<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-sfluhrer-ssh-mldsa-03" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.0 -->
  <front>
    <title abbrev="SSH ML-DSA">SSH Support of ML-DSA</title>
    <seriesInfo name="Internet-Draft" value="draft-sfluhrer-ssh-mldsa-03"/>
    <author fullname="Scott Fluhrer">
      <organization>Cisco Systems</organization>
      <address>
        <email>sfluhrer@cisco.com</email>
      </address>
    </author>
    <date year="2025" month="August" day="11"/>
    <area>sec</area>
    <workgroup>sshm</workgroup>
    <keyword>ML-DSA</keyword>
    <abstract>
      <?line 53?>

<t>This document describes the use of ML-DSA digital
   signatures in the Secure Shell (SSH) protocol.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://sfluhrer.github.io/ssh-mldsa/draft-sfluhrer-ssh-mldsa.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-sfluhrer-ssh-mldsa/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Secure Shell Maintenance Security Area mailing list (<eref target="mailto:ssh@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/ssh/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/ssh/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/sfluhrer/ssh-mldsa"/>.</t>
    </note>
  </front>
  <middle>
    <?line 58?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>A Cryptographically Relevant Quantum Computer (CRQC) could break
   traditional asymmetric cryptograph algorithms: e.g RSA, ECDSA; which
   are widely deployed authentication options of SSH.
   NIST has recently published the postquantum digitial signature algorithm ML-DSA <xref target="FIPS204"/>.</t>
      <t>This document describes how to use this algorithm for authentication within SSH <xref target="RFC4251"/>, as a replacement for the traditional signature algorithms (RSA, ECDSA).</t>
      <section anchor="background-on-ml-dsa">
        <name>Background on ML-DSA</name>
        <t>ML-DSA (as specified in FIPS 204) is a signature algorithm that is believed to be secure against attackers who have a Quantum Computer available to them.
   There are three strengths defined for it (with the parameter sets being known as ML-DSA-44, ML-DSA-65 and ML-DSA-87).
   In addition, for each defined parameter set, there are two versions, the 'pure' version (where ML-DSA directly signs the message) and a 'prehashed' version (where ML-DSA signs a hash that was computed outside of ML-DSA).
   For this protocol, we will always use the pure version.</t>
        <t>In addition, ML-DSA also has a 'context' input, which is a short string that is common to the sender and the recceiver.
   It is intended to allow for domain separation between separate uses of the same public key.
   This protocol always uses an empty (zero length) context.</t>
        <t>FIPS 204 also allows ML-DSA to be run in either determanistic or 'hedged' mode (where randomness is applied to the signature operation).
   We place no requirement on which is used; the implementation should select based on the quality of their random number source.</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>The descriptions of key and signature formats use the notation
   introduced in <xref target="RFC4251"/>, Section 3, and the string data type from
   <xref target="RFC4251"/>, Section 5.  Identifiers and terminology from ML-DSA
   <xref target="FIPS204"/> are used throughout the document.</t>
    </section>
    <section anchor="public-key-algorithms">
      <name>Public Key Algorithms</name>
      <t>This document describes three public key algorithms for use with SSH, as
   per <xref target="RFC4253"/>, Section 6.6, corresponding to the three parameter sets of ML-DSA.
   The names of the algorithm are "ssh-mldsa-44", "ssh-mldsa-65" and "ssh-mldsa-87", to match the level 2, 3 and 5 parameter sets <xref target="FIPS204"/>.
   These algorithm only support signing and not encryption.</t>
      <t>The below table lists the public key sizes and the signature size (in bytes) for the three parameter sets.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Public Key Algorithm Name</th>
            <th align="left">Public Key Size</th>
            <th align="left">Signature Size</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">ssh-mldsa-44</td>
            <td align="left">1312</td>
            <td align="left">2420</td>
          </tr>
          <tr>
            <td align="left">ssh-mldsa-65</td>
            <td align="left">1952</td>
            <td align="left">3309</td>
          </tr>
          <tr>
            <td align="left">ssh-mldsa-87</td>
            <td align="left">2592</td>
            <td align="left">4627</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="public-key-format">
      <name>Public Key Format</name>
      <t>The key format for all three parameter sets have the following encoding:</t>
      <t>string "ssh-mldsa-44" (or "ssh-mldsa-65" or "ssh-mldsa-87")</t>
      <t>string key</t>
      <t>Here, 'key' is the public key described in <xref target="FIPS204"/>.</t>
      <t># Signature Algorithm</t>
      <t>Signatures are generated according to the procedure in Section 5.2
   <xref target="FIPS204"/>, using the "pure" version of ML-DSA, with an empty context string.</t>
    </section>
    <section anchor="signature-format">
      <name>Signature Format</name>
      <t>The "ssh-mldsa" key format has the following encoding:</t>
      <t>string "ssh-mldsa-44" (or "ssh-mldsa-65" or "ssh-mldsa-87")</t>
      <t>string signature</t>
      <t>Here, 'signature' is the signature produced in accordance with the
   previous section.</t>
    </section>
    <section anchor="verification-algorithm">
      <name>Verification Algorithm</name>
      <t>Signatures are verified according to the procedure in
   <xref target="FIPS204"/>, Section 5.3, using the "pure" version of ML-DSA, with an empty context strong.</t>
    </section>
    <section anchor="sshfp-dns-resource-records">
      <name>SSHFP DNS Resource Records</name>
      <t>Usage and generation of the SSHFP DNS resource record is described in
   <xref target="RFC4255"/>.  This section illustrates the generation of SSHFP resource
   records for ML-DSA keys, and this document also specifies
   the corresponding code point to "SSHFP RR Types for public key
   algorithms" in the "DNS SSHFP Resource Record Parameters" IANA
   registry <xref target="IANA-SSHFP"/>.</t>
      <t>The generation of SSHFP resource records keys for ML-DSA is
   described as follows.</t>
      <t>The encoding of ML-DSA public keys is described in <xref target="FIPS204"/>.</t>
      <t>The SSHFP Resource Record for an ML-DSA key fingerprint
   (with a SHA-256 fingerprint) would, for example, be:</t>
      <t>pqserver.example.com. IN SSHFP TBD 2 (
                    a87f1b687ac0e57d2a081a2f28267237
                    34d90ed316d2b818ca9580ea384d9240 )</t>
      <t>Replace TBD with the value eventually allocated by IANA.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to add the following entries to "SSHFP RR Types for
   public key algorithms" in the "DNS SSHFP Resource Record Parameters"
   registry <xref target="IANA-SSHFP"/>:</t>
      <table>
        <thead>
          <tr>
            <th align="left">Value</th>
            <th align="left">Description</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">TBD1</td>
            <td align="left">ML-DSA-44</td>
            <td align="left">THIS RFC</td>
          </tr>
          <tr>
            <td align="left">TBD2</td>
            <td align="left">ML-DSA-65</td>
            <td align="left">THIS RFC</td>
          </tr>
          <tr>
            <td align="left">TBD3</td>
            <td align="left">ML-DSA-87</td>
            <td align="left">THIS RFC</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations in <xref target="RFC4251"/>, Section 9 apply to all SSH
   implementations, including those using ML-DSA.</t>
      <t>The security considerations in ML-DSA <xref target="FIPS204"/> apply to all
   uses of ML-DSA, including those in SSH.</t>
      <t>Cryptographic algorithms and parameters are usually broken or
   weakened over time.  Implementers and users need to continously re-evaluate that cryptographic algorithms continue to provide the
   expected level of security.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="FIPS204" target="https://doi.org/10.6028/NIST.FIPS.204">
          <front>
            <title>Module-Lattice-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date year="2024" month="August"/>
          </front>
          <seriesInfo name="NIST" value="FIPS 204"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC4250">
          <front>
            <title>The Secure Shell (SSH) Protocol Assigned Numbers</title>
            <author fullname="S. Lehtinen" initials="S." surname="Lehtinen"/>
            <author fullname="C. Lonvick" initials="C." role="editor" surname="Lonvick"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document defines the instructions to the IANA and the initial state of the IANA assigned numbers for the Secure Shell (SSH) protocol. It is intended only for the initialization of the IANA registries referenced in the set of SSH documents. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4250"/>
          <seriesInfo name="DOI" value="10.17487/RFC4250"/>
        </reference>
        <reference anchor="RFC4251">
          <front>
            <title>The Secure Shell (SSH) Protocol Architecture</title>
            <author fullname="T. Ylonen" initials="T." surname="Ylonen"/>
            <author fullname="C. Lonvick" initials="C." role="editor" surname="Lonvick"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>The Secure Shell (SSH) Protocol is a protocol for secure remote login and other secure network services over an insecure network. This document describes the architecture of the SSH protocol, as well as the notation and terminology used in SSH protocol documents. It also discusses the SSH algorithm naming system that allows local extensions. The SSH protocol consists of three major components: The Transport Layer Protocol provides server authentication, confidentiality, and integrity with perfect forward secrecy. The User Authentication Protocol authenticates the client to the server. The Connection Protocol multiplexes the encrypted tunnel into several logical channels. Details of these protocols are described in separate documents. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4251"/>
          <seriesInfo name="DOI" value="10.17487/RFC4251"/>
        </reference>
        <reference anchor="RFC4253">
          <front>
            <title>The Secure Shell (SSH) Transport Layer Protocol</title>
            <author fullname="T. Ylonen" initials="T." surname="Ylonen"/>
            <author fullname="C. Lonvick" initials="C." role="editor" surname="Lonvick"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>The Secure Shell (SSH) is a protocol for secure remote login and other secure network services over an insecure network.</t>
              <t>This document describes the SSH transport layer protocol, which typically runs on top of TCP/IP. The protocol can be used as a basis for a number of secure network services. It provides strong encryption, server authentication, and integrity protection. It may also provide compression.</t>
              <t>Key exchange method, public key algorithm, symmetric encryption algorithm, message authentication algorithm, and hash algorithm are all negotiated.</t>
              <t>This document also describes the Diffie-Hellman key exchange method and the minimal set of algorithms that are needed to implement the SSH transport layer protocol. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4253"/>
          <seriesInfo name="DOI" value="10.17487/RFC4253"/>
        </reference>
        <reference anchor="RFC4255">
          <front>
            <title>Using DNS to Securely Publish Secure Shell (SSH) Key Fingerprints</title>
            <author fullname="J. Schlyter" initials="J." surname="Schlyter"/>
            <author fullname="W. Griffin" initials="W." surname="Griffin"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document describes a method of verifying Secure Shell (SSH) host keys using Domain Name System Security (DNSSEC). The document defines a new DNS resource record that contains a standard SSH key fingerprint. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4255"/>
          <seriesInfo name="DOI" value="10.17487/RFC4255"/>
        </reference>
        <reference anchor="IANA-SSH" target="https://www.iana.org/assignments/ssh-parameters">
          <front>
            <title>Secure Shell (SSH) Protocol Parameters</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IANA-SSHFP" target="https://www.iana.org/assignments/dns-sshfp-rr-parameters)">
          <front>
            <title>DNS SSHFP Resource Record Parameters</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 203?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The text of draft-josefsson-ssh-sphincs was used as a template for this document.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
