[TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (Ends 2025-11-26)

Simon Josefsson <simon@josefsson.org> Mon, 24 November 2025 19:04 UTC

Return-Path: <simon@josefsson.org>
X-Original-To: tls@mail2.ietf.org
Delivered-To: tls@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 466CD8FAEF95; Mon, 24 Nov 2025 11:04:13 -0800 (PST)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -4.401
X-Spam-Level:
X-Spam-Status: No, score=-4.401 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=neutral reason="invalid (unsupported algorithm ed25519-sha256)" header.d=josefsson.org header.b="EC410VhI"; dkim=pass (2736-bit key) header.d=josefsson.org header.b="UAg6dJzY"
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id scZqyzEfW-th; Mon, 24 Nov 2025 11:04:11 -0800 (PST)
Received: from uggla.sjd.se (uggla.sjd.se [IPv6:2001:9b1:8633::107]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id 263D38FAEF0F; Mon, 24 Nov 2025 11:04:11 -0800 (PST)
DKIM-Signature: v=1; a=ed25519-sha256; q=dns/txt; c=relaxed/relaxed; d=josefsson.org; s=ed2303; h=Content-Type:MIME-Version:Message-ID:Date: References:In-Reply-To:Subject:Cc:To:From:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description; bh=uORX+7LqyREuk+co3er+Xg84c7YkCliw7Td6QAIrFFo=; t=1764011048; x=1765220648; b=EC410VhIITfrs8lnxirzf15ugRyhXrAMV7ob4bTgsh0G2nRUmqMfCwTSCLpzPvxCWjR91sVF9HQ c19IiE92FCw==;
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=josefsson.org; s=rsa2303; h=Content-Type:MIME-Version:Message-ID:Date: References:In-Reply-To:Subject:Cc:To:From:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description; bh=uORX+7LqyREuk+co3er+Xg84c7YkCliw7Td6QAIrFFo=; t=1764011048; x=1765220648; b=UAg6dJzYkthrLtd2GuFK4V05eh9KE39EcULQj/7eD08no771ijaaca756qndXQQxSHGZGt27GWw gDEi10Ku4lky7wVTzMItQ1+Ss76p6Lb4kBI9bvVkNMrS8lYiMdgIfxNSTcag0YWK9PgYqRc5qEsfV pOAi0BhYEwHN9qCGua0HqfMkKPCBKTL6U84Rb5Ej+1YaQhTocAGfS1nd0gJKCRp+dR04TZm0UPHuY 1Ci9cAljqBgvwWTcMKXQwBXukVcYkErrFuZ8GjK33fSXEO9xgy9vIUylC+CpBPhxkkiKm/YM6CFtk Fc6iwLD5gtVZLnlLzy6KV8tDC4b15KEc0FaNSGMgqaWkDkLtWNREnmNcyRoP4AVTeuPsEitPfNrlz 5SXswsK7d81CHgS6zlqWGWR0GtwO/bPw+iHLdZCiEiBvDZyGSkAfeK/roVGk6xpo5vFIp94Jp;
Received: from [2001:9b1:41ac:ff00:e334:bd75:39ad:df36] (port=51940 helo=kaka) by uggla.sjd.se with esmtpsa (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.95) (envelope-from <simon@josefsson.org>) id 1vNbqy-00HUDp-JB; Mon, 24 Nov 2025 19:04:00 +0000
From: Simon Josefsson <simon@josefsson.org>
To: Eric Rescorla <ekr@rtfm.com>
In-Reply-To: <CABcZeBMiXTGzNUZ54nEOe2K=MWTU2dxo-o0eoweKcf6av55Wrg@mail.gmail.com> (Eric Rescorla's message of "Mon, 24 Nov 2025 07:35:57 -0800")
References: <176236867319.904123.10146982018394612684@dt-datatracker-5df8666cb-7l4w5> <87see331ox.fsf@josefsson.org> <CABcZeBMiXTGzNUZ54nEOe2K=MWTU2dxo-o0eoweKcf6av55Wrg@mail.gmail.com>
OpenPGP: id=B1D2BD1375BECB784CF4F8C4D73CF638C53C06BE; url=https://josefsson.org/key-20190320.txt
X-Hashcash: 1:23:251124:simon=40josefsson.org@dmarc.ietf.org::UGC6fHxOaOC9+x4D:2Uss
X-Hashcash: 1:23:251124:tls-chairs@ietf.org::RuPS6kNITmGWF+nY:I2Jr
X-Hashcash: 1:23:251124:ekr@rtfm.com::WbryMU3QPPH0oZjR:MxYr
X-Hashcash: 1:23:251124:draft-ietf-tls-mlkem@ietf.org::YOIGgnPg9p/TiyyM:IzrN
X-Hashcash: 1:23:251124:tls@ietf.org::9miTS8qayAfl3GmI:0kxcU
Date: Mon, 24 Nov 2025 20:02:06 +0100
Message-ID: <87jyzf2r0x.fsf@josefsson.org>
User-Agent: Gnus/5.13 (Gnus v5.13)
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=-=-="; micalg="pgp-sha256"; protocol="application/pgp-signature"
Message-ID-Hash: 4QT72UFYCL3DSEPPXIZO7XWDYARPNQSW
X-Message-ID-Hash: 4QT72UFYCL3DSEPPXIZO7XWDYARPNQSW
X-MailFrom: simon@josefsson.org
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tls.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: draft-ietf-tls-mlkem@ietf.org, tls-chairs@ietf.org, tls@ietf.org
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (Ends 2025-11-26)
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/T3Wa2vbR5sTgu--M5dP7PtHwqeE>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Owner: <mailto:tls-owner@ietf.org>
List-Post: <mailto:tls@ietf.org>
List-Subscribe: <mailto:tls-join@ietf.org>
List-Unsubscribe: <mailto:tls-leave@ietf.org>

Eric Rescorla <ekr@rtfm.com> writes:

> On Mon, Nov 24, 2025 at 7:14 AM Simon Josefsson <simon=
> 40josefsson.org@dmarc.ietf.org> wrote:
>
>> We are having trouble getting safe hybrid PQ solutions published.  Until
>> we have a couple of widely deployed hybrid PQ KEMs published,
>> implemented and deployed, I don't think we should fragment the already
>> thin resources we have to reach that goal by spending further cycles on,
>> and then publish a fragile solutions like this.  Please prioritize a
>> non-NIST/MLKEM hybrid PQ KEM for TLS.  FrodoKEM?  Streamlined NTRU
>> Prime?  We need more hybrid PQ options.
>>
>
> Why? The general deployed pattern in TLS is to have a small number of
> dominant algorithms and we already have X25519+MLKEM widely deployed.
> Given that any particular connection can only be protected with a single
> algorithm, it's not clear to me how the world is improved by having multiple
> algorithms with roughly the same performance properties.

Historically, I believe we have been helped by having multiple security
options available to jump between when new security problems are
published.  We don't know the nature of future security problems,
therefor hedging by having a couple of alternatives readily available
may help.  There is a cost to that, but I think it is small price
compared to the risks involved.

> I could see some argument for having some algorithm with significantly
> different performance/security tradeoff (though as I understand it there are
> some practical challenges to adding Classic McEliece), but that doesn't
> seem to be what you're suggesting here.

I'm asking for that too, Classic McEliece can be another alternative.
Given that ML-KEM has a PQ KEM monopoly here, I think almost anything we
can add will be an improvement.

I think it may be that is actually EASIER to add another algorithm with
similar characteristics as MLKEM, such as Streamlined NTRU Prime or
FrodoKEM, because implementers will already have resolved those similar
concerns (buffer sizes, protocol limits, API concerns etc).  That's why
I picked those two.  I would like to have Classic McEliece too, because
for some non-web TLS applications, it offers better properties than the
others.  From a security hedging point of view, I agree adding something
widely different make more sense (like Classic McEliece), but I don't
see these as an either-or situation.

> More generally I am opposed to the IETF publishing any algorithm
> specification
> for TLS which has not been externally vetted. That could mean standardized
> elsewhere or sign-off by CFRG, but the TLS WG should not just be picking
> up algorithms without external review and adding them to TLS.

What do you mean by 'externally vetted'?  Who to judge the quality of
the external vetter?  OpenSSH uses Streamlined NTRU Prime for many
years, and SSH traffic is a high-value attack target.  BSI recommends
FrodoKEM and Classic McEliece, presumably leading to that high-value
attack targets in Germany uses them.  To me, those count as strong
examples of external vetting.

What I often see is a request like yours is pretty much the same as
saying that nobody except NIST have the resources to evaluate crypto
algorithms, and that we should trust them.  I think that is as unwise as
only trusting BSI or OpenSSH.

/Simon