
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Sun, 03 May 2026 14:53:42 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Post-quantum encryption for Cloudflare IPsec is generally available]]></title>
            <link>https://blog.cloudflare.com/post-quantum-ipsec/</link>
            <pubDate>Thu, 30 Apr 2026 14:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare IPsec now has generally available support for post-quantum encryption via hybrid ML-KEM. We’ve confirmed interoperability with Cisco and Fortinet. ]]></description>
            <content:encoded><![CDATA[ <p>While more than <a href="https://radar.cloudflare.com/post-quantum"><u>two-thirds</u></a> of human-generated TLS traffic to Cloudflare is already protected by post-quantum cryptography, the world of site-to-site networking has been a different story. For years, the IPsec community remained caught between the high bar of Internet-scale interoperability and the niche requirements of specialized hardware. That gap is now closing. </p><p>Earlier this month, we announced that Cloudflare has moved its target for full post-quantum security <a href="https://blog.cloudflare.com/post-quantum-roadmap/"><u>forward to 2029</u></a>, spurred by several recent advances in quantum computing. To advance that goal, we’ve made post-quantum encryption in Cloudflare IPsec generally available.</p><p>Using the new IETF draft for hybrid ML-KEM (<a href="https://csrc.nist.gov/pubs/fips/203/final"><u>FIPS 203</u></a>), we’ve successfully tested interoperability with branch connectors from <a href="https://docs.fortinet.com/document/fortigate/7.6.6/fortios-release-notes/760203/introduction-and-supported-models"><u>Fortinet</u></a> and <a href="https://www.cisco.com/site/us/en/products/networking/sdwan-routers/8000-series/index.html"><u>Cisco</u></a> — meaning you can start protecting your wide-area network (WAN) against harvest-now-decrypt-later attacks today using hardware you already have.</p><p>This post explains how we implemented the new hybrid IPsec handshake, why it took four years longer to land than its TLS counterpart, and how the industry is finally consolidating around a standard that works at Internet scale.</p>
    <div>
      <h3>Cloudflare IPsec</h3>
      <a href="#cloudflare-ipsec">
        
      </a>
    </div>
    <p><a href="https://developers.cloudflare.com/magic-wan/reference/gre-ipsec-tunnels/"><u>Cloudflare IPsec</u></a> is a <a href="https://www.cloudflare.com/learning/network-layer/network-as-a-service-naas/"><u>WAN Network-as-a-Service</u></a> that replaces legacy network architectures by connecting data centers, branch offices, and cloud VPCs to Cloudflare's global <a href="https://www.cloudflare.com/learning/cdn/glossary/anycast-network"><u>IP Anycast</u></a> network. Customers get simplified configuration, high availability (if a data center becomes unavailable, traffic is automatically rerouted to the nearest healthy one), and the scale of Cloudflare's global network. This is done through encrypted IPsec tunnels that support both site-to-site WAN, outbound Internet connections, and connectivity to the <a href="https://www.cloudflare.com/sase/"><u>Cloudflare One SASE platform</u></a>. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1y7QgyWMG5xGTtYGcwyqTX/48b625d0178c746dbdfba70ee1d2e259/image1.png" />
          </figure>
    <div>
      <h3>Post-quantum encryption in IPsec</h3>
      <a href="#post-quantum-encryption-in-ipsec">
        
      </a>
    </div>
    <p>Cloudflare IPsec now uses post-quantum encryption with hybrid ML-KEM (<a href="https://csrc.nist.gov/pubs/fips/203/final"><u>FIPS 203</u></a>) to stop harvest-now-decrypt-later attacks. These are attacks where an adversary harvests data today and then decrypts later, after Q-Day, when there are powerful quantum computers that can break the classical public key cryptography used across the Internet.  Harvest-now-decrypt-later attacks are becoming a concern for more organizations as <a href="https://blog.cloudflare.com/post-quantum-roadmap/"><u>Q-Day approaches faster than expected</u></a>.</p><p>ML-KEM (Module-Lattice-Based Key-Encapsulation Mechanism) is a post-quantum cryptography algorithm that is based on mathematical assumptions that are not known to be vulnerable to attacks by quantum computers. It does not require special hardware or a dedicated physical link between sender and receiver. ML-KEM is intentionally designed to be implemented in software across standard processors to provide post-quantum encryption of network traffic. </p><p><a href="https://datatracker.ietf.org/doc/draft-ietf-ipsecme-ikev2-mlkem/"><u>Draft-ietf-ipsecme-ikev2-mlkem</u></a> specifies post-quantum encryption for IPsec using <i>hybrid </i>ML-KEM, which combines the well-understood security of classical Diffie-Hellman and the post-quantum security of ML-KEM in a single, standards-compliant handshake. Specifically, a classical Diffie-Hellman exchange runs first, its derived key encrypts a second exchange that runs ML-KEM, and the outputs of both are mixed into the session keys that secure IPsec data plane traffic sent using the Encapsulating Security Payload (ESP) protocol. </p>
    <div>
      <h3>Our interoperable implementation </h3>
      <a href="#our-interoperable-implementation">
        
      </a>
    </div>
    <p>Earlier we announced <a href="https://blog.cloudflare.com/post-quantum-sase/"><u>the closed beta</u></a> of our implementation of draft-ietf-ipsecme-ikev2-mlkem in production in our Cloudflare IPsec product and tested it against a reference implementation (strongswan). Now that we have made this implementation generally available, we have also confirmed interoperability with several other vendors, including Cisco and Fortinet, which is a big win for this new standard.</p><p><b>Cisco: </b>Customers using <a href="https://www.cisco.com/c/en/us/td/docs/routers/secure-routers/cisco-8000-series-secure-routers-release-26-1-x.html"><u>Cisco 8000 Series Secure Routers after version 26.1.1</u></a> as their branch connector can also now establish post-quantum Cloudflare IPsec tunnels per draft-ietf-ipsecme-ikev2-mlkem.</p><p><b>Fortinet: </b>Customers using <a href="https://docs.fortinet.com/document/fortigate/7.6.6/fortios-release-notes/760203/introduction-and-supported-models"><u>Fortinet FortiOS 7.6.6 and later</u></a> as their branch connector can now establish post-quantum Cloudflare IPsec tunnels to Cloudflare's global network per draft-ietf-ipsecme-ikev2-mlkem.</p>
    <div>
      <h3>The importance of being interoperable</h3>
      <a href="#the-importance-of-being-interoperable">
        
      </a>
    </div>
    <p>Given that upgrading cryptography is hard and can take years, our 2029 target date for a full update to post-quantum cryptography is going to require concentrated effort. That’s why we hope the IPsec community continues to focus on the development of interoperable standards like draft-ietf-ipsecme-ikev2-mlkem.</p><p>Let us explain why these standards are vitally important. A full specification for hybrid ML-KEM in IPsec, draft-ietf-ipsecme-ikev2-mlkem, became available only in late 2025. That's roughly four years after support for hybrid ML-KEM landed in TLS. (In fact, Cloudflare <a href="https://blog.cloudflare.com/post-quantum-for-all/"><u>turned on</u></a> hybrid post-quantum key agreement with TLS in 2022, even before NIST finalized the standardization of ML-KEM, because the TLS community quickly converged on a single, interoperable approach and pushed it into production. Today more than <a href="https://radar.cloudflare.com/adoption-and-usage#post-quantum-encryption"><u>two-thirds</u></a> of the human-generated TLS traffic to Cloudflare's network is protected with hybrid ML-KEM.)</p><p>The four-year delay is likely due in part to the IPsec community's continued interest in Quantum Key Distribution (QKD), as codified in <a href="https://datatracker.ietf.org/doc/html/rfc8784"><u>RFC 8784</u></a>, published in 2020. We've <a href="https://blog.cloudflare.com/you-dont-need-quantum-hardware"><u>written before</u></a> about why QKD is not part of our post-quantum strategy: QKD requires specialized hardware and a dedicated physical link between the two parties, which fundamentally means it will not operate at Internet scale. Also, QKD does not provide authentication, so you still need post-quantum cryptography anyway to stop active attackers. It’s difficult to find implementations of QKD that interoperate across vendors.   </p><p>The U.S. <a href="https://www.nsa.gov/Cybersecurity/Quantum-Key-Distribution-QKD-and-Quantum-Cryptography-QC/"><u>NSA</u></a>, Germany's <a href="https://www.bsi.bund.de/EN/Themen/Unternehmen-und-Organisationen/Informationen-und-Empfehlungen/Quantentechnologien-und-Post-Quanten-Kryptografie/quantentechnologien-und-post-quanten-kryptografie_node.html"><u>BSI</u></a>, and the UK's <a href="https://www.ncsc.gov.uk/whitepaper/quantum-security-technologies"><u>NCSC</u></a> have all warned against solely relying on QKD. Post-quantum cryptography, by contrast, runs on the hardware you already have, authenticates the parties at both ends, and works end-to-end across the Internet. </p><p>RFC 9370, published in 2023, opened the door to post-quantum cryptography in IPsec, allowing up to seven key exchanges to be run in parallel with classical Diffie-Hellman. However, RFC 9370 did not specify which ciphersuites should be used in these parallel key exchanges. In the absence of that specification, some vendors shipped early implementations under RFC 9370 before the hybrid ML-KEM draft was available, defining their own ciphersuites including some which are not NIST-standardized. This is exactly the kind of “ciphersuite bloat” <a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-52r2.pdf"><u>NIST SP 800 52r2</u></a> warned against. And the risks to interoperability have played out in practice: Cloudflare IPsec does not yet interoperate with Palo Alto Networks' RFC 9370–based implementation, because it was launched before draft-ietf-ipsecme-ikev2-mlkem was available. </p><p>Fortunately, we now have draft-ietf-ipsecme-ikev2-mlkem that fills in the gaps in RFC 9370, specifying hybrid ML-KEM as one of the key exchange mechanisms that can be operated in parallel with classical Diffie-Hellman. We hope to add Palo Alto Networks to the list of interoperable post-quantum branch connectors as the industry continues to consolidate around draft-ietf-ipsecme-ikev2-mlkem.</p><p>But the journey towards interoperable post-quantum IPsec standards is not over yet. While draft-ietf-ipsecme-ikev2-mlkem supports post-quantum <i>encryption</i>, we still need IPsec standards for post-quantum <i>authentication, </i>so that we can stop attacks by quantum adversaries on live systems after Q-Day. Given the shortened timeline for full post-quantum readiness, we hope the IPsec community will continue to focus on interoperable PQC implementations, rather than diverting focus to niche use cases with QKD.</p>
    <div>
      <h3>Towards an interoperable post-quantum Internet</h3>
      <a href="#towards-an-interoperable-post-quantum-internet">
        
      </a>
    </div>
    <p>At Cloudflare, we’re helping make a secure and post-quantum Internet accessible to everyone, without <a href="https://blog.cloudflare.com/you-dont-need-quantum-hardware/"><u>specialized hardware</u></a> and at <a href="https://blog.cloudflare.com/post-quantum-crypto-should-be-free/"><u>no extra cost to our customers</u></a>. Post-quantum Cloudflare IPsec is one more step on our path to <a href="https://blog.cloudflare.com/post-quantum-roadmap/"><u>full post-quantum security by 2029</u></a>, and we’re doing it in a way that ensures that the Internet remains open and interoperable for years to come. </p> ]]></content:encoded>
            <category><![CDATA[Post-Quantum]]></category>
            <category><![CDATA[IPsec]]></category>
            <category><![CDATA[Cryptography]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Magic WAN]]></category>
            <category><![CDATA[Networking]]></category>
            <guid isPermaLink="false">45CJNnEddFGu89vwZzAJEl</guid>
            <dc:creator>Sharon Goldberg</dc:creator>
            <dc:creator>Amos Paul</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare One is the first SASE offering modern post-quantum encryption across the full platform]]></title>
            <link>https://blog.cloudflare.com/post-quantum-sase/</link>
            <pubDate>Mon, 23 Feb 2026 06:00:00 GMT</pubDate>
            <description><![CDATA[ We’ve upgraded Cloudflare One to support post-quantum encryption by implementing the latest IETF drafts for hybrid ML-KEM into our Cloudflare IPsec product. This extends post-quantum encryption across all major Cloudflare One on-ramps and off-ramps. ]]></description>
            <content:encoded><![CDATA[ <p>During Security Week 2025, we launched the industry’s first cloud-native<a href="https://www.cloudflare.com/press/press-releases/2025/cloudflare-advances-industrys-first-cloud-native-quantum-safe-zero-trust/"> <u>post-quantum Secure Web Gateway (SWG) and Zero Trust solution</u></a>, a major step towards securing enterprise network traffic sent from end user devices to public and private networks.</p><p>But this is only part of the equation. To truly secure the future of enterprise networking, you need a complete <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/"><u>Secure Access Service Edge (SASE)</u></a>. </p><p>Today, we complete the equation: Cloudflare One is the first SASE platform to support modern standards-compliant post-quantum (PQ) encryption in our Secure Web Gateway, and across Zero Trust and Wide Area Network (WAN) use cases.  More specifically, Cloudflare One now offers post-quantum hybrid ML-KEM (Module-Lattice-based Key-Encapsulation Mechanism) across all major on-ramps and off-ramps.</p><p>To complete the equation, we added support for post-quantum encryption to our <a href="https://developers.cloudflare.com/magic-wan/reference/gre-ipsec-tunnels/"><u>Cloudflare IPsec</u></a> (our cloud-native WAN-as-a-Service) and <a href="https://developers.cloudflare.com/magic-wan/configuration/connector/"><u>Cloudflare One Appliance</u></a> (our physical or virtual WAN appliance that establish Cloudflare IPsec connections). Cloudflare IPsec uses the <a href="https://www.cloudflare.com/learning/network-layer/what-is-ipsec/"><u>IPsec</u></a> protocol to establish encrypted tunnels from a customer’s network to Cloudflare’s global network, while IP <a href="https://www.cloudflare.com/learning/cdn/glossary/anycast-network/"><u>Anycast</u></a> is used to automatically route that tunnel to the nearest Cloudflare data center. Cloudflare IPsec simplifies configuration and provides high availability; if a specific data center becomes unavailable, traffic is automatically rerouted to the closest healthy data center. Cloudflare IPsec runs at the scale of our global network, and supports site-to-site across a WAN as well as outbound connections to the Internet.</p><p>The <a href="https://developers.cloudflare.com/magic-wan/configuration/connector/"><u>Cloudflare One Appliance</u></a> upgrade is generally available as of appliance version 2026.2.0. The <a href="https://developers.cloudflare.com/magic-wan/reference/gre-ipsec-tunnels/"><u>Cloudflare IPsec</u></a> upgrade is in closed beta, and you can request access by adding your name to our <a href="https://www.cloudflare.com/security-week/pq-ipsec-beta/"><u>closed beta list</u></a>.</p>
    <div>
      <h2>Post-quantum cryptography matters now</h2>
      <a href="#post-quantum-cryptography-matters-now">
        
      </a>
    </div>
    <p>Quantum threats are not a "next decade" problem. Here is why our customers are prioritizing <a href="https://www.cloudflare.com/learning/ssl/quantum/what-is-post-quantum-cryptography/"><u>post-quantum cryptography (PQC)</u></a> today:</p><p><b>The deadline is approaching. </b>At the end of 2024, the National Institute of Standards and Technology (NIST) sent a <a href="https://nvlpubs.nist.gov/nistpubs/ir/2024/NIST.IR.8547.ipd.pdf"><u>clear signal</u></a> (that has been <a href="https://www.bsi.bund.de/EN/Service-Navi/Presse/Pressemitteilungen/Presse2024/241127_Post-Quantum_Cryptography.html"><u>echoed</u></a> by other <a href="https://www.ncsc.gov.uk/guidance/pqc-migration-timelines"><u>agencies</u></a>): the era of classical public-key cryptography is coming to an end. NIST set a 2030 deadline for depreciating RSA and Elliptic Curve Cryptography (ECC) and <a href="https://www.cloudflare.com/pqc/"><u>transitioning to PQC</u></a> that cannot be broken by powerful quantum computers. Organizations that haven't begun their migration risk being out of compliance and vulnerable as the deadline nears.</p><p><b>Upgrades have historically been tricky. </b>While 2030 might seem far away, upgrading cryptographic algorithms is notoriously difficult. History has shown us that depreciating cryptography can take decades: we found examples of <a href="https://blog.cloudflare.com/radius-udp-vulnerable-md5-attack/"><u>MD5 causing problems 20 years after it was deprecated</u></a>. This lack of crypto agility — the ability to easily swap out cryptographic algorithms — is a major bottleneck. By integrating PQ encryption directly into <a href="https://www.cloudflare.com/zero-trust/"><u>Cloudflare One</u></a>, our SASE platform, we provide built-in crypto agility, simplifying how organizations offer remote access and site-to-site connectivity.</p><p><b>Data may already be at risk.</b> Finally, "Harvest Now, Decrypt Later" is a present and persistent threat, where attackers harvest sensitive network traffic today and then store it until quantum computers become powerful enough to decrypt it. If your data has a shelf life of more than a few years (e.g. financial information, health data, state secrets) it is already at risk unless it is protected by PQ encryption.</p>
    <div>
      <h3>The two migrations on the road to quantum safety: key agreement and digital signatures</h3>
      <a href="#the-two-migrations-on-the-road-to-quantum-safety-key-agreement-and-digital-signatures">
        
      </a>
    </div>
    <p>Transitioning network traffic to post-quantum cryptography (PQC) requires an overhaul of two cryptographic primitives: key agreement and digital signatures.  </p><p><b>Migration 1: Key establishment. </b>Key agreement allows two parties to establish a shared secret over an insecure channel; the shared secret is then used to encrypt network traffic, resulting in post-quantum encryption. The industry has largely converged on ML-KEM (Module-Lattice-based Key-Encapsulation Mechanism) as the standard PQ key agreement protocol. </p><p>ML-KEM has been widely adopted for use in <a href="https://www.cloudflare.com/learning/ssl/transport-layer-security-tls/"><u>TLS</u></a>, usually deployed alongside classical Elliptic Curve Diffie Hellman (ECDHE), where the key used to encrypt network traffic is derived by mixing the outputs of the ML-KEM and ECDHE key agreements. (This is also known as “hybrid ML-KEM”). Well over <a href="https://radar.cloudflare.com/adoption-and-usage#post-quantum-encryption"><u>60% of human-generated TLS traffic</u></a> to Cloudflare’s network is currently protected with hybrid ML-KEM. The transition to hybrid ML-KEM has been successful because it:</p><ul><li><p>stops "harvest-now, decrypt-later" attacks</p></li><li><p>does not require specialized hardware or specialized physical connectivity between client and server, unlike approaches like <a href="https://blog.cloudflare.com/you-dont-need-quantum-hardware/"><u>Quantum Key Distribution (QKD)</u></a></p></li><li><p>has <a href="https://blog.cloudflare.com/you-dont-need-quantum-hardware/"><u>little impact on performance</u></a>, even for short-lived TLS connections</p></li></ul><p>Because ML-KEM runs in <i>parallel </i>with classical ECDHE, there is no reduction in security and compliance as compared to the classical ECDHE approach.  </p><p><b>Migration 2: Digital signatures. </b>Meanwhile, digital signatures and certificates protect authenticity, stopping active adversaries from impersonating the server to the client. Unfortunately, PQ signatures are currently larger in size than classical ECC algorithms, which has slowed their adoption. Fortunately, the migration to PQ signatures is less urgent, because PQ signatures are designed to stop active adversaries armed with powerful quantum computers, which are not known to exist yet. Thus, while Cloudflare is actively contributing to the standardization and rollout of PQ digital signatures, the current Cloudflare IPsec upgrade focuses on upgrading key establishment to hybrid ML-KEM.  </p><p>The U.S. Cybersecurity &amp; Infrastructure Security Agency (CISA) recognized the nature of these two migrations in its <a href="https://www.cisa.gov/resources-tools/resources/product-categories-technologies-use-post-quantum-cryptography-standards"><u>January 2026 publication</u></a>, “Product Categories for Technologies That Use Post-Quantum Cryptography Standards.”</p>
    <div>
      <h2>Breaking new ground with IPsec </h2>
      <a href="#breaking-new-ground-with-ipsec">
        
      </a>
    </div>
    <p>To achieve a SASE fully protected with post-quantum encryption, we’ve upgraded our Cloudflare IPsec products to support hybrid ML-KEM in the IPsec protocol.</p><p>The IPsec community’s journey toward post-quantum cryptography has been very different from that of TLS. <a href="https://www.cloudflare.com/learning/ssl/transport-layer-security-tls/"><u>TLS</u></a> is the de facto standard for encrypting public Internet traffic at Layer 4  — e.g. from a browser to a <a href="https://www.cloudflare.com/learning/cdn/what-is-a-cdn/"><u>content delivery network (CDN)</u></a> — so security and vendor interoperability are at the forefront of its design. Meanwhile, IPsec is a Layer 3 protocol that commonly connects devices built by the same vendor (e.g. two routers), so interoperability has historically been less of a concern. With this in mind, let’s take a look at IPsec’s journey into the quantum future. </p>
    <div>
      <h3>Pre-Shared Keys? Quantum key distribution?</h3>
      <a href="#pre-shared-keys-quantum-key-distribution">
        
      </a>
    </div>
    <p><a href="https://datatracker.ietf.org/doc/html/rfc8784"><u>RFC 8784</u></a>, published in May 2020, was intended to be the post-quantum update to IPsec Internet Key Exchange v2 (IKEv2), which is used to establish the symmetric keys used to encrypt IPsec network traffic. RFC 8784 implies the use of either long-lived pre-shared keys (PSK) or quantum key distribution (QKD). Neither of these approaches are very palatable.</p><p>RFC 8784 proposes mixing a PSK with a key derived from Diffie Hellman Exchange (DHE), essentially running PSK in hybrid with DHE. This approach protects against harvest-now-decrypt-later attackers, but does not offer <a href="https://blog.cloudflare.com/staying-on-top-of-tls-attacks/#forward-secrecy"><u>forward secrecy</u></a> against quantum adversaries. </p><p><a href="https://blog.cloudflare.com/staying-on-top-of-tls-attacks/#forward-secrecy"><u>Forward secrecy</u></a> is a standard desideratum of key agreement protocols. It ensures that a system is secure even if the long-lived key is leaked. The PSK approach in RFC 8784 is vulnerable to an harvest-now-decrypt-later adversary that also obtains a copy of a long-lived PSK, and can then decrypt traffic in the future (by breaking the DHE key agreement) once powerful quantum computers become available.</p><p>To solve this forward secrecy issue, RFC 8784 can instead be used to mix the key from the classical DHE with a freshly generated key derived from a QKD protocol.</p><p>QKD uses quantum mechanics to establish a shared, secret cryptographic key between two parties. Importantly, for QKD to work, the parties must have specialized hardware or be connected by a dedicated physical connection. This is a <a href="https://blog.cloudflare.com/you-dont-need-quantum-hardware/"><u>significant limitation</u></a>, rendering QKD useless for common Internet use cases like connecting a laptop to a distant server over Wi-Fi. These limitations are also why we never invested in deploying QKD for Cloudflare IPsec. The U.S. <a href="https://www.nsa.gov/Cybersecurity/Quantum-Key-Distribution-QKD-and-Quantum-Cryptography-QC/"><u>National Security Agency (NSA)</u></a>, <a href="https://www.bsi.bund.de/EN/Themen/Unternehmen-und-Organisationen/Informationen-und-Empfehlungen/Quantentechnologien-und-Post-Quanten-Kryptografie/quantentechnologien-und-post-quanten-kryptografie_node.html"><u>Germany’s BSI</u></a> and the <a href="https://www.ncsc.gov.uk/whitepaper/quantum-security-technologies"><u>UK National Cyber Security Centre</u></a> have also warned against relying solely on QKD.</p>
    <div>
      <h3>But what about interoperability? </h3>
      <a href="#but-what-about-interoperability">
        
      </a>
    </div>
    <p><a href="https://datatracker.ietf.org/doc/html/rfc9370"><u>RFC 9370</u></a> landed in May 2023, specifying the use of hybrid key agreement rather than PSK or QKD. But unlike TLS, which only supports using post-quantum ML-KEM in parallel with classical DHE, this IPsec standard allows using up to <i>seven different key agreements to run at the same time</i> in parallel with classical Diffie Helman. Moreover, it doesn't specify details about what these key agreements should be, leaving it up to the vendors to choose their algorithms and implementations. Palo Alto Networks, for example, took this seriously and built support for over <a href="https://docs.paloaltonetworks.com/compatibility-matrix/reference/supported-cipher-suites/cipher-suites-supported-in-pan-os-11-2/cipher-suites-supported-in-pan-os-11-2-ipsec"><u>seven different PQC ciphersuites</u></a> into its next generation firewall (NGFW), most of which do not interoperate with other vendors and some of which have not yet been standardized by NIST.</p><p>Over the years, TLS has gone in the opposite direction, reducing the number of registered ciphersuites from hundreds in TLS 1.2, down to around five in TLS 1.3. This philosophy of reducing “ciphersuite bloat” is also in line with NIST’s <a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-52r2.pdf"><u>SP 800 52</u></a> from 2019.  The rationale for reducing “ciphersuite bloat” includes: </p><ul><li><p>Improved interoperability across vendors and regions</p></li><li><p>Lower risk of attacks that exploit downgrades to weak ciphersuites </p></li><li><p>Lower risk of security problems due to misconfiguration</p></li><li><p>Lower risk of implementation flaws by reducing the size of the codebase</p></li></ul><p>This is why we didn’t initially build support for RFC 9370. </p>
    <div>
      <h3>Standards that are finally on the right track</h3>
      <a href="#standards-that-are-finally-on-the-right-track">
        
      </a>
    </div>
    <p>It’s also why we were excited when the IPsec community put forth <a href="https://datatracker.ietf.org/doc/draft-ietf-ipsecme-ikev2-mlkem/"><u>draft-ietf-ipsecme-ikev2-mlkem</u></a>. This Internet-Draft standardizes PQ exchange for IPsec in the same way PQ key exchange has been widely deployed for TLS: hybrid ML-KEM. The new draft fills in the gaps in RFC 9370, by specifying how to run the ML-KEM as the additional key exchange in parallel with classical Diffie Hellman in IKEv2. </p><p>Now that this specification is available, we’ve moved forward with supporting post-quantum IPsec in our Cloudflare IPsec products. </p>
    <div>
      <h2>Cloudflare IPsec goes post-quantum</h2>
      <a href="#cloudflare-ipsec-goes-post-quantum">
        
      </a>
    </div>
    <p>Cloudflare IPsec is a WAN <a href="https://www.cloudflare.com/learning/network-layer/network-as-a-service-naas/"><u>Network-as-a-Service</u></a> solution that replaces legacy private network architectures by connecting data centers, branch offices, and cloud VPCs to Cloudflare’s global IP Anycast network. </p><p>With Cloudflare IPsec, Cloudflare’s network acts as the <a href="https://datatracker.ietf.org/doc/html/rfc5996"><u>IKEv2</u></a> Responder, awaiting connection requests from an IPsec initiator, which is a branch connector device in the customer’s network. Cloudflare IPsec supports IPsec sessions initiated by branch connectors that include our own Cloudflare One Appliance, along with branch connectors from a <a href="https://developers.cloudflare.com/magic-wan/reference/device-compatibility/"><u>diverse set of vendors</u></a>, including Cisco, Juniper, Palo Alto Networks, Fortinet, Aruba and others.</p><p>We’ve implemented production hybrid ML-KEM support in the Cloudflare IPsec IKEv2 Responder, as specified in <a href="https://datatracker.ietf.org/doc/draft-ietf-ipsecme-ikev2-mlkem/"><u>draft-ietf-ipsecme-ikev2-mlkem</u></a>. The draft requires a first key exchange to run using a classical Diffie Helman key exchange. The derived key is used to encrypt a second key exchange that is run using ML-KEM. Finally, the keys derived by the two exchanges are mixed and the result is used to secure the data plane traffic in IPsec ESP (Encapsulating Security Payload) mode. ESP mode uses symmetric cryptography and is thus already quantum safe without any additional upgrades.  We’ve tested our implementation against the IPsec Initiator in the <a href="https://strongswan.org/"><u>strongswan</u></a> reference implementation.</p><p>You can see the ciphersuite used in the IKEv2 negotiation by viewing the Cloudflare <a href="https://developers.cloudflare.com/logs/logpush/logpush-job/datasets/account/ipsec_logs/"><u>IPsec logs</u></a>.</p><p>We chose to implement hybrid ML-KEM rather than “pure” ML-KEM, i.e. only ML-KEM without DHE running in parallel, for two reasons. First, we’ve used hybrid ML-KEM across all of our other Cloudflare products, since this is the approach adopted across the TLS community. And second, it provides a “belt-and-suspenders” security: ML-KEM provides protection against quantum harvest-now-decrypt-later attacks, while DHE provides a tried-and-true algorithm against non-quantum adversaries.</p>
    <div>
      <h3>An invitation for interoperability</h3>
      <a href="#an-invitation-for-interoperability">
        
      </a>
    </div>
    <p>The full value of this implementation can be realized only via interoperability. For this reason, we are inviting other vendors that are building out support for IPsec Initiators in their branch connectors per <a href="https://datatracker.ietf.org/doc/draft-ietf-ipsecme-ikev2-mlkem/"><u>draft-ietf-ipsecme-ikev2-mlkem</u></a> to test against our Cloudflare IPsec implementation. Cloudflare customers looking to test out interoperability with third-party branch connectors while we are in closed beta can <a href="https://www.cloudflare.com/security-week/pq-ipsec-beta/"><u>sign up here</u></a>. We plan to GA and build out interoperability with other vendors as more begin to come online with support for <a href="https://datatracker.ietf.org/doc/draft-ietf-ipsecme-ikev2-mlkem/"><u>draft-ietf-ipsecme-ikev2-mlkem</u></a>.</p>
    <div>
      <h3>Quantum-safe hardware: the Cloudflare One Appliance</h3>
      <a href="#quantum-safe-hardware-the-cloudflare-one-appliance">
        
      </a>
    </div>
    <p>Many of our customers purchase their branch connector (hardware or virtualized) from Cloudflare, rather than a third-party vendor. That’s why the <a href="https://developers.cloudflare.com/magic-wan/configuration/connector/"><u>Cloudflare One Appliance</u></a> — our plug-and-play appliance that connects your local network to Cloudflare One — has also been upgraded with post-quantum encryption.</p><p>Cloudflare One Appliance does not use IKEv2 for key agreement or session establishment, opting instead to rely on TLS. The appliance periodically initiates a TLS handshake with the Cloudflare edge, shares a symmetric secret over the resulting TLS connection, then injects that symmetric secret into the ESP layer of IPsec, which then encrypts and authenticates the IPsec data plane traffic. This design allowed us to avoid building out IKEv2 Initiator logic, and makes the Connector easier to maintain using our existing TLS libraries. </p><p>Thus, upgrading Cloudflare One Appliance to PQ encryption was just a matter of upgrading TLS 1.2 to TLS 1.3 with hybrid ML-KEM — something we’ve done many times on different products at Cloudflare. </p>
    <div>
      <h3>How do I turn this on? And what does it cost?</h3>
      <a href="#how-do-i-turn-this-on-and-what-does-it-cost">
        
      </a>
    </div>
    <p>As always, this upgrade to Cloudflare IPsec comes at no extra cost to our customers. Because we believe that a secure and private Internet should be accessible to all, we’re on a mission to include PQC in all our <a href="https://blog.cloudflare.com/post-quantum-cryptography-ga/"><u>products</u></a>, without <a href="https://blog.cloudflare.com/you-dont-need-quantum-hardware/"><u>specialized hardware</u></a>, at <a href="https://blog.cloudflare.com/post-quantum-crypto-should-be-free/"><u>no extra cost</u></a> to our customers and end users.</p><p>Customers using the Cloudflare One Appliance obtained this upgrade to PQC in version 2026.2.0 (released 2026-02-11). The upgrade is pushed automatically (with no customer action required) according to each appliance’s configured interrupt window.</p><p>For customers using Cloudflare IPsec with another vendor’s branch connector appliance, we will be interoperating with these once more support for <a href="https://datatracker.ietf.org/doc/draft-ietf-ipsecme-ikev2-mlkem/"><u>draft-ietf-ipsecme-ikev2-mlkem</u></a> comes online. <a href="https://www.cloudflare.com/security-week/pq-ipsec-beta/"><u>You can also contact us</u></a> directly to get access to closed beta and request that we interoperate with a specific vendor’s branch connector.</p>
    <div>
      <h2>The full picture: post-quantum SASE</h2>
      <a href="#the-full-picture-post-quantum-sase">
        
      </a>
    </div>
    <p>The value proposition for a post-quantum SASE is clear: organizations can obtain immediate end-to-end protection for their private network traffic by sending it over tunnels protected by hybrid ML-KEM. This protects traffic from  harvest-now-decrypt-later attacks, even if the individual applications in the corporate network are not yet upgraded to PQC.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/xK6FEbQYw9vLJKgx0bHp6/c4b584cc95adc5f8320d03c86b8fe38c/Cloudflare-s_post-quantum_SASE_2.png" />
          </figure><p>The diagram above shows how post-quantum hybrid ML-KEM is offered in various Cloudflare One network configurations.  It includes the following on-ramps:</p><ul><li><p>clientless (<a href="https://blog.cloudflare.com/post-quantum-zero-trust/"><u>TLS 1.3 with hybrid ML-KEM</u></a> (assuming the browser supports hybrid ML-KEM))</p></li><li><p>Cloudflare One Client (<a href="https://blog.cloudflare.com/post-quantum-warp/"><u>MASQUE over TLS 1.3 with hybrid ML-KEM</u></a> initiated by the device client)</p></li><li><p>Cloudflare IPsec on-ramp (as described in this blog)</p></li></ul><p>and the following off-ramps:</p><ul><li><p>Cloudflare Tunnel off-ramp (<a href="https://blog.cloudflare.com/post-quantum-tunnel/"><u>TLS 1.3 with hybrid ML-KEM tunnel</u></a> initiated by the cloudflared server agent)</p></li><li><p>Cloudflare IPsec off-ramp (as described in this blog)</p></li></ul><p>The diagram below highlights a sample network configuration that uses the Cloudflare One Client on-ramp to connect a device to a server behind a Cloudflare One Appliance offramp. The end user's device connects to the Cloudflare network (link 1) using <a href="https://blog.cloudflare.com/post-quantum-warp/"><u>MASQUE with hybrid ML-KEM</u></a>. The traffic then travels across Cloudflare’s global network over TLS 1.3 with hybrid ML-KEM (link 2). Traffic then leaves the Cloudflare network over a post-quantum Cloudflare IPsec link (link 3) that is terminated at a Cloudflare One Appliance appliance. Finally it connects to a server inside the customer’s environment. Traffic is protected by post-quantum cryptography as it travels over the public Internet, even if the server itself does not support post-quantum cryptography.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2mrF4j8VDBGOzGEQNCobo4/b78ae6bef6f1152d92c9f63102aa8491/image4.png" />
          </figure><p>Finally, we note that traffic that on-ramps to Cloudflare One and then egresses to the public Internet can also be protected by our post-quantum <a href="https://developers.cloudflare.com/cloudflare-one/traffic-policies/http-policies/tls-decryption/#post-quantum-support"><u>Cloudflare Gateway</u></a>, our Secure Web Gateway (SWG).  Here’s a diagram showing how the SWG works:</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3j3uN3x5oyUZBWbXIECxzA/9f2fd83cc567c8e511de08dd86ee462f/image2.png" />
          </figure><p> As discussed in <a href="https://blog.cloudflare.com/post-quantum-zero-trust/#quantum-safe-swg-end-to-end-pqc-for-access-to-third-party-web-applications"><u>an earlier blog post</u></a>, our SWG can already support hybrid ML-KEM on traffic from SWG to the origin server (as long as the origin supports hybrid ML-KEM), and on traffic from the client to the SWG (if the client supports hybrid ML-KEM, which is the case for most modern browsers). Importantly, any traffic that onramps to the SWG via a device that has Cloudflare One Client installed is still protected with hybrid ML-KEM — even if the web browser itself does not yet support post-quantum cryptography. This is due to the <a href="https://blog.cloudflare.com/post-quantum-warp/"><u>post-quantum MASQUE tunnel</u></a> that the Cloudflare One Client establishes to Cloudflare’s global network.  The same is true of traffic that onramps to the SWG via a post-quantum Cloudflare IPsec tunnel.</p><p>Putting it all together, Cloudflare One now offers post-quantum encryption on our TLS, MASQUE and IPsec on-ramp and off-ramps, and for private network traffic, and to traffic that egresses to the public Internet via our SWG. </p>
    <div>
      <h2>The future is quantum-safe</h2>
      <a href="#the-future-is-quantum-safe">
        
      </a>
    </div>
    <p>By completing the post-quantum SASE equation with Cloudflare IPsec and the Cloudflare One Appliance, we have extended post-quantum encryption across all our major on-ramps and off-ramps. We have intentionally chosen the path of interoperability and simplicity — the hybrid ML-KEM approach that the IETF and NIST have championed, rather than locking our customers into proprietary implementations, “ciphersuite bloat," or unnecessary hardware upgrades. </p><p>This is the promise of Cloudflare One: a SASE platform that is not only faster and more reliable than the legacy architectures it replaces, but one that provides post-quantum encryption. Whether you are securing a remote worker’s browser or a multi-gigabit data center link, you can now do so with the confidence that your data is protected from harvest-now-decrypt-later attacks and other future-looking threats.  </p><p><a href="https://www.cloudflare.com/lp/pqc/"><u>Sign up here</u></a> to get a full demo of our post-quantum capabilities across the Cloudflare One SASE platform, or <a href="https://www.cloudflare.com/security-week/pq-ipsec-beta/"><u>register here</u></a> to get on the list for the Cloudflare IPsec closed beta. We are proud to lead the industry into this new era of cryptography, and we invite you to join us in building a scalable, standards-compliant, and post-quantum Internet.</p> ]]></content:encoded>
            <category><![CDATA[Post-Quantum]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Cryptography]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[IPsec]]></category>
            <guid isPermaLink="false">4R1725ncbcxxmKyZueXmhw</guid>
            <dc:creator>Sharon Goldberg</dc:creator>
            <dc:creator>Amos Paul</dc:creator>
            <dc:creator>David Gauch</dc:creator>
        </item>
    </channel>
</rss>