<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.25 (Ruby 3.1.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-netconf-over-tls13-02" category="std" consensus="true" submissionType="IETF" updates="7589" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.16.0 -->
  <front>
    <title abbrev="NETCONF over TLS">Updates to Using the NETCONF Protocol over Transport Layer Security (TLS) with Mutual X.509 Authentication</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-netconf-over-tls13-02"/>
    <author initials="S." surname="Turner" fullname="Sean Turner">
      <organization>sn3rd</organization>
      <address>
        <email>sean@sn3rd.com</email>
      </address>
    </author>
    <author initials="R." surname="Housley" fullname="Russ Housley">
      <organization abbrev="Vigil Security">Vigil Security, LLC</organization>
      <address>
        <postal>
          <street>516 Dranesville Road</street>
          <city>Herndon, VA</city>
          <code>20170</code>
          <country>US</country>
        </postal>
        <email>housley@vigilsec.com</email>
      </address>
    </author>
    <date year="2023" month="March" day="10"/>
    <area>Operations and Management</area>
    <workgroup>Network Configuration</workgroup>
    <keyword>NETCONF</keyword>
    <keyword>TLS 1.3</keyword>
    <keyword>TLS 1.2</keyword>
    <keyword>Early Data</keyword>
    <abstract>
      <t>RFC 7589 defines how to protect NETCONF messages with TLS 1.2. This
document updates RFC 7589 to address support requirements for TLS 1.2
and TLS 1.3 and the use of TLS 1.3's early data.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://netconf-wg.github.io/netconf-over-tls13/draft-ietf-netconf-over-tls13.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-netconf-over-tls13/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Network Configuration Working Group mailing list (<eref target="mailto:netconf@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/netconf/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/netconf/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/netconf-wg/netconf-over-tls13"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t><xref target="RFC7589"/> defines how to protect NETCONF messages <xref target="RFC6241"/> with
TLS 1.2 <xref target="RFC5246"/>. This document updates <xref target="RFC7589"/> to address
support requirements for TLS 1.2 <xref target="RFC5246"/> and TLS 1.3 <xref target="I-D.ietf-tls-rfc8446bis"/>
and the use of TLS 1.3's early data, which is also known as 0-RTT data.
It also updates the "netconf-tls" IANA Registered Port Number entry to
refer to this document. All other provisions set forth in <xref target="RFC7589"/>
are unchanged, including connection initiation, message framing,
connection closure, certificate validation, server identity, and client
identity.</t>
      <aside>
        <t>Implementations that support TLS 1.3 <xref target="I-D.ietf-tls-rfc8446bis"/> should
  refer to TLS 1.3 <xref target="I-D.ietf-tls-rfc8446bis"/> in Sections <xref target="RFC7589" section="4" sectionFormat="bare"/> and <xref target="RFC7589" section="5" sectionFormat="bare"/> of <xref target="RFC7589"/>.</t>
      </aside>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="early-data">
      <name>Early Data</name>
      <t>Early data (aka 0-RTT data) is a mechanism defined in TLS 1.3
<xref target="I-D.ietf-tls-rfc8446bis"/> that allows a client to send data ("early data")
as part of the first flight of messages to a server. Note that TLS 1.3 can
be used without early data as per <xref section="F.5" sectionFormat="of" target="I-D.ietf-tls-rfc8446bis"/>.
In fact, early data is permitted by TLS 1.3 only when the client and server
share a Pre-Shared Key (PSK), either obtained externally or via a previous
handshake. The client uses the PSK to authenticate the server and to encrypt
the early data.</t>
      <t>As noted in <xref section="2.3" sectionFormat="of" target="I-D.ietf-tls-rfc8446bis"/>, the security
properties for early data are weaker than those for subsequent TLS-protected
data. In particular, early data is not forward secret, and there is no
protection against the replay of early data between connections.
<xref section="E.5" sectionFormat="of" target="I-D.ietf-tls-rfc8446bis"/> requires applications not
use early data without a profile that defines its use. This document
specifies that NETCONF implementations that support TLS 1.3 <bcp14>MUST NOT</bcp14> use early
data.</t>
    </section>
    <section anchor="cipher-suites">
      <name>Cipher Suites</name>
      <t>Implementations <bcp14>MUST</bcp14> support TLS 1.2 <xref target="RFC5246"/> and are <bcp14>REQUIRED</bcp14> to
support the TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 cipher suite <xref target="RFC9325"/>.</t>
      <t>Implementations <bcp14>MAY</bcp14> implement additional TLS 1.2 cipher suites that provide
mutual authentication <xref target="RFC5246"/> and confidentiality as required by
NETCONF <xref target="RFC6241"/>.</t>
      <t>Implementations <bcp14>SHOULD</bcp14> support TLS 1.3 <xref target="I-D.ietf-tls-rfc8446bis"/> and,
if implemented, <bcp14>MUST</bcp14> prefer to negotiate TLS 1.3 over earlier versions
of TLS.</t>
      <t>Implementations that support TLS 1.3 <xref target="I-D.ietf-tls-rfc8446bis"/> are
<bcp14>REQUIRED</bcp14> to support the mandatory-to-implement cipher suites listed in
<xref section="9.1" sectionFormat="of" target="I-D.ietf-tls-rfc8446bis"/>.</t>
      <t>Implementations that support TLS 1.3 <bcp14>MAY</bcp14> implement additional TLS cipher
suites that provide mutual authentication and confidentiality, which are
required for NETCONF <xref target="RFC6241"/>.</t>
      <t>NETCONF implementations <bcp14>SHOULD</bcp14> follow the recommendations given in
<xref target="RFC9325"/>.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The Security Considerations of <xref target="RFC6241"/>, <xref target="RFC7589"/>, and <xref target="RFC9325"/>
apply here as well.</t>
      <t>For implementations that support TLS 1.3, the Security Considerations of
TLS 1.3 <xref target="I-D.ietf-tls-rfc8446bis"/> apply.</t>
      <t>The following considerations from <xref target="RFC7589"/> has been modified to also
apply to TLS 1.3 <xref target="I-D.ietf-tls-rfc8446bis"/>:</t>
      <ul empty="true">
        <li>
          <t>NETCONF is used to access configuration and state information and to
modify configuration information. TLS 1.3 mutual authentication is used
to ensure that only authorized users and systems are able to view the
NETCONF server's configuration and state or to modify the NETCONF
server's configuration. To this end, neither the client nor the server
should establish a NETCONF over TLS 1.3 connection with an unknown,
unexpected, or incorrectly identified peer; see <xref section="7" sectionFormat="of" target="RFC7589"/>. If
deployments make use of a trusted list of Certification Authority (CA)
certificates <xref target="RFC5280"/>, then the listed CAs should only issue certificates
to parties that are authorized to access the NETCONF servers. Doing otherwise
will allow certificates that were issued for other purposes to be
inappropriately accepted by a NETCONF server.</t>
        </li>
      </ul>
      <t>The Security Considerations of <xref target="I-D.ietf-uta-rfc6125bis"/> apply to all implementations
when the client checks the identity of the server, as is required in
<xref section="6" sectionFormat="of" target="RFC7589"/>.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to add a reference to this document in the
"netconf-tls" entry in the "Registered Port Numbers". The updated
registry entry would appear as follows:</t>
      <artwork><![CDATA[
 Service Name:           netconf-tls
 Transport Protocol(s):  TCP
 Assignee:               IESG <iesg@ietf.org>
 Contact:                IETF Chair <chair@ietf.org>
 Description:            NETCONF over TLS
 Reference:              RFC 7589, [THIS RFC]
 Port Number:            6513
]]></artwork>
    </section>
  </middle>
  <back>
    <references>
      <name>Normative References</name>
      <reference anchor="RFC7589">
        <front>
          <title>Using the NETCONF Protocol over Transport Layer Security (TLS) with Mutual X.509 Authentication</title>
          <author fullname="M. Badra" initials="M." surname="Badra">
            <organization/>
          </author>
          <author fullname="A. Luchuk" initials="A." surname="Luchuk">
            <organization/>
          </author>
          <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder">
            <organization/>
          </author>
          <date month="June" year="2015"/>
          <abstract>
            <t>The Network Configuration Protocol (NETCONF) provides mechanisms to install, manipulate, and delete the configuration of network devices. This document describes how to use the Transport Layer Security (TLS) protocol with mutual X.509 authentication to secure the exchange of NETCONF messages.  This revision of RFC 5539 documents the new message framing used by NETCONF 1.1 and it obsoletes RFC 5539.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7589"/>
        <seriesInfo name="DOI" value="10.17487/RFC7589"/>
      </reference>
      <reference anchor="RFC6241">
        <front>
          <title>Network Configuration Protocol (NETCONF)</title>
          <author fullname="R. Enns" initials="R." role="editor" surname="Enns">
            <organization/>
          </author>
          <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund">
            <organization/>
          </author>
          <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder">
            <organization/>
          </author>
          <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman">
            <organization/>
          </author>
          <date month="June" year="2011"/>
          <abstract>
            <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices.  It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages.  The NETCONF protocol operations are realized as remote procedure calls (RPCs).  This document obsoletes RFC 4741.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6241"/>
        <seriesInfo name="DOI" value="10.17487/RFC6241"/>
      </reference>
      <reference anchor="RFC5246">
        <front>
          <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
          <author fullname="T. Dierks" initials="T." surname="Dierks">
            <organization/>
          </author>
          <author fullname="E. Rescorla" initials="E." surname="Rescorla">
            <organization/>
          </author>
          <date month="August" year="2008"/>
          <abstract>
            <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol.  The TLS protocol provides communications security over the Internet.  The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5246"/>
        <seriesInfo name="DOI" value="10.17487/RFC5246"/>
      </reference>
      <reference anchor="I-D.ietf-tls-rfc8446bis">
        <front>
          <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
          <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
            <organization>Mozilla</organization>
          </author>
          <date day="24" month="October" year="2022"/>
          <abstract>
            <t>   This document specifies version 1.3 of the Transport Layer Security
   (TLS) protocol.  TLS allows client/server applications to communicate
   over the Internet in a way that is designed to prevent eavesdropping,
   tampering, and message forgery.

   This document updates RFCs 5705, 6066, 7627, and 8422 and obsoletes
   RFCs 5077, 5246, 6961, and 8446.  This document also specifies new
   requirements for TLS 1.2 implementations.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8446bis-05"/>
      </reference>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner">
            <organization/>
          </author>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba">
            <organization/>
          </author>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
      <reference anchor="RFC9325">
        <front>
          <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
          <author fullname="Y. Sheffer" initials="Y." surname="Sheffer">
            <organization/>
          </author>
          <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre">
            <organization/>
          </author>
          <author fullname="T. Fossati" initials="T." surname="Fossati">
            <organization/>
          </author>
          <date month="November" year="2022"/>
          <abstract>
            <t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are used to protect data exchanged over a wide range of application protocols and can also form the basis for secure transport protocols.  Over the years, the industry has witnessed several serious attacks on TLS and DTLS, including attacks on the most commonly used cipher suites and their modes of operation.  This document provides the latest recommendations for ensuring the security of deployed services that use TLS and DTLS. These recommendations are applicable to the majority of use cases.</t>
            <t>RFC 7525, an earlier version of the TLS recommendations, was published when the industry was transitioning to TLS 1.2. Years later, this transition is largely complete, and TLS 1.3 is widely available. This document updates the guidance given the new environment and obsoletes RFC 7525. In addition, this document updates RFCs 5288 and 6066 in view of recent attacks.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="195"/>
        <seriesInfo name="RFC" value="9325"/>
        <seriesInfo name="DOI" value="10.17487/RFC9325"/>
      </reference>
      <reference anchor="RFC5280">
        <front>
          <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
          <author fullname="D. Cooper" initials="D." surname="Cooper">
            <organization/>
          </author>
          <author fullname="S. Santesson" initials="S." surname="Santesson">
            <organization/>
          </author>
          <author fullname="S. Farrell" initials="S." surname="Farrell">
            <organization/>
          </author>
          <author fullname="S. Boeyen" initials="S." surname="Boeyen">
            <organization/>
          </author>
          <author fullname="R. Housley" initials="R." surname="Housley">
            <organization/>
          </author>
          <author fullname="W. Polk" initials="W." surname="Polk">
            <organization/>
          </author>
          <date month="May" year="2008"/>
          <abstract>
            <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet.  An overview of this approach and model is provided as an introduction.  The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms.  Standard certificate extensions are described and two Internet-specific extensions are defined.  A set of required certificate extensions is specified.  The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions.  An algorithm for X.509 certification path validation is described.  An ASN.1 module and examples are provided in the appendices.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5280"/>
        <seriesInfo name="DOI" value="10.17487/RFC5280"/>
      </reference>
      <reference anchor="I-D.ietf-uta-rfc6125bis">
        <front>
          <title>Service Identity in TLS</title>
          <author fullname="Peter Saint-Andre" initials="P." surname="Saint-Andre">
            <organization>independent</organization>
          </author>
          <author fullname="Rich Salz" initials="R." surname="Salz">
            <organization>Akamai Technologies</organization>
          </author>
          <date day="2" month="March" year="2023"/>
          <abstract>
            <t>   Many application technologies enable secure communication between two
   entities by means of Transport Layer Security (TLS) with Internet
   Public Key Infrastructure Using X.509 (PKIX) certificates.  This
   document specifies procedures for representing and verifying the
   identity of application services in such interactions.

   This document obsoletes RFC 6125.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-uta-rfc6125bis-11"/>
      </reference>
    </references>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We would like to thank Per Andersson, Jürgen Schönwälder, Jeff
Hartley, and Qin Wu for their reviews.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
