<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.34 (Ruby 3.4.9) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-tls-key-share-prediction-04" category="std" consensus="true" submissionType="IETF" updates="8446" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.32.0 -->
  <front>
    <title>TLS Key Share Prediction</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-tls-key-share-prediction-04"/>
    <author initials="D." surname="Benjamin" fullname="David Benjamin">
      <organization>Google LLC</organization>
      <address>
        <email>davidben@google.com</email>
      </address>
    </author>
    <date year="2026" month="March" day="19"/>
    <area>Security</area>
    <workgroup>Transport Layer Security</workgroup>
    <abstract>
      <?line 35?>

<t>This document defines a mechanism for servers to communicate supported key share algorithms in DNS. Clients may use this information to reduce TLS handshake round-trips.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://tlswg.github.io/tls-key-share-prediction/draft-ietf-tls-key-share-prediction.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-tls-key-share-prediction/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Transport Layer Security Working Group mailing list (<eref target="mailto:tls@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tls/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tls/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/tlswg/tls-key-share-prediction"/>.</t>
    </note>
  </front>
  <middle>
    <?line 39?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Named groups in TLS 1.3 <xref target="RFC8446"/> are negotiated with two lists in the ClientHello: The client sends its supported groups in the <tt>supported_groups</tt> extension, but also generates key shares for a subset in the <tt>key_share</tt> extension. Named groups in this subset can be used in one round trip, while named groups outside the subset require a HelloRetryRequest and hence two round trips. The additional round trip is undesirable for performance, but unused key shares consume network and computational resources, so clients often do not generate key shares for all groups.</t>
      <t>Post-quantum key encapsulation methods (KEMs) have large keys and ciphertexts, so network costs are particularly pronounced. As a TLS ecosystem transitions from one post-quantum KEM to another, it is challenging to pick key shares without prior knowledge of the server's policies:</t>
      <ol spacing="normal" type="1"><li>
          <t>Predicting both post-quantum KEMs consumes excessive bandwidth on the unused option.</t>
        </li>
        <li>
          <t>Predicting the old post-quantum KEM adds a round-trip cost to newer servers. Servers will be unlikely to transition as a result.</t>
        </li>
        <li>
          <t>Predicting the new post-quantum KEM adds a round-trip cost to older servers. Particularly early in the transition, when most servers do not implement the new KEM, this may significantly regress performance.</t>
        </li>
      </ol>
      <t>This document defines a method for servers to declare their supported named groups in DNS, using SVCB or HTTPS resource records <xref target="RFC9460"/>. This allows the client to predict key shares more accurately.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD",
"SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/>
when, and only when, they appear in all capitals, as shown here.</t>
    </section>
    <section anchor="dns-service-parameter">
      <name>DNS Service Parameter</name>
      <t>This document defines the <tt>tls-supported-groups</tt> SvcParamKey <xref target="RFC9460"/>, which specifies the endpoint's supported TLS named groups, as a non-empty sequence of TLS NamedGroup codepoints in order of decreasing preference, with no duplicates. This allows clients connecting to the endpoint to reduce the likelihood of needing a HelloRetryRequest.</t>
      <section anchor="format">
        <name>Format</name>
        <t>The presentation <tt>value</tt> of the SvcParamValue is a non-empty comma-separated list (<xref section="A.1" sectionFormat="of" target="RFC9460"/>) of decimal integers between 0 and 65535 (inclusive) in ASCII, with no duplicate integers. Any other <tt>value</tt> is a syntax error. To enable simpler parsing, this SvcParam MUST NOT contain escape sequences.</t>
        <t>The wire format of the SvcParamValue is a sequence of 2-octet numeric values in network byte order. An empty list of values is invalid, as is a list containing duplicates.</t>
        <t>For example, a TLS server which prefers <tt>x25519</tt> (29) and also supports <tt>secp256r1</tt> (23) would add a <tt>tls-supported-groups</tt> SvcParamValue containing 29 and 23. The presentation <tt>value</tt> would be "29,23". The wire format of the SvcParamValue would be four octets, represented in hexadecimal as <tt>001d0017</tt>.</t>
        <t>The following is an example of the value appearing in a complete DNS record in the presentation syntax:</t>
        <sourcecode type="dns"><![CDATA[
example.net.  7200  IN SVCB 3 server.example.net. (
    port="8004" tls-supported-groups=29,23 )
]]></sourcecode>
      </section>
      <section anchor="configuring-services">
        <name>Configuring Services</name>
        <t>Services SHOULD include supported TLS named groups, in order of decreasing preference in the <tt>tls-supported-groups</tt> parameter of their HTTPS or SVCB endpoints. As TLS configuration is updated, services SHOULD update the DNS record to match. Services MAY include GREASE values <xref target="RFC8701"/> in this list.</t>
      </section>
      <section anchor="client-behavior">
        <name>Client Behavior</name>
        <t>When connecting to a service endpoint whose HTTPS or SVCB record contains the <tt>tls-supported-groups</tt> parameter, the client evaluates the server's list against its configuration to predict which named group will be chosen. When evaluating the server's list, the client MUST ignore any codepoints that it does not support or recognize.</t>
        <t>If the client predicts a named group, the client SHOULD send a <tt>key_share</tt> extension containing just that named group in the initial ClientHello. The client MAY continue to send other key shares to reduce mispredictions (see <xref target="misprediction"/>), though this comes at additional network and computational cost. The client MAY also ignore the prediction, e.g., it chooses not to apply this process to some groups (see <xref target="security-considerations"/>).</t>
        <t>If there were no named groups in common, the client SHOULD proceed as if the <tt>tls-supported-groups</tt> parameter was not present and predict some default set of key shares. The HTTPS or SVCB record may have been stale, so it is possible the server still has a named group in common.</t>
        <t>This process does not modify the <tt>supported_groups</tt> extension. To avoid downgrade attacks, the client MUST continue to send all its supported groups, in preference order, in <tt>supported_groups</tt>. See <xref target="security-considerations"/> for additional discussion on downgrades.</t>
      </section>
      <section anchor="misprediction">
        <name>Misprediction</name>
        <t>Although this service parameter is intended to reduce key share mispredictions, mispredictions may still occur in some scenarios. For example:</t>
        <ul spacing="normal">
          <li>
            <t>The client has fetched a stale HTTPS or SVCB record that no longer reflects the server configuration</t>
          </li>
          <li>
            <t>The server is in the process of deploying a change to named group configuration, and different server instances temporarily evaluate different configuration</t>
          </li>
          <li>
            <t>The client was unable to fetch the HTTPS or SVCB record</t>
          </li>
          <li>
            <t>The client and server implement incompatible selection algorithms, such that client's evaluation of the service parameter did not match the server's final selection</t>
          </li>
        </ul>
        <t>Clients and servers MUST correctly handle mispredictions by responding to and sending HelloRetryRequest, respectively.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document introduces a mechanism for clients to vary the <tt>key_share</tt> extension based on DNS. DNS responses are unauthenticated in many deployments. An attacker may be able to forge an HTTPS or SVCB record and influence the client's predicted named groups. That, in turn, can influence the named group selected by the TLS server, as TLS's downgrade protections only extend to the ClientHello itself.</t>
      <t>Provided the client's <tt>supported_groups</tt> list always reflects the unmodified client preference list, this is safe. The scope of attacker influence depends on how the server selects a group. Servers are expected to evaluate the combination of <tt>key_share</tt> and <tt>supported_groups</tt> according to their selection goals and the definitions in <xref target="RFC8446"/>. When deciding between multiple common groups, a server might consider:</t>
      <ul spacing="normal">
        <li>
          <t>The server's local preferences, picking one it considers best.</t>
        </li>
        <li>
          <t>The client's preference order in <tt>supported_groups</tt>, picking one the client considers best.</t>
        </li>
        <li>
          <t>Which groups appear in <tt>key_share</tt>, picking one that avoids a HelloRetryRequest.</t>
        </li>
      </ul>
      <t>The last case, presence in <tt>key_share</tt>, is under attacker influence in this mechanism. However, <xref section="4.2.8" sectionFormat="of" target="RFC8446"/> already permits the client to omit its most preferred groups in <tt>key_share</tt>. Servers are thus expected to only select by <tt>key_share</tt> when they opt to consider neither the client's preference nor their own. That is, it is only appropriate in cases where the two groups have comparable preference, such that round-trip costs dominate. Servers SHOULD NOT use <tt>key_share</tt> to select a classical named group over a post-quantum named group.</t>
      <t>To reduce the risk of downgrade attacks with incorrectly deployed servers, clients MAY choose to ignore <tt>tls-supported-groups</tt> when the result would predict a less preferred group. For example, a client might prefer post-quantum groups, but support ECDH groups with older servers. It MAY then ignore DNS-based ECDH predictions, limiting <tt>tls-supported-groups</tt> to post-quantum options. In this case, transitions between post-quantum groups, where the bandwidth concerns are more pronounced, remain optimized, but ECDH-only servers cannot take advantage of <tt>tls-supported-groups</tt>.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document updates the Service Parameter Keys registry <xref target="RFC9460"/> with the following entry:</t>
      <table>
        <thead>
          <tr>
            <th align="left">Number</th>
            <th align="left">Name</th>
            <th align="left">Meaning</th>
            <th align="left">Format Reference</th>
            <th align="left">Change Controller</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">9</td>
            <td align="left">tls-supported-groups</td>
            <td align="left">Supported groups in TLS</td>
            <td align="left">(this document) <xref target="format"/></td>
            <td align="left">IETF</td>
          </tr>
        </tbody>
      </table>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC8446">
        <front>
          <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
          <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
          <date month="August" year="2018"/>
          <abstract>
            <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
            <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8446"/>
        <seriesInfo name="DOI" value="10.17487/RFC8446"/>
      </reference>
      <reference anchor="RFC9460">
        <front>
          <title>Service Binding and Parameter Specification via the DNS (SVCB and HTTPS Resource Records)</title>
          <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
          <author fullname="M. Bishop" initials="M." surname="Bishop"/>
          <author fullname="E. Nygren" initials="E." surname="Nygren"/>
          <date month="November" year="2023"/>
          <abstract>
            <t>This document specifies the "SVCB" ("Service Binding") and "HTTPS" DNS resource record (RR) types to facilitate the lookup of information needed to make connections to network services, such as for HTTP origins. SVCB records allow a service to be provided from multiple alternative endpoints, each with associated parameters (such as transport protocol configuration), and are extensible to support future uses (such as keys for encrypting the TLS ClientHello). They also enable aliasing of apex domains, which is not possible with CNAME. The HTTPS RR is a variation of SVCB for use with HTTP (see RFC 9110, "HTTP Semantics"). By providing more information to the client before it attempts to establish a connection, these records offer potential benefits to both performance and privacy.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9460"/>
        <seriesInfo name="DOI" value="10.17487/RFC9460"/>
      </reference>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
      <reference anchor="RFC8701">
        <front>
          <title>Applying Generate Random Extensions And Sustain Extensibility (GREASE) to TLS Extensibility</title>
          <author fullname="D. Benjamin" initials="D." surname="Benjamin"/>
          <date month="January" year="2020"/>
          <abstract>
            <t>This document describes GREASE (Generate Random Extensions And Sustain Extensibility), a mechanism to prevent extensibility failures in the TLS ecosystem. It reserves a set of TLS protocol values that may be advertised to ensure peers correctly handle unknown values.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8701"/>
        <seriesInfo name="DOI" value="10.17487/RFC8701"/>
      </reference>
    </references>
    <?line 134?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The author would like to thank David Adrian, Bob Beck, Marc Penninga, Sophie Schmieg, Martin Thomson, and Bas Westerbaan for discussions and review of this document.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
