PQ/T Hybrid Key Exchange with ML-KEM in SSH
draft-ietf-sshm-mlkem-hybrid-kex-09
Revision differences
Document history
| Date | Rev. | By | Action |
|---|---|---|---|
|
2026-02-02
|
09 | (System) | Changed action holders to Deb Cooley (IESG state changed) |
|
2026-02-02
|
09 | (System) | Sub state has been changed to AD Followup from Revised I-D Needed |
|
2026-02-02
|
09 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed |
|
2026-02-02
|
09 | Panos Kampanakis | New version available: draft-ietf-sshm-mlkem-hybrid-kex-09.txt |
|
2026-02-02
|
09 | (System) | New version approved |
|
2026-02-02
|
09 | (System) | Request for posting confirmation emailed to previous authors: Douglas Stebila , Panos Kampanakis , Torben Hansen |
|
2026-02-02
|
09 | Panos Kampanakis | Uploaded new revision |
|
2026-01-22
|
08 | (System) | Changed action holders to Panos Kampanakis, Douglas Stebila, Torben Hansen (IESG state changed) |
|
2026-01-22
|
08 | Cindy Morgan | IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation |
|
2026-01-22
|
08 | Gorry Fairhurst | [Ballot comment] Thank you for the work that has been put into this document. I do not see any transport-protocol related concerns. In the abstract, … [Ballot comment] Thank you for the work that has been put into this document. I do not see any transport-protocol related concerns. In the abstract, I note: "This document defines Post-Quantum Traditional (PQ/T) Hybrid key exchange methods based on the quantum-resistant the Module-Lattice- Based Key-Encapsulation Mechanism (ML-KEM) standard and traditional Elliptic-curve Diffie–Hellman (ECDH) key exchange schemes." - which to me reads as containing an additional "the" (after resistant) or missing punctuation? |
|
2026-01-22
|
08 | Gorry Fairhurst | [Ballot Position Update] New position, No Objection, has been recorded for Gorry Fairhurst |
|
2026-01-21
|
08 | Roman Danyliw | [Ballot discuss] (revised ballot, I made a mistake in my earlier feedback) Section 2.3.1. This section appears to be normatively describing which algorithms are associated … [Ballot discuss] (revised ballot, I made a mistake in my earlier feedback) Section 2.3.1. This section appears to be normatively describing which algorithms are associated with the code point “mlkem768nistp256-sha256”. Specifically: The HASH function used in the key exchange [RFC4253] is SHA-256 [nist-sha2] [RFC6234]. As such, why is [RFC6234] or [nist-sha2] not normative referenced to cover SHA-256? My thinking is that an implementer needs to read those algorithm descriptions to implement those code points. Same thinking applies for 2.3.2 (mlkem1024nistp384-sha384) and 2.3.3 (mlkem768x25519-sha256). |
|
2026-01-21
|
08 | Roman Danyliw | Ballot discuss text updated for Roman Danyliw |
|
2026-01-21
|
08 | Mahesh Jethanandani | [Ballot Position Update] New position, No Objection, has been recorded for Mahesh Jethanandani |
|
2026-01-21
|
08 | Roman Danyliw | [Ballot discuss] Section 2.3.1. This section appears to be normatively describing which algorithms are associated with the code point “mlkem768nistp256-sha256”. As such, why are [nist-sp800-186], … [Ballot discuss] Section 2.3.1. This section appears to be normatively describing which algorithms are associated with the code point “mlkem768nistp256-sha256”. As such, why are [nist-sp800-186], [FIPS203] and [RFC6234] or [nist-sha2] not normative references? My thinking is that an implementer needs to read those algorithm descriptions to implement those code points. Same thinking applies for 2.3.2 (mlkem1024nistp384-sha384) (but no new references beyond those in Section 2.3.1) and 2.3.3 (mlkem768x25519-sha256) which needs [RFC7748] |
|
2026-01-21
|
08 | Roman Danyliw | [Ballot comment] Thank you to Thomas Fossati for the GENART review. |
|
2026-01-21
|
08 | Roman Danyliw | [Ballot Position Update] New position, Discuss, has been recorded for Roman Danyliw |
|
2026-01-21
|
08 | Andy Newton | [Ballot Position Update] New position, No Objection, has been recorded for Andy Newton |
|
2026-01-21
|
08 | Jim Guichard | [Ballot Position Update] New position, No Objection, has been recorded for Jim Guichard |
|
2026-01-21
|
08 | Ketan Talaulikar | [Ballot Position Update] New position, No Objection, has been recorded for Ketan Talaulikar |
|
2026-01-17
|
08 | Paul Wouters | [Ballot comment] Thank you for not referencing RFC 4086 :) One minor comment: The following private namespace message numbers are defined … [Ballot comment] Thank you for not referencing RFC 4086 :) One minor comment: The following private namespace message numbers are defined in this document: I was confused because I was thinking "IETF" namespace vs vendor namespace. Since RFC 4250 calls these "Key exchange method numbers", perhaps write: This document defines the following Key exchange method numbers: This also aligns up with how 2.3 talks about "key exchange method names". |
|
2026-01-17
|
08 | Paul Wouters | [Ballot Position Update] New position, Yes, has been recorded for Paul Wouters |
|
2026-01-16
|
08 | (System) | IANA Review state changed to IANA OK - Actions Needed from Version Changed - Review Needed |
|
2026-01-15
|
08 | Mohamed Boucadair | [Ballot comment] Hi Panos, Douglas, and Torben, Thank you for the effort put into this well-written specification. Thanks also to Thomas Graf for the OPSDIR … [Ballot comment] Hi Panos, Douglas, and Torben, Thank you for the effort put into this well-written specification. Thanks also to Thomas Graf for the OPSDIR review and the authors for engaging. Please find below few comments: # c2pq I have one minor comment about this part: However, if sufficiently large quantum computers become available, these instances would no longer be computationally infeasible rendering the current key exchange and authentication methods in SSH insecure [I-D.hoffman-c2pq]. I-D.hoffman-c2pq was expired since 2020. More importantly, it is not clear to me which parts of that draft is important here. If the intent is to have a reference for CRQC threats, maybe better to cite draft-ietf-pquip-pqc-engineers#Section 3. # Packet Size CURRENT: This document does not define behavior in cases where a PQ/T Hybrid key exchange message causes a packet to exceed the minimally supported packet length. I understand that this is left unspecified. However, rfc4253#section-6.1 has the following provision: Implementations SHOULD support longer packets, where they might be needed. For example, if an implementation wants to send a very large number of certificates, the larger packets MAY be sent if the identification string indicates that the other party is able to process them. However, implementations SHOULD check that the packet length is reasonable in order for the implementation to avoid denial of service and/or buffer overflow attacks. Are we also saying that part of 4253 should be skipped? BTW, if the message is not sent because of a packet length issue, it would be helpful if that event is logged as this would help with troubleshooting. Cheers, Med |
|
2026-01-15
|
08 | Mohamed Boucadair | [Ballot Position Update] New position, No Objection, has been recorded for Mohamed Boucadair |
|
2026-01-13
|
08 | Gunter Van de Velde | [Ballot Position Update] New position, No Objection, has been recorded for Gunter Van de Velde |
|
2026-01-08
|
08 | Erik Kline | [Ballot Position Update] New position, No Objection, has been recorded for Erik Kline |
|
2026-01-07
|
08 | Morgan Condie | Placed on agenda for telechat - 2026-01-22 |
|
2026-01-07
|
08 | Deb Cooley | Ballot has been issued |
|
2026-01-07
|
08 | Deb Cooley | [Ballot Position Update] New position, Yes, has been recorded for Deb Cooley |
|
2026-01-07
|
08 | Deb Cooley | Created "Approve" ballot |
|
2026-01-07
|
08 | Deb Cooley | IESG state changed to IESG Evaluation from Waiting for AD Go-Ahead |
|
2026-01-07
|
08 | Deb Cooley | Ballot writeup was changed |
|
2026-01-06
|
08 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed |
|
2026-01-06
|
08 | Panos Kampanakis | New version available: draft-ietf-sshm-mlkem-hybrid-kex-08.txt |
|
2026-01-06
|
08 | (System) | New version approved |
|
2026-01-06
|
08 | (System) | Request for posting confirmation emailed to previous authors: Douglas Stebila , Panos Kampanakis , Torben Hansen |
|
2026-01-06
|
08 | Panos Kampanakis | Uploaded new revision |
|
2026-01-01
|
07 | (System) | IESG state changed to Waiting for AD Go-Ahead from In Last Call |
|
2026-01-01
|
07 | Thomas Graf | Request for IETF Last Call review by OPSDIR Completed: Ready. Reviewer: Thomas Graf. Sent review to list. |
|
2025-12-26
|
07 | Barry Leiba | Request for IETF Last Call review by ARTART is assigned to Tara Whalen |
|
2025-12-26
|
07 | Francesca Palombini | Assignment of request for IETF Last Call review by ARTART to Francesca Palombini was rejected |
|
2025-12-22
|
07 | David Dong | IESG/Authors/WG Chairs: IANA has completed its review of draft-ietf-sshm-mlkem-hybrid-kex-07. If any part of this review is inaccurate, please let us know. IANA understands that, upon … IESG/Authors/WG Chairs: IANA has completed its review of draft-ietf-sshm-mlkem-hybrid-kex-07. If any part of this review is inaccurate, please let us know. IANA understands that, upon approval of this document, there is a single action which we must complete. In the Key Exchange Method Names registry in the Secure Shell (SSH) Protocol Parameters registry group located at: https://www.iana.org/assignments/ssh-parameters/ three method names registered by an earlier version of this document will be updated as follows: Method Name: mlkem768nistp256-sha256 Reference: [ RFC-to-be ] Note: OK to Implement: SHOULD Method Name: mlkem1024nistp384-sha384 Reference: [ RFC-to-be ] Note: OK to Implement: SHOULD Method Name: mlkem768x25519-sha256 Reference: [ RFC-to-be ] Note: OK to Implement: SHOULD As this document requests registrations in an Expert Review or Specification Required (see RFC 8126) registry, we have completed the required Expert Review via a separate request. We understand that this is the only action required to be completed upon approval of this document. NOTE: The actions requested in this document will not be completed until the document has been approved for publication as an RFC. This message is meant only to confirm the list of actions that will be performed. For definitions of IANA review states, please see: https://datatracker.ietf.org/help/state/draft/iana-review Thank you, David Dong IANA Services Sr. Specialist |
|
2025-12-22
|
07 | (System) | IANA Review state changed to IANA OK - Actions Needed from IANA - Review Needed |
|
2025-12-22
|
07 | David Dong | IANA Experts State changed to Expert Reviews OK |
|
2025-12-18
|
07 | Thomas Fossati | Request for IETF Last Call review by GENART Completed: Ready. Reviewer: Thomas Fossati. Review has been revised by Thomas Fossati. |
|
2025-12-17
|
07 | Panos Kampanakis | New version available: draft-ietf-sshm-mlkem-hybrid-kex-07.txt |
|
2025-12-17
|
07 | (System) | New version approved |
|
2025-12-17
|
07 | (System) | Request for posting confirmation emailed to previous authors: Douglas Stebila , Panos Kampanakis , Torben Hansen |
|
2025-12-17
|
07 | Panos Kampanakis | Uploaded new revision |
|
2025-12-17
|
06 | Barry Leiba | Assignment of request for IETF Last Call review by ARTART to Thomas Fossati was withdrawn |
|
2025-12-17
|
06 | Barry Leiba | Request for IETF Last Call review by ARTART is assigned to Francesca Palombini |
|
2025-12-17
|
06 | Panos Kampanakis | New version available: draft-ietf-sshm-mlkem-hybrid-kex-06.txt |
|
2025-12-17
|
06 | (System) | New version approved |
|
2025-12-17
|
06 | (System) | Request for posting confirmation emailed to previous authors: Douglas Stebila , Panos Kampanakis , Torben Hansen |
|
2025-12-17
|
06 | Panos Kampanakis | Uploaded new revision |
|
2025-12-17
|
05 | Barry Leiba | Request for IETF Last Call review by ARTART is assigned to Thomas Fossati |
|
2025-12-17
|
05 | Thomas Fossati | Request for IETF Last Call review by GENART Completed: Ready with Nits. Reviewer: Thomas Fossati. Sent review to list. |
|
2025-12-15
|
05 | Jean Mahoney | Request for IETF Last Call review by GENART is assigned to Thomas Fossati |
|
2025-12-12
|
05 | Tero Kivinen | Request for IETF Last Call review by SECDIR is assigned to Karen O'Donoghue |
|
2025-12-12
|
05 | Bo Wu | Request for IETF Last Call review by OPSDIR is assigned to Thomas Graf |
|
2025-12-11
|
05 | Mohamed Boucadair | Requested IETF Last Call review by OPSDIR |
|
2025-12-11
|
05 | Morgan Condie | IANA Review state changed to IANA - Review Needed |
|
2025-12-11
|
05 | Morgan Condie | The following Last Call announcement was sent out (ends 2026-01-01): From: The IESG To: IETF-Announce CC: debcooley1@gmail.com, draft-ietf-sshm-mlkem-hybrid-kex@ietf.org, ssh@ietf.org, sshm-chairs@ietf.org, stephen.farrell@cs.tcd.ie … The following Last Call announcement was sent out (ends 2026-01-01): From: The IESG To: IETF-Announce CC: debcooley1@gmail.com, draft-ietf-sshm-mlkem-hybrid-kex@ietf.org, ssh@ietf.org, sshm-chairs@ietf.org, stephen.farrell@cs.tcd.ie Reply-To: last-call@ietf.org Sender: Subject: Last Call: (PQ/T Hybrid Key Exchange with ML-KEM in SSH) to Informational RFC The IESG has received a request from the Secure Shell Maintenance WG (sshm) to consider the following document: - 'PQ/T Hybrid Key Exchange with ML-KEM in SSH' as Informational RFC The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the last-call@ietf.org mailing lists by 2026-01-01. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract This document defines Post-Quantum Traditional (PQ/T) Hybrid key exchange methods based on the quantum-resistant the Module-Lattice- Based Key-Encapsulation Mechanism (ML-KEM) standard and traditional Elliptic-curve Diffie–Hellman (ECDH) key exchange schemes. These methods are defined for use in the SSH Transport Layer Protocol. The file can be obtained via https://datatracker.ietf.org/doc/draft-ietf-sshm-mlkem-hybrid-kex/ The following IPR Declarations may be related to this I-D: https://datatracker.ietf.org/ipr/7097/ |
|
2025-12-11
|
05 | Morgan Condie | IESG state changed to In Last Call from Last Call Requested |
|
2025-12-11
|
05 | Morgan Condie | Last call announcement was changed |
|
2025-12-11
|
05 | Deb Cooley | Last call was requested |
|
2025-12-11
|
05 | Deb Cooley | Last call announcement was generated |
|
2025-12-11
|
05 | Deb Cooley | Ballot approval text was generated |
|
2025-12-11
|
05 | Deb Cooley | IESG state changed to Last Call Requested from AD Evaluation::AD Followup |
|
2025-12-10
|
05 | (System) | Changed action holders to Deb Cooley (IESG state changed) |
|
2025-12-10
|
05 | (System) | Sub state has been changed to AD Followup from Revised I-D Needed |
|
2025-12-10
|
05 | Panos Kampanakis | New version available: draft-ietf-sshm-mlkem-hybrid-kex-05.txt |
|
2025-12-10
|
05 | (System) | New version approved |
|
2025-12-10
|
05 | (System) | Request for posting confirmation emailed to previous authors: Douglas Stebila , Panos Kampanakis , Torben Hansen |
|
2025-12-10
|
05 | Panos Kampanakis | Uploaded new revision |
|
2025-12-03
|
Tess Chapeta | Posted related IPR disclosure Simon Josefsson's Statement about IPR related to draft-ietf-sshm-mlkem-hybrid-kex belonging to Unknown | |
|
2025-11-30
|
04 | Deb Cooley | comments can be found here: https://mailarchive.ietf.org/arch/msg/ssh/gO98Rf63XwD9L6WTxpxOcaDdtWE/ |
|
2025-11-30
|
04 | (System) | Changed action holders to Panos Kampanakis, Douglas Stebila, Torben Hansen (IESG state changed) |
|
2025-11-30
|
04 | Deb Cooley | IESG state changed to AD Evaluation::Revised I-D Needed from AD Evaluation |
|
2025-11-29
|
04 | Stephen Farrell | # Document Shepherd Write-Up for Group Documents This document [1] defines hybrid KEMs that use the ML-KEM algorithm. It has been implemented and is starting … # Document Shepherd Write-Up for Group Documents This document [1] defines hybrid KEMs that use the ML-KEM algorithm. It has been implemented and is starting to (or will soon) see widespread deployment. [1] https://datatracker.ietf.org/doc/draft-ietf-sshm-mlkem-hybrid-kex/ The main point of interest is how this is coupled with the earlier WG document [2] on a very widely deployed hybrid that uses the sntru-prime PQ KEM, which is now in the RFC editor queue. The WG had a very hard time reaching consensus on how to position these two documents, and after much debate, and an appeal, decided to treat both hybrid KEM drafts in the same way when it comes to the IANA recommendation for implementers (that they SHOULD be implemented) and the type of RFC desired (informational). [2] https://datatracker.ietf.org/doc/draft-ietf-sshm-ntruprime-ssh/ While informational is a somewhat odd choice for this document, that is firmly what the WG wanted and the authors/proponents of this specification are fine with that. Changing that would likely upset quite a few WG participants for various good and less good reasons, so we'd ask the IESG to not propose making any changes to these aspects as they review the document. (Sometimes, holding your nose and letting imperfect things get resolved is the correct action:-) There may be a later WG effort to revisit how the IANA recommendations are handled for SSH. If the WG do have cycles to consider that, then it's likely this situation could be regularised at that point in time. Now is not the time for that however. *This version is dated 4 July 2022.* ## Document History 1. Does the working group (WG) consensus represent the strong concurrence of a few individuals, with others being silent, or did it reach broad agreement? The WG have broad consensus. 2. Was there controversy about particular points, or were there decisions where the consensus was particularly rough? See above. Once the relative positioning of this and the sntru-prime draft was agreed, things went smoothly. 3. Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarize the areas of conflict in separate email messages to the responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No. 4. For protocol documents, are there existing implementations of the contents of the document? Have a significant number of potential implementers indicated plans to implement? Are any existing implementations reported somewhere, either in the document itself (as [RFC 7942][3] recommends) or elsewhere (where)? Yes, implementations exist and have been noted on the WG mailing list. ## Additional Reviews 5. Do the contents of this document closely interact with technologies in other IETF working groups or external organizations, and would it therefore benefit from their review? Have those reviews occurred? If yes, describe which reviews took place. Not needed here. 6. Describe how the document meets any required formal expert review criteria, such as the MIB Doctor, YANG Doctor, media type, and URI type reviews. N/A. 7. If the document contains a YANG module, has the final version of the module been checked with any of the [recommended validation tools][4] for syntax and formatting validation? If there are any resulting errors or warnings, what is the justification for not fixing them at this time? Does the YANG module comply with the Network Management Datastore Architecture (NMDA) as specified in [RFC 8342][5]? N/A. 8. Describe reviews and automated checks performed to validate sections of the final version of the document written in a formal language, such as XML code, BNF rules, MIB definitions, CBOR's CDDL, etc. N/A. ## Document Shepherd Checks 9. Based on the shepherd's review of the document, is it their opinion that this document is needed, clearly written, complete, correctly designed, and ready to be handed off to the responsible Area Director? Yes. 10. Several IETF Areas have assembled [lists of common issues that their reviewers encounter][6]. For which areas have such issues been identified and addressed? For which does this still need to happen in subsequent reviews? N/A. 11. What type of RFC publication is being requested on the IETF stream ([Best Current Practice][12], [Proposed Standard, Internet Standard][13], [Informational, Experimental or Historic][14])? Why is this the proper type of RFC? Do all Datatracker state attributes correctly reflect this intent? Informational. See the discussion at the top. 12. Have reasonable efforts been made to remind all authors of the intellectual property rights (IPR) disclosure obligations described in [BCP 79][7]? To the best of your knowledge, have all required disclosures been filed? If not, explain why. If yes, summarize any relevant discussion, including links to publicly-available messages when applicable. Yes. Mail was sent to the authors/list on 2025-11-25. Responses from all authors indicate no issues. The thread on the WG are at [3]. [3] https://mailarchive.ietf.org/arch/msg/ssh/TuY_noyQlsa9l7o_1MltmjSQzJY/ 13. Has each author, editor, and contributor shown their willingness to be listed as such? If the total number of authors and editors on the front page is greater than five, please provide a justification. That's fine. 14. Document any remaining I-D nits in this document. Simply running the [idnits tool][8] is not enough; please review the ["Content Guidelines" on authors.ietf.org][15]. (Also note that the current idnits tool generates some incorrect warnings; a rewrite is underway.) The remaining I-D nits warnings are erroneous. 15. Should any informative references be normative or vice-versa? See the [IESG Statement on Normative and Informative References][16]. Those are fine. 16. List any normative references that are not freely available to anyone. Did the community have sufficient access to review any such normative references? N/A. 17. Are there any normative downward references (see [RFC 3967][9] and [BCP 97][10]) that are not already listed in the [DOWNREF registry][17]? If so, list them. N/A. 18. Are there normative references to documents that are not ready to be submitted to the IESG for publication or are otherwise in an unclear state? If so, what is the plan for their completion? N/A. 19. Will publication of this document change the status of any existing RFCs? If so, does the Datatracker metadata correctly reflect this and are those RFCs listed on the title page, in the abstract, and discussed in the introduction? If not, explain why and point to the part of the document where the relationship of this document to these other RFCs is discussed. N/A. 20. Describe the document shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all aspects of the document requiring IANA assignments are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that each newly created IANA registry specifies its initial contents, allocations procedures, and a reasonable name (see [RFC 8126][11]). The IANA code-points are already allocated. See the discussion at the top wrt the recommendation for implementers. 21. List any new IANA registries that require Designated Expert Review for future allocations. Are the instructions to the Designated Expert clear? Please include suggestions of designated experts, if appropriate. N/A. |
|
2025-11-29
|
04 | Deb Cooley | IESG state changed to AD Evaluation from Publication Requested |
|
2025-11-29
|
04 | Deb Cooley | Ballot writeup was changed |
|
2025-11-25
|
04 | Stephen Farrell | Changed consensus to Yes from Unknown |
|
2025-11-25
|
04 | Stephen Farrell | Tag Doc Shepherd Follow-up Underway cleared. |
|
2025-11-25
|
04 | Stephen Farrell | # Document Shepherd Write-Up for Group Documents This document [1] defines hybrid KEMs that use the ML-KEM algorithm. It has been implemented and is starting … # Document Shepherd Write-Up for Group Documents This document [1] defines hybrid KEMs that use the ML-KEM algorithm. It has been implemented and is starting to (or will soon) see widespread deployment. [1] https://datatracker.ietf.org/doc/draft-ietf-sshm-mlkem-hybrid-kex/ The main point of interest is how this is coupled with the earlier WG document [2] on a very widely deployed hybrid that uses the sntru-prime PQ KEM, which is now in the RFC editor queue. The WG had a very hard time reaching consensus on how to position these two documents, and after much debate, and an appeal, decided to treat both hybrid KEM drafts in the same way when it comes to the IANA recommendation for implementers (that they SHOULD be implemented) and the type of RFC desired (informational). [2] https://datatracker.ietf.org/doc/draft-ietf-sshm-ntruprime-ssh/ While informational is a somewhat odd choice for this document, that is firmly what the WG wanted and the authors/proponents of this specification are fine with that. Changing that would likely upset quite a few WG participants for various good and less good reasons, so we'd ask the IESG to not propose making any changes to these aspects as they review the document. (Sometimes, holding your nose and letting imperfect things get resolved is the correct action:-) There may be a later WG effort to revisit how the IANA recommendations are handled for SSH. If the WG do have cycles to consider that, then it's likely this situation could be regularised at that point in time. Now is not the time for that however. *This version is dated 4 July 2022.* ## Document History 1. Does the working group (WG) consensus represent the strong concurrence of a few individuals, with others being silent, or did it reach broad agreement? The WG have broad consensus. 2. Was there controversy about particular points, or were there decisions where the consensus was particularly rough? See above. Once the relative positioning of this and the sntru-prime draft was agreed, things went smoothly. 3. Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarize the areas of conflict in separate email messages to the responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No. 4. For protocol documents, are there existing implementations of the contents of the document? Have a significant number of potential implementers indicated plans to implement? Are any existing implementations reported somewhere, either in the document itself (as [RFC 7942][3] recommends) or elsewhere (where)? Yes, implementations exist and have been noted on the WG mailing list. ## Additional Reviews 5. Do the contents of this document closely interact with technologies in other IETF working groups or external organizations, and would it therefore benefit from their review? Have those reviews occurred? If yes, describe which reviews took place. Not needed here. 6. Describe how the document meets any required formal expert review criteria, such as the MIB Doctor, YANG Doctor, media type, and URI type reviews. N/A. 7. If the document contains a YANG module, has the final version of the module been checked with any of the [recommended validation tools][4] for syntax and formatting validation? If there are any resulting errors or warnings, what is the justification for not fixing them at this time? Does the YANG module comply with the Network Management Datastore Architecture (NMDA) as specified in [RFC 8342][5]? N/A. 8. Describe reviews and automated checks performed to validate sections of the final version of the document written in a formal language, such as XML code, BNF rules, MIB definitions, CBOR's CDDL, etc. N/A. ## Document Shepherd Checks 9. Based on the shepherd's review of the document, is it their opinion that this document is needed, clearly written, complete, correctly designed, and ready to be handed off to the responsible Area Director? Yes. 10. Several IETF Areas have assembled [lists of common issues that their reviewers encounter][6]. For which areas have such issues been identified and addressed? For which does this still need to happen in subsequent reviews? N/A. 11. What type of RFC publication is being requested on the IETF stream ([Best Current Practice][12], [Proposed Standard, Internet Standard][13], [Informational, Experimental or Historic][14])? Why is this the proper type of RFC? Do all Datatracker state attributes correctly reflect this intent? Informational. See the discussion at the top. 12. Have reasonable efforts been made to remind all authors of the intellectual property rights (IPR) disclosure obligations described in [BCP 79][7]? To the best of your knowledge, have all required disclosures been filed? If not, explain why. If yes, summarize any relevant discussion, including links to publicly-available messages when applicable. Yes. Mail was sent to the authors/list on 2025-11-25. Responses have yet to be received. 13. Has each author, editor, and contributor shown their willingness to be listed as such? If the total number of authors and editors on the front page is greater than five, please provide a justification. That's fine. 14. Document any remaining I-D nits in this document. Simply running the [idnits tool][8] is not enough; please review the ["Content Guidelines" on authors.ietf.org][15]. (Also note that the current idnits tool generates some incorrect warnings; a rewrite is underway.) The remaining I-D nits warnings are erroneous. 15. Should any informative references be normative or vice-versa? See the [IESG Statement on Normative and Informative References][16]. Those are fine. 16. List any normative references that are not freely available to anyone. Did the community have sufficient access to review any such normative references? N/A. 17. Are there any normative downward references (see [RFC 3967][9] and [BCP 97][10]) that are not already listed in the [DOWNREF registry][17]? If so, list them. N/A. 18. Are there normative references to documents that are not ready to be submitted to the IESG for publication or are otherwise in an unclear state? If so, what is the plan for their completion? N/A. 19. Will publication of this document change the status of any existing RFCs? If so, does the Datatracker metadata correctly reflect this and are those RFCs listed on the title page, in the abstract, and discussed in the introduction? If not, explain why and point to the part of the document where the relationship of this document to these other RFCs is discussed. N/A. 20. Describe the document shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all aspects of the document requiring IANA assignments are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that each newly created IANA registry specifies its initial contents, allocations procedures, and a reasonable name (see [RFC 8126][11]). The IANA code-points are already allocated. See the discussion at the top wrt the recommendation for implementers. 21. List any new IANA registries that require Designated Expert Review for future allocations. Are the instructions to the Designated Expert clear? Please include suggestions of designated experts, if appropriate. N/A. |
|
2025-11-25
|
04 | Stephen Farrell | IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up |
|
2025-11-25
|
04 | Stephen Farrell | IESG state changed to Publication Requested from I-D Exists |
|
2025-11-25
|
04 | (System) | Changed action holders to Deb Cooley (IESG state changed) |
|
2025-11-25
|
04 | Stephen Farrell | Responsible AD changed to Deb Cooley |
|
2025-11-25
|
04 | Stephen Farrell | Document is now in IESG state Publication Requested |
|
2025-11-25
|
04 | Stephen Farrell | # Document Shepherd Write-Up for Group Documents This document [1] defines hybrid KEMs that use the ML-KEM algorithm. It has been implemented and is starting … # Document Shepherd Write-Up for Group Documents This document [1] defines hybrid KEMs that use the ML-KEM algorithm. It has been implemented and is starting to (or will soon) see widespread deployment. [1] https://datatracker.ietf.org/doc/draft-ietf-sshm-mlkem-hybrid-kex/ The main point of interest is how this is coupled with the earlier WG document [2] on a very widely deployed hybrid that uses the sntru-prime PQ KEM, which is now in the RFC editor queue. The WG had a very hard time reaching consensus on how to position these two documents, and after much debate, and an appeal, decided to treat both hybrid KEM drafts in the same way when it comes to the IANA recommendation for implementers (that they SHOULD be implemented) and the type of RFC desired (informational). [2] https://datatracker.ietf.org/doc/draft-ietf-sshm-ntruprime-ssh/ While informational is a somewhat odd choice for this document, that is firmly what the WG wanted and the authors/proponents of this specification are fine with that. Changing that would likely upset quite a few WG participants for various good and less good reasons, so we'd ask the IESG to not propose making any changes to these aspects as they review the document. (Sometimes, holding your nose and letting imperfect things get resolved is the correct action:-) There may be a later WG effort to revisit how the IANA recommendations are handled for SSH. If the WG do have cycles to consider that, then it's likely this situation could be regularised at that point in time. Now is not the time for that however. *This version is dated 4 July 2022.* ## Document History 1. Does the working group (WG) consensus represent the strong concurrence of a few individuals, with others being silent, or did it reach broad agreement? The WG have broad consensus. 2. Was there controversy about particular points, or were there decisions where the consensus was particularly rough? See above. Once the relative positioning of this and the sntru-prime draft was agreed, things went smoothly. 3. Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarize the areas of conflict in separate email messages to the responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No. 4. For protocol documents, are there existing implementations of the contents of the document? Have a significant number of potential implementers indicated plans to implement? Are any existing implementations reported somewhere, either in the document itself (as [RFC 7942][3] recommends) or elsewhere (where)? Yes, implementations exist and have been noted on the WG mailing list. ## Additional Reviews 5. Do the contents of this document closely interact with technologies in other IETF working groups or external organizations, and would it therefore benefit from their review? Have those reviews occurred? If yes, describe which reviews took place. Not needed here. 6. Describe how the document meets any required formal expert review criteria, such as the MIB Doctor, YANG Doctor, media type, and URI type reviews. N/A. 7. If the document contains a YANG module, has the final version of the module been checked with any of the [recommended validation tools][4] for syntax and formatting validation? If there are any resulting errors or warnings, what is the justification for not fixing them at this time? Does the YANG module comply with the Network Management Datastore Architecture (NMDA) as specified in [RFC 8342][5]? N/A. 8. Describe reviews and automated checks performed to validate sections of the final version of the document written in a formal language, such as XML code, BNF rules, MIB definitions, CBOR's CDDL, etc. N/A. ## Document Shepherd Checks 9. Based on the shepherd's review of the document, is it their opinion that this document is needed, clearly written, complete, correctly designed, and ready to be handed off to the responsible Area Director? Yes. 10. Several IETF Areas have assembled [lists of common issues that their reviewers encounter][6]. For which areas have such issues been identified and addressed? For which does this still need to happen in subsequent reviews? N/A. 11. What type of RFC publication is being requested on the IETF stream ([Best Current Practice][12], [Proposed Standard, Internet Standard][13], [Informational, Experimental or Historic][14])? Why is this the proper type of RFC? Do all Datatracker state attributes correctly reflect this intent? Informational. See the discussion at the top. 12. Have reasonable efforts been made to remind all authors of the intellectual property rights (IPR) disclosure obligations described in [BCP 79][7]? To the best of your knowledge, have all required disclosures been filed? If not, explain why. If yes, summarize any relevant discussion, including links to publicly-available messages when applicable. Yes. Mail was sent to the authors/list on 2025-11-25. Responses have yet to be received. 13. Has each author, editor, and contributor shown their willingness to be listed as such? If the total number of authors and editors on the front page is greater than five, please provide a justification. That's fine. 14. Document any remaining I-D nits in this document. Simply running the [idnits tool][8] is not enough; please review the ["Content Guidelines" on authors.ietf.org][15]. (Also note that the current idnits tool generates some incorrect warnings; a rewrite is underway.) The remaining I-D nits warnings are erroneous. 15. Should any informative references be normative or vice-versa? See the [IESG Statement on Normative and Informative References][16]. Those are fine. 16. List any normative references that are not freely available to anyone. Did the community have sufficient access to review any such normative references? N/A. 17. Are there any normative downward references (see [RFC 3967][9] and [BCP 97][10]) that are not already listed in the [DOWNREF registry][17]? If so, list them. N/A. 18. Are there normative references to documents that are not ready to be submitted to the IESG for publication or are otherwise in an unclear state? If so, what is the plan for their completion? N/A. 19. Will publication of this document change the status of any existing RFCs? If so, does the Datatracker metadata correctly reflect this and are those RFCs listed on the title page, in the abstract, and discussed in the introduction? If not, explain why and point to the part of the document where the relationship of this document to these other RFCs is discussed. N/A. 20. Describe the document shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all aspects of the document requiring IANA assignments are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that each newly created IANA registry specifies its initial contents, allocations procedures, and a reasonable name (see [RFC 8126][11]). The IANA code-points are already allocated. See the discussion at the top wrt the recommendation for implementers. 21. List any new IANA registries that require Designated Expert Review for future allocations. Are the instructions to the Designated Expert clear? Please include suggestions of designated experts, if appropriate. N/A. |
|
2025-11-25
|
04 | Stephen Farrell | Notification list changed to stephen.farrell@cs.tcd.ie because the document shepherd was set |
|
2025-11-25
|
04 | Stephen Farrell | Document shepherd changed to Stephen Farrell |
|
2025-11-11
|
04 | Job Snijders | Tag Doc Shepherd Follow-up Underway set. |
|
2025-11-11
|
04 | Job Snijders | IETF WG state changed to WG Consensus: Waiting for Write-Up from In WG Last Call |
|
2025-11-11
|
04 | Job Snijders | Intended Status changed to Informational from None |
|
2025-11-11
|
04 | Panos Kampanakis | New version available: draft-ietf-sshm-mlkem-hybrid-kex-04.txt |
|
2025-11-11
|
04 | (System) | New version approved |
|
2025-11-11
|
04 | (System) | Request for posting confirmation emailed to previous authors: Douglas Stebila , Panos Kampanakis , Torben Hansen |
|
2025-11-11
|
04 | Panos Kampanakis | Uploaded new revision |
|
2025-10-20
|
03 | Job Snijders | IETF WG state changed to In WG Last Call from WG Document |
|
2025-09-17
|
03 | Panos Kampanakis | New version available: draft-ietf-sshm-mlkem-hybrid-kex-03.txt |
|
2025-09-17
|
03 | (System) | New version approved |
|
2025-09-17
|
03 | (System) | Request for posting confirmation emailed to previous authors: Douglas Stebila , Panos Kampanakis , Torben Hansen |
|
2025-09-17
|
03 | Panos Kampanakis | Uploaded new revision |
|
2025-04-14
|
02 | Panos Kampanakis | New version available: draft-ietf-sshm-mlkem-hybrid-kex-02.txt |
|
2025-04-14
|
02 | (System) | New version approved |
|
2025-04-14
|
02 | (System) | Request for posting confirmation emailed to previous authors: Douglas Stebila , Panos Kampanakis , Torben Hansen |
|
2025-04-14
|
02 | Panos Kampanakis | Uploaded new revision |
|
2025-04-14
|
01 | Panos Kampanakis | New version available: draft-ietf-sshm-mlkem-hybrid-kex-01.txt |
|
2025-04-14
|
01 | (System) | New version approved |
|
2025-04-14
|
01 | (System) | Request for posting confirmation emailed to previous authors: Douglas Stebila , Panos Kampanakis , Torben Hansen |
|
2025-04-14
|
01 | Panos Kampanakis | Uploaded new revision |
|
2025-01-29
|
00 | Stephen Farrell | This document now replaces draft-kampanakis-curdle-pq-ssh, draft-kampanakis-curdle-ssh-pq-ke instead of None |
|
2025-01-29
|
00 | Panos Kampanakis | New version available: draft-ietf-sshm-mlkem-hybrid-kex-00.txt |
|
2025-01-29
|
00 | Stephen Farrell | WG -00 approved |
|
2025-01-29
|
00 | Panos Kampanakis | Set submitter to "Panos Kampanakis ", replaces to draft-kampanakis-curdle-pq-ssh, draft-kampanakis-curdle-ssh-pq-ke and sent approval email to group chairs: sshm-chairs@ietf.org |
|
2025-01-29
|
00 | Panos Kampanakis | Uploaded new revision |