<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.1 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-netconf-over-tls13-03" category="std" consensus="true" submissionType="IETF" updates="7589" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.2 -->
  <front>
    <title abbrev="NETCONF over TLS">Updates to Using the NETCONF Protocol over Transport Layer Security (TLS) with Mutual X.509 Authentication</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-netconf-over-tls13-03"/>
    <author initials="S." surname="Turner" fullname="Sean Turner">
      <organization>sn3rd</organization>
      <address>
        <email>sean@sn3rd.com</email>
      </address>
    </author>
    <author initials="R." surname="Housley" fullname="Russ Housley">
      <organization abbrev="Vigil Security">Vigil Security, LLC</organization>
      <address>
        <postal>
          <street>516 Dranesville Road</street>
          <city>Herndon, VA</city>
          <code>20170</code>
          <country>US</country>
        </postal>
        <email>housley@vigilsec.com</email>
      </address>
    </author>
    <date year="2023" month="October" day="23"/>
    <area>Operations and Management</area>
    <workgroup>Network Configuration</workgroup>
    <keyword>NETCONF</keyword>
    <keyword>TLS 1.3</keyword>
    <keyword>TLS 1.2</keyword>
    <keyword>Early Data</keyword>
    <abstract>
      <?line 43?>

<t>RFC 7589 defines how to protect NETCONF messages with TLS 1.2. This
document updates RFC 7589 to update support requirements for TLS 1.2
and add TLS 1.3 support requirements, including restrictions on the
use of TLS 1.3's early data.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://netconf-wg.github.io/netconf-over-tls13/draft-ietf-netconf-over-tls13.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-netconf-over-tls13/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Network Configuration Working Group mailing list (<eref target="mailto:netconf@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/netconf/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/netconf/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/netconf-wg/netconf-over-tls13"/>.</t>
    </note>
  </front>
  <middle>
    <?line 50?>

<section anchor="introduction">
      <name>Introduction</name>
      <t><xref target="RFC7589"/> defines how to protect NETCONF messages <xref target="RFC6241"/> with
TLS 1.2 <xref target="RFC5246"/>. This document updates <xref target="RFC7589"/> to update
support requirements for TLS 1.2 <xref target="RFC5246"/> and to add TLS 1.3 <xref target="I-D.ietf-tls-rfc8446bis"/>
support requirements, including restrictions on the use of TLS 1.3's early data which is also known as 0-RTT data.
It also updates the "netconf-tls" IANA Registered Port Number entry to
refer to this document. All other provisions set forth in <xref target="RFC7589"/>
are unchanged, including connection initiation, message framing,
connection closure, certificate validation, server identity, and client
identity.</t>
      <aside>
        <t>Implementations that support TLS 1.3 <xref target="I-D.ietf-tls-rfc8446bis"/> should
  refer to TLS 1.3 <xref target="I-D.ietf-tls-rfc8446bis"/> in Sections <xref target="RFC7589" section="4" sectionFormat="bare"/> and <xref target="RFC7589" section="5" sectionFormat="bare"/> of <xref target="RFC7589"/>.</t>
      </aside>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="early-data">
      <name>Early Data</name>
      <t>Early data (aka 0-RTT data) is a mechanism defined in TLS 1.3
<xref target="I-D.ietf-tls-rfc8446bis"/> that allows a client to send data ("early data")
as part of the first flight of messages to a server. Note that TLS 1.3 can
be used without early data as per <xref section="F.5" sectionFormat="of" target="I-D.ietf-tls-rfc8446bis"/>.
In fact, early data is permitted by TLS 1.3 only when the client and server
share a Pre-Shared Key (PSK), either obtained externally or via a previous
handshake. The client uses the PSK to authenticate the server and to encrypt
the early data.</t>
      <t>As noted in <xref section="2.3" sectionFormat="of" target="I-D.ietf-tls-rfc8446bis"/>, the security
properties for early data are weaker than those for subsequent TLS-protected
data. In particular, early data is not forward secret, and there is no
protection against the replay of early data between connections.
<xref section="E.5" sectionFormat="of" target="I-D.ietf-tls-rfc8446bis"/> requires applications not
use early data without a profile that defines its use. This document
specifies that NETCONF implementations that support TLS 1.3 <bcp14>MUST NOT</bcp14> use early
data.</t>
    </section>
    <section anchor="cipher-suites">
      <name>Cipher Suites</name>
      <t>Implementations <bcp14>MUST</bcp14> support TLS 1.2 <xref target="RFC5246"/> and are <bcp14>REQUIRED</bcp14> to
support the TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 cipher suite <xref target="RFC9325"/>.</t>
      <t>Implementations <bcp14>MAY</bcp14> implement additional TLS 1.2 cipher suites that provide
mutual authentication <xref target="RFC5246"/> and confidentiality as required by
NETCONF <xref target="RFC6241"/>.</t>
      <t>Implementations <bcp14>SHOULD</bcp14> support TLS 1.3 <xref target="I-D.ietf-tls-rfc8446bis"/> and,
if implemented, <bcp14>MUST</bcp14> prefer to negotiate TLS 1.3 over earlier versions
of TLS.</t>
      <t>Implementations that support TLS 1.3 <xref target="I-D.ietf-tls-rfc8446bis"/> are
<bcp14>REQUIRED</bcp14> to support the mandatory-to-implement cipher suites listed in
<xref section="9.1" sectionFormat="of" target="I-D.ietf-tls-rfc8446bis"/>.</t>
      <t>Implementations that support TLS 1.3 <bcp14>MAY</bcp14> implement additional TLS cipher
suites that provide mutual authentication and confidentiality, which are
required for NETCONF <xref target="RFC6241"/>.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The Security Considerations of <xref target="RFC6241"/>, <xref target="RFC7589"/>, and <xref target="RFC9325"/>
apply here as well.</t>
      <t>NETCONF implementations <bcp14>SHOULD</bcp14> follow the TLS recommendations given in
<xref target="RFC9325"/>.</t>
      <t>For implementations that support TLS 1.3, the Security Considerations of
TLS 1.3 <xref target="I-D.ietf-tls-rfc8446bis"/> apply.</t>
      <t>As specified in <xref target="RFC7589"/>, NETCONF over TLS requires mutual authentication.</t>
      <t>For implementations that support TLS 1.3 <xref target="I-D.ietf-tls-rfc8446bis"/>:</t>
      <ul empty="true">
        <li>
          <t>TLS 1.3 mutual authentication is used
to ensure that only authorized users and systems are able to view the
NETCONF server's configuration and state or to modify the NETCONF
server's configuration. To this end, neither the client nor the server
should establish a NETCONF over TLS 1.3 connection with an unknown,
unexpected, or incorrectly identified peer; see <xref section="7" sectionFormat="of" target="RFC7589"/>. If
deployments make use of a trusted list of Certification Authority (CA)
certificates <xref target="RFC5280"/>, then the listed CAs should only issue certificates
to parties that are authorized to access the NETCONF servers. Doing otherwise
will allow certificates that were issued for other purposes to be
inappropriately accepted by a NETCONF server.</t>
        </li>
      </ul>
      <t>The Security Considerations of <xref target="I-D.ietf-uta-rfc6125bis"/> apply to all implementations
when the client checks the identity of the server, as is required in
<xref section="6" sectionFormat="of" target="RFC7589"/>.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to add a reference to this document in the
"netconf-tls" entry in the "Registered Port Numbers". The updated
registry entry would appear as follows:</t>
      <artwork><![CDATA[
 Service Name:           netconf-tls
 Transport Protocol(s):  TCP
 Assignee:               IESG <iesg@ietf.org>
 Contact:                IETF Chair <chair@ietf.org>
 Description:            NETCONF over TLS
 Reference:              RFC 7589, [THIS RFC]
 Port Number:            6513
]]></artwork>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC7589">
        <front>
          <title>Using the NETCONF Protocol over Transport Layer Security (TLS) with Mutual X.509 Authentication</title>
          <author fullname="M. Badra" initials="M." surname="Badra"/>
          <author fullname="A. Luchuk" initials="A." surname="Luchuk"/>
          <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
          <date month="June" year="2015"/>
          <abstract>
            <t>The Network Configuration Protocol (NETCONF) provides mechanisms to install, manipulate, and delete the configuration of network devices. This document describes how to use the Transport Layer Security (TLS) protocol with mutual X.509 authentication to secure the exchange of NETCONF messages. This revision of RFC 5539 documents the new message framing used by NETCONF 1.1 and it obsoletes RFC 5539.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7589"/>
        <seriesInfo name="DOI" value="10.17487/RFC7589"/>
      </reference>
      <reference anchor="RFC6241">
        <front>
          <title>Network Configuration Protocol (NETCONF)</title>
          <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
          <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
          <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
          <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
          <date month="June" year="2011"/>
          <abstract>
            <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6241"/>
        <seriesInfo name="DOI" value="10.17487/RFC6241"/>
      </reference>
      <reference anchor="RFC5246">
        <front>
          <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
          <author fullname="T. Dierks" initials="T." surname="Dierks"/>
          <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
          <date month="August" year="2008"/>
          <abstract>
            <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5246"/>
        <seriesInfo name="DOI" value="10.17487/RFC5246"/>
      </reference>
      <reference anchor="I-D.ietf-tls-rfc8446bis">
        <front>
          <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
          <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
            <organization>Windy Hill Systems, LLC</organization>
          </author>
          <date day="7" month="July" year="2023"/>
          <abstract>
            <t>   This document specifies version 1.3 of the Transport Layer Security
   (TLS) protocol.  TLS allows client/server applications to communicate
   over the Internet in a way that is designed to prevent eavesdropping,
   tampering, and message forgery.

   This document updates RFCs 5705, 6066, 7627, and 8422 and obsoletes
   RFCs 5077, 5246, 6961, and 8446.  This document also specifies new
   requirements for TLS 1.2 implementations.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8446bis-09"/>
      </reference>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
      <reference anchor="RFC9325">
        <front>
          <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
          <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
          <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
          <author fullname="T. Fossati" initials="T." surname="Fossati"/>
          <date month="November" year="2022"/>
          <abstract>
            <t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are used to protect data exchanged over a wide range of application protocols and can also form the basis for secure transport protocols. Over the years, the industry has witnessed several serious attacks on TLS and DTLS, including attacks on the most commonly used cipher suites and their modes of operation. This document provides the latest recommendations for ensuring the security of deployed services that use TLS and DTLS. These recommendations are applicable to the majority of use cases.</t>
            <t>RFC 7525, an earlier version of the TLS recommendations, was published when the industry was transitioning to TLS 1.2. Years later, this transition is largely complete, and TLS 1.3 is widely available. This document updates the guidance given the new environment and obsoletes RFC 7525. In addition, this document updates RFCs 5288 and 6066 in view of recent attacks.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="195"/>
        <seriesInfo name="RFC" value="9325"/>
        <seriesInfo name="DOI" value="10.17487/RFC9325"/>
      </reference>
      <reference anchor="RFC5280">
        <front>
          <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
          <author fullname="D. Cooper" initials="D." surname="Cooper"/>
          <author fullname="S. Santesson" initials="S." surname="Santesson"/>
          <author fullname="S. Farrell" initials="S." surname="Farrell"/>
          <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
          <author fullname="R. Housley" initials="R." surname="Housley"/>
          <author fullname="W. Polk" initials="W." surname="Polk"/>
          <date month="May" year="2008"/>
          <abstract>
            <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5280"/>
        <seriesInfo name="DOI" value="10.17487/RFC5280"/>
      </reference>
      <reference anchor="I-D.ietf-uta-rfc6125bis">
        <front>
          <title>Service Identity in TLS</title>
          <author fullname="Peter Saint-Andre" initials="P." surname="Saint-Andre">
            <organization>independent</organization>
          </author>
          <author fullname="Rich Salz" initials="R." surname="Salz">
            <organization>Akamai Technologies</organization>
          </author>
          <date day="10" month="August" year="2023"/>
          <abstract>
            <t>   Many application technologies enable secure communication between two
   entities by means of Transport Layer Security (TLS) with Internet
   Public Key Infrastructure Using X.509 (PKIX) certificates.  This
   document specifies procedures for representing and verifying the
   identity of application services in such interactions.

   This document obsoletes RFC 6125.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-uta-rfc6125bis-15"/>
      </reference>
    </references>
    <?line 179?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We would like to thank Per Andersson, Jürgen Schönwälder, Jeff
Hartley, Rob Wilton, and Qin Wu for their reviews.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
