmqeenucggtffrrghtthgvrhhnpeehueeugeffueevkeethfejieeiteethfekveeghedvteelffdvveffgeekteejueenucffohhmrghinhepghhithhhuhgsrdgtohhmpdhgihhthhhusgdrihhopdhivghtfhdrohhrghenucfkphepuddvjedrtddrtddruddpfedurddufeefrddufedtrdehuddpfeejrdehledrudegvddruddttdenucevlhhushhtvghrufhiiigvpedtnecurfgrrhgrmhepihhnvghtpeduvdejrddtrddtrddupdhmrghilhhfrhhomhepkhhrihhssegrmhhonhhgsgihthgvshdrtghomhdpnhgspghrtghpthhtohepvddprhgtphhtthhopehjohhhnhdrmhgrthhtshhsohhnpeegtdgvrhhitghsshhonhdrtghomhesughmrghrtgdrihgvthhfrdhorhhgpdhrtghpthhtohepthhlshesihgvthhfrdhorhhgpdfovfetjfhoshhtpehmohehjeelmgdpmhhouggvpehsmhhtphhouhht
DKIM-Signature: a=rsa-sha256; bh=RPKbb+xHfNiszhY3jcvG1dZ8N2PWL/EEUOAdYyoH7z8=; c=relaxed/relaxed; d=amongbytes.com; h=From; s=ovhmo2671616-selector1; t=1742293851; v=1; b=brAbTtmQpyU9pMTRSCvmi65pca1g4DRmRV2lW1DEcSKSzbFSx59DQ8TK5wKU8mWFKUdRmEQB r3vkV5AgmLDozo34Q9Xbx71jpZQsJN042WYpiJndPQIpttm/KPWxaLlZjGHNvaQH1pnFOoTj2Ai XsSu2FGZ/AWj0hMGFY8FgTlDnZWrAAMo+ENd8yxYTr2s7ZMG0pdLVX3IPbmkFhJdHa/C3pjYXss C5sVjH95RhELnDmNm9qOqHehshjECdamiaWqg1P01TNfUp9kAnGXtji9IEYbXRYZ0gdW9aeh9Px UAIqY5gvfaX48YpLFFdWS54uCOa6kFr1A1o9rpLsqhgxA==
Message-ID-Hash: EQ46USEP2KUMKP7T2S7XRJ22KH3HWTLE
X-Message-ID-Hash: EQ46USEP2KUMKP7T2S7XRJ22KH3HWTLE
X-MailFrom: kris@amongbytes.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tls.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: "TLS@ietf.org" <tls@ietf.org>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [TLS] Re: I-D Action: draft-kwiatkowski-tls-ecdhe-mlkem-03.txt
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/6S3Ht3AxtdsVVMMw2yXgg17NlEc>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Owner: <mailto:tls-owner@ietf.org>
List-Post: <mailto:tls@ietf.org>
List-Subscribe: <mailto:tls-join@ietf.org>
List-Unsubscribe: <mailto:tls-leave@ietf.org>
Hi John, Thanks for reporting that (again). Indeed, I was hoping this text could be added to draft-ietf-tls-hybrid-design. Please, let me know if this text properly addresses your concern: https://github.com/post-quantum-cryptography/draft-kwiatkowski-tls-ecdhe-mlkem/pull/35 Cheers, Kris > On 9 Mar 2025, at 19:33, John Mattsson <john.mattsson=40ericsson.com@dmarc.ietf.org> wrote: > > Hi, > When using X25519MLKEM768, I would like to know that the other peer is not reusing its key share (as long as it is compliant). As a server reusing a key share can have catastrophic security consequences for the client, I think this is a _very_ reasonable request. > https://emanjon.github.io/NIST-comments/2025%20-%20SP%20800-227.pdf > I don't care about x25519, secp256r1, etc., We are planning to support X25519MLKEM768 as soon as possible and then disable all groups that are not quantum-resistant as soon as possible. I also don’t care about SecP256r1MLKEM768 and SecP384r1MLKEM1024 as we are not planning to support them. > I don't care about what other people do. If someone want to use (semi-)static keys for performance or visibility, that is fine with me as long as I have the option to not communicate with such implementations. > I see three solutions: > 1. Add normative text for X25519MLKEM768, MUST NOT reuse key share. > 2. Add signaling that the key share is reused so peers have the option to abort the connection (similar to draft-rhrd-tls-tls13-visibility). > 3. Register two different X25519MLKEM768 groups. One forbidding reuse and one allowing reuse (similar to TLS_ECDHE_ECDSA vs. TLS_ECDH_ECDSA). > I find the current situation of key shares being reused without the other peer knowing inacceptable and frankly the worst possible option. > As the old PRs were closed in the hope the issue was already solved and changes to draft-ietf-tls-hybrid-design does not solve the issue unless normatively referenced form draft-kwiatkowski-tls-ecdhe-mlkem, I opened a new issue. > https://github.com/post-quantum-cryptography/draft-kwiatkowski-tls-ecdhe-mlkem/issues/34 > Cheers, > John > On 2024-12-25, 07:08, "internet-drafts@ietf.org" <internet-drafts@ietf.org> wrote: > Internet-Draft draft-kwiatkowski-tls-ecdhe-mlkem-03.txt is now available. > Title: Post-quantum hybrid ECDHE-MLKEM Key Agreement for TLSv1.3 > Authors: Kris Kwiatkowski > Panos Kampanakis > Bas Westerbaan > Douglas Stebila > Name: draft-kwiatkowski-tls-ecdhe-mlkem-03.txt > Pages: 9 > Dates: 2024-12-24 > Abstract: > This draft defines three hybrid key agreements for TLS 1.3: > X25519MLKEM768, SecP256r1MLKEM768, and SecP384r1MLKEM1024 which > combine a post-quantum KEM with an elliptic curve Diffie-Hellman > (ECDHE). > The IETF datatracker status page for this Internet-Draft is: > https://datatracker.ietf.org/doc/draft-kwiatkowski-tls-ecdhe-mlkem/ > There is also an HTML version available at: > https://www.ietf.org/archive/id/draft-kwiatkowski-tls-ecdhe-mlkem-03.html > A diff from the previous version is available at: > https://author-tools.ietf.org/iddiff?url2=draft-kwiatkowski-tls-ecdhe-mlkem-03 > Internet-Drafts are also available by rsync at: > rsync.ietf.org::internet-drafts > _______________________________________________ > TLS mailing list -- tls@ietf.org > To unsubscribe send an email to tls-leave@ietf.org -- Kris Kwiatkowski Cryptography Dev
- [TLS] FW: I-D Action: draft-kwiatkowski-tls-ecdhe… John Mattsson
- [TLS] Re: I-D Action: draft-kwiatkowski-tls-ecdhe… Salz, Rich
- [TLS] Re: FW: I-D Action: draft-kwiatkowski-tls-e… Viktor Dukhovni
- [TLS] Re: FW: I-D Action: draft-kwiatkowski-tls-e… John Mattsson
- [TLS] Re: FW: I-D Action: draft-kwiatkowski-tls-e… Viktor Dukhovni
- [TLS] Re: FW: I-D Action: draft-kwiatkowski-tls-e… John Mattsson
- [TLS] Re: FW: I-D Action: draft-kwiatkowski-tls-e… Viktor Dukhovni
- [TLS] Re: FW: I-D Action: draft-kwiatkowski-tls-e… Salz, Rich
- [TLS] Re: FW: I-D Action: draft-kwiatkowski-tls-e… D. J. Bernstein
- [TLS] Re: FW: I-D Action: draft-kwiatkowski-tls-e… Viktor Dukhovni
- [TLS] Re: FW: I-D Action: draft-kwiatkowski-tls-e… Peter C
- [TLS] Re: FW: I-D Action: draft-kwiatkowski-tls-e… Viktor Dukhovni
- [TLS] Re: FW: I-D Action: draft-kwiatkowski-tls-e… Dang, Quynh H. (Fed)
- [TLS] Re: FW: I-D Action: draft-kwiatkowski-tls-e… D. J. Bernstein
- [TLS] Re: FW: I-D Action: draft-kwiatkowski-tls-e… John Mattsson
- [TLS] Re: FW: I-D Action: draft-kwiatkowski-tls-e… D. J. Bernstein
- [TLS] Re: I-D Action: draft-kwiatkowski-tls-ecdhe… Kris Kwiatkowski
- [TLS] Re: I-D Action: draft-kwiatkowski-tls-ecdhe… Viktor Dukhovni
- [TLS] Re: I-D Action: draft-kwiatkowski-tls-ecdhe… Filippo Valsorda
- [TLS] Re: I-D Action: draft-kwiatkowski-tls-ecdhe… Eric Rescorla
- [TLS] Re: I-D Action: draft-kwiatkowski-tls-ecdhe… Bas Westerbaan