<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.8 (Ruby 2.6.10) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-tls-tls12-frozen-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.20.1 -->
  <front>
    <title abbrev="tls1.2-frozen">TLS 1.2 is in Feature Freeze</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-tls-tls12-frozen-00"/>
    <author fullname="Rich Salz">
      <organization>Akamai Technologies</organization>
      <address>
        <email>rsalz@akamai.com</email>
      </address>
    </author>
    <author fullname="Nimrod Aviram">
      <organization/>
      <address>
        <email>nimrod.aviram@gmail.com</email>
      </address>
    </author>
    <date year="2024" month="April" day="03"/>
    <area>Security</area>
    <workgroup>Transport Layer Security</workgroup>
    <keyword>TLS</keyword>
    <keyword>features</keyword>
    <abstract>
      <?line 129?>

<t>TLS 1.2 is in widespread use and can be configured such that it provides good
security properties. TLS 1.3 is also in
widespread use and fixes some known deficiencies with TLS 1.2, such as
removing error-prone cryptographic primitives and encrypting more of the traffic
so that it is not readable by outsiders.</t>
      <t>Both versions have several extension points, so items like new cryptographic
algorithms, new supported groups (formerly "named curves"),  etc., can be
added without defining a new protocol. This document specifies that outside of
urgent security fixes, no new features will be approved for TLS 1.2.
This prescription does not pertain to DTLS (in any DTLS version); it pertains to
TLS only.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-tls-tls12-frozen/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Transport Layer Security Working Group mailing list (<eref target="mailto:tls@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tls/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tls/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/tlswg/tls12-frozen"/>.</t>
    </note>
  </front>
  <middle>
    <?line 144?>

<section anchor="sec-reasons">
      <name>Introduction</name>
      <t>TLS 1.2 <xref target="TLS12"/> is in widespread use and can be configured such that it provides good
security properties. However, this protocol version suffers from several
deficiencies:</t>
      <ol spacing="normal" type="1"><li>
          <t>While application layer traffic is always encrypted, most of the handshake
messages are not encrypted. Therefore, the privacy provided is suboptimal.
This is a protocol issue that cannot be addressed by configuration.</t>
        </li>
        <li>
          <t>The list of cryptographic primitives specified for the protocol, both in-use
primitives and deprecated ones, includes several primitives that were a source for
vulnerabilities throughout the years, such as RSA key exchange, CBC cipher suites,
and problematic finite-field Diffie-Hellman group negotiation.
This deficiency may be addressed through proper configuration; however,
experience shows that configuration mistakes are common, especially when
deploying cryptography.
See <xref target="sec-considerations"/> for elaboration.</t>
        </li>
        <li>
          <t>The original protocol, as-is, does not provide security due to the
"Renegotiation" class of attacks (see <xref target="sec-considerations"/>). Rather, some
extensions are required to provide security.</t>
        </li>
      </ol>
      <t>In contrast, TLS 1.3 <xref target="TLS13"/> is also in
widespread use and fixes most known deficiencies with TLS 1.2, such as
encrypting more of the traffic so that it is not readable by outsiders and
removing most cryptographic primitives considered dangerous. Importantly, TLS
1.3 enjoys robust security proofs and provides excellent security as-is.</t>
      <t>Both versions have several extension points, so items like new cryptographic
algorithms, new supported groups (formerly "named curves"),  etc., can be
added without defining a new protocol. This document specifies that outside of
urgent security fixes, no new features will be approved for TLS 1.2.
This prescription does not pertain to DTLS (in any DTLS version); it pertains to
TLS only.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="implications-for-post-quantum-cryptography">
      <name>Implications for post-quantum cryptography</name>
      <t>Cryptographically relevant quantum computers, once available, will have a
huge impact on RSA, FFDH, and ECC which are currently used in TLS.
In 2016, the US National Institute of Standards and Technology started a
multi-year effort to standardize algorithms that will be "safe"
once quantum computers are feasible <xref target="PQC"/>. First IETF discussions happened
around the same time <xref target="CFRGSLIDES"/>.</t>
      <t>While the industry is waiting for NIST to finish standardization, the
IETF has several efforts underway.
A working group was formed in early 2013 to work on use of PQC in IETF protocols,
<xref target="PQUIPWG"/>.
Several other working groups, including TLS <xref target="TLSWG"/>,
are working on
drafts to support hybrid algorithms and identifiers, for use during a
transition from classic to a post-quantum world.</t>
      <t>For TLS it is important to note that the focus of these efforts is TLS 1.3
or later.
Bluntly, post-quantum cryptography for
TLS 1.2 WILL NOT be supported (see <xref target="iana"/>).</t>
    </section>
    <section anchor="sec-considerations">
      <name>Security Considerations</name>
      <t>TLS 1.2 was specified with several cryptographic primitives and design choices
that have historically hindered its security. The purpose of this section is to
briefly survey several such prominent problems that have affected the protocol.
It should be noted, however, that TLS 1.2 can be configured securely; it is
merely much more difficult to configure it securely as opposed to using its
modern successor, TLS 1.3. See <xref target="RFC9325"/> for a more thorough guide on the
secure deployment of TLS 1.2.</t>
      <t>Firstly, the TLS 1.2 protocol, without any extension points, is vulnerable to
the renegotiation attack and the Triple Handshake attack. Broadly, these attacks
exploit the protocol's support for renegotiation in order to inject a prefix
chosen by the attacker into the plaintext stream. This is usually a devastating
threat in practice, that allows e.g. obtaining secret cookies in a web setting.
Refer to <xref target="RENEG1"/>, <xref target="RENEG2"/>, <xref target="TRIPLESHAKE"/> for elaboration. In light of
the above problems, <xref target="RFC5746"/> specifies an extension that prevents this
category of attacks. To securely deploy TLS 1.2, either renegotiation must be
disabled entirely, or this extension must be present. Additionally, clients must
not allow servers to renegotiate the certificate during a connection.</t>
      <t>Secondly, the original key exchange methods specified for the protocol, namely
RSA key exchange and finite field Diffie-Hellman, suffer from several
weaknesses. As before, to securely deploy the protocol, these key exchange
methods must be disabled.
Refer to draft-obsolete-kex for elaboration (TODO I guess we will anyway
wait for WGLC for draft-obsolete-kex, so no sense to temporarily refer to the
draft.)</t>
      <t>Thirdly, symmetric ciphers which were widely-used in the protocol, namely RC4
and CBC cipher suites, suffer from several weaknesses. RC4 suffers from
exploitable biases in its key stream; see <xref target="RFC7465"/>. CBC cipher suites have
been a source of vulnerabilities throughout the years. A straightforward
implementation of these cipher suites inherently suffers from the Lucky13 timing
attack <xref target="LUCKY13"/>. The first attempt to implement the cipher suites in
constant time introduced an even more severe vulnerability <xref target="LUCKY13FIX"/>.
There have been further similar vulnerabilities throughout the
years exploiting CBC cipher suites; refer to e.g. <xref target="CBCSCANNING"/>
for an example and a survey of similar works.</t>
      <t>And lastly, historically the protocol was affected by several other attacks that
TLS 1.3 is immune to:
BEAST <xref target="BEAST"/>, Logjam <xref target="WEAKDH"/>, FREAK <xref target="FREAK"/>, and SLOTH <xref target="SLOTH"/>.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>IANA will stop accepting registrations for any TLS parameters <xref target="TLS13REG"/>
except for the following:</t>
      <ul spacing="normal">
        <li>
          <t>TLS Exporter Labels</t>
        </li>
        <li>
          <t>TLS Application-Layer Protocol Negotiation (ALPN) Protocol IDs</t>
        </li>
      </ul>
      <t>Entries in any other TLS protocol registry should have an indication like
"For TLS 1.3 or later" in their entry.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="TLS12">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="TLS13">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="TLS13REG">
          <front>
            <title>IANA Registry Updates for TLS and DTLS</title>
            <author fullname="J. Salowey" initials="J." surname="Salowey"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document describes a number of changes to TLS and DTLS IANA registries that range from adding notes to the registry all the way to changing the registration policy. These changes were mostly motivated by WG review of the TLS- and DTLS-related registries undertaken as part of the TLS 1.3 development process.</t>
              <t>This document updates the following RFCs: 3749, 5077, 4680, 5246, 5705, 5878, 6520, and 7301.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8447"/>
          <seriesInfo name="DOI" value="10.17487/RFC8447"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC9325">
          <front>
            <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="November" year="2022"/>
            <abstract>
              <t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are used to protect data exchanged over a wide range of application protocols and can also form the basis for secure transport protocols. Over the years, the industry has witnessed several serious attacks on TLS and DTLS, including attacks on the most commonly used cipher suites and their modes of operation. This document provides the latest recommendations for ensuring the security of deployed services that use TLS and DTLS. These recommendations are applicable to the majority of use cases.</t>
              <t>RFC 7525, an earlier version of the TLS recommendations, was published when the industry was transitioning to TLS 1.2. Years later, this transition is largely complete, and TLS 1.3 is widely available. This document updates the guidance given the new environment and obsoletes RFC 7525. In addition, this document updates RFCs 5288 and 6066 in view of recent attacks.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="195"/>
          <seriesInfo name="RFC" value="9325"/>
          <seriesInfo name="DOI" value="10.17487/RFC9325"/>
        </reference>
        <reference anchor="RFC5746">
          <front>
            <title>Transport Layer Security (TLS) Renegotiation Indication Extension</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="M. Ray" initials="M." surname="Ray"/>
            <author fullname="S. Dispensa" initials="S." surname="Dispensa"/>
            <author fullname="N. Oskov" initials="N." surname="Oskov"/>
            <date month="February" year="2010"/>
            <abstract>
              <t>Secure Socket Layer (SSL) and Transport Layer Security (TLS) renegotiation are vulnerable to an attack in which the attacker forms a TLS connection with the target server, injects content of his choice, and then splices in a new TLS connection from a client. The server treats the client's initial TLS handshake as a renegotiation and thus believes that the initial data transmitted by the attacker is from the same entity as the subsequent client data. This specification defines a TLS extension to cryptographically tie renegotiations to the TLS connections they are being performed over, thus preventing this attack. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5746"/>
          <seriesInfo name="DOI" value="10.17487/RFC5746"/>
        </reference>
        <reference anchor="RFC7465">
          <front>
            <title>Prohibiting RC4 Cipher Suites</title>
            <author fullname="A. Popov" initials="A." surname="Popov"/>
            <date month="February" year="2015"/>
            <abstract>
              <t>This document requires that Transport Layer Security (TLS) clients and servers never negotiate the use of RC4 cipher suites when they establish connections. This applies to all TLS versions. This document updates RFCs 5246, 4346, and 2246.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7465"/>
          <seriesInfo name="DOI" value="10.17487/RFC7465"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="PQC" target="https://csrc.nist.gov/projects/post-quantum-cryptography">
          <front>
            <title>Post-Quantum Cryptography</title>
            <author>
              <organization/>
            </author>
            <date year="2017" month="January"/>
          </front>
        </reference>
        <reference anchor="CFRGSLIDES" target="https://www.ietf.org/proceedings/95/slides/slides-95-cfrg-4.pdf">
          <front>
            <title>Post Quantum Secure Cryptography Discussion</title>
            <author initials="D." surname="McGrew" fullname="David McGrew">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="PQUIPWG" target="https://datatracker.ietf.org/wg/pquip/about/">
          <front>
            <title>Post-Quantum Use in Protocols</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="TLSWG" target="https://datatracker.ietf.org/wg/tls/about/">
          <front>
            <title>Transport Layer Security</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="TRIPLESHAKE" target="https://mitls.org/pages/attacks/3SHAKE">
          <front>
            <title>Triple Handshakes Considered Harmful Breaking and Fixing Authentication over TLS</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RENEG1" target="https://web.archive.org/web/20091231034700/http://www.educatedguesswork.org/2009/11/understanding_the_tls_renegoti.html">
          <front>
            <title>Understanding the TLS Renegotiation Attack</title>
            <author initials="E." surname="Rescorla" fullname="Eric Rescorla">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RENEG2" target="https://web.archive.org/web/20091228061844/http://extendedsubset.com/?p=8">
          <front>
            <title>Authentication Gap in TLS Renegotiation</title>
            <author initials="M." surname="Ray" fullname="Marsh Ray">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="LUCKY13" target="http://www.isg.rhul.ac.uk/tls/TLStiming.pdf">
          <front>
            <title>Lucky Thirteen: Breaking the TLS and DTLS record protocols</title>
            <author initials="N. J." surname="Al Fardan">
              <organization/>
            </author>
            <author initials="K. G." surname="Paterson">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="LUCKY13FIX" target="https://nds.rub.de/media/nds/veroeffentlichungen/2016/10/19/tls-attacker-ccs16.pdf">
          <front>
            <title>Systematic fuzzing and testing of TLS libraries</title>
            <author initials="J." surname="Somorovsky" fullname="Juraj Somorovsky">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="CBCSCANNING" target="https://www.usenix.org/system/files/sec19-merget.pdf">
          <front>
            <title>Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities</title>
            <author initials="R." surname="Merget" fullname="Robert Merget">
              <organization/>
            </author>
            <author initials="J." surname="Somorovsky" fullname="Juraj Somorovsky">
              <organization/>
            </author>
            <author initials="N." surname="Aviram" fullname="Nimrod Aviram">
              <organization/>
            </author>
            <author initials="C." surname="Young" fullname="Craig Young">
              <organization/>
            </author>
            <author initials="J." surname="Fliegenschmidt" fullname="Janis Fliegenschmidt">
              <organization/>
            </author>
            <author initials="J." surname="Schwenk" fullname="Jörg Schwenk">
              <organization/>
            </author>
            <author initials="Y." surname="Shavitt" fullname="Yuval Shavitt">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="BEAST" target="http://www.hpcc.ecs.soton.ac.uk/dan/talks/bullrun/Beast.pdf">
          <front>
            <title>Here come the xor ninjas</title>
            <author initials="T." surname="Duong" fullname="Thai Duong">
              <organization/>
            </author>
            <author initials="J." surname="Rizzo" fullname="Juliano Rizzo">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="WEAKDH" target="https://dl.acm.org/doi/pdf/10.1145/2810103.2813707">
          <front>
            <title>Imperfect forward secrecy: How Diffie-Hellman fails in practice</title>
            <author initials="D." surname="Adrian">
              <organization/>
            </author>
            <author initials="K." surname="Bhargavan">
              <organization/>
            </author>
            <author initials="Z." surname="Durumeric">
              <organization/>
            </author>
            <author initials="P." surname="Gaudry">
              <organization/>
            </author>
            <author initials="M." surname="Green">
              <organization/>
            </author>
            <author initials="J. A." surname="Halderman">
              <organization/>
            </author>
            <author initials="N." surname="Heninger">
              <organization/>
            </author>
            <author initials="D." surname="Springall">
              <organization/>
            </author>
            <author initials="E." surname="Thomé">
              <organization/>
            </author>
            <author initials="L." surname="Valenta">
              <organization/>
            </author>
            <author initials="B." surname="VanderSloot">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="FREAK" target="https://inria.hal.science/hal-01114250/file/messy-state-of-the-union-oakland15.pdf">
          <front>
            <title>A messy state of the union: Taming the composite state machines of TLS</title>
            <author initials="B." surname="Beurdouche" fullname="Benjamin Beurdouche">
              <organization/>
            </author>
            <author initials="K." surname="Bhargavan" fullname="Karthikeyan Bhargavan">
              <organization/>
            </author>
            <author initials="A." surname="Delignat-Lavaud" fullname="Antoine Delignat-Lavaud">
              <organization/>
            </author>
            <author initials="C." surname="Fournet" fullname="Cédric Fournet">
              <organization/>
            </author>
            <author initials="M." surname="Kohlweiss" fullname="Markulf Kohlweiss">
              <organization/>
            </author>
            <author initials="A." surname="Pironti" fullname="Alfredo Pironti">
              <organization/>
            </author>
            <author initials="P.-Y." surname="Strub" fullname="Pierre-Yves Strub">
              <organization/>
            </author>
            <author initials="J. K." surname="Zinzindohoue" fullname="Jean Karim Zinzindohoue">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="SLOTH" target="https://inria.hal.science/hal-01244855/file/SLOTH_NDSS16.pdf">
          <front>
            <title>Transcript collision attacks: Breaking authentication in TLS, IKE, and SSH</title>
            <author initials="K." surname="Bhargavan" fullname="Karthikeyan Bhargavan">
              <organization/>
            </author>
            <author initials="G." surname="Leurent" fullname="Gaëtan Leurent">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 283?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>None yet.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
