[TLS] Re: Working Group Last Call for Post-quantum Hybrid ECDHE-MLKEM Key Agreement for TLSv1.3

Viktor Dukhovni <ietf-dane@dukhovni.org> Fri, 10 October 2025 17:42 UTC

Return-Path: <ietf-dane@dukhovni.org>
X-Original-To: tls@mail2.ietf.org
Delivered-To: tls@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 6BBA670DDBEC for <tls@mail2.ietf.org>; Fri, 10 Oct 2025 10:42:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -4.398
X-Spam-Level:
X-Spam-Status: No, score=-4.398 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (1024-bit key) header.d=dukhovni.org
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 99pDagrEjKuN for <tls@mail2.ietf.org>; Fri, 10 Oct 2025 10:42:53 -0700 (PDT)
Received: from chardros.imrryr.org (chardros.imrryr.org [144.6.86.210]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id 7E38370DDBE6 for <tls@ietf.org>; Fri, 10 Oct 2025 10:42:53 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=dukhovni.org; i=@dukhovni.org; q=dns/txt; s=f8320d6e; t=1760118169; h=date : from : to : subject : message-id : reply-to : references : mime-version : content-type : in-reply-to : content-transfer-encoding : from; bh=gUMEAQsDZ5Zqj3VXD2515N7OizuMMTlysGGAekTH5eQ=; b=Fx8+Gf98eEijhArZ0DzfaNb/3djU50ndIHvNTH6kOtv3ToCZ2qLdkI8BH5R00FRaM5Tk+ bSyi61gvGYpd5EPu48uzDoZ2q7cP5fH/O00YskMDFqnJU8HFog2aP5Ph249LVrxA7LIVxXT a/kj66aR32A9kV2lHw2qcjkWWX338MM=
Received: by chardros.imrryr.org (Postfix, from userid 1000) id 91AE4901F9D; Sat, 11 Oct 2025 04:42:49 +1100 (AEDT)
Date: Sat, 11 Oct 2025 04:42:49 +1100
From: Viktor Dukhovni <ietf-dane@dukhovni.org>
To: tls@ietf.org
Message-ID: <aOlFmQvBYM41p3vT@chardros.imrryr.org>
References: <CH8PR21MB5484275C3BC970292001CA5B8CEFA@CH8PR21MB5484.namprd21.prod.outlook.com> <20251010160156.115874.qmail@cr.yp.to>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
In-Reply-To: <20251010160156.115874.qmail@cr.yp.to>
Mail-Followup-To: <tls@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-ID-Hash: V54JU4N55ZDEVMJFF5TGWXRBAENKOXF2
X-Message-ID-Hash: V54JU4N55ZDEVMJFF5TGWXRBAENKOXF2
X-MailFrom: ietf-dane@dukhovni.org
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tls.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
X-Mailman-Version: 3.3.9rc6
Precedence: list
Reply-To: tls@ietf.org
Subject: [TLS] Re: Working Group Last Call for Post-quantum Hybrid ECDHE-MLKEM Key Agreement for TLSv1.3
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/LbcPjj_-jo6cJLUe8Xy_Os2rpyY>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Owner: <mailto:tls-owner@ietf.org>
List-Post: <mailto:tls@ietf.org>
List-Subscribe: <mailto:tls-join@ietf.org>
List-Unsubscribe: <mailto:tls-leave@ietf.org>

On Fri, Oct 10, 2025 at 04:01:56PM -0000, D. J. Bernstein wrote:

> Andrei Popov writes:
> > There are regulatory requirements that require NIST curves, whether
> > one likes them or not.
> 
> Can you please point to the "regulatory requirements" you have in mind,
> and explain why you believe that the requirements prohibit X25519MLKEM*?

IIRC, rumour has it that those who need a FIPS-validated stack, and have
only an older stack with P-256/P-384 validated, but ML-KEM not yet
validated, can get a validated combination via ML-KEM plus ECDSA, but
not ML-KEM with X25519 or X448.

I don't know which software stacks find themselves in this situation,
but what we do see is that these certainly are not showing in deployment
surveys in non-negligible numbers.  So the issue could be more
theoretical than practical.

FWIW, the only hybrid KEM enabled in OpenSSL 3.5+ TLS client and server
by default is "X25519MLKEM768".

-- 
    Viktor.  🇺🇦 Слава Україні!