[TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (Ends 2025-11-26)

"Kampanakis, Panos" <kpanos@amazon.com> Fri, 07 November 2025 18:32 UTC

Return-Path: <prvs=399bceee0=kpanos@amazon.com>
X-Original-To: tls@mail2.ietf.org
Delivered-To: tls@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 18A1D859352A; Fri, 7 Nov 2025 10:32:07 -0800 (PST)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.095
X-Spam-Level:
X-Spam-Status: No, score=-2.095 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=amazon.com
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pdelPWDJPxa2; Fri, 7 Nov 2025 10:32:06 -0800 (PST)
Received: from iad-out-008.esa.us-east-1.outbound.mail-perimeter.amazon.com (iad-out-008.esa.us-east-1.outbound.mail-perimeter.amazon.com [34.193.58.168]) (using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id 6564B85934B1; Fri, 7 Nov 2025 10:31:53 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amazon.com; i=@amazon.com; q=dns/txt; s=amazoncorp2; t=1762540313; x=1794076313; h=from:to:date:message-id:references:in-reply-to: mime-version:subject; bh=mj1uV/tZbObRqqDwGBivNOn2MNnusB7NPpxnbJ2z+cA=; b=OsYlORstso1yD4IhN7siRQesAtaPgkMpOrqSKylIe8D07JWOCT/2AaDn jLGS69xOJIUyGqb2W2t0cctbM7Cs2zruNRuw25I+SJ0jnGC+ZUOMVszyr psZrWqRkykZD4n2dd4EldQuLaZ0IETjDcX5EGk66XaIrq/n1kXvLbsNi0 IozWG0CV4kGglzxkXwJxOyFqZmMNruG68e+qH90C+rdtz6V0Nu8AJ/2wj EfsjFKDhEbi0ds7rEF1mgXdB13ptoknKqukhTP1eSvoFP1xIHu2Xmxum1 197ey5P3ki3uTOAfgoE7QViIxF7AJ+QTEZ6qevZoRuABaXsXSz0Sl6i45 g==;
X-CSE-ConnectionGUID: yiEZ4W2wTY+7jXTC0brq/Q==
X-CSE-MsgGUID: 53ynegGzTpeFdL1xHVc4Ng==
X-IronPort-AV: E=Sophos;i="6.19,287,1754956800"; d="scan'208,217";a="5793089"
Thread-Topic: [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (Ends 2025-11-26)
Received: from ip-10-4-22-235.ec2.internal (HELO smtpout.naws.us-east-1.prod.farcaster.email.amazon.dev) ([10.4.22.235]) by internal-iad-out-008.esa.us-east-1.outbound.mail-perimeter.amazon.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 07 Nov 2025 18:31:50 +0000
Received: from EX19MTAUEC002.ant.amazon.com [52.94.133.130:12385] by smtpin.naws.us-east-1.prod.farcaster.email.amazon.dev [10.0.19.136:2525] with esmtp (Farcaster) id 2dec6b55-44c8-4b94-a7c4-51e578b8b300; Fri, 7 Nov 2025 18:31:50 +0000 (UTC)
X-Farcaster-Flow-ID: 2dec6b55-44c8-4b94-a7c4-51e578b8b300
Received: from EX19EXOUEA002.ant.amazon.com (10.252.134.207) by EX19MTAUEC002.ant.amazon.com (10.252.135.253) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA) id 15.2.2562.29; Fri, 7 Nov 2025 18:31:49 +0000
Received: from SN1PR07CU001.outbound.protection.outlook.com (10.252.134.239) by EX19EXOUEA002.ant.amazon.com (10.252.134.207) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA) id 15.2.2562.29 via Frontend Transport; Fri, 7 Nov 2025 18:31:49 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=lHc5Z+KNT23V8xTCFosNaiKhNeQKrXbzsgEolvO/g/5ngaI1VbuMrrcAEE3/Jh/a9QEgclSQIkg1mfZ9nHsq7mf0ms9MeTQbA+CY22DH8hQBYZEA1KU20YMbrG3UkQ9xDj3DVdvEiaRtnS4bGevZoCcIVKZ1K31o8YLcLhRbaa99pguW5bsxYvyhiY8HVOM7vUOuPLgn0k1CF2mmBZpsI5wO7ruIkELDRWrBpXJNfAV7GrsbwX1zOPg0WYUTBDwCRCTFzqFeRPoMr77byDVWQjTS0vksJ07ZLqEn2Oxv5NMglYGAj4ZX9ATi38etDUbiMHNqEIlfTqSBU7VGn0kRyg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=mj1uV/tZbObRqqDwGBivNOn2MNnusB7NPpxnbJ2z+cA=; b=B2MfOkZKsMMdkayZQBMgQ4cWCTF+PeSv0jcfzPPtusKUo4lNi7f4UYwf+dnNiA56sUsjUCDm+biKv952gIsBgPSGyxVl1NVV3MDHmqmh2ujUCNcq7NFmHLkakun3SHQRzHQO2U74lSZK9b0oyjhW1Cqjx2OZ42HQx2P+D3NAwyGLbWWuTiiOH3j0ULmbmeMTUC9+cCHNEdvd+fl6U0Z6zi76EOwvHGJlRH1b4plwbZY//IWVfkS55or/gjbKqQxGhI+R4nPVwqa35bPtgaA15BJMq8d0NPM8YL0FItysdItYdD2ls5uP8ntVTxmIb0g1UxGqmu9eUhd/cKr94rGqkQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=amazon.com; dmarc=pass action=none header.from=amazon.com; dkim=pass header.d=amazon.com; arc=none
Received: from DM5PR18MB2326.namprd18.prod.outlook.com (2603:10b6:4:b9::33) by SA6PR18MB6204.namprd18.prod.outlook.com (2603:10b6:806:412::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9275.16; Fri, 7 Nov 2025 18:31:44 +0000
Received: from DM5PR18MB2326.namprd18.prod.outlook.com ([fe80::6dd6:86fd:258:83be]) by DM5PR18MB2326.namprd18.prod.outlook.com ([fe80::6dd6:86fd:258:83be%4]) with mapi id 15.20.9298.010; Fri, 7 Nov 2025 18:31:43 +0000
From: "Kampanakis, Panos" <kpanos@amazon.com>
To: John Mattsson <john.mattsson=40ericsson.com@dmarc.ietf.org>, "tls-chairs@ietf.org" <tls-chairs@ietf.org>, "draft-ietf-tls-mlkem@ietf.org" <draft-ietf-tls-mlkem@ietf.org>, "tls@ietf.org" <tls@ietf.org>, "sean@sn3rd.com" <sean@sn3rd.com>
Thread-Index: AQHcTx0gj90PVP78u0CF+2Yi+isj3LTmzUcAgAC6abA=
Date: Fri, 07 Nov 2025 18:31:43 +0000
Message-ID: <DM5PR18MB2326D766FA5A96FA87649263ABC3A@DM5PR18MB2326.namprd18.prod.outlook.com>
References: <176236867319.904123.10146982018394612684@dt-datatracker-5df8666cb-7l4w5> <d8ee7e39c24d31457298b0a3deaafe501e31fbe0.camel@aisec.fraunhofer.de> <GVXPR07MB96781826FAEA76A7A1F187D289C3A@GVXPR07MB9678.eurprd07.prod.outlook.com>
In-Reply-To: <GVXPR07MB96781826FAEA76A7A1F187D289C3A@GVXPR07MB9678.eurprd07.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=amazon.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: DM5PR18MB2326:EE_|SA6PR18MB6204:EE_
x-ms-office365-filtering-correlation-id: e6c52a97-60f3-4bce-53a8-08de1e2be6c3
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;ARA:13230040|1800799024|366016|376014|7053199007|8096899003|38070700021;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DM5PR18MB2326.namprd18.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(366016)(376014)(7053199007)(8096899003)(38070700021);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_DM5PR18MB2326D766FA5A96FA87649263ABC3ADM5PR18MB2326namp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DM5PR18MB2326.namprd18.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: e6c52a97-60f3-4bce-53a8-08de1e2be6c3
X-MS-Exchange-CrossTenant-originalarrivaltime: 07 Nov 2025 18:31:43.7007 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5280104a-472d-4538-9ccf-1e1d0efe8b1b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: e+O2fwhjl0YUWIVk4d7PlgibLRaI3hLvflVWnCOZgYZLixtGj6N57fmjZjXAdMJTXRlKoZ8RYSFE+aGzm4gmhQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA6PR18MB6204
X-OriginatorOrg: amazon.com
Message-ID-Hash: R4EE6X72VI4734I2UYNLRTZ7M6JWVKMK
X-Message-ID-Hash: R4EE6X72VI4734I2UYNLRTZ7M6JWVKMK
X-MailFrom: prvs=399bceee0=kpanos@amazon.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tls.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (Ends 2025-11-26)
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/VeeAemvT1WFwmtuI09KsiLYlEA0>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Owner: <mailto:tls-owner@ietf.org>
List-Post: <mailto:tls@ietf.org>
List-Subscribe: <mailto:tls-join@ietf.org>
List-Unsubscribe: <mailto:tls-leave@ietf.org>

Hi John,

> I completely agree that NIST requirements should be followed but explicitly mention 7.2 and not other mandatory requirements like the decapsulation input check in 7.3 might make the reader wondering if the mandatory requirements in e.g., 7.3. can be skipped, which I would disagree with.

As with SSH, only the ciphertext length check in section 7.3 of FIPS203 apply to the client at decapsulation time because the other two check the decapsulation key which the client has generated itself and thus are unnecessary. The ciphertext length check is already in normative language in the text.

> FIPS 203 forbids reuse of ephemeral keys,

I don't get that. What text in FIPS 203 dictates that each keypair needs to be used only once? I missed it.

I would be fine making the "still recommended that implementations avoid re-use of any keys (including ML-KEM keys)" normative, but I think 8446-bis is more suitable for it. The draft-ietf-tls-mlkem is not a good place to make such broad declarations about TLS 1.3 imo.



From: John Mattsson <john.mattsson=40ericsson.com@dmarc.ietf.org>
Sent: Friday, November 7, 2025 2:12 AM
To: tls-chairs@ietf.org; draft-ietf-tls-mlkem@ietf.org; tls@ietf.org; sean@sn3rd.com
Subject: [EXTERNAL] [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (Ends 2025-11-26)


CAUTION: This email originated from outside of the organization. Do not click links or open attachments unless you can confirm the sender and know the content is safe.

Hi,

I support publication as long as the major comments below are addressed.

I think it is correct to publish the "groups" as RECOMMENDED = N and then discuss all algorithms together at a later stage. I can understand why some people strongly prefer hybrids to protect against implementation bugs, but I do not see why standalone ML-KEM should be marked as discouraged. It is a very well-studied algorithm believed to provide very good security. European governments are now stating that they have the highest confidence in ML-KEM. I think the recommended level should be above P-256, X25519, and all other algorithms providing zero security against quantum attackers.

Major:

- "The KeyShareClientHello includes a list of KeyShareEntry structs that
   represent the key establishment algorithms the client supports.  For
   each parameter of ML-KEM the client supports, the corresponding
   KeyShareEntry consists of a NamedGroup that indicates the appropriate
   parameter, and a key_exchange value that is the pk output of the
   KeyGen algorithm."

This seems like an explanation of the "supported_groups" extension, not the KeyShareClientHello. My understanding is that "supported_groups" represent the key establishment algorithms the client supports and that KeyShareClientHello is a subset. I suggest removing text (incorrectly) duplicating RFC 8446.

- "For all parameter sets, the server MUST perform the encapsulation key
   check described in Section 7.2 of [FIPS203]"

I completely agree that NIST requirements should be followed but explicitly mention 7.2 and not other mandatory requirements like the decapsulation input check in 7.3 might make the reader wondering if the mandatory requirements in e.g., 7.3. can be skipped, which I would disagree with.

-  "TLS 1.3 does not prohibit key re-use; some implementations may use
   the same ephemeral public key for more than one key establishment at
   the cost of limited forward secrecy.  Care must be taken to ensure
   that keys are only re-used if the algorithms from which they are
   derived are designed to be secure under key-reuse.  ML-KEM's IND-CCA
   security satisfies this requirement such that the public key/secret
   key pair can be used long-term or re-used without compromising the
   security of the keys.  However, it is still recommended that
   implementations avoid re-use of any keys (including ML-KEM keys) to
   ensure perfect forward secrecy."

This is wrong in many ways.

FIPS 203 forbids reuse of ephemeral keys, which applies to this draft. IETF specifications referring to FIPS 203 may not use the same ephemeral public key for more than one key establishment. TLS WG has not discussed violating NISTs requirements, and I suspect most people in IETF do not want to violate NIST requirements for ML-KEM, I certainly don't.

Ephemeral keys should be independent and reusing them has a large number of negative security consequences. As stated in NIST SP 1800-37 "Addressing Visibility Challenges with TLS 1.3 within the Enterprise High-Level Document":

"Reuse of a key share allows passive observers to correlate different connections. This specification discourages client and server reuse of a key share for multiple internet connections. Reusing key shares outside protected facilities can also expand the impact of security breaches."

And the above statement from NIST is too soft. If you believe in zero trust rather than perimeter security, reusing key shares can expand the impact of security breaches even within protected facilities. Moreover, reusing key shares also weakens post-compromise security.

Minor:

- I think the draft should mention that ML-KEM is very very fast. Suggestion: "Optimized implementations of ML-KEM achieve key generation, encapsulation, and decapsulation operations that are faster than elliptic-curve Diffie-Hellman mechanisms (such as X25519 or P-256) on modern 64-bit CPU architectures with vector instructions."

- [AVIRAM], [DOWLING], [FO], [HHK], [HPKE], [hybrid], [LUCKY13], [RACCOON] are not used and should be removed.

- OLD: key establishment mechanism (KEM)
  NEW: key encapsulation mechanism (KEM)

Cheers,
John