rfc9662.original.xml | rfc9662.xml | |||
---|---|---|---|---|
<?xml version='1.0' encoding='utf-8'?> | <?xml version='1.0' encoding='UTF-8'?> | |||
<?xml-model href="rfc7991bis.rnc"?> | ||||
<rfc | <!-- draft submitted in xml v3 --> | |||
xmlns:xi="http://www.w3.org/2001/XInclude" | ||||
category="std" | ||||
docName="draft-ietf-uta-ciphersuites-in-sec-syslog-07" | ||||
ipr="trust200902" | ||||
obsoletes="" | ||||
updates="5425 6012" | ||||
submissionType="IETF" | ||||
xml:lang="en" | ||||
tocInclude="true" | ||||
tocDepth="4" | ||||
symRefs="true" | ||||
sortRefs="true" | ||||
version="3"> | ||||
<!-- ***** FRONT MATTER ***** --> | <!DOCTYPE rfc [ | |||
<!ENTITY nbsp " "> | ||||
<!ENTITY zwsp "​"> | ||||
<!ENTITY nbhy "‑"> | ||||
<!ENTITY wj "⁠"> | ||||
]> | ||||
<front> | <rfc xmlns:xi="http://www.w3.org/2001/XInclude" category="std" docName="draft-ie tf-uta-ciphersuites-in-sec-syslog-07" number="9662" ipr="trust200902" obsoletes= "" updates="5425, 6012" submissionType="IETF" consensus="true" xml:lang="en" toc Include="true" tocDepth="4" symRefs="true" sortRefs="true" version="3"> | |||
<front> | ||||
<title abbrev="Cipher Suites in Secure Syslog">Updates to the Cipher Suites i n Secure Syslog</title> | <title abbrev="Cipher Suites in Secure Syslog">Updates to the Cipher Suites i n Secure Syslog</title> | |||
<seriesInfo name="Internet-Draft" value="draft-ietf-uta-ciphersuites-in-sec- | <seriesInfo name="RFC" value="9662"/> | |||
syslog-07"/> | <author fullname="Chris Lonvick" initials="C." surname="Lonvick"> | |||
<author fullname="Chris Lonvick" initials="C." surname="Lonvick"> | ||||
<address> | <address> | |||
<email>lonvick.ietf@gmail.com</email> | <email>lonvick.ietf@gmail.com</email> | |||
</address> | </address> | |||
</author> | </author> | |||
<author fullname="Sean Turner" initials="S." surname="Turner"> | <author fullname="Sean Turner" initials="S." surname="Turner"> | |||
<organization>sn3rd</organization> | <organization>sn3rd</organization> | |||
<address> | <address> | |||
<email>sean@sn3rd.com</email> | <email>sean@sn3rd.com</email> | |||
</address> | </address> | |||
</author> | </author> | |||
<author fullname="Joe Salowey" initials="J." surname="Salowey"> | <author fullname="Joe Salowey" initials="J." surname="Salowey"> | |||
<organization>Venafi</organization> | <organization>Venafi</organization> | |||
<address> | <address> | |||
<email>joe@salowey.net</email> | <email>joe@salowey.net</email> | |||
</address> | </address> | |||
</author> | </author> | |||
<date year="2024"/> | <date month="September" year="2024"/> | |||
<!-- Meta-data Declarations --> | ||||
<area>Applications and Real-Time Area</area> | <area>SEC</area> | |||
<workgroup>Internet Engineering Task Force</workgroup> | <workgroup>uts</workgroup> | |||
<keyword>syslog</keyword> | <keyword>syslog</keyword> | |||
<keyword>secure syslog</keyword> | <keyword>secure syslog</keyword> | |||
<keyword>TLS_RSA_WITH_AES_128_CBC_SHA</keyword> | <keyword>TLS_RSA_WITH_AES_128_CBC_SHA</keyword> | |||
<keyword>TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256</keyword> | <keyword>TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256</keyword> | |||
<keyword>DTLS</keyword> | <keyword>DTLS</keyword> | |||
<keyword>TLS</keyword> | <keyword>TLS</keyword> | |||
<keyword>cipher suite</keyword> | <keyword>cipher suite</keyword> | |||
<abstract> | <abstract> | |||
<t> | <t> | |||
The IETF published two specifications, namely RFC 5425 and | RFCs 5425 and 6012 describe using TLS and DTLS to securely | |||
RFC 6012, for securing the Syslog protocol using TLS and DTLS, re | transport syslog messages. This document updates the | |||
spectively. | cipher suites required by RFC 5245 (TLS | |||
</t><t> | Transport Mapping for Syslog) and RFC 6012 | |||
This document updates the cipher suites in RFC 5425, Transport La | (DTLS Transport Mapping for Syslog). It also updates | |||
yer Security | the protocol recommended by RFC 6012 for secure datagram transport. | |||
(TLS) Transport Mapping for Syslog, and RFC 6012, Datagram Transp | ||||
ort Layer | ||||
Security (DTLS) Transport Mapping for Syslog. It also updates the | ||||
transport | ||||
protocol in RFC 6012. | ||||
</t> | </t> | |||
</abstract> | </abstract> | |||
</front> | </front> | |||
<middle> | <middle> | |||
<section numbered="true" toc="default"> | <section numbered="true" toc="default"> | |||
<name>Introduction</name> | <name>Introduction</name> | |||
<t> | ||||
"Transport Layer Security (TLS) Transport Mapping for Syslog" <xref target="R | ||||
FC5425"/> and | ||||
"Datagram Transport Layer Security (DTLS) Transport Mapping for Syslog" <xref | ||||
target="RFC6012"/> | ||||
describe using TLS and DTLS to securely transport syslog messages. Both | ||||
of these specifications require the use of RSA-based certificates | ||||
and the use of TLS and DTLS versions that are not the most recent. | ||||
</t> | ||||
<t> | <t> | |||
The IETF published RFC 5425, Transport Layer Security (TL | <xref target="RFC5425" sectionFormat="of" section="4.2"/> | |||
S) | requires that implementations <bcp14>MUST</bcp14> | |||
Transport Mapping for Syslog, and RFC 6012, Datagram Tran | support TLS 1.2 <xref target="RFC5246" /> and are <bcp14> | |||
sport Layer | REQUIRED</bcp14> | |||
Security (DTLS) Transport Mapping for Syslog. | to support the mandatory-to-implement cipher suite | |||
</t><t> | TLS_RSA_WITH_AES_128_CBC_SHA. | |||
Both specifications, <xref target="RFC5425" /> and <xref | ||||
target="RFC6012" />, | ||||
require the use of RSA-based certificates and the use of | ||||
TLS/DTLS versions | ||||
that are not the most recent. | ||||
</t><t> | ||||
<xref target="RFC5425" /> requires that implementations " | ||||
<bcp14>MUST</bcp14>" | ||||
support TLS 1.2 <xref target="RFC5246" /> and are "<bcp14 | ||||
>REQUIRED</bcp14>" | ||||
to support the mandatory to implement cipher suite | ||||
TLS_RSA_WITH_AES_128_CBC_SHA (Section 4.2). | ||||
</t><t> | </t><t> | |||
<xref target="RFC6012" /> requires that implementations " <bcp14>MUST</bcp14>" | <xref target="RFC6012" sectionFormat="of" section="5.2"/> requires that implementations "<bcp14>MUST</bcp14>" | |||
support DTLS 1.0 <xref target="RFC4347" /> and are also | support DTLS 1.0 <xref target="RFC4347" /> and are also | |||
"<bcp14>REQUIRED</bcp14>" to support the mandatory to imp | "<bcp14>REQUIRED</bcp14>" to support the mandatory-to-imp | |||
lement cipher suite | lement cipher suite | |||
TLS_RSA_WITH_AES_128_CBC_SHA (Section 5.2). | TLS_RSA_WITH_AES_128_CBC_SHA. | |||
</t><t> | </t><t> | |||
The community is moving away from cipher suits that don't offer forward | The community is moving away from cipher suites that don' t offer forward | |||
secrecy and towards more robust suites. | secrecy and towards more robust suites. | |||
</t><t> | </t><t> | |||
The DTLS 1.0 transport <xref target="RFC4347" /> has been deprecated by | The DTLS 1.0 transport <xref target="RFC4347" /> has been deprecated by | |||
<xref target="BCP195" /> and the community is moving to D TLS 1.2 | RFC 8996 <xref target="BCP195" />, and the community is m oving to DTLS 1.2 | |||
<xref target="RFC6347" /> and DTLS 1.3 <xref target="RFC9 147" />. | <xref target="RFC6347" /> and DTLS 1.3 <xref target="RFC9 147" />. | |||
</t><t> | </t><t> | |||
This document updates <xref target="RFC5425" /> and <xref target="RFC6012" /> | This document updates <xref target="RFC5425" /> and <xref target="RFC6012" /> | |||
to prefer the use of TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA25 6 over the use of | to prefer the use of TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA25 6 over the use of | |||
TLS_RSA_WITH_AES_128_CBC_SHA. | TLS_RSA_WITH_AES_128_CBC_SHA. | |||
</t><t> | </t><t> | |||
This document also updates <xref target="RFC6012" /> to m | This document also updates <xref target="RFC6012" /> by r | |||
ake a recommendation | ecommending | |||
of a mandatory to implement secure datagram transport. | a mandatory-to-implement secure datagram transport. | |||
</t> | </t> | |||
</section> | </section> | |||
<section anchor="name-terminology" title="Terminology" numbered=" | <section anchor="terminology" numbered="true" toc="default"> | |||
true" toc="default"> | ||||
<t> | <name>Terminology</name> | |||
The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bc | <t> | |||
p14>", | The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", | |||
"<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", | "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL NOT</bcp14> | |||
"<bcp14>SHALL NOT</bcp14>", "<bcp14>SHOULD</bcp14>", | ", | |||
"<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>" | "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", | |||
, | "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>", | |||
"<bcp14>NOT RECOMMENDED</bcp14>", "<bcp14>MAY</bcp14>", a | "<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to | |||
nd | be | |||
"<bcp14>OPTIONAL</bcp14>" in this document are to be inte | interpreted as described in BCP 14 <xref target="RFC2119"/> <xref | |||
rpreted as | target="RFC8174"/> when, and only when, they appear in all capitals, as | |||
described in BCP 14 | shown here. | |||
[<xref target="RFC2119" format="default" sectionFormat="o | </t> | |||
f" derivedContent="RFC2119"/>] | ||||
[<xref target="RFC8174" format="default" sectionFormat="o | ||||
f" derivedContent="RFC8174"/>] | ||||
when, and only when, they appear in all capitals, as show | ||||
n here. | ||||
</t> | ||||
</section> | </section> | |||
<section anchor="reasons" title="Support for Updating" numbered=" | <section anchor="reasons" numbered="true" toc="default"> | |||
true" toc="default"> | <name>Support for Updating</name> | |||
<t> | <t> | |||
<xref target="draft-ietf-tls-rfc8447bis-09" /> generally reminds us that | <xref target="I-D.ietf-tls-rfc8447bis" /> generally remin ds us that | |||
cryptographic algorithms and parameters will be broken or weakened over time. | cryptographic algorithms and parameters will be broken or weakened over time. | |||
Blindly implementing the cryptographic algorithms listed in any specification | Blindly implementing the cryptographic algorithms listed in any specification | |||
is not advised. Implementers and users need to check that the cryptographic | is not advised. Implementers and users need to check that the cryptographic | |||
algorithms specified continue to provide the expected lev el of security. | algorithms specified continue to provide the expected lev el of security. | |||
</t><t> | </t><t> | |||
As the Syslog Working Group determined, Syslog clients an d servers | As the Syslog Working Group determined, syslog clients an d servers | |||
<bcp14>MUST</bcp14> use certificates as defined in <xref target="RFC5280" />. | <bcp14>MUST</bcp14> use certificates as defined in <xref target="RFC5280" />. | |||
Since both <xref target="RFC5425" /> and <xref target="RF C6012" /> | Since both <xref target="RFC5425" /> and <xref target="RF C6012" /> | |||
<bcp14>REQUIRED</bcp14> the use of TLS_RSA_WITH_AES_128_C BC_SHA, it is very | <bcp14>REQUIRED</bcp14> the use of TLS_RSA_WITH_AES_128_C BC_SHA, it is very | |||
likely that RSA certificates have been implemented in dev ices adhering to | likely that RSA certificates have been implemented in dev ices adhering to | |||
those specifications. <xref target="BCP195" /> notes that ECDHE cipher suites | those specifications. RFC 9325 <xref target="BCP195" /> n otes that ECDHE cipher suites | |||
exist for both RSA and ECDSA certificates, so moving to a n ECDHE cipher suite | exist for both RSA and ECDSA certificates, so moving to a n ECDHE cipher suite | |||
will not require replacing or moving away from any curren tly installed | will not require replacing or moving away from any curren tly installed | |||
RSA-based certificates. | RSA-based certificates. | |||
</t><t> | </t><t> | |||
<xref target="draft-ietf-tls-deprecate-obsolete-kex-04" / > documents that the | <xref target="I-D.ietf-tls-deprecate-obsolete-kex" /> doc uments that the | |||
cipher suite TLS_RSA_WITH_AES_128_CBC_SHA, along with som e other cipher suites, | cipher suite TLS_RSA_WITH_AES_128_CBC_SHA, along with som e other cipher suites, | |||
may require mitigation techniques to achieve expected sec urity, which may be | may require mitigation techniques to achieve expected sec urity, which may be | |||
difficult to effectively implement. Along those lines, | difficult to effectively implement. Along those lines, | |||
<xref target="BCP195" /> [<xref target="RFC9325" />] note | ||||
s that | RFC 9325 <xref target="BCP195" /> notes that | |||
TLS_RSA_WITH_AES_128_CBC_SHA does not provide forward sec recy, a feature that | TLS_RSA_WITH_AES_128_CBC_SHA does not provide forward sec recy, a feature that | |||
is highly desirable in securing event messages. That docu ment also goes on to | is highly desirable in securing event messages. That docu ment also goes on to | |||
recommend TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 as a ciph er suite that does | recommend TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 as a ciph er suite that does | |||
provide forward secrecy. | provide forward secrecy. | |||
</t><t> | </t><t> | |||
As such, the community is moving away from algorithms tha t do not provide | As such, the community is moving away from algorithms tha t do not provide | |||
forward secrecy. For example, the International Electrote chnical Commission | forward secrecy. For example, the International Electrote chnical Commission | |||
(IEC) has selected more robust suites such as | (IEC) has selected more robust suites such as | |||
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, which is also list ed as a | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, which is also list ed as a | |||
currently RECCOMENDED algorithm in | currently <bcp14>RECOMMENDED</bcp14> algorithm in | |||
<xref target="draft-ietf-tls-rfc8447bis-09" /> for their | <xref target="I-D.ietf-tls-rfc8447bis" /> for their deplo | |||
deployments of | yments of | |||
secure syslog. | secure syslog. | |||
</t><t> | </t><t> | |||
Additionally, <xref target="BCP195" /> | Additionally, RFC 8996 <xref target="BCP195" /> | |||
[<xref target="RFC8996" format="default" />] deprecates t | deprecates the use | |||
he use | of DTLS 1.0 <xref target="RFC4347" />, which is the manda | |||
of DTLS 1.0 <xref target="RFC4347" />, which is the manda | tory-to-implement | |||
tory to implement | transport protocol per <xref target="RFC6012" />. Therefo | |||
transport protocol for <xref target="RFC6012" />. Therefo | re, that transport | |||
re, the transport | protocol must be updated. | |||
protocol for <xref target="RFC6012" /> must be updated. | ||||
</t><t> | </t><t> | |||
Finally, <xref target="BCP195" /> (<xref target="RFC9325" | Finally, RFC 9325 <xref target="BCP195" /> provides | |||
/>) provides | guidance on the support of TLS 1.3 <xref target="RFC8446" | |||
guidance on the support of <xref target="RFC8446" /> and | /> and | |||
<xref target="RFC9147" />. | DTLS 1.3 <xref target="RFC9147" />. | |||
</t><t> | </t><t> | |||
Therefore, to maintain interoperability across implementa | Therefore, to maintain interoperability across implementa | |||
tions, the mandatory | tions, the mandatory-to-implement cipher suites listed in <xref target="RFC5425" | |||
to implement cipher suites listed in <xref target="RFC542 | /> and | |||
5" /> and | ||||
<xref target="RFC6012" /> should be updated so that imple mentations of secure | <xref target="RFC6012" /> should be updated so that imple mentations of secure | |||
syslog will still interoperate and provide an acceptable and expected level | syslog will still interoperate and provide an acceptable and expected level | |||
of security. | of security. | |||
</t><t> | </t> | |||
<t> | ||||
However, since there are many implementations of syslog u sing | However, since there are many implementations of syslog u sing | |||
the cipher suites mandatated to be used in <xref target=" | the cipher suites mandated by <xref target="RFC6012" />, | |||
RFC6012" />, a | a | |||
sudden change is not desireable. To accomodate a migratio | sudden change is not desirable. To accommodate a migratio | |||
n path, this | n path, | |||
specification will allow the use of both TLS_RSA_WITH_AES | TLS_RSA_WITH_AES_128_CBC_SHA or | |||
_128_CBC_SHA | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 may be used, but i | |||
and TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 but <bcp14>REQU | t | |||
IRES</bcp14> | is REQUIRED that TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 | |||
that TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 be preferred. | be preferred. | |||
</t> | </t> | |||
</section> | </section> | |||
<section anchor="updates5425" title="Updates to RFC 5425"> | <section anchor="updates5425"> | |||
<name>Updates to RFC 5425</name> | ||||
<t> | <t> | |||
The mandatory to implement cipher suites are <bcp14>REQUI RED</bcp14> | The mandatory-to-implement cipher suites are <bcp14>REQUI RED</bcp14> | |||
to be TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 and TLS_RSA_W ITH_AES_128_CBC_SHA. | to be TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 and TLS_RSA_W ITH_AES_128_CBC_SHA. | |||
</t><t> | </t><t> | |||
Implementations of <xref target="RFC5425" /> <bcp14>SHOUL D</bcp14> offer | Implementations of <xref target="RFC5425" /> <bcp14>SHOUL D</bcp14> offer | |||
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 but <bcp14>MAY</bcp 14> offer | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 but <bcp14>MAY</bcp 14> offer | |||
TLS_RSA_WITH_AES_128_CBC_SHA. | TLS_RSA_WITH_AES_128_CBC_SHA. | |||
</t><t> | </t><t> | |||
Implementations of <xref target="RFC5425" /> <bcp14>MUST< /bcp14> continue to | Implementations of <xref target="RFC5425" /> <bcp14>MUST< /bcp14> continue to | |||
use TLS 1.2 <xref target="RFC5246" /> as the mandatory to implement | use TLS 1.2 <xref target="RFC5246" /> as the mandatory-to -implement | |||
transport protocol. | transport protocol. | |||
</t><t> | </t> | |||
As per <xref target="BCP195" />, implementations of <xref | <t> | |||
target="RFC5425" /> | As per RFC 9325 <xref target="BCP195" />, implementations | |||
of <xref target="RFC5425" /> | ||||
<bcp14>SHOULD</bcp14> support TLS 1.3 <xref target="RFC84 46" /> and, if | <bcp14>SHOULD</bcp14> support TLS 1.3 <xref target="RFC84 46" /> and, if | |||
implemented, <bcp14>MUST</bcp14> prefer to negotiate TLS 1.3 | implemented, <bcp14>MUST</bcp14> prefer to negotiate TLS 1.3 | |||
over earlier versions of TLS. | over earlier versions of TLS. | |||
</t> | </t> | |||
</section> | </section> | |||
<section anchor="updates6012" title="Updates to RFC 6012"> | <section anchor="updates6012"> | |||
<name>Updates to RFC 6012</name> | ||||
<t> | <t> | |||
The mandatory to implement cipher suites are <bcp14>REQUI RED</bcp14> to be | The mandatory-to-implement cipher suites are <bcp14>REQUI RED</bcp14> to be | |||
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 and TLS_RSA_WITH_AE S_128_CBC_SHA. | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 and TLS_RSA_WITH_AE S_128_CBC_SHA. | |||
</t><t> | </t><t> | |||
Implementations of <xref target="RFC6012" /> <bcp14>SHOUL D</bcp14> offer | Implementations of <xref target="RFC6012" /> <bcp14>SHOUL D</bcp14> offer | |||
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 but <bcp14>MAY</bcp 14> offer | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 but <bcp14>MAY</bcp 14> offer | |||
TLS_RSA_WITH_AES_128_CBC_SHA. | TLS_RSA_WITH_AES_128_CBC_SHA. | |||
</t><t> | </t> | |||
As specified in <xref target="BCP195" />, implementations | <t> | |||
of | As specified in RFCs 8996 and 9325 <xref target="BCP195" | |||
/>, implementations of | ||||
<xref target="RFC6012" /> <bcp14>MUST NOT</bcp14> use DTL S 1.0 <xref target="RFC4347" />. | <xref target="RFC6012" /> <bcp14>MUST NOT</bcp14> use DTL S 1.0 <xref target="RFC4347" />. | |||
Implementations <bcp14>MUST</bcp14> use DTLS 1.2 <xref ta rget="RFC6347" />. | Implementations <bcp14>MUST</bcp14> use DTLS 1.2 <xref ta rget="RFC6347" />. | |||
</t><t> | </t><t> | |||
DTLS 1.2 <xref target="RFC6347" /> implementations <bcp14 >SHOULD</bcp14> support | DTLS 1.2 <xref target="RFC6347" /> implementations <bcp14 >SHOULD</bcp14> support | |||
and prefer the mandatory to implement cipher suite | and prefer the mandatory-to-implement cipher suite | |||
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256. | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256. | |||
</t><t> | </t><t> | |||
As per <xref target="BCP195" />, implementations of <xref target="RFC6012" /> | As per RFC 9325 <xref target="BCP195" />, implementations of <xref target="RFC6012" /> | |||
<bcp14>SHOULD</bcp14> support DTLS 1.3 <xref target="RFC9 147" /> and, if | <bcp14>SHOULD</bcp14> support DTLS 1.3 <xref target="RFC9 147" /> and, if | |||
implemented, <bcp14>MUST</bcp14> prefer to negotiate DTLS version 1.3 over | implemented, <bcp14>MUST</bcp14> prefer to negotiate DTLS version 1.3 over | |||
earlier versions of DTLS. | earlier versions of DTLS. | |||
</t> | </t> | |||
</section> | </section> | |||
<section anchor="earlyData" title="Early Data"> | <section anchor="earlyData"> | |||
<name>Early Data</name> | ||||
<t> | <t> | |||
Early data (aka 0-RTT data) is a mechanism defined in TLS 1.3 | Early data (aka 0-RTT data) is a mechanism defined in TLS 1.3 | |||
<xref target="RFC8446" /> that allows a client to send da ta ("early data") as | <xref target="RFC8446" /> that allows a client to send da ta ("early data") as | |||
part of the first flight of messages to a server. Early d ata is permitted by | part of the first flight of messages to a server. Early d ata is permitted by | |||
TLS 1.3 when the client and server share a PSK, either ob tained externally or | TLS 1.3 when the client and server share a PSK, either ob tained externally or | |||
via a previous handshake. The client uses the PSK to auth enticate the server | via a previous handshake. The client uses the PSK to auth enticate the server | |||
and to encrypt the early data. | and to encrypt the early data. | |||
</t><t> | </t><t> | |||
As noted in Section 2.3 of <xref target="draft-ietf-tls-r fc8446bis-09" />, the | As noted in <xref target="I-D.ietf-tls-rfc8446bis" sectio nFormat="of" section="2.3" />, the | |||
security properties for early data are weaker than those for subsequent | security properties for early data are weaker than those for subsequent | |||
TLS-protected data. In particular, early data is not for ward secret, and | TLS-protected data. In particular, early data is not for ward secret, and | |||
there are no protections against the replay of early data between | there are no protections against the replay of early data between | |||
connections. Appendix E.5 of <xref target="draft-ietf-tls | connections. <xref target="I-D.ietf-tls-rfc8446bis" secti | |||
-rfc8446bis-09" /> | onFormat="of" section="E.5" /> | |||
requires applications not use early data without a profil | requires that applications not use early data without a p | |||
e that defines its | rofile that defines its | |||
use. Because syslog does not support replay protection, s | use. Because syslog does not support replay protection (s | |||
ee Section 8.4 of | ee | |||
<xref target="RFC5424" />", and most implementations esta | <xref target="RFC5424" sectionFormat="of" section="8.4"/> | |||
blish a long-lived | ) and most implementations establish a long-lived | |||
connection, this document specifies that implementations MUST NOT use early | connection, this document specifies that implementations MUST NOT use early | |||
data. | data. | |||
</t> | </t> | |||
</section> | </section> | |||
<section anchor="notes" title="Authors Notes"> | ||||
<t> | ||||
This section will be removed prior to publication. | ||||
</t><t> | ||||
This is version -07 for the UTA Working Group. These edit | ||||
s reflect comments | ||||
from IESG review. | ||||
</t> | ||||
</section> | ||||
<section anchor="Acks" numbered="true" toc="default"> | ||||
<name>Acknowledgments</name> | ||||
<t>The authors would like to thank Arijit Kumar Bose, Ste | ||||
ffen Fries and the | ||||
members of IEC TC57 WG15 for their review, comments, and | ||||
suggestions. The | ||||
authors would also like to thank Tom Petch, Juergen Schoe | ||||
nwaelder, | ||||
Hannes Tschofenig, Viktor Dukhovni, and the IESG members | ||||
for their comments | ||||
and constructive feedback. | ||||
</t> | ||||
</section> | ||||
<section anchor="IANA" numbered="true" toc="default"> | <section anchor="IANA" numbered="true" toc="default"> | |||
<name>IANA Considerations</name> | <name>IANA Considerations</name> | |||
<t>This document makes no requests to IANA.</t> | <t>This document has no IANA actions.</t> | |||
</section> | </section> | |||
<section anchor="Security" numbered="true" toc="default"> | <section anchor="Security" numbered="true" toc="default"> | |||
<name>Security Considerations</name> | <name>Security Considerations</name> | |||
<t> | <t> | |||
<xref target="BCP195" /> deprecates an insecure DTLS tran | RFCs 8996 and 9325 <xref target="BCP195" /> deprecate an | |||
sport protocol | insecure DTLS transport protocol | |||
from <xref target="RFC6012" /> and deprecates insecure ci | from <xref target="RFC6012" /> and deprecate insecure cip | |||
pher suits from | her suites from | |||
<xref target="RFC5425" /> and <xref target="RFC6012" />. However, the | <xref target="RFC5425" /> and <xref target="RFC6012" />. However, the | |||
installed base of syslog implementations is not easily up dated to | installed base of syslog implementations is not easily up dated to | |||
immediately adhere to those changes. | immediately adhere to those changes. | |||
</t><t> | </t><t> | |||
This document updates the mandatory to implement cipher s uites to allow | This document updates the mandatory-to-implement cipher s uites to allow | |||
for a migration from TLS_RSA_WITH_AES_128_CBC_SHA to | for a migration from TLS_RSA_WITH_AES_128_CBC_SHA to | |||
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 without deprecating the former. | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 without deprecating the former. | |||
Implementations should prefer to use TLS_ECDHE_RSA_WITH_A ES_128_GCM_SHA256. | Implementations should prefer to use TLS_ECDHE_RSA_WITH_A ES_128_GCM_SHA256. | |||
</t><t> | </t><t> | |||
If a device currently only has TLS_RSA_WITH_AES_128_CBC_S HA, an | If a device currently only has TLS_RSA_WITH_AES_128_CBC_S HA, an | |||
administrator of the network should evaluate | administrator of the network should evaluate | |||
the conditions and determine if TLS_RSA_WITH_AES_128_CBC_ SHA should be allowed | the conditions and determine if TLS_RSA_WITH_AES_128_CBC_ SHA should be allowed | |||
so that syslog messages may continue to be delivered unti l the device is | so that syslog messages may continue to be delivered unti l the device is | |||
updated to have TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256. | updated to have TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256. | |||
</t> | </t> | |||
</section> | </section> | |||
</middle> | </middle> | |||
<!-- *****BACK MATTER ***** --> | ||||
<back> | <back> | |||
<displayreference target="I-D.ietf-tls-rfc8447bis" to="RFC8447bis"/> | ||||
<displayreference target="I-D.ietf-tls-deprecate-obsolete-kex" to="DEPRECATE- | ||||
KEX"/> | ||||
<displayreference target="I-D.ietf-tls-rfc8446bis" to="RFC8446bis"/> | ||||
<references> | <references> | |||
<name>References</name> | <name>References</name> | |||
<references> | <references> | |||
<name>Normative References</name> | <name>Normative References</name> | |||
<xi:include href='https://bib.ietf.org/public/rfc/bibxml/reference.RFC.21 | ||||
19.xml'/> | ||||
<xi:include href='https://bib.ietf.org/public/rfc/bibxml/reference.RFC.81 | ||||
74.xml'/> | ||||
<xi:include href='https://bib.ietf.org/public/rfc/bibxml/reference.RFC.54 | ||||
25.xml'/> | ||||
<xi:include href='https://bib.ietf.org/public/rfc/bibxml/reference.RFC.52 | ||||
46.xml'/> | ||||
<xi:include href='https://bib.ietf.org/public/rfc/bibxml/reference.RFC.54 | ||||
24.xml'/> | ||||
<xi:include href='https://bib.ietf.org/public/rfc/bibxml/reference.RFC.84 | ||||
46.xml'/> | ||||
<xi:include href='https://bib.ietf.org/public/rfc/bibxml/reference.RFC.63 | ||||
47.xml'/> | ||||
<xi:include href='https://bib.ietf.org/public/rfc/bibxml/reference.RFC.43 | ||||
47.xml'/> | ||||
<xi:include href='https://bib.ietf.org/public/rfc/bibxml/reference.RFC.60 | ||||
12.xml'/> | ||||
<xi:include href='https://bib.ietf.org/public/rfc/bibxml/reference.RFC.52 | ||||
80.xml'/> | ||||
<referencegroup anchor="BCP14" target="https://www.rfc-editor.org/info/bcp14"> | <referencegroup anchor="BCP195" target="https://www.rfc-editor.org/info/b | |||
<!-- reference.RFC.2119.xml --> | cp195"> | |||
<reference anchor='RFC2119' target='https://www.rfc-editor.org/info/rfc2119'> | <xi:include href='https://bib.ietf.org/public/rfc/bibxml/reference.RFC. | |||
<front> | 8996.xml'/> | |||
<title>Key words for use in RFCs to Indicate Requirement Levels</title> | <xi:include href='https://bib.ietf.org/public/rfc/bibxml/reference.RFC. | |||
<author initials='S.' surname='Bradner' fullname='S. Bradner'><organization /></ | 9325.xml'/> | |||
author> | </referencegroup> | |||
<date year='1997' month='March' /> | ||||
<abstract><t>In many standards track documents several words are used to signify | ||||
the requirements in the specification. These words are often capitalized. This | ||||
document defines these words as they should be interpreted in IETF documents. | ||||
This document specifies an Internet Best Current Practices for the Internet Comm | ||||
unity, and requests discussion and suggestions for improvements.</t></abstract> | ||||
</front> | ||||
<seriesInfo name='BCP' value='14'/> | ||||
<seriesInfo name='RFC' value='2119'/> | ||||
<seriesInfo name='DOI' value='10.17487/RFC2119'/> | ||||
</reference> | ||||
<!-- reference.RFC.8174.xml --> | ||||
<reference anchor='RFC8174' target='https://www.rfc-editor.org/info/rfc8174'> | ||||
<front> | ||||
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title> | ||||
<author initials='B.' surname='Leiba' fullname='B. Leiba'><organization /></auth | ||||
or> | ||||
<date year='2017' month='May' /> | ||||
<abstract><t>RFC 2119 specifies common key words that may be used in protocol s | ||||
pecifications. This document aims to reduce the ambiguity by clarifying that on | ||||
ly UPPERCASE usage of the key words have the defined special meanings.</t></abs | ||||
tract> | ||||
</front> | ||||
<seriesInfo name='BCP' value='14'/> | ||||
<seriesInfo name='RFC' value='8174'/> | ||||
<seriesInfo name='DOI' value='10.17487/RFC8174'/> | ||||
</reference> | ||||
</referencegroup> | ||||
<reference anchor='RFC5425' target='https://www.rfc-editor.org/info/rfc5425'> | ||||
<front> | ||||
<title>Transport Layer Security (TLS) Transport Mapping for Syslog</title> | ||||
<author initials='F.' surname='Miao' fullname='F. Miao' role='editor'><organizat | ||||
ion /></author> | ||||
<author initials='Y.' surname='Ma' fullname='Y. Ma' role='editor'><organization | ||||
/></author> | ||||
<author initials='J.' surname='Salowey' fullname='J. Salowey' role='editor'><org | ||||
anization /></author> | ||||
<date year='2009' month='March' /> | ||||
<abstract><t>This document describes the use of Transport Layer Security (TLS) t | ||||
o provide a secure connection for the transport of syslog messages. This documen | ||||
t describes the security threats to syslog and how TLS can be used to counter su | ||||
ch threats. [STANDARDS-TRACK]</t></abstract> | ||||
</front> | ||||
<seriesInfo name='RFC' value='5425'/> | ||||
<seriesInfo name='DOI' value='10.17487/RFC5425'/> | ||||
</reference> | ||||
<reference anchor='RFC5246' target='https://www.rfc-editor.org/info/rfc5246'> | ||||
<front> | ||||
<title>The Transport Layer Security (TLS) Protocol Version 1.2</title> | ||||
<author initials='T.' surname='Dierks' fullname='T. Dierks'><organization /></au | ||||
thor> | ||||
<author initials='E.' surname='Rescorla' fullname='E. Rescorla'><organization /> | ||||
</author> | ||||
<date year='2008' month='August' /> | ||||
<abstract><t>This document specifies Version 1.2 of the Transport Layer Security | ||||
(TLS) protocol. The TLS protocol provides communications security over the Int | ||||
ernet. The protocol allows client/server applications to communicate in a way t | ||||
hat is designed to prevent eavesdropping, tampering, or message forgery. [STAND | ||||
ARDS-TRACK]</t></abstract> | ||||
</front> | ||||
<seriesInfo name='RFC' value='5246'/> | ||||
<seriesInfo name='DOI' value='10.17487/RFC5246'/> | ||||
</reference> | ||||
<reference anchor='RFC5424'> | ||||
<front> | ||||
<title>The Syslog Protocol</title> | ||||
<author initials='R.' surname='Gerhards' fullname='R. Gerhards'> | ||||
<organization /></author> | ||||
<date year='2009' month='March' /> | ||||
<abstract> | ||||
<t>This document describes the syslog protocol, which is used to convey event | ||||
notification messages. This protocol utilizes a layered architecture, which allo | ||||
ws the | ||||
use of any number of transport protocols for transmission of syslog messages. It | ||||
also | ||||
provides a message format that allows vendor-specific extensions to be provided | ||||
in a | ||||
structured way.</t><t> This document has been written with the original de | ||||
sign | ||||
goals for traditional syslog in mind. The need for a new layered specification h | ||||
as | ||||
arisen because standardization efforts for reliable and secure syslog extensions | ||||
suffer | ||||
from the lack of a Standards-Track and transport-independent RFC. Without this d | ||||
ocument, | ||||
each other standard needs to define its own syslog packet format and transport m | ||||
echanism, | ||||
which over time will introduce subtle compatibility issues. This document tries | ||||
to | ||||
provide a foundation that syslog extensions can build on. This layered architect | ||||
ure | ||||
approach also provides a solid basis that allows code to be written once for eac | ||||
h syslog | ||||
feature rather than once for each transport. [STANDARDS-TRACK]</t></abstract></f | ||||
ront> | ||||
<seriesInfo name='RFC' value='5424' /> | ||||
<format type='TXT' octets='85162' target='http://www.rfc-editor.org/rfc/rfc5424. | ||||
txt' /> | ||||
</reference> | ||||
<reference anchor='RFC8446' target='https://www.rfc-editor.org/info/rfc8446'> | ||||
<front> | ||||
<title>The Transport Layer Security (TLS) Protocol Version 1.3</title> | ||||
<author initials='E.' surname='Rescorla' fullname='E. Rescorla'><organization /> | ||||
</author> | ||||
<date year='2018' month='August' /> | ||||
<abstract><t>This document specifies version 1.3 of the Transport Layer Security | ||||
(TLS) protocol. TLS allows client/server applications to communicate over the | ||||
Internet in a way that is designed to prevent eavesdropping, tampering, and mess | ||||
age forgery.</t><t>This document updates RFCs 5705 and 6066, and obsoletes RFCs | ||||
5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 | ||||
implementations.</t></abstract> | ||||
</front> | ||||
<seriesInfo name='RFC' value='8446'/> | ||||
<seriesInfo name='DOI' value='10.17487/RFC8446'/> | ||||
</reference> | ||||
<reference anchor='RFC6347' target='https://www.rfc-editor.org/info/rfc6347'> | ||||
<front> | ||||
<title>Datagram Transport Layer Security Version 1.2</title> | ||||
<author initials='E.' surname='Rescorla' fullname='E. Rescorla'><organization /> | ||||
</author> | ||||
<author initials='N.' surname='Modadugu' fullname='N. Modadugu'><organization /> | ||||
</author> | ||||
<date year='2012' month='January' /> | ||||
<abstract><t>This document specifies version 1.2 of the Datagram Transport Layer | ||||
Security (DTLS) protocol. The DTLS protocol provides communications privacy fo | ||||
r datagram protocols. The protocol allows client/server applications to communi | ||||
cate in a way that is designed to prevent eavesdropping, tampering, or message f | ||||
orgery. The DTLS protocol is based on the Transport Layer Security (TLS) protoc | ||||
ol and provides equivalent security guarantees. Datagram semantics of the under | ||||
lying transport are preserved by the DTLS protocol. This document updates DTLS | ||||
1.0 to work with TLS version 1.2. [STANDARDS-TRACK]</t></abstract> | ||||
</front> | ||||
<seriesInfo name='RFC' value='6347'/> | ||||
<seriesInfo name='DOI' value='10.17487/RFC6347'/> | ||||
</reference> | ||||
<reference anchor='RFC4347' target='https://www.rfc-editor.org/info/rfc4347'> | ||||
<front> | ||||
<title>Datagram Transport Layer Security</title> | ||||
<author initials='E.' surname='Rescorla' fullname='E. Rescorla'><organization /> | ||||
</author> | ||||
<author initials='N.' surname='Modadugu' fullname='N. Modadugu'><organization /> | ||||
</author> | ||||
<date year='2006' month='April' /> | ||||
<abstract><t>This document specifies Version 1.0 of the Datagram Transport Layer | ||||
Security (DTLS) protocol. The DTLS protocol provides communications privacy fo | ||||
r datagram protocols. The protocol allows client/server applications to communi | ||||
cate in a way that is designed to prevent eavesdropping, tampering, or message f | ||||
orgery. The DTLS protocol is based on the Transport Layer Security (TLS) protoc | ||||
ol and provides equivalent security guarantees. Datagram semantics of the under | ||||
lying transport are preserved by the DTLS protocol.</t></abstract> | ||||
</front> | ||||
<seriesInfo name='RFC' value='4347'/> | ||||
<seriesInfo name='DOI' value='10.17487/RFC4347'/> | ||||
</reference> | ||||
<reference anchor='RFC6012' target='https://www.rfc-editor.org/info/rfc6012'> | ||||
<front> | ||||
<title>Datagram Transport Layer Security (DTLS) Transport Mapping for Syslog</ti | ||||
tle> | ||||
<author initials='J.' surname='Salowey' fullname='J. Salowey'><organization /></ | ||||
author> | ||||
<author initials='T.' surname='Petch' fullname='T. Petch'><organization /></auth | ||||
or> | ||||
<author initials='R.' surname='Gerhards' fullname='R. Gerhards'><organization /> | ||||
</author> | ||||
<author initials='H.' surname='Feng' fullname='H. Feng'><organization /></author | ||||
> | ||||
<date year='2010' month='October' /> | ||||
<abstract><t>This document describes the transport of syslog messages over the D | ||||
atagram Transport Layer Security (DTLS) protocol. It provides a secure transpor | ||||
t for syslog messages in cases where a connectionless transport is desired. [ST | ||||
ANDARDS-TRACK]</t></abstract> | ||||
</front> | ||||
<seriesInfo name='RFC' value='6012'/> | ||||
<seriesInfo name='DOI' value='10.17487/RFC6012'/> | ||||
</reference> | ||||
<reference anchor='RFC5280' target='https://www.rfc-editor.org/info/rfc5280'> | ||||
<front> | ||||
<title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revo | ||||
cation List (CRL) Profile</title> | ||||
<author initials='D.' surname='Cooper' fullname='D. Cooper'><organization /></au | ||||
thor> | ||||
<author initials='S.' surname='Santesson' fullname='S. Santesson'><organization | ||||
/></author> | ||||
<author initials='S.' surname='Farrell' fullname='S. Farrell'><organization /></ | ||||
author> | ||||
<author initials='S.' surname='Boeyen' fullname='S. Boeyen'><organization /></au | ||||
thor> | ||||
<author initials='R.' surname='Housley' fullname='R. Housley'><organization /></ | ||||
author> | ||||
<author initials='W.' surname='Polk' fullname='W. Polk'><organization /></author | ||||
> | ||||
<date year='2008' month='May' /> | ||||
<abstract><t>This memo profiles the X.509 v3 certificate and X.509 v2 certificat | ||||
e revocation list (CRL) for use in the Internet. An overview of this approach a | ||||
nd model is provided as an introduction. The X.509 v3 certificate format is des | ||||
cribed in detail, with additional information regarding the format and semantics | ||||
of Internet name forms. Standard certificate extensions are described and two | ||||
Internet-specific extensions are defined. A set of required certificate extensi | ||||
ons is specified. The X.509 v2 CRL format is described in detail along with sta | ||||
ndard and Internet-specific extensions. An algorithm for X.509 certification pa | ||||
th validation is described. An ASN.1 module and examples are provided in the ap | ||||
pendices. [STANDARDS-TRACK]</t></abstract> | ||||
</front> | ||||
<seriesInfo name='RFC' value='5280'/> | ||||
<seriesInfo name='DOI' value='10.17487/RFC5280'/> | ||||
</reference> | ||||
<referencegroup anchor="BCP195" target="https://www.rfc-editor.org/info/bcp195"> | ||||
<reference anchor='RFC8996' target='https://www.rfc-editor.org/info/rfc8996'> | ||||
<front> | ||||
<title>Deprecating TLS 1.0 and TLS 1.1</title> | ||||
<author initials='K.' surname='Moriarty' fullname='K. Moriarty'><organization /> | ||||
</author> | ||||
<author initials='S.' surname='Farrell' fullname='S. Farrell'><organization /></ | ||||
author> | ||||
<date year='2021' month='March' /> | ||||
<abstract><t>This document formally deprecates Transport Layer Security (TLS) ve | ||||
rsions 1.0 (RFC 2246) and 1.1 (RFC 4346). Accordingly, those documents have been | ||||
moved to Historic status. These versions lack support for current and recommend | ||||
ed cryptographic algorithms and mechanisms, and various government and industry | ||||
profiles of applications using TLS now mandate avoiding these old TLS versions. | ||||
TLS version 1.2 became the recommended version for IETF protocols in 2008 (subse | ||||
quently being obsoleted by TLS version 1.3 in 2018), providing sufficient time t | ||||
o transition away from older versions. Removing support for older versions from | ||||
implementations reduces the attack surface, reduces opportunity for misconfigura | ||||
tion, and streamlines library and product maintenance. </t><t>This document also | ||||
deprecates Datagram TLS (DTLS) version 1.0 (RFC 4347) but not DTLS version 1.2, | ||||
and there is no DTLS version 1.1.</t><t>This document updates many RFCs that no | ||||
rmatively refer to TLS version 1.0 or TLS version 1.1, as described herein. This | ||||
document also updates the best practices for TLS usage in RFC 7525; hence, it i | ||||
s part of BCP 195.</t></abstract> | ||||
</front> | ||||
<seriesInfo name='BCP' value='195'/> | ||||
<seriesInfo name='RFC' value='8996'/> | ||||
<seriesInfo name='DOI' value='10.17487/RFC8996'/> | ||||
</reference> | ||||
<reference anchor="RFC9325" target="https://www.rfc-editor.org/info/rfc9325"> | ||||
<front> | ||||
<title>Recommendations for Secure Use of Transport Layer Security (TLS) and | ||||
Datagram Transport Layer Security (DTLS)</title> | ||||
<author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/> | ||||
<author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/> | ||||
<author fullname="T. Fossati" initials="T." surname="Fossati"/> | ||||
<date month="November" year="2022"/> | ||||
<abstract> | ||||
<t>Transport Layer Security (TLS) and Datagram Transport Layer Security (D | ||||
TLS) are used to protect data exchanged over a wide range of application protoco | ||||
ls and can also form the basis for secure transport protocols. Over the years, t | ||||
he industry has witnessed several serious attacks on TLS and DTLS, including att | ||||
acks on the most commonly used cipher suites and their modes of operation. This | ||||
document provides the latest recommendations for ensuring the security of deploy | ||||
ed services that use TLS and DTLS. These recommendations are applicable to the m | ||||
ajority of use cases.</t> | ||||
<t>RFC 7525, an earlier version of the TLS recommendations, was published | ||||
when the industry was transitioning to TLS 1.2. Years later, this transition is | ||||
largely complete, and TLS 1.3 is widely available. This document updates the gui | ||||
dance given the new environment and obsoletes RFC 7525. In addition, this docume | ||||
nt updates RFCs 5288 and 6066 in view of recent attacks.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="BCP" value="195"/> | ||||
<seriesInfo name="RFC" value="9325"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC9325"/> | ||||
</reference> | ||||
</referencegroup> | ||||
<reference anchor='RFC9147' target='https://www.rfc-editor.org/info/rfc9147'> | <xi:include href='https://bib.ietf.org/public/rfc/bibxml/reference.RFC.91 | |||
<front> | 47.xml'/> | |||
<title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title> | ||||
<author initials='E.' surname='Rescorla' fullname='E. Rescorla'><organization /> | ||||
</author> | ||||
<author initials='H.' surname='Tschofenig' fullname='H. Tschofenig'><organizatio | ||||
n /></author> | ||||
<author initials='N.' surname='Modadugu' fullname='N. Modadugu'><organization /> | ||||
</author> | ||||
<date year='2022' month='April' /> | ||||
<abstract><t>This document specifies version 1.3 of the Datagram Transport Layer | ||||
Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communic | ||||
ate over | ||||
the Internet in a way that is designed to prevent eavesdropping, tampering, and | ||||
message | ||||
forgery. | ||||
</t><t> | ||||
The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protoco | ||||
l and | ||||
provides equivalent security guarantees with the exception of order | ||||
protection / non-replayability. Datagram semantics of the underlying transport | ||||
are | ||||
preserved by the DTLS protocol.</t><t>This document obsoletes RFC 6347. | ||||
</t></abstract> | ||||
</front> | ||||
<seriesInfo name='RFC' value='9147'/> | ||||
<seriesInfo name='DOI' value='10.17487/RFC9147'/> | ||||
</reference> | ||||
</references> | </references> | |||
<references> | <references> | |||
<name>Informative References</name> | <name>Informative References</name> | |||
<reference anchor="draft-ietf-tls-rfc8447bis-09"> | <!-- [I-D.ietf-tls-rfc8447bis] IESG state: I-D Exists --> | |||
<front> | <xi:include href="https://datatracker.ietf.org/doc/bibxml3/reference.I-D. | |||
<title>IANA Registry Updates for TLS and DTLS</title> | ietf-tls-rfc8447bis"/> | |||
<author fullname="Joseph A. Salowey" initials="J. A." surname="Salowey"> | ||||
<organization>Venafi</organization> | ||||
</author> | ||||
<author fullname="Sean Turner" initials="S." surname="Turner"> | ||||
<organization>sn3rd</organization> | ||||
</author> | ||||
<date day="28" month="March" year="2023"/> | ||||
<abstract> | ||||
<t>This document updates the changes to TLS and DTLS IANA registries made | ||||
in RFC 8447. It adds a new value "D" for discouraged to the recommended column o | ||||
f the selected TLS registries. This document updates the following RFCs: 3749, 5 | ||||
077, 4680, 5246, 5705, 5878, 6520, 7301, and 8447.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8447bis-09"/> | ||||
</reference> | ||||
<reference anchor="draft-ietf-tls-deprecate-obsolete-kex-04" target="https://www | <!-- [I-D.ietf-tls-deprecate-obsolete-kex] IESG state: AD Evaluation::External P | |||
.ietf.org/archive/id/draft-ietf-tls-deprecate-obsolete-kex-04.txt"> | arty --> | |||
<front> | <xi:include href="https://datatracker.ietf.org/doc/bibxml3/reference.I-D. | |||
<title>Deprecating Obsolete Key Exchange Methods in TLS</title> | ietf-tls-deprecate-obsolete-kex"/> | |||
<author fullname="Carrick Bartle" initials="C." surname="Bartle"> | ||||
<organization>Apple, Inc.</organization> | ||||
</author> | ||||
<author fullname="Nimrod Aviram" initials="N." surname="Aviram"/> | ||||
<date day="11" month="July" year="2023"/> | ||||
<abstract> | ||||
<t>This document makes several prescriptions regarding the following key e | ||||
xchange methods in TLS, most of which have been superseded by better options:</t | ||||
> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="Internet-Draft" value="draft-ietf-tls-deprecate-obsolete-kex | ||||
-04"/> | ||||
<format target="https://www.ietf.org/archive/id/draft-ietf-tls-deprecate-obsol | ||||
ete-kex-04.txt" type="TXT"/> | ||||
</reference> | ||||
<reference anchor="draft-ietf-tls-rfc8446bis-09" target="https://www.ietf.org/ar | <!--[I-D.ietf-tls-rfc8446bis] IESG state: I-D Exists --> | |||
chive/id/draft-ietf-tls-rfc8446bis-09.txt"> | <xi:include href="https://datatracker.ietf.org/doc/bibxml3/reference.I-D. | |||
<front> | ietf-tls-rfc8446bis"/> | |||
<title>The Transport Layer Security (TLS) Protocol Version 1.3</title> | ||||
<author fullname="Eric Rescorla" initials="E." surname="Rescorla"> | ||||
<organization>Mozilla</organization> | ||||
</author> | ||||
<date day="7" month="July" year="2023"/> | ||||
<abstract> | ||||
<t>This document specifies version 1.3 of the Transport Layer Security (TL | ||||
S) protocol. TLS allows client/server applications to communicate over the Inter | ||||
net in a way that is designed to prevent eavesdropping, tampering, and message f | ||||
orgery. This document updates RFCs 5705, 6066, 7627, and 8422 and obsoletes RFCs | ||||
5077, 5246, 6961, and 8446. This document also specifies new requirements for T | ||||
LS 1.2 implementations.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8446bis-09"/> | ||||
<format target="https://www.ietf.org/archive/id/draft-ietf-tls-rfc8446bis-09.t | ||||
xt" type="TXT"/> | ||||
</reference> | ||||
</references> | </references> | |||
</references> | </references> | |||
<section anchor="Acks" numbered="false" toc="default"> | ||||
<name>Acknowledgments</name> | ||||
<t>The authors would like to thank <contact fullname="Ari | ||||
jit Kumar Bose"/>, <contact fullname="Steffen Fries"/>, and the | ||||
members of IEC TC57 WG15 for their review, comments, and | ||||
suggestions. The | ||||
authors would also like to thank <contact fullname="Tom P | ||||
etch"/>, <contact fullname="Juergen Schoenwaelder"/>, | ||||
<contact fullname="Hannes Tschofenig"/>, <contact fullnam | ||||
e="Viktor Dukhovni"/>, and the IESG members for their comments | ||||
and constructive feedback. | ||||
</t> | ||||
</section> | ||||
</back> | </back> | |||
</rfc> | </rfc> | |||
End of changes. 56 change blocks. | ||||
556 lines changed or deleted | 198 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. |