[TLS] Re: WG Adoption Call for ML-KEM Post-Quantum Key Agreement for TLS 1.3

Paul Wouters <paul@nohats.ca> Wed, 16 April 2025 13:36 UTC

Return-Path: <paul@nohats.ca>
X-Original-To: tls@mail2.ietf.org
Delivered-To: tls@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 1D1D31CFF9DE for <tls@mail2.ietf.org>; Wed, 16 Apr 2025 06:36:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -4.398
X-Spam-Level:
X-Spam-Status: No, score=-4.398 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (1024-bit key) header.d=nohats.ca
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id O7FHJATmXHWF for <tls@mail2.ietf.org>; Wed, 16 Apr 2025 06:36:23 -0700 (PDT)
Received: from mx.nohats.ca (mx.nohats.ca [193.110.157.85]) (using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id 2D3261CFF9D9 for <tls@ietf.org>; Wed, 16 Apr 2025 06:36:22 -0700 (PDT)
Received: from localhost (localhost [IPv6:::1]) by mx.nohats.ca (Postfix) with ESMTP id 4Zd29c5pPfzDK6 for <tls@ietf.org>; Wed, 16 Apr 2025 15:36:20 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nohats.ca; s=default; t=1744810580; bh=tErkXDx5ku1KAiL8wjBbu+3FY/MkemUad1ffv/yiA7U=; h=Date:From:To:Subject:In-Reply-To:References; b=PoKH4derOrVHuZZR0HgOnc4QwfQP4JAdppeHcqBbNHgBCoXGo9zdke+yWKgbFygpP BMWwl2liUKxaut/M4fK1y/t2vNCgKE7H5ohP0gnlK3dUvV5elqSFU8PX9LJplXl87W mlMa2vlOGqqz6Hv+9EW1vwwW10IPRKmnyi0u050w=
X-Virus-Scanned: amavisd-new at mx.nohats.ca
Received: from mx.nohats.ca ([IPv6:::1]) by localhost (mx.nohats.ca [IPv6:::1]) (amavisd-new, port 10024) with ESMTP id 0g_DjOeLmfhH for <tls@ietf.org>; Wed, 16 Apr 2025 15:36:18 +0200 (CEST)
Received: from bofh.nohats.ca (bofh.nohats.ca [193.110.157.194]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx.nohats.ca (Postfix) with ESMTPS for <tls@ietf.org>; Wed, 16 Apr 2025 15:36:18 +0200 (CEST)
Received: by bofh.nohats.ca (Postfix, from userid 1000) id A35DF14F624A; Wed, 16 Apr 2025 09:36:17 -0400 (EDT)
Received: from localhost (localhost [127.0.0.1]) by bofh.nohats.ca (Postfix) with ESMTP id 9E23C14F6249 for <tls@ietf.org>; Wed, 16 Apr 2025 09:36:17 -0400 (EDT)
Date: Wed, 16 Apr 2025 09:36:17 -0400
From: Paul Wouters <paul@nohats.ca>
To: tls@ietf.org
In-Reply-To: <20250415195351.229309.qmail@cr.yp.to>
Message-ID: <b78dda9e-72e8-f6a0-9391-47ce5f724f6f@nohats.ca>
References: <20250415195351.229309.qmail@cr.yp.to>
MIME-Version: 1.0
Content-Type: text/plain; format="flowed"; charset="US-ASCII"
Message-ID-Hash: ORNJ6ZNCV2IADPKO74KRLTHFLPFBYO37
X-Message-ID-Hash: ORNJ6ZNCV2IADPKO74KRLTHFLPFBYO37
X-MailFrom: paul@nohats.ca
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tls.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [TLS] Re: WG Adoption Call for ML-KEM Post-Quantum Key Agreement for TLS 1.3
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/RK1HQB7Y-WFBxQaAveeT7pHZbbc>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Owner: <mailto:tls-owner@ietf.org>
List-Post: <mailto:tls@ietf.org>
List-Subscribe: <mailto:tls-join@ietf.org>
List-Unsubscribe: <mailto:tls-leave@ietf.org>

[ Responding as AD, omitting disfunctional direct email address ]

On Tue, 15 Apr 2025, D. J. Bernstein wrote:

> Date: Tue, 15 Apr 2025 15:53:51
> From: D. J. Bernstein <djb@cr.yp.to>
> To: tls@ietf.org
> Subject: [TLS] Re: WG Adoption Call for ML-KEM Post-Quantum Key Agreement for
>     TLS 1.3
> 
> Sean Turner writes:
>> Hi! It looks like we have consensus to adopt this draft as a working
>> group item.
>
> Um, what? There were several people (including me) raising objections on
> list to basic flaws in this draft

The term "basic flaws" here is mis-used. There are no known "basic flaws"
in pure ML-KEM. If you know of a flaw, please present evidence in the
form of a proper reference to the flaw. Your preference for hybrid over
pure is not a "basic flaw", and those preferring hybrids can choose to
only use hybrids.

> , such as (1) the failure to provide an
> ECC backup to limit the damage from further security problems in the PQ
> layer

Not being a hybrid KEM is not a "basic flaw". The additional security
from hybrids comes at a complexity cost that people have different
opinions about. There will also obviously be differences of opinion on
when hybrids will have outlived their security premise in the future,
and so supporting both now and letting implementers make their own
choices on which defaults to use now and when to migrate in the future
is up to them. The TLS WG, along with CFRG backed by the larger
cryptography community will continue to play an advisory role here
over the next years.

> (2) the failure to provide an engineering justification for this option

This is your own made up condition. People who do not wish to rely on
pure PQ can already use a hybrid PQ. There are those who wish to use
pure PQs, and your reasons for not letting them are not widely supported
within the IETF or the TLS WG, as can be seen by other protocols also
implementing pure PQ algorithms.

> and (3) the lack of any principles that would justify saying no
> to options selected by other governments if this option is allowed.

This document does not set policy for other documents or governments,
so this "reason" is out of scope for the IETF.

> Your message doesn't explain how you came to the conclusion that there's
> consensus. Surely you aren't relying on some tally of positive votes to
> ram this document through while ignoring objections; voting isn't how
> IETF is supposed to work. So how _did_ you come to this conclusion?

I have reviewed the responses to this WGLC. There is clearly consensus
based on the 67 responses to the adoption call. I support the TLS WG Chairs
decision on calling consensus. If you wish to appeal the TLS WG Chairs
decision based on RFC 2026, Section 6.5.1 you may do so by contacting me
using a working email address. If you present no new information to your
appeal to the chairs, I would deny your appeal. My decision could then
be appealed with the IESG.

The vast majority was in favour of adoption, and this included several
vendors who stated they have implementations. There were further no
raised technical issues. There were a few dissenting opinions that
preferred pure PQ should not be done at all. Note that this document
does not set a mandatory to implement or RECOMMENDED Y option, allowing
those who wish to avoid pure PQ to keep avoiding these in the future.
Your arguments on whether hybrid is more secure than pure would be
valid arguments in a discussion about MTI or RECOMMENDED status.
However, this is not that discussion.

> As a procedural matter, this lack of explanation is in violation of
> "IETF activities are conducted with extreme transparency, in public
> forums". Please rectify this violation immediately. Also, please state
> the procedures for appealing your action. Thanks in advance.

There is no such violation, and you cherry-picking when to call
consensus evaluation "voting" depending on whether misnaming this
is in your advantage (eg recently on the ssh list) is dishonestly
manipulative and has no place on this list or anywhere else at the IETF.

Your insinuation that this WGLC was not conducted with "extreme
transparency" is in itself a violation of our code of conduct through
insinuations and a continuation of behaviour you have been warned
about recently by the TLS WG chairs, confirmed via me as the TLS AD,
and the IESG[1]. I recommend you voluntarily stop this kind of behaviour
to avoid triggering measures under the terms of RFC3934 which is part
of BCP25.

You are free to voice your dissent. You are not free to make up
accusations against process or individuals.

Paul Wouters, speaking as TLS Area Director

[1] https://datatracker.ietf.org/group/iesg/appeals/artifact/126