<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 3.1.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-dhody-pce-pceps-tls13-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.15.1 -->
  <front>
    <title abbrev="PCEPS-with-TLS1.3">PCEPS with TLS 1.3</title>
    <seriesInfo name="Internet-Draft" value="draft-dhody-pce-pceps-tls13-01"/>
    <author initials="D." surname="Dhody" fullname="Dhruv Dhody">
      <organization>Huawei Technologies</organization>
      <address>
        <email>dhruv.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="S." surname="Turner" fullname="Sean Turner">
      <organization>sn3rd</organization>
      <address>
        <email>sean@sn3rd.com</email>
      </address>
    </author>
    <author initials="R." surname="Housley" fullname="Russ Housley">
      <organization abbrev="Vigil Security">Vigil Security, LLC</organization>
      <address>
        <postal>
          <street>516 Dranesville Road</street>
          <city>Herndon, VA</city>
          <code>20170</code>
          <country>US</country>
        </postal>
        <email>housley@vigilsec.com</email>
      </address>
    </author>
    <date year="2022" month="October" day="20"/>
    <area>Routing</area>
    <workgroup>PCE</workgroup>
    <keyword>PCEP</keyword>
    <keyword>PCEPS</keyword>
    <keyword>TLS 1.3</keyword>
    <abstract>
      <t>RFC 8253 defines how to protect PCEP messages with TLS 1.2.
This document describes how to protect PCEP messages with TLS 1.3.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Path Computation Element Working Group mailing list (pce@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/pce/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/dhruvdhody/draft-dhody-pce-pceps-tls13"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t><xref target="RFC8253"/> defines how to protect PCEP messages <xref target="RFC5440"/> with
TLS 1.2 <xref target="RFC5246"/>. This document describes defines how to protect
PCEP messages with TLS 1.3 <xref target="I-D.ietf-tls-rfc8446bis"/>.</t>
      <t>[Editor's Note: The reference to <xref target="I-D.ietf-tls-rfc8446bis"/> could be
changed to RFC 8446 incase the progress of the bis draft is slower than the
progression of this document.]</t>
      <t>This document addresses cipher suites and the use of early data, which is also
known as 0-RTT data. All other provisions set forth
in <xref target="RFC8253"/> are unchanged, including connection initiation, message framing,
connection closure, certificate validation, peer identity, and failure handling.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="early-data">
      <name>Early Data</name>
      <t>Early data (aka 0-RTT data) is a mechanism defined in TLS 1.3
<xref target="I-D.ietf-tls-rfc8446bis"/> that allows a client to send data ("early data")
as part of the first flight of messages to a server. Note that
TLS 1.3 can be used without early data as per
<xref section="F.5" sectionFormat="of" target="I-D.ietf-tls-rfc8446bis"/>.
In fact, early data is permitted by TLS 1.3 only when the client and server
share a Pre-Shared Key (PSK), either obtained
externally or via a previous handshake. The client uses the PSK to
authenticate the server and to encrypt the early data.</t>
      <t>As noted in <xref section="2.3" sectionFormat="of" target="I-D.ietf-tls-rfc8446bis"/>, the security
properties for early data are weaker than those for subsequent TLS-protected
data. In particular, early data is not forward secret, and there is no
protection against the replay of early data between connections.
<xref section="E.5" sectionFormat="of" target="I-D.ietf-tls-rfc8446bis"/> requires applications not
use early data without a profile that defines its use. This document
specifies that PCEPS implementations that support TLS 1.3 <bcp14>MUST NOT</bcp14> use early data.</t>
    </section>
    <section anchor="cipher-suites">
      <name>Cipher Suites</name>
      <t>Implementations that support TLS 1.3 <xref target="I-D.ietf-tls-rfc8446bis"/>
are <bcp14>REQUIRED</bcp14> to support the mandatory-to-implement cipher
suites listed in <xref section="9.1" sectionFormat="of" target="I-D.ietf-tls-rfc8446bis"/>.</t>
      <t>Implementations that support TLS 1.3 <bcp14>MAY</bcp14> implement additional TLS
cipher suites that provide mutual authentication and confidentiality,
which are required for PCEP.</t>
      <t>PCEPS Implementations <bcp14>SHOULD</bcp14> follow the recommendations given in
<xref target="I-D.ietf-uta-rfc7525bis"/>.</t>
      <artwork><![CDATA[
So, this is what {{Section 9.1 of I-D.ietf-tls-rfc8446bis}} says:

  A TLS-compliant application MUST implement the TLS_AES_128_GCM_SHA256
  [GCM] cipher suite and SHOULD implement the TLS_AES_256_GCM_SHA384
  [GCM] and TLS_CHACHA20_POLY1305_SHA256 [RFC8439] cipher suites (see
  Appendix B.4).

  A TLS-compliant application MUST support digital signatures with
  rsa_pkcs1_sha256 (for certificates), rsa_pss_rsae_sha256 (for
  CertificateVerify and certificates), and ecdsa_secp256r1_sha256.  A
  TLS-compliant application MUST support key exchange with secp256r1
  (NIST P-256) and SHOULD support key exchange with X25519 [RFC7748].

Is there any reason to narrow the algorithm choices?

My guess is not.  These ought to be available in all TLS libraries.
]]></artwork>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The Security Considerations in TLS 1.3 are specified in <xref target="I-D.ietf-tls-rfc8446bis"/>.</t>
      <t>The recommendations regarding Diffie-Hellman exponent reuse
are specified in <xref section="7.4" sectionFormat="of" target="I-D.ietf-uta-rfc7525bis"/>.</t>
      <t>The key Security Considerations for PCEP are described in <xref target="RFC5440"/>,
<xref target="RFC8231"/>, <xref target="RFC8281"/>, and <xref target="RFC8283"/>.</t>
      <t>The Path Computation Element (PCE) defined in <xref target="RFC4655"/> is an entity
that is capable of computing a network path or route based on a
network graph, and applying computational constraints.  A Path
Computation Client (PCC) may make requests to a PCE for paths to be
computed. PCEP is the communication protocol between a PCC and PCE and is
defined in <xref target="RFC5440"/>. Stateful PCE <xref target="RFC8231"/> specifies a set of extensions to PCEP to
enable control of TE-LSPs by a PCE that retains the state of the LSPs
provisioned in the network (a stateful PCE).  <xref target="RFC8281"/> describes the
setup, maintenance, and teardown of LSPs initiated by a stateful PCE
without the need for local configuration on the PCC, thus allowing
for a dynamic network that is centrally controlled.  <xref target="RFC8283"/>
introduces the architecture for PCE as a central controller</t>
      <t>TLS 1.3 mutual authentication is used
to ensure that only authorized users and systems are able to send and receive
PCEP messages. To this end, neither the PCC nor the PCE
should establish a PCEPS with TLS 1.3 connection with an unknown,
unexpected, or incorrectly identified peer; see <xref section="3.5" sectionFormat="of" target="RFC5440"/>. If
deployments make use of a trusted list of Certification Authority (CA)
certificates <xref target="RFC5280"/>, then the listed CAs should only issue certificates
to parties that are authorized to access the PCE. Doing otherwise
will allow certificates that were issued for other purposes to be
inappropriately accepted by a PCE.</t>
      <t>The recommendations regarding certificate revocation checking
are specified in <xref section="7.5" sectionFormat="of" target="I-D.ietf-uta-rfc7525bis"/>.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>There are no IANA considerations.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC8253">
          <front>
            <title>PCEPS: Usage of TLS to Provide a Secure Transport for the Path Computation Element Communication Protocol (PCEP)</title>
            <author fullname="D. Lopez" initials="D." surname="Lopez">
              <organization/>
            </author>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios">
              <organization/>
            </author>
            <author fullname="Q. Wu" initials="Q." surname="Wu">
              <organization/>
            </author>
            <author fullname="D. Dhody" initials="D." surname="Dhody">
              <organization/>
            </author>
            <date month="October" year="2017"/>
            <abstract>
              <t>The Path Computation Element Communication Protocol (PCEP) defines the mechanisms for the communication between a Path Computation Client (PCC) and a Path Computation Element (PCE), or among PCEs. This document describes PCEPS -- the usage of Transport Layer Security (TLS) to provide a secure transport for PCEP.  The additional security mechanisms are provided by the transport protocol supporting PCEP; therefore, they do not affect the flexibility and extensibility of PCEP.</t>
              <t>This document updates RFC 5440 in regards to the PCEP initialization phase procedures.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8253"/>
          <seriesInfo name="DOI" value="10.17487/RFC8253"/>
        </reference>
        <reference anchor="RFC5440">
          <front>
            <title>Path Computation Element (PCE) Communication Protocol (PCEP)</title>
            <author fullname="JP. Vasseur" initials="JP." role="editor" surname="Vasseur">
              <organization/>
            </author>
            <author fullname="JL. Le Roux" initials="JL." role="editor" surname="Le Roux">
              <organization/>
            </author>
            <date month="March" year="2009"/>
            <abstract>
              <t>This document specifies the Path Computation Element (PCE) Communication Protocol (PCEP) for communications between a Path Computation Client (PCC) and a PCE, or between two PCEs.  Such interactions include path computation requests and path computation replies as well as notifications of specific states related to the use of a PCE in the context of Multiprotocol Label Switching (MPLS) and Generalized MPLS (GMPLS) Traffic Engineering.  PCEP is designed to be flexible and extensible so as to easily allow for the addition of further messages and objects, should further requirements be expressed in the future.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5440"/>
          <seriesInfo name="DOI" value="10.17487/RFC5440"/>
        </reference>
        <reference anchor="I-D.ietf-tls-rfc8446bis">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Mozilla</organization>
            </author>
            <date day="7" month="March" year="2022"/>
            <abstract>
              <t>   This document specifies version 1.3 of the Transport Layer Security
   (TLS) protocol.  TLS allows client/server applications to communicate
   over the Internet in a way that is designed to prevent eavesdropping,
   tampering, and message forgery.

   This document updates RFCs 5705, 6066, 7627, and 8422 and obsoletes
   RFCs 5077, 5246, 6961, and 8446.  This document also specifies new
   requirements for TLS 1.2 implementations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8446bis-04"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="I-D.ietf-uta-rfc7525bis">
          <front>
            <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Yaron Sheffer" initials="Y." surname="Sheffer">
              <organization>Intuit</organization>
            </author>
            <author fullname="Peter Saint-Andre" initials="P." surname="Saint-Andre">
              <organization>independent</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>arm</organization>
            </author>
            <date day="16" month="August" year="2022"/>
            <abstract>
              <t>   Transport Layer Security (TLS) and Datagram Transport Layer Security
   (DTLS) are used to protect data exchanged over a wide range of
   application protocols, and can also form the basis for secure
   transport protocols.  Over the years, the industry has witnessed
   several serious attacks on TLS and DTLS, including attacks on the
   most commonly used cipher suites and their modes of operation.  This
   document provides the latest recommendations for ensuring the
   security of deployed services that use TLS and DTLS.  These
   recommendations are applicable to the majority of use cases.

   An earlier version of this document was published as RFC 7525 when
   the industry was in the midst of its transition to TLS 1.2.  Years
   later this transition is largely complete and TLS 1.3 is widely
   available.  This document updates the guidance given the new
   environment and obsoletes RFC 7525.  In addition, the document
   updates RFC 5288 and RFC 6066 in view of recent attacks.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-uta-rfc7525bis-11"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper">
              <organization/>
            </author>
            <author fullname="S. Santesson" initials="S." surname="Santesson">
              <organization/>
            </author>
            <author fullname="S. Farrell" initials="S." surname="Farrell">
              <organization/>
            </author>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen">
              <organization/>
            </author>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <author fullname="W. Polk" initials="W." surname="Polk">
              <organization/>
            </author>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet.  An overview of this approach and model is provided as an introduction.  The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms.  Standard certificate extensions are described and two Internet-specific extensions are defined.  A set of required certificate extensions is specified.  The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions.  An algorithm for X.509 certification path validation is described.  An ASN.1 module and examples are provided in the appendices.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC5246">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks">
              <organization/>
            </author>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol.  The TLS protocol provides communications security over the Internet.  The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="RFC8231">
          <front>
            <title>Path Computation Element Communication Protocol (PCEP) Extensions for Stateful PCE</title>
            <author fullname="E. Crabbe" initials="E." surname="Crabbe">
              <organization/>
            </author>
            <author fullname="I. Minei" initials="I." surname="Minei">
              <organization/>
            </author>
            <author fullname="J. Medved" initials="J." surname="Medved">
              <organization/>
            </author>
            <author fullname="R. Varga" initials="R." surname="Varga">
              <organization/>
            </author>
            <date month="September" year="2017"/>
            <abstract>
              <t>The Path Computation Element Communication Protocol (PCEP) provides mechanisms for Path Computation Elements (PCEs) to perform path computations in response to Path Computation Client (PCC) requests.</t>
              <t>Although PCEP explicitly makes no assumptions regarding the information available to the PCE, it also makes no provisions for PCE control of timing and sequence of path computations within and across PCEP sessions.  This document describes a set of extensions to PCEP to enable stateful control of MPLS-TE and GMPLS Label Switched Paths (LSPs) via PCEP.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8231"/>
          <seriesInfo name="DOI" value="10.17487/RFC8231"/>
        </reference>
        <reference anchor="RFC8281">
          <front>
            <title>Path Computation Element Communication Protocol (PCEP) Extensions for PCE-Initiated LSP Setup in a Stateful PCE Model</title>
            <author fullname="E. Crabbe" initials="E." surname="Crabbe">
              <organization/>
            </author>
            <author fullname="I. Minei" initials="I." surname="Minei">
              <organization/>
            </author>
            <author fullname="S. Sivabalan" initials="S." surname="Sivabalan">
              <organization/>
            </author>
            <author fullname="R. Varga" initials="R." surname="Varga">
              <organization/>
            </author>
            <date month="December" year="2017"/>
            <abstract>
              <t>The Path Computation Element Communication Protocol (PCEP) provides mechanisms for Path Computation Elements (PCEs) to perform path computations in response to Path Computation Client (PCC) requests.</t>
              <t>The extensions for stateful PCE provide active control of Multiprotocol Label Switching (MPLS) Traffic Engineering Label Switched Paths (TE LSPs) via PCEP, for a model where the PCC delegates control over one or more locally configured LSPs to the PCE.  This document describes the creation and deletion of PCE-initiated LSPs under the stateful PCE model.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8281"/>
          <seriesInfo name="DOI" value="10.17487/RFC8281"/>
        </reference>
        <reference anchor="RFC8283">
          <front>
            <title>An Architecture for Use of PCE and the PCE Communication Protocol (PCEP) in a Network with Central Control</title>
            <author fullname="A. Farrel" initials="A." role="editor" surname="Farrel">
              <organization/>
            </author>
            <author fullname="Q. Zhao" initials="Q." role="editor" surname="Zhao">
              <organization/>
            </author>
            <author fullname="Z. Li" initials="Z." surname="Li">
              <organization/>
            </author>
            <author fullname="C. Zhou" initials="C." surname="Zhou">
              <organization/>
            </author>
            <date month="December" year="2017"/>
            <abstract>
              <t>The Path Computation Element (PCE) is a core component of Software- Defined Networking (SDN) systems.  It can compute optimal paths for traffic across a network and can also update the paths to reflect changes in the network or traffic demands.</t>
              <t>PCE was developed to derive paths for MPLS Label Switched Paths (LSPs), which are supplied to the head end of the LSP using the Path Computation Element Communication Protocol (PCEP).</t>
              <t>SDN has a broader applicability than signaled MPLS traffic-engineered (TE) networks, and the PCE may be used to determine paths in a range of use cases including static LSPs, segment routing, Service Function Chaining (SFC), and most forms of a routed or switched network.  It is, therefore, reasonable to consider PCEP as a control protocol for use in these environments to allow the PCE to be fully enabled as a central controller.</t>
              <t>This document briefly introduces the architecture for PCE as a central controller, examines the motivations and applicability for PCEP as a control protocol in this environment, and introduces the implications for the protocol.  A PCE-based central controller can simplify the processing of a distributed control plane by blending it with elements of SDN and without necessarily completely replacing it.</t>
              <t>This document does not describe use cases in detail and does not define protocol extensions: that work is left for other documents.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8283"/>
          <seriesInfo name="DOI" value="10.17487/RFC8283"/>
        </reference>
        <reference anchor="RFC4655">
          <front>
            <title>A Path Computation Element (PCE)-Based Architecture</title>
            <author fullname="A. Farrel" initials="A." surname="Farrel">
              <organization/>
            </author>
            <author fullname="J.-P. Vasseur" initials="J.-P." surname="Vasseur">
              <organization/>
            </author>
            <author fullname="J. Ash" initials="J." surname="Ash">
              <organization/>
            </author>
            <date month="August" year="2006"/>
            <abstract>
              <t>Constraint-based path computation is a fundamental building block for traffic engineering systems such as Multiprotocol Label Switching (MPLS) and Generalized Multiprotocol Label Switching (GMPLS) networks.  Path computation in large, multi-domain, multi-region, or multi-layer networks is complex and may require special computational components and cooperation between the different network domains.</t>
              <t>This document specifies the architecture for a Path Computation Element (PCE)-based model to address this problem space.  This document does not attempt to provide a detailed description of all the architectural components, but rather it describes a set of building blocks for the PCE architecture from which solutions may be constructed.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4655"/>
          <seriesInfo name="DOI" value="10.17487/RFC4655"/>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We would like to thank Adrian Farrel for their review.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
