On Mon, Mar 23, 2026 at 04:30:45PM +1100, Viktor Dukhovni wrote:

> Given the extant IANA code points, and that support for non-hybrid
> ML-KEM is already present (though typically either or both not
> preferred, or enabled by default) in multiple TLS libraries, I see no
> rational motivation to oppose publication "in any form".  Surely, with
> appropriate caveats there's a way to get this specification published
> as an informational(!) RFC.
> 
> Blocking its publication changes little in practice, but creates some
> confusion about whether the specification is still subject to change,
> and may leave an impression that the IETF is out of touch. :-(

FWIW, by way of a mainstream reality check, the "gmail.com"
best-preference MX hosts accept "mlkem1024" by default (OpenSSL 3.5 and
later need to be explicitly coaxed to offer it):

    $ openssl s_client -brief -starttls smtp -CAfile /etc/pki/tls/cert.pem \
        -connect gmail-smtp-in.l.google.com:25 -groups mlkem1024
    Connecting to 142.251.12.27
    CONNECTION ESTABLISHED
    Protocol version: TLSv1.3
    Ciphersuite: TLS_AES_256_GCM_SHA384
    Requested Signature Algorithms: 
ecdsa_secp256r1_sha256:rsa_pss_rsae_sha256:rsa_pkcs1_sha256:ecdsa_secp384r1_sha384:rsa_pss_rsae_sha384:rsa_pkcs1_sha384:rsa_pss_rsae_sha512:rsa_pkcs1_sha512:rsa_pkcs1_sha1
    Peer certificate: CN=mx.google.com
    Hash used: SHA256
    Signature type: ecdsa_secp256r1_sha256
    Verification: OK
    Negotiated TLS1.3 group: MLKEM1024
    250 SMTPUTF8
    quit
    221 2.0.0 closing connection 41be03b00d2f7-c745e5d046csi13003379a12.253 - 
gsmtp

-- 
    Viktor.  🇺🇦 Слава Україні!

_______________________________________________
TLS mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to