rfc9266.original.xml | rfc9266.xml | |||
---|---|---|---|---|
<?xml version='1.0' encoding='utf-8'?> | <?xml version="1.0" encoding="UTF-8"?> | |||
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent" [ | ||||
<!ENTITY docName "draft-ietf-kitten-tls-channel-bindings-for-tls13-16"> | <!DOCTYPE rfc [ | |||
]> | <!ENTITY nbsp " "> | |||
<!ENTITY zwsp "​"> | ||||
<!ENTITY nbhy "‑"> | ||||
<!ENTITY wj "⁠"> | ||||
]> | ||||
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" | <rfc xmlns:xi="http://www.w3.org/2001/XInclude" | |||
ipr="trust200902" | ipr="trust200902" | |||
docName="&docName;" | docName="draft-ietf-kitten-tls-channel-bindings-for-tls13" | |||
number="9266" | ||||
obsoletes="" | obsoletes="" | |||
updates="5801, 5802, 5929, 7677" | updates="5801, 5802, 5929, 7677" | |||
submissionType="IETF" | submissionType="IETF" | |||
category="std" | category="std" | |||
consensus="true" | consensus="true" | |||
xml:lang="en" | xml:lang="en" | |||
tocInclude="true" | tocInclude="true" | |||
symRefs="true" | symRefs="true" | |||
sortRefs="true" | sortRefs="true" | |||
version="3"> | version="3"> | |||
skipping to change at line 18 ¶ | skipping to change at line 24 ¶ | |||
obsoletes="" | obsoletes="" | |||
updates="5801, 5802, 5929, 7677" | updates="5801, 5802, 5929, 7677" | |||
submissionType="IETF" | submissionType="IETF" | |||
category="std" | category="std" | |||
consensus="true" | consensus="true" | |||
xml:lang="en" | xml:lang="en" | |||
tocInclude="true" | tocInclude="true" | |||
symRefs="true" | symRefs="true" | |||
sortRefs="true" | sortRefs="true" | |||
version="3"> | version="3"> | |||
<front> | <front> | |||
<title abbrev="">Channel Bindings for TLS 1.3</title> | <title abbrev="">Channel Bindings for TLS 1.3</title> | |||
<seriesInfo name="Internet-Draft" value="&docName;"/> | <seriesInfo name="RFC" value="9266"/> | |||
<author initials="S" surname="Whited" fullname="Sam Whited"> | <author initials="S" surname="Whited" fullname="Sam Whited"> | |||
<organization/> | <organization/> | |||
<address> | <address> | |||
<postal> | <postal> | |||
<street/> | <street/> | |||
<city>Atlanta</city> | <city>Atlanta</city> | |||
<code>GA</code> | <region>GA</region> | |||
<country>USA</country> | <country>United States of America</country> | |||
<region/> | <region/> | |||
</postal> | </postal> | |||
<phone/> | <phone/> | |||
<email>sam@samwhited.com</email> | <email>sam@samwhited.com</email> | |||
<uri>https://blog.samwhited.com/</uri> | <uri>https://blog.samwhited.com/</uri> | |||
</address> | </address> | |||
</author> | </author> | |||
<date year="2022" month="May" day="04"/> | <date year="2022" month="July"/> | |||
<area>Internet</area> | ||||
<workgroup>Transport Layer Security</workgroup> | <area>sec</area> | |||
<workgroup>kitten</workgroup> | ||||
<abstract> | <abstract> | |||
<t> | <t> | |||
This document defines a channel binding type, tls-exporter, that is | This document defines a channel binding type, tls-exporter, that is | |||
compatible with TLS 1.3 in accordance with RFC 5056, On Channel Binding. | compatible with TLS 1.3 in accordance with RFC 5056, "On the Use of | |||
Furthermore, it updates the default channel binding to the new binding | Channel Bindings to Secure Channels". Furthermore, it updates the | |||
for versions of TLS greater than 1.2. | default channel binding to the new binding for versions of TLS greater | |||
This document updates RFC5801, RFC5802, RFC5929, and RFC7677. | than 1.2. This document updates RFCs 5801, 5802, 5929, and 7677. | |||
</t> | </t> | |||
</abstract> | </abstract> | |||
</front> | </front> | |||
<middle> | <middle> | |||
<section anchor="introduction" numbered="true" toc="default"> | <section anchor="introduction" numbered="true" toc="default"> | |||
<name>Introduction</name> | <name>Introduction</name> | |||
<t> | <t> | |||
The "tls-unique" channel binding type defined in | The "tls-unique" channel binding type defined in | |||
<xref target="RFC5929"/> was found to be vulnerable to the "triple | <xref target="RFC5929"/> was found to be susceptible to the "triple | |||
handshake vulnerability" <xref target="TRIPLE-HANDSHAKE"/> without the | handshake vulnerability" <xref target="TRIPLE-HANDSHAKE"/> without the | |||
extended master secret extension defined in <xref target="RFC7627"/>. | extended master secret extension defined in <xref target="RFC7627"/>. | |||
While TLS 1.3 uses a complete transcript hash akin to the extended | While TLS 1.3 uses a complete transcript hash akin to the extended | |||
master secret procedures, the safety of channel bindings with TLS 1.3 | master secret procedures, the safety of channel bindings with TLS 1.3 | |||
was not analyzed as part of the core protocol work, and so the | was not analyzed as part of the core protocol work, so the | |||
specification of channel bindings for TLS 1.3 was deferred. | specification of channel bindings for TLS 1.3 was deferred. | |||
<xref target="RFC8446"/> section C.5 notes the lack of channel bindings | <xref target="RFC8446" sectionFormat="of" section="C.5"/> notes the lack | |||
for TLS 1.3; this document defines such channel bindings, and fills that | of channel bindings | |||
for TLS 1.3; this document defines such channel bindings and fills that | ||||
gap. | gap. | |||
Furthermore, this document updates <xref target="RFC5929"/> by adding an | Furthermore, this document updates <xref target="RFC5929"/> by adding an | |||
additional unique channel binding type, "tls-exporter", that replaces | additional unique channel binding type, "tls-exporter", that replaces | |||
some usage of "tls-unique". | some usage of "tls-unique". | |||
</t> | </t> | |||
<section anchor="conventions-and-terminology" numbered="true" toc="default "> | <section anchor="conventions-and-terminology" numbered="true" toc="default "> | |||
<name>Conventions and Terminology</name> | <name>Conventions and Terminology</name> | |||
<t> | <t> | |||
Throughout this document the acronym "EKM" is used to refer to | Throughout this document, the acronym "EKM" is used to refer to | |||
Exported Keying Material as defined in <xref target="RFC5705"/>. | "Exported Keying Material" as defined in <xref target="RFC5705"/>. | |||
</t> | </t> | |||
<t> | <t> | |||
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQU | |||
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and | IRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL | |||
"OPTIONAL" in this document are to be interpreted as described in BCP | NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14> | |||
14 <xref target="RFC2119" format="default"/> <xref target="RFC8174" | RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>", | |||
format="default"/> when, and only when, they appear in all capitals, | "<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to | |||
as shown here. | be interpreted as | |||
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> | ||||
when, and only when, they appear in all capitals, as shown here. | ||||
</t> | </t> | |||
</section> | </section> | |||
</section> | </section> | |||
<section anchor="tls-exporter" numbered="true" toc="default"> | <section anchor="tls-exporter" numbered="true" toc="default"> | |||
<name>The 'tls-exporter' Channel Binding Type</name> | <name>The 'tls-exporter' Channel Binding Type</name> | |||
<t> | <t> | |||
Channel binding mechanisms are not useful until TLS implementations | Channel binding mechanisms are not useful until TLS implementations | |||
expose the required data. | expose the required data. To facilitate this, "tls-exporter" uses | |||
To facilitate this, "tls-exporter" uses exported keying material (EKM) | Exported Keying Material (EKM), which is already widely exposed by TLS | |||
which is already widely exposed by TLS implementations. | implementations. The EKM is obtained using the keying material | |||
The EKM is obtained using the keying material exporters for TLS as | exporters for TLS, as defined in <xref target="RFC5705"/> and <xref | |||
defined in <xref target="RFC5705"/> and <xref target="RFC8446"/> section | target="RFC8446" sectionFormat="of" section="7.5"/>, by supplying the | |||
7.5 by supplying the following inputs: | following inputs: | |||
</t> | </t> | |||
<dl> | <dl> | |||
<dt>Label:</dt> | <dt>Label:</dt> | |||
<dd> | <dd> | |||
The ASCII string "EXPORTER-Channel-Binding" with no terminating NUL. | The ASCII string "EXPORTER-Channel-Binding" with no terminating NUL. | |||
</dd> | </dd> | |||
<dt>Context value:</dt> | <dt>Context value:</dt> | |||
<dd> | <dd> | |||
Zero-length string. | Zero-length string. | |||
</dd> | </dd> | |||
<dt>Length:</dt> | <dt>Length:</dt> | |||
<dd> | <dd> | |||
32 bytes. | 32 bytes. | |||
</dd> | </dd> | |||
</dl> | </dl> | |||
<t> | <t> | |||
This channel binding mechanism is defined only when the TLS handshake | This channel binding mechanism is defined only when the TLS handshake | |||
results in unique master secrets. This is true of TLS versions prior to | results in unique master secrets. This is true of TLS versions prior to | |||
1.3 when the extended master secret extension of | 1.3 when the extended master secret extension of | |||
<xref target="RFC7627"/> is in use, and is always true for TLS 1.3 | <xref target="RFC7627"/> is in use, and it is always true for TLS 1.3 | |||
(see <xref target="RFC8446"/> appendix D). | (see <xref target="RFC8446" sectionFormat="of" section="D"/>). | |||
</t> | </t> | |||
</section> | </section> | |||
<section anchor="scram" numbered="true" toc="default"> | <section anchor="scram" numbered="true" toc="default"> | |||
<name>TLS 1.3 with SCRAM or GSS-API over SASL</name> | <name>TLS 1.3 with SCRAM or GSS-API over SASL</name> | |||
<t> | <t> | |||
SCRAM | The specifications for Salted Challenge Response Authentication Mechanis | |||
(<xref target="RFC5802"/>, and <xref target="RFC7677"/>) | m (SCRAM) <xref | |||
and GSS-API over SASL <xref target="RFC5801"/> | target="RFC5802"/> <xref target="RFC7677"/> and Generic Security | |||
Service Application Program Interface (GSS-API) over Simple | ||||
Authentication and Security Layer (SASL) <xref target="RFC5801"/> | ||||
define "tls-unique" as the default channel binding to use over TLS. | define "tls-unique" as the default channel binding to use over TLS. | |||
As "tls-unique" is not defined for TLS 1.3 (and greater), this document | As "tls-unique" is not defined for TLS 1.3 (and greater), this | |||
updates <xref target="RFC5801"/>, <xref target="RFC5802"/>, and | document updates <xref target="RFC5801"/>, <xref target="RFC5802"/>, | |||
<xref target="RFC7677"/> to use "tls-exporter" as the default channel | and <xref target="RFC7677"/> to use "tls-exporter" as the default | |||
binding over TLS 1.3 (and greater). | channel binding over TLS 1.3 (and greater). | |||
Note that this document does not change the default channel binding | Note that this document does not change the default channel | |||
for SCRAM mechanisms over TLS 1.2 <xref target="RFC5246"/>, which is | binding for SCRAM mechanisms over TLS 1.2 <xref target="RFC5246"/>, | |||
still "tls-unique". | which is still "tls-unique" (also note that RFC 5246 has been obsoleted | |||
by RFC 8446). | ||||
</t> | </t> | |||
<t> | <t> | |||
Additionally, this document updates the aforementioned documents to make | Additionally, this document updates the aforementioned documents to make | |||
"tls-exporter" the mandatory to implement channel binding if any channel | "tls-exporter" the mandatory-to-implement channel binding if any channel | |||
bindings are implemented for TLS 1.3. | bindings are implemented for TLS 1.3. | |||
Implementations that support channel binding over TLS 1.3 | Implementations that support channel binding over TLS 1.3 | |||
<bcp14>MUST</bcp14> implement "tls-exporter". | <bcp14>MUST</bcp14> implement "tls-exporter". | |||
</t> | </t> | |||
</section> | </section> | |||
<section anchor="security-considerations" numbered="true" toc="default"> | <section anchor="security-considerations" numbered="true" toc="default"> | |||
<name>Security Considerations</name> | <name>Security Considerations</name> | |||
<t> | <t> | |||
The channel binding type defined in this document is constructed so that | The channel binding type defined in this document is constructed so that | |||
disclosure of the channel binding data does not leak secret information | disclosure of the channel binding data does not leak secret information | |||
about the TLS channel and does not affect the security of the TLS | about the TLS channel and does not affect the security of the TLS | |||
channel. | channel. | |||
</t> | </t> | |||
<t> | <t> | |||
The derived data <bcp14>MUST NOT</bcp14> be used for any purpose other | The derived data <bcp14>MUST NOT</bcp14> be used for any purpose other | |||
than channel bindings as described in <xref target="RFC5056"/>. | than channel bindings as described in <xref target="RFC5056"/>. | |||
In particular, implementations MUST NOT use channel binding as a | In particular, implementations <bcp14>MUST NOT</bcp14> use channel bindi ng as a | |||
secret key to protect privileged information. | secret key to protect privileged information. | |||
</t> | </t> | |||
<t> | <t> | |||
The Security Considerations sections of <xref target="RFC5056"/>, <xref | The Security Considerations sections of <xref target="RFC5056"/>, <xref | |||
target="RFC5705"/>, and <xref target="RFC8446"/> apply to this document. | target="RFC5705"/>, and <xref target="RFC8446"/> apply to this document. | |||
</t> | </t> | |||
<section anchor="unique-bindings" numbered="true" toc="default"> | <section anchor="unique-bindings" numbered="true" toc="default"> | |||
<name>Uniqueness of Channel Bindings</name> | <name>Uniqueness of Channel Bindings</name> | |||
<t> | <t> | |||
The definition of channel bindings in <xref target="RFC5056"/> | The definition of channel bindings in <xref target="RFC5056"/> | |||
defines the concept of a "unique" channel binding as being one that | defines the concept of a "unique" channel binding as being one that | |||
is unique to the channel endpoints and unique over time, that is, | is unique to the channel endpoints and unique over time, that is, | |||
a value that is unique to a specific instance of the lower layer | a value that is unique to a specific instance of the lower-layer | |||
security protocol. | security protocol. | |||
When TLS is the lower layer security protocol, as for the channel | When TLS is the lower-layer security protocol, as for the channel bind | |||
binding type defined in this document, this concept of uniqueness | ing | |||
type defined in this document, this concept of uniqueness | ||||
corresponds to uniquely identifying the specific TLS connection. | corresponds to uniquely identifying the specific TLS connection. | |||
</t> | </t> | |||
<t> | <t> | |||
However, a stronger form of uniqueness is possible, which would entail | However, a stronger form of uniqueness is possible, which would entail | |||
uniquely identifying not just the lower layer protocol but also the | uniquely identifying not just the lower-layer protocol but also the | |||
upper layer application or authentication protocol that is consuming | upper-layer application or authentication protocol that is consuming | |||
the channel binding. | the channel binding. | |||
The distinction is relevant only when there are multiple instances of | The distinction is relevant only when there are multiple instances of | |||
an authentication protocol, or multiple distinct authentication | an authentication protocol, or multiple distinct authentication | |||
protocols, that run atop the same lower layer protocol. | protocols, that run atop the same lower-layer protocol. | |||
Such a situation is rare -- most consumers of channel bindings | Such a situation is rare; most consumers of channel bindings | |||
establish an instance of the lower layer secure protocol, run a single | establish an instance of the lower-layer secure protocol, run a single | |||
application or authentication protocol as the upper layer protocol, | application or authentication protocol as the upper-layer protocol, | |||
then terminate both upper and lower layer protocols. | then terminate both upper and lower-layer protocols. | |||
In this situation the stronger form of uniqueness is trivially | In this situation, the stronger form of uniqueness is trivially | |||
achieved, given that the channel binding value is unique in the sense | achieved, given that the channel binding value is unique in the sense | |||
of <xref target="RFC5056"/>. | of <xref target="RFC5056"/>. | |||
</t> | </t> | |||
<t> | <t> | |||
The channel binding type defined by this document provides only the | The channel binding type defined by this document provides only the | |||
weaker type of uniqueness, as per <xref target="RFC5056"/>; it does | weaker type of uniqueness, as per <xref target="RFC5056"/>; it does | |||
not achieve the stronger uniqueness per upper layer protocol instance | not achieve the stronger uniqueness per the upper-layer protocol | |||
described above. | instance described above. This stronger form of uniqueness would be | |||
This stronger form of uniqueness would be useful in that it provides | useful in that it provides protection against cross-protocol attacks | |||
protection against cross-protocol attacks for the multiple | for the multiple authentication protocols running over the same | |||
authentication protocols running over the same instance of the lower | instance of the lower-layer protocol, and it provides protection | |||
layer protocol, and it provides protection against replay attacks that | against replay attacks that seek to replay a message from one | |||
seek to replay a message from one instance of an authentication | instance of an authentication protocol in a different instance of | |||
protocol in a different instance of the same authentication protocol, | the same authentication protocol, again running over the same | |||
again running over the same instance of the lower layer protocol. | instance of the lower-layer protocol. Both of these properties are | |||
Both of these properties are highly desirable when performing formal | highly desirable when performing formal analysis of upper-layer | |||
analysis of upper layer protocols; if these properties are not | protocols; if these properties are not provided, such formal | |||
provided, such formal analysis is essentially impossible. | analysis is essentially impossible. In some cases, one or both of | |||
In some cases one or both of these properties may already be provided | these properties may already be provided by specific upper-layer | |||
by specific upper layer protocols, but that is dependent on the | protocols, but that is dependent on the mechanism(s) in question, | |||
mechanism(s) in question, and formal analysis requires that the | and formal analysis requires that the property is provided in a | |||
property is provided in a generic manner, across all potential upper | generic manner across all potential upper-layer protocols that | |||
layer protocols that exist or might exist in the future. | exist or might exist in the future. | |||
</t> | </t> | |||
<t> | <t> | |||
Accordingly, applications that make use of the channel binding type | Accordingly, applications that make use of the channel binding type | |||
defined in this document <bcp14>MUST NOT</bcp14> use the channel | defined in this document <bcp14>MUST NOT</bcp14> use the channel | |||
binding for more than one authentication mechanism instance on a given | binding for more than one authentication mechanism instance on a given | |||
TLS connection. | TLS connection. | |||
Such applications <bcp14>MUST</bcp14> immediately close the TLS | Such applications <bcp14>MUST</bcp14> immediately close the TLS | |||
connection after the conclusion of the upper layer protocol. | connection after the conclusion of the upper-layer protocol. | |||
</t> | </t> | |||
</section> | </section> | |||
<section anchor="legacy-tls" numbered="true" toc="default"> | <section anchor="legacy-tls" numbered="true" toc="default"> | |||
<name>Use with Legacy TLS</name> | <name>Use with Legacy TLS</name> | |||
<t> | <t> | |||
While it is possible to use this channel binding mechanism with TLS | While it is possible to use this channel binding mechanism with TLS | |||
versions below 1.3, extra precaution must be taken to ensure that the | versions below 1.3, extra precaution must be taken to ensure that | |||
chosen cipher suites always result in unique master secrets. | the chosen cipher suites always result in unique master secrets. | |||
For more information see <xref target="RFC7627"/> and the Security | For more information, see <xref target="RFC7627"/> and the Security | |||
Considerations section of <xref target="RFC5705"/> (TLS 1.3 always | Considerations section of <xref target="RFC5705"/> (TLS 1.3 always | |||
provides unique master secrets, as discussed in Appendix D of | provides unique master secrets, as discussed in <xref | |||
<xref target="RFC8446"/>.) | target="RFC8446" sectionFormat="of" section="D"/>). | |||
</t> | </t> | |||
<t> | <t> | |||
When TLS renegotiation is enabled on a connection the "tls-exporter" | When TLS renegotiation is enabled on a connection, the "tls-exporter" | |||
channel binding type is not defined for that connection and | channel binding type is not defined for that connection, and | |||
implementations <bcp14>MUST NOT</bcp14> support it. | implementations <bcp14>MUST NOT</bcp14> support it. | |||
</t> | </t> | |||
<t> | <t> | |||
In general, users wishing to take advantage of channel binding should | In general, users wishing to take advantage of channel binding should | |||
upgrade to TLS 1.3 or later. | upgrade to TLS 1.3 or later. | |||
</t> | </t> | |||
</section> | </section> | |||
</section> | </section> | |||
<section anchor="iana-considerations" numbered="true" toc="default"> | <section anchor="iana-considerations" numbered="true" toc="default"> | |||
<name>IANA Considerations</name> | <name>IANA Considerations</name> | |||
<section anchor="cb-type-registration" numbered="true" toc="default"> | <section anchor="cb-type-registration" numbered="true" toc="default"> | |||
<name>Registration of Channel Binding Type</name> | <name>Registration of Channel Binding Type</name> | |||
<t> | <t> | |||
This document adds the following registration in the "Channel-Binding | IANA has registered tls-exporter in the "Channel-Binding | |||
Types" registry: | Types" registry: | |||
</t> | </t> | |||
<dl> | <dl> | |||
<dt>Subject:</dt> | <dt>Channel-binding unique prefix:</dt> | |||
<dd>Registration of channel binding tls-exporter</dd> | ||||
<dt>Channel binding unique prefix:</dt> | ||||
<dd>tls-exporter</dd> | <dd>tls-exporter</dd> | |||
<dt>Channel binding type:</dt> | <dt>Channel-binding type:</dt> | |||
<dd>unique</dd> | <dd>unique</dd> | |||
<dt>Channel type:</dt> | <dt>Channel type:</dt> | |||
<dd><xref target="RFC8446">TLS</xref></dd> | <dd>TLS <xref target="RFC8446"/></dd> | |||
<dt>Published specification:</dt> | <dt>Published specification:</dt> | |||
<dd>&docName;</dd> | <dd>RFC 9266</dd> | |||
<dt>Channel binding is secret:</dt> | <dt>Channel-binding is secret:</dt> | |||
<dd>no</dd> | <dd>no</dd> | |||
<dt>Description:</dt> | <dt>Description:</dt> | |||
<dd>The EKM value obtained from the current TLS connection.</dd> | <dd>The EKM value obtained from the current TLS connection.</dd> | |||
<dt>Intended usage:</dt> | <dt>Intended usage:</dt> | |||
<dd>COMMON</dd> | <dd>COMMON</dd> | |||
<dt> | <dt> | |||
Person and email address to contact for further information: | Person and email address to contact for further information: | |||
</dt> | </dt> | |||
<dd>Sam Whited <sam@samwhited.com>.</dd> | <dd>Sam Whited <sam@samwhited.com></dd> | |||
<dt>Owner/Change controller name and email address:</dt> | <dt>Owner/Change controller name and email address:</dt> | |||
<dd>IESG.</dd> | <dd>IESG</dd> | |||
<dt>Expert reviewer name and contact information:</dt> | <dt>Expert reviewer name and contact information:</dt> | |||
<dd> | <dd> | |||
IETF KITTEN or TLS WG (kitten@ietf.org or tls@ietf.org, failing | IETF KITTEN WG <kitten@ietf.org> or IETF TLS WG <tls@ietf.o | |||
that, ietf@ietf.org). | rg> | |||
</dd> | </dd> | |||
<dt>Note:</dt> | <dt>Note:</dt> | |||
<dd> | <dd> | |||
See the published specification for advice on the applicability of | See the published specification for advice on the applicability of | |||
this channel binding type. | this channel binding type. | |||
</dd> | </dd> | |||
</dl> | </dl> | |||
</section> | </section> | |||
<section anchor="exporter-registration" numbered="true" toc="default"> | <section anchor="exporter-registration" numbered="true" toc="default"> | |||
<name>Registration of Channel Binding TLS Exporter Label</name> | <name>Registration of Channel Binding TLS Exporter Label</name> | |||
<t> | <t> | |||
This document adds the following registration in the "TLS Exporter | IANA has added the following registration in the "TLS Exporter | |||
Labels" registry, which is part of the "Transport Layer Security (TLS) | Labels" registry under the "Transport Layer Security (TLS) | |||
Parameters" group: | Parameters" registry: | |||
</t> | </t> | |||
<dl> | <dl> | |||
<dt>Value:</dt> | <dt>Value:</dt> | |||
<dd>EXPORTER-Channel-Binding</dd> | <dd>EXPORTER-Channel-Binding</dd> | |||
<dt>DTLS-OK:</dt> | <dt>DTLS-OK:</dt> | |||
<dd>Y</dd> | <dd>Y</dd> | |||
<dt>Recommended:</dt> | <dt>Recommended:</dt> | |||
<dd>Y</dd> | <dd>Y</dd> | |||
<dt>Reference:</dt> | <dt>Reference:</dt> | |||
<dd>This document</dd> | <dd>RFC 9266</dd> | |||
</dl> | </dl> | |||
</section> | </section> | |||
</section> | </section> | |||
</middle> | </middle> | |||
<back> | <back> | |||
<references> | <references> | |||
<name>References</name> | <name>References</name> | |||
<references> | <references> | |||
<name>Normative References</name> | <name>Normative References</name> | |||
<xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.2 119.xml"/> | <xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.2 119.xml"/> | |||
skipping to change at line 320 ¶ | skipping to change at line 329 ¶ | |||
<xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.5 802.xml"/> | <xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.5 802.xml"/> | |||
<xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.5 929.xml"/> | <xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.5 929.xml"/> | |||
<xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.7 677.xml"/> | <xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.7 677.xml"/> | |||
<xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.8 174.xml"/> | <xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.8 174.xml"/> | |||
<xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.8 446.xml"/> | <xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.8 446.xml"/> | |||
</references> | </references> | |||
<references> | <references> | |||
<name>Informative References</name> | <name>Informative References</name> | |||
<xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.5 246.xml"/> | <xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.5 246.xml"/> | |||
<xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.7 627.xml"/> | <xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.7 627.xml"/> | |||
<reference anchor="TRIPLE-HANDSHAKE" target="https://www.mitls.org/pages | ||||
/attacks/3SHAKE"> | <reference anchor="TRIPLE-HANDSHAKE" target="https://www.mitls.org/pages/attacks | |||
/3SHAKE"> | ||||
<front> | <front> | |||
<title>Password Storage</title> | <title>Triple Handshakes Considered Harmful: Breaking and Fixing Aut hentication over TLS</title> | |||
<author initials="K." surname="Bhargavan"/> | <author initials="K." surname="Bhargavan"/> | |||
<author initials="A." surname="Delignat-Lavaud"/> | <author initials="A." surname="Delignat-Lavaud"/> | |||
<author initials="C." surname="Fournet"/> | <author initials="C." surname="Fournet"/> | |||
<author initials="A." surname="Pironti"/> | <author initials="A." surname="Pironti"/> | |||
<author initials="P." surname="Strub"/> | <author initials="P." surname="Strub"/> | |||
<date year="2014" month="March"/> | <date year="2014" month="March"/> | |||
</front> | </front> | |||
</reference> | </reference> | |||
</references> | </references> | |||
</references> | </references> | |||
End of changes. 42 change blocks. | ||||
103 lines changed or deleted | 120 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ |