<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.21 (Ruby 3.3.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-uta-require-tls13-04" category="bcp" consensus="true" submissionType="IETF" updates="9325" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.25.0 -->
  <front>
    <title abbrev="require-tls1.3">New Protocols Must Require TLS 1.3</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-uta-require-tls13-04"/>
    <author fullname="Rich Salz">
      <organization>Akamai Technologies</organization>
      <address>
        <email>rsalz@akamai.com</email>
      </address>
    </author>
    <author fullname="Nimrod Aviram">
      <organization/>
      <address>
        <email>nimrod.aviram@gmail.com</email>
      </address>
    </author>
    <date year="2024" month="December" day="30"/>
    <area>Security</area>
    <workgroup>Using TLS in Applications</workgroup>
    <keyword>TLS</keyword>
    <keyword>features</keyword>
    <abstract>
      <?line 150?>

<t>TLS 1.2 is in use and can be configured such that it provides good security
properties. TLS 1.3 use is increasing, and fixes some known deficiencies
with TLS
1.2, such as removing error-prone cryptographic primitives and encrypting
more of the traffic so that it is not readable by outsiders.
For these reasons, new protocols must require and
assume the existence of TLS 1.3.
This prescription does not pertain to DTLS (in any DTLS version); it pertains to
TLS only.</t>
      <t>This document updates RFC9325.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-uta-require-tls13/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Using TLS in Applications Working Group mailing list (<eref target="mailto:uta@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/uta/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/uta/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/richsalz/draft-use-tls13"/>.</t>
    </note>
  </front>
  <middle>
    <?line 164?>

<section anchor="sec-reasons">
      <name>Introduction</name>
      <t>TLS 1.2 <xref target="TLS12"/> is in use and can be configured such that
it provides good
security properties. However, this protocol version suffers from several
deficiencies:</t>
      <ol spacing="normal" type="1"><li>
          <t>While application layer traffic is always encrypted, most of the handshake
messages are not. Therefore, the privacy provided is suboptimal.
This is a protocol issue that cannot be addressed by configuration.</t>
        </li>
        <li>
          <t>The list of cryptographic primitives specified for the protocol, both in-use
primitives and deprecated ones, includes several primitives that have
been a source for
vulnerabilities throughout the years, such as RSA key exchange, CBC cipher suites,
and problematic finite-field Diffie-Hellman group negotiation.
These issues could be addressed through proper configuration; however,
experience shows that configuration mistakes are common, especially when
deploying cryptography.
See <xref target="sec-considerations"/> for elaboration.</t>
        </li>
        <li>
          <t>The base protocol does not provide security against some
types of attacks (see <xref target="sec-considerations"/>);
extensions are required to provide
security.</t>
        </li>
      </ol>
      <t>TLS 1.3 <xref target="TLS13"/> is also in
widespread use and fixes most known deficiencies with TLS 1.2, such as
encrypting more of the traffic so that it is not readable by outsiders and
removing most cryptographic primitives considered dangerous. Importantly, TLS
1.3 enjoys robust security proofs and provides excellent security without
any additional configuration.</t>
      <t>This document specifies that, since TLS 1.3 use is widespread, new protocols
must require and assume its existence.
It updates <xref target="RFC9325"/> as described in <xref target="rfc9325-updates"/>.
This prescription does not pertain to DTLS (in any DTLS version); it pertains to
TLS only.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="implications-for-post-quantum-cryptography">
      <name>Implications for post-quantum cryptography</name>
      <t>Cryptographically-relevant
quantum computers, once available, will have a huge impact on TLS traffic.
In 2016, the US National Institute of Standards and Technology (NIST) started a
multi-year effort to standardize algorithms that will be "safe"
once quantum computers are feasible <xref target="PQC"/>. The first IETF discussions happened
around the same time <xref target="CFRGSLIDES"/>.</t>
      <t>In 2024 NIST released standards for <xref target="ML-KEM"/>, <xref target="ML-DSA"/>, and <xref target="SLH-DSA"/>.
While industry was waiting for NIST to finish standardization, the
IETF has had several efforts underway.
A working group was formed in early 2023 to work on operational and
transitional uses of PQC in IETF protocols,
<xref target="PQUIPWG"/>.
Several other working groups, including LAMPS <xref target="LAMPSWG"/>, TLS <xref target="TLSWG"/>,
and IPSECME <xref target="IPSECMEWG"/>, are working on
drafts to support hybrid algorithms and identifiers, for use during a
transition from classic to a post-quantum world.</t>
      <t>For TLS it is important to note that the focus of these efforts is TLS 1.3
or later, and that TLS 1.2 will not be supported (see <xref target="TLS12FROZEN"/>).
This is one more reason for new protocols to default to TLS 1.3, where
post-quantum cryptography is expected to be supported.</t>
    </section>
    <section anchor="tls-use-by-other-protocols-and-applications">
      <name>TLS Use by Other Protocols and Applications</name>
      <t>Any new protocol that uses TLS <bcp14>MUST</bcp14> specify as its default TLS 1.3.
For example, QUIC <xref target="QUICTLS"/> requires TLS 1.3 and specifies that endpoints
<bcp14>MUST</bcp14> terminate the connection if an older version is used.</t>
      <t>If deployment considerations are a concern, the protocol <bcp14>MAY</bcp14> specify TLS 1.2 as
an additional, non-default option.
As a counter example, the Usage Profile for DNS over TLS <xref target="DNSTLS"/> specifies
TLS 1.2 as the default, while also allowing TLS 1.3.
For newer specifications that choose to support TLS 1.2, those preferences are
to be reversed.</t>
      <t>The initial TLS handshake allows a client to specify which versions of
the TLS protocol it supports and the server is intended to pick the highest
version that it also supports.
This is known as the "TLS version negotiation," and
many TLS libraries provide a way for applications to specify the range
of versions.
When the API allows it, clients <bcp14>SHOULD</bcp14> specify just the minimum version they
want.
This <bcp14>MUST</bcp14> be TLS 1.3 or TLS 1.2, depending on the circumstances described
in the above paragraphs.</t>
    </section>
    <section anchor="rfc9325-updates">
      <name>Changes to RFC 9325</name>
      <t>RFC 9325 provides recommendations for ensuring the security of deployed
services that use TLS and, unlike this document, DTLS as well.
At this time it was published, it described availability of TLS 1.3
as "widely available." The transition and adoption mentioned in that
documnent has grown, and this document now makes two small changes
to the recommendations in <xref section="3.1.1" sectionFormat="comma" target="RFC9325"/>:</t>
      <ul spacing="normal">
        <li>
          <t>That section says that TLS 1.3 <bcp14>SHOULD</bcp14> be supported; this document says
that for new protocols it <bcp14>MUST</bcp14> be supported.</t>
        </li>
        <li>
          <t>That section says that TLS 1.2 <bcp14>MUST</bcp14> be supported; this document says that
it <bcp14>MAY</bcp14> be supported as described above.</t>
        </li>
      </ul>
      <t>Again, these changes only apply to TLS, and not DTLS.</t>
    </section>
    <section anchor="sec-considerations">
      <name>Security Considerations</name>
      <t>TLS 1.2 was specified with several cryptographic primitives and design choices
that have, over time, weakened its security. The purpose of this section is to
briefly survey several such prominent problems that have affected the protocol.
It should be noted, however, that TLS 1.2 can be configured securely; it is
merely much more difficult to configure it securely as opposed to using its
modern successor, TLS 1.3. See <xref target="RFC9325"/> for a more thorough guide on the
secure deployment of TLS 1.2.</t>
      <t>Firstly, the TLS 1.2 protocol, without any extension points, is vulnerable to
renegotiation attacks (see <xref target="RENEG1"/> and <xref target="RENEG2"/>)  and the
Triple Handshake attack (see <xref target="TRIPLESHAKE"/>).
Broadly, these attacks
exploit the protocol's support for renegotiation in order to inject a prefix
chosen by the attacker into the plaintext stream. This is usually a devastating
threat in practice, that allows e.g. obtaining secret cookies in a web setting.
In light of
the above problems, <xref target="RFC5746"/> specifies an extension that prevents this
category of attacks. To securely deploy TLS 1.2, either renegotiation must be
disabled entirely, or this extension must be used. Additionally, clients must
not allow servers to renegotiate the certificate during a connection.</t>
      <t>Secondly, the original key exchange methods specified for the protocol, namely
RSA key exchange and finite field Diffie-Hellman, suffer from several
weaknesses. Similarly, to securely deploy the protocol, these key exchange
methods must be disabled.
See <xref target="I-D.draft-ietf-tls-deprecate-obsolete-kex"/> for details.</t>
      <t>Thirdly, symmetric ciphers which were widely-used in the protocol, namely RC4
and CBC cipher suites, suffer from several weaknesses. RC4 suffers from
exploitable biases in its key stream; see <xref target="RFC7465"/>. CBC cipher suites have
been a source of vulnerabilities throughout the years. A straightforward
implementation of these cipher suites inherently suffers from the Lucky13 timing
attack <xref target="LUCKY13"/>. The first attempt to implement the cipher suites in
constant time introduced an even more severe vulnerability <xref target="LUCKY13FIX"/>.
There have been further similar vulnerabilities throughout the
years exploiting CBC cipher suites; refer to e.g. <xref target="CBCSCANNING"/>
for an example and a survey of similar works.</t>
      <t>And lastly, historically the protocol was affected by several other attacks that
TLS 1.3 is immune to:
BEAST <xref target="BEAST"/>, Logjam <xref target="WEAKDH"/>, FREAK <xref target="FREAK"/>, and SLOTH <xref target="SLOTH"/>.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>This document makes no requests to IANA.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="TLS12">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="TLS13">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Independent</organization>
            </author>
            <date day="14" month="September" year="2024"/>
            <abstract>
              <t>   This document specifies version 1.3 of the Transport Layer Security
   (TLS) protocol.  TLS allows client/server applications to communicate
   over the Internet in a way that is designed to prevent eavesdropping,
   tampering, and message forgery.

   This document updates RFCs 5705, 6066, 7627, and 8422 and obsoletes
   RFCs 5077, 5246, 6961, 8422, and 8446.  This document also specifies
   new requirements for TLS 1.2 implementations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8446bis-11"/>
        </reference>
        <reference anchor="TLS12FROZEN">
          <front>
            <title>TLS 1.2 is in Feature Freeze</title>
            <author fullname="Rich Salz" initials="R." surname="Salz">
              <organization>Akamai Technologies</organization>
            </author>
            <author fullname="Nimrod Aviram" initials="N." surname="Aviram">
         </author>
            <date day="20" month="December" year="2024"/>
            <abstract>
              <t>   Use of TLS 1.3 is growing and fixes some known deficiencies in TLS
   1.2.  This document specifies that outside of urgent security fixes,
   new TLS Exporter Labels, or new Application-Layer Protocol
   Negotiation (ALPN) Protocol IDs, no changes will be approved for TLS
   1.2.  This prescription does not pertain to DTLS (in any DTLS
   version); it pertains to TLS only.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-tls12-frozen-05"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC9325">
          <front>
            <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="November" year="2022"/>
            <abstract>
              <t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are used to protect data exchanged over a wide range of application protocols and can also form the basis for secure transport protocols. Over the years, the industry has witnessed several serious attacks on TLS and DTLS, including attacks on the most commonly used cipher suites and their modes of operation. This document provides the latest recommendations for ensuring the security of deployed services that use TLS and DTLS. These recommendations are applicable to the majority of use cases.</t>
              <t>RFC 7525, an earlier version of the TLS recommendations, was published when the industry was transitioning to TLS 1.2. Years later, this transition is largely complete, and TLS 1.3 is widely available. This document updates the guidance given the new environment and obsoletes RFC 7525. In addition, this document updates RFCs 5288 and 6066 in view of recent attacks.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="195"/>
          <seriesInfo name="RFC" value="9325"/>
          <seriesInfo name="DOI" value="10.17487/RFC9325"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="ML-KEM" target="https://csrc.nist.gov/pubs/fips/203/final">
          <front>
            <title>Module-Lattice-Based Key-Encapsulation Mechanism Standard</title>
            <author>
              <organization/>
            </author>
            <date year="2024" month="August"/>
          </front>
        </reference>
        <reference anchor="ML-DSA" target="https://csrc.nist.gov/pubs/fips/204/final">
          <front>
            <title>Module-Lattice-Based Key Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date year="2024" month="August"/>
          </front>
        </reference>
        <reference anchor="SLH-DSA" target="https://csrc.nist.gov/pubs/fips/205/final">
          <front>
            <title>Stateless Hash-Based Key-Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date year="2024" month="August"/>
          </front>
        </reference>
        <reference anchor="QUICTLS">
          <front>
            <title>Using TLS to Secure QUIC</title>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <author fullname="S. Turner" initials="S." role="editor" surname="Turner"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document describes how Transport Layer Security (TLS) is used to secure QUIC.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9001"/>
          <seriesInfo name="DOI" value="10.17487/RFC9001"/>
        </reference>
        <reference anchor="DNSTLS">
          <front>
            <title>Usage Profiles for DNS over TLS and DNS over DTLS</title>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
            <author fullname="D. Gillmor" initials="D." surname="Gillmor"/>
            <author fullname="T. Reddy" initials="T." surname="Reddy"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document discusses usage profiles, based on one or more authentication mechanisms, which can be used for DNS over Transport Layer Security (TLS) or Datagram TLS (DTLS). These profiles can increase the privacy of DNS transactions compared to using only cleartext DNS. This document also specifies new authentication mechanisms -- it describes several ways that a DNS client can use an authentication domain name to authenticate a (D)TLS connection to a DNS server. Additionally, it defines (D)TLS protocol profiles for DNS clients and servers implementing DNS over (D)TLS. This document updates RFC 7858.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8310"/>
          <seriesInfo name="DOI" value="10.17487/RFC8310"/>
        </reference>
        <reference anchor="PQC" target="https://csrc.nist.gov/projects/post-quantum-cryptography">
          <front>
            <title>Post=Quantum Cryptography</title>
            <author>
              <organization/>
            </author>
            <date year="2017" month="January"/>
          </front>
        </reference>
        <reference anchor="CFRGSLIDES" target="https://www.ietf.org/proceedings/95/slides/slides-95-cfrg-4.pdf">
          <front>
            <title>Post Quantum Secure Cryptography Discussion</title>
            <author initials="D." surname="McGrew" fullname="David McGrew">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="PQUIPWG" target="https://datatracker.ietf.org/wg/pquip/about/">
          <front>
            <title>Post-Quantum Use in Protocols</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IPSECMEWG" target="https://datatracker.ietf.org/wg/ipsecme/about/">
          <front>
            <title>IP Security Maintenance and Extensions</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="LAMPSWG" target="https://datatracker.ietf.org/wg/lamps/about/">
          <front>
            <title>Limited Additional Mechanisms for PXIK and SMIME</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="TLSWG" target="https://datatracker.ietf.org/wg/tls/about/">
          <front>
            <title>Transport Layer Security</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="TRIPLESHAKE" target="https://mitls.org/pages/attacks/3SHAKE">
          <front>
            <title>Triple Handshakes Considered Harmful Breaking and Fixing Authentication over TLS</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RENEG1" target="https://web.archive.org/web/20091231034700/http://www.educatedguesswork.org/2009/11/understanding_the_tls_renegoti.html">
          <front>
            <title>Understanding the TLS Renegotiation Attack</title>
            <author initials="E." surname="Rescorla" fullname="Eric Rescorla">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RENEG2" target="https://web.archive.org/web/20091228061844/http://extendedsubset.com/?p=8">
          <front>
            <title>Authentication Gap in TLS Renegotiation</title>
            <author initials="M." surname="Ray" fullname="Marsh Ray">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="LUCKY13" target="http://www.isg.rhul.ac.uk/tls/TLStiming.pdf">
          <front>
            <title>Lucky Thirteen: Breaking the TLS and DTLS record protocols</title>
            <author initials="N. J." surname="Al Fardan">
              <organization/>
            </author>
            <author initials="K. G." surname="Paterson">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="LUCKY13FIX" target="https://nds.rub.de/media/nds/veroeffentlichungen/2016/10/19/tls-attacker-ccs16.pdf">
          <front>
            <title>Systematic fuzzing and testing of TLS libraries</title>
            <author initials="J." surname="Somorovsky" fullname="Juraj Somorovsky">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="CBCSCANNING" target="https://www.usenix.org/system/files/sec19-merget.pdf">
          <front>
            <title>Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities</title>
            <author initials="R." surname="Merget" fullname="Robert Merget">
              <organization/>
            </author>
            <author initials="J." surname="Somorovsky" fullname="Juraj Somorovsky">
              <organization/>
            </author>
            <author initials="N." surname="Aviram" fullname="Nimrod Aviram">
              <organization/>
            </author>
            <author initials="C." surname="Young" fullname="Craig Young">
              <organization/>
            </author>
            <author initials="J." surname="Fliegenschmidt" fullname="Janis Fliegenschmidt">
              <organization/>
            </author>
            <author initials="J." surname="Schwenk" fullname="JÃ¶rg Schwenk">
              <organization/>
            </author>
            <author initials="Y." surname="Shavitt" fullname="Yuval Shavitt">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="BEAST" target="http://www.hpcc.ecs.soton.ac.uk/dan/talks/bullrun/Beast.pdf">
          <front>
            <title>Here come the xor ninjas</title>
            <author initials="T." surname="Duong" fullname="Thai Duong">
              <organization/>
            </author>
            <author initials="J." surname="Rizzo" fullname="Juliano Rizzo">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="WEAKDH" target="https://dl.acm.org/doi/pdf/10.1145/2810103.2813707">
          <front>
            <title>Imperfect forward secrecy: How Diffie-Hellman fails in practice</title>
            <author initials="D." surname="Adrian">
              <organization/>
            </author>
            <author initials="K." surname="Bhargavan">
              <organization/>
            </author>
            <author initials="Z." surname="Durumeric">
              <organization/>
            </author>
            <author initials="P." surname="Gaudry">
              <organization/>
            </author>
            <author initials="M." surname="Green">
              <organization/>
            </author>
            <author initials="J. A." surname="Halderman">
              <organization/>
            </author>
            <author initials="N." surname="Heninger">
              <organization/>
            </author>
            <author initials="D." surname="Springall">
              <organization/>
            </author>
            <author initials="E." surname="ThomÃ©">
              <organization/>
            </author>
            <author initials="L." surname="Valenta">
              <organization/>
            </author>
            <author initials="B." surname="VanderSloot">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="FREAK" target="https://inria.hal.science/hal-01114250/file/messy-state-of-the-union-oakland15.pdf">
          <front>
            <title>A messy state of the union: Taming the composite state machines of TLS</title>
            <author initials="B." surname="Beurdouche" fullname="Benjamin Beurdouche">
              <organization/>
            </author>
            <author initials="K." surname="Bhargavan" fullname="Karthikeyan Bhargavan">
              <organization/>
            </author>
            <author initials="A." surname="Delignat-Lavaud" fullname="Antoine Delignat-Lavaud">
              <organization/>
            </author>
            <author initials="C." surname="Fournet" fullname="CÃ©dric Fournet">
              <organization/>
            </author>
            <author initials="M." surname="Kohlweiss" fullname="Markulf Kohlweiss">
              <organization/>
            </author>
            <author initials="A." surname="Pironti" fullname="Alfredo Pironti">
              <organization/>
            </author>
            <author initials="P.-Y." surname="Strub" fullname="Pierre-Yves Strub">
              <organization/>
            </author>
            <author initials="J. K." surname="Zinzindohoue" fullname="Jean Karim Zinzindohoue">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="SLOTH" target="https://inria.hal.science/hal-01244855/file/SLOTH_NDSS16.pdf">
          <front>
            <title>Transcript collision attacks: Breaking authentication in TLS, IKE, and SSH</title>
            <author initials="K." surname="Bhargavan" fullname="Karthikeyan Bhargavan">
              <organization/>
            </author>
            <author initials="G." surname="Leurent" fullname="GaÃ«tan Leurent">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC5746">
          <front>
            <title>Transport Layer Security (TLS) Renegotiation Indication Extension</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="M. Ray" initials="M." surname="Ray"/>
            <author fullname="S. Dispensa" initials="S." surname="Dispensa"/>
            <author fullname="N. Oskov" initials="N." surname="Oskov"/>
            <date month="February" year="2010"/>
            <abstract>
              <t>Secure Socket Layer (SSL) and Transport Layer Security (TLS) renegotiation are vulnerable to an attack in which the attacker forms a TLS connection with the target server, injects content of his choice, and then splices in a new TLS connection from a client. The server treats the client's initial TLS handshake as a renegotiation and thus believes that the initial data transmitted by the attacker is from the same entity as the subsequent client data. This specification defines a TLS extension to cryptographically tie renegotiations to the TLS connections they are being performed over, thus preventing this attack. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5746"/>
          <seriesInfo name="DOI" value="10.17487/RFC5746"/>
        </reference>
        <reference anchor="I-D.draft-ietf-tls-deprecate-obsolete-kex">
          <front>
            <title>Deprecating Obsolete Key Exchange Methods in TLS 1.2</title>
            <author fullname="Carrick Bartle" initials="C." surname="Bartle">
              <organization>Roblox</organization>
            </author>
            <author fullname="Nimrod Aviram" initials="N." surname="Aviram">
         </author>
            <date day="3" month="September" year="2024"/>
            <abstract>
              <t>   This document deprecates the use of RSA key exchange and Diffie
   Hellman over a finite field in TLS 1.2, and discourages the use of
   static elliptic curve Diffie Hellman cipher suites.

   Note that these prescriptions apply only to TLS 1.2 since TLS 1.0 and
   1.1 are deprecated by RFC 8996 and TLS 1.3 either does not use the
   affected algorithm or does not share the relevant configuration
   options.

   This document updates RFCs 9325, 4346, 5246, 4162, 6347, 5932, 5288,
   6209, 6367, 8422, 5289, 5469, 4785, 4279, 5487, 6655, and 7905.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-deprecate-obsolete-kex-05"/>
        </reference>
        <reference anchor="RFC7465">
          <front>
            <title>Prohibiting RC4 Cipher Suites</title>
            <author fullname="A. Popov" initials="A." surname="Popov"/>
            <date month="February" year="2015"/>
            <abstract>
              <t>This document requires that Transport Layer Security (TLS) clients and servers never negotiate the use of RC4 cipher suites when they establish connections. This applies to all TLS versions. This document updates RFCs 5246, 4346, and 2246.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7465"/>
          <seriesInfo name="DOI" value="10.17487/RFC7465"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
