On Tue, Oct 15, 2024 at 1:52 PM Alicja Kario <hka...@redhat.com> wrote:

> Do you plan to add support for secp256r1mlkem768 and secp384r1mlkem1024?
>

Not at this time. We want clients to guess correctly which PQ kex the
server supports, and that's easier if there are fewer deployed. Hopefully
clients will adopt
https://datatracker.ietf.org/doc/draft-davidben-tls-key-share-prediction/


> Running the tlsfuzzer script against pq.cloudflareresearch.com I see
> that it doesn't handle the errors correctly: it sends decode_error
> instead of illegal_parameter for malformed client key shares.
>

Thanks for checking. This was a slight oversight in BoringSSL, which has
been fixed last month [1], but we've not rebased our patches yet. To state
the obvious: this does not affect security in any way.


> Also, it looks to me like the encapsulation key checks are
> missing/incorrect,
> it accepts a malformed ML-KEM encapsulation key.
>

We will add the encapsulation key check once we remove Kyber support from
our edge. Again, this does not affect security.


> (You can find the test script in
> https://github.com/tlsfuzzer/tlsfuzzer/pull/963)
>

Thanks for putting this test suite together.

Best,

 Bas


[1]
https://boringssl.googlesource.com/boringssl/+/72a60506ded3407454d6ddc1d848c266020c0c82


>
> On Tuesday, 15 October 2024 10:44:52 CEST, Bas Westerbaan wrote:
> > As of today, we support X25519MLKEM768 (0x11ec) on essentially
> > all websites served through Cloudflare.
> >
> > Best,
> >
> >  Bas
> >
> > On Fri, Sep 6, 2024 at 1:02 PM Bas Westerbaan <b...@cloudflare.com>
> wrote:
> > Hi all,
> >
> > We are planning to replace X25519Kyber768Draft00 (0x6399)
> > with X25519MLKEM768 (0x11ec) [1], a hybrid of ML-KEM-768 and
> > X25519.
> >
> > We will support X25519Kyber768Draft00 and X25519MLKEM768 at the
> > same time for a while to allow clients the opportunity to
> > migrate without losing post-quantum security.
> >
> > Apart from these two, we also supported X25519Kyber768Draft00
> > under codepoint 0xfe31 and X25519Kyber512Draft00 (0xfe30). We
> > logged zero uses of these two in the last week with a 1/100
> > sample rate. We will disable 0xfe31, 0xfe30 over the common
> > weeks.
> >
> > Best,
> >
> >  Bas
> >
> >
> > PS. Not sure I shared it here already, but we have public graph
> > tracking client PQ key agreement
> > deployment:
> https://radar.cloudflare.com/adoption-and-usage#post-quantum-encryption-adoption
> > At the time of writing about 17% of all human traffic (by
> > request count) with us is using X25519Kyber768Draft00.
> >
> > [1] https://datatracker.ietf.org/doc/draft-kwiatkowski-tls-ecdhe-mlkem/
>
> --
> Regards,
> Alicja (nee Hubert) Kario
> Principal Quality Engineer, RHEL Crypto team
> Web: www.cz.redhat.com
> Red Hat Czech s.r.o., Purkyňova 115, 612 00, Brno, Czech Republic
>
>
_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to