<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 3.1.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-netconf-over-tls13-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.15.0 -->
  <front>
    <title abbrev="NETCONF over TLS 1.3">NETCONF over TLS 1.3</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-netconf-over-tls13-00"/>
    <author initials="S." surname="Turner" fullname="Sean Turner">
      <organization>sn3rd</organization>
      <address>
        <email>sean@sn3rd.com</email>
      </address>
    </author>
    <author initials="R." surname="Housley" fullname="Russ Housley">
      <organization abbrev="Vigil Security">Vigil Security, LLC</organization>
      <address>
        <postal>
          <street>516 Dranesville Road</street>
          <city>Herndon, VA</city>
          <code>20170</code>
          <country>US</country>
        </postal>
        <email>housley@vigilsec.com</email>
      </address>
    </author>
    <date year="2022" month="October" day="12"/>
    <area>Operations and Management</area>
    <workgroup>Network Configuration</workgroup>
    <keyword>NETCONF</keyword>
    <keyword>TLS 1.3</keyword>
    <abstract>
      <t>RFC 7589 defines how to protect NETCONF messages with TLS 1.2.
This document describes how to protect NETCONF messages with TLS 1.3.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://netconf-wg.github.io/netconf-over-tls13/draft-ietf-netconf-over-tls13.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-netconf-over-tls13/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Network Configuration Working Group mailing list (<eref target="mailto:netconf@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/netconf/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/netconf/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/netconf-wg/netconf-over-tls13"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t><xref target="RFC7589"/> defines how to protect NETCONF messages <xref target="RFC6241"/> with
TLS 1.2 <xref target="RFC5246"/>. This document describes defines how to protect
NETCONF messages with TLS 1.3 <xref target="I-D.ietf-tls-rfc8446bis"/>.</t>
      <t>This document addresses cipher suites and the use of early data, which is also
known as 0-RTT data. It also updates the "netconf-tls" IANA Registered Port
Number entry to refer to this document. All other provisions set forth
in <xref target="RFC7589"/> are unchanged, including connection initiation, message framing,
connection closure, certificate validation, server identity, and client
identity.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="early-data">
      <name>Early Data</name>
      <t>Early data (aka 0-RTT data) is a mechanism defined in TLS 1.3
<xref target="I-D.ietf-tls-rfc8446bis"/> that allows a client to send data ("early data")
as part of the first flight of messages to a server. Early data is
permitted by TLS 1.3 when the client and server share a PSK, either obtained
externally or via a previous handshake. The client uses the PSK to
authenticate the server and to encrypt the early data.</t>
      <t>As noted in <xref section="2.3" sectionFormat="of" target="I-D.ietf-tls-rfc8446bis"/>, the security
properties for early data are weaker than those for subsequent TLS-protected
data. In particular, early data is not forward secret, and there are no
protection against the replay of early data between connections.
<xref section="E.5" sectionFormat="of" target="I-D.ietf-tls-rfc8446bis"/> requires applicaitons not
use early data without a profile that defines its use. This document
specifies that implementations <bcp14>MUST NOT</bcp14> use early data.</t>
    </section>
    <section anchor="cipher-suites">
      <name>Cipher Suites</name>
      <t>Implementations <bcp14>MUST</bcp14> support TLS 1.3 <xref target="I-D.ietf-tls-rfc8446bis"/>, and
implementation are <bcp14>REQUIRED</bcp14> to support the mandatory-to-implement cipher
suites listed in <xref section="9.1" sectionFormat="of" target="I-D.ietf-tls-rfc8446bis"/>.</t>
      <t>Implementations <bcp14>MAY</bcp14> implement additional TLS cipher suites that provide
mutual authentication and confidentiality, which are required for NETCONF
<xref target="RFC6241"/>.</t>
      <t>Implementations <bcp14>SHOULD</bcp14> follow the recommendations given in
<xref target="I-D.ietf-uta-rfc7525bis"/>.</t>
      <artwork><![CDATA[
So, this is what {{Section 9.1 of I-D.ietf-tls-rfc8446bis}} says:

  A TLS-compliant application MUST implement the TLS_AES_128_GCM_SHA256
  [GCM] cipher suite and SHOULD implement the TLS_AES_256_GCM_SHA384
  [GCM] and TLS_CHACHA20_POLY1305_SHA256 [RFC8439] cipher suites (see
  Appendix B.4).

  A TLS-compliant application MUST support digital signatures with
  rsa_pkcs1_sha256 (for certificates), rsa_pss_rsae_sha256 (for
  CertificateVerify and certificates), and ecdsa_secp256r1_sha256.  A
  TLS-compliant application MUST support key exchange with secp256r1
  (NIST P-256) and SHOULD support key exchange with X25519 [RFC7748].

Is there any reason to narrow the algorithm choices?

My guess is not.  These ought to be available in all TLS libraries.
]]></artwork>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Please review the Security Considerations in TLS 1.3 <xref target="I-D.ietf-tls-rfc8446bis"/>.</t>
      <t>Please review the recommendations regarding Diffie-Hellman exponent reuse
in <xref section="7.4" sectionFormat="of" target="I-D.ietf-uta-rfc7525bis"/>.</t>
      <t>Please review the Security Considerations in NETCONF <xref target="RFC6241"/>.</t>
      <t>NETCONF is used to access configuration and state information and to
modify configuration information. TLS 1.3 mutual authentication is used
to ensure that only authorized users and systems are able to view the
NETCONF server's configuration and state or to modify the NETCONF
server's configuration. To this end, neither the client nor the server
should establish a NETCONF over TLS 1.3 connection with an unknown,
unexpected, or incorrect peer identity; see <xref section="7" sectionFormat="of" target="RFC7589"/>. If
deployments make use of this list of Certification Authority (CA)
certificates <xref target="RFC5280"/>, then the listed CAs should only issue certificates
to parties that are authorized to access the NETCONF servers. Doing otherwise
will allow certificates that were issued for other purposes to be
inappropriately accepted by a NETCONF server.</t>
      <t>Please review <xref target="RFC6125"/> for further details on generic host name
validation in the TLS context.</t>
      <t>Please review the recommendations regarding certificate revocation checking
in <xref section="7.5" sectionFormat="of" target="I-D.ietf-uta-rfc7525bis"/>.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to add a reference to this document in the
"netconf-tls" entry in the "Registered Port Numbers". The updated
registry entry would appear as follows:</t>
      <artwork><![CDATA[
 Service Name:           netconf-tls
 Transport Protocol(s):  TCP
 Assignee:               IESG <iesg@ietf.org>
 Contact:                IETF Chair <chair@ietf.org>
 Description:            NETCONF over TLS
 Reference:              RFC 7589, [THIS RFC]
 Port Number:            6513
]]></artwork>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC7589">
          <front>
            <title>Using the NETCONF Protocol over Transport Layer Security (TLS) with Mutual X.509 Authentication</title>
            <author fullname="M. Badra" initials="M." surname="Badra">
              <organization/>
            </author>
            <author fullname="A. Luchuk" initials="A." surname="Luchuk">
              <organization/>
            </author>
            <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder">
              <organization/>
            </author>
            <date month="June" year="2015"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) provides mechanisms to install, manipulate, and delete the configuration of network devices. This document describes how to use the Transport Layer Security (TLS) protocol with mutual X.509 authentication to secure the exchange of NETCONF messages.  This revision of RFC 5539 documents the new message framing used by NETCONF 1.1 and it obsoletes RFC 5539.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7589"/>
          <seriesInfo name="DOI" value="10.17487/RFC7589"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns">
              <organization/>
            </author>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund">
              <organization/>
            </author>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder">
              <organization/>
            </author>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman">
              <organization/>
            </author>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices.  It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages.  The NETCONF protocol operations are realized as remote procedure calls (RPCs).  This document obsoletes RFC 4741.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="I-D.ietf-tls-rfc8446bis">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Mozilla</organization>
            </author>
            <date day="7" month="March" year="2022"/>
            <abstract>
              <t>   This document specifies version 1.3 of the Transport Layer Security
   (TLS) protocol.  TLS allows client/server applications to communicate
   over the Internet in a way that is designed to prevent eavesdropping,
   tampering, and message forgery.

   This document updates RFCs 5705, 6066, 7627, and 8422 and obsoletes
   RFCs 5077, 5246, 6961, and 8446.  This document also specifies new
   requirements for TLS 1.2 implementations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8446bis-04"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="I-D.ietf-uta-rfc7525bis">
          <front>
            <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Yaron Sheffer" initials="Y." surname="Sheffer">
              <organization>Intuit</organization>
            </author>
            <author fullname="Peter Saint-Andre" initials="P." surname="Saint-Andre">
              <organization>independent</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>arm</organization>
            </author>
            <date day="16" month="August" year="2022"/>
            <abstract>
              <t>   Transport Layer Security (TLS) and Datagram Transport Layer Security
   (DTLS) are used to protect data exchanged over a wide range of
   application protocols, and can also form the basis for secure
   transport protocols.  Over the years, the industry has witnessed
   several serious attacks on TLS and DTLS, including attacks on the
   most commonly used cipher suites and their modes of operation.  This
   document provides the latest recommendations for ensuring the
   security of deployed services that use TLS and DTLS.  These
   recommendations are applicable to the majority of use cases.

   An earlier version of this document was published as RFC 7525 when
   the industry was in the midst of its transition to TLS 1.2.  Years
   later this transition is largely complete and TLS 1.3 is widely
   available.  This document updates the guidance given the new
   environment and obsoletes RFC 7525.  In addition, the document
   updates RFC 5288 and RFC 6066 in view of recent attacks.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-uta-rfc7525bis-11"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper">
              <organization/>
            </author>
            <author fullname="S. Santesson" initials="S." surname="Santesson">
              <organization/>
            </author>
            <author fullname="S. Farrell" initials="S." surname="Farrell">
              <organization/>
            </author>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen">
              <organization/>
            </author>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <author fullname="W. Polk" initials="W." surname="Polk">
              <organization/>
            </author>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet.  An overview of this approach and model is provided as an introduction.  The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms.  Standard certificate extensions are described and two Internet-specific extensions are defined.  A set of required certificate extensions is specified.  The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions.  An algorithm for X.509 certification path validation is described.  An ASN.1 module and examples are provided in the appendices.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC5246">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks">
              <organization/>
            </author>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol.  The TLS protocol provides communications security over the Internet.  The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="RFC6125">
          <front>
            <title>Representation and Verification of Domain-Based Application Service Identity within Internet Public Key Infrastructure Using X.509 (PKIX) Certificates in the Context of Transport Layer Security (TLS)</title>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre">
              <organization/>
            </author>
            <author fullname="J. Hodges" initials="J." surname="Hodges">
              <organization/>
            </author>
            <date month="March" year="2011"/>
            <abstract>
              <t>Many application technologies enable secure communication between two entities by means of Internet Public Key Infrastructure Using X.509 (PKIX) certificates in the context of Transport Layer Security (TLS). This document specifies procedures for representing and verifying the identity of application services in such interactions.   [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6125"/>
          <seriesInfo name="DOI" value="10.17487/RFC6125"/>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We would like to thank the following people TBD.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
