<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version  -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>


<rfc ipr="noDerivativesTrust200902" docName="draft-josefsson-ssh-ed25519mldsa65-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="Ed25519MLDSA65 for SSH">Hybrid Ed25519 with ML-DSA-65 for Secure Shell (SSH)</title>

    <author fullname="Simon Josefsson">
      <organization></organization>
      <address>
        <email>simon@josefsson.org</email>
      </address>
    </author>

    <date year="2025" month="October" day="19"/>

    <area>IETF</area>
    <workgroup>Secure Shell Maintenance</workgroup>
    <keyword>Ed25519</keyword> <keyword>EdDSA</keyword> <keyword>ML-DSA</keyword> <keyword>post quantum</keyword> <keyword>pq</keyword> <keyword>signature</keyword> <keyword>ssh</keyword> <keyword>secsh</keyword>

    <abstract>


<t>This document describes the use of Ed25519 with ML-DSA-65 as a hybrid
digital signature in the Secure Shell (SSH) protocol.</t>



    </abstract>

    <note title="About This Document" removeInRFC="true">
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-josefsson-ssh-ed25519mldsa65/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        SSHM Working Group mailing list (<eref target="mailto:ssh@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/ssh/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://gitlab.com/jas/ietf-ssh-ed25519mldsa65"/>.</t>
    </note>


  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>

<t>Secure Shell (SSH) <xref target="RFC4251"></xref> is a secure remote-login protocol. It
provides for an extensible variety of public key algorithms for
identifying servers and users to one another.</t>

<t>Ed25519 <xref target="RFC8032"></xref> is a digital signature system.</t>

<t>CRYSTALS-Kyber is a post-quantum digital signature system,
standardized in <xref target="NIST.FIPS.204"></xref> as Module-Lattice-Based Digital
Signature Standard (ML-DSA).</t>

<t>This document specify how Ed25519 and ML-DSA-65 may be used in SSH,
using the hybrid signature scheme suggested in <xref target="DJB-HYBRID-SIGNATURE"></xref>.</t>

</section>
<section anchor="conventions-used-in-this-document"><name>Conventions Used In This Document</name>

<t>The descriptions of key and signature formats use the notation
introduced in <xref target="RFC4251"></xref>, Section 3, and the string data type from
<xref target="RFC4251"></xref>, Section 5.  Identifiers and terminology from <xref target="RFC8032"></xref> and
<xref target="NIST.FIPS.204"></xref> are used throughout the document.</t>

</section>
<section anchor="requirements-language"><name>Requirements Language</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

</section>
<section anchor="public-key-algorithm"><name>Public Key Algorithm</name>

<t>This document describes a public key algorithm for use with SSH, as
per <xref target="RFC4253"></xref>, Section 6.6.  The name of the algorithm is
"ssh-ed25519-ml-dsa-65".  This algorithm only supports signing and not
encryption.</t>

<t>Standard implementations of SSH <bcp14>SHOULD</bcp14> implement this signature
algorithm.</t>

</section>
<section anchor="public-key-format"><name>Public Key Format</name>

<t>The "ssh-ed25519-ml-dsa-65" key format has the following encoding:</t>

<figure><artwork><![CDATA[
string "ssh-ed25519-ml-dsa-65"

string key
]]></artwork></figure>

<t>The content of 'key' is the concatenation of the Ed25519 32-octet
public key described in <xref target="RFC8032"></xref>, Section 5.1.5, with the 1952-octet
public key described in <xref target="NIST.FIPS.204"></xref>, for the ML-DSA-65 algorithm.
The resulting key length is therefor 1984.</t>

</section>
<section anchor="signature-algorithm"><name>Signature Algorithm</name>

<t>Signatures are generated according to the following procedure, based
on <xref target="DJB-HYBRID-SIGNATURE"></xref>.</t>

<figure><artwork><![CDATA[
The signed message is (s2,s1,r,h,m) where

   m = the message being signed,
   r = H(fresh randomness chosen during signing),
   h = H(r,H(hybridpk),hybridsigname,appname,appcontext,m),
   s1 = Ed25519 signature of (r,h),
   s2 = ML-DSA-65 signature of (s1,r,h),
   H = SHA3-256.
]]></artwork></figure>

<t>The 'hybridpk' value is the public key from the previous section.
Here the fresh randomness <bcp14>MUST</bcp14> be 16 bytes, and only to be used for
the signature.  The 'hybridsigname' field is "Ed25519MLDSA65", and
'appname' is 'SSH' with 'appcontext' being 'SSH-Ed25519MLDSA65".
Strings are encoded using ASCII <xref target="RFC0020"></xref>.</t>

<t>The signed message (s2,s1,r,h,m) is the concatenation of each value.
The ML-DSA-65 signature 's2' is 3309 octets, the Ed25519 signature
's1' is 64 octets, 'r' is 16 octets, 'h' is 32 octets, therefor the
signature size is 3421 octets plus the message itself.</t>

<t>This protocol always uses the 'pure' version of ML-DSA (where ML-DSA
signs the message), and not the 'prehashed' variant (where ML-DSA
signs a previously hashed message).  The ML-DSA 'context' input <bcp14>MUST</bcp14>
be the string "ML-DSA-65-Ed25519-SSH" encoded in ASCII <xref target="RFC0020"></xref>.
ML-DSA may be used in deterministic or hedged mode.</t>

</section>
<section anchor="signature-format"><name>Signature Format</name>

<t>The "ssh-ed25519-ml-dsa-65" key format has the following encoding:</t>

<figure><artwork><![CDATA[
string "ssh-ed25519-ml-dsa-65"

string signature
]]></artwork></figure>

<t>The 'signature' value is the signed message produced in accordance
with the previous section.</t>

</section>
<section anchor="verification-algorithm"><name>Verification Algorithm</name>

<t>Verification is done by invoking the verify functions for Ed25519 and
ML-DSA-65 using the received values as follows, and taking the logical
AND of their verification outputs.</t>

<figure><artwork><![CDATA[
   Signed message is (s2,s1,r,h,m)
   v1 = Ed25519 verification of s1 on message (r,h),
   v2 = ML-DSA-65 verification of s2 on message (s1,r,h),
   verify = v1 && v2
]]></artwork></figure>

</section>
<section anchor="sshfp-dns-resource-records"><name>SSHFP DNS Resource Records</name>

<t>Usage and generation of the SSHFP DNS resource record is described in
<xref target="RFC4255"></xref>. This section illustrates the generation of SSHFP resource
records for Ed25519MLDSA65 keys, and this document also specifies the
corresponding code point to "SSHFP RR Types for public key algorithms"
in the "DNS SSHFP Resource Record Parameters" IANA registry
<xref target="IANA-SSHFP"></xref>.</t>

<t>The encoding of Ed25519MLDSA65 public keys is described in earlier
sections.</t>

<t>The SSHFP Resource Record for the Ed25519MLDSA65 public key with
SHA-256 fingerprint <xref target="NIST.FIPS.180"></xref> would, for example, be:</t>

<figure><artwork><![CDATA[
ssh.example.com IN SSHFP TBD1 2 ( a87f1b687ac0e57d2a081a2f2826723
                                  34d90ed316d2b818ca9580ea384d924
                                  01 )
]]></artwork></figure>

<t>Replace TBD1 with the value eventually allocated by IANA.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document augments the Public Key Algorithm Names in <xref target="RFC4250"></xref>,
Section 4.11.3.</t>

<t>IANA is requested to add the following entry to "Public Key Algorithm
Names" in the "Secure Shell (SSH) Protocol Parameters" registry
<xref target="IANA-SSH"></xref>:</t>

<texttable title="SSH Public Key Code Points" anchor="iana-ssh-table">
      <ttcol align='left'>Public Key Algorithm Name</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>ssh-ed25519-ml-dsa-65</c>
      <c>THIS-RFC</c>
</texttable>

<t>IANA is requested to add the following entry to "SSHFP RR Types for
public key algorithms" in the "DNS SSHFP Resource Record Parameters"
registry <xref target="IANA-SSHFP"></xref>:</t>

<texttable title="SSH DNS SSHFP RR Public Key Algorithm Types" anchor="iana-sshfp-table">
      <ttcol align='right'>Value</ttcol>
      <ttcol align='left'>Description</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>TBD1</c>
      <c>SSH-ED25519-ML-DSA-65</c>
      <c>THIS-RFC</c>
</texttable>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>The security considerations in <xref target="RFC4251"></xref>, Section 9 apply to all SSH
implementations, including those using Ed25519MLDSA65.</t>

<t>The security considerations in <xref target="RFC8032"></xref> and <xref target="NIST.FIPS.204"></xref> apply to
all uses of Ed25519 and ML-DSA-65, respectively, including those in
SSH.</t>

<t>Verification of the hybrid signature may leak timing information that
can be used to infer which of the Ed25519 or ML-DSA-65 verifications
failed, if an implementation avoid to invoke one verification when the
other one fails.</t>

<t>Ed25519MLDSA65 signatures are intended to be secure if SHA3-256 is
secure and at least one of Ed25519 or ML-DSA-65 is secure.</t>

<t>Cryptographic algorithms and parameters are usually broken or weakened
over time.  Implementers and users need to continously re-evaluate
that cryptographic algorithms continue to provide the expected level
of security.</t>

</section>
<section anchor="acknowledgments"><name>Acknowledgments</name>

<t>The text of <xref target="RFC8709"></xref> was used as a template for this document.</t>

</section>
<section anchor="test-vectors"><name>Test vectors</name>

<t>The following illustrate test vectors using file formats used by, for
example, OpenSSH.</t>

<section anchor="private-key"><name>Private Key</name>

<t>Private key:</t>

<figure><artwork><![CDATA[
-----BEGIN OPENSSH PRIVATE KEY-----
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAYwAAABtzc2gtc2xoLWRz
YS1zaGEyLTI1NmYAAABAPS6Ma/U7TKh4/I8HoTobiV+1sQnpkHZL7oztSTxgWoJYTDYEYdQpwty9
IJfwQDvK778DQCr9dx1gWb1HYDwYMAAAAQAS6f2dEun9nQAAABtzc2gtc2xoLWRzYS1zaGEyLTI1
NmYAAABAPS6Ma/U7TKh4/I8HoTobiV+1sQnpkHZL7oztSTxgWoJYTDYEYdQpwty9IJfwQDvK778D
QCr9dx1gWb1HYDwYMAAAAIBlB//OALih6/bAIOUGOGuaSKuK86IySusLX5xiqsPmJmE32DHKfIgg
mmvckaPbwnliYgL0mV/aAetfELu7XoqHPS6Ma/U7TKh4/I8HoTobiV+1sQnpkHZL7oztSTxgWoJY
TDYEYdQpwty9IJfwQDvK778DQCr9dx1gWb1HYDwYMAAAAAhqYXNAa2FrYQECAwQF
-----END OPENSSH PRIVATE KEY-----
]]></artwork></figure>

</section>
<section anchor="public-key"><name>Public-Key</name>

<t>Public key:</t>

<figure><artwork><![CDATA[
ssh-ed25519-ml-dsa-65 AAAAG3NzaC1zcGhpbmNzcGx1c0BvcGVuc3NoLmNvbQAAAEA9Loxr9TtMqHj8jwehOhuJX7WxCemQdkvujO1JPGBaglhMNgRh1CnC3L0gl/BAO8rvvwNAKv13HWBZvUdgPBgw jas@kaka
]]></artwork></figure>

</section>
<section anchor="message"><name>Message</name>

<t>The namespace context string used is "my-namespace", and the message
is (including final newline):</t>

<figure><artwork><![CDATA[
Hello world!
]]></artwork></figure>

</section>
<section anchor="signature"><name>Signature</name>

<t>Signature:</t>

<figure><artwork><![CDATA[
-----BEGIN SSH SIGNATURE-----
U1NIU0lHAAAAAQAAAGMAAAAbc3NoLXNwaGluY3NwbHVzQG9wZW5zc2guY29tAAAAQD0ujG
v1O0yoePyPB6E6G4lftbEJ6ZB2S+6M7Uk8YFqCWEw2BGHUKcLcvSCX8EA7yu+/A0Aq/Xcd
YFm9R2A8GDAAAAAMbXktbmFtZXNwYWNlAAAAAAAAAAZzaGE1MTIAAHSDAAAAG3NzaC1zcG
hpbmNzcGx1c0BvcGVuc3NoLmNvbQAAdGCZtK1w9NaIGAV9HcHArlgyCGRb/a+f8/EDt1bL
BHVvMQiGVR4guZ1g20dasKIxJznf8YqoYQeSXEktX7ukD+Go+icRJoTQj7n0RaKjaWz/aM
P1iKeNN1hhfyOMP9nCzUKSBOlcBe1IDnHTMZDuX7wUVTu4WTcd4WrTb5Qos+fxY2cBUM9p
QeUPm2WpwkqVjpd8e4bG5ku2q4Q3jCHsambOH5VqZI+khzQ5w3M+b1wMXfWVwEd8O7t++U
-----END SSH SIGNATURE-----
]]></artwork></figure>

</section>
</section>


  </middle>

  <back>

    <references title='Normative References'>



<reference anchor='RFC0020' target='https://www.rfc-editor.org/info/rfc20'>
  <front>
    <title>ASCII format for network interchange</title>
    <author fullname='V.G. Cerf' initials='V.G.' surname='Cerf'/>
    <date month='October' year='1969'/>
  </front>
  <seriesInfo name='STD' value='80'/>
  <seriesInfo name='RFC' value='20'/>
  <seriesInfo name='DOI' value='10.17487/RFC0020'/>
</reference>

<reference anchor='RFC4250' target='https://www.rfc-editor.org/info/rfc4250'>
  <front>
    <title>The Secure Shell (SSH) Protocol Assigned Numbers</title>
    <author fullname='S. Lehtinen' initials='S.' surname='Lehtinen'/>
    <author fullname='C. Lonvick' initials='C.' role='editor' surname='Lonvick'/>
    <date month='January' year='2006'/>
    <abstract>
      <t>This document defines the instructions to the IANA and the initial state of the IANA assigned numbers for the Secure Shell (SSH) protocol. It is intended only for the initialization of the IANA registries referenced in the set of SSH documents. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='4250'/>
  <seriesInfo name='DOI' value='10.17487/RFC4250'/>
</reference>

<reference anchor='RFC4251' target='https://www.rfc-editor.org/info/rfc4251'>
  <front>
    <title>The Secure Shell (SSH) Protocol Architecture</title>
    <author fullname='T. Ylonen' initials='T.' surname='Ylonen'/>
    <author fullname='C. Lonvick' initials='C.' role='editor' surname='Lonvick'/>
    <date month='January' year='2006'/>
    <abstract>
      <t>The Secure Shell (SSH) Protocol is a protocol for secure remote login and other secure network services over an insecure network. This document describes the architecture of the SSH protocol, as well as the notation and terminology used in SSH protocol documents. It also discusses the SSH algorithm naming system that allows local extensions. The SSH protocol consists of three major components: The Transport Layer Protocol provides server authentication, confidentiality, and integrity with perfect forward secrecy. The User Authentication Protocol authenticates the client to the server. The Connection Protocol multiplexes the encrypted tunnel into several logical channels. Details of these protocols are described in separate documents. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='4251'/>
  <seriesInfo name='DOI' value='10.17487/RFC4251'/>
</reference>

<reference anchor='RFC4253' target='https://www.rfc-editor.org/info/rfc4253'>
  <front>
    <title>The Secure Shell (SSH) Transport Layer Protocol</title>
    <author fullname='T. Ylonen' initials='T.' surname='Ylonen'/>
    <author fullname='C. Lonvick' initials='C.' role='editor' surname='Lonvick'/>
    <date month='January' year='2006'/>
    <abstract>
      <t>The Secure Shell (SSH) is a protocol for secure remote login and other secure network services over an insecure network.</t>
      <t>This document describes the SSH transport layer protocol, which typically runs on top of TCP/IP. The protocol can be used as a basis for a number of secure network services. It provides strong encryption, server authentication, and integrity protection. It may also provide compression.</t>
      <t>Key exchange method, public key algorithm, symmetric encryption algorithm, message authentication algorithm, and hash algorithm are all negotiated.</t>
      <t>This document also describes the Diffie-Hellman key exchange method and the minimal set of algorithms that are needed to implement the SSH transport layer protocol. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='4253'/>
  <seriesInfo name='DOI' value='10.17487/RFC4253'/>
</reference>

<reference anchor='RFC4255' target='https://www.rfc-editor.org/info/rfc4255'>
  <front>
    <title>Using DNS to Securely Publish Secure Shell (SSH) Key Fingerprints</title>
    <author fullname='J. Schlyter' initials='J.' surname='Schlyter'/>
    <author fullname='W. Griffin' initials='W.' surname='Griffin'/>
    <date month='January' year='2006'/>
    <abstract>
      <t>This document describes a method of verifying Secure Shell (SSH) host keys using Domain Name System Security (DNSSEC). The document defines a new DNS resource record that contains a standard SSH key fingerprint. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='4255'/>
  <seriesInfo name='DOI' value='10.17487/RFC4255'/>
</reference>

<reference anchor='RFC8032' target='https://www.rfc-editor.org/info/rfc8032'>
  <front>
    <title>Edwards-Curve Digital Signature Algorithm (EdDSA)</title>
    <author fullname='S. Josefsson' initials='S.' surname='Josefsson'/>
    <author fullname='I. Liusvaara' initials='I.' surname='Liusvaara'/>
    <date month='January' year='2017'/>
    <abstract>
      <t>This document describes elliptic curve signature scheme Edwards-curve Digital Signature Algorithm (EdDSA). The algorithm is instantiated with recommended parameters for the edwards25519 and edwards448 curves. An example implementation and test vectors are provided.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8032'/>
  <seriesInfo name='DOI' value='10.17487/RFC8032'/>
</reference>

<reference anchor='NIST.FIPS.180' target='https://nvlpubs.nist.gov/nistpubs/Legacy/FIPS/NIST.FIPS.180.pdf'>
  <front>
    <title>Secure hash standard</title>
    <author>
      <organization abbrev='NIST'>National Institute of Standards and Technology</organization>
      <address>
        <postal>
          <country>US</country>
          <city>Gaithersburg</city>
        </postal>
      </address>
    </author>
    <date month='May' year='1993'/>
  </front>
  <seriesInfo name='NIST Federal Information Processing Standards Publications' value='180'/>
  <seriesInfo name='DOI' value='10.6028/NIST.FIPS.180'/>
</reference>

<reference anchor='NIST.FIPS.204'> <front> <title>*** BROKEN REFERENCE ***</title> <author> <organization/> </author> <date/> </front> </reference>
<reference anchor='RFC2119' target='https://www.rfc-editor.org/info/rfc2119'>
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname='S. Bradner' initials='S.' surname='Bradner'/>
    <date month='March' year='1997'/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name='BCP' value='14'/>
  <seriesInfo name='RFC' value='2119'/>
  <seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>

<reference anchor='RFC8174' target='https://www.rfc-editor.org/info/rfc8174'>
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname='B. Leiba' initials='B.' surname='Leiba'/>
    <date month='May' year='2017'/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name='BCP' value='14'/>
  <seriesInfo name='RFC' value='8174'/>
  <seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>




    </references>

    <references title='Informative References'>

<reference anchor="IANA-SSH" target="https://www.iana.org/assignments/ssh-parameters/">
  <front>
    <title>Secure Shell (SSH) Protocol Parameters</title>
    <author >
      <organization>IANA</organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="IANA-SSHFP" target="https://www.iana.org/assignments/dns-sshfp-rr-parameters/">
  <front>
    <title>DNS SSHFP Resource Record Parameters</title>
    <author >
      <organization>IANA</organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>


<reference anchor='RFC8709' target='https://www.rfc-editor.org/info/rfc8709'>
  <front>
    <title>Ed25519 and Ed448 Public Key Algorithms for the Secure Shell (SSH) Protocol</title>
    <author fullname='B. Harris' initials='B.' surname='Harris'/>
    <author fullname='L. Velvindron' initials='L.' surname='Velvindron'/>
    <date month='February' year='2020'/>
    <abstract>
      <t>This document describes the use of the Ed25519 and Ed448 digital signature algorithms in the Secure Shell (SSH) protocol. Accordingly, this RFC updates RFC 4253.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8709'/>
  <seriesInfo name='DOI' value='10.17487/RFC8709'/>
</reference>


<reference anchor="DJB-HYBRID-SIGNATURE" target="https://mailarchive.ietf.org/arch/msg/cfrg/LdvasJBpseekZtQkQF1nuPPDH_s/">
  <front>
    <title>How to construct a hybrid signature combiner?</title>
    <author fullname="D.J. Bernstein">
      <organization></organization>
    </author>
    <date year="2024" month="March"/>
  </front>
</reference>


    </references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

