[TLS] Re: Working Group Last Call for Post-quantum Hybrid ECDHE-MLKEM Key Agreement for TLSv1.3

David Adrian <davadria@umich.edu> Tue, 07 October 2025 18:54 UTC

Return-Path: <davadria@umich.edu>
X-Original-To: tls@mail2.ietf.org
Delivered-To: tls@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 30E886ED9F2C for <tls@mail2.ietf.org>; Tue, 7 Oct 2025 11:54:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -4.395
X-Spam-Level:
X-Spam-Status: No, score=-4.395 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=umich.edu
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cXwtDBDqJBzC for <tls@mail2.ietf.org>; Tue, 7 Oct 2025 11:54:11 -0700 (PDT)
Received: from acuminous-dwyfan.relay-egress.a.mail.umich.edu (relay-egress-host.us-east-2.a.mail.umich.edu [18.217.159.240]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id 680326ED9F12 for <tls@ietf.org>; Tue, 7 Oct 2025 11:54:11 -0700 (PDT)
Received: from casual-fomorian.authn-relay.a.mail.umich.edu (ip-10-0-74-81.us-east-2.compute.internal [10.0.74.81]) by acuminous-dwyfan.relay-egress.a.mail.umich.edu with ESMTPS id 68E561CD.1BCEA2FD.57E761E5.3596586; Tue, 07 Oct 2025 14:54:05 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=umich.edu; s=relay-2; t=1759863245; bh=xVAAQwYOJoZQjOI70qHm1pzZ9N6VpK2pwC1Y6KRhk/o=; h=References:In-Reply-To:From:Date:Subject:To:Cc; b=VxBDXf7eNFdbLHYLDJsdQpDn5W1cYku80PlANzdpxKnM499d35+nuzBFFkPGmku4+ hrVGSBA3SNl0anfDIfbEyQRnYRIahl+CNJ8nRDQUOhK7hSG03kOSPRbXLWe5tr73bV Rg/6WUhuZMFQuBXgt67+ZlJKtDv6Fz9m3+8uVgSFJ0qMJic+FYUl+ORn/babQSEeev y+Sgsv6HaQTn2XX8aKFEoaWiOG2jvM3TrttCiI0P7iTY2Z/BSi9+iIX2Y36DXClZ3F qhui0ZXY3kuGwAAAtnWXF947vMRkkj/UDwR1stxh4wiTA4WABtz9LB7tRdZHDMYJCj irBzUG9JYsfZQ==
Authentication-Results: casual-fomorian.authn-relay.a.mail.umich.edu; iprev=pass policy.iprev=209.85.217.50 (mail-vs1-f50.google.com); auth=pass smtp.auth=davadria
Received: from mail-vs1-f50.google.com (mail-vs1-f50.google.com [209.85.217.50]) by casual-fomorian.authn-relay.a.mail.umich.edu with ESMTPSA id 68E561CD.98C8B01.8E7EA04.2769796; Tue, 07 Oct 2025 14:54:05 -0400
Received: by mail-vs1-f50.google.com with SMTP id ada2fe7eead31-556f7e21432so5331818137.2 for <tls@ietf.org>; Tue, 07 Oct 2025 11:54:05 -0700 (PDT)
X-Forwarded-Encrypted: i=1; AJvYcCVJMOwtwqknvaM+eBsnOkzarRYWWSyEBPoiOPrXJ6kVn/Z+KuBExNl6nFNEyJi9zgZgfyo=@ietf.org
X-Gm-Message-State: AOJu0YydQpZH4skGo2i6FaY/TY3XmirJnX/dnQLL7BZ4hVoW4WewxDH7 p6ZeFHRgGqgIpsrBgJ6hG1rAr/q5h7cYBOO7/Yp6diZegkUGL2ojlR7SbAXPwQShkbg16jLi7jY DIghC/P6pps3k22gEgMtv+nn75Q054mg=
X-Google-Smtp-Source: AGHT+IH2afJHXmnB7B8qsllZnWTt+Ot3YoayqiDB7SbY0OG9RnMZrHG2np2PeNHRUrYNegfEkZvG47av+nArYZA9XH8=
X-Received: by 2002:a05:6102:580a:b0:5d3:fed4:b012 with SMTP id ada2fe7eead31-5d5e225c578mr300036137.15.1759863244490; Tue, 07 Oct 2025 11:54:04 -0700 (PDT)
MIME-Version: 1.0
References: <CAOgPGoA+c8kXDizwsvFG5tLz9+Kxk0HqiN1skKp5jMvvpxeu0Q@mail.gmail.com> <CABcZeBO+3u=1=ueNscq+O74Qv=7PC5NedsGsugp=GZjVqtODoQ@mail.gmail.com> <CAMjbhoVcxTfppSrkC27F8uf9hKvqTDBsG_-dzGtWbjia5YhmXw@mail.gmail.com> <aOVWcf9JFllri-vG@netmeister.org> <87h5wapnqf.fsf@josefsson.org> <CACsn0cmfNvqjD4QVUa_EKexCFqix83_NWYsMu=Hru4U6T5DGgg@mail.gmail.com>
In-Reply-To: <CACsn0cmfNvqjD4QVUa_EKexCFqix83_NWYsMu=Hru4U6T5DGgg@mail.gmail.com>
From: David Adrian <davadria@umich.edu>
Date: Tue, 07 Oct 2025 11:53:53 -0700
X-Gmail-Original-Message-ID: <CACf5n7_+xSY8wU-Ci3on9Rhm8rn0UauEcdfjFs6MrKw7pmXHmw@mail.gmail.com>
X-Gm-Features: AS18NWD3QMP0qYxg45_01IRYkjnh3597KPkNC1Xz8jpB7s3SC7L3sjLr1arEKOA
Message-ID: <CACf5n7_+xSY8wU-Ci3on9Rhm8rn0UauEcdfjFs6MrKw7pmXHmw@mail.gmail.com>
To: Watson Ladd <watsonbladd@gmail.com>
Content-Type: multipart/alternative; boundary="0000000000008a9335064096178e"
Message-ID-Hash: KW6RFVKEIFWVHCD2IBV5RYSD44VGU4SE
X-Message-ID-Hash: KW6RFVKEIFWVHCD2IBV5RYSD44VGU4SE
X-MailFrom: davadria@umich.edu
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tls.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: Simon Josefsson <simon=40josefsson.org@dmarc.ietf.org>, tls@ietf.org
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [TLS] Re: Working Group Last Call for Post-quantum Hybrid ECDHE-MLKEM Key Agreement for TLSv1.3
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/7JYmGZqVu7cuH7A3wN4_Yx_k9Pg>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Owner: <mailto:tls-owner@ietf.org>
List-Post: <mailto:tls@ietf.org>
List-Subscribe: <mailto:tls-join@ietf.org>
List-Unsubscribe: <mailto:tls-leave@ietf.org>

I believe the document is ready for publication. I am fine publishing
as-is, or with a X25519MLKEM768 as a Recommended=Y. I have no opinions on
the other key agreements.



On Tue, Oct 7, 2025 at 11:44 AM Watson Ladd <watsonbladd@gmail.com> wrote:

> I haven't seen anyone say they don't want to see a Y by
> X25519MLKEM768. Since this is the widespread and adopted solution
> right now, we should do everything we can to encourage use, and punt
> on the harder question of what other hybrids to recommend.
>
> On Tue, Oct 7, 2025 at 11:32 AM Simon Josefsson
> <simon=40josefsson.org@dmarc.ietf.org> wrote:
> >
> > The discussion below suggests to me that X25519MLKEM768 is the running
> > code de-facto algorithm that ought to be on the Standards Track and
> > Recommended=Y and the other variants should be split off to a separate
> > Informational document with Recommended=N for niche usage.
> >
> > I believe generally that we need multiple PQ-safe hybrids as Standards
> > Track and MUST/Recommended algorithms for all our Internet security
> > protocols like TLS, SSH, etc, so I would encourage deployment of
> > additional PQ-safe hybrids for TLS.  Settling with X25519MLKEM768 only
> > is not the final solution.
> >
> > Mitigating algorithm profileration is a consideration, but security
> > heding is more important.  It would be nice to get X25519 combined with
> > FrodoKEM, Classic McEliece, SNTRU, and more deployed for TLS too, so we
> > have options.  I believe it makes more sense to add some other PQ KEM as
> > a StandardsTrack/MUST/Recommended than to have SecP256MLKEM768 there.
> > In fact, I would go further and say that we should progress two at the
> > same time, to not get into a single point of failure situation.
> >
> > /Simon
> >
> > Jan Schaumann <jschauma=40netmeister.org@dmarc.ietf.org> writes:
> >
> > > Bas Westerbaan <bas=40cloudflare.com@dmarc.ietf.org> wrote:
> > >> This is the breakdown of client support Cloudflare sees (relative to
> any PQ
> > >> support) in the last 24 hours by handshakes:
> > >>
> > >> 94% X25519MLKEM768
> > >> 8.1% X25519Kyber768
> > >> 0.038% MLKEM768
> > >> 0.014% CECPQ2
> > >> 0.012% MLKEM1024
> > >> 0.002% SecP384MLKEM1024
> > >> 0.002% SecP256MLKEM768
> > >> 0.00005% MLKEM512
> > >> 0.0000003% SecP256Kyber768
> > >
> > > [...]
> > >
> > >> I can see an argument for Recommended=Y for both X25519MLKEM768 and
> > >> SecP384MLKEM1024, but I do not see any value in recommending both
> > >> X25519MLKEM768 and SecP256MLKEM768.
> > >
> > > On the flip side, and as just some data points here, I
> > > recently did a check[1] of which sites/providers offer
> > > PQC, and what key groups they support.  Not
> > > surprisingly, it's almost all (and _only_)
> > > X25519MLKEM768.
> > >
> > > Amazon Cloudfront (as pretty much the only large
> > > service provider) offers SecP256r1MLKEM768.
> > >
> > > This is not surprising: AFAICT, the browsers only
> > > support X25519MLKEM768.  If no servers offer anything
> > > else, then browsers have no incentive to implement
> > > other key groups; if no browsers offer other
> > > keygroups, then servers have no incentive to offer
> > > them.
> > >
> > > -Jan
> > >
> > > [1] https://www.netmeister.org/blog/pqc-use-2025-09.html
> > >
> > > _______________________________________________
> > > TLS mailing list -- tls@ietf.org
> > > To unsubscribe send an email to tls-leave@ietf.org
> > _______________________________________________
> > TLS mailing list -- tls@ietf.org
> > To unsubscribe send an email to tls-leave@ietf.org
>
>
>
> --
> Astra mortemque praestare gradatim
>
> _______________________________________________
> TLS mailing list -- tls@ietf.org
> To unsubscribe send an email to tls-leave@ietf.org
>