[TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (Ends 2025-11-26)

John Mattsson <john.mattsson@ericsson.com> Sun, 30 November 2025 08:57 UTC

Return-Path: <john.mattsson@ericsson.com>
X-Original-To: tls@mail2.ietf.org
Delivered-To: tls@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 02DBD929BD42 for <tls@mail2.ietf.org>; Sun, 30 Nov 2025 00:57:12 -0800 (PST)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.096
X-Spam-Level:
X-Spam-Status: No, score=-2.096 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=ericsson.com
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id omQI4jicTWxS for <tls@mail2.ietf.org>; Sun, 30 Nov 2025 00:57:11 -0800 (PST)
Received: from DUZPR83CU001.outbound.protection.outlook.com (mail-northeuropeazon11012058.outbound.protection.outlook.com [52.101.66.58]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-384) server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id 1BE63929BD25 for <tls@ietf.org>; Sun, 30 Nov 2025 00:57:10 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=NtgdwoIYzJFFapbaXODpIl1iZWSxtZZ1HNAtS1rKFIyypJB4FGDBCb6+illwA5OyvSw1qlwckYPDSg03GuD3/UMdmcJCUXZlN2s+UjycMpYV9I/TETml7aYj9FHaar+2Niw+BWuuIFgQ/PbK1HkSZp3NF/RAEtOsHWsFzca/fRAUXuz+ViF4lu+7MxlKitnhm4rekfTZRYD9jU2/WWti8dZifVkRI+5BbejWzZvw2iksfnndXDQVP6EzXM8WRjftgs1iGE3P8INZPgM6f+NTmjVsPm1701njFf9rodaarqR1BauvZqw6SdXHm6QPXnn1dTNwaQmC2MiFHYcy6zWcDw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=GeDaWqY2IluyMz6nHLrMroehCE0yvqSNvq4WhSA4VnM=; b=IhtHBF1PD7zMocEdOVabc1k+fJpXdxIfRWs0tQerLlSg/xo4JzLE/CArPr5kbEiQbaXDKMHj4sFzfDxFY0jDXJ51uYL9bv7W83Ym8uTd1N7WFK70h+GNqBaxHPtpDQqY4DX2G1cQAXb32hnCSXnDuCUr/DxrcjWWsFo+lQsSyoz8HTmZtuDe5q0mLuWh1FHx4N55HP7hMNUMnzw14vgtqSRnI2gNrjP+IbS79+VzUnsUBADgTFAnby59qx42HEzWb8PBBqWBCo9ktx06pfN8U0BR6HTWlqqjjTUinv19Brp9WwxdUlv3UKsYusvkvwe6IobfC3cP0WF3U+p4b2GCyg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ericsson.com; dmarc=pass action=none header.from=ericsson.com; dkim=pass header.d=ericsson.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=GeDaWqY2IluyMz6nHLrMroehCE0yvqSNvq4WhSA4VnM=; b=wbaqUQoWkem5l7c6lwYerJitya4TLPEA07v34YDecYH4nRy8d7BtTMMg+RunJT1N0zWRWyqgS8jo3wALMYgvhe+IlldcgEtn2f+3A6LptKO5o5bHlGgfPX0vv7Jp9Rad2avrdOz04HMTdSk+yaq4xGyPHVy7zu5XHdAQ0dweP2u6Dy/5J1K1UdEd9KwhC5rCS3C3ks7vAMIKdhYrhKp4Z8XfjbEt0B+7cqr65G8doMuCjX5aB/2aBqWt31p9BZSW89L593lq05ap10l1Mc4dXe5E9pqwlAiZntm6x1Y+nUO1ctB6FfuTdIGkcMFdbUy6fY4G20Jt0cG3ZlT78QCSTQ==
Received: from GVXPR07MB9678.eurprd07.prod.outlook.com (2603:10a6:150:114::10) by GVXPR07MB10054.eurprd07.prod.outlook.com (2603:10a6:150:11f::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9366.17; Sun, 30 Nov 2025 08:57:01 +0000
Received: from GVXPR07MB9678.eurprd07.prod.outlook.com ([fe80::bcf3:3f45:888e:a4b8]) by GVXPR07MB9678.eurprd07.prod.outlook.com ([fe80::bcf3:3f45:888e:a4b8%3]) with mapi id 15.20.9366.012; Sun, 30 Nov 2025 08:57:00 +0000
From: John Mattsson <john.mattsson@ericsson.com>
To: Muhammad Usama Sardar <muhammad_usama.sardar@tu-dresden.de>, Eric Rescorla <ekr@rtfm.com>, "tls@ietf.org" <tls@ietf.org>
Thread-Topic: [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (Ends 2025-11-26)
Thread-Index: AQHcXZdeQBPyhE37cE2C33OwvtXsX7UDCVkAgAGd4TaAAD/ngIAAQ1iAgAHHDoCAABz8gIAAfeeAgAENgQCAACjMgIAAnK5BgAGSPRc=
Date: Sun, 30 Nov 2025 08:57:00 +0000
Message-ID: <GVXPR07MB9678B6A380F89573725AF14789DAA@GVXPR07MB9678.eurprd07.prod.outlook.com>
References: <CABcZeBNNsGEKSMcAyfnTyxCZLXxsBZT-u0adtn+5KyPMKm8wNw@mail.gmail.com> <20251128045939.466639.qmail@cr.yp.to> <CABcZeBO=JVUgHNph=yrv9ocTPn6Xd5xME=v=VAy-GiOaLgsihA@mail.gmail.com> <c3511e79-7fdc-4006-a6a5-f0b74645590f@tu-dresden.de> <GVXPR07MB9678CCCA73654597036A618F89DDA@GVXPR07MB9678.eurprd07.prod.outlook.com>
In-Reply-To: <GVXPR07MB9678CCCA73654597036A618F89DDA@GVXPR07MB9678.eurprd07.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-reactions: allow
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=ericsson.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: GVXPR07MB9678:EE_|GVXPR07MB10054:EE_
x-ms-office365-filtering-correlation-id: fecd429c-3c35-489d-7039-08de2fee6ce6
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;ARA:13230040|1800799024|366016|376014|38070700021|8096899003|7053199007;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:GVXPR07MB9678.eurprd07.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(366016)(376014)(38070700021)(8096899003)(7053199007);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_GVXPR07MB9678B6A380F89573725AF14789DAAGVXPR07MB9678eurp_"
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: GVXPR07MB9678.eurprd07.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: fecd429c-3c35-489d-7039-08de2fee6ce6
X-MS-Exchange-CrossTenant-originalarrivaltime: 30 Nov 2025 08:57:00.8879 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 5Lme+8ftNaVCQk7s7t/HYyG5Sak+NaFC+adK5rQiIDv7TfPQiVAR+3PTF8IE0wpGRZnnqIvxUKg5yQ2zKltFx2Ft6dQ0580pK5lT9ecXaFI=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: GVXPR07MB10054
Message-ID-Hash: HR6IKVLHKZNVD4NLPZNR6W6REYFBKLID
X-Message-ID-Hash: HR6IKVLHKZNVD4NLPZNR6W6REYFBKLID
X-MailFrom: john.mattsson@ericsson.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tls.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (Ends 2025-11-26)
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/H8jnTqglI11ZSvS9J8mSg8TIJ1k>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Owner: <mailto:tls-owner@ietf.org>
List-Post: <mailto:tls@ietf.org>
List-Subscribe: <mailto:tls-join@ietf.org>
List-Unsubscribe: <mailto:tls-leave@ietf.org>

If you interpret the word “standard” as defined in United Nations A-HRC-53-42,

"The term “standard” refers to an agreed norm defining a way of doing something in a repeatable manner."

the current text is already very allowing. I don’t think any change is needed.

Cheers,
John Preuß Mattsson

From: John Mattsson <john.mattsson=40ericsson.com@dmarc.ietf.org>
Date: Saturday, 29 November 2025 at 09:53
To: Muhammad Usama Sardar <muhammad_usama.sardar@tu-dresden.de>, Eric Rescorla <ekr@rtfm.com>, tls@ietf.org <tls@ietf.org>
Subject: [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (Ends 2025-11-26)

>Assuming this is somehow super important: To resolve this and move on
(WGLC ended 2 days ago), IMHO we could possibly have a short draft
defining "application profile standard" and clarifying how the WG
interprets it and the caveats around that. I volunteer to create an
initial draft based on what I understood from Ekr and John. That draft
would probably save us all some time.

I don’t think this discussion is directly related to draft-ietf-tls-mlkem — it’s fundamentally an RFC 8446 question.

I am mostly fine with the existing text, “In the absence of an application profile standard specifying otherwise,” since this formulation works well for telecom SDOs such as 3GPP, GSMA, ETSI, ORAN, and others.

If any changes are made, I would suggest removing the word “standard” in RFC 8446bis. Requiring IoT applications to support three signature algorithms (rsa_pkcs1_sha256, rsa_pss_rsae_sha256, and ecdsa_secp256r1_sha256) is not particularly constrained, and obligating IoT applications to go through a formal SDO and publish an application profile to avoid this requirement seems unnecessarily burdensome.

Cheers,
John Preuß Mattsson

From: Muhammad Usama Sardar <muhammad_usama.sardar@tu-dresden.de>
Date: Saturday, 29 November 2025 at 00:31
To: Eric Rescorla <ekr@rtfm.com>, tls@ietf.org <tls@ietf.org>
Subject: [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (Ends 2025-11-26)


FWIW: Everything Ekr is saying below sounds reasonable to me. In particular, I also believe mixing and matching definitions from two very different SDOs can only lead to more ambiguities.

Also, in the thread, Ekr has mentioned twice that MTI is not super important. I have some difficulty following D. J. Bernstein but as far as I understand, I haven't seen any clear response to that (sincere apologies if I have missed/misunderstood something).

Assuming this is somehow super important: To resolve this and move on (WGLC ended 2 days ago), IMHO we could possibly have a short draft defining "application profile standard" and clarifying how the WG interprets it and the caveats around that. I volunteer to create an initial draft based on what I understood from Ekr and John. That draft would probably save us all some time.

D. J. Bernstein, could you please clarify if that would address your concern? Appreciate a concise (ideally binary) answer. If not, could you please tell precisely and concisely what would address your concern?

-Usama

On 28.11.25 22:04, Eric Rescorla wrote:
I'm not sure I agree with that interpretation of the situation in
ETSI, but I also don't think it's useful to try to import a definition
of "profile" from another SDO with different practices, so I don't
see much point in debating what is happening in ETSI.


On the text itself, we have:

   In the absence of an application profile standard specifying
   otherwise:

   A TLS-compliant application MUST implement the TLS_AES_128_GCM_SHA256
   [GCM] cipher suite and SHOULD implement the TLS_AES_256_GCM_SHA384
   [GCM] and TLS_CHACHA20_POLY1305_SHA256 [RFC8439] cipher suites (see
   Appendix B.4).

   A TLS-compliant application MUST support digital signatures with
   rsa_pkcs1_sha256 (for certificates), rsa_pss_rsae_sha256 (for
   CertificateVerify and certificates), and ecdsa_secp256r1_sha256.  A
   TLS-compliant application MUST support key exchange with secp256r1
   (NIST P-256) and SHOULD support key exchange with X25519 [RFC7748].

I think the text makes clear that an "application profile standard"
can override the following requirements, but all those requirements do
is require you to do things, so the only way to override the
requirements is to *not* require you to do things. Even without the
prefatory text, applications that use TLS could impose new
requirements for the use of TLS with those applications.[0]

WRT to the hypothetical example you propose: I think a WG specifying
"TLS over X" could in fact make X25519 the requirement for "TLS over
X" but not for TLS generally (this is the meaning of "application
profile" in this context). Indeed, that's what the HTTP/2 example I
gave does, except replacing TLS_RSA_WITH_AES_128_CBC_SHA with
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 for use with HTTP/2.  I agree
with you that the TLS WG possibly would not have agreed to change the
MTI generally for TLS 1.2.  In general, it's hard to change MTIs for
existing protocols because that can put preexisting implementations in
a state of noncompliance, albeit with the updated
specification. However, that isn't a problem for new protocol X over
TLS.

Regardless, I don't think that the HTTP WG required the assent of the
TLS WG specifically to require a new MTI for HTTP/2, as opposed to TLS
1.3 generally, which is what happened here. Rather, what was required
was IETF Consensus, which gets judged at IETF LC. Of course, if the
TLS WG was generally opposed, it is unlikely you would have IETF
Consensus. However, as a practical matter there was significant
overlap between the HTTP and TLS WGs and the selection of the new
MTI cipher suite for HTTP/2 matched the direction the TLS WG was
already going in for TLS 1.3.

-Ekr

[0] Even if I were to concede -- which I don't -- that profiles could
only "narrow" or "constrain", it's not clear to me that that would
preclude removing an MTI. After all, forbidding some non-MTI algorithm
would be narrowing things, so I think it's a matter of interpretation
whether removing an MTI would be narrowing things.