<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 3.1.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-netconf-over-tls13-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.15.1 -->
  <front>
    <title abbrev="NETCONF over TLS 1.3">NETCONF over TLS 1.3</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-netconf-over-tls13-01"/>
    <author initials="S." surname="Turner" fullname="Sean Turner">
      <organization>sn3rd</organization>
      <address>
        <email>sean@sn3rd.com</email>
      </address>
    </author>
    <author initials="R." surname="Housley" fullname="Russ Housley">
      <organization abbrev="Vigil Security">Vigil Security, LLC</organization>
      <address>
        <postal>
          <street>516 Dranesville Road</street>
          <city>Herndon, VA</city>
          <code>20170</code>
          <country>US</country>
        </postal>
        <email>housley@vigilsec.com</email>
      </address>
    </author>
    <date year="2022" month="October" day="24"/>
    <area>Operations and Management</area>
    <workgroup>Network Configuration</workgroup>
    <keyword>NETCONF</keyword>
    <keyword>TLS 1.3</keyword>
    <abstract>
      <t>RFC 7589 defines how to protect NETCONF messages with TLS 1.2.
This document describes how to protect NETCONF messages with TLS 1.3.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://netconf-wg.github.io/netconf-over-tls13/draft-ietf-netconf-over-tls13.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-netconf-over-tls13/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Network Configuration Working Group mailing list (<eref target="mailto:netconf@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/netconf/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/netconf/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/netconf-wg/netconf-over-tls13"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t><xref target="RFC7589"/> defines how to protect NETCONF messages <xref target="RFC6241"/> with
TLS 1.2 <xref target="RFC5246"/>. This document describes defines how to protect
NETCONF messages with TLS 1.3 <xref target="I-D.ietf-tls-rfc8446bis"/>.</t>
      <t>This document addresses cipher suites and the use of early data, which is also
known as 0-RTT data. It also updates the "netconf-tls" IANA Registered Port
Number entry to refer to this document. All other provisions set forth
in <xref target="RFC7589"/> are unchanged, including connection initiation, message framing,
connection closure, certificate validation, server identity, and client
identity.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="early-data">
      <name>Early Data</name>
      <t>Early data (aka 0-RTT data) is a mechanism defined in TLS 1.3
<xref target="I-D.ietf-tls-rfc8446bis"/> that allows a client to send data ("early data")
as part of the first flight of messages to a server. Note that TLS 1.3 can
be used without early data as per <xref section="F.5" sectionFormat="of" target="I-D.ietf-tls-rfc8446bis"/>.
In fact, early data is permitted by TLS 1.3 only when the client and server
share a Pre-Shared Key (PSK), either obtained externally or via a previous
handshake. The client uses the PSK to authenticate the server and to encrypt
the early data.</t>
      <t>As noted in <xref section="2.3" sectionFormat="of" target="I-D.ietf-tls-rfc8446bis"/>, the security
properties for early data are weaker than those for subsequent TLS-protected
data. In particular, early data is not forward secret, and there is no
protection against the replay of early data between connections.
<xref section="E.5" sectionFormat="of" target="I-D.ietf-tls-rfc8446bis"/> requires applications not
use early data without a profile that defines its use. This document
specifies that NETCONF implementations that support TLS 1.3 <bcp14>MUST NOT</bcp14> use early
data.</t>
    </section>
    <section anchor="cipher-suites">
      <name>Cipher Suites</name>
      <t>Implementations that support TLS 1.3 <xref target="I-D.ietf-tls-rfc8446bis"/> are <bcp14>REQUIRED</bcp14>
to support the mandatory-to-implement cipher suites listed in
<xref section="9.1" sectionFormat="of" target="I-D.ietf-tls-rfc8446bis"/>.</t>
      <t>Implementations that support TLS 1.3 <bcp14>MAY</bcp14> implement additional TLS cipher
suites that provide mutual authentication and confidentiality, which are
required for NETCONF <xref target="RFC6241"/>.</t>
      <t>NETCONF implementations <bcp14>SHOULD</bcp14> follow the recommendations given in
<xref target="I-D.ietf-uta-rfc7525bis"/>.</t>
      <artwork><![CDATA[
So, this is what {{Section 9.1 of I-D.ietf-tls-rfc8446bis}} says:

  A TLS-compliant application MUST implement the TLS_AES_128_GCM_SHA256
  [GCM] cipher suite and SHOULD implement the TLS_AES_256_GCM_SHA384
  [GCM] and TLS_CHACHA20_POLY1305_SHA256 [RFC8439] cipher suites (see
  Appendix B.4).

  A TLS-compliant application MUST support digital signatures with
  rsa_pkcs1_sha256 (for certificates), rsa_pss_rsae_sha256 (for
  CertificateVerify and certificates), and ecdsa_secp256r1_sha256.  A
  TLS-compliant application MUST support key exchange with secp256r1
  (NIST P-256) and SHOULD support key exchange with X25519 [RFC7748].

Is there any reason to narrow the algorithm choices?

My guess is not.  These ought to be available in all TLS libraries.
]]></artwork>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Please review the Security Considerations in TLS 1.3 <xref target="I-D.ietf-tls-rfc8446bis"/>.</t>
      <t>Please review the recommendations regarding Diffie-Hellman exponent reuse
in <xref section="7.4" sectionFormat="of" target="I-D.ietf-uta-rfc7525bis"/>.</t>
      <t>Please review the Security Considerations in NETCONF <xref target="RFC6241"/>.</t>
      <t>NETCONF is used to access configuration and state information and to
modify configuration information. TLS 1.3 mutual authentication is used
to ensure that only authorized users and systems are able to view the
NETCONF server's configuration and state or to modify the NETCONF
server's configuration. To this end, neither the client nor the server
should establish a NETCONF over TLS 1.3 connection with an unknown,
unexpected, or incorrectly identified peer; see <xref section="7" sectionFormat="of" target="RFC7589"/>. If
deployments make use of a trusted list of Certification Authority (CA)
certificates <xref target="RFC5280"/>, then the listed CAs should only issue certificates
to parties that are authorized to access the NETCONF servers. Doing otherwise
will allow certificates that were issued for other purposes to be
inappropriately accepted by a NETCONF server.</t>
      <t>Please review <xref target="RFC6125"/> for further details on generic host name
validation in the TLS context.</t>
      <t>Please review the recommendations regarding certificate revocation checking
in <xref section="7.5" sectionFormat="of" target="I-D.ietf-uta-rfc7525bis"/>.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to add a reference to this document in the
"netconf-tls" entry in the "Registered Port Numbers". The updated
registry entry would appear as follows:</t>
      <artwork><![CDATA[
 Service Name:           netconf-tls
 Transport Protocol(s):  TCP
 Assignee:               IESG <iesg@ietf.org>
 Contact:                IETF Chair <chair@ietf.org>
 Description:            NETCONF over TLS
 Reference:              RFC 7589, [THIS RFC]
 Port Number:            6513
]]></artwork>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC7589">
          <front>
            <title>Using the NETCONF Protocol over Transport Layer Security (TLS) with Mutual X.509 Authentication</title>
            <author fullname="M. Badra" initials="M." surname="Badra">
              <organization/>
            </author>
            <author fullname="A. Luchuk" initials="A." surname="Luchuk">
              <organization/>
            </author>
            <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder">
              <organization/>
            </author>
            <date month="June" year="2015"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) provides mechanisms to install, manipulate, and delete the configuration of network devices. This document describes how to use the Transport Layer Security (TLS) protocol with mutual X.509 authentication to secure the exchange of NETCONF messages.  This revision of RFC 5539 documents the new message framing used by NETCONF 1.1 and it obsoletes RFC 5539.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7589"/>
          <seriesInfo name="DOI" value="10.17487/RFC7589"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns">
              <organization/>
            </author>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund">
              <organization/>
            </author>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder">
              <organization/>
            </author>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman">
              <organization/>
            </author>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices.  It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages.  The NETCONF protocol operations are realized as remote procedure calls (RPCs).  This document obsoletes RFC 4741.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="I-D.ietf-tls-rfc8446bis">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Mozilla</organization>
            </author>
            <date day="7" month="March" year="2022"/>
            <abstract>
              <t>   This document specifies version 1.3 of the Transport Layer Security
   (TLS) protocol.  TLS allows client/server applications to communicate
   over the Internet in a way that is designed to prevent eavesdropping,
   tampering, and message forgery.

   This document updates RFCs 5705, 6066, 7627, and 8422 and obsoletes
   RFCs 5077, 5246, 6961, and 8446.  This document also specifies new
   requirements for TLS 1.2 implementations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8446bis-04"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="I-D.ietf-uta-rfc7525bis">
          <front>
            <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Yaron Sheffer" initials="Y." surname="Sheffer">
              <organization>Intuit</organization>
            </author>
            <author fullname="Peter Saint-Andre" initials="P." surname="Saint-Andre">
              <organization>independent</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>arm</organization>
            </author>
            <date day="16" month="August" year="2022"/>
            <abstract>
              <t>   Transport Layer Security (TLS) and Datagram Transport Layer Security
   (DTLS) are used to protect data exchanged over a wide range of
   application protocols, and can also form the basis for secure
   transport protocols.  Over the years, the industry has witnessed
   several serious attacks on TLS and DTLS, including attacks on the
   most commonly used cipher suites and their modes of operation.  This
   document provides the latest recommendations for ensuring the
   security of deployed services that use TLS and DTLS.  These
   recommendations are applicable to the majority of use cases.

   An earlier version of this document was published as RFC 7525 when
   the industry was in the midst of its transition to TLS 1.2.  Years
   later this transition is largely complete and TLS 1.3 is widely
   available.  This document updates the guidance given the new
   environment and obsoletes RFC 7525.  In addition, the document
   updates RFC 5288 and RFC 6066 in view of recent attacks.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-uta-rfc7525bis-11"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper">
              <organization/>
            </author>
            <author fullname="S. Santesson" initials="S." surname="Santesson">
              <organization/>
            </author>
            <author fullname="S. Farrell" initials="S." surname="Farrell">
              <organization/>
            </author>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen">
              <organization/>
            </author>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <author fullname="W. Polk" initials="W." surname="Polk">
              <organization/>
            </author>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet.  An overview of this approach and model is provided as an introduction.  The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms.  Standard certificate extensions are described and two Internet-specific extensions are defined.  A set of required certificate extensions is specified.  The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions.  An algorithm for X.509 certification path validation is described.  An ASN.1 module and examples are provided in the appendices.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC5246">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks">
              <organization/>
            </author>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol.  The TLS protocol provides communications security over the Internet.  The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="RFC6125">
          <front>
            <title>Representation and Verification of Domain-Based Application Service Identity within Internet Public Key Infrastructure Using X.509 (PKIX) Certificates in the Context of Transport Layer Security (TLS)</title>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre">
              <organization/>
            </author>
            <author fullname="J. Hodges" initials="J." surname="Hodges">
              <organization/>
            </author>
            <date month="March" year="2011"/>
            <abstract>
              <t>Many application technologies enable secure communication between two entities by means of Internet Public Key Infrastructure Using X.509 (PKIX) certificates in the context of Transport Layer Security (TLS). This document specifies procedures for representing and verifying the identity of application services in such interactions.   [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6125"/>
          <seriesInfo name="DOI" value="10.17487/RFC6125"/>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We would like to thank the following people TBD.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
