[TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (Ends 2025-11-26)

Eric Rescorla <ekr@rtfm.com> Thu, 27 November 2025 00:17 UTC

Return-Path: <ekr@rtfm.com>
X-Original-To: tls@mail2.ietf.org
Delivered-To: tls@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 53BFB916DE73 for <tls@mail2.ietf.org>; Wed, 26 Nov 2025 16:17:24 -0800 (PST)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level:
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=rtfm-com.20230601.gappssmtp.com
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lxMYjR_aZxys for <tls@mail2.ietf.org>; Wed, 26 Nov 2025 16:17:23 -0800 (PST)
Received: from mail-yx1-xb131.google.com (mail-yx1-xb131.google.com [IPv6:2607:f8b0:4864:20::b131]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id ED969916DE6C for <tls@ietf.org>; Wed, 26 Nov 2025 16:17:23 -0800 (PST)
Received: by mail-yx1-xb131.google.com with SMTP id 956f58d0204a3-640c857ce02so333065d50.0 for <tls@ietf.org>; Wed, 26 Nov 2025 16:17:23 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rtfm-com.20230601.gappssmtp.com; s=20230601; t=1764202637; x=1764807437; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=wQ+VXsQcM9wzMAmPdpUGnf7gBszdQlATSfSJzq56y3w=; b=NTIbNYSf/hpOlYiTJbMnygEZBWhlnuN5oGa1lIvqygpjFq0nj8qjnvUsGh0VkCLcDP 8ktucjNpO7KeeLYtNg0L10g/7AONA/5OVlwxpv0dEq55wTK8M6U62yUwq0yNqrz+Bp6h VuBTYiC4fTw62K/0ACY2mYd2B4kXWAPwetkpy59LckAJUX344FDTQeL/bbRU+AN/Nzo+ /RR2dTWpEnLzPr1k3E/N+y8vRz/2xbcXGQbOfPFukVDLD5Ba1v+JLzKHIBz+kdlXFypt 5Vx8jx9YsPGvrkstfSRcvSOq4QciqXpXiWi/4TqzdTJDhBwkzHmzdkrJCrDKK/x+Faxs pE5Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1764202637; x=1764807437; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-gg:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=wQ+VXsQcM9wzMAmPdpUGnf7gBszdQlATSfSJzq56y3w=; b=kMcKMVqOvh9CCfiQd70f7j9cLHIqo7RIkRQH7Rp0RD+W5sLH6NKMKMpCHVGJztzLl4 3rIubiLcXS0V6lrCrc/YiaJ5dofzk/Rsv49nejTbnvpkDWcTjg/RpM4MYX/v026V61wM Rp/ncW87Qln+u9YfDdtdSQK3EvKyiKexLA9fn5Eml++P5G8egZojHuysXGpxOHkn6j+H QM786nSy7z4vIoWylUC7vP3OQL4E/z6TCIyABIMXPc1MvV9CcntR/2+WX+4rcqGPrJlR cjqTQwLyIkrx7Yff8VchloJRT733hxfinwtAtYEyAMByK0/Kbc1VNB3E/sbJcyaWen92 OrnA==
X-Forwarded-Encrypted: i=1; AJvYcCVDIHK6HccTg1+xMyLuj44PIme5kG3Ep/tuiZjgLEbslkHTRo93j4UUEPt+xuKt3GK0fVc=@ietf.org
X-Gm-Message-State: AOJu0YyarhXCjQJyk/ykWUdv76lUNTrJmCM1vpkl4PoYeg+Qcij0GEzu iWKaIgH0E+jyCYcE73aMBX3W6g6NpZOu4EPSotNMLtDiIchAfAVj5yJ+MxHx0UwIlP275hCrfDT OP+F+CxyDm3J+DXjMFu1bcNEmamg9160Q9D0hUN0Hg3+hQOkb9i8wL3U=
X-Gm-Gg: ASbGncu3KV9FGLjUr7165U9swqytJQxcnKaKrhwH7wJLO9If+Vf9ToDR80G6GyK69bI 8ZiO8x67z0ZpPyNmPuEF02WkyCgSuEHejOxxNQyL+jFDblHyJ1k+z1TkjLv53kaoEPVO6Mh2n1j kruOjQCcJhBu5+fpZ0W+OSCNQxNnaSVEKpm5M6M0XPXtl5Hb85dB1koiVpWFPcTqtfzeCH9sI5k nqX7MyDBMZ2TMx5Ol8si8yZGogU6FPnlyPQv8oMHe14+mcTJBUbROKv6E7ODPXvuyKVTBudsS97 r9Z2YbL8SzXx+eBq01RFBQcnWEHHHGMUuDu22/rHifIBgsytqegyAYocQSiRJ5cYAc6N3/Wnf16 Ld76H8YGUpiOuL/POd+Zy
X-Google-Smtp-Source: AGHT+IF8yrRUKsRaja/eYhmsFxZMQ93HSFK6qG+k6MBQpLXTnjxYWpeZKaEU+qe9Dh4t4ir0z1GRuh94M57qm/O/nHI=
X-Received: by 2002:a53:b41a:0:b0:63f:2b0c:2d55 with SMTP id 956f58d0204a3-64302af14f3mr11497905d50.51.1764202636861; Wed, 26 Nov 2025 16:17:16 -0800 (PST)
MIME-Version: 1.0
References: <20251126185919.362611.qmail@cr.yp.to> <9ce12b8e-9982-4194-987d-d2ca3a41ea48@tu-dresden.de> <CABcZeBOffkV9eUtpdPp8eWB_eMA1c6-GOMHoZcDs93cGm1kwfw@mail.gmail.com> <10352a8e-c3d5-457e-854d-e72e31fca2d2@tu-dresden.de> <CABcZeBPzabtzCs=zLncyjFy=JHWXzpPb6haN5iFA6=3orXTU2Q@mail.gmail.com> <91f28ee1-5408-417e-868d-bd5af47bd773@tu-dresden.de> <CABcZeBPopk4jSXjwWaX_bPdcgvj6f6wPxTc7+300YmZnLGf36A@mail.gmail.com> <b2593b36-4d8c-431c-ab79-a2dcf94dfe79@tu-dresden.de>
In-Reply-To: <b2593b36-4d8c-431c-ab79-a2dcf94dfe79@tu-dresden.de>
From: Eric Rescorla <ekr@rtfm.com>
Date: Wed, 26 Nov 2025 16:16:40 -0800
X-Gm-Features: AWmQ_bmjeAKiMs6ECTaSHQKUWDO_q4XDZe2t5l_ZEPbFEo-LKjBB4hwjvqu4Wj8
Message-ID: <CABcZeBPV8n9AAaJB_r+cuXN3sxKRYN1u_GrZxkQoix_aegRkiA@mail.gmail.com>
To: Muhammad Usama Sardar <muhammad_usama.sardar@tu-dresden.de>
Content-Type: multipart/alternative; boundary="0000000000007b72390644886f99"
Message-ID-Hash: OAPPAC2JZPXVKTV6XBF36SB7VEKINRGK
X-Message-ID-Hash: OAPPAC2JZPXVKTV6XBF36SB7VEKINRGK
X-MailFrom: ekr@rtfm.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tls.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: draft-ietf-tls-mlkem@ietf.org, tls-chairs@ietf.org, tls@ietf.org
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (Ends 2025-11-26)
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/d9_g3MQApyIurwYAYVBTNP-9wfI>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Owner: <mailto:tls-owner@ietf.org>
List-Post: <mailto:tls@ietf.org>
List-Subscribe: <mailto:tls-join@ietf.org>
List-Unsubscribe: <mailto:tls-leave@ietf.org>

I think it's important to separate a number of points here.

First, the requirement is not that implementations *use* P-256 but
rather that they implement it. For example, until recently, browsers
typically supported both P-256 and X25519, but most Web connections
negotiated X25519. This is totally RFC 8446 compliant. What wouldn't
be compliant is if you supported *just* X25519. Browsers now generally
support P-256, X25519, and MLKEM+X25519 (as well as potentially some
other groups). This is also compliant. For the same reason if if you
have an implementation which supports P-256, X25519, MLKEM+X25519, and
pure MLKEM, that's also compliant, because it still supports P-256.

What's *not* compliant is if you have an implementation which doesn't
support P-256, no matter what other groups it supports.  This includes
both non-P-256 EC groups such as X25519, pure PQ groups like MLKEM, or
even hybrid groups like MLKEM+P-256. I recognize that that last
example may be counterintuitive, but it's important to remember that
the point of the MTI is to ensure that there is an interoperable
algorithm, and an implementation which supports only P-256 can't
interoperate with an implementation which supports only MLKEM+P-256.

-Ekr



On Wed, Nov 26, 2025 at 3:50 PM Muhammad Usama Sardar <
muhammad_usama.sardar@tu-dresden.de> wrote:

> On 26.11.25 22:35, Eric Rescorla wrote:
>
> On Wed, Nov 26, 2025 at 1:17 PM Muhammad Usama Sardar <
> muhammad_usama.sardar@tu-dresden.de> wrote:
>
>> I think the draft should have a statement somewhere stating that it is no
>> longer compliant with the base TLS specs, with pointer to section 9.1 of
>> RFC 8446bis.
>>
> I don't think that's correct.
>
> Yeah, sorry, as mentioned in the thread, please take my comments with a
> large grain of salt, since I haven't yet worked with PQ. I am most likely
> missing something from implementation perspective, from PQ perspective,
> from terminology perspective or interpretation of terms. So please feel
> free to ignore.
>
> My general feedback for this draft was that since it is the first draft on
> pure PQ that we have, I would have expected it to give a much better
> introduction and motivation than a couple of sentences that basically tell
> me nothing about why this draft even exists. For example, "users that want
> ..." is too generic of a motivation that would apply to almost any draft of
> the IETF. Specifically, I would like to know more about those users to be
> able to reach out to them to ask whether they also want attestation. If
> motivation comes from compliance, I would like to read those regulations to
> understand whether these regulations also require attestation. And if the
> answer to any of those is yes, then check out whether these users have any
> preference about intra-handshake attestation vs. post-handshake
> attestation, etc.
>
> An implementation could choose to implement just the new algorithm and
> not the MTI algorithm(s) in the same class, in which case the
> implementation
> would be noncompliant, but it's possible to be noncompliant based purely
> on the algorithms registered in RFC 8446, for instance by implementing
> just P-384 and not P-256.
>
> Sure, but I feel like there is a difference. In this case, the
> implementers *choose* not to implement P-256 while still having the
> possibility, whereas in pure PQ, implementers have *no possibility* to
> support P-256. Isn't it?
>
> That is, I don't understand how pure PQ can support P-256. So my point was
> that implementations which have pure PQ cannot be "TLS-compliant
> applications", as per section 9.1 of 8446bis.
> -Usama
>