<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-sfluhrer-ssh-mldsa-01" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.1 -->
  <front>
    <title abbrev="SSH ML-DSA">SSH Support of ML-DSA</title>
    <seriesInfo name="Internet-Draft" value="draft-sfluhrer-ssh-mldsa-01"/>
    <author fullname="Scott Fluhrer">
      <organization>Cisco Systems</organization>
      <address>
        <email>sfluhrer@cisco.com</email>
      </address>
    </author>
    <date year="2025" month="June" day="12"/>
    <area>sec</area>
    <workgroup>sshm</workgroup>
    <keyword>ML-DSA</keyword>
    <abstract>
      <?line 53?>

<t>This document describes the use of ML-DSA digital
   signatures in the Secure Shell (SSH) protocol.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://sfluhrer.github.io/ssh-mldsa/draft-sfluhrer-ssh-mldsa.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-sfluhrer-ssh-mldsa/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Secure Shell Maintenance Security Area mailing list (<eref target="mailto:ssh@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/ssh/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/ssh/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/sfluhrer/ssh-mldsa"/>.</t>
    </note>
  </front>
  <middle>
    <?line 58?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>A Cryptographically Relevant Quantum Computer (CRQC) could break
   traditional asymmetric cryptograph algorithms: e.g RSA, ECDSA; which
   are widely deployed authentication options of SSH.
   NIST has recently published the postquantum digitial signature algorithm ML-DSA <xref target="FIPS204"/>.</t>
      <t>This document describes how to use this algorithm for authentication within SSH <xref target="RFC4251"/>, as a replacement for the traditional signature algorithms (RSA, ECDSA).</t>
      <section anchor="background-on-ml-dsa">
        <name>Background on ML-DSA</name>
        <t>ML-DSA (as specified in FIPS 204) is a signature algorithm that is believed to be secure against attackers who have a Quantum Computer available to them.
   There are three strengths defined for it (with the parameter sets being known as ML-DSA-44, ML-DSA-65 and ML-DSA-87).
   In addition, for each defined parameter set, there are two versions, the 'pure' version (where ML-DSA directly signs the message) and a 'prehashed' version (where ML-DSA signs a hash that was computed outside of ML-DSA).
   For this protocol, we will always use the pure version.</t>
        <t>In addition, ML-DSA also has a 'context' input, which is a short string that is common to the sender and the recceiver.
   It is intended to allow for domain separation between separate uses of the same public key.
   This protocol always uses an empty (zero length) context.</t>
        <t>FIPS 204 also allows ML-DSA to be run in either determanistic or 'hedged' mode (where randomness is applied to the signature operation).
   We place no requirement on which is used; the implementation should select based on the quality of their random number source.</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>The descriptions of key and signature formats use the notation
   introduced in <xref target="RFC4251"/>, Section 3, and the string data type from
   <xref target="RFC4251"/>, Section 5.  Identifiers and terminology from ML-DSA
   <xref target="FIPS204"/> are used throughout the document.</t>
    </section>
    <section anchor="public-key-algorithms">
      <name>Public Key Algorithms</name>
      <t>This document describes three public key algorithms for use with SSH, as
   per <xref target="RFC4253"/>, Section 6.6, corresponding to the three parameter sets of ML-DSA.
   The names of the algorithm are "ssh-mldsa44", "ssh-mldsa65" and "ssh-mldsa87", to match the level 2, 3 and 5 parameter sets <xref target="FIPS204"/>.
   These algorithm only support signing and not encryption.</t>
    </section>
    <section anchor="public-key-format">
      <name>Public Key Format</name>
      <t>The key format for all three parameter sets have the following encoding:</t>
      <t>string "ssh-mldsa44" (or "ssh-mldsa65" or "ssh-mldsa87")</t>
      <t>string key</t>
      <t>Here, 'key' is the public key described in <xref target="FIPS204"/>.</t>
      <t># Signature Algorithm</t>
      <t>Signatures are generated according to the procedure in Section 5.2
   <xref target="FIPS204"/>, using the "pure" version of ML-DSA, with an empty context string.</t>
    </section>
    <section anchor="signature-format">
      <name>Signature Format</name>
      <t>The "ssh-mldsa" key format has the following encoding:</t>
      <t>string "ssh-mldsa44" (or "ssh-mldsa65" or "ssh-mldsa87")</t>
      <t>string signature</t>
      <t>Here, 'signature' is the signature produced in accordance with the
   previous section.</t>
    </section>
    <section anchor="verification-algorithm">
      <name>Verification Algorithm</name>
      <t>Signatures are verified according to the procedure in
   <xref target="FIPS204"/>, Section 5.3, using the "pure" version of ML-DSA, with an empty context strong.</t>
    </section>
    <section anchor="sshfp-dns-resource-records">
      <name>SSHFP DNS Resource Records</name>
      <t>Usage and generation of the SSHFP DNS resource record is described in
   <xref target="RFC4255"/>.  This section illustrates the generation of SSHFP resource
   records for ML-DSA keys, and this document also specifies
   the corresponding code point to "SSHFP RR Types for public key
   algorithms" in the "DNS SSHFP Resource Record Parameters" IANA
   registry <xref target="IANA-SSHFP"/>.</t>
      <t>The generation of SSHFP resource records keys for ML-DSA is
   described as follows.</t>
      <t>The encoding of ML-DSA public keys is described in <xref target="FIPS204"/>.</t>
      <t>The SSHFP Resource Record for an ML-DSA key fingerprint
   (with a SHA-256 fingerprint) would, for example, be:</t>
      <t>pqserver.example.com. IN SSHFP TBD 2 (
                    a87f1b687ac0e57d2a081a2f28267237
                    34d90ed316d2b818ca9580ea384d9240 )</t>
      <t>Replace TBD with the value eventually allocated by IANA.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document augments the Public Key Algorithm Names in <xref target="RFC4250"/>, Section 4.11.3.</t>
      <t>IANA is requested to add the following entries to "Public Key Algorithm
   Names" in the "Secure Shell (SSH) Protocol Parameters" registry
   <xref target="IANA-SSH"/>:</t>
      <table>
        <thead>
          <tr>
            <th align="left">Public Key Algorithm Name</th>
            <th align="left">Key Size</th>
            <th align="left">Signature Size</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">ssh-mldsa44</td>
            <td align="left">1312</td>
            <td align="left">2420</td>
            <td align="left">THIS-RFC</td>
          </tr>
          <tr>
            <td align="left">ssh-mldsa65</td>
            <td align="left">1952</td>
            <td align="left">3309</td>
            <td align="left">THIS-RFC</td>
          </tr>
          <tr>
            <td align="left">ssh-mldsa87</td>
            <td align="left">2592</td>
            <td align="left">4627</td>
            <td align="left">THIS-RFC</td>
          </tr>
        </tbody>
      </table>
      <t>IANA is requested to add the following entries to "SSHFP RR Types for
   public key algorithms" in the "DNS SSHFP Resource Record Parameters"
   registry <xref target="IANA-SSHFP"/>:</t>
      <table>
        <thead>
          <tr>
            <th align="left">Value</th>
            <th align="left">Description</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">TBD1</td>
            <td align="left">ML-DSA-44</td>
            <td align="left">THIS RFC</td>
          </tr>
          <tr>
            <td align="left">TBD2</td>
            <td align="left">ML-DSA-65</td>
            <td align="left">THIS RFC</td>
          </tr>
          <tr>
            <td align="left">TBD3</td>
            <td align="left">ML-DSA-87</td>
            <td align="left">THIS RFC</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations in <xref target="RFC4251"/>, Section 9 apply to all SSH
   implementations, including those using ML-DSA.</t>
      <t>The security considerations in ML-DSA <xref target="FIPS204"/> apply to all
   uses of ML-DSA, including those in SSH.</t>
      <t>Cryptographic algorithms and parameters are usually broken or
   weakened over time.  Implementers and users need to continously re-evaluate that cryptographic algorithms continue to provide the
   expected level of security.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="FIPS204" target="https://doi.org/10.6028/NIST.FIPS.204">
          <front>
            <title>Module-Lattice-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date year="2024" month="August"/>
          </front>
          <seriesInfo name="NIST" value="FIPS 204"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC4250">
          <front>
            <title>The Secure Shell (SSH) Protocol Assigned Numbers</title>
            <author fullname="S. Lehtinen" initials="S." surname="Lehtinen"/>
            <author fullname="C. Lonvick" initials="C." role="editor" surname="Lonvick"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document defines the instructions to the IANA and the initial state of the IANA assigned numbers for the Secure Shell (SSH) protocol. It is intended only for the initialization of the IANA registries referenced in the set of SSH documents. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4250"/>
          <seriesInfo name="DOI" value="10.17487/RFC4250"/>
        </reference>
        <reference anchor="RFC4251">
          <front>
            <title>The Secure Shell (SSH) Protocol Architecture</title>
            <author fullname="T. Ylonen" initials="T." surname="Ylonen"/>
            <author fullname="C. Lonvick" initials="C." role="editor" surname="Lonvick"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>The Secure Shell (SSH) Protocol is a protocol for secure remote login and other secure network services over an insecure network. This document describes the architecture of the SSH protocol, as well as the notation and terminology used in SSH protocol documents. It also discusses the SSH algorithm naming system that allows local extensions. The SSH protocol consists of three major components: The Transport Layer Protocol provides server authentication, confidentiality, and integrity with perfect forward secrecy. The User Authentication Protocol authenticates the client to the server. The Connection Protocol multiplexes the encrypted tunnel into several logical channels. Details of these protocols are described in separate documents. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4251"/>
          <seriesInfo name="DOI" value="10.17487/RFC4251"/>
        </reference>
        <reference anchor="RFC4253">
          <front>
            <title>The Secure Shell (SSH) Transport Layer Protocol</title>
            <author fullname="T. Ylonen" initials="T." surname="Ylonen"/>
            <author fullname="C. Lonvick" initials="C." role="editor" surname="Lonvick"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>The Secure Shell (SSH) is a protocol for secure remote login and other secure network services over an insecure network.</t>
              <t>This document describes the SSH transport layer protocol, which typically runs on top of TCP/IP. The protocol can be used as a basis for a number of secure network services. It provides strong encryption, server authentication, and integrity protection. It may also provide compression.</t>
              <t>Key exchange method, public key algorithm, symmetric encryption algorithm, message authentication algorithm, and hash algorithm are all negotiated.</t>
              <t>This document also describes the Diffie-Hellman key exchange method and the minimal set of algorithms that are needed to implement the SSH transport layer protocol. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4253"/>
          <seriesInfo name="DOI" value="10.17487/RFC4253"/>
        </reference>
        <reference anchor="RFC4255">
          <front>
            <title>Using DNS to Securely Publish Secure Shell (SSH) Key Fingerprints</title>
            <author fullname="J. Schlyter" initials="J." surname="Schlyter"/>
            <author fullname="W. Griffin" initials="W." surname="Griffin"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document describes a method of verifying Secure Shell (SSH) host keys using Domain Name System Security (DNSSEC). The document defines a new DNS resource record that contains a standard SSH key fingerprint. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4255"/>
          <seriesInfo name="DOI" value="10.17487/RFC4255"/>
        </reference>
        <reference anchor="IANA-SSH" target="https://www.iana.org/assignments/ssh-parameters">
          <front>
            <title>Secure Shell (SSH) Protocol Parameters</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IANA-SSHFP" target="https://www.iana.org/assignments/dns-sshfp-rr-parameters)">
          <front>
            <title>DNS SSHFP Resource Record Parameters</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 207?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The text of draft-josefsson-ssh-sphincs was used as a template for this document.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
