<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.21 (Ruby 3.0.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc rfcedstyle="yes"?>
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc text-list-symbols="-o*+"?>
<?rfc docmapping="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-tls-extended-key-update-05" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="Extended Key Update for TLS">Extended Key Update for Transport Layer Security (TLS) 1.3</title>

    <author initials="H." surname="Tschofenig" fullname="Hannes Tschofenig">
      <organization>Siemens</organization>
      <address>
        <email>hannes.tschofenig@gmx.net</email>
      </address>
    </author>
    <author initials="M." surname="Tüxen" fullname="Michael Tüxen">
      <organization>Münster Univ. of Applied Sciences</organization>
      <address>
        <email>tuexen@fh-muenster.de</email>
      </address>
    </author>
    <author initials="T." surname="Reddy" fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author initials="S." surname="Fries" fullname="Steffen Fries">
      <organization>Siemens</organization>
      <address>
        <email>steffen.fries@siemens.com</email>
      </address>
    </author>
    <author initials="Y." surname="Rosomakho" fullname="Yaroslav Rosomakho">
      <organization>Zscaler</organization>
      <address>
        <email>yrosomakho@zscaler.com</email>
      </address>
    </author>

    <date year="2025" month="July" day="07"/>

    <area>Security</area>
    <workgroup>Transport Layer Security</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 84?>

<t>TLS 1.3 ensures forward secrecy by performing an ephemeral Diffie-Hellman key exchange
during the initial handshake, protecting past communications even if a party's
long-term keys are later compromised. While the built-in KeyUpdate mechanism allows
traffic keys to be refreshed during a session, it does not introduce new forward-secret
key material. This limitation can pose a security risk in long-lived sessions, such as
those found in industrial IoT or telecommunications environments.</t>

<t>To address this, this specification defines an extended key update mechanism that
performs a fresh Diffie-Hellman exchange within an active session, thereby
re-establishing forward secrecy beyond the initial handshake. By forcing attackers
to exfiltrate new key material repeatedly, this approach mitigates the risks
associated with static key compromise. Regular renewal of session keys helps
contain the impact of such compromises. The extension is applicable to both TLS 1.3
and DTLS 1.3.</t>



    </abstract>



  </front>

  <middle>


<?line 101?>

<section anchor="introduction"><name>Introduction</name>

<t>The Transport Layer Security (TLS) 1.3 protocol provides forward secrecy by using
an ephemeral Diffie-Hellman (DHE) key exchange during the initial handshake. This
ensures that encrypted communication remains confidential even if an attacker
later obtains a party's long-term private key, protecting against passive adversaries
who record encrypted traffic for later decryption.</t>

<t>TLS 1.3 also includes a KeyUpdate mechanism that allows traffic keys to be refreshed
during an established session. However, this mechanism does not introduce new
forward-secret key material, as it applies only a key derivation function to the
previous application traffic secret as input. While this design is generally sufficient
for short-lived connections, it may present security limitations in scenarios where
sessions persist for extended periods, such as in industrial IoT or telecommunications
systems, where continuous availability is critical and session renegotiation or resumption
is impractical.</t>

<t>Earlier versions of TLS supported session renegotiation, which allowed peers to negotiate
fresh keying material, including performing new Diffie-Hellman exchanges during the
session lifetime. Due to protocol complexity and known vulnerabilities, renegotiation
was first restricted by <xref target="RFC5746"/> and ultimately removed in TLS 1.3. While the
KeyUpdate message was introduced to offer limited rekeying functionality, it does
not fulfill the same cryptographic role as renegotiation and cannot refresh
long-term secrets or derive new secrets from fresh DHE input.</t>

<t>Security guidance from national agencies, such as ANSSI (France), recommends the
periodic renewal of cryptographic keys during long-lived sessions to limit the
impact of key compromise. This approach encourage designs designs that force an
attacker to perform dynamic key exfiltration, as defined in <xref target="RFC7624"/>. Dynamic
key exfiltration refers to attack scenarios where an adversary must repeatedly
extract fresh keying material to maintain access to protected data, increasing
operational cost and risk for the attacker. In contrast, static key exfiltration,
where a long-term secret is extracted once and reused, poses a greater long-term
threat, especially when session keys are not refreshed with forward-secret input.</t>

<t>This specification defines a TLS extension that introduces an extended key update
mechanism. Unlike the standard key update, this mechanism allows peers to perform a
fresh Diffie-Hellman exchange within an active session using one of the groups
negotiated during the initial handshake. By periodically rerunning (EC)DHE, this
extension enables the derivation of new traffic secrets that are independent of
prior key material. As noted in Appendix F of <xref target="I-D.ietf-tls-rfc8446bis"/>, this
approach mitigates the risk of static key exfiltration and shifts the attacker
burden toward dynamic key exfiltration.</t>

<t>The proposed extension is applicable to both TLS 1.3 and DTLS 1.3. For clarity,
the term "TLS" is used throughout this document to refer to both protocols unless
otherwise specified.</t>

</section>
<section anchor="terminology-and-requirements-language"><name>Terminology and Requirements Language</name>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119 <xref target="RFC2119"/>.</t>

<t>To distinguish the key update procedure defined in <xref target="I-D.ietf-tls-rfc8446bis"/>
from the key update procedure specified in this document, we use the terms
"standard key update" and "extended key update", respectively.</t>

</section>
<section anchor="negotiating-the-extended-key-update"><name>Negotiating the Extended Key Update</name>

<t>Client and servers use the TLS flags extension
<xref target="I-D.ietf-tls-tlsflags"/> to indicate support for the functionality
defined in this document.  We call this the "extended_key_update"
extension and the corresponding flag is called "Extended_Key_Update"
flag.</t>

<t>The "Extended_Key_Update" flag proposed by the client in the
ClientHello (CH) MUST be acknowledged in the EncryptedExtensions
(EE), if the server also supports the functionality defined in this
document and is configured to use it.</t>

<t>If the "Extended_Key_Update" flag is not set, servers ignore any of the
functionality specified in this document and applications that
require perfect forward security will have to initiate a full
handshake.</t>

</section>
<section anchor="ext-key-update"><name>Extended Key Update Messages</name>
<t>=======
If the client and server agree to use the extended key update mechanism,
the standard key update MUST NOT be used. In this case, the extended
key update fully replaces the standard key update functionality.</t>

<t>Implementations that receive a classic KeyUpdate message after successfully
negotiating the Extended Key Update functionality MUST terminate the
connection with an "unexpected_message" alert.</t>

<t>The extended key update handshake message exchange used to perform an update
of cryptographic keys. This key update process can be sent by either
peer after it has sent a Finished message.  Implementations that
receive a ExtendedKeyUpdateRequest message prior to receiving a Finished
message MUST terminate the connection with an "unexpected_message"
alert.</t>

<t>The KeyShareEntry in the ExtendedKeyUpdateRequest message and in the
ExtendedKeyUpdateResponse message MUST be the same
algorithm mutually supported by the client and server during the initial
handshake. An implementation that receives an algorithm not previously
negotiated MUST terminate the connection with an "illegal_parameter" alert.</t>

<t><xref target="fig-key-update"/> shows the interaction graphically.
First, support for the functionality in this specification
is negotiated in the ClientHello and the EncryptedExtensions
messages. Then, the ExtendedKeyUpdate exchange is sent to
update the application traffic secrets.</t>

<t>The extended key update exchange is performed between the initiator and the
responder whereby the initiator may be the TLS client or the TLS server.</t>

<figure title="Extended Key Update Message Exchange." anchor="fig-key-update"><artwork><![CDATA[
       Client                                           Server

Key  ^ ClientHello
Exch | + key_share
     | + signature_algorithms
     v + extended_key_update       -------->
                                                  ServerHello  ^ Key
                                                  + key_share  | Exch
                                                               v
                                        {EncryptedExtensions   ^ Server
                                       + extended_key_update}  | Params
                                         {CertificateRequest}  v
                                                {Certificate}  ^
                                          {CertificateVerify}  | Auth
                                                   {Finished}  v
                               <--------
     ^ {Certificate}
Auth | {CertificateVerify}
     v {Finished}              -------->
       [Application Data]N     <------->  [Application Data]N
                                  ...
[ExtendedKeyUpdateRequest]N    -------->
                               <--------  [ExtendedKeyUpdateResponse]N
            [NewKeyUpdate]N    -------->
                               <--------  [NewKeyUpdate]N
                                  ...
       [Application Data]N+1   <------->  [Application Data]N+1

Legend:

        Indicates noteworthy extensions sent in the
        previously noted message.

-       Indicates optional or situation-dependent
        messages/extensions that are not always sent.

    () Indicates messages protected using keys
    derived from a client_early_traffic_secret.

    {} Indicates messages protected using keys
    derived from a [sender]_handshake_traffic_secret.

    []N Indicates messages protected using keys
    derived from [sender]_application_traffic_secret_N.

]]></artwork></figure>

<t>The structure of the ExtendedKeyUpdate message is shown below.</t>

<figure><artwork><![CDATA[
struct {
  KeyShareEntry key_share;
} ExtendedKeyUpdateRequest;

enum {
  accepted(0),
  retry(1),
  rejected(2),
  clashed(3),
  (255)
} ExtendedKeyUpdateResponseStatus;

struct {
  ExtendedKeyUpdateResponseStatus status;
  select (ExtendedKeyUpdateResponse.status) {
     case accepted: KeyShareEntry key_share;
     case retry: uint8 delay;
  }
} ExtendedKeyUpdateResponse;

struct {
} NewKeyUpdate;
]]></artwork></figure>

<t>key_share:  Key share information.  The contents of this field
  are determined by the specified group and its corresponding
  definition. The structures are defined in <xref target="I-D.ietf-tls-rfc8446bis"/>.</t>

<t>status:  Response to ExtendedKeyUpdateRequest. This status field indicates
  whether responder accepted or declined Extended Key Update Request.</t>

<t>delay:  Delay in seconds for the initiator to retry the request.</t>

<t>There are three rejection reasons defined:</t>

<t><list style="numbers" type="1">
  <t><spanx style="verb">retry</spanx>: request was declined temporarily as responder is too busy.
In this case ExtendedKeyUpdateResponse contains delay in seconds for initiator
to retry. Initiator MUST NOT retry within this interval and SHOULD retry after
it lapsed. Note that responder MAY apply an overall rate limit to extended key
update that would not be specific to given TLS session. If initiator cannot
proceed without immediate Extended Key Update it MUST terminate the connection
with TLS alert "extended_key_update_required" (alert number TBD).</t>
  <t><spanx style="verb">rejected</spanx>: request was declined permanently. Initiator MUST NOT retry and
if it cannot proceed without Extended Key Update it MUST terminate the
connection with alert "extended_key_update_required" (alert number TBD).</t>
  <t><spanx style="verb">clashed</spanx>: request was declined because responder already initiated its own
extended key update.</t>
</list></t>

<t>The exchange has the following steps:</t>

<t><list style="numbers" type="1">
  <t>Initiator sends a ExtendedKeyUpdateRequest message, which contains
a key share. While an extended key update is in progress, the initiator
MUST NOT initiate further key updates.</t>
  <t>On receipt of the ExtendedKeyUpdateRequest message, the responder
sends the ExtendedKeyUpdateResponse message. If the responder accepts the
request, it sets the status to <spanx style="verb">accepted</spanx> and includes its own key share.
If the responder declines the request, it sets the status accordingly and
does not include the key share. While an extended key update is in progress,
the responder MUST NOT initiate further key updates.</t>
  <t>On receipt of the ExtendedKeyUpdateResponse message with <spanx style="verb">accepted</spanx> status,
the initiator is able to derive a secret key based on the exchanged key shares.
The NewKeyUpdate message is intentionally an empty structure that triggers
the transition to new keying material.</t>
  <t>On receipt of the NewKeyUpdate message by the responder, it MUST update
its receive keys. In response, the responder transmits a NewKeyUpdate message
and MUST update its sending keys.</t>
  <t>After receiving the NewKeyUpdate message from the responder, the initiator
MUST update its traffic keys and MUST send all its traffic using the next
generation of keys.</t>
</list></t>

<t>Both sender and receiver MUST encrypt their NewKeyUpdate messages with
the old keys. Both sides MUST ensure that the NewKeyUpdate encrypted
with the old key is received before accepting any messages encrypted
with the new key.</t>

<t>If TLS peers independently initiate the extended key update
procedure and the requests cross in flight, the ExtendedKeyUpdateRequest
message with the lower lexicographic order for the key_exchange value
in the KeyShareEntry will be rejected by the responder using <spanx style="verb">clashed</spanx> status
in ExtendedKeyUpdateResponse message. This approach prevents each side incrementing
keys by two generations.</t>

<figure title="Handshake Structure." anchor="fig-handshake"><artwork><![CDATA[
      struct {
          HandshakeType msg_type;    /* handshake type */
          uint24 length;             /* bytes in message */
          select (Handshake.msg_type) {
              case client_hello:          ClientHello;
              case server_hello:          ServerHello;
              case end_of_early_data:     EndOfEarlyData;
              case encrypted_extensions:  EncryptedExtensions;
              case certificate_request:   CertificateRequest;
              case certificate:           Certificate;
              case certificate_verify:    CertificateVerify;
              case finished:              Finished;
              case new_session_ticket:    NewSessionTicket;
              case key_update:            KeyUpdate;
              case extended_key_update:   ExtendedKeyUpdate;
          };
      } Handshake;
]]></artwork></figure>

</section>
<section anchor="key_update"><name>Updating Traffic Secrets</name>

<t>When the extended key update message exchange is completed both peers
have successfully updated their application traffic secrets. The
key derivation function described in this document is used to perform
this update.</t>

<t>The design of the key derivation function for computing the next generation
of application_traffic_secret is motivated by the desire to include</t>

<t><list style="symbols">
  <t>a secret derived from the (EC)DHE exchange (or from the hybrid key exchange
/ PQ-KEM exchange),</t>
  <t>a secret that allows the new key exchange to be cryptographally bind
the previously established secret to the newly derived secret,</t>
  <t>the concatenation of the ExtendedKeyUpdateRequest and the
ExtendedKeyUpdateResponse messages, which contain the key shares, binding
the encapsulated shared secret ciphertext to IKM in case of hybrid key
exchange, providing MAL-BIND-K-CT security (see <xref target="CDM23"/>), and</t>
  <t>new label strings to distinguish it from the key derivation used in
TLS 1.3.</t>
</list></t>

<t>The following diagram shows the key derivation hierarchy.</t>

<figure><artwork><![CDATA[
       Master Secret N
             |
             v
       Derive-Secret(., "key derived", "")
             |
             v
 (EC)DHE -> HKDF-Extract = Master Secret N+1
             |
             +-----> Derive-Secret(., "c ap traffic2",
             |                ExtendedKeyUpdateRequest ||
             |                ExtendedKeyUpdateResponse)
             |                = client_application_traffic_secret_N+1
             |
             +-----> Derive-Secret(., "s ap traffic2",
             |                ExtendedKeyUpdateRequest ||
             |                ExtendedKeyUpdateResponse)
             |                = server_application_traffic_secret_N+1
             |
             +-----> Derive-Secret(., "exp master2",
             |                ExtendedKeyUpdateRequest ||
             |                ExtendedKeyUpdateResponse)
             |                = exporter_master_secret_N+1
             |
             +-----> Derive-Secret(., "res master2",
             |                ExtendedKeyUpdateRequest ||
             |                ExtendedKeyUpdateResponse))
                              = resumption_master_secret_N+1
]]></artwork></figure>

<t>During the initial handshake the Master Secret is generated, see
<xref section="7.1" sectionFormat="of" target="I-D.ietf-tls-rfc8446bis"/>. Since the Master Secret
is discarded during the key derivation procedure, a derived value is
stored. This value then serves as input to another key derivation step
that takes the (EC)DHE-established value as a second parameter into
account.</t>

<t>The traffic keys are re-derived from client_application_traffic_secret_N+1
and server_application_traffic_secret_N+1, as described in
<xref section="7.3" sectionFormat="of" target="I-D.ietf-tls-rfc8446bis"/>.</t>

<t>Once client_/server_application_traffic_secret_N+1 and its associated
traffic keys have been computed, implementations SHOULD delete
client_/server_application_traffic_secret_N and its associated
traffic keys as soon as possible. Note: The
client_/server_application_traffic_secret_N and its associated
traffic keys can only be deleted after receiving the NewKeyUpdate message.</t>

<t>When using this extension, it is important to consider its interaction with
ticket-based session resumption. If resumption occurs without a new (EC)DH
exchange that provides forward secrecy, an attacker could potentially revert
the security context to an earlier state, thereby negating the benefits of
the extended key update. To preserve the security guarantees provided by key
updates, endpoints MUST either invalidate any session tickets issued prior
to the key update or ensure that resumption always involves a fresh (EC)DH
exchange.</t>

<t>If session tickets cannot be stored securely, developers SHOULD consider
disabling ticket-based resumption in their deployments. While this approach
may impact performance, it provides improved security properties.</t>

</section>
<section anchor="example"><name>Example</name>

<t><xref target="fig-key-update"/> shows the interaction between a TLS 1.3 client
and server graphically. This section shows an example message exchange
where a client updates its sending keys.</t>

<t>There are two phases:</t>

<t><list style="numbers" type="1">
  <t>The support for the functionality in this specification
is negotiated in the ClientHello and the EncryptedExtensions
messages.</t>
  <t>Once the initial handshake is completed, a key update can be
triggered.</t>
</list></t>

<t><xref target="fig-key-update2"/> provides an overview of the exchange starting
with the initial negotiation followed by the key update.</t>

<figure title="Extended Key Update Message Exchange." anchor="fig-key-update2"><artwork><![CDATA[
       Client                                           Server

Key  ^ ClientHello
Exch | + key_share
     | + signature_algorithms
     v + extended_key_update
                             -------->
                                                  ServerHello  ^ Key
                                                  + key_share  | Exch
                                                               v
                                        {EncryptedExtensions   ^ Server
                                       + extended_key_update}  | Params
                                         {CertificateRequest}  v
                                                {Certificate}  ^
                                          {CertificateVerify}  | Auth
                                                   {Finished}  v
                               <--------
     ^ {Certificate}
Auth | {CertificateVerify}
     v {Finished}              -------->
                                  ...
                              some time later
                                  ...
 [ExtendedKeyUpdateRequest     -------->
  (with key_share)]
                               <-------- [ExtendedKeyUpdateResponse
                                           (with key_share)]
 [NewKeyUpdate]                -------->
                               <-------- [NewKeyUpdate]
]]></artwork></figure>

</section>
<section anchor="dtls-13-considerations"><name>DTLS 1.3 Considerations</name>

<t>Due to the possibility of a NewKeyUpdate message being lost and
thereby preventing the sender of the NewKeyUpdate message
from updating its keying material, receivers MUST retain the
pre-update keying material until receipt and successful decryption
of a message using the new keys.</t>

<t>Due to loss and/or reordering, DTLS 1.3 implementations may receive a
record with an older epoch than the current one. They SHOULD attempt to
process those records with that epoch but MAY opt to discard
such out-of-epoch records.</t>

</section>
<section anchor="post-quantum-cryptography-considerations"><name>Post-Quantum Cryptography Considerations</name>

<t>Hybrid key exchange refers to using multiple key exchange algorithms
simultaneously and combining the result with the goal of providing
security even if all but one of the component algorithms is broken.
The transition to post-quantum cryptography motivates the introduction
of hybrid key exchanges to TLS, as described in
<xref target="I-D.ietf-tls-hybrid-design"/>. When the hybrid key exchange is used,
then the key_exchange field of a KeyShareEntry in the initial exchange
is the concatenation of the key_exchange field for each of the algorithms.
The same approach is then re-used in the extended key update when
key shares are exchanged.</t>

</section>
<section anchor="sslkeylogfile-update"><name>SSLKEYLOGFILE Update</name>

<t>As a successful extended key update exchange invalidates previous secrets,
SSLKEYLOGFILE <xref target="I-D.ietf-tls-keylogfile"/> needs to be populated with new
entries. As a result, two additional secret labels are utilized in the
SSLKEYLOGFILE:</t>

<t><list style="numbers" type="1">
  <t><spanx style="verb">CLIENT_TRAFFIC_SECRET_N+1</spanx>: identifies the client_application_traffic_secret_N+1 in the key schedule</t>
  <t><spanx style="verb">SERVER_TRAFFIC_SECRET_N+1</spanx>: identifies the server_application_traffic_secret_N+1 in the key schedule</t>
</list></t>

<t>Similar to other entries in the SSLKEYLOGFILE, the label is followed by the
32-byte value of the Random field from the ClientHello message that
established the TLS connection, and the corresponding secret encoded in
hexadecimal.</t>

<t>SSLKEYLOGFILE entries for the extended key update MUST NOT be produced if
SSLKEYLOGFILE was not used for other secrets in the handshake.</t>

<t>Note that each successful Extended Key Update invalidates all previous SSLKEYLOGFILE
secrets including past iterations of <spanx style="verb">CLIENT_TRAFFIC_SECRET_</spanx> and
<spanx style="verb">SERVER_TRAFFIC_SECRET_</spanx>.</t>

</section>
<section anchor="exporter"><name>Exporter</name>

<t>Protocols like DTLS-SRTP and DTLS-over-SCTP utilize TLS or DTLS for key establishment but repurpose
some of the keying material for their own purpose. These protocols use the TLS exporter defined in
<xref section="7.5" sectionFormat="of" target="I-D.ietf-tls-rfc8446bis"/>.</t>

<t>Once the Extended Key Update mechanism is complete, such protocols would need to use the newly
derived key to generate Exported Keying Material (EKM) to protect packets. The "sk" derived in the
<xref target="key_update"/> will be used as the "Secret" in the exporter function, defined in
<xref section="7.5" sectionFormat="of" target="I-D.ietf-tls-rfc8446bis"/>, to generate EKM, ensuring that the exported keying
material is aligned with the updated security context.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>This entire document is about security.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<section anchor="tls-alerts"><name>TLS Alerts</name>

<t>IANA is requested to allocate value TBD for the "extended_key_update_required"
alert in the "TLS Alerts" registry. The value for the "DTLS-OK" column is "Y".</t>

</section>
<section anchor="tls-flags"><name>TLS Flags</name>

<t>IANA is requested to add the following entry to the "TLS Flags"
extension registry <xref target="TLS-Ext-Registry"/>:</t>

<t><list style="symbols">
  <t>Value: TBD1</t>
  <t>Flag Name: extended_key_update</t>
  <t>Messages: CH, EE</t>
  <t>Recommended: Y</t>
  <t>Reference: [This document]</t>
</list></t>

</section>
<section anchor="tls-handshaketype"><name>TLS HandshakeType</name>

<t>IANA is requested to add the following entries to the "TLS HandshakeType"
registry <xref target="TLS-Ext-Registry"/>.</t>

<section anchor="extendedkeyupdaterequest-message"><name><spanx style="verb">extended_key_update_request</spanx> Message</name>

<t><list style="symbols">
  <t>Value: TBD2</t>
  <t>Description: extended_key_update</t>
  <t>DTLS-OK: Y</t>
  <t>Reference: [This document]</t>
  <t>Comment:</t>
</list></t>

</section>
<section anchor="extendedkeyupdateresponse-message"><name><spanx style="verb">extended_key_update_response</spanx> Message</name>

<t><list style="symbols">
  <t>Value: TBD3</t>
  <t>Description: extended_key_update_response</t>
  <t>DTLS-OK: Y</t>
  <t>Reference: [This document]</t>
  <t>Comment:</t>
</list></t>

</section>
<section anchor="newkeyupdate-message"><name><spanx style="verb">new_key_update</spanx> Message</name>

<t><list style="symbols">
  <t>Value: TBD3</t>
  <t>Description: new_key_update</t>
  <t>DTLS-OK: Y</t>
  <t>Reference: [This document]</t>
  <t>Comment:</t>
</list></t>

</section>
</section>
</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>


<reference anchor="I-D.ietf-tls-rfc8446bis">
   <front>
      <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
      <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
         <organization>Independent</organization>
      </author>
      <date day="17" month="February" year="2025"/>
      <abstract>
	 <t>   This document specifies version 1.3 of the Transport Layer Security
   (TLS) protocol.  TLS allows client/server applications to communicate
   over the Internet in a way that is designed to prevent eavesdropping,
   tampering, and message forgery.

   This document updates RFCs 5705, 6066, 7627, and 8422 and obsoletes
   RFCs 5077, 5246, 6961, 8422, and 8446.  This document also specifies
   new requirements for TLS 1.2 implementations.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8446bis-12"/>
   
</reference>

<reference anchor="RFC9147">
  <front>
    <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
    <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
    <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
    <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
    <date month="April" year="2022"/>
    <abstract>
      <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
      <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
      <t>This document obsoletes RFC 6347.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9147"/>
  <seriesInfo name="DOI" value="10.17487/RFC9147"/>
</reference>


<reference anchor="I-D.ietf-tls-tlsflags">
   <front>
      <title>A Flags Extension for TLS 1.3</title>
      <author fullname="Yoav Nir" initials="Y." surname="Nir">
         <organization>Dell Technologies</organization>
      </author>
      <date day="15" month="March" year="2025"/>
      <abstract>
	 <t>   A number of extensions are proposed in the TLS working group that
   carry no interesting information except the 1-bit indication that a
   certain optional feature is supported.  Such extensions take 4 octets
   each.  This document defines a flags extension that can provide such
   indications at an average marginal cost of 1 bit each.  More
   precisely, it provides as many flag extensions as needed at 4 + the
   order of the last set bit divided by 8.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-tls-tlsflags-15"/>
   
</reference>




    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="RFC9325">
  <front>
    <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
    <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
    <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
    <author fullname="T. Fossati" initials="T." surname="Fossati"/>
    <date month="November" year="2022"/>
    <abstract>
      <t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are used to protect data exchanged over a wide range of application protocols and can also form the basis for secure transport protocols. Over the years, the industry has witnessed several serious attacks on TLS and DTLS, including attacks on the most commonly used cipher suites and their modes of operation. This document provides the latest recommendations for ensuring the security of deployed services that use TLS and DTLS. These recommendations are applicable to the majority of use cases.</t>
      <t>RFC 7525, an earlier version of the TLS recommendations, was published when the industry was transitioning to TLS 1.2. Years later, this transition is largely complete, and TLS 1.3 is widely available. This document updates the guidance given the new environment and obsoletes RFC 7525. In addition, this document updates RFCs 5288 and 6066 in view of recent attacks.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="195"/>
  <seriesInfo name="RFC" value="9325"/>
  <seriesInfo name="DOI" value="10.17487/RFC9325"/>
</reference>

<reference anchor="RFC7296">
  <front>
    <title>Internet Key Exchange Protocol Version 2 (IKEv2)</title>
    <author fullname="C. Kaufman" initials="C." surname="Kaufman"/>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <author fullname="Y. Nir" initials="Y." surname="Nir"/>
    <author fullname="P. Eronen" initials="P." surname="Eronen"/>
    <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
    <date month="October" year="2014"/>
    <abstract>
      <t>This document describes version 2 of the Internet Key Exchange (IKE) protocol. IKE is a component of IPsec used for performing mutual authentication and establishing and maintaining Security Associations (SAs). This document obsoletes RFC 5996, and includes all of the errata for it. It advances IKEv2 to be an Internet Standard.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="79"/>
  <seriesInfo name="RFC" value="7296"/>
  <seriesInfo name="DOI" value="10.17487/RFC7296"/>
</reference>

<reference anchor="RFC7624">
  <front>
    <title>Confidentiality in the Face of Pervasive Surveillance: A Threat Model and Problem Statement</title>
    <author fullname="R. Barnes" initials="R." surname="Barnes"/>
    <author fullname="B. Schneier" initials="B." surname="Schneier"/>
    <author fullname="C. Jennings" initials="C." surname="Jennings"/>
    <author fullname="T. Hardie" initials="T." surname="Hardie"/>
    <author fullname="B. Trammell" initials="B." surname="Trammell"/>
    <author fullname="C. Huitema" initials="C." surname="Huitema"/>
    <author fullname="D. Borkmann" initials="D." surname="Borkmann"/>
    <date month="August" year="2015"/>
    <abstract>
      <t>Since the initial revelations of pervasive surveillance in 2013, several classes of attacks on Internet communications have been discovered. In this document, we develop a threat model that describes these attacks on Internet confidentiality. We assume an attacker that is interested in undetected, indiscriminate eavesdropping. The threat model is based on published, verified attacks.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7624"/>
  <seriesInfo name="DOI" value="10.17487/RFC7624"/>
</reference>


<reference anchor="I-D.ietf-tls-hybrid-design">
   <front>
      <title>Hybrid key exchange in TLS 1.3</title>
      <author fullname="Douglas Stebila" initials="D." surname="Stebila">
         <organization>University of Waterloo</organization>
      </author>
      <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
         <organization>Cisco Systems</organization>
      </author>
      <author fullname="Shay Gueron" initials="S." surname="Gueron">
         <organization>University of Haifa and Meta</organization>
      </author>
      <date day="17" month="June" year="2025"/>
      <abstract>
	 <t>   Hybrid key exchange refers to using multiple key exchange algorithms
   simultaneously and combining the result with the goal of providing
   security even if all but one of the component algorithms is broken.
   It is motivated by transition to post-quantum cryptography.  This
   document provides a construction for hybrid key exchange in the
   Transport Layer Security (TLS) protocol version 1.3.

   Discussion of this work is encouraged to happen on the TLS IETF
   mailing list tls@ietf.org or on the GitHub repository which contains
   the draft: https://github.com/dstebila/draft-ietf-tls-hybrid-design.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-tls-hybrid-design-13"/>
   
</reference>


<reference anchor="I-D.ietf-tls-keylogfile">
   <front>
      <title>The SSLKEYLOGFILE Format for TLS</title>
      <author fullname="Martin Thomson" initials="M." surname="Thomson">
         <organization>Mozilla</organization>
      </author>
      <author fullname="Yaroslav Rosomakho" initials="Y." surname="Rosomakho">
         <organization>Zscaler</organization>
      </author>
      <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
         <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
      </author>
      <date day="9" month="June" year="2025"/>
      <abstract>
	 <t>   A format that supports logging information about the secrets used in
   a TLS connection is described.  Recording secrets to a file in
   SSLKEYLOGFILE format allows diagnostic and logging tools that use
   this file to decrypt messages exchanged by TLS endpoints.  This
   format is intended for use in systems where TLS only protects test
   data.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-tls-keylogfile-05"/>
   
</reference>

<reference anchor="RFC5746">
  <front>
    <title>Transport Layer Security (TLS) Renegotiation Indication Extension</title>
    <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
    <author fullname="M. Ray" initials="M." surname="Ray"/>
    <author fullname="S. Dispensa" initials="S." surname="Dispensa"/>
    <author fullname="N. Oskov" initials="N." surname="Oskov"/>
    <date month="February" year="2010"/>
    <abstract>
      <t>Secure Socket Layer (SSL) and Transport Layer Security (TLS) renegotiation are vulnerable to an attack in which the attacker forms a TLS connection with the target server, injects content of his choice, and then splices in a new TLS connection from a client. The server treats the client's initial TLS handshake as a renegotiation and thus believes that the initial data transmitted by the attacker is from the same entity as the subsequent client data. This specification defines a TLS extension to cryptographically tie renegotiations to the TLS connections they are being performed over, thus preventing this attack. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5746"/>
  <seriesInfo name="DOI" value="10.17487/RFC5746"/>
</reference>


<reference anchor="ANSSI-DAT-NT-003" target="https://www.ssi.gouv.fr/uploads/2015/09/NT_IPsec_EN.pdf">
  <front>
    <title>Recommendations for securing networks with IPsec, Technical Report</title>
    <author >
      <organization>ANSSI</organization>
    </author>
    <date year="2015" month="August"/>
  </front>
</reference>
<reference anchor="TLS-Ext-Registry" target="https://www.iana.org/assignments/tls-extensiontype-values">
  <front>
    <title>Transport Layer Security (TLS) Extensions</title>
    <author >
      <organization>IANA</organization>
    </author>
    <date year="2023" month="November"/>
  </front>
</reference>
<reference anchor="CDM23" target="https://eprint.iacr.org/2023/1933.pdf">
  <front>
    <title>Keeping Up with the KEMs: Stronger Security Notions for KEMs and automated analysis of KEM-based protocols</title>
    <author >
      <organization>ACM</organization>
    </author>
    <date year="2023" month="November"/>
  </front>
</reference>


    </references>

</references>


<?line 620?>

<section anchor="acknowledgments"><name>Acknowledgments</name>

<t>We would like to thank the members of the "TSVWG DTLS for SCTP
Requirements Design Team" for their discussion. The members, in
no particular order, were:</t>

<t><list style="symbols">
  <t>Marcelo Ricardo Leitner</t>
  <t>Zaheduzzaman Sarker</t>
  <t>Magnus Westerlund</t>
  <t>John Mattsson</t>
  <t>Claudio Porfiri</t>
  <t>Xin Long</t>
  <t>Michael Tüxen</t>
  <t>Hannes Tschofenig</t>
  <t>K Tirumaleswar Reddy</t>
  <t>Bertrand Rault</t>
</list></t>

<t>Additionally, we would like to thank the chairs of the
Transport and Services Working Group (tsvwg) Gorry Fairhurst and
Marten Seemann as well as the responsible area director Martin Duke.</t>

<t>Finally, we would like to thank Martin Thomson, Ilari Liusvaara,
Benjamin Kaduk, Scott Fluhrer, Dennis Jackson, David Benjamin,
Matthijs van Duin, Rifaat Shekh-Yusef, Joe Birr-Pixton and Thom Wiggers for their review comments.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

