[TLS] Re: New Liaison Statement, "Liaison communication to IETF regarding draft-ietf-tls-mlkem"
Muhammad Usama Sardar <muhammad_usama.sardar@tu-dresden.de> Tue, 07 April 2026 23:15 UTC
Return-Path: <muhammad_usama.sardar@tu-dresden.de>
X-Original-To: tls@mail2.ietf.org
Delivered-To: tls@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 1EF95D7C6F37 for <tls@mail2.ietf.org>; Tue, 7 Apr 2026 16:15:39 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=ietf.org; s=ietf1; t=1775603739; bh=4WMRBr1HD6DBcQWJkIG1HbaE0Zc8vTxiTCVTOjP6Btw=; h=Date:From:Subject:To:CC:References:In-Reply-To; b=IYLpEySxz7LLAq6fi0xKdRXbn7ed8QFQVs215cOjRuC8VR13R7f/4FpkEj5CY/tIC hERVTaqWXE8YFeWYnPt5tsIYC3U35tfWZuQziNaBLoYHm7qGwBEnisOe7g5kgKDgLc 4YidwlhNC/bZmJETtnKguV8qUYlO92OWFwJj8k9I=
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -4.397
X-Spam-Level:
X-Spam-Status: No, score=-4.397 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_VALIDITY_CERTIFIED_BLOCKED=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=tu-dresden.de
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IKLWsQsQeUno for <tls@mail2.ietf.org>; Tue, 7 Apr 2026 16:15:37 -0700 (PDT)
Received: from mailout4.zih.tu-dresden.de (mailout4.zih.tu-dresden.de [141.30.67.75]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id B37A2D7C6F2C for <tls@ietf.org>; Tue, 7 Apr 2026 16:15:37 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=tu-dresden.de; s=dkim2022; h=Content-Type:In-Reply-To:References:CC:To: Subject:From:MIME-Version:Date:Message-ID:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=L7Bs4+SLORlLrZQWeH8Bpm2oIMcqTgMC1eR3B6Uldp4=; b=Vw7lo5r7xRJPdL8mr6SgbyJeLX G2+/AbuIiKiDI3Yg3paQj9cyMyO7JdGDhT/2NfWVrIZ7x3pEl81g+AkL5Zm7kWNOZdFRMStzirUu4 osv7s75jIlIHw2dAe3yTYe/94nO+0AOJ7G6MKX6QacdTokKdaEL8b5NXs06m9XugY30s+qchfXD35 HyFAXFJu3i0NT8VPyqhvN+tR+1GV0rEugX/nKzjIVwKFS+rx+yxVgZCR7PhpXKKY1Nzs9etwnkAzC DjiDcBubWTX/2a+wt/3b5xSahxIdfXW1BbLw6h0lv/r/cKIDVlZuiCSndOIV5e+lsEpL2Y2ygf+KR Jb+GNbtQ==;
Received: from msx-t422.msx.ad.zih.tu-dresden.de ([172.26.35.139] helo=msx.tu-dresden.de) by mailout4.zih.tu-dresden.de with esmtps (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.94.2) (envelope-from <muhammad_usama.sardar@tu-dresden.de>) id 1wAFds-005EZe-UV; Wed, 08 Apr 2026 01:15:34 +0200
Received: from [10.12.5.228] (141.76.13.149) by msx-t422.msx.ad.zih.tu-dresden.de (172.26.35.139) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.37; Wed, 8 Apr 2026 01:15:20 +0200
Message-ID: <fa8f9b78-7019-4b4e-b769-3348cf3daa05@tu-dresden.de>
Date: Wed, 08 Apr 2026 01:15:19 +0200
MIME-Version: 1.0
User-Agent: Mozilla Thunderbird
From: Muhammad Usama Sardar <muhammad_usama.sardar@tu-dresden.de>
To: Nico Williams <nico@cryptonector.com>
References: <CAPxHsS+fv2S_Ydub24AHnFJUESxkr=h1me5NEtdsZ4bCqAip-Q@mail.gmail.com> <5b703cb2-721b-485c-963a-c6661b40c4c8@tu-dresden.de> <59ADD91D-9A81-4DC5-A3B5-3D8C2747AB96@vigilsec.com> <3d933b83-2b0a-40ac-80b9-dd2cc15b4766@tu-dresden.de> <903E494F-9C92-45C9-ADB2-96456A88AF91@vigilsec.com> <dbf63a1c-f1e0-480e-90a5-67f74b661267@tu-dresden.de> <adQkkfDWpMYySub0@ubby> <60167faa-c4bd-4397-988d-8b226a73b705@tu-dresden.de> <adQ2C/gPwGutLSux@ubby> <5d3aba60-d52d-4408-a5a2-b1c8bd3a6c8d@tu-dresden.de> <adROgdd2QYDRIhDA@ubby>
Content-Language: en-US
In-Reply-To: <adROgdd2QYDRIhDA@ubby>
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg="sha-512"; boundary="------------ms080600040104070609070407"
X-ClientProxiedBy: MSX-T414.msx.ad.zih.tu-dresden.de (172.26.35.134) To msx-t422.msx.ad.zih.tu-dresden.de (172.26.35.139)
X-TUD-Virus-Scanned: mailout4.zih.tu-dresden.de
Message-ID-Hash: HZ5L3M2XKDVYIGLXUUDE6NEHOTFOBNJ4
X-Message-ID-Hash: HZ5L3M2XKDVYIGLXUUDE6NEHOTFOBNJ4
X-MailFrom: muhammad_usama.sardar@tu-dresden.de
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tls.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: "tls@ietf.org" <tls@ietf.org>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [TLS] Re: New Liaison Statement, "Liaison communication to IETF regarding draft-ietf-tls-mlkem"
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/QpuKvJA8Qy8OM0pPMNRBcaSEVsY>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Owner: <mailto:tls-owner@ietf.org>
List-Post: <mailto:tls@ietf.org>
List-Subscribe: <mailto:tls-join@ietf.org>
List-Unsubscribe: <mailto:tls-leave@ietf.org>
Hi Nico,
Now returning back to this email with the agreement:
Outer TLS: Network layer: use pure ML-KEM
Inner TLS: Application layer: use ML-KEM + ECDHE
Since Christian and John are talking about "link" layer, I'm lost
whether we are all talking about the same layering. But in this email, I
will continue with what we both agreed in [0,1], and later on spend some
cycles to understand what they are saying.
On 07.04.26 02:23, Nico Williams wrote:
> On Tue, Apr 07, 2026 at 01:19:45AM +0200, Muhammad Usama Sardar wrote:
>> On 07.04.26 00:39, Nico Williams wrote:
>>> We've seen this argument made before on this list. If you're double-
>>> encrypting, and each layer uses different algorithms...
>> Yes, I vaguely recall John mentioning this, but was that actually in hybrid
>> vs. non-hybrid context?
>>
>> My point was that if the overhead of adding ECDHE is considered unacceptable
>> (apparently that's the argument for use of pure PQ), the overhead of
>> creating two connections should be surely unacceptable. I would expect that
>> for systems where you want defense-in-depth (e.g., NSS -- see below), you
>> actually don't care about efficiency so much. The goal there is high
>> security.
> I'd expect that 802.11x key exchanges are infrequent and once connected
> asynchronous, so performance is less of a concern at that layer than at
> the application layer.
Let me translate that to RFC8446 terminology:
Handshake for outer TLS will not be so frequent, i.e., TLS "connections"
at network layer will be long-lived.
Why do you say "key exchanges" only? They should do "authentication" as
well, no? I mean full handshake, right?
What do you mean by "asynchronous"?Are you thinking about PSK-based
handshake?
> What I'm saying is that I am much less concerned about non-hybrid PQ at
> the network layer than at the application layer.
concerned in terms of performance or security?
>> So how exactly would double-encryption work in this context? You establish
>> pure PQ TLS at network layer -- that I understand. But can you share more
>> insights about the application layer TLS? Like, how does it distinguish the
>> control signals (TLS messages) of the /application layer TLS/ from the
>> actual application traffic? Does the application layer TLS reuse some of the
>> keys from the network layer TLS? What is the binding between the two?Are you
>> aware of any complete specifications?
> The application (e.g., a browser), just does TLS as usual with
> RECOMMENDED=Y algorithms and gets hybrid PQ.
This is what confused me and that's why I asked [0]. There is nothing in
hybrid with RECOMMENDED = Y. Maybe you mean once
draft-usama-tls-ecdhe-mlkem-update is published?
> The application is not
> aware of what security is provided by the network layer.
> Double encryption just happens because:
>
> a) the network (802.11x, IPsec) requires it policy-wise,
>
> b) the application uses TLS (or similar) independetly of the network
> being encrypted.
I am very lost now. I thought in [1], you agreed that there are two
nested TLS connections, i.e., TLS-over-TLS rather than TLS-over-IPSec.
Are you aware of any complete specs of such double encryption from which
I can create a model?
> ASIDE: Long ago I had wanted to be able to make use of network layer
> cryptography at the application layer, thus I wrote RFC 5056 (On
> Channel Bindings) to expand on RFC 2743's nebulous concept of
> channel binding.
After reading this, I realized that Nicolas == Nico 😇 I happen to be
your fan for this work 😉 because I have been researching channel
bindings (RFC5056 and RFC9266) recently.
> All of this was made unnecessary and obsolete by things like the
> disappearance of multi-user NFS clients, the appearance of NICs
> that can offload TCP and even TLS, etc.
For TLS, did you mean RFC9266?
>> Where are the keys of both TLS stored actually? Is there a real case that
>> the keys of one TLS (say network layer) will be leaked while the other one
>> not? If the keys are all stored at the same place, adding even 10 layers of
>> encryption is not helpful. So instead of doing double encryption, I believe
>> one should actually do attested TLS in post-handshake attestation topology
>> (draft-fossati-seat-expat), which provides a second root of trust, without
>> the need to re-establish a connection.
> No, compromise of one layer will not compromise the other. The two
> layers are independent.
I meant if server is compromised, then all keys of the server are
compromised, except if keys are stored in different storage mechanisms.
As I mentioned, our design of attested TLS provides an independent root
of trust. Maybe we can suggest IEEE 802.11 to do this, so that if their
ML-KEM thingy breaks, attestation can protect them.
>>> IIUC NSA mandates double-encryption.
>> My understanding is that it is for high-stake systems -- known as National
>> Security Systems (NSS). For non-NSS, it is not mandatory.
> I would expect that application-layer security is always mandatory, thus
> only network layer security would ever be optional. Given that, if the
> network uses non-hybrid PQ, it's not that big a deal.
Now I am even more lost. If network layer TLS is optional, there can be
active MITM, no?
So if there is no channel binding between the two layers, then how does
one endpoint know about the authentication done at other layer?
Best regards,
-Usama
[0] https://mailarchive.ietf.org/arch/msg/tls/zKFOBbA65wkZ7k2iQ6o_xmXarWk/
[1] https://mailarchive.ietf.org/arch/msg/tls/1Cj_Jb7eh9LVyIh42jyWcQD3IiU/
- [TLS] New Liaison Statement, "Liaison communicati… Liaison Statement Management Tool
- [TLS] Re: New Liaison Statement, "Liaison communi… Muhammad Usama Sardar
- [TLS] Re: New Liaison Statement, "Liaison communi… Russ Housley
- [TLS] Re: New Liaison Statement, "Liaison communi… Richard Barnes
- [TLS] Re: New Liaison Statement, "Liaison communi… Muhammad Usama Sardar
- [TLS] Re: New Liaison Statement, "Liaison communi… Nico Williams
- [TLS] Re: New Liaison Statement, "Liaison communi… Richard Barnes
- [TLS] Re: New Liaison Statement, "Liaison communi… David Benjamin
- [TLS] Re: New Liaison Statement, "Liaison communi… Eric Rescorla
- [TLS] Re: New Liaison Statement, "Liaison communi… David Benjamin
- [TLS] Re: New Liaison Statement, "Liaison communi… Russ Housley
- [TLS] Re: New Liaison Statement, "Liaison communi… John Mattsson
- [TLS] Re: New Liaison Statement, "Liaison communi… Salz, Rich
- [TLS] Re: New Liaison Statement, "Liaison communi… Eric Rescorla
- [TLS] Re: New Liaison Statement, "Liaison communi… Russ Housley
- [TLS] Re: New Liaison Statement, "Liaison communi… Eric Rescorla
- [TLS] Re: New Liaison Statement, "Liaison communi… Salz, Rich
- [TLS] Re: New Liaison Statement, "Liaison communi… Eric Rescorla
- [TLS] Re: New Liaison Statement, "Liaison communi… David Benjamin
- [TLS] Re: New Liaison Statement, "Liaison communi… Stephen Farrell
- [TLS] Re: New Liaison Statement, "Liaison communi… Eric Rescorla
- [TLS] Re: New Liaison Statement, "Liaison communi… Russ Housley
- [TLS] Re: New Liaison Statement, "Liaison communi… David Benjamin
- [TLS] Publish ML-KEM after all (Re: Re: New Liais… Nico Williams
- [TLS] Re: New Liaison Statement, "Liaison communi… Nico Williams
- [TLS] Re: New Liaison Statement, "Liaison communi… John Mattsson
- [TLS] Re: New Liaison Statement, "Liaison communi… Rob Sayre
- [TLS] Re: New Liaison Statement, "Liaison communi… Viktor Dukhovni
- [TLS] Re: New Liaison Statement, "Liaison communi… Stephen Farrell
- [TLS] Re: New Liaison Statement, "Liaison communi… Viktor Dukhovni
- [TLS] Re: New Liaison Statement, "Liaison communi… Stephen Farrell
- [TLS] Re: New Liaison Statement, "Liaison communi… Salz, Rich
- [TLS] Re: New Liaison Statement, "Liaison communi… Deirdre Connolly
- [TLS] Re: New Liaison Statement, "Liaison communi… Muhammad Usama Sardar
- [TLS] Re: New Liaison Statement, "Liaison communi… Viktor Dukhovni
- [TLS] Re: New Liaison Statement, "Liaison communi… Peter Gutmann
- [TLS] Re: New Liaison Statement, "Liaison communi… Daniel Apon
- [TLS] Re: [EXT] Re: New Liaison Statement, "Liais… Blumenthal, Uri - 0553 - MITLL
- [TLS] Re: New Liaison Statement, "Liaison communi… Muhammad Usama Sardar
- [TLS] Re: New Liaison Statement, "Liaison communi… Viktor Dukhovni
- [TLS] Re: New Liaison Statement, "Liaison communi… Deirdre Connolly
- [TLS] Re: New Liaison Statement, "Liaison communi… Muhammad Usama Sardar
- [TLS] Re: [EXT] Re: New Liaison Statement, "Liais… Blumenthal, Uri - 0553 - MITLL
- [TLS] Re: New Liaison Statement, "Liaison communi… Salz, Rich
- [TLS] Re: New Liaison Statement, "Liaison communi… Nico Williams
- [TLS] Re: New Liaison Statement, "Liaison communi… Salz, Rich
- [TLS] Re: New Liaison Statement, "Liaison communi… Nico Williams
- [TLS] Re: New Liaison Statement, "Liaison communi… Arnaud Taddei
- [TLS] Re: New Liaison Statement, "Liaison communi… Russ Housley
- [TLS] Re: New Liaison Statement, "Liaison communi… Muhammad Usama Sardar
- [TLS] Re: New Liaison Statement, "Liaison communi… Muhammad Usama Sardar
- [TLS] Re: New Liaison Statement, "Liaison communi… Nico Williams
- [TLS] Re: [EXT] Re: New Liaison Statement, "Liais… Daniel Apon
- [TLS] Re: [EXT] Re: New Liaison Statement, "Liais… Eric Rescorla
- [TLS] Re: New Liaison Statement, "Liaison communi… Nico Williams
- [TLS] Re: [EXT] Re: New Liaison Statement, "Liais… Daniel Apon
- [TLS] Re: [EXT] Re: New Liaison Statement, "Liais… Nico Williams
- [TLS] Re: New Liaison Statement, "Liaison communi… Muhammad Usama Sardar
- [TLS] Re: New Liaison Statement, "Liaison communi… Muhammad Usama Sardar
- [TLS] Re: [EXT] Re: New Liaison Statement, "Liais… Tim Hollebeek
- [TLS] Re: [EXT] Re: New Liaison Statement, "Liais… Nico Williams
- [TLS] Re: New Liaison Statement, "Liaison communi… Nico Williams
- [TLS] Re: New Liaison Statement, "Liaison communi… Russ Housley
- [TLS] Re: [EXT] Re: New Liaison Statement, "Liais… Nico Williams
- [TLS] Re: [EXT] Re: New Liaison Statement, "Liais… Daniel Apon
- [TLS] Re: [EXT] Re: New Liaison Statement, "Liais… Blumenthal, Uri - 0553 - MITLL
- [TLS] Re: New Liaison Statement, "Liaison communi… Muhammad Usama Sardar
- [TLS] Re: [EXT] Re: New Liaison Statement, "Liais… Blumenthal, Uri - 0553 - MITLL
- [TLS] Re: New Liaison Statement, "Liaison communi… S Moonesamy
- [TLS] Re: New Liaison Statement, "Liaison communi… S Moonesamy
- [TLS] Re: New Liaison Statement, "Liaison communi… Russ Housley
- [TLS] Re: New Liaison Statement, "Liaison communi… Muhammad Usama Sardar
- [TLS] Re: New Liaison Statement, "Liaison communi… Nico Williams
- [TLS] Re: New Liaison Statement, "Liaison communi… Muhammad Usama Sardar
- [TLS] Re: New Liaison Statement, "Liaison communi… Russ Housley
- [TLS] Re: New Liaison Statement, "Liaison communi… Muhammad Usama Sardar
- [TLS] Re: New Liaison Statement, "Liaison communi… Eric Rescorla
- [TLS] Re: New Liaison Statement, "Liaison communi… Nico Williams
- [TLS] Re: New Liaison Statement, "Liaison communi… Nico Williams
- [TLS] Re: New Liaison Statement, "Liaison communi… Christian Huitema
- [TLS] Re: New Liaison Statement, "Liaison communi… Muhammad Usama Sardar
- [TLS] Re: New Liaison Statement, "Liaison communi… Eric Rescorla
- [TLS] Re: New Liaison Statement, "Liaison communi… Russ Housley
- [TLS] Re: New Liaison Statement, "Liaison communi… John Mattsson
- [TLS] Re: New Liaison Statement, "Liaison communi… Daniel Apon
- [TLS] Re: New Liaison Statement, "Liaison communi… Muhammad Usama Sardar
- [TLS] Re: New Liaison Statement, "Liaison communi… Paul Wouters
- [TLS] Re: New Liaison Statement, "Liaison communi… Stephen Farrell
- [TLS] Re: New Liaison Statement, "Liaison communi… Nico Williams
- [TLS] Re: New Liaison Statement, "Liaison communi… Rob Sayre
- [TLS] Re: New Liaison Statement, "Liaison communi… Watson Ladd
- [TLS] Re: New Liaison Statement, "Liaison communi… Muhammad Usama Sardar
- [TLS] Re: New Liaison Statement, "Liaison communi… Daniel Apon
- [TLS] Re: New Liaison Statement, "Liaison communi… Eric Rescorla
- [TLS] Re: New Liaison Statement, "Liaison communi… Bas Westerbaan
- [TLS] Re: New Liaison Statement, "Liaison communi… Nico Williams
- [TLS] Re: New Liaison Statement, "Liaison communi… Viktor Dukhovni
- [TLS] Re: New Liaison Statement, "Liaison communi… Salz, Rich
- [TLS] Re: New Liaison Statement, "Liaison communi… Viktor Dukhovni
- [TLS] Re: New Liaison Statement, "Liaison communi… Nico Williams
- [TLS] Re: New Liaison Statement, "Liaison communi… Salz, Rich
- [TLS] Re: New Liaison Statement, "Liaison communi… Stephen Farrell
- [TLS] Re: New Liaison Statement, "Liaison communi… Salz, Rich
- [TLS] Re: New Liaison Statement, "Liaison communi… Muhammad Usama Sardar