<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?rfc toc="yes"?>
<?rfc tocompact="yes"?>
<?rfc tocdepth="3"?>
<?rfc tocindent="yes"?>
<?rfc symrefs="yes"?>
<?rfc sortrefs="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" category="std" docName="draft-ietf-pce-circuit-style-pcep-extensions-08" ipr="trust200902" obsoletes="" updates="" submissionType="IETF" xml:lang="en" tocInclude="true" tocDepth="3" symRefs="true" sortRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.13.0 -->
  <front>
    <title abbrev="PCEP extensions for CS Policies">
    Path Computation Element Communication Protocol (PCEP) extensions for Circuit Style Policies
    </title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-pce-circuit-style-pcep-extensions-08"/>
    <author fullname="Samuel Sidor" initials="S." surname="Sidor">
      <organization>Cisco Systems, Inc.</organization>
      <address>
        <postal>
          <street>Eurovea Central 3.</street>
          <city>Bratislava</city>
          <code>811 09</code>
          <country>Slovakia</country>
        </postal>
        <email>ssidor@cisco.com</email>
      </address>
    </author>
    <author fullname="Praveen Maheshwari" initials="P." surname="Maheshwari">
      <organization>Airtel India</organization>
      <address>
        <email>Praveen.Maheshwari@airtel.com</email>
      </address>
    </author>
    <author fullname="Andrew Stone" initials="A." surname="Stone">
      <organization>Nokia</organization>
      <address>
        <email>andrew.stone@nokia.com</email>
      </address>
    </author>
    <author fullname="Luay Jalil" initials="L." surname="Jalil">
      <organization>Verizon</organization>
      <address>
        <email>luay.jalil@verizon.com</email>
      </address>
    </author>
    <author fullname="Shuping Peng" initials="S." surname="Peng">
      <organization>Huawei Technologies</organization>
      <address>
        <email>pengshuping@huawei.com</email>
      </address>
    </author>
    
    <date/>
    
    <workgroup>PCE Working Group</workgroup>

    <abstract>
      <t>Segment Routing (SR) enables a node to steer packet flows along
      a specified path without the need for intermediate per-path states,
      due to the utilization of source routing. An SR Policy comprises a
      sequence of segments, which are essentially instructions that define
      a source-routed policy</t>

      <t>This document proposes a set of extensions to the Path Computation Element
      Communication Protocol (PCEP) for Segment Routing Policies that are designed
      to satisfy requirements for connection-oriented transport services (Circuit-Style
      SR policies). They include the ability to control path recomputation and the
      option to request path with strict hops only and are also applicable for generic
      SR policy use cases where controlling path recomputation or distinct hop
      requirements are applicable.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="Introduction" numbered="true" toc="default">
      <name>Introduction</name>
      <t>Segment Routing (SR) leverages the source routing paradigm, where the sender of
      a packet defines the path that the packet takes through the network. This
      is achieved by encoding the path information as a sequence of segments within the
      packet header. SR can be applied to both MPLS and IPv6 data planes, providing a
      flexible and scalable method for traffic engineering.</t>

      <t>The Path Computation Element (PCE) is a network component, application, or node
      that is capable of computing a network path or route based on a network graph and
      applying computational constraints. The PCE Communication Protocol (PCEP) enables
      communication between a PCE and Path Computation Clients (PCCs), facilitating the
      computation of optimal paths for traffic flows.</t>

      <t><xref target="RFC8664" format="default"/> introduces the concept of Segment
      Routing Policy (SR Policy), which is a set of candidate paths that can be used
      to steer traffic through a network. Each candidate path is represented by a list
      of segments, and the path can be dynamically adjusted based on network conditions
      and requirements.</t>

      <t>In connection-oriented transport services, such as those defined in
      <xref target="I-D.ietf-spring-cs-sr-policy" format="default"/>, there is a need for
      path persistency and per-hop behavior for PCE-computed paths. This ensures that
      the paths remain stable and predictable, which is crucial for services that require
      high reliability and performance guarantees.</t>

      <t>To support the requirements of connection-oriented transport services, this
      document specifies extensions to PCEP to enable the use of Circuit Style Policies.
      These extensions allow for the request of strict paths from the PCE, the encoding of
      information to disable path recomputation for specific paths, and the clarification
      of the usage of existing flags within PCEP messages.</t>

      <t>The PCEP extensions described in this document are designed to be compatible with
      any Path Setup Type and are not limited to Circuit Style SR policies, ensuring broad
      applicability across different network environments and use cases.</t>
  
      <section anchor="Requirements" numbered="true" toc="default">
        <name>Requirements Language</name>

        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
        "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
        "OPTIONAL" in this document are to be interpreted as described in BCP
        14 <xref format="default" target="RFC2119"/> <xref format="default"
        target="RFC8174"/> when, and only when, they appear in all capitals,
        as shown here.</t>
      </section>
    </section>
    <section numbered="true" toc="default">
      <name>Terminology</name>
      <t>This document uses the following terms defined in <xref target="RFC5440"/>: ERO, LSPA, PCC,
   PCE, PCEP, PCEP Peer, and PCEP speaker.</t>
      <t>This document uses the following term defined in <xref target="RFC3031"/>: LSP.</t>
    </section>
    <section anchor="PCEP_EXTENSIONS" numbered="true" toc="default">
      <name>Overview of Extensions to PCEP</name>
      <section anchor="STATEFUL_PCE_CAPABILITY_TLV" numbered="true" toc="default">
        <name>New Flags in STATEFUL-PCE-CAPABILITY TLV</name>
        <t>The STATEFUL-PCE-CAPABILITY TLV is an optional TLV introduced in <xref target="RFC8231" format="default"/> in the OPEN object for stateful PCEP peer capability advertisement. This document defines the following new flags in that TLV:</t>
          <ul spacing="normal">
            <li>STRICT-PATH-CAPABILITY - 1 bit (Bit Position 18) - If set to 1, it indicates support for Strict-Path flag in LSP-EXTENDED-FLAG TLV. See <xref target="STRICT_PATH"/> for details.</li>
            <li>PATH-RECOMPUTATION-CAPABILITY - 1 bit (Bit Position 19) - If set to 1, it indicates support for PATH-RECOMPUTATION TLV. See <xref target="PATH_RECOMP"/> for details.</li>
          </ul>
      </section>
      <section anchor="LSP_EXTENDED_FLAG_TLV" numbered="true" toc="default">
        <name>New Flag in the LSP-EXTENDED-FLAG TLV</name>
        <t>O-flag is proposed in the LSP-EXTENDED-FLAG TLV, which was introduced in 3.1 of <xref target="RFC9357" format="default"/>.</t>

        <t>O (Strict-Path) - 1 bit (Bit Position 4): If set to 1, this indicates to the PCE that a path exclusively made of strict hops is required. Strict hop definition is described in Section 4.1</t>
      </section>
      <section anchor="PATH_RECOMPUTATION_TLV" numbered="true" toc="default">
        <name>PATH-RECOMPUTATION TLV</name>
        <t>This document defines new TLV for the LSPA Object for encoding information whether path recomputation is allowed for delegated LSP. The TLV is optional. If the TLV is included in LSPA object, the PCE MUST NOT recompute path in cases specified by flags in the TLV. Only the first instance of this TLV MUST be processed, subsequent instances MUST be ignored.</t>
        <artwork align="center" name="" type="" alt=""><![CDATA[
0                   1                   2                   3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|           Type = 72          |             Length = 4         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|             Reserved         |      Flags                 |P|F|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+]]></artwork>
        <t>Type (16 bits): 72.</t>
        <t>Length (16 bits): 4.</t>
        <dl newline="false" spacing="normal">
          <dt>Reserved (16 bits):</dt>
          <dd> MUST be set to zero by the sender and MUST be ignored by the receiver.</dd>
          <dt>Flags (16 bits):</dt>
          <dd>
            <t> This document defines the following flag bits.  The other bits
              MUST be set to zero by the sender and MUST be ignored by the receiver.
            </t>
            <ul spacing="normal">
              <li>P (Permanent): If set to 1, the PCE MUST NOT recompute path even if current path is not satisfying path computation constraints. If this flag is cleared, then the PCE SHOULD recompute path if original path is invalidated.</li>
              <li>F (Force): If set to 1, the PCE MUST NOT update path (exceptions description in Section 4.2). If flag is cleared, the PCE MAY update path based on explicit request from operator.</li>
            </ul>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="Operation" numbered="true" toc="default">
      <name>Operation</name>
      <section anchor="STRICT_PATH" numbered="true" toc="default">
        <name>Strict Path Enforcement</name>
        <t>PCC MAY set the O flag in LSP-EXTENDED-FLAG TLV in PCRpt message sent to the PCE to indicate that a path exclusively made of strict hops is required. It MUST NOT be set to 1 if one or both PCEP speakers have not set the STRICT-PATH-CAPABILITY flag to 1 in the STATEFUL-PCE-CAPABILITY TLV. If PCEP peer received LSP-EXTENDED-FLAG TLV with O flag set, but it does not support that flag, it MUST send PCErr with Error-Type = 2 (Capability not supported).</t>
        <t>O flag cleared or LSP-EXTENDED-FLAG TLV not included indicates that a loose path is acceptable.</t>
        <t>In PCUpd or PCInitiate messages, PCE MAY set O bit if strict path is provided.</t>
        <t>The flag is applicable only for stateful messages. Existing O flag in RP object MAY be used to indicate similar behavior in PCReq and PCRep messages as described in as described in Section 7.4.1 of <xref target="RFC5440" format="default"/>.</t>
        <t>If the O flag is set to 1 for both stateful and stateless messages for SR paths introduced in <xref target="RFC8664" format="default"/>, the PCE MUST use only Segment Identifiers (SIDs) that explicitly specify adjacencies for packet forwarding. For example Adjacency SIDs MAY be used, but Prefix SIDs MUST NOT be used (even if there is only one adjacency).</t>
      </section>
      <section anchor="PATH_RECOMP" numbered="true" toc="default">
        <name>Path Recomputation</name>
        <t>PCC MAY set flags in PATH-RECOMPUTATION TLV to control path computation behavior on PCE side. If TLV is not included, then the PCE MAY use local policy to trigger path-computation or LSP path update.</t>
        <t>If a PCEP speaker does not recognize the PATH-RECOMPUTATION TLV, it MUST ignore the TLV based on <xref target="RFC5440" sectionFormat="of" section="7.1" />. If a PCEP speaker recognizes the TLV but does not support the TLV, it MUST send PCErr with Error-Type = 2 (Capability not supported).</t>
        <t>The presence of the TLV is blocking path recomputation based on various triggers like topology update, any periodic update or changed state of other LSPs in the network. The LSP path MAY be modified if forwarded packets will still use the same path. For example, if the same path can be encoded using Adjacency, Binding, Prefix, or other SIDs, then PCE MAY switch between various representations of the same path.</t>
        <t>If P flag is cleared, the PCE MAY recompute if current path is not considered valid, for example after topology update resulting in path not satisfying LSP's path constraints, but it MUST NOT recompute path if current path is not optimal.</t>
        <t>If P flag is set, the PCE MUST NOT recompute path during LSP lifetime even if path is invalidated. Only exception is explicit request from operator to recompute path</t>
        <t>If F flag is cleared, path update triggered manually by operator or any northbound interface of PCE MAY be done. If flag is set then PCE can update path only to tear down LSP by sending PCUpd message with empty ERO ERO or to bring it up again with path, which was used before LSP was tore down.</t>
        <t>TLV MAY be included in PCInitiate and PCUpd messages to indicate, which triggers will be disabled on the PCE. PCC should reflect flag values in PCRpt messages to forward requirement to other PCEs in the network.</t>
      </section>
    </section>
    <section title="Manageability Considerations" numbered="true" toc="default">
      <t>All manageability requirements and considerations listed in <xref target="RFC5440"/>, <xref target="RFC8231"/> and <xref target="RFC8281"/> apply to PCEP protocol extensions defined in this document. In addition, requirements and considerations listed in this section apply.</t>
      <section title="Control of Function and Policy" numbered="true" toc="default">
        <t>A PCE or PCC implementation MAY allow the capability of supporting PCEP extensions introduced in this document to be enabled/disabled as part of the global configuration.</t>
      </section>
      <section title="Information and Data Models" numbered="true" toc="default">
        <t>An implementation SHOULD allow an operator to view the PCEP peer capability defined in this document. Section 4.1 and 4.1.1 of <xref target="I-D.ietf-pce-pcep-yang"/> should be extended to include that capability for PCEP peer.</t>
        <t>Section 4.2 of <xref target="I-D.ietf-pce-pcep-yang"/> module should be extended to add notification for blocked recomputation that satisfies specified constraints if recomputation is blocked using the PATH-RECOMPUTATION TLV.</t>
      </section>
      <section title="Liveness Detection and Monitoring" numbered="true" toc="default">
        <t>Circuit-Style Policy draft <xref target="I-D.ietf-spring-cs-sr-policy"/> is already describing connectivity verification and path validity considerations for Circuit Style Policies.</t>
      </section>
      <section title="Verify Correct Operations" numbered="true" toc="default">
        <t>A PCE implementation SHOULD notify the operator in case of blocked recomputation for an LSPthat no longer satisfies specified constraints. It SHOULD also allow the operator to view LSPs on the PCE that do not satisfy specified constraints.</t>
      </section>
      <section title="Requirements On Other Protocols" numbered="true" toc="default">
        <t>The PCEP extensions defined in this document do not imply any new requirements on other protocols. Overall concept of Circuit Style policies requires interaction with other protocols, but those requirements are already described in <xref target="I-D.ietf-spring-cs-sr-policy"/>.</t>
      </section>
      <section title="Impact On Network Operations" numbered="true" toc="default">
        <t>The mechanisms defined in <xref target="RFC5440"/>, <xref target="RFC8231"/>, and <xref target="RFC8281"/> also apply to the PCEP extensions defined in this document.</t>
      </section>
    </section>
    <section  title="Implementation Status" numbered="true" toc="default">
      <t>[Note to the RFC Editor - remove this section before publication, as
      well as remove the reference to RFC 7942.]</t>

      <t>This section records the status of known implementations of the
      protocol defined by this specification at the time of posting of this
      Internet-Draft, and is based on a proposal described in <xref
      target="RFC7942"/>. The description of implementations in this section
      is intended to assist the IETF in its decision processes in progressing
      drafts to RFCs. Please note that the listing of any individual
      implementation here does not imply endorsement by the IETF. Furthermore,
      no effort has been spent to verify the information presented here that
      was supplied by IETF contributors. This is not intended as, and must not
      be construed to be, a catalog of available implementations or their
      features. Readers are advised to note that other implementations may
      exist.</t>
 

      <t>According to <xref target="RFC7942"/>, "this will allow reviewers and
      working groups to assign due consideration to documents that have the
      benefit of running code, which may serve as evidence of valuable
      experimentation and feedback that have made the implemented protocols
      more mature. It is up to the individual working groups to use this
      information as they see fit".</t>

      <section anchor="Cisco" title="Cisco" numbered="true" toc="default">
        <ul>
            <li>Organization: Cisco Systems</li>

            <li>Implementation: IOS-XR PCC and PCE.</li>

            <li>Description: PCEP extensions supported using VENDOR-INFORMATION Object.</li>

            <li>Maturity Level: Production.</li>

            <li>Coverage: Partial.</li>

            <li>Contact: ssidor@cisco.com</li>
        </ul>
      </section>
    </section> 
    <section  title="Security Considerations" numbered="true" toc="default">
            <t>The security considerations described in <xref target="RFC5440"/>,
      <xref target='RFC8231'/>, <xref target='RFC8253'/>,<xref target='RFC8281'/> and <xref target="RFC8664"/> in itself.</t>
            <t>Note that this specification introduces the possibility to block path recomputation after various topology events. This creates an additional vulnerability if the security mechanisms of <xref target='RFC5440'/>, <xref target='RFC8231'/>, and <xref target='RFC8281'/> are not used. If there is no integrity protection on the session, then an attacker could block path updates from PCE potentially resulting in traffic drop.</t>

            <t>As per <xref format="default" target="RFC8231"/> it is RECOMMENDED
            that these PCEP extensions only be activated on authenticated and
            encrypted sessions across PCEs and PCCs using Transport Layer Security
            (TLS) <xref format="default" target="RFC8253"/>, as per the
            recommendations and best current practices in RFC 9325
            <xref target="BCP195" format="default" derivedContent="BCP195"/>
            (unless explicitly set aside in <xref format="default" target="RFC8253"/>).</t>
    </section>
    <section anchor="IANA" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <section anchor="IANA_CAPABILITY" numbered="true" toc="default">
        <name>STATEFUL-PCE-CAPABILITY</name>
        <t><xref target="RFC8231" format="default"/> defines the STATEFUL-PCE-CAPABILITY.
        IANA is requested to confirm the following allocation in the "STATEFUL-PCE-CAPABILITY TLV Flag Field" within the "Path Computation Element Protocol (PCEP) Numbers" registry group:</t>
        <table anchor="STATEFUL_PCE_CAPABILITY_FLAGS" align="center">
          <thead>
            <tr>
              <th align="center">Bit</th>
              <th align="left">Description </th>
              <th align="left">Reference </th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="center">18</td>
              <td align="left">STRICT-PATH-CAPABILITY</td>
              <td align="left">This document</td>
            </tr>
          </tbody>
          <tbody>
            <tr>
              <td align="center">19</td>
              <td align="left">PATH-RECOMPUTATION-CAPABILITY</td>
              <td align="left">This document</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="IANA_O_FLAG" numbered="true" toc="default">
        <name>LSP-EXTENDED-FLAG TLV</name>
        <t><xref target="RFC9357" format="default"/> defines the LSP-EXTENDED-FLAG TLV.
        IANA is requested to confirm the following allocation in the "LSP-EXTENDED-FLAG TLV Flag Field" within the "Path Computation Element Protocol (PCEP) Numbers" registry group:</t>
        <table anchor="EXTENDED_TLV_O_FLAG-VALUE" align="center">
          <thead>
            <tr>
              <th align="center">Bit</th>
              <th align="left">Description </th>
              <th align="left">Reference </th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="center">4</td>
              <td align="left">Strict-Path Flag (O)</td>
              <td align="left">This document</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="IANA_RECOMP_TLV" numbered="true" toc="default">
        <name>PATH-RECOMPUTATION TLV</name>
        <t>IANA is requested to confirm the following allocation in the "PCEP TLV Type Indicators" within the "Path Computation Element Protocol (PCEP) Numbers" registry group:</t>
        <table anchor="RECOMP_TLV_TYPE" align="center">
          <thead>
            <tr>
              <th align="center">TLV Type</th>
              <th align="left">TLV Name</th>
              <th align="left">Reference </th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="center">72</td>
              <td align="left">PATH-RECOMPUTATION TLV</td>
              <td align="left">This document</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="IANA_RECOMP_TLV_FLAGS" numbered="true" toc="default">
        <name>PATH-RECOMPUTATION TLV Flag Field</name>
        <t>IANA has created a new registry named "PATH-RECOMPUTATION TLV Flag Field" within the "Path Computation Element Protocol (PCEP) Numbers" registry group. New values are to be assigned by "IETF Review" <xref target="RFC8126"/>. Each bit should be tracked with the following qualities:</t>
            <ul spacing="normal">
              <li>Bit number (count from 0 as the most significant bit)</li>
              <li>Description</li>
              <li>Reference</li>
            </ul>
        <t>The registry contains the following codepoints, with initial values, to be assigned by IANA with the reference set to this document:</t>
        <table anchor="RECOMP_TLV_TYPE_FLAGS" align="center">
          <thead>
            <tr>
              <th align="center">Bit</th>
              <th align="left">Description</th>
              <th align="left">Reference </th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="center">0-13</td>
              <td align="left">Unassigned</td>
              <td align="left"></td>
            </tr>
          </tbody>
          <tbody>
            <tr>
              <td align="center">14</td>
              <td align="left">Permanent</td>
              <td align="left">This document</td>
            </tr>
          </tbody>
          <tbody>
            <tr>
              <td align="center">15</td>
              <td align="left">Force</td>
              <td align="left">This document</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <referencegroup anchor="BCP195" target="https://www.rfc-editor.org/info/bcp195" derivedAnchor="BCP195">
          <reference anchor="RFC8996" target="https://www.rfc-editor.org/info/rfc8996" quoteTitle="true">
            <front>
              <title>Deprecating TLS 1.0 and TLS 1.1</title>
              <author fullname="K. Moriarty" initials="K." surname="Moriarty"/>
              <author fullname="S. Farrell" initials="S." surname="Farrell"/>
              <date month="March" year="2021"/>
              <abstract>
                <t indent="0">This document formally deprecates Transport Layer Security (TLS) versions 1.0 (RFC 2246) and 1.1 (RFC 4346). Accordingly, those documents have been moved to Historic status. These versions lack support for current and recommended cryptographic algorithms and mechanisms, and various government and industry profiles of applications using TLS now mandate avoiding these old TLS versions. TLS version 1.2 became the recommended version for IETF protocols in 2008 (subsequently being obsoleted by TLS version 1.3 in 2018), providing sufficient time to transition away from older versions. Removing support for older versions from implementations reduces the attack surface, reduces opportunity for misconfiguration, and streamlines library and product maintenance.</t>
                <t indent="0">This document also deprecates Datagram TLS (DTLS) version 1.0 (RFC 4347) but not DTLS version 1.2, and there is no DTLS version 1.1.</t>
                <t indent="0">This document updates many RFCs that normatively refer to TLS version 1.0 or TLS version 1.1, as described herein. This document also updates the best practices for TLS usage in RFC 7525; hence, it is part of BCP 195.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="195"/>
            <seriesInfo name="RFC" value="8996"/>
            <seriesInfo name="DOI" value="10.17487/RFC8996"/>
          </reference>
          <reference anchor="RFC9325" target="https://www.rfc-editor.org/info/rfc9325" quoteTitle="true">
            <front>
              <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
              <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
              <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
              <author fullname="T. Fossati" initials="T." surname="Fossati"/>
              <date month="November" year="2022"/>
              <abstract>
                <t indent="0">Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are used to protect data exchanged over a wide range of application protocols and can also form the basis for secure transport protocols. Over the years, the industry has witnessed several serious attacks on TLS and DTLS, including attacks on the most commonly used cipher suites and their modes of operation. This document provides the latest recommendations for ensuring the security of deployed services that use TLS and DTLS. These recommendations are applicable to the majority of use cases.</t>
                <t indent="0">RFC 7525, an earlier version of the TLS recommendations, was published when the industry was transitioning to TLS 1.2. Years later, this transition is largely complete, and TLS 1.3 is widely available. This document updates the guidance given the new environment and obsoletes RFC 7525. In addition, this document updates RFCs 5288 and 6066 in view of recent attacks.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="195"/>
            <seriesInfo name="RFC" value="9325"/>
            <seriesInfo name="DOI" value="10.17487/RFC9325"/>
          </reference>
        </referencegroup>
        <?rfc include="reference.RFC.2119"?>
        <?rfc include="reference.RFC.5440"?>
        <?rfc include="reference.RFC.8126"?>
        <?rfc include="reference.RFC.8174"?>
        <?rfc include="reference.RFC.8231"?>
        <?rfc include="reference.RFC.8253"?>
        <?rfc include="reference.RFC.8281"?>
        <?rfc include="reference.RFC.8664"?>
        <?rfc include="reference.RFC.9357"?>
        
      </references>
      <references>
        <name>Informative References</name>
        <?rfc include="reference.RFC.3031"?>
        <?rfc include="reference.RFC.7942"?>
        <?rfc include="reference.I-D.ietf-pce-pcep-yang"?>
        <?rfc include="reference.I-D.ietf-spring-cs-sr-policy"?>
      </references>
    </references>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="D." surname="Voyer" fullname="Daniel Voyer">
        <organization>Bell Canada</organization>
        <address>
          <email>daniel.voyer@bell.ca</email>
        </address>
      </contact>
      <contact initials="R." surname="Rokui" fullname="Reza Rokui">
        <organization>Ciena</organization>
        <address>
          <email>rrokui@ciena.com</email>
        </address>
      </contact>
      <contact initials="T." surname="Saad" fullname="Tarek Saad">
        <organization>Cisco Systems, Inc.</organization>
        <address>
          <email>tsaad.net@gmail.com</email>
        </address>
      </contact>
      <author initials="Z." surname="Ali" fullname="Zafar Ali">
        <organization>Cisco Systems, Inc.</organization>
        <address>
          <email>zali@cisco.com</email>
        </address>
    </author>
    <author initials="R." surname="Chen" fullname="Ran Chen">
        <organization>ZTE Corporation</organization>
        <address>
          <email>chen.ran@zte.com.cn</email>
        </address>
    </author>
    <author initials="Q." surname="Xiong" fullname="Quan Xiong">
        <organization>ZTE Corporation</organization>
        <address>
          <email>xiong.quan@zte.com.cn</email>
        </address>
    </author>
    <author initials="D." surname="Dhody" fullname="Dhruv Dhody">
      <organization>Huawei</organization>
      <address>
        <email>dhruv.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="C." surname="Schmutzer" fullname="Christian Schmutzer">
      <organization>Cisco Systems, Inc.</organization>
      <address>
        <email>cschmutz@cisco.com</email>
      </address>
    </author>
    </section>
  </back>
</rfc>
