<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.11 (Ruby 3.1.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-tsvwg-dtls-over-sctp-bis-04" category="std" consensus="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.12.10 -->
  <front>
    <title abbrev="DTLS over SCTP">Datagram Transport Layer Security (DTLS) over Stream Control Transmission Protocol (SCTP)</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-tsvwg-dtls-over-sctp-bis-04"/>
    <author initials="M." surname="Westerlund" fullname="Magnus Westerlund">
      <organization>Ericsson</organization>
      <address>
        <email>magnus.westerlund@ericsson.com</email>
      </address>
    </author>
    <author initials="J." surname="Preuß Mattsson" fullname="John Preuß Mattsson">
      <organization>Ericsson</organization>
      <address>
        <email>john.mattsson@ericsson.com</email>
      </address>
    </author>
    <author initials="C." surname="Porfiri" fullname="Claudio Porfiri">
      <organization>Ericsson</organization>
      <address>
        <email>claudio.porfiri@ericsson.com</email>
      </address>
    </author>
    <date year="2022" month="June" day="23"/>
    <area>Transport</area>
    <workgroup>TSVWG</workgroup>
    <abstract>
      <t>This document describes the usage of the Datagram Transport Layer
   Security (DTLS) protocol to protect user messages sent over the
   Stream Control Transmission Protocol (SCTP). It is an improved
   alternative to the existing rfc6083.</t>
      <t>DTLS over SCTP provides mutual authentication, confidentiality,
   integrity protection, and replay protection for applications that
   use SCTP as their transport protocol and allows client/server
   applications to communicate in a way that is designed to give
   communications privacy and to prevent eavesdropping and detect
   tampering or message forgery.</t>
      <t>Applications using DTLS over SCTP can use almost all transport
   features provided by SCTP and its extensions. This document is an
   improved alternative to RFC 6083 and removes the 16 kB limitation
   on protected user message size by defining a secure user message
   fragmentation so that multiple DTLS records can be used to protect
   a single user message. It further updates the DTLS versions to use,
   as well as the HMAC algorithms for SCTP-AUTH, and simplifies secure
   implementation by some stricter requirements on the establishment
   procedures.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/gloinul/draft-westerlund-tsvwg-dtls-over-sctp-bis"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <section anchor="overview">
        <name>Overview</name>
        <t>This document describes the usage of the Datagram Transport Layer
   Security (DTLS) protocol, as defined in DTLS 1.2 <xref target="RFC6347"/>, and
   DTLS 1.3 <xref target="RFC9147"/>, over the Stream Control
   Transmission Protocol (SCTP), as defined in <xref target="RFC9260"/> with
   Authenticated Chunks for SCTP (SCTP-AUTH) <xref target="RFC4895"/>.</t>
        <t>This specification provides mutual authentication of endpoints,
   confidentiality, integrity protection, and replay protection of
   user messages for applications that use SCTP as their transport
   protocol.  Thus, it allows client/server applications to communicate
   in a way that is designed to give communications privacy and to
   prevent eavesdropping and detect tampering or message
   forgery. DTLS/SCTP uses DTLS for mutual authentication, key
   exchange with forward secrecy for SCTP-AUTH, and
   confidentiality of user messages. DTLS/SCTP use SCTP and SCTP-AUTH
   for integrity protection and replay protection of all SCTP Chunks
   that can be authenticated, including user messages.</t>
        <t>Applications using DTLS over SCTP can use almost all transport
   features provided by SCTP and its extensions. DTLS/SCTP supports:</t>
        <ul spacing="normal">
          <li>preservation of message boundaries.</li>
          <li>a large number of unidirectional and bidirectional streams.</li>
          <li>ordered and unordered delivery of SCTP user messages.</li>
          <li>the partial reliability extension as defined in <xref target="RFC3758"/>.</li>
          <li>the dynamic address reconfiguration extension as defined in
 <xref target="RFC5061"/>.</li>
          <li>User messages of any size.</li>
        </ul>
        <t>The method described in this document requires that the SCTP
   implementation supports the optional feature of fragmentation of
   SCTP user messages as defined in <xref target="RFC9260"/>. The implementation is
   required to have an SCTP API (for example the one described in
   <xref target="RFC6458"/>) that supports partial user message delivery and also
   recommended that I-DATA chunks as defined in <xref target="RFC8260"/> is used to
   efficiently implement and support larger user messages.</t>
        <t>To simplify implementation and reduce the risk for security holes,
   limitations have been defined such that STARTTLS as specified in
   <xref target="RFC3788"/> is no longer supported.</t>
        <section anchor="comparison-with-tls-over-sctp">
          <name>Comparison with TLS over SCTP</name>
          <t>TLS, from which DTLS was derived, is designed to run on top of a
   byte-stream-oriented transport protocol providing a reliable, in-
   sequence delivery. TLS over SCTP as described in <xref target="RFC3436"/> has
   some serious limitations:</t>
          <ul spacing="normal">
            <li>It does not support the unordered delivery of SCTP user messages.</li>
            <li>It does not support partial reliability as defined in
<xref target="RFC3758"/>.</li>
            <li>It only supports the usage of the same number of streams in both
 directions.</li>
            <li>It uses a TLS connection for every bidirectional stream, which
 requires a substantial amount of resources and message exchanges
 if a large number of streams is used.</li>
          </ul>
        </section>
        <section anchor="changes-from-rfc-6083">
          <name>Changes from RFC 6083</name>
          <t>The DTLS over SCTP solution defined in RFC 6083 had the following
   limitations:</t>
          <ul spacing="normal">
            <li>The maximum user message size is 2^14 (16384) bytes, which is a single
 DTLS record limit.</li>
            <li>DTLS 1.0 has been deprecated for RFC 6083 requiring at least DTLS
1.2 <xref target="RFC8996"/>. This creates additional limitation as discussed
in <xref target="DTLS-version"/>.</li>
            <li>DTLS messages that don't contain protected user message data
where limited to only be sent on Stream 0 and requiring that
stream to be in-order delivery which could potentially impact
applications.</li>
          </ul>
          <t>This specification defines the following changes compared with RFC
   6083:</t>
          <ul spacing="normal">
            <li>Removes the limitations on user messages sizes by defining a secure
fragmentation mechanism. It is optional to support message sizes
over 2^64-1 bytes.</li>
            <li>Enable DTLS key-change without requiring draining all inflight
user message from SCTP.</li>
            <li>Mandates that more modern DTLS version are used (DTLS 1.2 or
1.3)</li>
            <li>Mandates support of modern HMAC algorithm (SHA-256) in the SCTP
authentication extension <xref target="RFC4895"/>.</li>
            <li>Recommends support of <xref target="RFC8260"/> to enable interleaving of large
SCTP user messages to avoid scheduling issues.</li>
            <li>Applies stricter requirements on always using DTLS for all user
messages in the SCTP association.</li>
            <li>Requires that SCTP-AUTH is applied to all SCTP Chunks that can be
authenticated.</li>
            <li>Requires support of partial delivery of user messages.</li>
          </ul>
        </section>
      </section>
      <section anchor="DTLS-version">
        <name>DTLS Version</name>
        <t>Using DTLS 1.2 instead of using DTLS 1.0 limits the lifetime of a
   DTLS connection and the data volume which can be transferred over a
   DTLS connection.  This is caused by:</t>
        <ul spacing="normal">
          <li>The number of renegotiations in DTLS 1.2 is limited to 65534
compared to unlimited in DTLS 1.0.</li>
          <li>While the AEAD limits in DTLS 1.3 does not formally apply to DTLS
1.2 the mathematical limits apply equally well to DTLS 1.2.</li>
        </ul>
        <t>DTLS 1.3 comes with a large number of significant changes.</t>
        <ul spacing="normal">
          <li>Renegotiations are not supported and instead partly replaced by
KeyUpdates. The number of KeyUpdates is limited to 2^48.</li>
          <li>Strict AEAD significantly limits on how much many packets can be
sent before rekeying.</li>
        </ul>
        <t>Many applications using DTLS/SCTP are of semi-permanent nature and
   use SCTP associations with expected lifetimes of months or even
   years, and where there is a significant cost of bringing down the
   SCTP association in order to restart it. Such DTLS/SCTP usages that
   need:</t>
        <ul spacing="normal">
          <li>Periodic re-authentication and transfer of revocation information
of both endpoints (not only the DTLS client).</li>
          <li>Periodic rerunning of Diffie-Hellman key-exchange to provide
forward secrecy and mitigate static key exfiltration attacks.</li>
          <li>Perform SCTP-AUTH rekeying.</li>
        </ul>
        <t>At the time of publication DTLS 1.3 does not support any of these,
   where DTLS 1.2 renegotiation functionality can provide this
   functionality in the context of DTLS/SCTP. To address these
   requirements from semi-permanent applications, this document use
   several overlapping DTLS connections with either DTLS 1.2 or
   1.3. Having uniform procedures reduces the impact when upgrading
   from 1.2 to 1.3 and avoids using the renegotiation mechanism which
   is disabled by default in many DTLS implementations.</t>
        <t>To address known vulnerabilities in DTLS 1.2 this document
   describes and mandates implementation constraints on ciphers and
   protocol options. The DTLS 1.2 renegotiation mechanism is forbidden
   to be used as it creates need for additional mechanism to handle
   race conditions and interactions between using DTLS connections in
   parallel.</t>
        <t>Secure negotiation of the DTLS version is handled by the DTLS
   handshake. If the endpoints do not support a common DTLS version
   the DTLS handshake will be aborted.</t>
        <t>In the rest of the document, unless the version of DTLS is
   specifically called out the text applies to both versions of DTLS.</t>
      </section>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>This document uses the following terms:</t>
        <t>Association:  An SCTP association.</t>
        <t>Connection: An DTLS connection. It is uniquely identified by a
   connection identifier.</t>
        <t>Stream: A unidirectional stream of an SCTP association.  It is
   uniquely identified by a stream identifier.</t>
      </section>
      <section anchor="abbreviations">
        <name>Abbreviations</name>
        <t>AEAD:  Authenticated Encryption with Associated Data</t>
        <t>DTLS:  Datagram Transport Layer Security</t>
        <t>HMAC: Keyed-Hash Message Authentication Code</t>
        <t>MTU:  Maximum Transmission Unit</t>
        <t>PPID:  Payload Protocol Identifier</t>
        <t>SCTP:  Stream Control Transmission Protocol</t>
        <t>SCTP-AUTH: Authenticated Chunks for SCTP</t>
        <t>TCP:  Transmission Control Protocol</t>
        <t>TLS:  Transport Layer Security</t>
        <t>ULP:  Upper Layer Protocol</t>
      </section>
    </section>
    <section anchor="conventions">
      <name>Conventions</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
   "OPTIONAL" in this document are to be interpreted as described in
   BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all
   capitals, as shown here.</t>
    </section>
    <section anchor="dtls-considerations">
      <name>DTLS Considerations</name>
      <section anchor="version-of-dtls">
        <name>Version of DTLS</name>
        <t>This document defines the usage of either DTLS 1.3
   <xref target="RFC9147"/>, or DTLS 1.2 <xref target="RFC6347"/>.
   Earlier versions of DTLS MUST NOT be used (see <xref target="RFC8996"/>).
   DTLS 1.3 is RECOMMENDED for security and performance reasons.
   It is expected that DTLS/SCTP as described in this document will work with
   future versions of DTLS.</t>
      </section>
      <section anchor="cipher-suites-and-cryptographic-parameters">
        <name>Cipher Suites and Cryptographic Parameters</name>
        <t>For DTLS 1.2, the cipher suites forbidden by <xref target="RFC9113"/> MUST NOT
   be used. For all versions of DTLS, cryptographic parameters giving
   confidentiality and forward secrecy MUST be used.</t>
      </section>
      <section anchor="Msg-size">
        <name>Message Sizes</name>
        <t>DTLS/SCTP, automatically fragments and reassembles user
   messages. This specification defines how to fragment the user
   messages into DTLS records, where each DTLS record allows a
   maximum of 2^14 protected bytes. Each DTLS record adds some
   overhead, thus using records of maximum possible size are
   recommended to minimize the transmitted overhead. DTLS 1.3
   has much less overhead than DTLS 1.2 per record.</t>
        <t>The sequence of DTLS records is then fragmented into DATA or I-DATA
   Chunks to fit the path MTU by SCTP. These changes ensure that
   DTLS/SCTP has the same capability as SCTP to support user messages
   of any size. However, to simplify implementations it is OPTIONAL to
   support user messages larger than 2^64-1 bytes. This is to allow
   implementation to assume that 64-bit length fields and offset
   pointers will be sufficient.</t>
        <t>The SCTP-API defined in <xref target="RFC6458"/> results in an implementation
   limitation when it comes to support any user message sizes. That
   API does not allow the changing of the SCTP-AUTH key used to
   protect the sending of a particular user message. Thus, user
   messages that will be transmitted over periods of time on the order
   or longer than the interval between rekeying can't be
   supported. Beyond delaying the completion of a rekeying until the
   message has been transmitted, the session can deadlock if the DTLS
   connection used to protect this long user message reaches the limit
   of number of bytes transmitted with a particular key. However, this
   is not an interoperability issue as it is the sender side's API
   that limits what can be sent and thus the sender implementation will
   have to address this issue.</t>
        <t>The security operations and reassembly process requires that the
   protected user message, i.e., with DTLS record overhead, is stored
   in the receiver's buffer. This buffer space will thus put a limit
   on the largest size of plain text user message that can be
   transferred securely. However, by mandating the use of the partial
   delivery of user messages from SCTP and assuming that no two
   messages received on the same stream are interleaved (as it is the
   case when using the API defined in <xref target="RFC6458"/>) the minimally
   required buffering prior to DTLS processing is a single DTLS record
   per used incoming stream. This enables the DTLS/SCTP implementation
   to provide the Upper Layer Protocol (ULP) with each DTLS record's
   content when it has been decrypted and its integrity been verified
   enabling partial user message delivery to the ULP. Implementations
   can trade-off buffer memory requirements in the DTLS layer with
   transport overhead by using smaller DTLS records. However, for
   efficient operation and avoiding flow control stalls if user
   message fragments are not frequently and expiendtly moved to upper
   layer memory buffers, the receiver buffer needs to be larger.</t>
        <t>The DTLS/SCTP implementation is expected to behave very similar to
   just SCTP when it comes to handling of user messages and dealing
   with large user messages and their reassembly and
   processing. Making it the ULP responsible for handling any resource
   contention related to large user messages.</t>
      </section>
      <section anchor="replay-protection">
        <name>Replay Protection</name>
        <t>SCTP-AUTH <xref target="RFC4895"/> does not have explicit replay
   protection. However, the combination of SCTP-AUTH's protection of
   DATA or I-DATA chunks and SCTP user message handling will prevent
   third party attempts to inject or replay SCTP packets resulting in
   impact on the received protected user message. In fact, this
   document's solution is dependent on SCTP-AUTH and SCTP to prevent
   reordering, duplication, and removal of the DTLS records within
   each protected user message.  This includes detection of changes to
   what DTLS records start and end the SCTP user message, and removal of
   DTLS records before an increment to the epoch.  Without SCTP-AUTH,
   these would all have required explicit handling.</t>
        <t>DTLS optionally supports record replay detection. Such replay
   detection could result in the DTLS layer dropping valid messages
   received outside of the DTLS replay window. As DTLS/SCTP provides
   replay protection even without DTLS replay protection, the replay
   detection of DTLS MUST NOT be used.</t>
      </section>
      <section anchor="path-mtu-discovery">
        <name>Path MTU Discovery</name>
        <t>DTLS Path MTU Discovery MUST NOT be used.  Since SCTP provides Path
   MTU discovery and fragmentation/reassembly for user messages, and
   specified in <xref target="Msg-size"/>, DTLS can send maximum sized DTLS
   Records.</t>
      </section>
      <section anchor="retransmission-of-messages">
        <name>Retransmission of Messages</name>
        <t>SCTP provides a reliable and in-sequence transport service for DTLS
   messages that require it.  See <xref target="Stream-Usage"/>.  Therefore, DTLS
   procedures for retransmissions MUST NOT be used.</t>
      </section>
    </section>
    <section anchor="sctp-considerations">
      <name>SCTP Considerations</name>
      <section anchor="Mapping-DTLS">
        <name>Mapping of DTLS Records</name>
        <t>The SCTP implementation MUST support fragmentation of user messages
   using DATA <xref target="RFC9260"/>, and optionally I-DATA <xref target="RFC8260"/> chunks.</t>
        <t>DTLS/SCTP works as a shim layer between the user message API and
   SCTP. On the sender side a user message is split
   into fragments m0, m1, m2, each no larger than 2^14 = 16384
   bytes.</t>
        <artwork><![CDATA[
   m0 | m1 | m2 | ... = user_message
]]></artwork>
        <t>The resulting fragments are protected with DTLS and the records are
   concatenated</t>
        <artwork><![CDATA[
   user_message' = DTLS( m0 ) | DTLS( m1 ) | DTLS( m2 ) ...
]]></artwork>
        <t>The new user_message', i.e., the protected user message, is the input
   to SCTP.</t>
        <t>On the receiving side, the length field in each DTLS record can be
   used to determine the boundaries between DTLS records. DTLS can
   decrypt individual records or a concatenated sequence of records.
   The last DTLS record can be found by subtracting the length of
   individual records from the length of user_message'. Whether to
   decrypt individual records, sequences of records, or the whole
   user_message' is left to the implementation. The output from the
   DTLS decryption(s) is the fragments m0, m1, m2 ...
   The user_message is reassembled from decrypted DTLS records as
   user_message = m0 | m1 | m2 ... There are three failure cases an
   implementation needs to detect and then act on:</t>
        <ol spacing="normal" type="1"><li>Failure in decryption and integrity verification process of any
   DTLS record. Due to SCTP-AUTH preventing delivery of injected or
   corrupt fragments of the protected user message this should only
   occur in case of implementation errors or internal hardware
   failures or the necessary security context has been prematurely
   discarded.</li>
          <li>In case the SCTP layer indicates an end to a user message,
   e.g., when receiving a MSG_EOR in a recvmsg() call when using the
   API described in <xref target="RFC6458"/>, and the last buffered DTLS record
   length field does not match, i.e., the DTLS record is incomplete.</li>
          <li>Unable to perform the decryption processes due to lack of
   resources, such as memory, and have to abandon the user message
   fragment. This specification is defined such that the needed
   resources for the DTLS/SCTP operations are bounded for a given
   number of concurrent transmitted SCTP streams or unordered user
   messages.</li>
        </ol>
        <t>The above failure cases all result in the receiver failing to
   recreate the full user message. This is a failure of the transport
   service that is not possible to recover from in the DTLS/SCTP layer
   and the sender could believe the complete message have been
   delivered. This error MUST NOT be ignored, as SCTP lacks any
   facility to declare a failure on a specific stream or user message,
   the DTLS connection and the SCTP association SHOULD be
   terminated. A valid exception to the termination of the SCTP
   association is if the receiver is capable of notifying the ULP
   about the failure in delivery and the ULP is capable of recovering
   from this failure.</t>
        <t>Note that if the SCTP extension for Partial Reliability (PR-SCTP)
   <xref target="RFC3758"/> is used for a user message, user message may be
   partially delivered or abandoned. These failures are not a reason
   for terminating the DTLS connection and SCTP association.</t>
        <t>The DTLS Connection ID MUST be negotiated (<xref target="RFC9146"/> or Section 9
   of <xref target="RFC9147"/>). If DTLS 1.3 is used, the length field in the
   record layer MUST be included in all records. A 16-bit sequence
   number SHOULD be used rather than 8-bit to minimize issues with
   DTLS record sequence number wrapping.</t>
        <t>The ULP may use multiple messages simultaneous, and the progress and
   delivery of these messages are progressing independently, thus the
   receiving DTLS/SCTP implementation may not receive records in order
   in case of packet loss. Assuming that the sender will send the DTLS
   records in order the DTLS records where created (which may not be
   certain in some implementations), then there is a risk that DTLS
   sequence number have wrapped if the amount of data in flight is
   more than the sequence number covers.  Thus, for 8-bit sequence
   number space with 16384 bytes records the receiver window only
   needs to be 256*16384 = 4,194,304 bytes for this risk to definitely
   exist. While a 16-bit sequence number should not have any sequence
   number wraps for receiver windows up to 1 GB. The DTLS/SCTP may
   not be tightly integrated and the DTLS records may not be requested
   to be sent in strict sequence order, in these case additional
   guard ranges are needed.</t>
        <t>Also, if smaller DTLS records are used, this limit will be
   correspondingly reduced. The DTLS/SCTP Sender needs to choose
   sequence number length and DTLS Record size so that the product is
   larger than the used receiver window, preferably twice as
   large. Receiver implementations that are offering receiver windows
   larger than the product 65536*16384 bytes MUST be capable of
   handling sequence number wraps through trial decoding with a lower
   values in the higher bits of the extended sequence number.</t>
        <t>Section 4 of <xref target="RFC9146"/> states "If, however, an implementation
   chooses to receive different lengths of CID, the assigned CID
   values must be self-delineating since there is no other mechanism
   available to determine what connection (and thus, what CID length)
   is in use.". As this solution requires multiple connection IDs,
   using a zero-length CID will be highly problematic as it could
   result in that any DTLS records with a zero length CID ends up in
   another DTLS connection context, and there fail the decryption and
   integrity verification. And in that case to avoid losing the DTLS
   record, it would have to be forwarded to the zero-length CID using
   DTLS Connection and decryption and validation must be
   tried. Resulting in higher resource utilization. Thus, it is
   REQUIRED to use non-zero length CID values, and instead RECOMMENDED
   to use a single common length for the CID values. A single byte
   should be sufficient, as reuse of old CIDs is possible as long as
   the implementation ensure they are not used in near time to the
   previous usage.</t>
      </section>
      <section anchor="dtls-connection-handling">
        <name>DTLS Connection Handling</name>
        <t>DTLS/SCTP is negotiated on SCTP level as an adaptation layer
   (<xref target="Negotiation"/>). After a succesful negotiation of the DTLS/SCTP
   during SCTP association establishment, a DTLS connection MUST be
   established prior to transmission of any ULP user messages. All
   DTLS connections are terminated when the SCTP association is
   terminated. A DTLS connection MUST NOT span multiple SCTP
   associations.</t>
        <t>As it is required to establish the DTLS connection at the beginning
   of the SCTP association, either of the peers should never send any
   SCTP user messages that are not protected by DTLS. So, the case
   that an endpoint receives data that is not either DTLS messages or
   protected user messages in the form of a sequence of DTLS Records
   on any stream is a protocol violation. The receiver MAY terminate
   the SCTP association due to this protocol
   violation. Implementations that do not have a DTLS endpoint
   immediately ready on SCTP handshake completion will have to ensure
   correct caching of the messages until the DTLS endpoint is ready.</t>
        <t>Whenever a mutual authentication, updated security parameters,
   rerun of Diffie-Hellman key-exchange, or SCTP-AUTH rekeying is
   needed, a new DTLS connection is instead setup in parallel with the
   old connection (i.e., there may be up to two simultaneous DTLS
   connections within one association).</t>
      </section>
      <section anchor="payload-protocol-identifier-usage">
        <name>Payload Protocol Identifier Usage</name>
        <t>SCTP Payload Protocol Identifiers are assigned by IANA.
   Application protocols using DTLS over SCTP SHOULD register and use
   a separate Payload Protocol Identifier (PPID) and SHOULD NOT reuse
   the PPID that they registered for running directly over SCTP.</t>
        <t>Using the same PPID does no harm as DTLS/SCTP requires all user
   messages being DTLS protected and knows that DTLS is used.  However,
   for protocol analyzers, for example, it is much easier if a
   separate PPID is used and avoids different behavior from
   <xref target="RFC6083"/>.</t>
        <t>Messages that are exchanged between DTLS/SCTP peers not containing
   ULP user messages shall use PPID = 0 according to section 3.3.1 of
   <xref target="RFC9260"/> as no application identifier can be specified by the
   upper layer for this payload data. With the exception for the
   DTLS/SCTP Control Messagess (<xref target="Control-Message"/>) that uses its own
   PPID.</t>
      </section>
      <section anchor="Stream-Usage">
        <name>Stream Usage</name>
        <t>DTLS 1.3 protects the actual content type of the DTLS record and
   have therefore omitted the non-protected content type field. Thus,
   it is not possible to determine which content type the DTLS record
   has on SCTP level. For DTLS 1.2 ULP user messages will be carried
   in DTLS records with content type "application_data".</t>
        <t>DTLS Records carrying protected user message fragments MUST be sent
   in the by ULP indicated SCTP stream and user message. The ULP has
   no limitations in using SCTP facilities for stream and user
   messages. DTLS records of other types MAY be sent on any stream. It
   MAY also be sent in its own SCTP user message as well as
   interleaved with other DTLS records carrying protected user
   messages. Thus, it is allowed to insert between protected user
   message fragments DTLS records of other types as the DTLS receiver
   will process these and not result in any user message data being
   inserted into the ULP's user message. However, DTLS messages of
   other types than protected user message MUST be sent reliable, so
   the DTLS record can only be interleaved in case the ULP user
   message is sent as reliable.</t>
        <t>DTLS is capable of handling reordering of the DTLS
   records. However, depending on stream properties and which user
   message DTLS records of other types are sent in may impact in which
   order and how quickly they are possible to process. Using the same
   stream with in-order delivery for the different messages will
   ensure that the DTLS Records are delivered in the order they are
   sent in user messages. Thus, ensuring that if there are DTLS
   records that need to be delivered in particular order it can be
   ensured. Alternatively, if it is desired that a DTLS record is
   delivered as early as possible avoiding in-order streams with queued
   messages and considering stream priorities can result in faster
   delivery.</t>
        <t>A simple solution avoiding any protocol issue are to send all DTLS
   messages that are not protected user message fragments is to pick a
   stream not used by the ULP, send the DTLS messages in their own
   user messages with in order delivery. That mimics the RFC 6083
   behavior without impacting the ULP. However, it assumes that there
   are available streams to be used based on the SCTP association
   handshake allowed streams (Section 5.1.1 of <xref target="RFC9260"/>).</t>
      </section>
      <section anchor="chunk-handling">
        <name>Chunk Handling</name>
        <t>DATA chunks of SCTP MUST be sent in an authenticated way as
   described in SCTP-AUTH <xref target="RFC4895"/>.  All other chunks that can be
   authenticated, i.e., all chunk types that can be listed in the Chunk
   List Parameter <xref target="RFC4895"/>, MUST also be sent in an authenticated
   way.  This makes sure that an attacker cannot modify the stream in
   which a message is sent or affect the ordered/unordered delivery of
   the message.</t>
        <t>If PR-SCTP as defined in <xref target="RFC3758"/> is used, FORWARD-TSN chunks
   MUST also be sent in an authenticated way as described in
   <xref target="RFC4895"/>.  This makes sure that it is not possible for an
   attacker to drop messages and use forged FORWARD-TSN, SACK, and/or
   SHUTDOWN chunks to hide this dropping.</t>
        <t>I-DATA chunk type as defined in <xref target="RFC8260"/> is RECOMMENDED to be
   supported to avoid some of the down sides that large user messages
   have on blocking transmission of later arriving high priority user
   messages. However, the support is not mandated and negotiated
   independently from DTLS/SCTP. If I-DATA chunks are used, then
   they MUST be sent in an authenticated way as described in
   <xref target="RFC4895"/>.</t>
      </section>
      <section anchor="sctp-auth-hash-function">
        <name>SCTP-AUTH Hash Function</name>
        <t>When using DTLS/SCTP, the SHA-256 Message Digest Algorithm MUST be
   supported in the SCTP-AUTH <xref target="RFC4895"/> implementation. SHA-1 MUST
   NOT be used when using DTLS/SCTP. <xref target="RFC4895"/> requires support and
   inclusion of SHA-1 in the HMAC-ALGO parameter, thus, to meet
   both requirements the HMAC-ALGO parameter will include both SHA-256
   and SHA-1 with SHA-256 listed prior to SHA-1 to indicate the
   preference.</t>
      </section>
      <section anchor="Parallel-Dtls">
        <name>Parallel DTLS connections</name>
        <t>To enable SCTP-AUTH rekeying, periodic authentication of both
   endpoints, and force attackers to dynamic key extraction
   <xref target="RFC7624"/>, DTLS/SCTP per this specification defines the usage of
   parallel DTLS connections over the same SCTP association. This
   solution ensures that there are no limitations to the lifetime of
   the SCTP association due to DTLS, it also avoids dependency on
   version specific DTLS mechanisms such as renegotiation in DTLS 1.2,
   which is disabled by default in many DTLS implementations, or
   post-handshake messages in DTLS 1.3, which does not allow periodic
   mutual endpoint re-authentication or re-keying of
   SCTP-AUTH. Parallel DTLS connections enable opening a new DTLS
   connection performing a handshake, while the existing DTLS
   connection is kept in place.  In DTLS 1.3 the handshake MAY be a
   full handshake or a resumption handshake and resumption can be done
   while the original connection is still open. In DTLS 1.2 the
   handshake MUST be a full handshake. The new parallel connection MUST
   use the same DTLS version as the existing connection.
   On handshake completion switch
   to the security context of the new DTLS connection for protection
   of user message and then ensure delivery of all the SCTP chunks
   using the old DTLS connections security context. When that has been
   achieved close the old DTLS connection and discard the related
   security context.</t>
        <t>As specified in <xref target="Mapping-DTLS"/> the usage of DTLS connection ID is
   required to ensure that the receiver can correctly identify the
   DTLS connection and its security context when performing its
   de-protection operations. There is also only a single SCTP-AUTH key
   exported per DTLS connection ensuring that there is clear mapping
   between the DTLS connection ID and the SCTP-AUTH security context for
   each key-id.</t>
        <t>Application writers should be aware that establishing a new DTLS
   connections may result in changes of security parameters.  See
   <xref target="sec-Consideration"/> for security considerations regarding rekeying.</t>
        <t>A DTLS/SCTP Endpoint MUST NOT have more than two DTLS connections
   open at the same time. Either of the endpoints MAY initiate a new
   DTLS connection by performing a full DTLS handshake. As either
   endpoint can initiate a DTLS handshake on either side at the same
   time, either endpoint may receive a DTLS ClientHello when it has
   sent its own ClientHello. In this case the ClientHello from the
   endpoint that had the DTLS Client role in the establishment of the
   existing DTLS connection shall be continued to be processed and the
   other dropped.</t>
        <t>When performing the DTLS handshake the endpoint MUST verify that
   the peer identifies using the same identity as in the previous DTLS
   connection.</t>
        <t>When the DTLS handshake has been completed, the new DTLS connection
   MUST be used for the DTLS protection of any new ULP user messages,
   and SHOULD be switched to for protection of not yet protected user
   message fragments of partially transmitted user messages.  Also
   after the completion of the DTLS handshake a new SCTP-AUTH key will
   be exported per <xref target="handling-endpoint-secret"/>. To enable the sender
   and receiver to correctly identify when the old DTLS connection is
   no longer in use, the SCTP-AUTH key used to protect a SCTP packet
   MUST NOT be from a newer DTLS conncetion than produced any included
   DTLS record fragment.</t>
        <t>The SCTP API defined in <xref target="RFC6458"/> has limitation in changing the
   SCTP-AUTH key until the whole SCTP user message has been
   delivered. However, the DTLS/SCTP implementation can switch the
   DTLS connection used to protect the user message fragments to a
   newever, even if the older DTLS connections exported key is used
   for the SCTP-AUTH. And for SCTP implementations where the SCTP-AUTH
   key can be switched in the middle of a user message the SCTP-AUTH
   key should be changed as soon as all DTLS record fragments included
   in an SCTP packet have been protected by the newer DTLS connection.
   Any SCTP-AUTH receiver implementation is expected to be able to
   select key on SCTP packet basis.</t>
        <t>The DTLS/SCTP endpoint timely indicates to its peer when the
   previous DTLS connection and its context are no longer needed for
   receiving any more data from this endpoint. This is done by sending
   a DTLS/SCTP Control Message <xref target="Control-Message"/> of type
   "Ready_To_Close" <xref target="Ready_To_Close"/> to its peer. The endpoint MUST
   NOT send the Ready_To_Close until the following two conditions are
   fulfilled:</t>
        <ol spacing="normal" type="1"><li>All SCTP packets containing part of any DTLS record or message
protected using the security context of this DTLS connection
have been acknowledged in a non-renegable way.</li>
          <li>All SCTP packets using the SCTP-AUTH key associated with the
security context of this DTLS connection have been acknowledged
in a non-renegable way.</li>
        </ol>
        <t>A DTLS/SCTP endpoint that fulfills the above conditions for the
   SCTP packets it sends and have received a Ready_To_Close message
   SHALL immediately initiate closing of this DTLS connection by
   sending a DTLS close_notify. Then when it have received the peer's
   close_notify terminate the DTLS connection and expunge the
   associated security context and SCTP-AUTH key. Note that it is not
   required for a DTLS/SCTP implementation that has received a
   Ready_To_Close messsage to send that message itself when it
   fulfills the conditions. However, in some situation both endpoints
   will fulfill the conditions close enough in time that both
   endpoints will send its Ready_To_Close prior to receiving the
   indication from its peer, that works as both endpoints will then
   initiate DTLS close_notify and terminate the DTLS connections upon
   the reception of the peers close_notify.</t>
        <t>SCTP implementations exposing APIs like <xref target="RFC6458"/> fulfilling
   these conditions require draining the SCTP association of all
   outstanding data after having completed all the user messages using
   the previous SCTP-AUTH key identifier. Relying on the
   SCTP_SENDER_DRY_EVENT to know when delivery has been accomplished.
   A richer API could also be used that allows user message level
   tracking of delivery, see <xref target="api-considerations"/> for API
   considerations.</t>
        <t>For SCTP implementations exposing APIs like <xref target="RFC6458"/> where it is
   not possible to change the SCTP-AUTH key for a partial SCTP message
   initiated before the change of security context will be forced to
   track the SCTP messages and determine when all using the old
   security context has been transmitted. This maybe be impossible to
   do completely reliable without tighter integration between the
   DTLS/SCTP layer and the SCTP implementation. This type of
   implementations also has an implicit limitation in how large SCTP
   messages it can support. Each SCTP message needs have completed
   delivery and enabling closing of the previous DTLS connection prior
   to the need to create yet another DTLS connection. Thus, SCTP
   messages can't be larger than that the transmission completes in
   less than the duration between the rekeying or re-authentications
   needed for this SCTP association.</t>
        <t>The consequences of sending a DTLS close_notify alert in the old
   DTLS connection prior to the receiver having received the data can
   result in failure case 1 described in <xref target="Mapping-DTLS"/>, which likely
   result in SCTP association termination.</t>
      </section>
      <section anchor="renegotiation-and-keyupdate">
        <name>Renegotiation and KeyUpdate</name>
        <t>DTLS 1.2 renegotiation enables rekeying (with ephemeral Diffie-
   Hellman) of DTLS as well as mutual reauthentication and transfer of
   revocation information inside an DTLS 1.2 connection. Renegotiation
   has been removed from DTLS 1.3 and partly replaced with
   post-handshake messages such as KeyUpdate. The parallel DTLS
   connection solution was specified due to lack of necessary features
   with DTLS 1.3 considered needed for long lived SCTP associations,
   such as rekeying (with ephemeral Diffie-Hellman) as well as mutual
   reauthentication.</t>
        <t>This specification does not allow usage of DTLS 1.2 renegotiation to
   avoid race conditions and corner cases in the interaction between
   the parallel DTLS connection mechanism and the keying of
   SCTP-AUTH. In addition renegotiation is also disabled in some
   implementations, as well as dealing with the epoch change reliable
   have similar or worse application impact.</t>
        <t>This specification also recommends against using DTLS 1.3 KeyUpdate
   and instead rely on parallel DTLS connections. For DTLS 1.3 there
   isn't feature parity. It also has the issue that a DTLS
   implementation following the RFC may assume a too limited window
   for SCTP where the previous epoch's security context is maintained
   and thus changes to epoch handling would be necessary. Thus,
   unless the below specified more application impacting draining is
   used there exist risk of losing data that the sender will have
   assumed has been reliably delivered.</t>
        <section anchor="dtls-12-considerations">
          <name>DTLS 1.2 Considerations</name>
          <t>The endpoint MUST NOT use DTLS 1.2 renegotiation.</t>
        </section>
        <section anchor="dtls-13-considerations">
          <name>DTLS 1.3 Considerations</name>
          <t>Before sending a KeyUpdate message, the DTLS endpoint MUST ensure
   that all DTLS messages have been acknowledged by the SCTP peer in a
   non-revokable way.  After sending the KeyUpdate message, it stops
   sending DTLS messages until the corresponding Ack message has been
   processed.</t>
          <t>Prior to processing a received KeyUpdate message, all other received
   SCTP user messages that are buffered in the SCTP layer and can be
   delivered to the DTLS layer MUST be read and processed by DTLS.</t>
        </section>
      </section>
      <section anchor="handling-endpoint-secret">
        <name>Handling of Endpoint-Pair Shared Secrets</name>
        <t>SCTP-AUTH <xref target="RFC4895"/> is keyed using Endpoint-Pair Shared
   Secrets. In SCTP associations where DTLS is used, DTLS is used to
   establish these secrets. The endpoints MUST NOT use another
   mechanism for establishing shared secrets for SCTP-AUTH.
   The endpoint-pair shared secret for Shared Key Identifier 0 is
   empty and MUST be used when establishing the first DTLS connection.</t>
        <t>The initial DTLS connection will be used to establish a new shared
   secret as specified per DTLS version below, and which MUST use
   shared key identifier 1. After sending the DTLS Finished message
   for the initial DTLS connection, the active SCTP-AUTH key MUST be
   switched from key identifier 0 to key identifier 1. Once the
   initial Finished message from the peer has been processed by DTLS,
   the SCTP-AUTH key with Shared Key Identifier 0 MUST be removed.</t>
        <t>When a subsequent DTLS connection is setup, a new a 64-byte shared
   secret is derived using the TLS-Exporter. The shared secret
   identifiers form a sequence. If the previous shared secret used
   Shared Key Identifier n, the new one MUST use Shared Key Identifier
   n+1, unless n = 65535, in which case the new Shared Key Identifier
   is 1.</t>
        <t>After sending the DTLS Finished message, the new SCTP-AUTH key can
   be used according to <xref target="Parallel-Dtls"/>. When the endpoint has both
   sent and received a close_notify on the old DTLS connection then
   the endpoint SHALL remove the shared secret and the SCTP-AUTH key
   related to old DTLS connection.</t>
        <section anchor="dtls-12-considerations-1">
          <name>DTLS 1.2 Considerations</name>
          <t>Whenever a new DTLS connection is established, a 64-byte
   endpoint-pair shared secret is derived using the TLS-Exporter
   described in <xref target="RFC5705"/>.</t>
          <t>The 64-byte shared secret MUST be provided to the SCTP stack as
   soon as the computation is possible.  The exporter MUST use the
   label given in <xref target="IANA-Consideration"/> and no context.</t>
        </section>
        <section anchor="dtls-13-considerations-1">
          <name>DTLS 1.3 Considerations</name>
          <t>When the exporter_secret can be computed, a 64-byte shared secret
   is derived from it and provided as a new endpoint-pair shared
   secret by using the TLS-Exporter described in <xref target="RFC8446"/>.</t>
          <t>The 64-byte shared secret MUST be provided to the SCTP stack as
   soon as the computation is possible.  The exporter MUST use the
   label given in Section <xref target="IANA-Consideration"/> and no context.</t>
        </section>
      </section>
      <section anchor="sec-shutdown">
        <name>Shutdown</name>
        <t>To prevent DTLS from discarding DTLS user messages while it is
   shutting down, the below procedure has been defined. Its goal is to
   avoid the need for APIs requiring per user message data level
   acknowledgments and utilizes existing SCTP protocol behavior to
   ensure delivery of the protected user messages data.</t>
        <t>To support DTLS 1.2 close_notify behavior and avoid any uncertainty
   related to rekeying, a DTLS/SCTP protocol message
   (<xref target="Control-Message"/>) sent as protected SCTP user message is
   defined with it own PPID to enable the DTLS/SCTP layer to know that
   it is targeting the remote DTLS/SCTP function and act on the
   request to close in a controlled fashion.</t>
        <t>The interaction between peers (local and remote) and protocol
   stacks is as follows:</t>
        <ol spacing="normal" type="1"><li>Local instance of ULP asks for terminating the DTLS/SCTP
   Association.</li>
          <li>Local DTLS/SCTP acknowledge the request, from this time on no
   new data from local instance of ULP will be accepted. In case a
   DTLS connection handshake is ongoing this needs to be aborted
   conclusively at this step to ensure that the necessary DTLS message
   exchange happens prior to draining any outstanding data in the SCTP
   association from this endpoint.</li>
          <li>Local DTLS/SCTP finishes any protection operation on buffered
   user messages and ensures that all protected user message data has
   been successfully transferred to the remote peer.</li>
          <li>Local DTLS/SCTP sends a DTLS/SCTP Control Message
   <xref target="Control-Message"/> of type "SHUTDOWN_Request" <xref target="SHUTDOWN-Request"/>
   to its peer.</li>
          <li>The remote DTLS/SCTP when receiving the SHUTDOWN-Request informs
   its ULP that shutdown has been initiated. No more ULP user
   message data to be sent to peer can be accepted by DTLS/SCTP. In
   case this endpoint has initiated a DTLS connection handshake this
   MUST be aborted as the peer is unable to respond to avoid
   additional case of draining.</li>
          <li>Remote DTLS/SCTP finishes any protection operation on buffered
   user messages and ensures that all protected user message data has
   been successfully transferred to the remote ULP.</li>
          <li>Remote DTLS/SCTP sends DTLS close_notify to Local DTLS/SCTP
   for each and all DTLS connections. Then it initiates the
   SCTP shutdown procedure (section 9.2 of <xref target="RFC9260"/>).</li>
          <li>When the local DTLS/SCTP receives a close_notify on a DTLS
   connection, in case it is DTLS 1.3 it SHALL send its corresponding
   DTLS close_notify on each open DTLS connection. When the last open
   DTLS connection has received close_notify and any if needed
   corresponding close_notify have been sent the local DTLS/SCTP
   initiates the SCTP shutdown procedure (section 9.2 of <xref target="RFC9260"/>).</li>
          <li>Upon receiving the information that SCTP has closed the
   Association, independently the local and remote DTLS/SCTP entities
   destroy the DTLS connection completing the shutdown.</li>
        </ol>
        <t>The verification in step 3 and 6 that all user data message has been
   successfully delivered to the remote ULP can be provided by the
   SCTP stack that implements <xref target="RFC6458"/> by means of SCTP_SENDER_DRY
   event (section 6.1.9 of <xref target="RFC6458"/>).</t>
        <t>A successful SCTP shutdown will indicate successful delivery of all
   data. However, in cases of communication failures and extensive
   packet loss the SCTP shutdown procedure can time out and result in
   SCTP association termination where its unknown if all data has been
   delivered. The DTLS/SCTP should indicate to ULP successful
   completion or failure to shutdown gracefully.</t>
      </section>
    </section>
    <section anchor="Control-Message">
      <name>DTLS/SCTP Control Message</name>
      <t>The DTLS/SCTP Control Message is defined as its own upper layer
   protocol for DTLS/SCTP identified by its own PPID. The control
   message is single 32-bit unsigned integer value in network byte
   order. Each message is sent as its own SCTP user message after
   having been protected by an open DTLS connection on any SCTP stream
   and MUST be marked with SCTP Payload Protocol Identifier (PPID)
   value TBD1 <xref target="sec-IANA-PPID"/>.</t>
      <t>The DTLS/SCTP implementation MUST consume all SCTP messages
   received with the PPID value of TBD1. If the message is not 32-bit
   long the message MUST be discarded and the error SHOULD be logged.
   In case the message has an unknown value the message is
   discarded and the event SHOULD be logged.</t>
      <t>Two control messages are defined in this specfication.</t>
      <section anchor="SHUTDOWN-Request">
        <name>SHUTDOWN-Request</name>
        <t>The value "1" is defined as a request to the peer to initiate
   controlled shutdown. This is used per step 4 and 5 in <xref target="sec-shutdown"/>.</t>
      </section>
      <section anchor="Ready_To_Close">
        <name>Ready To Close Indication</name>
        <t>The value "2" is defined as an indication to the peer that from its
   perspective all SCTP packets with user message or using the
   SCTP-AUTH key associated with the oldest DTLS connection has been
   sent and acknowledged as received in a non-renegable way. This is
   used per <xref target="Parallel-Dtls"/> to initiate the closing of the DTLS
   connections during rekeying.</t>
      </section>
    </section>
    <section anchor="Negotiation">
      <name>DTLS over SCTP Service</name>
      <t>The adoption of DTLS over SCTP according to the current
   specification is meant to add to SCTP the option for transferring
   encrypted data.  When DTLS over SCTP is used, all data being
   transferred MUST be protected by chunk authentication and DTLS
   encrypted.  Chunks that need to be received in an authenticated way
   will be specified in the CHUNK list parameter according to
   <xref target="RFC4895"/>.  Error handling for authenticated chunks is according
   to <xref target="RFC4895"/>.</t>
      <section anchor="adaptation-layer-indication-in-initinit-ack">
        <name>Adaptation Layer Indication in INIT/INIT-ACK</name>
        <t>At the initialization of the association, a sender of the INIT or
   INIT ACK chunk that intends to use DTLS/SCTP as specified in this
   specification MUST include an Adaptation Layer Indication Parameter
   <xref target="RFC5061"/> with the IANA assigned value TBD
   (<xref target="sec-IANA-ACP"/>) to inform its peer that it is able to support
   DTLS over SCTP per this specification.</t>
      </section>
      <section anchor="DTLS-init">
        <name>DTLS over SCTP Initialization</name>
        <t>Initialization of DTLS/SCTP requires all the following options to
   be part of the INIT/INIT-ACK handshake:</t>
        <t>RANDOM: defined in <xref target="RFC4895"/></t>
        <t>CHUNKS: defined in <xref target="RFC4895"/></t>
        <t>HMAC-ALGO: defined in <xref target="RFC4895"/></t>
        <t>ADAPTATION-LAYER-INDICATION: defined in <xref target="RFC5061"/></t>
        <t>When all the above options are present and having acceptable
   parameters, the Association will start with support of DTLS/SCTP.
   The set of options indicated are the DTLS/SCTP Mandatory Options.
   No data transfer is permitted before DTLS handshake is
   complete. Chunk bundling is permitted according to <xref target="RFC9260"/>. The
   DTLS handshake will enable authentication of both the peers.</t>
        <t>The extension described in this document is given by the following
   message exchange.</t>
        <artwork><![CDATA[
   --- INIT[RANDOM; CHUNKS; HMAC-ALGO; ADAPTATION-LAYER-IND] --->
   <- INIT-ACK[RANDOM; CHUNKS; HMAC-ALGO; ADAPTATION-LAYER-IND] -
   ------------------------ COOKIE-ECHO ------------------------>
   <------------------------ COOKIE-ACK -------------------------
   ---------------- AUTH; DATA[DTLS Handshake] ----------------->
                               ...
                               ...
   <--------------- AUTH; DATA[DTLS Handshake] ------------------
]]></artwork>
      </section>
      <section anchor="client-use-case">
        <name>Client Use Case</name>
        <t>When a client initiates an SCTP Association with DTLS protection,
   i.e., the SCTP INIT containing DTSL/SCTP Mandatory Options, it can
   receive an INIT-ACK also containing DTLS/SCTP Mandatory Options, in
   that case the Association will proceed as specified in the previous
   <xref target="DTLS-init"/> section.  If the peer replies with an INIT-ACK not
   containing all DTLS/SCTP Mandatory Options, the client SHOULD reply
   with an SCTP ABORT.</t>
      </section>
      <section anchor="server-use-case">
        <name>Server Use Case</name>
        <t>If a SCTP Server supports DTLS/SCTP, i.e., per this specification,
   when receiving an INIT chunk with all DTLS/SCTP Mandatory Options
   it will reply with an INIT-ACK also containing all the DTLS/SCTP
   Mandatory Options, following the sequence for DTLS initialization
   <xref target="DTLS-init"/> and the related traffic case.  If a SCTP Server that
   supports DTLS and configured to use it, receives an INIT chunk
   without all DTLS/SCTP Mandatory Options, it SHOULD reply with an
   SCTP ABORT.</t>
      </section>
      <section anchor="Fallback">
        <name>RFC 6083 Fallback</name>
        <t>This section discusses how an endpoint supporting this
   specification can fallback to follow the DTLS/SCTP behavior in
   RFC6083.  It is recommended to define a setting that represents the
   policy to allow fallback or not. However, the possibility to use
   fallback is based on the ULP can operate using user messages that
   are no longer than 16384 bytes and where the security issues can be
   mitigated or considered acceptable. Fallback is NOT RECOMMEND to be
   enabled as it enables downgrade attacks to weaker algorithms and
   versions of DTLS.</t>
        <t>An SCTP endpoint that receives an INIT chunk or an INIT-ACK chunk
   that does not contain the SCTP-Adaptation-Indication parameter with
   the DTLS/SCTP adaptation layer codepoint, see <xref target="sec-IANA-ACP"/>, may
   in certain cases potentially perform a fallback to RFC 6083
   behavior.  However, the fallback attempt should only be performed
   if policy says that is acceptable.</t>
        <t>If fallback is allowed, it is possible that the client will send
   plain text user messages prior to DTLS handshake as it is allowed
   per RFC 6083.  So that needs to be part of the consideration for a
   policy allowing fallback.</t>
        <section anchor="client-fallback">
          <name>Client Fallback</name>
          <t>A DTLS/SCTP client supporting this specification encountering an
   server not compatible with this specification MAY attempt RFC 6083
   fallback per this procedure.</t>
          <ol spacing="normal" type="1"><li>Fallback procedure, if enabled, is initiated when receiving an
SCTP INIT-ACK that does not contain the DTLS/SCTP Adaptation
Layer indication. If fallback is not enabled the SCTP handshake
is aborted.</li>
            <li>The client checks that the SCTP INIT-ACK contained the necessary
chunks and parameters to establish SCTP-AUTH per RFC 6083 with
this endpoint. If not all necessary parameters or support
algorithms don't match the client MUST abort the
handshake. Otherwise it completes the SCTP handshake.</li>
            <li>Client performs DTLS connection handshake per RFC 6083 over
established SCTP association. If successful authenticating the
targeted server the client has successful fallen back to use
RFC 6083. If not terminate the SCTP association.</li>
          </ol>
        </section>
        <section anchor="server-fallback">
          <name>Server Fallback</name>
          <t>A DTLS/SCTP Server that supports both this specification and RFC
   6083 and where fallback has been enabled for the ULP can follow
   this procedure.receiving</t>
          <ol spacing="normal" type="1"><li>When receiving an SCTP INIT message without the DTLS/SCTP
adaptation layer indication fallback procedure is initiated.</li>
            <li>Verify that the SCTP INIT contains SCTP-AUTH parameters required
by RFC 6083 and compatible with this server. If that is not the
case abort the SCTP handshake.</li>
            <li>Send an SCTP INIT ACK with the required SCTP-AUTH chunks and
parameters to the client.</li>
            <li>Complete the SCTP Handshake. Await DTLS handshake per RFC 6083.
Plain text SCTP messages MAY be received.</li>
            <li>Upon successful completion of DTLS handshake successful fallback
to RFC 6083 have been accomplished.</li>
          </ol>
        </section>
      </section>
    </section>
    <section anchor="api-considerations">
      <name>SCTP API Consideration</name>
      <t>DTLS/SCTP needs certain functionality on the API that the SCTP
   implementation provide to the ULP to function optimally. A
   DTLS/SCTP implementation will need to provide its own API to the
   ULP, while itself using the SCTP API. This discussion is focused on
   the needed functionality on the SCTP API.</t>
      <t>The following functionality is needed:</t>
      <ul spacing="normal">
        <li>Controlling SCPT-AUTH negotiation so that SHA-256 algorithm is
inlcluded, and determine that SHA-1 is not selected when the
association is established.</li>
        <li>Determine when all SCTP packets that uses an SCTP-auth key or
contains DTLS records associated to a particular DTLS connection
has been acknowledged non-renegable.</li>
        <li>Determine when all SCTP packets have been acknowledged
non-renegable.</li>
        <li>Negotiate the adaptation layer indication that indicates
DTLS/SCTP and determine if it was agreed or not.</li>
        <li>Partial user messages transmission and reception.</li>
      </ul>
    </section>
    <section anchor="IANA-Consideration">
      <name>IANA Considerations</name>
      <section anchor="tls-exporter-label">
        <name>TLS Exporter Label</name>
        <t>RFC 6083 defined a TLS Exporter Label registry as described in
   <xref target="RFC5705"/>. IANA is requested to update the reference for the
   label "EXPORTER_DTLS_OVER_SCTP" to also include this specification.</t>
      </section>
      <section anchor="sec-IANA-ACP">
        <name>SCTP Adaptation Layer Indication Code Point</name>
        <t><xref target="RFC5061"/> defined an IANA registry for Adaptation Code Points to
   be used in the Adaptation Layer Indication parameter. The registry
   was at time of writing located:
   https://www.iana.org/assignments/sctp-parameters/sctp-parameters.xhtml#sctp-parameters-27
   IANA is requested to assign one Adaptation Code Point for DTLS/SCTP
   per the below proposed entry in <xref target="iana-ACP"/>.</t>
        <table anchor="iana-ACP">
          <name>Adaptation Code Point</name>
          <thead>
            <tr>
              <th align="left">Code Point (32-bit number)</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">0x00000002</td>
              <td align="left">DTLS/SCTP</td>
              <td align="left">[RFC-TBD]</td>
            </tr>
          </tbody>
        </table>
        <t>RFC-Editor Note: Please replace [RFC-TBD] with the RFC number given to
this specification.</t>
      </section>
      <section anchor="sec-IANA-PPID">
        <name>SCTP Payload Protocol Identifiers</name>
        <t>This document registers one Payload Protocol Identifier (PPID) to
   be used to idenfity the DTLS/SCTP control messages
   (<xref target="Control-Message"/>).</t>
        <table anchor="iana-PPID">
          <name>SCTP Payload Protocol Identifier</name>
          <thead>
            <tr>
              <th align="left">Value</th>
              <th align="left">SCTP PPID</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">TBD1</td>
              <td align="left">DTLS/SCTP Control Message</td>
              <td align="left">[RFC-TBD]</td>
            </tr>
          </tbody>
        </table>
        <t>RFC-Editor Note: Please replace [RFC-TBD] with the RFC number given to
this specification.</t>
      </section>
    </section>
    <section anchor="sec-Consideration">
      <name>Security Considerations</name>
      <t>The security considerations given in <xref target="RFC9147"/>,
   <xref target="RFC4895"/>, and <xref target="RFC9260"/> also apply to this document.</t>
      <section anchor="cryptographic-considerations">
        <name>Cryptographic Considerations</name>
        <t>Over the years, there have been several serious attacks on earlier
   versions of Transport Layer Security (TLS), including attacks on
   its most commonly used ciphers and modes of operation.  <xref target="RFC7457"/>
   summarizes the attacks that were known at the time of publishing
   and BCP 195 <xref target="RFC7525"/> <xref target="RFC8996"/> provide recommendations for
   improving the security of deployed services that use TLS.</t>
        <t>When DTLS/SCTP is used with DTLS 1.2 <xref target="RFC6347"/>, DTLS 1.2 MUST be
   configured to disable options known to provide insufficient
   security. HTTP/2 <xref target="RFC9113"/> gives good minimum requirements based
   on the attacks that where publicly known in 2022. DTLS 1.3
   <xref target="RFC9147"/> only define strong algorithms without major
   weaknesses at the time of publication. Many of the TLS registries
   have a "Recommended" column. Parameters not marked as "Y" are NOT
   RECOMMENDED to support. DTLS 1.3 is preferred over DTLS 1.2 being a
   newer protocol that addresses known vulnerabilities and only
   defines strong algorithms without known major weaknesses at the
   time of publication.</t>
        <t>DTLS 1.3 requires rekeying before algorithm specific AEAD limits
   have been reached. The AEAD limits equations are equally valid for
   DTLS 1.2 and SHOULD be followed for DTLS/SCTP, but are not mandated
   by the DTLS 1.2 specification.</t>
        <t>HMAC-SHA-256 as used in SCTP-AUTH has a very large tag length and
   very good integrity properties.  The SCTP-AUTH key can be used
   longer than the current algorithms in the TLS record layer. The
   SCTP-AUTH key is rekeyed when a new DTLS connection is set up at
   which point a new SCTP-AUTH key is derived using the TLS-Exporter.</t>
        <t>(D)TLS 1.3 <xref target="RFC8446"/> discusses forward secrecy from EC(DHE),
   KeyUpdate, and tickets/resumption. Forward secrecy limits the
   effect of key leakage in one direction (compromise of a key at
   time T2 does not compromise some key at time T1 where T1 &lt; T2).
   Protection in the other direction (compromise at time T1 does not
   compromise keys at time T2) can be achieved by rerunning EC(DHE).
   If a long-term authentication key has been compromised, a full
   handshake with EC(DHE) gives protection against passive
   attackers. If the resumption_master_secret has been compromised,
   a resumption handshake with EC(DHE) gives protection against passive
   attackers and a full handshake with EC(DHE) gives protection against
   active attackers. If a traffic secret has been compromised, any
   handshake with EC(DHE) gives protection against active attackers.</t>
        <t>The document "Confidentiality in the Face of Pervasive Surveillance:
   A Threat Model and Problem Statement" <xref target="RFC7624"/> defines key
   exfiltration as the transmission of cryptographic keying material
   for an encrypted communication from a collaborator, deliberately or
   unwittingly, to an attacker. Using the terms in RFC 7624, forward
   secrecy without rerunning EC(DHE) still allows an attacker to do
   static key exfiltration. Rerunning EC(DHE) forces and attacker to
   dynamic key exfiltration (or content exfiltration).</t>
        <t>When using DTLS 1.3 <xref target="RFC9147"/>, AEAD limits and
   forward secrecy can be achieved by sending post-handshake KeyUpdate
   messages, which triggers rekeying of DTLS. Such symmetric rekeying
   gives significantly less protection against key leakage than
   re-running Diffie-Hellman as explained above.  After leakage of
   application_traffic_secret_N, an attacker can passively eavesdrop
   on all future data sent on the connection including data encrypted
   with application_traffic_secret_N+1,
   application_traffic_secret_N+2, etc. Note that KeyUpdate does not
   update the exporter_secret.</t>
        <t>DTLS/SCTP is in many deployments replacing IPsec. For IPsec, NIST
   (US), BSI (Germany), and ANSSI (France) recommends very frequent
   re-run of Diffie-Hellman to provide forward secrecy and
   force attackers to dynamic key extraction <xref target="RFC7624"/>. ANSSI writes
   "It is recommended to force the periodic renewal of the keys, e.g.,
   every hour and every 100 GB of data, in order to limit the impact
   of a key compromise." <xref target="ANSSI-DAT-NT-003"/>.</t>
        <t>For many DTLS/SCTP deployments the SCTP association is expected to
   have a very long lifetime of months or even years. For associations
   with such long lifetimes there is a need to frequently
   re-authenticate both client and server. TLS Certificate lifetimes
   significantly shorter than a year are common which is shorter than
   many expected DTLS/SCTP associations.</t>
        <t>SCTP-AUTH re-rekeying, periodic authentication of both endpoints,
   and frequent re-run of Diffie-Hellman to force attackers to dynamic
   key extraction is in DTLS/SCTP per this specification achieved by
   setting up new DTLS connections over the same SCTP
   association. Implementations SHOULD set up new connections
   frequently to force attackers to dynamic key
   extraction. Implementations MUST set up new connections before any
   of the certificates expire. It is RECOMMENDED that all negotiated
   and exchanged parameters are the same except for the timestamps in
   the certificates. Clients and servers MUST NOT accept a change of
   identity during the setup of a new connections, but MAY accept
   negotiation of stronger algorithms and security parameters, which
   might be motivated by new attacks.</t>
        <t>Allowing new connections can enable denial-of-service attacks.
   The endpoints SHOULD limit the frequency of new connections.</t>
        <t>When DTLS/SCTP is used with DTLS 1.2 <xref target="RFC6347"/>, the TLS Session
   Hash and Extended Master Secret Extension <xref target="RFC7627"/> MUST be used to
   prevent unknown key-share attacks where an attacker establishes the
   same key on several connections. DTLS 1.3 always prevents these
   kinds of attacks. The use of SCTP-AUTH then cryptographically binds
   new connections to the old connection. This together with mandatory
   mutual authentication (on the DTLS layer) and a requirement to not
   accept new identities mitigates MITM attacks that have plagued
   renegotiation <xref target="TRISHAKE"/>.</t>
      </section>
      <section anchor="downgrade-attacks">
        <name>Downgrade Attacks</name>
        <t>A peer supporting DTLS/SCTP according to this specification,
   DTLS/SCTP according to <xref target="RFC6083"/> and/or SCTP without DTLS may be
   vulnerable to downgrade attacks where on on-path attacker
   interferes with the protocol setup to lower or disable security. If
   possible, it is RECOMMENDED that the peers have a policy only
   allowing DTLS/SCTP according to this specification.</t>
      </section>
      <section anchor="targeting-dtls-messages">
        <name>Targeting DTLS Messages</name>
        <t>The DTLS handshake messages and other control messages, i.e., not
   application data can easily be identified when using DTLS 1.2 as
   their content type is not encrypted. With DTLS 1.3 there is no
   unprotected content type. However, they will be sent with an PPID of 0
   if sent in their own SCTP user messages. <xref target="Stream-Usage"/> proposes
   a basic behavior that will still make it easily for anyone to
   detect the DTLS messages that are not protected user messages.</t>
      </section>
      <section anchor="authentication-and-policy-decisions">
        <name>Authentication and Policy Decisions</name>
        <t>DTLS/SCTP MUST be mutually authenticated. Authentication is the
   process of establishing the identity of a user or system and
   verifying that the identity is valid. DTLS only provides proof of
   possession of a key.  DTLS/SCTP MUST perform identity
   authentication. It is RECOMMENDED that DTLS/SCTP is used with
   certificate-based authentication. When certificates are used the
   application using DTLS/SCTP is responsible for certificate
   policies, certificate chain validation, and identity authentication
   (HTTPS does for example match the hostname with a subjectAltName of
   type dNSName). The application using DTLS/SCTP MUST define what the
   identity is and how it is encoded and the client and server MUST
   use the same identity format.  Guidance on server certificate
   validation can be found in <xref target="RFC6125"/>.  DTLS/SCTP enables periodic
   transfer of mutual revocation information (OSCP stapling) every
   time a new parallel connection is set up.  All security decisions
   MUST be based on the peer's authenticated identity, not on its
   transport layer identity.</t>
        <t>It is possible to authenticate DTLS endpoints based on IP addresses
   in certificates. SCTP associations can use multiple IP addresses
   per SCTP endpoint. Therefore, it is possible that DTLS records will
   be sent from a different source IP address or to a different
   destination IP address than that originally authenticated. This is
   not a problem provided that no security decisions are made based on
   the source or destination IP addresses.</t>
      </section>
      <section anchor="resumption-and-tickets">
        <name>Resumption and Tickets</name>
        <t>In DTLS 1.3 any number of tickets can be issued in a connection and
   the tickets can be used for resumption as long as they are valid, which
   is up to seven days. The nodes in a resumed connection have the
   same roles (client or server) as in the connection where the ticket
   was issued. In DTLS/SCTP, there are no significant performance
   benefits with resumption and an implementation can chose to never
   issue any tickets. If tickets and resumption are used it is enough
   to issue a single ticket per connection.</t>
      </section>
      <section anchor="privacy-considerations">
        <name>Privacy Considerations</name>
        <t><xref target="RFC6973"/> suggests that the privacy considerations of IETF
   protocols be documented.</t>
        <t>For each SCTP user message, the user also provides a stream
   identifier, a flag to indicate whether the message is sent ordered
   or unordered, and a payload protocol identifier.  Although
   DTLS/SCTP provides privacy for the actual user message, the other
   three information fields are not confidentiality protected.  They
   are sent as cleartext because they are part of the SCTP DATA
   chunk header.</t>
        <t>It is RECOMMENDED that DTLS/SCTP is used with certificate based
   authentication in DTLS 1.3 <xref target="RFC9147"/> to provide
   identity protection. DTLS/SCTP MUST be used with a key exchange
   method providing forward secrecy.</t>
      </section>
      <section anchor="pervasive-monitoring">
        <name>Pervasive Monitoring</name>
        <t>As required by <xref target="RFC7258"/>, work on IETF protocols needs to
   consider the effects of pervasive monitoring and mitigate them when
   possible.</t>
        <t>Pervasive Monitoring is widespread surveillance of users.  By
   encrypting more information including user identities, DTLS 1.3
   offers much better protection against pervasive monitoring.</t>
        <t>Massive pervasive monitoring attacks relying on key exchange
   without forward secrecy has been reported. By mandating
   forward secrecy, DTLS/SCTP effectively mitigate many forms of
   passive pervasive monitoring and limits the amount of compromised
   data due to key compromise.</t>
        <t>An important mitigation of pervasive monitoring is to force
   attackers to do dynamic key exfiltration instead of static key
   exfiltration. Dynamic key exfiltration increases the risk of
   discovery for the attacker <xref target="RFC7624"/>. DTLS/SCTP per this
   specification encourages implementations to frequently set up new
   DTLS connections with (EC)DHE over the same SCTP association to
   force attackers to do dynamic key exfiltration.</t>
        <t>In addition to the privacy attacks discussed above, surveillance on
   a large scale may enable tracking of a user over a wider
   geographical area and across different access networks.  Using
   information from DTLS/SCTP together with information gathered from
   other protocols increase the risk of identifying individual users.</t>
      </section>
    </section>
    <section anchor="contributors">
      <name>Contributors</name>
      <t>Michael Tuexen contributed as co-author to the intitial versions
   this draft. Michael's contributions include:</t>
      <ul spacing="normal">
        <li>The use of the Adaptation Layer Indication.</li>
        <li>Many editorial improvements.</li>
      </ul>
    </section>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors of RFC 6083 which this document is based on are
   Michael Tuexen, Eric Rescorla, and Robin Seggelmann.</t>
      <t>The RFC 6083 authors thanked Anna Brunstrom, Lars Eggert, Gorry
   Fairhurst, Ian Goldberg, Alfred Hoenes, Carsten Hohendorf, Stefan
   Lindskog, Daniel Mentz, and Sean Turner for their invaluable comments.</t>
      <t>The authors of this document want to thank Daria Ivanova, Li Yan,
   and GitHub user vanrein for their contribution.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author initials="S." surname="Bradner" fullname="S. Bradner">
              <organization/>
            </author>
            <date year="1997" month="March"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC3758" target="https://www.rfc-editor.org/info/rfc3758" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.3758.xml">
          <front>
            <title>Stream Control Transmission Protocol (SCTP) Partial Reliability Extension</title>
            <author initials="R." surname="Stewart" fullname="R. Stewart">
              <organization/>
            </author>
            <author initials="M." surname="Ramalho" fullname="M. Ramalho">
              <organization/>
            </author>
            <author initials="Q." surname="Xie" fullname="Q. Xie">
              <organization/>
            </author>
            <author initials="M." surname="Tuexen" fullname="M. Tuexen">
              <organization/>
            </author>
            <author initials="P." surname="Conrad" fullname="P. Conrad">
              <organization/>
            </author>
            <date year="2004" month="May"/>
            <abstract>
              <t>This memo describes an extension to the Stream Control Transmission Protocol (SCTP) that allows an SCTP endpoint to signal to its peer that it should move the cumulative ack point forward.  When both sides of an SCTP association support this extension, it can be used by an SCTP implementation to provide partially reliable data transmission service to an upper layer protocol.  This memo describes the protocol extensions, which consist of a new parameter for INIT and INIT ACK, and a new FORWARD TSN chunk type, and provides one example of a partially reliable service that can be provided to the upper layer via this mechanism.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3758"/>
          <seriesInfo name="DOI" value="10.17487/RFC3758"/>
        </reference>
        <reference anchor="RFC4895" target="https://www.rfc-editor.org/info/rfc4895" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.4895.xml">
          <front>
            <title>Authenticated Chunks for the Stream Control Transmission Protocol (SCTP)</title>
            <author initials="M." surname="Tuexen" fullname="M. Tuexen">
              <organization/>
            </author>
            <author initials="R." surname="Stewart" fullname="R. Stewart">
              <organization/>
            </author>
            <author initials="P." surname="Lei" fullname="P. Lei">
              <organization/>
            </author>
            <author initials="E." surname="Rescorla" fullname="E. Rescorla">
              <organization/>
            </author>
            <date year="2007" month="August"/>
            <abstract>
              <t>This document describes a new chunk type, several parameters, and procedures for the Stream Control Transmission Protocol (SCTP).  This new chunk type can be used to authenticate SCTP chunks by using shared keys between the sender and receiver.  The new parameters are used to establish the shared keys.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4895"/>
          <seriesInfo name="DOI" value="10.17487/RFC4895"/>
        </reference>
        <reference anchor="RFC5061" target="https://www.rfc-editor.org/info/rfc5061" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.5061.xml">
          <front>
            <title>Stream Control Transmission Protocol (SCTP) Dynamic Address Reconfiguration</title>
            <author initials="R." surname="Stewart" fullname="R. Stewart">
              <organization/>
            </author>
            <author initials="Q." surname="Xie" fullname="Q. Xie">
              <organization/>
            </author>
            <author initials="M." surname="Tuexen" fullname="M. Tuexen">
              <organization/>
            </author>
            <author initials="S." surname="Maruyama" fullname="S. Maruyama">
              <organization/>
            </author>
            <author initials="M." surname="Kozuka" fullname="M. Kozuka">
              <organization/>
            </author>
            <date year="2007" month="September"/>
            <abstract>
              <t>A local host may have multiple points of attachment to the Internet, giving it a degree of fault tolerance from hardware failures.  Stream Control Transmission Protocol (SCTP) (RFC 4960) was developed to take full advantage of such a multi-homed host to provide a fast failover and association survivability in the face of such hardware failures. This document describes an extension to SCTP that will allow an SCTP stack to dynamically add an IP address to an SCTP association, dynamically delete an IP address from an SCTP association, and to request to set the primary address the peer will use when sending to an endpoint.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5061"/>
          <seriesInfo name="DOI" value="10.17487/RFC5061"/>
        </reference>
        <reference anchor="RFC5705" target="https://www.rfc-editor.org/info/rfc5705" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.5705.xml">
          <front>
            <title>Keying Material Exporters for Transport Layer Security (TLS)</title>
            <author initials="E." surname="Rescorla" fullname="E. Rescorla">
              <organization/>
            </author>
            <date year="2010" month="March"/>
            <abstract>
              <t>A number of protocols wish to leverage Transport Layer Security (TLS) to perform key establishment but then use some of the keying material for their own purposes.  This document describes a general mechanism for allowing that.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5705"/>
          <seriesInfo name="DOI" value="10.17487/RFC5705"/>
        </reference>
        <reference anchor="RFC6347" target="https://www.rfc-editor.org/info/rfc6347" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.6347.xml">
          <front>
            <title>Datagram Transport Layer Security Version 1.2</title>
            <author initials="E." surname="Rescorla" fullname="E. Rescorla">
              <organization/>
            </author>
            <author initials="N." surname="Modadugu" fullname="N. Modadugu">
              <organization/>
            </author>
            <date year="2012" month="January"/>
            <abstract>
              <t>This document specifies version 1.2 of the Datagram Transport Layer Security (DTLS) protocol.  The DTLS protocol provides communications privacy for datagram protocols.  The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.  The DTLS protocol is based on the Transport Layer Security (TLS) protocol and provides equivalent security guarantees.  Datagram semantics of the underlying transport are preserved by the DTLS protocol.  This document updates DTLS 1.0 to work with TLS version 1.2.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6347"/>
          <seriesInfo name="DOI" value="10.17487/RFC6347"/>
        </reference>
        <reference anchor="RFC7627" target="https://www.rfc-editor.org/info/rfc7627" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7627.xml">
          <front>
            <title>Transport Layer Security (TLS) Session Hash and Extended Master Secret Extension</title>
            <author initials="K." surname="Bhargavan" fullname="K. Bhargavan" role="editor">
              <organization/>
            </author>
            <author initials="A." surname="Delignat-Lavaud" fullname="A. Delignat-Lavaud">
              <organization/>
            </author>
            <author initials="A." surname="Pironti" fullname="A. Pironti">
              <organization/>
            </author>
            <author initials="A." surname="Langley" fullname="A. Langley">
              <organization/>
            </author>
            <author initials="M." surname="Ray" fullname="M. Ray">
              <organization/>
            </author>
            <date year="2015" month="September"/>
            <abstract>
              <t>The Transport Layer Security (TLS) master secret is not cryptographically bound to important session parameters such as the server certificate.  Consequently, it is possible for an active attacker to set up two sessions, one with a client and another with a server, such that the master secrets on the two sessions are the same.  Thereafter, any mechanism that relies on the master secret for authentication, including session resumption, becomes vulnerable to a man-in-the-middle attack, where the attacker can simply forward messages back and forth between the client and server.  This specification defines a TLS extension that contextually binds the master secret to a log of the full handshake that computes it, thus preventing such attacks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7627"/>
          <seriesInfo name="DOI" value="10.17487/RFC7627"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author initials="B." surname="Leiba" fullname="B. Leiba">
              <organization/>
            </author>
            <date year="2017" month="May"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8260" target="https://www.rfc-editor.org/info/rfc8260" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8260.xml">
          <front>
            <title>Stream Schedulers and User Message Interleaving for the Stream Control Transmission Protocol</title>
            <author initials="R." surname="Stewart" fullname="R. Stewart">
              <organization/>
            </author>
            <author initials="M." surname="Tuexen" fullname="M. Tuexen">
              <organization/>
            </author>
            <author initials="S." surname="Loreto" fullname="S. Loreto">
              <organization/>
            </author>
            <author initials="R." surname="Seggelmann" fullname="R. Seggelmann">
              <organization/>
            </author>
            <date year="2017" month="November"/>
            <abstract>
              <t>The Stream Control Transmission Protocol (SCTP) is a message-oriented transport protocol supporting arbitrarily large user messages.  This document adds a new chunk to SCTP for carrying payload data.  This allows a sender to interleave different user messages that would otherwise result in head-of-line blocking at the sender.  The interleaving of user messages is required for WebRTC data channels.</t>
              <t>Whenever an SCTP sender is allowed to send user data, it may choose from multiple outgoing SCTP streams.  Multiple ways for performing this selection, called stream schedulers, are defined in this document.  A stream scheduler can choose to either implement, or not implement, user message interleaving.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8260"/>
          <seriesInfo name="DOI" value="10.17487/RFC8260"/>
        </reference>
        <reference anchor="RFC8446" target="https://www.rfc-editor.org/info/rfc8446" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8446.xml">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author initials="E." surname="Rescorla" fullname="E. Rescorla">
              <organization/>
            </author>
            <date year="2018" month="August"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8996" target="https://www.rfc-editor.org/info/rfc8996" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8996.xml">
          <front>
            <title>Deprecating TLS 1.0 and TLS 1.1</title>
            <author initials="K." surname="Moriarty" fullname="K. Moriarty">
              <organization/>
            </author>
            <author initials="S." surname="Farrell" fullname="S. Farrell">
              <organization/>
            </author>
            <date year="2021" month="March"/>
            <abstract>
              <t>This document formally deprecates Transport Layer Security (TLS) versions 1.0 (RFC 2246) and 1.1 (RFC 4346). Accordingly, those documents have been moved to Historic status. These versions lack support for current and recommended cryptographic algorithms and mechanisms, and various government and industry profiles of applications using TLS now mandate avoiding these old TLS versions. TLS version 1.2 became the recommended version for IETF protocols in 2008 (subsequently being obsoleted by TLS version 1.3 in 2018), providing sufficient time to transition away from older versions. Removing support for older versions from implementations reduces the attack surface, reduces opportunity for misconfiguration, and streamlines library and product maintenance. </t>
              <t>This document also deprecates Datagram TLS (DTLS) version 1.0 (RFC 4347) but not DTLS version 1.2, and there is no DTLS version 1.1.</t>
              <t>This document updates many RFCs that normatively refer to TLS version 1.0 or TLS version 1.1, as described herein. This document also updates the best practices for TLS usage in RFC 7525; hence, it is part of BCP 195.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="195"/>
          <seriesInfo name="RFC" value="8996"/>
          <seriesInfo name="DOI" value="10.17487/RFC8996"/>
        </reference>
        <reference anchor="RFC9113" target="https://www.rfc-editor.org/info/rfc9113" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.9113.xml">
          <front>
            <title>HTTP/2</title>
            <author initials="M." surname="Thomson" fullname="M. Thomson" role="editor">
              <organization/>
            </author>
            <author initials="C." surname="Benfield" fullname="C. Benfield" role="editor">
              <organization/>
            </author>
            <date year="2022" month="June"/>
            <abstract>
              <t>This specification describes an optimized expression of the semantics of the Hypertext Transfer Protocol (HTTP), referred to as HTTP version 2 (HTTP/2). HTTP/2 enables a more efficient use of network resources and a reduced latency by introducing field compression and allowing multiple concurrent exchanges on the same connection.</t>
              <t>This document obsoletes RFCs 7540 and 8740.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9113"/>
          <seriesInfo name="DOI" value="10.17487/RFC9113"/>
        </reference>
        <reference anchor="RFC9146" target="https://www.rfc-editor.org/info/rfc9146" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.9146.xml">
          <front>
            <title>Connection Identifier for DTLS 1.2</title>
            <author initials="E." surname="Rescorla" fullname="E. Rescorla" role="editor">
              <organization/>
            </author>
            <author initials="H." surname="Tschofenig" fullname="H. Tschofenig" role="editor">
              <organization/>
            </author>
            <author initials="T." surname="Fossati" fullname="T. Fossati">
              <organization/>
            </author>
            <author initials="A." surname="Kraus" fullname="A. Kraus">
              <organization/>
            </author>
            <date year="2022" month="March"/>
            <abstract>
              <t>This document specifies the Connection ID (CID) construct for the Datagram Transport Layer Security (DTLS) protocol version 1.2.</t>
              <t>A CID is an identifier carried in the record layer header that gives the recipient additional information for selecting the appropriate security association. In "classical" DTLS, selecting a security association of an incoming DTLS record is accomplished with the help of the 5-tuple. If the source IP address and/or source port changes during the lifetime of an ongoing DTLS session, then the receiver will be unable to locate the correct security context.</t>
              <t>The new ciphertext record format with the CID also provides content type encryption and record layer padding.</t>
              <t>This document updates RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9146"/>
          <seriesInfo name="DOI" value="10.17487/RFC9146"/>
        </reference>
        <reference anchor="RFC9147" target="https://www.rfc-editor.org/info/rfc9147" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.9147.xml">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author initials="E." surname="Rescorla" fullname="E. Rescorla">
              <organization/>
            </author>
            <author initials="H." surname="Tschofenig" fullname="H. Tschofenig">
              <organization/>
            </author>
            <author initials="N." surname="Modadugu" fullname="N. Modadugu">
              <organization/>
            </author>
            <date year="2022" month="April"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability.  Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="RFC9260" target="https://www.rfc-editor.org/info/rfc9260" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.9260.xml">
          <front>
            <title>Stream Control Transmission Protocol</title>
            <author initials="R." surname="Stewart" fullname="R. Stewart">
              <organization/>
            </author>
            <author initials="M." surname="Tüxen" fullname="M. Tüxen">
              <organization/>
            </author>
            <author initials="K." surname="Nielsen" fullname="K. Nielsen">
              <organization/>
            </author>
            <date year="2022" month="June"/>
            <abstract>
              <t>This document describes the Stream Control Transmission Protocol (SCTP) and obsoletes RFC 4960.  It incorporates the specification of the chunk flags registry from RFC 6096 and the specification of the I bit of DATA chunks from RFC 7053. Therefore, RFCs 6096 and 7053 are also obsoleted by this document. In addition, RFCs 4460 and 8540, which describe errata for SCTP, are obsoleted by this document. </t>
              <t>SCTP was originally designed to transport Public Switched Telephone Network (PSTN) signaling messages over IP networks. It is also suited to be used for other applications, for example, WebRTC.</t>
              <t>SCTP is a reliable transport protocol operating on top of a connectionless packet network, such as IP. It offers the following services to its users:</t>
              <t>The design of SCTP includes appropriate congestion avoidance behavior and resistance to flooding and masquerade attacks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9260"/>
          <seriesInfo name="DOI" value="10.17487/RFC9260"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC3436" target="https://www.rfc-editor.org/info/rfc3436" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.3436.xml">
          <front>
            <title>Transport Layer Security over Stream Control Transmission Protocol</title>
            <author initials="A." surname="Jungmaier" fullname="A. Jungmaier">
              <organization/>
            </author>
            <author initials="E." surname="Rescorla" fullname="E. Rescorla">
              <organization/>
            </author>
            <author initials="M." surname="Tuexen" fullname="M. Tuexen">
              <organization/>
            </author>
            <date year="2002" month="December"/>
            <abstract>
              <t>This document describes the usage of the Transport Layer Security (TLS) protocol, as defined in RFC 2246, over the Stream Control Transmission Protocol (SCTP), as defined in RFC 2960 and RFC 3309. The user of TLS can take advantage of the features provided by SCTP, namely the support of multiple streams to avoid head of line blocking and the support of multi-homing to provide network level fault tolerance. Additionally, discussions of extensions of SCTP are also supported, meaning especially the support of dynamic reconfiguration of IP- addresses.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3436"/>
          <seriesInfo name="DOI" value="10.17487/RFC3436"/>
        </reference>
        <reference anchor="RFC3788" target="https://www.rfc-editor.org/info/rfc3788" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.3788.xml">
          <front>
            <title>Security Considerations for Signaling Transport (SIGTRAN) Protocols</title>
            <author initials="J." surname="Loughney" fullname="J. Loughney">
              <organization/>
            </author>
            <author initials="M." surname="Tuexen" fullname="M. Tuexen" role="editor">
              <organization/>
            </author>
            <author initials="J." surname="Pastor-Balbas" fullname="J. Pastor-Balbas">
              <organization/>
            </author>
            <date year="2004" month="June"/>
            <abstract>
              <t>This document discusses how Transport Layer Security (TLS) and IPsec can be used to secure communication for SIGTRAN protocols.  The main goal is to recommend the minimum security means that a SIGTRAN node must implement in order to attain secured communication.  The support of IPsec is mandatory for all nodes running SIGTRAN protocols.  TLS support is optional.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3788"/>
          <seriesInfo name="DOI" value="10.17487/RFC3788"/>
        </reference>
        <reference anchor="RFC6083" target="https://www.rfc-editor.org/info/rfc6083" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.6083.xml">
          <front>
            <title>Datagram Transport Layer Security (DTLS) for Stream Control Transmission Protocol (SCTP)</title>
            <author initials="M." surname="Tuexen" fullname="M. Tuexen">
              <organization/>
            </author>
            <author initials="R." surname="Seggelmann" fullname="R. Seggelmann">
              <organization/>
            </author>
            <author initials="E." surname="Rescorla" fullname="E. Rescorla">
              <organization/>
            </author>
            <date year="2011" month="January"/>
            <abstract>
              <t>This document describes the usage of the Datagram Transport Layer Security (DTLS) protocol over the Stream Control Transmission Protocol (SCTP).</t>
              <t>DTLS over SCTP provides communications privacy for applications that use SCTP as their transport protocol and allows client/server applications to communicate in a way that is designed to prevent eavesdropping and detect tampering or message forgery.</t>
              <t>Applications using DTLS over SCTP can use almost all transport features provided by SCTP and its extensions.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6083"/>
          <seriesInfo name="DOI" value="10.17487/RFC6083"/>
        </reference>
        <reference anchor="RFC6125" target="https://www.rfc-editor.org/info/rfc6125" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.6125.xml">
          <front>
            <title>Representation and Verification of Domain-Based Application Service Identity within Internet Public Key Infrastructure Using X.509 (PKIX) Certificates in the Context of Transport Layer Security (TLS)</title>
            <author initials="P." surname="Saint-Andre" fullname="P. Saint-Andre">
              <organization/>
            </author>
            <author initials="J." surname="Hodges" fullname="J. Hodges">
              <organization/>
            </author>
            <date year="2011" month="March"/>
            <abstract>
              <t>Many application technologies enable secure communication between two entities by means of Internet Public Key Infrastructure Using X.509 (PKIX) certificates in the context of Transport Layer Security (TLS). This document specifies procedures for representing and verifying the identity of application services in such interactions.   [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6125"/>
          <seriesInfo name="DOI" value="10.17487/RFC6125"/>
        </reference>
        <reference anchor="RFC6458" target="https://www.rfc-editor.org/info/rfc6458" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.6458.xml">
          <front>
            <title>Sockets API Extensions for the Stream Control Transmission Protocol (SCTP)</title>
            <author initials="R." surname="Stewart" fullname="R. Stewart">
              <organization/>
            </author>
            <author initials="M." surname="Tuexen" fullname="M. Tuexen">
              <organization/>
            </author>
            <author initials="K." surname="Poon" fullname="K. Poon">
              <organization/>
            </author>
            <author initials="P." surname="Lei" fullname="P. Lei">
              <organization/>
            </author>
            <author initials="V." surname="Yasevich" fullname="V. Yasevich">
              <organization/>
            </author>
            <date year="2011" month="December"/>
            <abstract>
              <t>This document describes a mapping of the Stream Control Transmission Protocol (SCTP) into a sockets API.  The benefits of this mapping include compatibility for TCP applications, access to new SCTP features, and a consolidated error and event notification scheme. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6458"/>
          <seriesInfo name="DOI" value="10.17487/RFC6458"/>
        </reference>
        <reference anchor="RFC6973" target="https://www.rfc-editor.org/info/rfc6973" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.6973.xml">
          <front>
            <title>Privacy Considerations for Internet Protocols</title>
            <author initials="A." surname="Cooper" fullname="A. Cooper">
              <organization/>
            </author>
            <author initials="H." surname="Tschofenig" fullname="H. Tschofenig">
              <organization/>
            </author>
            <author initials="B." surname="Aboba" fullname="B. Aboba">
              <organization/>
            </author>
            <author initials="J." surname="Peterson" fullname="J. Peterson">
              <organization/>
            </author>
            <author initials="J." surname="Morris" fullname="J. Morris">
              <organization/>
            </author>
            <author initials="M." surname="Hansen" fullname="M. Hansen">
              <organization/>
            </author>
            <author initials="R." surname="Smith" fullname="R. Smith">
              <organization/>
            </author>
            <date year="2013" month="July"/>
            <abstract>
              <t>This document offers guidance for developing privacy considerations for inclusion in protocol specifications.  It aims to make designers, implementers, and users of Internet protocols aware of privacy-related design choices.  It suggests that whether any individual RFC warrants a specific privacy considerations section will depend on the document's content.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6973"/>
          <seriesInfo name="DOI" value="10.17487/RFC6973"/>
        </reference>
        <reference anchor="RFC7258" target="https://www.rfc-editor.org/info/rfc7258" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7258.xml">
          <front>
            <title>Pervasive Monitoring Is an Attack</title>
            <author initials="S." surname="Farrell" fullname="S. Farrell">
              <organization/>
            </author>
            <author initials="H." surname="Tschofenig" fullname="H. Tschofenig">
              <organization/>
            </author>
            <date year="2014" month="May"/>
            <abstract>
              <t>Pervasive monitoring is a technical attack that should be mitigated in the design of IETF protocols, where possible.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="188"/>
          <seriesInfo name="RFC" value="7258"/>
          <seriesInfo name="DOI" value="10.17487/RFC7258"/>
        </reference>
        <reference anchor="RFC7457" target="https://www.rfc-editor.org/info/rfc7457" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7457.xml">
          <front>
            <title>Summarizing Known Attacks on Transport Layer Security (TLS) and Datagram TLS (DTLS)</title>
            <author initials="Y." surname="Sheffer" fullname="Y. Sheffer">
              <organization/>
            </author>
            <author initials="R." surname="Holz" fullname="R. Holz">
              <organization/>
            </author>
            <author initials="P." surname="Saint-Andre" fullname="P. Saint-Andre">
              <organization/>
            </author>
            <date year="2015" month="February"/>
            <abstract>
              <t>Over the last few years, there have been several serious attacks on Transport Layer Security (TLS), including attacks on its most commonly used ciphers and modes of operation.  This document summarizes these attacks, with the goal of motivating generic and protocol-specific recommendations on the usage of TLS and Datagram TLS (DTLS).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7457"/>
          <seriesInfo name="DOI" value="10.17487/RFC7457"/>
        </reference>
        <reference anchor="RFC7525" target="https://www.rfc-editor.org/info/rfc7525" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7525.xml">
          <front>
            <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author initials="Y." surname="Sheffer" fullname="Y. Sheffer">
              <organization/>
            </author>
            <author initials="R." surname="Holz" fullname="R. Holz">
              <organization/>
            </author>
            <author initials="P." surname="Saint-Andre" fullname="P. Saint-Andre">
              <organization/>
            </author>
            <date year="2015" month="May"/>
            <abstract>
              <t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are widely used to protect data exchanged over application protocols such as HTTP, SMTP, IMAP, POP, SIP, and XMPP.  Over the last few years, several serious attacks on TLS have emerged, including attacks on its most commonly used cipher suites and their modes of operation.  This document provides recommendations for improving the security of deployed services that use TLS and DTLS. The recommendations are applicable to the majority of use cases.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="195"/>
          <seriesInfo name="RFC" value="7525"/>
          <seriesInfo name="DOI" value="10.17487/RFC7525"/>
        </reference>
        <reference anchor="RFC7624" target="https://www.rfc-editor.org/info/rfc7624" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7624.xml">
          <front>
            <title>Confidentiality in the Face of Pervasive Surveillance: A Threat Model and Problem Statement</title>
            <author initials="R." surname="Barnes" fullname="R. Barnes">
              <organization/>
            </author>
            <author initials="B." surname="Schneier" fullname="B. Schneier">
              <organization/>
            </author>
            <author initials="C." surname="Jennings" fullname="C. Jennings">
              <organization/>
            </author>
            <author initials="T." surname="Hardie" fullname="T. Hardie">
              <organization/>
            </author>
            <author initials="B." surname="Trammell" fullname="B. Trammell">
              <organization/>
            </author>
            <author initials="C." surname="Huitema" fullname="C. Huitema">
              <organization/>
            </author>
            <author initials="D." surname="Borkmann" fullname="D. Borkmann">
              <organization/>
            </author>
            <date year="2015" month="August"/>
            <abstract>
              <t>Since the initial revelations of pervasive surveillance in 2013, several classes of attacks on Internet communications have been discovered.  In this document, we develop a threat model that describes these attacks on Internet confidentiality.  We assume an attacker that is interested in undetected, indiscriminate eavesdropping.  The threat model is based on published, verified attacks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7624"/>
          <seriesInfo name="DOI" value="10.17487/RFC7624"/>
        </reference>
        <reference anchor="ANSSI-DAT-NT-003" target="&lt;https://www.ssi.gouv.fr/uploads/2015/09/NT_IPsec_EN.pdf&gt;">
          <front>
            <title>Recommendations for securing networks with IPsec</title>
            <author initials="" surname="Agence nationale de la sécurité des systèmes d'information">
              <organization/>
            </author>
            <date year="2015" month="August"/>
          </front>
          <seriesInfo name="ANSSI Technical Report DAT-NT-003" value=""/>
        </reference>
        <reference anchor="TRISHAKE" target="https://hal.inria.fr/hal-01102259/file/triple-handshakes-and-cookie-cutters-oakland14.pdf">
          <front>
            <title>Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS</title>
            <author initials="K." surname="Bhargavan" fullname="Karthikeyan Bhargavan">
              <organization/>
            </author>
            <author initials="A." surname="Delignat-Lavaud" fullname="Antoine Delignat-Lavaud">
              <organization/>
            </author>
            <author initials="C." surname="Fournet" fullname="Cédric Fournet">
              <organization/>
            </author>
            <author initials="A." surname="Pironti" fullname="Alfredo Pironti">
              <organization/>
            </author>
            <author initials="P." surname="Strub" fullname="Pierre-Yves Strub">
              <organization/>
            </author>
            <date year="2016" month="April"/>
          </front>
          <seriesInfo name="IEEE Symposium on Security &amp; Privacy" value=""/>
        </reference>
      </references>
    </references>
    <section anchor="motivation-for-changes">
      <name>Motivation for Changes</name>
      <t>This document proposes a number of changes to RFC 6083 that have
various different motivations:</t>
      <t>Supporting Large User Messages: RFC 6083 allowed only user messages
   that could fit within a single DTLS record. 3GPP has run into this
   limitation where they have at least four SCTP using protocols (F1,
   E1, Xn, NG-C) that can potentially generate messages over the size
   of 16384 bytes.</t>
      <t>New Versions: Almost 10 years has passed since RFC 6083 was written,
   and significant evolution has happened in the area of DTLS and
   security algorithms. Thus, DTLS 1.3 is the newest version of DTLS
   and also the SHA-1 HMAC algorithm of RFC 4895 is getting towards
   the end of usefulness. Use of DTLS 1.3 with long lived associations
   require parallel DTLS connections. Thus, this document mandates usage of
   relevant versions and algorithms.</t>
      <t>Allowing DTLS Messages on any stream: RFC6083 requires DTLS messages
   that are not user message data to be sent on stream 0 and that this
   stream is used with in-order delivery. That can actually limit the
   applications that can use DTLS/SCTP. In addition with DTLS 1.3
   encrypting the actual message type it is anyway not available.
   Therefore a more flexible rule set is used that relies on DTLS
   handling reordering.</t>
      <t>Clarifications: Some implementation experiences have been gained that
   motivates additional clarifications on the specification.</t>
      <ul spacing="normal">
        <li>Avoid unsecured messages prior to DTLS handshake have completed.</li>
        <li>Make clear that all messages are encrypted after DTLS handshake.</li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
