<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.35 (Ruby 3.4.9) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-westerbaan-tls-keyshare-recommendations-01" category="std" consensus="true" submissionType="IETF" updates="8446, 9325" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.32.0 -->
  <front>
    <title>Updated recommendations for TLS keyshares</title>
    <seriesInfo name="Internet-Draft" value="draft-westerbaan-tls-keyshare-recommendations-01"/>
    <author initials="B. E." surname="Westerbaan" fullname="Bas Westerbaan">
      <organization>Cloudflare</organization>
      <address>
        <email>bas@cloudflare.com</email>
      </address>
    </author>
    <date year="2026" month="April" day="14"/>
    <area>Security</area>
    <workgroup>Transport Layer Security</workgroup>
    <abstract>
      <?line 40?>

<t>This document recommends X25519MLKEM768, SecP256r1MLKEM768
and SecP384r1MLKEM1024 for use in TLS
by updating their entries in the TLS Supported Groups registry
(previously EC Named Curve Registry)
to Recommended in the light
of the future arrival of cryptographically relevant quantum computers.</t>
      <t>[[ NOTE I use key share in the title and here as it's more accurate
   than "group" and perhaps more well known in the context TLS
   than key agreement or key exchange. ]]</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://bwesterb.github.io/draft-westerbaan-tls-keyshare-recommendations/draft-westerbaan-tls-keyshare-recommendations.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-westerbaan-tls-keyshare-recommendations/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Transport Layer Security Working Group mailing list (<eref target="mailto:tls@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tls/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tls/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/bwesterb/draft-westerbaan-tls-keyshare-recommendations"/>.</t>
    </note>
  </front>
  <middle>
    <?line 54?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>A future cryptographically relevant quantum computer (CRQC)
<xref target="RFC9794"/> can decrypt
TLS handshakes recorded today that do not use post-quantum algorithms
for their key shares:
algorithms designed to be resistant against quantum attack.
This threat is known as "harvest now, decrypt later" (HNDL)
<xref target="I-D.ietf-pquip-pqc-engineers"/>.</t>
      <t>To address this threat, this document updates the
<eref target="https://www.iana.org/assignments/tls-parameters/tls-parameters.xhtml#tls-parameters-8">TLS Supported Groups registry</eref>
to mark the post-quantum key shares X25519MLKEM768,
SecP256r1MLKEM768 and SecP384r1MLKEM1024
as Recommended (Y) as defined in <xref section="6" sectionFormat="of" target="RFC9847"/>.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Before the arrival of a cryptographically relevant quantum computer (CRQC),
a TLS connection that negotiated a non-post quantum key share can be recorded
decrypted in the future.</t>
      <t>After the arrival of a CRQC, allowing a non-post quantum key share to be
negotiated allows for an active quantum attack that achieves MITM,
even if the server certificate is post quantum.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document updates the <eref target="https://www.iana.org/assignments/tls-parameters/tls-parameters.xhtml#tls-parameters-8">TLS Supported Groups registry</eref>, according to the procedures in <xref section="6" sectionFormat="of" target="RFC9847"/> as follows.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Value</th>
            <th align="left">Description</th>
            <th align="left">Recommended</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">4587</td>
            <td align="left">SecP256r1MLKEM768</td>
            <td align="left">Y</td>
          </tr>
          <tr>
            <td align="left">4588</td>
            <td align="left">X25519MLKEM768</td>
            <td align="left">Y</td>
          </tr>
          <tr>
            <td align="left">4589</td>
            <td align="left">SecP384r1MLKEM1024</td>
            <td align="left">Y</td>
          </tr>
        </tbody>
      </table>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC9325">
          <front>
            <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="November" year="2022"/>
            <abstract>
              <t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are used to protect data exchanged over a wide range of application protocols and can also form the basis for secure transport protocols. Over the years, the industry has witnessed several serious attacks on TLS and DTLS, including attacks on the most commonly used cipher suites and their modes of operation. This document provides the latest recommendations for ensuring the security of deployed services that use TLS and DTLS. These recommendations are applicable to the majority of use cases.</t>
              <t>RFC 7525, an earlier version of the TLS recommendations, was published when the industry was transitioning to TLS 1.2. Years later, this transition is largely complete, and TLS 1.3 is widely available. This document updates the guidance given the new environment and obsoletes RFC 7525. In addition, this document updates RFCs 5288 and 6066 in view of recent attacks.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="195"/>
          <seriesInfo name="RFC" value="9325"/>
          <seriesInfo name="DOI" value="10.17487/RFC9325"/>
        </reference>
        <reference anchor="RFC9847">
          <front>
            <title>IANA Registry Updates for TLS and DTLS</title>
            <author fullname="J. Salowey" initials="J." surname="Salowey"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="December" year="2025"/>
            <abstract>
              <t>This document updates the changes to the TLS and DTLS IANA registries made in RFC 8447. It adds a new value, "D" for discouraged, to the "Recommended" column of the selected TLS registries and adds a "Comment" column to all active registries that do not already have a "Comment" column. Finally, it updates the registration request instructions.</t>
              <t>This document updates RFC 8447.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9847"/>
          <seriesInfo name="DOI" value="10.17487/RFC9847"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9794">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="F. Driscoll" initials="F." surname="Driscoll"/>
            <author fullname="M. Parsons" initials="M." surname="Parsons"/>
            <author fullname="B. Hale" initials="B." surname="Hale"/>
            <date month="June" year="2025"/>
            <abstract>
              <t>One aspect of the transition to post-quantum algorithms in cryptographic protocols is the development of hybrid schemes that incorporate both post-quantum and traditional asymmetric algorithms. This document defines terminology for such schemes. It is intended to be used as a reference and, hopefully, to ensure consistency and clarity across different protocols, standards, and organisations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9794"/>
          <seriesInfo name="DOI" value="10.17487/RFC9794"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqc-engineers">
          <front>
            <title>Post-Quantum Cryptography for Engineers</title>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dimitrios Schoinianakis" initials="D." surname="Schoinianakis">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <date day="25" month="August" year="2025"/>
            <abstract>
              <t>   The advent of a cryptographically relevant quantum computer (CRQC)
   would render state-of-the-art, traditional public key algorithms
   deployed today obsolete, as the mathematical assumptions underpinning
   their security would no longer hold.  To address this, protocols and
   infrastructure must transition to post-quantum algorithms, which are
   designed to resist both traditional and quantum attacks.  This
   document explains why engineers need to be aware of and understand
   post-quantum cryptography (PQC), detailing the impact of CRQCs on
   existing systems and the challenges involved in transitioning to
   post-quantum algorithms.  Unlike previous cryptographic updates, this
   shift may require significant protocol redesign due to the unique
   properties of post-quantum algorithms.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqc-engineers-14"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA8VWzXLbNhC+4ym2zKFOR6QjR7ZlTSaJLCuNppKd2HJTj8cH
iIREjCmCAUApqu136bP0yboLktafk457KQ8SsQR2F99++wG+7zMrbSJa4F1m
EbciAi1CNZ2KFEdSpQbGSsOwfwG3YmFiroXxWIgTJ0ovWmBsxFikwpRP0Uek
+dj6c2Gs0CPOU98mxq/W+RuO/Vd1lruYpgXNRuOgBkev9/aZyUdTaQxOsYsM
nfa6ww8AL4AnRmGaMo1Ehk5Ear0aeCKSVmnJExr02sf4h/l6vfPhB4+l+XQk
dItRkBabteA1w0Q4erkQYa6lXXhsrvTtRKs8Q+tQ89RkSlvo84XQsJyFm8CJ
EToRaY6+AP59DUCxAe8LhpDpBH6lJWSfcpmgHdF5L4UdB0pPyMx1GKM5tjYz
rd1dmkUmORNBNW2XDLsjreZG7OL6XVo3kTbOR7hyVEK/+6xCkIuEymBXgleu
gsJ5INXznD5vdhDbaeIxxnMbKywY+JgTgEyRGsdBN4Avj37ch3GeJAXljrnZ
/Igw8VT+6Ty3oJOoPBojkMJ9FAX2I27eh49fAkyGsVTpKS6aufKef+gQJ8tX
Imb12mwcthiT6Xhj+tHhUYNee/6JK5effc1lhr+hL9KJTIXQBhcGQcCY7/vA
R8ZqHlrG2DCWBrCLckTELhvQwB97+/v1o0H/t+7g8KBZI3J92ts/0PXKxHga
OevrZqO01l/tNVzT5kYggtS7bLQA12rEQhsLqQEDaSkMTUCDa/CLPCMeowQ4
ohpMZCIxxwXbybSYSZWbZAHdDpwi8hF0cj0TcF7OecmswkGZOX4uHSdyElum
xm4wzm2uBfJcyxlPAK2hXmRWTTTPYhnyBP1rkYgZRxi+5vibTwFdZjnW1yBu
19dwejbsQs9tDtkEjk5VMCdlQJDEguLg9uzPBqaKBiH2JbKcWGBjnoLnOthz
0zOhY56VM+ciSeA2VfO08huiFolv1kFZLafgfKKFcDVDuMkgvoX4bSICuLkp
qjyVUZQIxl5ADxFXUR4SLRlrV2A8AwHY6Zx/7rxkd3cl3R4eIMRUIuGcMCoi
ho8Qk1thHI80lcKqiC8oa4skg1RZh16mjPWrEDxBPcdOnxpG1Ck48ogv8nY5
AcMZOUmdXxgJDGOQAZQvn3Ds2GXe3Foe3gYFvW2MymsB3wposTge+p5h72JK
81q1CydF2oOdj6cnfdrrj/rp4QFJMVTAowjToCCPkWrF4LGryqOGtsauf0j3
m51KBOfzeSB5ygvlNbRt8mVIef2Ma+wDIubGMPhGavZi3eg3XYdMub51lFpD
fwn0ZsezrY6HpzueIZ6r7bdz9ZIgjsRYpkU33t3hKiIfHFDnlVLmEER2dlSK
R1tx4lOEE1oo3Zj0qWg2OgKxbIPLiyEdt/RP/Ujv593Pl73z7gm9X3xs9/uP
L6yccfHx7LJ/snxbruycDQbd05NiMVphzcS8QfsKv1BW3tmnYe/stN33itZc
LTDpQMFIid2qUbKottww5Guo5ahA4bjz6e+/6g1E4ydEYK9eP8ImKgbN+iF1
1DwWaRFNpdiNxRBLtmA8ywTX5AX7FDsvkxYvJTXC2cTEaVIdhPOXa0LmpgVv
RmFWb7wtDbThNWOF2ZrRYbZt2VpcgPiE6Ykwj2iu2TeQXs+3fbU2rnBfMb55
lyC1wK83371ljkPV1YfIZGQkNC/5cyzGJKzE+xXt5/9B+2qMu7MKFTkt2ex0
LcX7qJXu/spRTlKf+gu2+svJpdOsQhpZKTrL86pQZSxie0xRt1KmLGpUfzWn
w/SHwRwb2WpqtKy4UWMeePbj7WFDLYvtcLz1CZRGGPSGgxrDVzyLijPUCNRM
DaHQVo4l3cRJU1czCNxp0z5tb9Vh+D1FhP9HEWt0KmMh3LVEFbqoVSiiXBdX
k+9pFrXcWDk0cbf38DtPcgH3qFrU6plbUT73a7J4z+794qn+1551I06Gxn7z
kJxs6zAar2D5lJOdfV3EyzSemHxUed64vW1OLq4SI6QH+wdbgJ7asg0AAA==

-->

</rfc>
