[TLS] Re: Working Group Last Call for Post-quantum Hybrid ECDHE-MLKEM Key Agreement for TLSv1.3

Bas Westerbaan <bas@cloudflare.com> Tue, 07 October 2025 16:28 UTC

Return-Path: <bas@cloudflare.com>
X-Original-To: tls@mail2.ietf.org
Delivered-To: tls@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 8D74F6EC071B for <tls@mail2.ietf.org>; Tue, 7 Oct 2025 09:28:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level:
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=cloudflare.com
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 40-Kt1OSlcyM for <tls@mail2.ietf.org>; Tue, 7 Oct 2025 09:28:54 -0700 (PDT)
Received: from mail-lf1-x12e.google.com (mail-lf1-x12e.google.com [IPv6:2a00:1450:4864:20::12e]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id 264886EC06AD for <tls@ietf.org>; Tue, 7 Oct 2025 09:28:39 -0700 (PDT)
Received: by mail-lf1-x12e.google.com with SMTP id 2adb3069b0e04-57992ba129eso7482432e87.3 for <tls@ietf.org>; Tue, 07 Oct 2025 09:28:39 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cloudflare.com; s=google09082023; t=1759854518; x=1760459318; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=OWsgkRJXlhc4tIU1oiU447fV2X+4d99EwxAlyeZqa44=; b=CzpPGxTeh2s+9wqcA0hMsUu32KQEV0KvVj1kdovTeYbqeH+SVe/lmh6ZplxszyedvL 1GX6++hlB1H2UwziRUV/CU0WE7KJfp3z+tlIteWX0MEQZu/9nCWxE3h+K0JhZRmFa9Bz APVDRePl6H7n3oPfdpETkWZ6HUbGBMwK7gHHn92KjJRwyNnK9qjCaJ9JF5K+jQGHkDZh Iey/UfZxE6qnIiXAaEnK6w/ORSo3KelrEP4fjJMkn27rq9ntFuPPe/qAwQdFYXnTpLBO tzpFjm9x8KeQjpWVuMYsVR3ootq1ufPBW3k52DgiRwOFtUuyHPXjyU5/l/wYjnC4Xs0N Qbnw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1759854518; x=1760459318; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=OWsgkRJXlhc4tIU1oiU447fV2X+4d99EwxAlyeZqa44=; b=vN0h3zyUKW3edofzdmLcl9GALwOCwV/4kOnTteJU0OP19BWfmMjEe9l6yNsaABwTnc ZShzCY0wVX0xpbYVusTNTQseA+UzS21nIN1hWbeJdKC1ukjpSEd0cNtXiiAYOEDN8esm MjWf+U97IYa6ZOaDqBTApwxoBZyg+SJiyihDQ6QQFLPUE9sr9Kg/WZsVDod2P4JmOJ45 EIMQyLLElu4OlXQXjMwPLNZJUdWwHsatNj9wWAARNk9ippyMoQe+c9kA/FPC+wAb0x/7 A7oPiz02tn8qsX5Awl/+ya+b8OdnUb3LfBxp2qaiPcxWRkyw02+6TNL//u+56Hc5PeGN R8vA==
X-Forwarded-Encrypted: i=1; AJvYcCViLC8DNEF2lVwFY457tB0BZyYNsZNkm8hUOPMiNDmo2TeMlLBjgFtnTQkxcS/gEUjWJ1g=@ietf.org
X-Gm-Message-State: AOJu0YxrBAboAGLcNDb6ZIovIoVLtPZh3q47tKrHLU2hHXwNRw9d34ji lQeSGggnRfnitFnL8LrqRf8ZZgvZjvlVC0JI+YF4Ld8aONXcMHBRDXkln8Aear5YYbQjyfb5Qv5 pOqu7oSs0BM7Kh0IuDTf5uw28Ybjrxnfj2roRm2dN2NaTa8/K41uGtJNw9v9q
X-Gm-Gg: ASbGncsekbhVmT4JwPOyuKAlnvQUV/wBlnsVuW8UuYZr/208z7CHdpyca2H69Bu0Mts YLVLEV9khRcU9P9P3aZK8Ycqj/lsv/HE2iyJJH9IMlut0Rbk4B0kMosPqy27U5ERlxrD7jtU8gV blfkTlwuPGMp7ctuXU4Tqc4XiGnpKIOYGQNiXf5cMzWzaYHdwXVbp39SlxHtkPbalh0HotRdkWE IYZcdr/eg0q+xp6uV2u+XayEkKjaclF2A1MdIxEnKzU6xfAew==
X-Google-Smtp-Source: AGHT+IFfiQ3zCjpeu2oKJYT9uBa4RxV27zAMUdMagtuMV/XnhRZmY5QoPKKRsDLFcpJkD5E6dmjnj8po+ka6tQlsCCs=
X-Received: by 2002:a05:6512:3d14:b0:560:932a:c3c7 with SMTP id 2adb3069b0e04-5906dc28f97mr115045e87.13.1759854517657; Tue, 07 Oct 2025 09:28:37 -0700 (PDT)
MIME-Version: 1.0
References: <CAOgPGoA+c8kXDizwsvFG5tLz9+Kxk0HqiN1skKp5jMvvpxeu0Q@mail.gmail.com> <CABcZeBO+3u=1=ueNscq+O74Qv=7PC5NedsGsugp=GZjVqtODoQ@mail.gmail.com>
In-Reply-To: <CABcZeBO+3u=1=ueNscq+O74Qv=7PC5NedsGsugp=GZjVqtODoQ@mail.gmail.com>
From: Bas Westerbaan <bas@cloudflare.com>
Date: Tue, 07 Oct 2025 18:28:01 +0200
X-Gm-Features: AS18NWDR_Fn9NMGMb3jD-1RUMW0EVHnE0Z-9jPMwXXRzLNYVkxjR9JSqAx-7ipo
Message-ID: <CAMjbhoVcxTfppSrkC27F8uf9hKvqTDBsG_-dzGtWbjia5YhmXw@mail.gmail.com>
To: Eric Rescorla <ekr@rtfm.com>
Content-Type: multipart/alternative; boundary="00000000000061bf380640940fd8"
Message-ID-Hash: S4YTU73HNPV6GN4LVI4ER4IUL566PSJG
X-Message-ID-Hash: S4YTU73HNPV6GN4LVI4ER4IUL566PSJG
X-MailFrom: bas@cloudflare.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tls.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: "<tls@ietf.org>" <tls@ietf.org>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [TLS] Re: Working Group Last Call for Post-quantum Hybrid ECDHE-MLKEM Key Agreement for TLSv1.3
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/c5gEMi7Lv6glU-8dKEulz_X9FbI>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Owner: <mailto:tls-owner@ietf.org>
List-Post: <mailto:tls@ietf.org>
List-Subscribe: <mailto:tls-join@ietf.org>
List-Unsubscribe: <mailto:tls-leave@ietf.org>

This is the breakdown of client support Cloudflare sees (relative to any PQ
support) in the last 24 hours by handshakes:

94% X25519MLKEM768
8.1% X25519Kyber768
0.038% MLKEM768
0.014% CECPQ2
0.012% MLKEM1024
0.002% SecP384MLKEM1024
0.002% SecP256MLKEM768
0.00005% MLKEM512
0.0000003% SecP256Kyber768

If we ignore the CECPQ2 and Kyber hybrids, then X25519MLKEM768 is supported
by 99.992% of clients that offer PQ.

Again ignoring CECPQ2 and Kyber, we see the following shares sent in the
ClientHello.

99.96% [X25519MLKEM768]
0.02% [X25519MLKEM768, MLKEM768]
0.007% [MLKEM768, MLKEM1024]
0.005% [X25519MLKEM768, MLKEM768, MLKEM1024]
0.002% [X25519MLKEM768, SecP256MLKEM768, SecP384MLKEM1024]
(...)
0.00001% [MLKEM512, MLKEM768, MLKEM1024]
(...)
0.0000003% [SecP256MLKEM768, SecP384MLKEM768]

(X25519MLKEM768 is in all the unlisted ClientHello's)

It is wise to keep the set of recommended algorithms as small as possible
as there is a real cost to fragmentation. We welcome
draft-ietf-tls-key-share-prediction which offsets the performance impact of
the HelloRetryRequest if we do get worse fragmentation, but not every
client will be able to use it and not every server will be able to
provision the DNS records.

I can see an argument for Recommended=Y for both X25519MLKEM768 and
SecP384MLKEM1024, but I do not see any value in recommending both
X25519MLKEM768 and SecP256MLKEM768.

At the moment we only support X25519MLKEM768 and X25519Kyber768, and have
no immediate plans to change that except for disabling X25519Kyber768 at
some point.

Best,

Bas


On Tue, Oct 7, 2025 at 4:52 PM Eric Rescorla <ekr@rtfm.com> wrote:

> I have reviewed this document and I think it is ready to go with
> one exception, namely the Recommended column.
>
> The RFC 8447 standard for "Recommended=Y" is:
>
>    Per this document, a "Recommended" column has been added to many of
>    the TLS registries to indicate parameters that are generally
>    recommended for implementations to support.
>
> I think there's a general expectation that we want people to
> implement and deploy these algorithms, and I would expect
> that the X25519 and P-256 versions to be widely deployed,
> at least on the Web. Therefore, I think we should mark all of
> these as Recommended=Y. I note that this would require
> advancing this document as Proposed Standard. We should do
> that as well.
>
> -Ekr
>
>
>
>
> On Tue, Oct 7, 2025 at 6:47 AM Joseph Salowey <joe@salowey.net> wrote:
>
>> This is the working group last call for Post-quantum hybrid ECDHE-MLKEM
>> Key Agreement for TLSv1.3. Please review draft-ietf-tls-ecdhe-mlkem [1] and
>> reply to this thread indicating if you think it is ready for publication or
>> not.  If you do not think it is ready please indicate why.  This call will
>> end on October 22, 2025.
>>
>> Please note that during the WG adoption call, Dan Bernstein pointed out
>> some potential IPR (see [2]), but no IPR disclosure has been made in
>> accordance with BCP 79.  Additional information is provided here; see [3].
>>
>> BCP 79 makes this important point:
>>
>>  (b) The IETF, following normal processes, can decide to use
>>    technology for which IPR disclosures have been made if it decides
>>    that such a use is warranted.
>>
>> WG members can take this information into account during the working
>> group last call.
>>
>> Reminder:  This working group last call has nothing to do with picking
>> the mandatory-to-implement cipher suites in TLS.
>>
>> Cheers,
>> Joe & Sean
>>
>> [1] https://datatracker.ietf.org/doc/draft-ietf-tls-ecdhe-mlkem/
>> [2]
>> https://mailarchive.ietf.org/arch/msg/tls/mt4_p95NZv8duZIJvJPdZV90-ZU/
>> [3]
>> https://mailarchive.ietf.org/arch/msg/spasm/GKFhHfBeCgf8hQQvhUcyOJ6M-kI/
>>
>> _______________________________________________
>> TLS mailing list -- tls@ietf.org
>> To unsubscribe send an email to tls-leave@ietf.org
>>
> _______________________________________________
> TLS mailing list -- tls@ietf.org
> To unsubscribe send an email to tls-leave@ietf.org
>