<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.24 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-sfluhrer-ssh-mldsa-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.0 -->
  <front>
    <title abbrev="SSH ML-DSA">SSH Support of ML-DSA</title>
    <seriesInfo name="Internet-Draft" value="draft-sfluhrer-ssh-mldsa-00"/>
    <author fullname="Scott Fluhrer">
      <organization>Cisco Systems</organization>
      <address>
        <email>sfluhrer@cisco.com</email>
      </address>
    </author>
    <date year="2025" month="March" day="16"/>
    <area>sec</area>
    <workgroup>sshm</workgroup>
    <keyword>ML-DSA</keyword>
    <abstract>
      <?line 53?>

<t>This document describes the use of ML-DSA digital
   signatures in the Secure Shell (SSH) protocol.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://sfluhrer.github.io/ssh-mldsa/draft-sfluhrer-ssh-mldsa.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-sfluhrer-ssh-mldsa/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Secure Shell Maintenance Security Area mailing list (<eref target="mailto:ssh@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/ssh/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/ssh/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/sfluhrer/ssh-mldsa"/>.</t>
    </note>
  </front>
  <middle>
    <?line 58?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>A Cryptographically Relevant Quantum Computer (CRQC) could break
   traditional asymmetric cryptograph algorithms: e.g RSA, ECDSA; which
   are widely deployed authentication options of SSH.
   NIST has recently published the postquantum digitial signature algorithm ML-DSA <xref target="FIPS204"/>.</t>
      <t>This document describes how to use this algorithm for authentication within SSH <xref target="RFC4251"/>, as a replacement for the traditional signature algorithms (RSA, ECDSA).</t>
      <section anchor="background-on-ml-dsa">
        <name>Background on ML-DSA</name>
        <t>ML-DSA (as specified in FIPS 204) is a signature algorithm that is believed to be secure against attackers who have a Quantum Computer available to them.
   There are three strengths defined for it (with the parameter sets being known as ML-DSA-44, ML-DSA-65 and ML-DSA-87).
   In addition, for each defined parameter set, there are two versions, the 'pure' version (where ML-DSA directly signs the message) and a 'prehashed' version (where ML-DSA signs a hash that was computed outside of ML-DSA).
   For this protocol, we will always use the pure version.</t>
        <t>In addition, ML-DSA also has a 'context' input, which is a short string that is common to the sender and the recceiver.
   It is intended to allow for domain separation between separate uses of the same public key.</t>
        <t>FIPS 204 also allows ML-DSA to be run in either determanistic or 'hedged' mode (where randomness is applied to the signature operation).
   We place no requirement on which is used; the implementation should select based on the quality of their random number source.</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>The descriptions of key and signature formats use the notation
   introduced in <xref target="RFC4251"/>, Section 3, and the string data type from
   <xref target="RFC4251"/>, Section 5.  Identifiers and terminology from ML-DSA
   <xref target="FIPS204"/> are used throughout the document.</t>
    </section>
    <section anchor="public-key-algorithms">
      <name>Public Key Algorithms</name>
      <t>This document describes three public key algorithms for use with SSH, as
   per <xref target="RFC4253"/>, Section 6.6, corresponding to the three parameter sets of ML-DSA.
   The names of the algorithm are "ssh-ml-dsa-44", "ssh-ml-dsa-65" and "ssh-ml-dsa-87", to match the level 2, 3 and 5 parameter sets <xref target="FIPS204"/>.
   These algorithm only support signing and not encryption.</t>
    </section>
    <section anchor="public-key-format">
      <name>Public Key Format</name>
      <t>The key format for all three parameter sets have the following encoding:</t>
      <t>string "ssh-mldsa44" (or "ssh-mldsa65" or "ssh-mldsa87")</t>
      <t>string key</t>
      <t>Here, 'key' is the public key described in <xref target="FIPS204"/>.</t>
      <t># Signature Algorithm</t>
      <t>Signatures are generated according to the procedure in Section 5.2
   <xref target="FIPS204"/>, using the "pure" version of ML-DSA, with an empty context string.</t>
    </section>
    <section anchor="signature-format">
      <name>Signature Format</name>
      <t>The "ssh-mldsa" key format has the following encoding:</t>
      <t>string "ssh-mldsa44" (or "ssh-mldsa65" or "ssh-mldsa87")</t>
      <t>string signature</t>
      <t>Here, 'signature' is the signature produced in accordance with the
   previous section.</t>
    </section>
    <section anchor="verification-algorithm">
      <name>Verification Algorithm</name>
      <t>Signatures are verified according to the procedure in
   <xref target="FIPS204"/>, Section 5.3, using the "pure" version of ML-DSA, with an empty context strong.</t>
    </section>
    <section anchor="sshfp-dns-resource-records">
      <name>SSHFP DNS Resource Records</name>
      <t>Usage and generation of the SSHFP DNS resource record is described in
   <xref target="RFC4255"/>.  This section illustrates the generation of SSHFP resource
   records for ML-DSA keys, and this document also specifies
   the corresponding code point to "SSHFP RR Types for public key
   algorithms" in the "DNS SSHFP Resource Record Parameters" IANA
   registry <xref target="IANA-SSHFP"/>.</t>
      <t>The generation of SSHFP resource records keys for ML-DSA is
   described as follows.</t>
      <t>The encoding of ML-DSA public keys is described in <xref target="FIPS204"/>.</t>
      <t>The SSHFP Resource Record for an ML-DSA key fingerprint
   (with a SHA-256 fingerprint) would, for example, be:</t>
      <t>pqserver.example.com. IN SSHFP TBD 2 (
                    a87f1b687ac0e57d2a081a2f28267237
                    34d90ed316d2b818ca9580ea384d9240 )</t>
      <t>Replace TBD with the value eventually allocated by IANA.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document augments the Public Key Algorithm Names in <xref target="RFC4250"/>, Section 4.11.3.</t>
      <t>IANA is requested to add the following entries to "Public Key Algorithm
   Names" in the "Secure Shell (SSH) Protocol Parameters" registry
   <xref target="IANA-SSH"/>:</t>
      <table>
        <thead>
          <tr>
            <th align="left">Public Key Algorithm Name</th>
            <th align="left">Key Size</th>
            <th align="left">Signature Size</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">ssh-mldsa44</td>
            <td align="left">1312</td>
            <td align="left">2420</td>
            <td align="left">THIS-RFC</td>
          </tr>
          <tr>
            <td align="left">ssh-mldsa65</td>
            <td align="left">1952</td>
            <td align="left">3309</td>
            <td align="left">THIS-RFC</td>
          </tr>
          <tr>
            <td align="left">ssh-mldsa87</td>
            <td align="left">2592</td>
            <td align="left">4627</td>
            <td align="left">THIS-RFC</td>
          </tr>
        </tbody>
      </table>
      <t>IANA is requested to add the following entries to "SSHFP RR Types for
   public key algorithms" in the "DNS SSHFP Resource Record Parameters"
   registry <xref target="IANA-SSHFP"/>:</t>
      <table>
        <thead>
          <tr>
            <th align="left">Value</th>
            <th align="left">Description</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">TBD1</td>
            <td align="left">ML-DSA-44</td>
            <td align="left">THIS RFC</td>
          </tr>
          <tr>
            <td align="left">TBD2</td>
            <td align="left">ML-DSA-65</td>
            <td align="left">THIS RFC</td>
          </tr>
          <tr>
            <td align="left">TBD3</td>
            <td align="left">ML-DSA-87</td>
            <td align="left">THIS RFC</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations in <xref target="RFC4251"/>, Section 9 apply to all SSH
   implementations, including those using ML-DSA.</t>
      <t>The security considerations in ML-DSA <xref target="FIPS204"/> apply to all
   uses of ML-DSA, including those in SSH.</t>
      <t>Cryptographic algorithms and parameters are usually broken or
   weakened over time.  Implementers and users need to continously re-evaluate that cryptographic algorithms continue to provide the
   expected level of security.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="FIPS204" target="https://doi.org/10.6028/NIST.FIPS.204">
          <front>
            <title>Module-Lattice-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date year="2024" month="August"/>
          </front>
          <seriesInfo name="NIST" value="FIPS 204"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC4250">
          <front>
            <title>The Secure Shell (SSH) Protocol Assigned Numbers</title>
            <author fullname="S. Lehtinen" initials="S." surname="Lehtinen"/>
            <author fullname="C. Lonvick" initials="C." role="editor" surname="Lonvick"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document defines the instructions to the IANA and the initial state of the IANA assigned numbers for the Secure Shell (SSH) protocol. It is intended only for the initialization of the IANA registries referenced in the set of SSH documents. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4250"/>
          <seriesInfo name="DOI" value="10.17487/RFC4250"/>
        </reference>
        <reference anchor="RFC4251">
          <front>
            <title>The Secure Shell (SSH) Protocol Architecture</title>
            <author fullname="T. Ylonen" initials="T." surname="Ylonen"/>
            <author fullname="C. Lonvick" initials="C." role="editor" surname="Lonvick"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>The Secure Shell (SSH) Protocol is a protocol for secure remote login and other secure network services over an insecure network. This document describes the architecture of the SSH protocol, as well as the notation and terminology used in SSH protocol documents. It also discusses the SSH algorithm naming system that allows local extensions. The SSH protocol consists of three major components: The Transport Layer Protocol provides server authentication, confidentiality, and integrity with perfect forward secrecy. The User Authentication Protocol authenticates the client to the server. The Connection Protocol multiplexes the encrypted tunnel into several logical channels. Details of these protocols are described in separate documents. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4251"/>
          <seriesInfo name="DOI" value="10.17487/RFC4251"/>
        </reference>
        <reference anchor="RFC4253">
          <front>
            <title>The Secure Shell (SSH) Transport Layer Protocol</title>
            <author fullname="T. Ylonen" initials="T." surname="Ylonen"/>
            <author fullname="C. Lonvick" initials="C." role="editor" surname="Lonvick"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>The Secure Shell (SSH) is a protocol for secure remote login and other secure network services over an insecure network.</t>
              <t>This document describes the SSH transport layer protocol, which typically runs on top of TCP/IP. The protocol can be used as a basis for a number of secure network services. It provides strong encryption, server authentication, and integrity protection. It may also provide compression.</t>
              <t>Key exchange method, public key algorithm, symmetric encryption algorithm, message authentication algorithm, and hash algorithm are all negotiated.</t>
              <t>This document also describes the Diffie-Hellman key exchange method and the minimal set of algorithms that are needed to implement the SSH transport layer protocol. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4253"/>
          <seriesInfo name="DOI" value="10.17487/RFC4253"/>
        </reference>
        <reference anchor="RFC4255">
          <front>
            <title>Using DNS to Securely Publish Secure Shell (SSH) Key Fingerprints</title>
            <author fullname="J. Schlyter" initials="J." surname="Schlyter"/>
            <author fullname="W. Griffin" initials="W." surname="Griffin"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document describes a method of verifying Secure Shell (SSH) host keys using Domain Name System Security (DNSSEC). The document defines a new DNS resource record that contains a standard SSH key fingerprint. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4255"/>
          <seriesInfo name="DOI" value="10.17487/RFC4255"/>
        </reference>
        <reference anchor="IANA-SSH" target="https://www.iana.org/assignments/ssh-parameters">
          <front>
            <title>Secure Shell (SSH) Protocol Parameters</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IANA-SSHFP" target="https://www.iana.org/assignments/dns-sshfp-rr-parameters)">
          <front>
            <title>DNS SSHFP Resource Record Parameters</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 206?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The text of draft-josefsson-ssh-sphincs was used as a template for this document.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
