[TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (Ends 2025-11-26)

Eric Rescorla <ekr@rtfm.com> Mon, 24 November 2025 20:00 UTC

Return-Path: <ekr@rtfm.com>
X-Original-To: tls@mail2.ietf.org
Delivered-To: tls@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 0BF038FB8E5F for <tls@mail2.ietf.org>; Mon, 24 Nov 2025 12:00:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level:
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=rtfm-com.20230601.gappssmtp.com
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0lOecb4pUydn for <tls@mail2.ietf.org>; Mon, 24 Nov 2025 12:00:50 -0800 (PST)
Received: from mail-yw1-x1135.google.com (mail-yw1-x1135.google.com [IPv6:2607:f8b0:4864:20::1135]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id 777198FB8E53 for <tls@ietf.org>; Mon, 24 Nov 2025 12:00:50 -0800 (PST)
Received: by mail-yw1-x1135.google.com with SMTP id 00721157ae682-7866aca9ff4so47590037b3.3 for <tls@ietf.org>; Mon, 24 Nov 2025 12:00:50 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rtfm-com.20230601.gappssmtp.com; s=20230601; t=1764014450; x=1764619250; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=efPwj3XrZZJtok+jHIgwfzx4ii7M1QTdrZt3AA1pu2E=; b=lDfgyFhuGJ6+2bxgHxKozS31nBBIjCLxjYYk1RmAEaOw21X5AU7TGXGlp1QTrayMyq 4dv/hU+Pd+3PSolrPVZ+ko0k/1NAlpdukXQKZe/fdCmlG8LIRH6bye7cHvMenMOhKv9f P04pasg5tbXzpbhptHXtXLaNzXY4ztEoQE5qG+DBDsoyUsI+tTyficsKAUfKj9gWpjUx hqRkhO5bhmvzUPWyIBuy0IUYtOSxMl02ItVzjCz/B8vuT1PnXULH0llWuTrNti491Rjy GyHYWODp7snFpWa9aHqtkJbpBTXcKN9cetMFixYuvpkWXt76hlBCmg7C0rb07TCQw57G 6EEA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1764014450; x=1764619250; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-gg:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=efPwj3XrZZJtok+jHIgwfzx4ii7M1QTdrZt3AA1pu2E=; b=tQPCZmS1k5vpxLKPsTG8908B621yM8HzU8+uY0pRBnZAfIdpLplJZRxetR/fJE1REG dZsJo3OKmzbISiXKphyONKPx21xyqodORJZzUqz2m2mtgzj+xKq2a2CXgrB29WccJ4dQ lUoAvXov8FyCucVqeq99oSN9gZ+xrK/9rc/myxtnXlrZbYwiYH314RTGQSojyBu+GJzB IvyRmg65wmrClqD2C4y4YZT7OY6H5nymf6R4UFVa1o4mATiBzjcWymXivKsn5qyc7T/8 JgIiiO3NfJ+7S0Yu12qxaI3Am+uRv1Pr+nHXHZzH08m8lMTMi0OwXh/p1p443lsTQax0 DfeQ==
X-Forwarded-Encrypted: i=1; AJvYcCX3KoVLM7K4l2UtAJosspgdSkuiSuTacf4IY3tmvmZm2rV7MCW9sqx4zaNSyOgcWZfj5cg=@ietf.org
X-Gm-Message-State: AOJu0YxKU5O0hnzDJN0iCwdlobCanx7fkMulV476wss7SWS/c90zOe/9 od4x2LWjAM3x/HiXCxT2XK/kEzAJVw7G8s9VjApGVCOhd51DWDcSKWlcmM7USwrJnKRLGNKksvG hPz/GDFeCmbc3Ohm3xqNjtK22NagVaQdpNbz45oEzsQ==
X-Gm-Gg: ASbGncu4MhLjx08QdW5dObvvz/vdSus+p322sSbGAuQ9CVaR9YvJLv/bkinU2zLJ1GC /HlTJLVsfj2R/cALwwI75LedoSkPENrwxb0OL7uVm71ELknpbjy58pjNpxv0VaVKeyv9Z9oQ6qr 5Qb5JM8UUP3wuKH/UXJtmzoA/0Mh6C3/tStvIxPmX56MhxcuFF7ecDXOmfe8OdaQgtwhERRbnD+ 0hMNq7pypHV3XEaddy3i7a/4hiLfdMsr9Gmq5oOur00dwfj1GbfvgMlmI71GfKCVrasv6wKqoZn pumDf5Q3/QZbbmSfQ43WilhCfRi1dZKCxcvI+xCQFRDSnqJfXbfVH+quJHEJXBZT7qYeVXFkYnY EVXW48Ah+7w==
X-Google-Smtp-Source: AGHT+IH9ZKm2cDzwdwMctJe5rsDKmLBCDC+K2pCvmNnCPZgHg+nC4h8t4U6LoEDNzyFnklKKtzGPpxYkbBIheYsptps=
X-Received: by 2002:a05:690e:12c8:b0:643:1ef1:9613 with SMTP id 956f58d0204a3-6431ef199abmr3879721d50.15.1764014449393; Mon, 24 Nov 2025 12:00:49 -0800 (PST)
MIME-Version: 1.0
References: <176236867319.904123.10146982018394612684@dt-datatracker-5df8666cb-7l4w5> <87see331ox.fsf@josefsson.org> <CABcZeBMiXTGzNUZ54nEOe2K=MWTU2dxo-o0eoweKcf6av55Wrg@mail.gmail.com> <87jyzf2r0x.fsf@josefsson.org>
In-Reply-To: <87jyzf2r0x.fsf@josefsson.org>
From: Eric Rescorla <ekr@rtfm.com>
Date: Mon, 24 Nov 2025 12:00:13 -0800
X-Gm-Features: AWmQ_blrLQJeQtNhWXl6Ws96zqD6JK-P1Jg15SRDabbVXulFaP-rifRZBCB4FRM
Message-ID: <CABcZeBPMvuVuYa=WAnwpar69Xp3Z-UvG7JW-E5B_9_ZUzojx8A@mail.gmail.com>
To: Simon Josefsson <simon@josefsson.org>
Content-Type: multipart/alternative; boundary="000000000000a2935106445c9e31"
Message-ID-Hash: WPIZ4J2JAXZ5RVWBBWYSDI4KH4JNGOW3
X-Message-ID-Hash: WPIZ4J2JAXZ5RVWBBWYSDI4KH4JNGOW3
X-MailFrom: ekr@rtfm.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tls.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: draft-ietf-tls-mlkem@ietf.org, tls-chairs@ietf.org, tls@ietf.org
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (Ends 2025-11-26)
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/acw8fGJkSTIL4y3_CmBiY_jJAxs>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Owner: <mailto:tls-owner@ietf.org>
List-Post: <mailto:tls@ietf.org>
List-Subscribe: <mailto:tls-join@ietf.org>
List-Unsubscribe: <mailto:tls-leave@ietf.org>

On Mon, Nov 24, 2025 at 11:04 AM Simon Josefsson <simon@josefsson.org>
wrote:

> Eric Rescorla <ekr@rtfm.com> writes:
>
> > On Mon, Nov 24, 2025 at 7:14 AM Simon Josefsson <simon=
> > 40josefsson.org@dmarc.ietf.org> wrote:
> >
> >> We are having trouble getting safe hybrid PQ solutions published.  Until
> >> we have a couple of widely deployed hybrid PQ KEMs published,
> >> implemented and deployed, I don't think we should fragment the already
> >> thin resources we have to reach that goal by spending further cycles on,
> >> and then publish a fragile solutions like this.  Please prioritize a
> >> non-NIST/MLKEM hybrid PQ KEM for TLS.  FrodoKEM?  Streamlined NTRU
> >> Prime?  We need more hybrid PQ options.
> >>
> >
> > Why? The general deployed pattern in TLS is to have a small number of
> > dominant algorithms and we already have X25519+MLKEM widely deployed.
> > Given that any particular connection can only be protected with a single
> > algorithm, it's not clear to me how the world is improved by having
> multiple
> > algorithms with roughly the same performance properties.
>
> Historically, I believe we have been helped by having multiple security
> options available to jump between when new security problems are
> published.  We don't know the nature of future security problems,
> therefor hedging by having a couple of alternatives readily available
> may help.  There is a cost to that, but I think it is small price
> compared to the risks involved.
>

Thanks for the explanation. I think this is an understandable perspective,
but given that we're already hedging by using hybrids, I feel comfortable
that if there were to be some severe weakness in one of the components
we could adapt relatively quickly.


> I could see some argument for having some algorithm with significantly
> > different performance/security tradeoff (though as I understand it there
> are
> > some practical challenges to adding Classic McEliece), but that doesn't
> > seem to be what you're suggesting here.
>
> I'm asking for that too, Classic McEliece can be another alternative.
> Given that ML-KEM has a PQ KEM monopoly here, I think almost anything we
> can add will be an improvement.
>
> I think it may be that is actually EASIER to add another algorithm with
> similar characteristics as MLKEM, such as Streamlined NTRU Prime or
> FrodoKEM, because implementers will already have resolved those similar
> concerns (buffer sizes, protocol limits, API concerns etc).


I agree with this.


> More generally I am opposed to the IETF publishing any algorithm
> > specification
> > for TLS which has not been externally vetted. That could mean
> standardized
> > elsewhere or sign-off by CFRG, but the TLS WG should not just be picking
> > up algorithms without external review and adding them to TLS.
>
> What do you mean by 'externally vetted'?


I already answered this in the paragraph you're quoting: "standardized
elsewhere
or sign-off by CFRG". I could imagine some other process that would give me
confidence, but I'd have to hear more about said process.




> Who to judge the quality of
> the external vetter?


The IETF, though of course different people may have different opinions.
At present, of course, there is no such rule, so we're just discussing what
is sufficient for each of us to have confidence, which might or might not
entail external vetting at all.



> What I often see is a request like yours is pretty much the same as
> saying that nobody except NIST have the resources to evaluate crypto
> algorithms, and that we should trust them.


That may be what others are saying, but it's not what *I'm* saying,
as should be clear from the text above.

-Ekr