<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-sfluhrer-ssh-mldsa-02" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.0 -->
  <front>
    <title abbrev="SSH ML-DSA">SSH Support of ML-DSA</title>
    <seriesInfo name="Internet-Draft" value="draft-sfluhrer-ssh-mldsa-02"/>
    <author fullname="Scott Fluhrer">
      <organization>Cisco Systems</organization>
      <address>
        <email>sfluhrer@cisco.com</email>
      </address>
    </author>
    <date year="2025" month="July" day="21"/>
    <area>sec</area>
    <workgroup>sshm</workgroup>
    <keyword>ML-DSA</keyword>
    <abstract>
      <?line 53?>

<t>This document describes the use of ML-DSA digital
   signatures in the Secure Shell (SSH) protocol.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://sfluhrer.github.io/ssh-mldsa/draft-sfluhrer-ssh-mldsa.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-sfluhrer-ssh-mldsa/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Secure Shell Maintenance Security Area mailing list (<eref target="mailto:ssh@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/ssh/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/ssh/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/sfluhrer/ssh-mldsa"/>.</t>
    </note>
  </front>
  <middle>
    <?line 58?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>A Cryptographically Relevant Quantum Computer (CRQC) could break
   traditional asymmetric cryptograph algorithms: e.g RSA, ECDSA; which
   are widely deployed authentication options of SSH.
   NIST has recently published the postquantum digitial signature algorithm ML-DSA <xref target="FIPS204"/>.</t>
      <t>This document describes how to use this algorithm for authentication within SSH <xref target="RFC4251"/>, as a replacement for the traditional signature algorithms (RSA, ECDSA).</t>
      <section anchor="background-on-ml-dsa">
        <name>Background on ML-DSA</name>
        <t>ML-DSA (as specified in FIPS 204) is a signature algorithm that is believed to be secure against attackers who have a Quantum Computer available to them.
   There are three strengths defined for it (with the parameter sets being known as ML-DSA-44, ML-DSA-65 and ML-DSA-87).
   In addition, for each defined parameter set, there are two versions, the 'pure' version (where ML-DSA directly signs the message) and a 'prehashed' version (where ML-DSA signs a hash that was computed outside of ML-DSA).
   For this protocol, we will always use the pure version.</t>
        <t>In addition, ML-DSA also has a 'context' input, which is a short string that is common to the sender and the recceiver.
   It is intended to allow for domain separation between separate uses of the same public key.
   This protocol always uses an empty (zero length) context.</t>
        <t>FIPS 204 also allows ML-DSA to be run in either determanistic or 'hedged' mode (where randomness is applied to the signature operation).
   We place no requirement on which is used; the implementation should select based on the quality of their random number source.</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>The descriptions of key and signature formats use the notation
   introduced in <xref target="RFC4251"/>, Section 3, and the string data type from
   <xref target="RFC4251"/>, Section 5.  Identifiers and terminology from ML-DSA
   <xref target="FIPS204"/> are used throughout the document.</t>
    </section>
    <section anchor="public-key-algorithms">
      <name>Public Key Algorithms</name>
      <t>This document describes three public key algorithms for use with SSH, as
   per <xref target="RFC4253"/>, Section 6.6, corresponding to the three parameter sets of ML-DSA.
   The names of the algorithm are "ssh-mldsa44", "ssh-mldsa65" and "ssh-mldsa87", to match the level 2, 3 and 5 parameter sets <xref target="FIPS204"/>.
   These algorithm only support signing and not encryption.</t>
      <t>The below table lists the public key sizes and the signature size (in bytes) for the three parameter sets.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Public Key Algorithm Name</th>
            <th align="left">Public Key Size</th>
            <th align="left">Signature Size</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">ssh-mldsa44</td>
            <td align="left">1312</td>
            <td align="left">2420</td>
          </tr>
          <tr>
            <td align="left">ssh-mldsa65</td>
            <td align="left">1952</td>
            <td align="left">3309</td>
          </tr>
          <tr>
            <td align="left">ssh-mldsa87</td>
            <td align="left">2592</td>
            <td align="left">4627</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="public-key-format">
      <name>Public Key Format</name>
      <t>The key format for all three parameter sets have the following encoding:</t>
      <t>string "ssh-mldsa44" (or "ssh-mldsa65" or "ssh-mldsa87")</t>
      <t>string key</t>
      <t>Here, 'key' is the public key described in <xref target="FIPS204"/>.</t>
      <t># Signature Algorithm</t>
      <t>Signatures are generated according to the procedure in Section 5.2
   <xref target="FIPS204"/>, using the "pure" version of ML-DSA, with an empty context string.</t>
    </section>
    <section anchor="signature-format">
      <name>Signature Format</name>
      <t>The "ssh-mldsa" key format has the following encoding:</t>
      <t>string "ssh-mldsa44" (or "ssh-mldsa65" or "ssh-mldsa87")</t>
      <t>string signature</t>
      <t>Here, 'signature' is the signature produced in accordance with the
   previous section.</t>
    </section>
    <section anchor="verification-algorithm">
      <name>Verification Algorithm</name>
      <t>Signatures are verified according to the procedure in
   <xref target="FIPS204"/>, Section 5.3, using the "pure" version of ML-DSA, with an empty context strong.</t>
    </section>
    <section anchor="sshfp-dns-resource-records">
      <name>SSHFP DNS Resource Records</name>
      <t>Usage and generation of the SSHFP DNS resource record is described in
   <xref target="RFC4255"/>.  This section illustrates the generation of SSHFP resource
   records for ML-DSA keys, and this document also specifies
   the corresponding code point to "SSHFP RR Types for public key
   algorithms" in the "DNS SSHFP Resource Record Parameters" IANA
   registry <xref target="IANA-SSHFP"/>.</t>
      <t>The generation of SSHFP resource records keys for ML-DSA is
   described as follows.</t>
      <t>The encoding of ML-DSA public keys is described in <xref target="FIPS204"/>.</t>
      <t>The SSHFP Resource Record for an ML-DSA key fingerprint
   (with a SHA-256 fingerprint) would, for example, be:</t>
      <t>pqserver.example.com. IN SSHFP TBD 2 (
                    a87f1b687ac0e57d2a081a2f28267237
                    34d90ed316d2b818ca9580ea384d9240 )</t>
      <t>Replace TBD with the value eventually allocated by IANA.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document augments the Public Key Algorithm Names in <xref target="RFC4250"/>, Section 4.11.3.</t>
      <t>IANA is requested to add the following entries to "Public Key Algorithm
   Names" in the "Secure Shell (SSH) Protocol Parameters" registry
   <xref target="IANA-SSH"/>:</t>
      <table>
        <thead>
          <tr>
            <th align="left">Public Key Algorithm Name</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">ssh-mldsa44</td>
            <td align="left">THIS-RFC</td>
          </tr>
          <tr>
            <td align="left">ssh-mldsa65</td>
            <td align="left">THIS-RFC</td>
          </tr>
          <tr>
            <td align="left">ssh-mldsa87</td>
            <td align="left">THIS-RFC</td>
          </tr>
        </tbody>
      </table>
      <t>IANA is requested to add the following entries to "SSHFP RR Types for
   public key algorithms" in the "DNS SSHFP Resource Record Parameters"
   registry <xref target="IANA-SSHFP"/>:</t>
      <table>
        <thead>
          <tr>
            <th align="left">Value</th>
            <th align="left">Description</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">TBD1</td>
            <td align="left">ML-DSA-44</td>
            <td align="left">THIS RFC</td>
          </tr>
          <tr>
            <td align="left">TBD2</td>
            <td align="left">ML-DSA-65</td>
            <td align="left">THIS RFC</td>
          </tr>
          <tr>
            <td align="left">TBD3</td>
            <td align="left">ML-DSA-87</td>
            <td align="left">THIS RFC</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations in <xref target="RFC4251"/>, Section 9 apply to all SSH
   implementations, including those using ML-DSA.</t>
      <t>The security considerations in ML-DSA <xref target="FIPS204"/> apply to all
   uses of ML-DSA, including those in SSH.</t>
      <t>Cryptographic algorithms and parameters are usually broken or
   weakened over time.  Implementers and users need to continously re-evaluate that cryptographic algorithms continue to provide the
   expected level of security.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="FIPS204" target="https://doi.org/10.6028/NIST.FIPS.204">
          <front>
            <title>Module-Lattice-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date year="2024" month="August"/>
          </front>
          <seriesInfo name="NIST" value="FIPS 204"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC4250">
          <front>
            <title>The Secure Shell (SSH) Protocol Assigned Numbers</title>
            <author fullname="S. Lehtinen" initials="S." surname="Lehtinen"/>
            <author fullname="C. Lonvick" initials="C." role="editor" surname="Lonvick"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document defines the instructions to the IANA and the initial state of the IANA assigned numbers for the Secure Shell (SSH) protocol. It is intended only for the initialization of the IANA registries referenced in the set of SSH documents. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4250"/>
          <seriesInfo name="DOI" value="10.17487/RFC4250"/>
        </reference>
        <reference anchor="RFC4251">
          <front>
            <title>The Secure Shell (SSH) Protocol Architecture</title>
            <author fullname="T. Ylonen" initials="T." surname="Ylonen"/>
            <author fullname="C. Lonvick" initials="C." role="editor" surname="Lonvick"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>The Secure Shell (SSH) Protocol is a protocol for secure remote login and other secure network services over an insecure network. This document describes the architecture of the SSH protocol, as well as the notation and terminology used in SSH protocol documents. It also discusses the SSH algorithm naming system that allows local extensions. The SSH protocol consists of three major components: The Transport Layer Protocol provides server authentication, confidentiality, and integrity with perfect forward secrecy. The User Authentication Protocol authenticates the client to the server. The Connection Protocol multiplexes the encrypted tunnel into several logical channels. Details of these protocols are described in separate documents. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4251"/>
          <seriesInfo name="DOI" value="10.17487/RFC4251"/>
        </reference>
        <reference anchor="RFC4253">
          <front>
            <title>The Secure Shell (SSH) Transport Layer Protocol</title>
            <author fullname="T. Ylonen" initials="T." surname="Ylonen"/>
            <author fullname="C. Lonvick" initials="C." role="editor" surname="Lonvick"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>The Secure Shell (SSH) is a protocol for secure remote login and other secure network services over an insecure network.</t>
              <t>This document describes the SSH transport layer protocol, which typically runs on top of TCP/IP. The protocol can be used as a basis for a number of secure network services. It provides strong encryption, server authentication, and integrity protection. It may also provide compression.</t>
              <t>Key exchange method, public key algorithm, symmetric encryption algorithm, message authentication algorithm, and hash algorithm are all negotiated.</t>
              <t>This document also describes the Diffie-Hellman key exchange method and the minimal set of algorithms that are needed to implement the SSH transport layer protocol. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4253"/>
          <seriesInfo name="DOI" value="10.17487/RFC4253"/>
        </reference>
        <reference anchor="RFC4255">
          <front>
            <title>Using DNS to Securely Publish Secure Shell (SSH) Key Fingerprints</title>
            <author fullname="J. Schlyter" initials="J." surname="Schlyter"/>
            <author fullname="W. Griffin" initials="W." surname="Griffin"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document describes a method of verifying Secure Shell (SSH) host keys using Domain Name System Security (DNSSEC). The document defines a new DNS resource record that contains a standard SSH key fingerprint. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4255"/>
          <seriesInfo name="DOI" value="10.17487/RFC4255"/>
        </reference>
        <reference anchor="IANA-SSH" target="https://www.iana.org/assignments/ssh-parameters">
          <front>
            <title>Secure Shell (SSH) Protocol Parameters</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IANA-SSHFP" target="https://www.iana.org/assignments/dns-sshfp-rr-parameters)">
          <front>
            <title>DNS SSHFP Resource Record Parameters</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 215?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The text of draft-josefsson-ssh-sphincs was used as a template for this document.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
