<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.4.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-westerbaan-tls-keyshare-recommendations-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title>Updated recommendations for TLS keyshares</title>
    <seriesInfo name="Internet-Draft" value="draft-westerbaan-tls-keyshare-recommendations-00"/>
    <author initials="B. E." surname="Westerbaan" fullname="Bas Westerbaan">
      <organization>Cloudflare</organization>
      <address>
        <email>bas@cloudflare.com</email>
      </address>
    </author>
    <date year="2026" month="February" day="23"/>
    <area>Security</area>
    <workgroup>Transport Layer Security</workgroup>
    <abstract>
      <?line 35?>

<t>This document updates the recommendations for key shares algorithms (TLS
supported groups; previously EC Named Curve Registry) in the light
of the future arrival of cryptographically relevant quantum computers.</t>
      <t>[[ NOTE I use key share in the title and here as it's more accurate
   than "group" and perhaps more well known in the context TLS
   than key agreement or key exchange. ]]</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://bwesterb.github.io/draft-westerbaan-tls-keyshare-recommendations/draft-westerbaan-tls-keyshare-recommendations.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-westerbaan-tls-keyshare-recommendations/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Transport Layer Security Working Group mailing list (<eref target="mailto:tls@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tls/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tls/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/bwesterb/draft-westerbaan-tls-keyshare-recommendations"/>.</t>
    </note>
  </front>
  <middle>
    <?line 46?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>A future cryptographically relevant quantum computer can decrypt
TLS handshakes recorded today that do not post-quantum algorithms for their key shares:
algorithms designed to be resistant against quantum attack. This threat
is known as store-now/decrypt-later (SNDL).</t>
      <t>RFC9847 defines the permitted value of the "Recommended" column
of the <eref target="https://www.iana.org/assignments/tls-parameters/tls-parameters.xhtml#tls-parameters-8">TLS Supported Groups registry</eref> as:</t>
      <dl>
        <dt>Y:</dt>
        <dd>
          <t>Indicates that the IETF has consensus that the
  item is <bcp14>RECOMMENDED</bcp14>. This only means that the associated
  mechanism is fit for the purpose for which it was defined.
  Careful reading of the documentation for the mechanism is
  necessary to understand the applicability of that mechanism.
  The IETF could recommend mechanisms that have limited
  applicability, but will provide applicability statements that
  describe any limitations of the mechanism or necessary constraints
  on its use.</t>
        </dd>
        <dt>N:</dt>
        <dd>
          <t>Indicates that the item has not been evaluated by
  the IETF and that the IETF has made no statement about the
  suitability of the associated mechanism. This does not necessarily
  mean that the mechanism is flawed, only that no consensus exists.
  The IETF might have consensus to leave an items marked as "N" on
  the basis of its having limited applicability or usage constraints.</t>
        </dd>
        <dt>D:</dt>
        <dd>
          <t>Indicates that the item is discouraged. This marking could be used to identify
  mechanisms that might result in problems if they are used, such as
  a weak cryptographic algorithm or a mechanism that might cause
  interoperability problems in deployment. When marking a registry entry as
  “D”, either the References or the Comments Column <bcp14>MUST</bcp14> include sufficient
  information to determine why the marking has been applied. Implementers and
  users <bcp14>SHOULD</bcp14> consult the linked references associated with the item to
  determine the conditions under which the item <bcp14>SHOULD NOT</bcp14> or <bcp14>MUST NOT</bcp14> be used.</t>
        </dd>
      </dl>
      <t>Given the SNDL threat, the IETF cannot recommend key shares for general use
that do not offer post-quantum resistance, and this document updates
the <eref target="https://www.iana.org/assignments/tls-parameters/tls-parameters.xhtml#tls-parameters-8">TLS Supported Groups registry</eref>
accordingly.</t>
      <t>Among the currently registered post-quantum key share algorithms, IETF
recommends X25519MLKEM768 for its widespread support.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Before the arrival of a cryptographically relevant quantum computer (CRQC),
a TLS connection that negotiated a non-post quantum key share can be recorded
decrypted in the future.</t>
      <t>After the arrival of a CRQC, allowing a non-post quantum key share to be
negotiated allows for an active quantum attack that achieves MITM,
even if the server certificate is post quantum.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document updates the <eref target="https://www.iana.org/assignments/tls-parameters/tls-parameters.xhtml#tls-parameters-8">TLS Supported Groups registry</eref>, according to the procedures in <xref section="6" sectionFormat="of" target="RFC9847"/> as follows.</t>
      <section anchor="recommend">
        <name>Recommend</name>
        <table>
          <thead>
            <tr>
              <th align="left">Value</th>
              <th align="left">Description</th>
              <th align="left">Recommended</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">4588</td>
              <td align="left">X25519MLKEM768</td>
              <td align="left">Y</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="discourage">
        <name>Discourage</name>
        <table>
          <thead>
            <tr>
              <th align="left">Value</th>
              <th align="left">Description</th>
              <th align="left">Recommended</th>
              <th align="left">Comment</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">9</td>
              <td align="left">sect283k1</td>
              <td align="left">D</td>
              <td align="left">Vulnerable to store-now/decrypt-later quantum attack, see TBA:this-document</td>
            </tr>
            <tr>
              <td align="left">10</td>
              <td align="left">sect283r1</td>
              <td align="left">D</td>
              <td align="left">Vulnerable to store-now/decrypt-later quantum attack, see TBA:this-document</td>
            </tr>
            <tr>
              <td align="left">11</td>
              <td align="left">sect409k1</td>
              <td align="left">D</td>
              <td align="left">Vulnerable to store-now/decrypt-later quantum attack, see TBA:this-document</td>
            </tr>
            <tr>
              <td align="left">12</td>
              <td align="left">sect409r1</td>
              <td align="left">D</td>
              <td align="left">Vulnerable to store-now/decrypt-later quantum attack, see TBA:this-document</td>
            </tr>
            <tr>
              <td align="left">13</td>
              <td align="left">sect571k1</td>
              <td align="left">D</td>
              <td align="left">Vulnerable to store-now/decrypt-later quantum attack, see TBA:this-document</td>
            </tr>
            <tr>
              <td align="left">14</td>
              <td align="left">sect571r1</td>
              <td align="left">D</td>
              <td align="left">Vulnerable to store-now/decrypt-later quantum attack, see TBA:this-document</td>
            </tr>
            <tr>
              <td align="left">22</td>
              <td align="left">secp256k1</td>
              <td align="left">D</td>
              <td align="left">Vulnerable to store-now/decrypt-later quantum attack, see TBA:this-document</td>
            </tr>
            <tr>
              <td align="left">23</td>
              <td align="left">secp256r1</td>
              <td align="left">D</td>
              <td align="left">Vulnerable to store-now/decrypt-later quantum attack, see TBA:this-document</td>
            </tr>
            <tr>
              <td align="left">24</td>
              <td align="left">secp384r1</td>
              <td align="left">D</td>
              <td align="left">Vulnerable to store-now/decrypt-later quantum attack, see TBA:this-document</td>
            </tr>
            <tr>
              <td align="left">25</td>
              <td align="left">secp521r1</td>
              <td align="left">D</td>
              <td align="left">Vulnerable to store-now/decrypt-later quantum attack, see TBA:this-document</td>
            </tr>
            <tr>
              <td align="left">26</td>
              <td align="left">brainpoolP256r1</td>
              <td align="left">D</td>
              <td align="left">Vulnerable to store-now/decrypt-later quantum attack, see TBA:this-document</td>
            </tr>
            <tr>
              <td align="left">27</td>
              <td align="left">brainpoolP384r1</td>
              <td align="left">D</td>
              <td align="left">Vulnerable to store-now/decrypt-later quantum attack, see TBA:this-document</td>
            </tr>
            <tr>
              <td align="left">28</td>
              <td align="left">brainpoolP512r1</td>
              <td align="left">D</td>
              <td align="left">Vulnerable to store-now/decrypt-later quantum attack, see TBA:this-document</td>
            </tr>
            <tr>
              <td align="left">29</td>
              <td align="left">x25519</td>
              <td align="left">D</td>
              <td align="left">Vulnerable to store-now/decrypt-later quantum attack, see TBA:this-document</td>
            </tr>
            <tr>
              <td align="left">30</td>
              <td align="left">x448</td>
              <td align="left">D</td>
              <td align="left">Vulnerable to store-now/decrypt-later quantum attack, see TBA:this-document</td>
            </tr>
            <tr>
              <td align="left">31</td>
              <td align="left">brainpoolP256r1tls13</td>
              <td align="left">D</td>
              <td align="left">Vulnerable to store-now/decrypt-later quantum attack, see TBA:this-document</td>
            </tr>
            <tr>
              <td align="left">32</td>
              <td align="left">brainpoolP384r1tls13</td>
              <td align="left">D</td>
              <td align="left">Vulnerable to store-now/decrypt-later quantum attack, see TBA:this-document</td>
            </tr>
            <tr>
              <td align="left">33</td>
              <td align="left">brainpoolP512r1tls13</td>
              <td align="left">D</td>
              <td align="left">Vulnerable to store-now/decrypt-later quantum attack, see TBA:this-document</td>
            </tr>
            <tr>
              <td align="left">34</td>
              <td align="left">GC256A</td>
              <td align="left">D</td>
              <td align="left">Vulnerable to store-now/decrypt-later quantum attack, see TBA:this-document</td>
            </tr>
            <tr>
              <td align="left">35</td>
              <td align="left">GC256B</td>
              <td align="left">D</td>
              <td align="left">Vulnerable to store-now/decrypt-later quantum attack, see TBA:this-document</td>
            </tr>
            <tr>
              <td align="left">36</td>
              <td align="left">GC256C</td>
              <td align="left">D</td>
              <td align="left">Vulnerable to store-now/decrypt-later quantum attack, see TBA:this-document</td>
            </tr>
            <tr>
              <td align="left">37</td>
              <td align="left">GC256D</td>
              <td align="left">D</td>
              <td align="left">Vulnerable to store-now/decrypt-later quantum attack, see TBA:this-document</td>
            </tr>
            <tr>
              <td align="left">38</td>
              <td align="left">GC512A</td>
              <td align="left">D</td>
              <td align="left">Vulnerable to store-now/decrypt-later quantum attack, see TBA:this-document</td>
            </tr>
            <tr>
              <td align="left">39</td>
              <td align="left">GC512B</td>
              <td align="left">D</td>
              <td align="left">Vulnerable to store-now/decrypt-later quantum attack, see TBA:this-document</td>
            </tr>
            <tr>
              <td align="left">40</td>
              <td align="left">GC512C</td>
              <td align="left">D</td>
              <td align="left">Vulnerable to store-now/decrypt-later quantum attack, see TBA:this-document</td>
            </tr>
            <tr>
              <td align="left">41</td>
              <td align="left">curveSM2</td>
              <td align="left">D</td>
              <td align="left">Vulnerable to store-now/decrypt-later quantum attack, see TBA:this-document</td>
            </tr>
            <tr>
              <td align="left">256</td>
              <td align="left">ffdhe2048</td>
              <td align="left">D</td>
              <td align="left">Vulnerable to store-now/decrypt-later quantum attack, see TBA:this-document</td>
            </tr>
            <tr>
              <td align="left">257</td>
              <td align="left">ffdhe3072</td>
              <td align="left">D</td>
              <td align="left">Vulnerable to store-now/decrypt-later quantum attack, see TBA:this-document</td>
            </tr>
            <tr>
              <td align="left">258</td>
              <td align="left">ffdhe4096</td>
              <td align="left">D</td>
              <td align="left">Vulnerable to store-now/decrypt-later quantum attack, see TBA:this-document</td>
            </tr>
            <tr>
              <td align="left">259</td>
              <td align="left">ffdhe6144</td>
              <td align="left">D</td>
              <td align="left">Vulnerable to store-now/decrypt-later quantum attack, see TBA:this-document</td>
            </tr>
            <tr>
              <td align="left">260</td>
              <td align="left">ffdhe8192</td>
              <td align="left">D</td>
              <td align="left">Vulnerable to store-now/decrypt-later quantum attack, see TBA:this-document</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9847">
          <front>
            <title>IANA Registry Updates for TLS and DTLS</title>
            <author fullname="J. Salowey" initials="J." surname="Salowey"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="December" year="2025"/>
            <abstract>
              <t>This document updates the changes to the TLS and DTLS IANA registries made in RFC 8447. It adds a new value, "D" for discouraged, to the "Recommended" column of the selected TLS registries and adds a "Comment" column to all active registries that do not already have a "Comment" column. Finally, it updates the registration request instructions.</t>
              <t>This document updates RFC 8447.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9847"/>
          <seriesInfo name="DOI" value="10.17487/RFC9847"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
