<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.35 (Ruby 3.4.9) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-westerbaan-tls-keyshare-recommendations-02" category="std" consensus="true" submissionType="IETF" updates="8446, 9325" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.32.0 -->
  <front>
    <title>Updated recommendations for TLS keyshares</title>
    <seriesInfo name="Internet-Draft" value="draft-westerbaan-tls-keyshare-recommendations-02"/>
    <author initials="B. E." surname="Westerbaan" fullname="Bas Westerbaan">
      <organization>Cloudflare</organization>
      <address>
        <email>bas@cloudflare.com</email>
      </address>
    </author>
    <author initials="M." surname="Usama Sardar" fullname="Muhammad Usama Sardar">
      <organization>TU Dresden</organization>
      <address>
        <email>muhammad_usama.sardar@tu-dresden.de</email>
      </address>
    </author>
    <date year="2026" month="April" day="14"/>
    <area>Security</area>
    <workgroup>Transport Layer Security</workgroup>
    <abstract>
      <?line 45?>

<t>This document recommends X25519MLKEM768 for use in TLS
by updating its entry in the TLS Supported Groups registry
(previously EC Named Curve Registry)
to Recommended in the light
of the future arrival of cryptographically relevant quantum computers.</t>
      <t>[[ NOTE I use key share in the title and here as it's more accurate
   than "group" and perhaps more well known in the context TLS
   than key agreement or key exchange. ]]</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://bwesterb.github.io/draft-westerbaan-tls-keyshare-recommendations/draft-westerbaan-tls-keyshare-recommendations.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-westerbaan-tls-keyshare-recommendations/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Transport Layer Security Working Group mailing list (<eref target="mailto:tls@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tls/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tls/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/bwesterb/draft-westerbaan-tls-keyshare-recommendations"/>.</t>
    </note>
  </front>
  <middle>
    <?line 58?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>A future cryptographically relevant quantum computer (CRQC)
<xref target="RFC9794"/> can decrypt
TLS handshakes recorded today that do not use post-quantum algorithms
for their key shares:
algorithms designed to be resistant against quantum attack.
This threat is known as "harvest now, decrypt later" (HNDL)
<xref target="I-D.ietf-pquip-pqc-engineers"/>.</t>
      <t>To address this threat, this document updates the
<eref target="https://www.iana.org/assignments/tls-parameters/tls-parameters.xhtml#tls-parameters-8">TLS Supported Groups registry</eref>
to mark X25519MLKEM768 as Recommended (Y)
as defined in <xref section="6" sectionFormat="of" target="RFC9847"/>,
as it is a post-quantum key share with widespread support.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Before the arrival of a cryptographically relevant quantum computer (CRQC),
a TLS connection that negotiated a non-post quantum key share can be recorded
decrypted in the future.</t>
      <t>After the arrival of a CRQC, allowing a non-post quantum key share to be
negotiated allows for an active quantum attack that achieves MITM,
even if the server certificate is post quantum.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document updates the <eref target="https://www.iana.org/assignments/tls-parameters/tls-parameters.xhtml#tls-parameters-8">TLS Supported Groups registry</eref>, according to the procedures in <xref section="6" sectionFormat="of" target="RFC9847"/> as follows.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Value</th>
            <th align="left">Description</th>
            <th align="left">Recommended</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">4588</td>
            <td align="left">X25519MLKEM768</td>
            <td align="left">Y</td>
          </tr>
        </tbody>
      </table>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC9325">
          <front>
            <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="November" year="2022"/>
            <abstract>
              <t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are used to protect data exchanged over a wide range of application protocols and can also form the basis for secure transport protocols. Over the years, the industry has witnessed several serious attacks on TLS and DTLS, including attacks on the most commonly used cipher suites and their modes of operation. This document provides the latest recommendations for ensuring the security of deployed services that use TLS and DTLS. These recommendations are applicable to the majority of use cases.</t>
              <t>RFC 7525, an earlier version of the TLS recommendations, was published when the industry was transitioning to TLS 1.2. Years later, this transition is largely complete, and TLS 1.3 is widely available. This document updates the guidance given the new environment and obsoletes RFC 7525. In addition, this document updates RFCs 5288 and 6066 in view of recent attacks.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="195"/>
          <seriesInfo name="RFC" value="9325"/>
          <seriesInfo name="DOI" value="10.17487/RFC9325"/>
        </reference>
        <reference anchor="RFC9847">
          <front>
            <title>IANA Registry Updates for TLS and DTLS</title>
            <author fullname="J. Salowey" initials="J." surname="Salowey"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="December" year="2025"/>
            <abstract>
              <t>This document updates the changes to the TLS and DTLS IANA registries made in RFC 8447. It adds a new value, "D" for discouraged, to the "Recommended" column of the selected TLS registries and adds a "Comment" column to all active registries that do not already have a "Comment" column. Finally, it updates the registration request instructions.</t>
              <t>This document updates RFC 8447.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9847"/>
          <seriesInfo name="DOI" value="10.17487/RFC9847"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9794">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="F. Driscoll" initials="F." surname="Driscoll"/>
            <author fullname="M. Parsons" initials="M." surname="Parsons"/>
            <author fullname="B. Hale" initials="B." surname="Hale"/>
            <date month="June" year="2025"/>
            <abstract>
              <t>One aspect of the transition to post-quantum algorithms in cryptographic protocols is the development of hybrid schemes that incorporate both post-quantum and traditional asymmetric algorithms. This document defines terminology for such schemes. It is intended to be used as a reference and, hopefully, to ensure consistency and clarity across different protocols, standards, and organisations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9794"/>
          <seriesInfo name="DOI" value="10.17487/RFC9794"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqc-engineers">
          <front>
            <title>Post-Quantum Cryptography for Engineers</title>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dimitrios Schoinianakis" initials="D." surname="Schoinianakis">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <date day="25" month="August" year="2025"/>
            <abstract>
              <t>   The advent of a cryptographically relevant quantum computer (CRQC)
   would render state-of-the-art, traditional public key algorithms
   deployed today obsolete, as the mathematical assumptions underpinning
   their security would no longer hold.  To address this, protocols and
   infrastructure must transition to post-quantum algorithms, which are
   designed to resist both traditional and quantum attacks.  This
   document explains why engineers need to be aware of and understand
   post-quantum cryptography (PQC), detailing the impact of CRQCs on
   existing systems and the challenges involved in transitioning to
   post-quantum algorithms.  Unlike previous cryptographic updates, this
   shift may require significant protocol redesign due to the unique
   properties of post-quantum algorithms.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqc-engineers-14"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA8VWXVMbNxR916+4dR5KOt6lEAjgyaQxxmk8xZCAacowTEfe
lb0a9iuSFscF/kt/S39Zz9XaGJuUDn3pPtjSXeneq3PvOdogCITTLlUtapyV
sXQqJqOiIstUjpkuckujwtDg8JSu1NQm0ijbEBEWjgszbZF1sRBxEeUyg4/Y
yJELJso6ZYZS5oFLbTDfF6w4Dn7cFJWPaVu0u7X1ukl7rza3ha2GmbYWS9y0
hNNed/Ce6AXJ1BZIU+exKuFE5a7RpIaKtSuMlilPeu19/CHfRu9k8L4h8iob
KtMSHKQlrlv0SiARCS+nKqqMdtOGmBTmamyKqoR1YGRuy8I4OpRTZWixCofA
whhOVF7BF9G/7yGqD9D4jBA6H9PPvIXtmdQp7EDnnVZuFBZmzGZpogTmxLnS
ttbXeRWb9LUK58vW2bA+NMXEqnXsX+d9Y+2Saoidwxn0688qBLtIuQzuQfC5
q7B2HurieU6ftzpMXJY2hJCVSwoUjALkRKRztMZ+2A3p870f/2JUpWndcvvS
rr4ETDLXf3jPLeqkRRWPAKTyL1WN/VDad9H9mxDJLMXsh3RmZSbpVJpYmpWY
/SqRWSbjx2uWQw/O6AB8Qas+DJ3Ndv9e8e7Q+t3vXBXE9dowVkLkhcng5dq3
2sn7DvNjNmSSzIe7WzstIXQ+Wlm+t7O3xcNecOBbJyi/VLrEbxSofKxzpYzF
xjAMhQiCgOTQOiMjJ4QYJNoSGF2hOm4hBpZ+29ze3tjrH/7S7e+83vWyUFkF
vFgdxHBKnszc59pZwmYz5ZcuUV4+TquSWQKB8TSwcD3WiDoVa6VR17qobDql
boeOgHFMncpcKzqZrXkpXIHJLBe8njlO9Thxohj5yahylVFgkdHXMiVYIzMt
XTE2skx0JFP4NypV1xIH+1Lht8oILssK3WOBxMUFHR0PutTzB0Ovkm/WeTAv
lCTzmBLFcSwO+r2lrOBJBNaDQ1xol8icGl4fGn55qUwiy9nKiUpTusqLST73
G0Hp1FfnYZxv5+BybJTyVQDUbFBfI7wbq5AuL+u6ZTqOU7TLC+oB7yKuIu48
IdpzMJ6BAK11Tj51Xoqbm1kD3d1RhFRi5Z0ILiLCx8DkSlnfGYZL4YpYTjlr
h7ahvHAevbKwLpiHkCluC+hIZgW3DQ6tzQJfdOJiAcJZPc69XxoqhLHoAM5X
jiW4uchbOiejq7BuWJdA1x1hVEOL4jTg+xrKgJQmzfkpvNCZBq19ODo45LM+
xZC7OzTFoCAZMzU5yH2kZj2558nsIuOjiYsn2/1ybS6xk8kk1DKXta5bPjb7
sqzrQSkNeMCNuTINv7JWvlg2BrueIZk0V6s8BRIPibN2/lJIRnmk85pHNze4
srht6DVzZiYrd3dN4TucMZXL5VwwY4Ka4Qc1A4chiLY+NWBDS3aKHLdl/RHB
NDjgmNrPWWZqhvGtilr1z04HfIPzP5OQxyfdT2e9k+4Bj08/tA8P7wdituL0
w/HZ4cFitNjZOe73u0cH9WZYackkGv32Od5wVo3jj4Pe8VH7sFHz8WFV+Yh1
G2pQ1OCMXFBpBQ4cGT2sAdzvfPzrz40tAPkdwNvc2NgDc+rJ7sYO02iSqLyO
VuSgYD1Fq0yFLEslDXsBOUG3Ujt85zS5ajbhRmapAZw/XDAyly16M4zKja23
MwMfeMk4x2zJ6DF7bHm0uQbxG6ZvhLlHc8m+gvRyvu3zpfkc9wfGNz+l6EoK
NnZ/eit8D82/priZLPrMyFn/7KsRqynr5wPBl/9B8NDn/oKCDOczIngxy/GJ
67T/JJbQkDxgDtBjDrBGeqGq9VDMlGZxSdVSjCK2Rxz1UcqcRZPrX0z49nwy
mO9G8TA13lZ/pCMPXOH4CFiRyPo4Eh+SCnpI/d6g3xQY4gKqL06rIJSGImWc
Hmn+uGfSP8wg9FdM+6j9qA6Df5JB+n9ksMlXMQrBSAIsTqQ0RaRilMA+JXdM
uVHh0cRpb+lXmVaKbqFaTPXS75g9t0uKeitug/qZ/y89y0Yspq3t3V12siLU
tedzWjy3or7lhyii+BsPEcAAqw0AAA==

-->

</rfc>
