[TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (Ends 2026-02-27)

Andrei Popov <Andrei.Popov@microsoft.com> Thu, 12 February 2026 22:10 UTC

Return-Path: <Andrei.Popov@microsoft.com>
X-Original-To: tls@mail2.ietf.org
Delivered-To: tls@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 591DFB68C72B for <tls@mail2.ietf.org>; Thu, 12 Feb 2026 14:10:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -0.995
X-Spam-Level:
X-Spam-Status: No, score=-0.995 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_FONT_LOW_CONTRAST=0.001, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=0.001, RCVD_IN_VALIDITY_CERTIFIED_BLOCKED=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, SPF_NONE=0.001, WORD_INVIS=1] autolearn=no autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (1024-bit key) header.d=microsoft.com
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id j3d5bvPMcLCp for <tls@mail2.ietf.org>; Thu, 12 Feb 2026 14:10:50 -0800 (PST)
Received: from SN4PR2101CU001.outbound.protection.outlook.com (mail-southcentralusazon11022099.outbound.protection.outlook.com [40.93.195.99]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-384) server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id 615EEB68C71A for <tls@ietf.org>; Thu, 12 Feb 2026 14:10:50 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=Xm8qNUlOSAcTKbcfKdEuSRAunMwqNKNUUdgacMkbkZAPHv9YR9pDwqNVKPNxBx6TzOapDbXi2OKCUBEN4Y1I0dp2mWE7++6Lrp1d0/iLaG/TXpToF9Twd8a2JAILhfZc6vBXs1hjna3kcHAIznQVhTB9vI0Wj/h2TFBHwLaM6j/brXN8em71oAjf1Qv1sZZK1cKwCAHVLaWQ33sTsOMD1TFWrhw8eIXk2FUPqa8TdQlT5uOJcIbpFeE5IkxK//4qDIMDwp737nXZlzZdrLKHwVC9JB+TKDRzMpc1/fbRebeC4mbVDDexzaIrHLVwBoIqEAKsKxYgt4+nKJeeCI4mKw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=SFmtIN4sWi5tZ8SDuS9EMR0nQtr7TFyZauDBHRfX9Zg=; b=erXoxJqZ7fKx7rNxS2wFgzotT+A2aaIIuk8SaAR+tskribX5OvanpodviTDmSwn+VT2Z7mAHHhR9YeFIyHSTiI0UcoIG3uV4+ZzEfqH2z+JOPF6RPiGZLoyGxPf9yJPvB0oi4NFoW4D82haLTgbt8bBBho4DCuxuIOeEUcnEhFB/QyQR8n7uXsu+Iro487Rdcp52d5WANT+AFv+ylzIbJ+i1rNnoK4Szk2m0WQIjmrvcVrJi2F8k1GtKsvopKrXKDyfTiaRL5la1Jh06jmFT1PP+uloI+J+4Jrj0DS4RtL92nr8fDc6c4ZvqVCqow+fu6eNc2vhp61YdTscb/MNY6A==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=microsoft.com; dmarc=pass action=none header.from=microsoft.com; dkim=pass header.d=microsoft.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=SFmtIN4sWi5tZ8SDuS9EMR0nQtr7TFyZauDBHRfX9Zg=; b=LCd3CTcPKseySXEMT1vtUeVOdgysyKydsERTNXYJKr8KDAdpUOxfl/E49AqqOFUpiXk+s0AHn8FHkSW/CBMSiuvbRs3pDTgUas8yS5bNm/lbb/xTkJBkfKM0YPtpFrwp8hgDe0aVemJDK3DDfxuGHrwWOiYUhXWAkzc/eAkBYG8=
Received: from CH8PR21MB5484.namprd21.prod.outlook.com (2603:10b6:610:272::5) by CH8PR21MB4695.namprd21.prod.outlook.com (2603:10b6:610:2b4::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9632.6; Thu, 12 Feb 2026 22:10:40 +0000
Received: from CH8PR21MB5484.namprd21.prod.outlook.com ([fe80::c4ba:2e6d:2632:cbae]) by CH8PR21MB5484.namprd21.prod.outlook.com ([fe80::c4ba:2e6d:2632:cbae%4]) with mapi id 15.20.9632.008; Thu, 12 Feb 2026 22:10:40 +0000
From: Andrei Popov <Andrei.Popov@microsoft.com>
To: Ben Schwartz <bemasc=40meta.com@dmarc.ietf.org>, Deirdre Connolly <durumcrustulum@gmail.com>, Russ Housley <housley@vigilsec.com>
Thread-Topic: [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (Ends 2026-02-27)
Thread-Index: AQHcnGqqS4juYZcXoU+2OrY1MVgU+bV/nxhg
Date: Thu, 12 Feb 2026 22:10:40 +0000
Message-ID: <CH8PR21MB5484936F98431369D1099C588C60A@CH8PR21MB5484.namprd21.prod.outlook.com>
References: <CAOgPGoDLVqAVesWjrrD9ZR8HMkqQVLMp69vOkXPkk87MzcsOSw@mail.gmail.com> <AS5PR07MB10596FC9D182E975AA0E11F8E8960A@AS5PR07MB10596.eurprd07.prod.outlook.com> <1050A0B9-9F8D-4762-BAF6-1BD290249F90@vigilsec.com> <CAFR824wWeM-0XYYc2XbLHBZFwCUZY4G-uoPTt6X0H23QgNcpUQ@mail.gmail.com> <DS0PR15MB5674C55563A2FA4A0ADE7FC2B360A@DS0PR15MB5674.namprd15.prod.outlook.com>
In-Reply-To: <DS0PR15MB5674C55563A2FA4A0ADE7FC2B360A@DS0PR15MB5674.namprd15.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ActionId=54fe4ca9-9808-42ca-8303-219f7ff3efa1;MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ContentBits=0;MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Enabled=true;MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Method=Standard;MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Name=Internal;MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SetDate=2026-02-12T22:07:22Z;MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SiteId=72f988bf-86f1-41af-91ab-2d7cd011db47;MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Tag=10, 3, 0, 1;
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=microsoft.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: CH8PR21MB5484:EE_|CH8PR21MB4695:EE_
x-ms-office365-filtering-correlation-id: 7e06fda5-327b-4562-7a34-08de6a838eea
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;ARA:13230040|1800799024|366016|376014|4022899009|7053199007|38070700021|13003099007|8096899003;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:CH8PR21MB5484.namprd21.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(366016)(376014)(4022899009)(7053199007)(38070700021)(13003099007)(8096899003);DIR:OUT;SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_CH8PR21MB5484936F98431369D1099C588C60ACH8PR21MB5484namp_"
MIME-Version: 1.0
X-OriginatorOrg: microsoft.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: CH8PR21MB5484.namprd21.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 7e06fda5-327b-4562-7a34-08de6a838eea
X-MS-Exchange-CrossTenant-originalarrivaltime: 12 Feb 2026 22:10:40.3757 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: vioOFdtaEIuKoUDVR+k4xdoTSmR9EUvu7JRJfFv58J/lVCEm6bhepKJuZJeu70AtJnq7hJ1TvlztjkyrxKxZkQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CH8PR21MB4695
Message-ID-Hash: BRDGSO2KDNLX3YLFUQ2OC6H53EYGWTKI
X-Message-ID-Hash: BRDGSO2KDNLX3YLFUQ2OC6H53EYGWTKI
X-MailFrom: Andrei.Popov@microsoft.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tls.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: "<tls@ietf.org>" <tls@ietf.org>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (Ends 2026-02-27)
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/_O5oCmLCowlZJeP3fPvMyluwLrU>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Owner: <mailto:tls-owner@ietf.org>
List-Post: <mailto:tls@ietf.org>
List-Subscribe: <mailto:tls-join@ietf.org>
List-Unsubscribe: <mailto:tls-leave@ietf.org>

Private sector SW vendors need to comply with government rulemaking, at least if they hope to sell products and services to the government. Also, certain private sector organizations tend to adopt government guidelines for their own operations.

I support the publication of this document as an RFC.

Cheers,

Andrei

From: Ben Schwartz <bemasc=40meta.com@dmarc.ietf.org>
Sent: Thursday, February 12, 2026 1:57 PM
To: Deirdre Connolly <durumcrustulum@gmail.com>; Russ Housley <housley@vigilsec.com>
Cc: <tls@ietf.org> <tls@ietf.org>
Subject: [EXTERNAL] [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (Ends 2026-02-27)

Thanks for the updates!  Is ITSP.40.111 really a regulation?  Like CNSA 2.0, it seems to be an internal rulemaking within a government, rather than a regulation that binds the private sector generally.

--Ben
________________________________
From: Deirdre Connolly <durumcrustulum@gmail.com<mailto:durumcrustulum@gmail.com>>
Sent: Thursday, February 12, 2026 4:51 PM
To: Russ Housley <housley@vigilsec.com<mailto:housley@vigilsec.com>>
Cc: <tls@ietf.org<mailto:tls@ietf.org>> <tls@ietf.org<mailto:tls@ietf.org>>
Subject: [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (Ends 2026-02-27)

Thank you all for reading and replying. I have pushed some changes to the GitHub repo based on the discussions so far (not to datatracker yet): https: //github. com/tlswg/draft-ietf-tls-mlkem/compare/draft-ietf-tls-mlkem-05. . main (the tlswg. org
Thank you all for reading and replying. I have pushed some changes to the GitHub repo based on the discussions so far (not to datatracker yet):

https://github.com/tlswg/draft-ietf-tls-mlkem/compare/draft-ietf-tls-mlkem-05..main

(the tlswg.org<https://urldefense.com/v3/__http://tlswg.org__;!!Bt8RZUm9aw!6JX0lHBakOKOQwkU93hOnbvZZ6g_ADsXsJYmMVCq0Ra-yBJw18dr8yOhFjY47bSWrXt9ihttVadVt3a6pukU$> domain is messed up otherwise i would link the diff based on the Editor's draft)

On Thu, Feb 12, 2026 at 4:39 PM Russ Housley <housley@vigilsec.com<mailto:housley@vigilsec.com>> wrote:
I support the publication of this document as an RFC.  I would prefer to have the clarity about ephemeral vs. static ML-KEM keys as posted by John Mattsson, but I can live with it as-is.

Russ


On Feb 12, 2026, at 3:08 PM, John Mattsson <john.mattsson=40ericsson.com@dmarc.ietf.org<mailto:40ericsson.com@dmarc.ietf.org>> wrote:

Hi,

I support publication iff all text related to “key reuse” is removed. In its current form, I do not believe -07 should be published.

Major Comments:

- FIPS 203 states that:

“the licensed patents be freely available to be practiced by any implementer of the ML-KEM algorithm as published by NIST.”

“requirements for the secure use of KEMs in applications, see SP 800-227.”

A reused key is, by definition, a static key. SP 800-227 imposes additional requirements for static keys compared to ephemeral keys. The draft does not explain how an implementer can satisfy these requirements. This creates potential non-conformance with NIST specifications.

-  The draft does not describe the significant security and privacy problems associated with key reuse. IND-CCA is a theoretical property of the algorithm. However, the security and privacy problems are related to the reuse of keys in the TLS 1.3 protocol in deployments.

Minor Comments:

- The discussion of randomness reuse in ciphertexts and references to SP 800-227 do not belong in a “key reuse” section. Ciphertexts are not keys, and SP 800-227 contains broader guidelines and requirements beyond static keys.

- “The client's shares are listed in descending order of client preference; the server selects one algorithm and sends its corresponding share.”

The server may also select no share and respond with a handshake_failure or a HelloRetryRequest (HRR). Since this is already specified in RFC 8446, it would be better to remove this text and simply reference RFC 8446.

- Section 5.1 appears to ​mix different concepts: hybrids, PQ/T hybrids, and lattice-based PQ/T hybrids. I assume the person asking for this section wanted a comparison with [ECDHE-MLKEM]. I suggest doing that. In the future, PQ/T hybrids will likely become less common, but it is unclear whether other hybrids (e.g., ML-KEM + HQC-KEM) will gain adoption.

Cheers,
John

From: Joseph Salowey <joe@salowey.net<mailto:joe@salowey.net>>
Date: Thursday, 12 February 2026 at 20:06
To:
<tls@ietf.org<mailto:tls@ietf.org>>
Subject: [TLS] WG Last Call: draft-ietf-tls-mlkem-05 (Ends 2026-02-27)
This message starts the second Working Group Last Call for the pure ML-KEM document (draft-ietf-tls-mlkem-07).

The file can be retrieved from:
https://datatracker.ietf.org/doc/draft-ietf-tls-mlkem/<https://urldefense.com/v3/__https://datatracker.ietf.org/doc/draft-ietf-tls-mlkem/__;!!Bt8RZUm9aw!6JX0lHBakOKOQwkU93hOnbvZZ6g_ADsXsJYmMVCq0Ra-yBJw18dr8yOhFjY47bSWrXt9ihttVadVt16FAWXD$>

The diff with the previous WGLC draft (-05) is here:

https://author-tools.ietf.org/iddiff?url1=draft-ietf-tls-mlkem-05&url2=draft-ietf-tls-mlkem-07&difftype=--html<https://urldefense.com/v3/__https://author-tools.ietf.org/iddiff?url1=draft-ietf-tls-mlkem-05&url2=draft-ietf-tls-mlkem-06&difftype=--html__;!!Bt8RZUm9aw!6JX0lHBakOKOQwkU93hOnbvZZ6g_ADsXsJYmMVCq0Ra-yBJw18dr8yOhFjY47bSWrXt9ihttVadVtyQI6w0v$>

The main focus of this WGLC is to review new text providing more context around the use of pure ML-KEM.  For those who indicated they wanted this text, please let us know if the new text satisfies you and if you support publication. This working group last call will end on February 27, 2026.

Thank You.
_______________________________________________
TLS mailing list -- tls@ietf.org<mailto:tls@ietf.org>
To unsubscribe send an email to tls-leave@ietf.org<mailto:tls-leave@ietf.org>

_______________________________________________
TLS mailing list -- tls@ietf.org<mailto:tls@ietf.org>
To unsubscribe send an email to tls-leave@ietf.org<mailto:tls-leave@ietf.org>