<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.31 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-sfluhrer-ssh-mldsa-06" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.32.0 -->
  <front>
    <title abbrev="SSH ML-DSA">SSH Support of ML-DSA</title>
    <seriesInfo name="Internet-Draft" value="draft-sfluhrer-ssh-mldsa-06"/>
    <author fullname="Scott Fluhrer">
      <organization>Cisco Systems</organization>
      <address>
        <email>sfluhrer@cisco.com</email>
      </address>
    </author>
    <author fullname="Ryan Appel">
      <organization>Bank of America</organization>
      <address>
        <email>ryan.appel@bofa.com</email>
      </address>
    </author>
    <date year="2026" month="April" day="07"/>
    <area>sec</area>
    <workgroup>sshm</workgroup>
    <keyword>ML-DSA</keyword>
    <abstract>
      <?line 56?>

<t>This document describes the use of ML-DSA digital
   signatures in the Secure Shell (SSH) protocol.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://sfluhrer.github.io/ssh-mldsa/draft-sfluhrer-ssh-mldsa.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-sfluhrer-ssh-mldsa/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Secure Shell Maintenance Security Area mailing list (<eref target="mailto:ssh@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/ssh/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/ssh/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/sfluhrer/ssh-mldsa"/>.</t>
    </note>
  </front>
  <middle>
    <?line 61?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>A Cryptographically Relevant Quantum Computer (CRQC) is a quantum computer with sufficient compute capability and stability that it is able to break traditional asymmetric cryptographic algorithms:
   e.g RSA, ECDSA; which are currently the only authentication algorithms available for SSH.
   NIST has recently published the post-quantum cryptography (PQC) algorithm known as ML-DSA <xref target="FIPS204"/> which is a digital signature algorithm.</t>
      <t>This document describes how to use this algorithm for authentication within SSH <xref target="RFC4251"/>, as a replacement for the traditional signature algorithms (RSA, ECDSA).</t>
      <section anchor="background-on-ml-dsa">
        <name>Background on ML-DSA</name>
        <t>ML-DSA (as specified in FIPS 204) is a signature algorithm that is believed to be secure against attackers who have a CRQC available to them.
   There are three parameter sets defined for it which belong to a respective NIST Security Category of 2, 3, and 5 (ML-DSA-44, ML-DSA-65, and ML-DSA-87).
   In addition, for each defined parameter set, there are two versions, the 'pure' version (where ML-DSA computes the hash of the message internally and then signs that hash),
   and a 'prehashed' version (where ML-DSA signs a hash that was computed outside of ML-DSA).
   For this protocol, we will always use the pure version.</t>
        <t>In addition, ML-DSA also has a 'context' input, which is a short string that is common to the sender and the recceiver.
   It is intended to allow for domain separation between separate uses of the same public key.
   This protocol always uses an empty (zero length) context.</t>
        <t>FIPS 204 also allows ML-DSA to be run in either determanistic or 'hedged' mode (where randomness is applied during the signature generation operation).
   We recommend that implementations use hedged mode, as it blocks certain side channel attacks.
   However, as both are interoperable, we do not place any requirement on which is used within this protocol.</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>The descriptions of key and signature formats use the notation
   introduced in <xref target="RFC4251"/>, Section 3, and the string data type from
   <xref target="RFC4251"/>, Section 5.  Identifiers and terminology from ML-DSA
   <xref target="FIPS204"/> are used throughout the document.</t>
    </section>
    <section anchor="public-key-algorithms">
      <name>Public Key Algorithms</name>
      <t>This document describes three public key algorithms for use with SSH, as
   per <xref target="RFC4253"/>, Section 6.6, corresponding to the three parameter sets of ML-DSA.
   The names of the algorithms are "ssh-mldsa-44", "ssh-mldsa-65" and "ssh-mldsa-87", to match the level 2, 3 and 5 parameter sets <xref target="FIPS204"/>.
   These algorithm support only signing; it does not support encryption.</t>
      <t>The below table lists the public key sizes and the signature size (in bytes) for the three parameter sets.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Public Key Algorithm Name</th>
            <th align="left">Public Key Size</th>
            <th align="left">Signature Size</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">ssh-mldsa-44</td>
            <td align="left">1312</td>
            <td align="left">2420</td>
          </tr>
          <tr>
            <td align="left">ssh-mldsa-65</td>
            <td align="left">1952</td>
            <td align="left">3309</td>
          </tr>
          <tr>
            <td align="left">ssh-mldsa-87</td>
            <td align="left">2592</td>
            <td align="left">4627</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="public-key-format">
      <name>Public Key Format</name>
      <t>The key format for all three parameter sets have the following encoding:</t>
      <t>string "ssh-mldsa-44" (or "ssh-mldsa-65" or "ssh-mldsa-87")</t>
      <t>string key</t>
      <t>Here, 'key' is the public key described in <xref target="FIPS204"/>.</t>
    </section>
    <section anchor="signature-algorithm">
      <name>Signature Algorithm</name>
      <t>Signatures are generated according to the procedure in Section 5.2
   <xref target="FIPS204"/>, using the "pure" version of ML-DSA, with an empty context string.</t>
    </section>
    <section anchor="signature-format">
      <name>Signature Format</name>
      <t>The "ssh-mldsa" key format has the following encoding:</t>
      <t>string "ssh-mldsa-44" (or "ssh-mldsa-65" or "ssh-mldsa-87")</t>
      <t>string signature</t>
      <t>Here, 'signature' is the signature produced in accordance with the
   previous section.</t>
    </section>
    <section anchor="verification-algorithm">
      <name>Verification Algorithm</name>
      <t>Signatures are verified in two steps.
   For the first step, the length of the signature must be checked against the parameter set,
   if the signature length does not match the expected signature length for the parameter set, it must be rejected.
   Then the signature is verified according to the procedure in
   <xref target="FIPS204"/>, Section 5.3, using the "pure" version of ML-DSA, with an empty context string.</t>
    </section>
    <section anchor="sshfp-dns-resource-records">
      <name>SSHFP DNS Resource Records</name>
      <t>Usage and generation of the SSHFP DNS resource record is described in
   <xref target="RFC4255"/>.  This section illustrates the generation of SSHFP resource
   records for ML-DSA keys, and this document also specifies
   the corresponding code point to "SSHFP RR Types for public key
   algorithms" in the "DNS SSHFP Resource Record Parameters" IANA
   registry <xref target="IANA-SSHFP"/>.</t>
      <t>The generation of SSHFP resource records keys for ML-DSA is
   described as follows.</t>
      <t>The encoding of ML-DSA public keys is described as above in section 4.</t>
      <t>The SSHFP Resource Record for an ML-DSA key fingerprint
   (with a SHA-256 fingerprint) would, for example, be:</t>
      <t>pqserver.example.com. IN SSHFP TBD 2 (
                    a87f1b687ac0e57d2a081a2f28267237
                    34d90ed316d2b818ca9580ea384d9240 )</t>
      <t>Replace TBD with the value eventually allocated by IANA.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document augments the Public Key Algorithm Names in <xref target="RFC4250"/>, Section 4.11.3.</t>
      <t>IANA is requested to add the following entries to "Public Key Algorithm
   Names" in the "Secure Shell (SSH) Protocol Parameters" registry
   <xref target="IANA-SSH"/>:</t>
      <table>
        <thead>
          <tr>
            <th align="left">Public Key Algorithm Name</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">ssh-mldsa-44</td>
            <td align="left">THIS-RFC</td>
          </tr>
          <tr>
            <td align="left">ssh-mldsa-65</td>
            <td align="left">THIS-RFC</td>
          </tr>
          <tr>
            <td align="left">ssh-mldsa-87</td>
            <td align="left">THIS-RFC</td>
          </tr>
        </tbody>
      </table>
      <t>IANA is requested to add the following entries to "SSHFP RR Types for
   public key algorithms" in the "DNS SSHFP Resource Record Parameters"
   registry <xref target="IANA-SSHFP"/>:</t>
      <table>
        <thead>
          <tr>
            <th align="left">Value</th>
            <th align="left">Description</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">TBD1</td>
            <td align="left">ML-DSA-44</td>
            <td align="left">THIS RFC</td>
          </tr>
          <tr>
            <td align="left">TBD2</td>
            <td align="left">ML-DSA-65</td>
            <td align="left">THIS RFC</td>
          </tr>
          <tr>
            <td align="left">TBD3</td>
            <td align="left">ML-DSA-87</td>
            <td align="left">THIS RFC</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations in <xref target="RFC4251"/>, Section 9 apply to all SSH
   implementations, including those using ML-DSA.</t>
      <t>The security considerations in ML-DSA <xref target="FIPS204"/> apply to all
   uses of ML-DSA, including those in SSH.</t>
      <t>Cryptographic algorithms and parameters are usually broken or
   weakened over time.  Implementers and users need to continously re-evaluate that cryptographic algorithms continue to provide the
   expected level of security.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="FIPS204" target="https://doi.org/10.6028/NIST.FIPS.204">
          <front>
            <title>Module-Lattice-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date year="2024" month="August"/>
          </front>
          <seriesInfo name="NIST" value="FIPS 204"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC4250">
          <front>
            <title>The Secure Shell (SSH) Protocol Assigned Numbers</title>
            <author fullname="S. Lehtinen" initials="S." surname="Lehtinen"/>
            <author fullname="C. Lonvick" initials="C." role="editor" surname="Lonvick"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document defines the instructions to the IANA and the initial state of the IANA assigned numbers for the Secure Shell (SSH) protocol. It is intended only for the initialization of the IANA registries referenced in the set of SSH documents. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4250"/>
          <seriesInfo name="DOI" value="10.17487/RFC4250"/>
        </reference>
        <reference anchor="RFC4251">
          <front>
            <title>The Secure Shell (SSH) Protocol Architecture</title>
            <author fullname="T. Ylonen" initials="T." surname="Ylonen"/>
            <author fullname="C. Lonvick" initials="C." role="editor" surname="Lonvick"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>The Secure Shell (SSH) Protocol is a protocol for secure remote login and other secure network services over an insecure network. This document describes the architecture of the SSH protocol, as well as the notation and terminology used in SSH protocol documents. It also discusses the SSH algorithm naming system that allows local extensions. The SSH protocol consists of three major components: The Transport Layer Protocol provides server authentication, confidentiality, and integrity with perfect forward secrecy. The User Authentication Protocol authenticates the client to the server. The Connection Protocol multiplexes the encrypted tunnel into several logical channels. Details of these protocols are described in separate documents. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4251"/>
          <seriesInfo name="DOI" value="10.17487/RFC4251"/>
        </reference>
        <reference anchor="RFC4253">
          <front>
            <title>The Secure Shell (SSH) Transport Layer Protocol</title>
            <author fullname="T. Ylonen" initials="T." surname="Ylonen"/>
            <author fullname="C. Lonvick" initials="C." role="editor" surname="Lonvick"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>The Secure Shell (SSH) is a protocol for secure remote login and other secure network services over an insecure network.</t>
              <t>This document describes the SSH transport layer protocol, which typically runs on top of TCP/IP. The protocol can be used as a basis for a number of secure network services. It provides strong encryption, server authentication, and integrity protection. It may also provide compression.</t>
              <t>Key exchange method, public key algorithm, symmetric encryption algorithm, message authentication algorithm, and hash algorithm are all negotiated.</t>
              <t>This document also describes the Diffie-Hellman key exchange method and the minimal set of algorithms that are needed to implement the SSH transport layer protocol. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4253"/>
          <seriesInfo name="DOI" value="10.17487/RFC4253"/>
        </reference>
        <reference anchor="RFC4255">
          <front>
            <title>Using DNS to Securely Publish Secure Shell (SSH) Key Fingerprints</title>
            <author fullname="J. Schlyter" initials="J." surname="Schlyter"/>
            <author fullname="W. Griffin" initials="W." surname="Griffin"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document describes a method of verifying Secure Shell (SSH) host keys using Domain Name System Security (DNSSEC). The document defines a new DNS resource record that contains a standard SSH key fingerprint. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4255"/>
          <seriesInfo name="DOI" value="10.17487/RFC4255"/>
        </reference>
        <reference anchor="IANA-SSH" target="https://www.iana.org/assignments/ssh-parameters">
          <front>
            <title>Secure Shell (SSH) Protocol Parameters</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IANA-SSHFP" target="https://www.iana.org/assignments/dns-sshfp-rr-parameters)">
          <front>
            <title>DNS SSHFP Resource Record Parameters</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 222?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The text of draft-josefsson-ssh-sphincs was used as a template for this document.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
