<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.5.25 (Ruby 2.6.3) -->
<?rfc rfcedstyle="yes"?>
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc text-list-symbols="o-*+"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-uta-rfc7525bis-06" category="bcp" obsoletes="7525" updates="5288, 6066" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.9.1 -->
  <front>
    <title abbrev="TLS Recommendations">Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-uta-rfc7525bis-06"/>
    <author initials="Y." surname="Sheffer" fullname="Yaron Sheffer">
      <organization>Intuit</organization>
      <address>
        <email>yaronf.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="P." surname="Saint-Andre" fullname="Peter Saint-Andre">
      <organization>independent</organization>
      <address>
        <email>stpeter@stpeter.im</email>
      </address>
    </author>
    <author initials="T." surname="Fossati" fullname="Thomas Fossati">
      <organization>arm</organization>
      <address>
        <email>thomas.fossati@arm.com</email>
      </address>
    </author>
    <date year="2022" month="March" day="24"/>
    <area>Applications</area>
    <workgroup>UTA Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are widely used to protect data exchanged over application protocols such as HTTP, SMTP, IMAP, POP, SIP, and XMPP.  Over the years, the industry has witnessed several serious attacks on TLS and DTLS, including attacks on the most commonly used cipher suites and their modes of operation.  This document provides recommendations for improving the security of deployed services that use TLS and DTLS. The recommendations are applicable to the majority of use cases.</t>
      <t>An earlier version of this document was published as RFC 7525 when the industry was in the midst of its transition to TLS 1.2. Years later this transition is largely complete and TLS 1.3 is widely available. This document updates the guidance, given the new environment. In addition, the document updates RFC 5288 and RFC 6066 in view of recent attacks.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>Transport Layer Security (TLS) and Datagram Transport Security Layer (DTLS) are widely used to protect data exchanged over application protocols such as HTTP, SMTP, IMAP, POP, SIP, and XMPP.  Over the years leading to 2015, the industry has witnessed serious attacks on TLS and DTLS, including attacks on the most commonly used cipher suites and their modes of operation.  For instance, both the AES-CBC <xref target="RFC3602"/> and RC4 <xref target="RFC7465"/> encryption algorithms, which together were once the most widely deployed ciphers, have been attacked in the context of TLS.  A companion document <xref target="RFC7457"/> provides detailed information about these attacks and will help the reader understand the rationale behind the recommendations provided here. That document has not been updated in concert with this one; instead, newer attacks are described in this document, as are mitigations for those attacks.</t>
      <t>The TLS community reacted to these attacks in several ways:</t>
      <ul spacing="normal">
        <li>Detailed guidance was published on the use of TLS 1.2 <xref target="RFC5246"/> and DTLS 1.2 <xref target="RFC6347"/>, along with earlier protocol versions. This guidance is included in the original <xref target="RFC7525"/> and mostly retained in this revised version; note that this guidance was mostly adopted by the industry since the publication of RFC 7525 in 2015.</li>
        <li>Versions of TLS earlier than 1.2 were deprecated <xref target="RFC8996"/>.</li>
        <li>Version 1.3 of TLS <xref target="RFC8446"/> was released and version 1.3 of DTLS was finalized <xref target="I-D.ietf-tls-dtls13"/>; these versions largely mitigate or resolve the described attacks.</li>
      </ul>
      <t>Those who implement and deploy TLS and DTLS, in particular versions 1.2 or earlier of these protocols, need guidance on how TLS can be used securely.  This document provides guidance for deployed services as well as for software implementations, assuming the implementer expects his or her code to be deployed in environments defined in <xref target="applicability"/>. Concerning deployment, this document targets a wide audience -- namely, all deployers who wish to add authentication (be it one-way only or mutual), confidentiality, and data integrity protection to their communications.</t>
      <t>The recommendations herein take into consideration the security of various mechanisms, their technical maturity and interoperability, and their prevalence in implementations at the time of writing.  Unless it is explicitly called out that a recommendation applies to TLS alone or to DTLS alone, each recommendation applies to both TLS and DTLS.</t>
      <t>This document attempts to minimize new guidance to TLS 1.2 implementations, and the overall approach is to encourage systems to move to TLS 1.3. However this is not always practical. Newly discovered attacks, as well as ecosystem changes, necessitated some new requirements that apply to TLS 1.2 environments. Those are summarized in <xref target="diff-rfc"/>.</t>
      <t>As noted, the TLS 1.3 specification resolves many of the vulnerabilities listed in this document. A system that deploys TLS 1.3 should have fewer vulnerabilities than TLS 1.2 or below. This document is being republished with this in mind, and with an explicit goal to migrate most uses of TLS 1.2 into TLS 1.3.</t>
      <t>These are minimum recommendations for the use of TLS in the vast majority of implementation and deployment scenarios, with the exception of unauthenticated TLS (see <xref target="applicability"/>). Other specifications that reference this document can have stricter requirements related to one or more aspects of the protocol, based on their particular circumstances (e.g., for use with a particular application protocol); when that is the case, implementers are advised to adhere to those stricter requirements. Furthermore, this document provides a floor, not a ceiling, so stronger options are always allowed (e.g., depending on differing evaluations of the importance of cryptographic strength vs. computational load).</t>
      <t>Community knowledge about the strength of various algorithms and feasible attacks can change quickly, and experience shows that a Best Current Practice (BCP) document about security is a point-in-time statement.  Readers are advised to seek out any errata or updates that apply to this document.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>A number of security-related terms in this document are used in the sense defined in <xref target="RFC4949"/>.</t>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP&nbsp;14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="rec">
      <name>General Recommendations</name>
      <t>This section provides general recommendations on the secure use of TLS. Recommendations related to cipher suites are discussed in the following section.</t>
      <section anchor="protocol-versions">
        <name>Protocol Versions</name>
        <section anchor="rec-versions">
          <name>SSL/TLS Protocol Versions</name>
          <t>It is important both to stop using old, less secure versions of SSL/TLS and to start using modern, more secure versions; therefore, the following are the recommendations concerning TLS/SSL protocol versions:</t>
          <ul spacing="normal">
            <li>
              <t>Implementations <bcp14>MUST NOT</bcp14> negotiate SSL version 2.  </t>
              <t>
Rationale: Today, SSLv2 is considered insecure <xref target="RFC6176"/>.</t>
            </li>
            <li>
              <t>Implementations <bcp14>MUST NOT</bcp14> negotiate SSL version 3.  </t>
              <t>
Rationale: SSLv3 <xref target="RFC6101"/> was an improvement over SSLv2 and plugged some significant security holes but did not support strong cipher suites. SSLv3 does not support TLS extensions, some of which (e.g., renegotiation_info <xref target="RFC5746"/>) are security-critical.  In addition, with the emergence of the POODLE attack <xref target="POODLE"/>, SSLv3 is now widely recognized as fundamentally insecure.  See <xref target="DEP-SSLv3"/> for further details.</t>
            </li>
            <li>
              <t>Implementations <bcp14>MUST NOT</bcp14> negotiate TLS version 1.0 <xref target="RFC2246"/>.  </t>
              <t>
Rationale: TLS 1.0 (published in 1999) does not support many modern, strong cipher suites. In addition, TLS 1.0 lacks a per-record Initialization Vector (IV) for CBC-based cipher suites and does not warn against common padding errors. This and other recommendations in this section are in line with <xref target="RFC8996"/>.</t>
            </li>
            <li>
              <t>Implementations <bcp14>MUST NOT</bcp14> negotiate TLS version 1.1 <xref target="RFC4346"/>.  </t>
              <t>
Rationale: TLS 1.1 (published in 2006) is a security improvement over TLS 1.0 but still does not support certain stronger cipher suites.</t>
            </li>
            <li>
              <t>Implementations <bcp14>MUST</bcp14> support TLS 1.2 <xref target="RFC5246"/> and <bcp14>MUST</bcp14> prefer to negotiate TLS version 1.2 over earlier versions of TLS.  </t>
              <t>
Rationale: Several stronger cipher suites are available only with TLS 1.2 (published in 2008). In fact, the cipher suites recommended by this document for TLS 1.2 (<xref target="rec-cipher"/> below) are only available in this version.</t>
            </li>
            <li>
              <t>Implementations <bcp14>SHOULD</bcp14> support TLS 1.3 <xref target="RFC8446"/> and, if implemented, <bcp14>MUST</bcp14> prefer to negotiate TLS 1.3 over earlier versions of TLS.  </t>
              <t>
Rationale: TLS 1.3 is a major overhaul to the protocol and resolves many of the security issues with TLS 1.2. We note that as long as TLS 1.2 is still allowed by a particular implementation, even if it defaults to TLS 1.3, implementers <bcp14>MUST</bcp14> still follow all the recommendations in this document.</t>
            </li>
            <li>
              <t>Implementations of "greenfield" protocols or deployments, where there is no need to support legacy endpoints, <bcp14>SHOULD</bcp14> support TLS 1.3, with no negotiation of earlier versions. Similarly, we RECOMMEND that new protocol designs that embed the TLS mechanisms (such as QUIC has done <xref target="RFC9001"/>) include TLS 1.3.  </t>
              <t>
Rationale: secure deployment of TLS 1.3 is significantly easier and less error prone than the secure deployment of TLS 1.2.</t>
            </li>
          </ul>
          <t>This BCP applies to TLS 1.2, 1.3 and to earlier versions. It is not safe for readers to assume that the recommendations in this BCP apply to any future version of TLS.</t>
        </section>
        <section anchor="dtls-protocol-versions">
          <name>DTLS Protocol Versions</name>
          <t>DTLS, an adaptation of TLS for UDP datagrams, was introduced when TLS 1.1 was published.  The following are the recommendations with respect to DTLS:</t>
          <ul spacing="normal">
            <li>
              <t>Implementations <bcp14>MUST NOT</bcp14> negotiate DTLS version 1.0 <xref target="RFC4347"/>.  </t>
              <t>
Version 1.0 of DTLS correlates to version 1.1 of TLS (see above).</t>
            </li>
            <li>
              <t>Implementations <bcp14>MUST</bcp14> support DTLS 1.2 <xref target="RFC6347"/> and <bcp14>MUST</bcp14> prefer to negotiate DTLS version 1.2 over earlier versions of DTLS.  </t>
              <t>
Version 1.2 of DTLS correlates to version 1.2 of TLS (see above).
(There is no version 1.1 of DTLS.)</t>
            </li>
            <li>
              <t>Implementations <bcp14>SHOULD</bcp14> support DTLS 1.3 <xref target="I-D.ietf-tls-dtls13"/> and, if implemented, <bcp14>MUST</bcp14> prefer to negotiate DTLS version 1.3 over earlier versions of DTLS.  </t>
              <t>
Version 1.3 of DTLS correlates to version 1.3 of TLS (see above).</t>
            </li>
          </ul>
        </section>
        <section anchor="rec-fallback">
          <name>Fallback to Lower Versions</name>
          <t>TLS/DTLS 1.2 clients <bcp14>MUST NOT</bcp14> fall back to earlier TLS versions, since those versions have been deprecated <xref target="RFC8996"/>. We note that as a result of that, the SCSV mechanism <xref target="RFC7507"/> is no longer needed for clients. In addition, TLS 1.3 implements a new version negotiation mechanism.</t>
        </section>
      </section>
      <section anchor="strict-tls">
        <name>Strict TLS</name>
        <t>The following recommendations are provided to help prevent SSL Stripping (an attack that is summarized in <xref section="2.1" sectionFormat="of" target="RFC7457"/>):</t>
        <ul spacing="normal">
          <li>In cases where an application protocol allows implementations or deployments a choice between strict TLS configuration and dynamic upgrade from unencrypted to TLS-protected traffic (such as STARTTLS), clients and servers <bcp14>SHOULD</bcp14> prefer strict TLS configuration.</li>
          <li>Application protocols typically provide a way for the server to offer TLS during an initial protocol exchange, and sometimes also provide a way for the server to advertise support for TLS (e.g., through a flag indicating that TLS is required); unfortunately, these indications are sent before the communication channel is encrypted. A client <bcp14>SHOULD</bcp14> attempt to negotiate TLS even if these indications are not communicated by the server.</li>
          <li>HTTP client and server implementations <bcp14>MUST</bcp14> support the HTTP Strict Transport
    Security (HSTS) header <xref target="RFC6797"/>, in order to allow Web servers to 
    advertise that they are
    willing to accept TLS-only clients.</li>
          <li>Web servers <bcp14>SHOULD</bcp14> use HSTS to indicate that they are willing to accept TLS-only clients, unless they are deployed in such a way that using HSTS would in fact weaken overall security (e.g., it can be problematic to use HSTS with self-signed certificates, as described in <xref section="11.3" sectionFormat="of" target="RFC6797"/>).</li>
        </ul>
        <t>Rationale: Combining unprotected and TLS-protected communication opens the way to SSL Stripping and similar attacks, since an initial part of the communication is not integrity protected and therefore can be manipulated by an attacker whose goal is to keep the communication in the clear.</t>
      </section>
      <section anchor="rec-compress">
        <name>Compression</name>
        <t>In order to help prevent compression-related attacks (summarized in <xref section="2.6" sectionFormat="of" target="RFC7457"/>), when using TLS 1.2 implementations and deployments <bcp14>SHOULD</bcp14> disable TLS-level compression (<xref section="6.2.2" sectionFormat="of" target="RFC5246"/>), unless the application protocol in question has been shown not to be open to such attacks. Note: this recommendation applies to TLS 1.2 only, because compression has been removed from TLS 1.3.</t>
        <t>Rationale: TLS compression has been subject to security attacks, such as the CRIME attack.</t>
        <t>Implementers should note that compression at higher protocol levels can allow an active attacker to extract cleartext information from the connection. The BREACH attack is one such case. These issues can only be mitigated outside of TLS and are thus outside the scope of this document. See <xref section="2.6" sectionFormat="of" target="RFC7457"/> for further details.</t>
      </section>
      <section anchor="rec-resume">
        <name>TLS Session Resumption</name>
        <t>Session resumption drastically reduces the number of TLS handshakes and thus is an essential
performance feature for most deployments.</t>
        <t>Stateless session resumption with session tickets is a popular strategy. For TLS 1.2, it is specified in
<xref target="RFC5077"/>.  For TLS 1.3, a more secure PSK-based mechanism is described in
<xref section="4.6.1" sectionFormat="of" target="RFC8446"/>. See <eref target="https://blog.filippo.io/we-need-to-talk-about-session-tickets/">this post</eref> by Filippo Valsorda for a comparison of TLS 1.2 and 1.3 session resumption, and <xref target="Springall16"/> for a quantitative study of TLS cryptographic "shortcuts", including session resumption.</t>
        <t>When it is used, the resumption information <bcp14>MUST</bcp14>
be authenticated and encrypted to prevent modification or eavesdropping by an attacker.
Further recommendations apply to session tickets:</t>
        <ul spacing="normal">
          <li>A strong cipher suite <bcp14>MUST</bcp14> be used when encrypting the ticket (as least as strong as the main TLS cipher suite).</li>
          <li>Ticket keys <bcp14>MUST</bcp14> be changed regularly, e.g., once every week, so as not to negate the benefits of forward secrecy (see <xref target="sec-pfs"/> for details on forward secrecy). Old ticket keys <bcp14>MUST</bcp14> be destroyed shortly after a new key version is made available.</li>
          <li>For similar reasons, session ticket validity <bcp14>SHOULD</bcp14> be limited to a reasonable duration (e.g., half as long as ticket key validity).</li>
          <li>TLS 1.2 does not roll the session key forward within a single session. Thus, to prevent an attack where a stolen ticket key is used to decrypt the entire content of a session (negating the concept of forward secrecy), a TLS 1.2 server <bcp14>SHOULD NOT</bcp14> resume sessions that are too old, e.g. sessions that have been open longer than two ticket key rotation periods. Note that this implies that some server implementations might need to abort sessions after a certain duration.</li>
        </ul>
        <t>Rationale: session resumption is another kind of TLS handshake, and therefore must be as secure as the initial handshake. This document (<xref target="detail"/>) recommends the use of cipher suites that provide forward secrecy, i.e. that prevent an attacker who gains momentary access to the TLS endpoint (either client or server) and its secrets from reading either past or future communication. The tickets must be managed so as not to negate this security property.</t>
        <t>TLS 1.3 provides the powerful option of forward secrecy even within a long-lived connection
that is periodically resumed. <xref section="2.2" sectionFormat="of" target="RFC8446"/> recommends that clients <bcp14>SHOULD</bcp14>
send a "key_share" when initiating session resumption.
In order to gain forward secrecy, this document recommends that server implementations <bcp14>SHOULD</bcp14>
respond with a "key_share", to complete an ECDHE exchange on each session resumption.</t>
        <t>TLS session resumption introduces potential privacy issues where the server is able
to track the client, in some cases indefinitely. See <xref target="Sy2018"/> for more details.</t>
      </section>
      <section anchor="renegotiation-in-tls-12">
        <name>Renegotiation in TLS 1.2</name>
        <t>The recommendations in this section apply to TLS 1.2 only, because renegotiation has been removed from TLS 1.3.</t>
        <t>TLS 1.2 clients and servers <bcp14>MUST</bcp14> implement the <tt>renegotiation_info</tt> extension, as defined in <xref target="RFC5746"/>.</t>
        <t>TLS 1.2 clients <bcp14>MUST</bcp14> send <tt>renegotiation_info</tt> in the Client Hello.  If the server does not acknowledge the extension, the client <bcp14>MUST</bcp14> generate a fatal <tt>handshake_failure</tt> alert prior to terminating the connection.</t>
        <t>Rationale: It is not safe for a client to connect to a TLS 1.2 server that does not support <tt>renegotiation_info</tt>, regardless of whether either endpoint actually implements renegotiation.  See also <xref section="4.1" sectionFormat="of" target="RFC5746"/>.</t>
        <t>A related attack resulting from TLS session parameters not properly authenticated is Triple Handshake <xref target="triple-handshake"/>. To address this attack, TLS 1.2 implementations <bcp14>SHOULD</bcp14> support the <tt>extended_master_secret</tt> extension defined in <xref target="RFC7627"/>.</t>
      </section>
      <section anchor="post-handshake-authentication">
        <name>Post-Handshake Authentication</name>
        <t>Renegotiation in TLS 1.2 was replaced in TLS 1.3 by separate post-handshake authentication and key update mechanisms.  In the context of protocols that multiplex requests over a single connection (such as HTTP/2), post-handshake authentication has the same problems as TLS 1.2 renegotiation.  Multiplexed protocols <bcp14>SHOULD</bcp14> follow the advice provided for HTTP/2 in <xref target="RFC8740"/>.</t>
      </section>
      <section anchor="server-name-indication">
        <name>Server Name Indication</name>
        <t>TLS implementations <bcp14>MUST</bcp14> support the Server Name Indication (SNI) extension defined in <xref section="3" sectionFormat="of" target="RFC6066"/> for those higher-level protocols that would benefit from it, including HTTPS. However, the actual use of SNI in particular circumstances is a matter of local policy.  Implementers are strongly encouraged to support TLS Encrypted Client Hello (formerly called Encrypted SNI) once <xref target="I-D.ietf-tls-esni"/> has been standardized.</t>
        <t>Rationale: SNI supports deployment of multiple TLS-protected virtual servers on a single
      address, and therefore enables fine-grained security for these virtual servers,
      by allowing each one to have its own certificate. However, SNI also leaks the 
      target domain for a given connection; this information leak will be plugged by 
      use of TLS Encrypted Client Hello.</t>
        <t>In order to prevent the attacks described in <xref target="ALPACA"/>, a server that does not
recognize the presented server name <bcp14>SHOULD NOT</bcp14> continue the handshake and
instead <bcp14>SHOULD</bcp14> fail with a fatal-level <tt>unrecognized_name(112)</tt> alert.  Note that this
recommendation updates <xref section="3" sectionFormat="of" target="RFC6066"/>: "If the server understood the
ClientHello extension but does not recognize the server name, the server <bcp14>SHOULD</bcp14>
take one of two actions: either abort the handshake by sending a fatal-level
<tt>unrecognized_name(112)</tt> alert or continue the handshake." It is also
<bcp14>RECOMMENDED</bcp14> that clients abort the handshake if the server acknowledges the SNI extension, but presents a certificate with a different hostname than the one sent by the client.</t>
      </section>
      <section anchor="application-layer-protocol-negotiation">
        <name>Application-Layer Protocol Negotiation</name>
        <t>TLS implementations (both client- and server-side) <bcp14>MUST</bcp14> support the
Application-Layer Protocol Negotiation (ALPN) extension <xref target="RFC7301"/>.</t>
        <t>In order to prevent "cross-protocol" attacks resulting from failure to ensure
that a message intended for use in one protocol cannot be mistaken for a
message for use in another protocol, servers should strictly enforce the
behavior prescribed in <xref section="3.2" sectionFormat="of" target="RFC7301"/>: "In the event that the
server supports no protocols that the client advertises, then the server <bcp14>SHALL</bcp14>
respond with a fatal <tt>no_application_protocol</tt> alert."  It is also <bcp14>RECOMMENDED</bcp14>
that clients abort the handshake if the server acknowledges the ALPN extension,
but does not select a protocol from the client list.  Failure to do so can
result in attacks such those described in <xref target="ALPACA"/>.</t>
        <t>Protocol developers are strongly encouraged to register an ALPN identifier for their protocols. This applies to new protocols, as well as well-established protocols such as SMTP.</t>
      </section>
      <section anchor="zero-round-trip-time-0-rtt-data-in-tls-13">
        <name>Zero Round Trip Time (0-RTT) Data in TLS 1.3</name>
        <t>The 0-RTT early data feature is new in TLS 1.3. It provides improved latency
when TLS connections are resumed, at the potential cost of security.
As a result, it requires special attention from implementers on both
the server and the client side. Typically this extends to both the
TLS library as well as protocol layers above it.</t>
        <t>For use in HTTP-over-TLS, readers are referred to <xref target="RFC8470"/> for guidance.</t>
        <t>For QUIC-on-TLS, refer to Sec. 9.2 of <xref target="RFC9001"/>.</t>
        <t>For other protocols, generic guidance is given in Sec. 8 and Appendix E.5
of <xref target="RFC8446"/>.
To paraphrase Appendix E.5, applications <bcp14>MUST</bcp14> avoid this feature unless
an explicit specification exists for the application protocol in question to clarify
when 0-RTT is appropriate and secure. This can take the form of an IETF RFC,
a non-IETF standard, or even documentation associated with a non-standard protocol.</t>
      </section>
    </section>
    <section anchor="detail">
      <name>Recommendations: Cipher Suites</name>
      <t>TLS and its implementations provide considerable flexibility in the selection of cipher suites. Unfortunately, the security of some of these cipher suites has degraded over time to the point where some are known to be insecure. Incorrectly configuring a server leads to no or reduced security.  This section includes recommendations on the selection and negotiation of cipher suites.</t>
      <section anchor="rec-cipher-guidelines">
        <name>General Guidelines</name>
        <t>Cryptographic algorithms weaken over time as cryptanalysis improves: algorithms that were once considered strong become weak. Such algorithms need to be phased out over time and replaced with more secure cipher suites. This helps to ensure that the desired security properties still hold. SSL/TLS has been in existence for almost 20 years and many of the cipher suites that have been recommended in various versions of SSL/TLS are now considered weak or at least not as strong as desired. Therefore, this section modernizes the recommendations concerning cipher suite selection.</t>
        <ul spacing="normal">
          <li>
            <t>Implementations <bcp14>MUST NOT</bcp14> negotiate the cipher suites with NULL encryption.  </t>
            <t>
Rationale: The NULL cipher suites do not encrypt traffic and 
             so provide no confidentiality services. Any entity in the 
             network with access to the connection can view the plaintext 
             of contents being exchanged by the client and server.<br/>
             Nevertheless, this document does not discourage software from
             implementing NULL cipher suites, since they can be useful for 
             testing and debugging.</t>
          </li>
          <li>
            <t>Implementations <bcp14>MUST NOT</bcp14> negotiate RC4 cipher suites.  </t>
            <t>
Rationale: The RC4 stream cipher has a variety of cryptographic 
             weaknesses, as documented in <xref target="RFC7465"/>.
     Note that DTLS specifically forbids the use of RC4 already.</t>
          </li>
          <li>
            <t>Implementations <bcp14>MUST NOT</bcp14> negotiate cipher suites offering less 
             than 112 bits of security, including so-called "export-level" 
             encryption (which provide 40 or 56 bits of security).  </t>
            <t>
Rationale: Based on <xref target="RFC3766"/>, at least 112 bits 
             of security is needed.  40-bit and 56-bit security are considered 
             insecure today.  TLS 1.1 and 1.2 never negotiate 40-bit or 56-bit 
             export ciphers.</t>
          </li>
          <li>
            <t>Implementations <bcp14>SHOULD NOT</bcp14> negotiate cipher suites that use 
             algorithms offering less than 128 bits of security.  </t>
            <t>
Rationale: Cipher suites that offer between 112-bits and 128-bits 
             of security are not considered weak at this time; however, it is 
             expected that their useful lifespan is short enough to justify 
             supporting stronger cipher suites at this time.  128-bit ciphers 
             are expected to remain secure for at least several years, and 
             256-bit ciphers until the next fundamental technology 
             breakthrough.  Note that, because of so-called 
             "meet-in-the-middle" attacks <xref target="Multiple-Encryption"/>,
             some legacy cipher suites (e.g., 168-bit 3DES) have an effective 
             key length that is smaller than their nominal key length (112 
             bits in the case of 3DES).  Such cipher suites should be 
             evaluated according to their effective key length.</t>
          </li>
          <li>
            <t>Implementations <bcp14>SHOULD NOT</bcp14> negotiate cipher suites based on 
             RSA key transport, a.k.a. "static RSA".  </t>
            <t>
Rationale: These cipher suites, which have assigned values starting 
             with the string "TLS_RSA_WITH_*", have several drawbacks, especially
             the fact that they do not support forward secrecy.</t>
          </li>
          <li>
            <t>Implementations <bcp14>SHOULD NOT</bcp14> negotiate cipher suites based on
             non-ephemeral (static) finite-field Diffie-Hellman key agreement.  </t>
            <t>
Rationale: These cipher suites, which have assigned values prefixed by "TLS_DH_*", have several drawbacks, especially
             the fact that they do not support forward secrecy.</t>
          </li>
          <li>
            <t>Implementations <bcp14>MUST</bcp14> support and prefer to negotiate cipher suites 
             offering forward secrecy.  However, TLS 1.2 implementations <bcp14>SHOULD NOT</bcp14> negotiate
             cipher suites based on ephemeral finite-field Diffie-Hellman key
             agreement (i.e., "TLS_DHE_*" suites).  This is justified by the known fragility
             of the construction (see <xref target="RACCOON"/>) and the limitation around
             negotiation -- including using <xref target="RFC7919"/>, which has seen very
             limited uptake.  </t>
            <t>
Rationale: Forward secrecy (sometimes called "perfect forward 
             secrecy") prevents the recovery of information that was encrypted 
             with older session keys, thus limiting the amount of time during 
             which attacks can be successful. See <xref target="sec-pfs"/> for 
             a detailed discussion.</t>
          </li>
        </ul>
      </section>
      <section anchor="rec-cipher">
        <name>Cipher Suites for TLS 1.2</name>
        <t>Given the foregoing considerations, implementation and deployment of the following cipher suites is <bcp14>RECOMMENDED</bcp14>:</t>
        <ul spacing="normal">
          <li>TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256</li>
          <li>TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384</li>
          <li>TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256</li>
          <li>TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384</li>
        </ul>
        <t>These cipher suites are supported only in TLS 1.2 and not in earlier protocol versions, because they are authenticated encryption (AEAD) algorithms <xref target="RFC5116"/>.</t>
        <t>Typically, in order to prefer these suites, the order of suites needs to be explicitly configured in server software. (See <xref target="BETTERCRYPTO"/> for helpful deployment guidelines, but note that its recommendations differ from the current document in some details.)  It would be ideal if server software implementations were to prefer these suites by default.</t>
        <t>Some devices have hardware support for AES-CCM but not AES-GCM, so they are unable to follow the foregoing recommendations regarding cipher suites.  There are even devices that do not support public key cryptography at all, but they are out of scope entirely.</t>
        <t>When using ECDSA signatures for authentication of TLS peers, it is <bcp14>RECOMMENDED</bcp14> that implementations use the NIST curve P-256. In addition, to avoid predictable or repeated nonces (that would allow revealing the long term signing key), it is <bcp14>RECOMMENDED</bcp14> that implementations implement "deterministic ECDSA" as specified in <xref target="RFC6979"/> and in line with the recommendations in <xref target="RFC8446"/>.</t>
        <section anchor="detail-neg">
          <name>Implementation Details</name>
          <t>Clients <bcp14>SHOULD</bcp14> include TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 as the first proposal to any server, unless they have prior knowledge that the server cannot respond to a TLS 1.2 client_hello message.</t>
          <t>Servers <bcp14>MUST</bcp14> prefer this cipher suite over weaker cipher suites whenever it is proposed, even if it is not the first proposal.</t>
          <t>Clients are of course free to offer stronger cipher suites, e.g., using AES-256; when they do, the server <bcp14>SHOULD</bcp14> prefer the stronger cipher suite unless there are compelling reasons (e.g., seriously degraded performance) to choose otherwise.</t>
          <t>The previous version of this document implicitly allowed the old RFC 5246 mandatory-to-implement cipher suite, TLS_RSA_WITH_AES_128_CBC_SHA. At the time of writing, this cipher suite does not provide additional interoperability, except with extremely old clients. As with other cipher suites that do not provide forward secrecy, implementations <bcp14>SHOULD NOT</bcp14> support this cipher suite. Other application protocols specify other cipher suites as mandatory to implement (MTI).</t>
          <t><xref target="RFC8422"/> allows clients and servers to negotiate ECDH parameters (curves).  Both clients and servers <bcp14>SHOULD</bcp14> include the "Supported Elliptic Curves" extension <xref target="RFC8422"/>.  Clients and servers <bcp14>SHOULD</bcp14> support the NIST P-256 (secp256r1) <xref target="RFC8422"/> and X25519 (x25519) <xref target="RFC7748"/> curves.  Note that <xref target="RFC8422"/> deprecates all but the uncompressed point format.  Therefore, if the client sends an ec_point_formats extension, the ECPointFormatList <bcp14>MUST</bcp14> contain a single element, "uncompressed".</t>
        </section>
      </section>
      <section anchor="cipher-suites-for-tls-13">
        <name>Cipher Suites for TLS 1.3</name>
        <t>This document does not specify any cipher suites for TLS 1.3. Readers
are referred to Sec. 9.1 of <xref target="RFC8446"/> for cipher suite recommendations.</t>
      </section>
      <section anchor="limits-on-key-usage">
        <name>Limits on Key Usage</name>
        <t>All ciphers have an upper limit on the amount of traffic that can be securely
protected with any given key. In the case of AEAD cipher suites, two separate
limits are maintained for each key:</t>
        <ol spacing="normal" type="1"><li>Confidentiality limit (CL), i.e., the number of records that can be
encrypted.</li>
          <li>Integrity limit (IL), i.e., the number of records that are allowed to fail
authentication.</li>
        </ol>
        <t>The latter only applies to DTLS since TLS connections are torn down on the
first decryption failure.</t>
        <t>When a sender is approaching CL, the implementation <bcp14>SHOULD</bcp14> initiate a new
handshake (or in TLS 1.3, a Key Update) to rotate the session key.</t>
        <t>When a receiver has reached IL, the implementation <bcp14>SHOULD</bcp14> close the connection.</t>
        <t>For all TLS 1.3 cipher suites, readers are referred to <xref section="5.5" sectionFormat="of" target="RFC8446"/> for the values of CL and IL. For all DTLS 1.3 cipher suites, readers are referred to <xref section="4.5.3" sectionFormat="of" target="I-D.ietf-tls-dtls13"/>.</t>
        <t>For all AES-GCM cipher suites recommended for TLS 1.2 and DTLS 1.2 in this
document, CL can be derived by plugging the corresponding parameters into the
inequalities in <xref section="6.1" sectionFormat="of" target="I-D.irtf-cfrg-aead-limits"/> that apply to
random, partially implicit nonces, i.e., the nonce construction used in TLS
1.2.  Although the obtained figures are slightly higher than those for TLS 1.3,
it is <bcp14>RECOMMENDED</bcp14> that the same limit of 2<sup>24.5</sup> records is used for
both versions.</t>
        <t>For all AES-GCM cipher suites recommended for DTLS 1.2, IL (obtained from the
same inequalities referenced above) is 2<sup>28</sup>.</t>
      </section>
      <section anchor="rec-keylength">
        <name>Public Key Length</name>
        <t>When using the cipher suites recommended in this document, two public keys are 
      normally used in the TLS handshake: one for the Diffie-Hellman key agreement
      and one for server authentication. Where a client certificate is used, a third 
      public key is added.</t>
        <t>With a key exchange based on modular exponential (MODP) Diffie-Hellman groups ("DHE" cipher suites), DH key lengths of at least 2048 bits are <bcp14>REQUIRED</bcp14>.</t>
        <t>Rationale: For various reasons, in practice, DH keys are typically generated in lengths
 that are powers of two (e.g., 2<sup>10</sup> = 1024 bits, 2<sup>11</sup> = 2048 bits, 2<sup>12</sup> = 4096 bits).
 Because a DH key of 1228 bits would be roughly equivalent to only an 80-bit symmetric key
<xref target="RFC3766"/>, it is better to use keys longer than that for the "DHE" family of cipher suites.
A DH key of 1926 bits would be roughly equivalent to a 100-bit symmetric key <xref target="RFC3766"/>.
A DH key of 2048 bits (equivalent to a 112-bit symmetric key) 
is the minimum allowed by the latest revision of <xref target="NIST.SP.800-56A"/>, as of this writing
(see in particular Appendix D).</t>
        <t>As noted in <xref target="RFC3766"/>, correcting for the emergence of a TWIRL machine would imply that 1024-bit DH keys yield about 65 bits of equivalent strength and that a 2048-bit DH key would yield about 92 bits of equivalent strength.
The Logjam attack <xref target="Logjam"/> further demonstrates that 1024-bit Diffie Hellman parameters
should be avoided.</t>
        <t>With regard to ECDH keys, implementers are referred to the IANA "Supported Groups Registry" (former "EC Named Curve
Registry"), within the
   "Transport Layer Security (TLS) Parameters" registry <xref target="IANA_TLS"/>, and in particular to the "recommended"
   groups.  Curves of less than 224 bits <bcp14>MUST NOT</bcp14> be used. This recommendation is in-line with the latest
revision of <xref target="NIST.SP.800-56A"/>.</t>
        <t>When using RSA, servers <bcp14>SHOULD</bcp14> authenticate using certificates with at least a 2048-bit modulus for the public key.  In addition, the use of the SHA-256 hash algorithm is <bcp14>RECOMMENDED</bcp14> and SHA-1 or MD5 <bcp14>MUST NOT</bcp14> be used (<xref target="RFC9155"/>, and see <xref target="CAB-Baseline"/> for more details). Clients <bcp14>MUST</bcp14> indicate to servers that they request SHA-256, by using the "Signature Algorithms" extension defined in TLS 1.2.</t>
      </section>
      <section anchor="truncated-hmac">
        <name>Truncated HMAC</name>
        <t>Implementations <bcp14>MUST NOT</bcp14> use the Truncated HMAC extension, defined in <xref section="7" sectionFormat="of" target="RFC6066"/>.</t>
        <t>Rationale: the extension does not apply to the AEAD
      cipher suites recommended above. However it does apply to most other TLS cipher suites. Its use
      has been shown to be insecure in <xref target="PatersonRS11"/>.</t>
      </section>
    </section>
    <section anchor="applicability">
      <name>Applicability Statement</name>
      <t>The recommendations of this document primarily apply to the implementation and deployment of application protocols that are most commonly used with TLS and DTLS on the Internet today.  Examples include, but are not limited to:</t>
      <ul spacing="normal">
        <li>Web software and services that wish to protect HTTP traffic with TLS.</li>
        <li>Email software and services that wish to protect IMAP, POP3, or SMTP traffic with TLS.</li>
        <li>Instant-messaging software and services that wish to protect Extensible Messaging and Presence Protocol (XMPP) or Internet Relay Chat (IRC) traffic with TLS.</li>
        <li>Realtime media software and services that wish to protect Secure Realtime Transport Protocol (SRTP) traffic with DTLS.</li>
      </ul>
      <t>This document does not modify the implementation and deployment recommendations (e.g., mandatory-to-implement cipher suites) prescribed by existing application protocols that employ TLS or DTLS. If the community that uses such an application protocol wishes to modernize its usage of TLS or DTLS to be consistent with the best practices recommended here, it needs to explicitly update the existing application protocol definition (one example is <xref target="RFC7590"/>, which updates <xref target="RFC6120"/>).</t>
      <t>Designers of new application protocols developed through the Internet
  Standards Process <xref target="RFC2026"/> are expected at minimum to conform to the best
  practices recommended here, unless they provide documentation of
  compelling reasons that would prevent such conformance (e.g.,
  widespread deployment on constrained devices that lack support for
  the necessary algorithms).</t>
      <section anchor="security-services">
        <name>Security Services</name>
        <t>This document provides recommendations for an audience that wishes to secure their communication with TLS to achieve the following:</t>
        <ul spacing="normal">
          <li>Confidentiality: all application-layer communication is encrypted with the goal that no party should be able to decrypt it except the intended receiver.</li>
          <li>Data integrity: any changes made to the communication in transit are detectable by the receiver.</li>
          <li>Authentication: an endpoint of the TLS communication is authenticated as the intended entity to communicate with.</li>
        </ul>
        <t>With regard to authentication, TLS enables authentication of one or both endpoints in the communication.  In the context of opportunistic security <xref target="RFC7435"/>, TLS is sometimes used without authentication. As discussed in <xref target="oppsec"/>, considerations for opportunistic security are not in scope for this document.</t>
        <t>If deployers deviate from the recommendations given in this document, they need to be aware that they might lose access to one of the foregoing security services.</t>
        <t>This document applies only to environments where confidentiality is required. It recommends algorithms and configuration options that enforce secrecy of the data in transit.</t>
        <t>This document also assumes that data integrity protection is always one of the goals of a deployment. In cases where integrity is not required, it does not make sense to employ TLS in the first place. There are attacks against confidentiality-only protection that utilize the lack of integrity to also break confidentiality (see, for instance, <xref target="DegabrieleP07"/> in the context of IPsec).</t>
        <t>This document addresses itself to application protocols that are most commonly used on the Internet with TLS and DTLS. Typically, all communication between TLS clients and TLS servers requires all three of the above security services. This is particularly true where TLS clients are user agents like Web browsers or email software.</t>
        <t>This document does not address the rarer deployment scenarios where one of the above three properties is not desired, such as the use case described in <xref target="oppsec"/> below.  As another scenario where confidentiality is not needed, consider a monitored network where the authorities in charge of the respective traffic domain require full access to unencrypted (plaintext) traffic, and where users collaborate and send their traffic in the clear.</t>
      </section>
      <section anchor="oppsec">
        <name>Opportunistic Security</name>
        <t>There are several important scenarios in which the use of TLS is optional, i.e., the client decides dynamically ("opportunistically") whether to use TLS with a particular server or to connect in the clear.  This practice, often called "opportunistic security", is described at length in <xref target="RFC7435"/> and is often motivated by a desire for backward compatibility with legacy deployments.</t>
        <t>In these scenarios, some of the recommendations in this document might be too strict, since adhering to them could cause fallback to cleartext, a worse outcome than using TLS with an outdated protocol version or cipher suite.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
    <section anchor="sec">
      <name>Security Considerations</name>
      <t>This entire document discusses the security practices directly affecting applications
    using the TLS protocol. This section contains broader security considerations related
    to technologies used in conjunction with or by TLS.</t>
      <section anchor="host-name-validation">
        <name>Host Name Validation</name>
        <t>Application authors should take note that some TLS implementations
  do not validate host names.  If the TLS implementation they are
  using does not validate host names, authors might need to write their
  own validation code or consider using a different TLS implementation.</t>
        <t>It is noted that the requirements regarding host name validation (and, in general, binding between the TLS layer and the protocol that runs above it) vary between different protocols. For HTTPS, these requirements are defined by Sections 4.3.3, 4.3.4 and 4.3.5 of <xref target="I-D.ietf-httpbis-semantics"/>.</t>
        <t>Readers are referred to <xref target="RFC6125"/> for further details regarding generic host name validation in the TLS context. In addition, that RFC contains a long list of example protocols, some of which implement a policy very different from HTTPS.</t>
        <t>If the host name is discovered indirectly and in an insecure manner (e.g., by an insecure DNS query for an MX or SRV record), it <bcp14>SHOULD NOT</bcp14> be used as a reference identifier <xref target="RFC6125"/> even when it matches the presented certificate.  This proviso does not apply if the host name is discovered securely (for further discussion, see <xref target="DANE-SRV"/> and <xref target="DANE-SMTP"/>).</t>
        <t>Host name validation typically applies only to the leaf "end entity" certificate. Naturally, in order to ensure proper authentication in the context of the PKI, application clients need to verify the entire certification path in accordance with <xref target="RFC5280"/> (see also 
        <xref target="RFC6125"/>).</t>
      </section>
      <section anchor="sec-aes">
        <name>AES-GCM</name>
        <t><xref target="rec-cipher"/> above recommends the use of the AES-GCM authenticated encryption algorithm. Please refer to <xref section="11" sectionFormat="of" target="RFC5246"/> for general security considerations when using TLS 1.2, and to <xref section="6" sectionFormat="of" target="RFC5288"/> for security considerations that apply specifically to AES-GCM when used with TLS.</t>
        <section anchor="nonce-reuse-in-tls-12">
          <name>&nbsp;Nonce Reuse in TLS 1.2</name>
          <t>The existence of deployed TLS stacks that mistakenly reuse the AES-GCM nonce is
documented in <xref target="Boeck2016"/>, showing there is an actual risk of AES-GCM getting
implemented in an insecure way and thus making TLS sessions that use an
AES-GCM cipher suite vulnerable to attacks such as <xref target="Joux2006"/>.  (See <xref target="CVE"/>
records: CVE-2016-0270, CVE-2016-10213, CVE-2016-10212, CVE-2017-5933.)</t>
          <t>While this problem has been fixed in TLS 1.3, which enforces a deterministic
method to generate nonces from record sequence numbers and shared secrets for
all of its AEAD cipher suites (including AES-GCM), TLS 1.2 implementations
could still choose their own (potentially insecure) nonce generation methods.</t>
          <t>It is therefore <bcp14>RECOMMENDED</bcp14> that TLS 1.2 implementations use the 64-bit
sequence number to populate the <tt>nonce_explicit</tt> part of the GCM nonce, as
described in the first two paragraphs of <xref section="5.3" sectionFormat="of" target="RFC8446"/>.  Note
that this stronger recommendation updates <xref section="3" sectionFormat="of" target="RFC5288"/>: "The nonce_explicit
<bcp14>MAY</bcp14> be the 64-bit sequence number."</t>
          <t>We note that at the time of writing there are no cipher suites defined for nonce
reuse resistant algorithms such as AES-GCM-SIV <xref target="RFC8452"/>.</t>
        </section>
      </section>
      <section anchor="sec-pfs">
        <name>Forward Secrecy</name>
        <t>Forward secrecy (also called "perfect forward secrecy" or "PFS" and defined in <xref target="RFC4949"/>) is a defense against an attacker who records encrypted conversations where the session keys are only encrypted with the communicating parties' long-term keys.</t>
        <t>Should the attacker be able to obtain these long-term keys at some point later in time, the session keys and thus the entire conversation could be decrypted.</t>
        <t>In the context of TLS and DTLS, such compromise of long-term keys is not entirely implausible. It can happen, for example, due to:</t>
        <ul spacing="normal">
          <li>A client or server being attacked by some other attack vector, and the private key retrieved.</li>
          <li>A long-term key retrieved from a device that has been sold or otherwise decommissioned without prior wiping.</li>
          <li>A long-term key used on a device as a default key <xref target="Heninger2012"/>.</li>
          <li>A key generated by a trusted third party like a CA, and later retrieved from it either by extortion or compromise <xref target="Soghoian2011"/>.</li>
          <li>A cryptographic break-through, or the use of asymmetric keys with insufficient length <xref target="Kleinjung2010"/>.</li>
          <li>Social engineering attacks against system administrators.</li>
          <li>Collection of private keys from inadequately protected backups.</li>
        </ul>
        <t>Forward secrecy ensures in such cases that it is not feasible for an attacker to determine the session keys even if the attacker has obtained the long-term keys some time after the conversation. It also protects against an attacker who is in possession of the long-term keys but remains passive during the conversation.</t>
        <t>Forward secrecy is generally achieved by using the Diffie-Hellman scheme to derive session keys. The Diffie-Hellman scheme has both parties maintain private secrets and send parameters over the network as modular powers over certain cyclic groups. The properties of the so-called Discrete Logarithm Problem (DLP) allow the parties to derive the session keys without an eavesdropper being able to do so. There is currently no known attack against DLP if sufficiently large parameters are chosen. A variant of the Diffie-Hellman scheme uses elliptic curves instead of the originally proposed modular arithmetic. Given the current state of the art, elliptic-curve Diffie-Hellman appears to be more efficient, permits shorter key lengths, and allows less freedom for implementation errors than finite-field Diffie-Hellman.</t>
        <t>Unfortunately, many TLS/DTLS cipher suites were defined that do not feature forward secrecy, e.g., TLS_RSA_WITH_AES_256_CBC_SHA256.  This document therefore advocates strict use of forward-secrecy-only ciphers.</t>
      </section>
      <section anchor="diffie-hellman-exponent-reuse">
        <name>Diffie-Hellman Exponent Reuse</name>
        <t>For performance reasons, many TLS implementations reuse Diffie-Hellman and Elliptic Curve Diffie-Hellman exponents across multiple connections. Such reuse can result in major security issues:</t>
        <ul spacing="normal">
          <li>If exponents are reused for too long (in some cases, even as little as a few hours), an attacker who gains access to the host can decrypt previous connections. In other words, exponent reuse negates the effects of forward secrecy.</li>
          <li>TLS implementations that reuse exponents should test the DH public key they receive for group membership, in order to avoid some known attacks. These tests are not standardized in TLS at the time of writing, although general guidance in this area is provided by <xref target="NIST.SP.800-56A"/> and available in many protocol implementations.</li>
          <li>Under certain conditions, the use of static finite-field DH keys, or of ephemeral finite-field DH keys that are reused across multiple connections, can lead to timing attacks (such as those described in <xref target="RACCOON"/>) on the shared secrets used in Diffie-Hellman key exchange.</li>
          <li>An "invalid curve" attack can be mounted against elliptic-curve DH if the victim does not verify that the received point lies on the correct curve.  If the victim is reusing the DH secrets, the attacker can repeat the probe varying the points to recover the full secret (see <xref target="Antipa2003"/> and <xref target="Jager2015"/>).</li>
        </ul>
        <t>To address these concerns:</t>
        <ul spacing="normal">
          <li>TLS implementations <bcp14>SHOULD NOT</bcp14> use static finite-field DH keys and <bcp14>SHOULD NOT</bcp14> reuse ephemeral finite-field DH keys across multiple connections.</li>
          <li>Server implementations that want to reuse elliptic-curve DH keys <bcp14>SHOULD</bcp14> either use a "safe curve" <xref target="SAFECURVES"/> (e.g., X25519), or perform the checks described in <xref target="NIST.SP.800-56A"/> on the received points.</li>
        </ul>
      </section>
      <section anchor="certificate-revocation">
        <name>Certificate Revocation</name>
        <t>The following considerations and recommendations represent the current state of the art regarding certificate revocation, even though no complete and efficient solution exists for the problem of checking the revocation status of common public key certificates <xref target="RFC5280"/>:</t>
        <ul spacing="normal">
          <li>Certificate revocation is an important tool when recovering from attacks on the TLS implementation, as well as cases of misissued certificates. TLS implementations <bcp14>MUST</bcp14> implement a strategy to distrust revoked certificates.</li>
          <li>Although Certificate Revocation Lists (CRLs) are the most widely supported mechanism for distributing revocation information, they have known scaling challenges that limit their usefulness, despite workarounds such as partitioned CRLs and delta CRLs. The more modern <xref target="CRLite"/> and the follow-on Let's Revoke <xref target="LetsRevoke"/> build on the availability of Certificate Transparency <xref target="RFC9162"/> logs and aggressive compression to allow practical use of the CRL infrastructure, but at the time of writing, neither solution is deployed for client-side revocation processing at scale.</li>
          <li>Proprietary mechanisms that embed revocation lists in the Web browser's configuration database cannot scale beyond a small number of the most heavily used Web servers.</li>
          <li>The On-Line Certification Status Protocol (OCSP) <xref target="RFC6960"/> in its basic form presents both scaling and privacy issues. In addition, clients typically "soft-fail", meaning that they do not abort the TLS connection if the OCSP server does not respond. (However, this might be a workaround to avoid denial-of-service attacks if an OCSP responder is taken offline.). For an up-to-date survey of the status of OCSP deployment in the Web PKI see <xref target="Chung18"/>.</li>
          <li>The TLS Certificate Status Request extension (<xref section="8" sectionFormat="of" target="RFC6066"/>), commonly called "OCSP stapling", resolves the operational issues with OCSP. However, it is still ineffective in the presence of a MITM attacker because the attacker can simply ignore the client's request for a stapled OCSP response.</li>
          <li>
            <xref target="RFC7633"/> defines a certificate extension that indicates that clients must expect stapled OCSP responses for the certificate and must abort the handshake ("hard-fail") if such a response is not available.</li>
          <li>OCSP stapling as used in TLS 1.2 does not extend to intermediate certificates within a certificate chain. The Multiple Certificate Status extension <xref target="RFC6961"/> addresses this shortcoming, but it has seen little deployment and had been deprecated by <xref target="RFC8446"/>. As a result, we no longer recommend this extension for TLS 1.2.</li>
          <li>TLS 1.3 (<xref section="4.4.2.1" sectionFormat="of" target="RFC8446"/>) allows the association of OCSP information with intermediate certificates by using an extension to the CertificateEntry structure. However using this facility remains impractical because many CAs either do not publish OCSP for CA certificates or publish OCSP reports with a lifetime that is too long to be useful.</li>
          <li>Both CRLs and OCSP depend on relatively reliable connectivity to the Internet, which might not be available to certain kinds of nodes. A common example is newly provisioned devices that need to establish a secure connection in order to boot up for the first time.</li>
        </ul>
        <t>For the common use cases of public key certificates in TLS, servers <bcp14>SHOULD</bcp14> support the following as a best practice given the current state of the art and as a foundation for a possible future solution: OCSP <xref target="RFC6960"/> and OCSP stapling using the <tt>status_request</tt> extension defined in <xref target="RFC6066"/>. Note that the exact mechanism for embedding the <tt>status_request</tt> extension differs between TLS 1.2 and 1.3. As a matter of local policy, server operators <bcp14>MAY</bcp14> request that CAs issue must-staple <xref target="RFC7633"/> certificates for the server and/or for client authentication, but we recommend to review the operational conditions before deciding on this approach.</t>
        <t>The considerations in this section do not apply to scenarios where the DANE-TLSA resource record <xref target="RFC6698"/> is used to signal to a client which certificate a server considers valid and good to use for TLS connections.</t>
      </section>
    </section>
    <section anchor="d1e1127">
      <name>Acknowledgments</name>
      <t>Thanks to
Alexey Melnikov,
Andrei Popov,
Christian Huitema,
Daniel Kahn Gillmor,
David Benjamin,
Eric Rescorla,
Hannes Tschofenig,
Hubert Kario,
Ilari Liusvaara,
John Mattsson,
John R Levine,
Julien <contact fullname="Élie" asciiFullname="Elie"/>,
Leif Johansson,
Martin Thomson,
Mohit Sahni,
Nick Sullivan,
Nimrod Aviram,
Rich Salz,
Ryan Sleevi,
Sean Turner,
Valery Smyslov,
Viktor Dukhovni
for helpful comments and discussions that have shaped this document.</t>
      <t>The authors gratefully acknowledge the contribution of Ralph Holz, who was a coauthor of RFC 7525, the previous version of this document.</t>
      <t>See RFC 7525 for additional acknowledgments for the previous revision of this document.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC7465" target="https://www.rfc-editor.org/info/rfc7465">
          <front>
            <title>Prohibiting RC4 Cipher Suites</title>
            <author fullname="A. Popov" initials="A." surname="Popov">
              <organization/>
            </author>
            <date month="February" year="2015"/>
            <abstract>
              <t>This document requires that Transport Layer Security (TLS) clients and servers never negotiate the use of RC4 cipher suites when they establish connections.  This applies to all TLS versions.  This document updates RFCs 5246, 4346, and 2246.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7465"/>
          <seriesInfo name="DOI" value="10.17487/RFC7465"/>
        </reference>
        <reference anchor="RFC5246" target="https://www.rfc-editor.org/info/rfc5246">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks">
              <organization/>
            </author>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol.  The TLS protocol provides communications security over the Internet.  The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="RFC6347" target="https://www.rfc-editor.org/info/rfc6347">
          <front>
            <title>Datagram Transport Layer Security Version 1.2</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu">
              <organization/>
            </author>
            <date month="January" year="2012"/>
            <abstract>
              <t>This document specifies version 1.2 of the Datagram Transport Layer Security (DTLS) protocol.  The DTLS protocol provides communications privacy for datagram protocols.  The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.  The DTLS protocol is based on the Transport Layer Security (TLS) protocol and provides equivalent security guarantees.  Datagram semantics of the underlying transport are preserved by the DTLS protocol.  This document updates DTLS 1.0 to work with TLS version 1.2.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6347"/>
          <seriesInfo name="DOI" value="10.17487/RFC6347"/>
        </reference>
        <reference anchor="RFC8996" target="https://www.rfc-editor.org/info/rfc8996">
          <front>
            <title>Deprecating TLS 1.0 and TLS 1.1</title>
            <author fullname="K. Moriarty" initials="K." surname="Moriarty">
              <organization/>
            </author>
            <author fullname="S. Farrell" initials="S." surname="Farrell">
              <organization/>
            </author>
            <date month="March" year="2021"/>
            <abstract>
              <t>This document formally deprecates Transport Layer Security (TLS) versions 1.0 (RFC 2246) and 1.1 (RFC 4346). Accordingly, those documents have been moved to Historic status. These versions lack support for current and recommended cryptographic algorithms and mechanisms, and various government and industry profiles of applications using TLS now mandate avoiding these old TLS versions. TLS version 1.2 became the recommended version for IETF protocols in 2008 (subsequently being obsoleted by TLS version 1.3 in 2018), providing sufficient time to transition away from older versions. Removing support for older versions from implementations reduces the attack surface, reduces opportunity for misconfiguration, and streamlines library and product maintenance. </t>
              <t>This document also deprecates Datagram TLS (DTLS) version 1.0 (RFC 4347) but not DTLS version 1.2, and there is no DTLS version 1.1.</t>
              <t>This document updates many RFCs that normatively refer to TLS version 1.0 or TLS version 1.1, as described herein. This document also updates the best practices for TLS usage in RFC 7525; hence, it is part of BCP 195.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="195"/>
          <seriesInfo name="RFC" value="8996"/>
          <seriesInfo name="DOI" value="10.17487/RFC8996"/>
        </reference>
        <reference anchor="RFC8446" target="https://www.rfc-editor.org/info/rfc8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="I-D.ietf-tls-dtls13" target="https://www.ietf.org/archive/id/draft-ietf-tls-dtls13-43.txt">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="Eric Rescorla">
              <organization>RTFM, Inc.</organization>
            </author>
            <author fullname="Hannes Tschofenig">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Nagendra Modadugu">
              <organization>Google, Inc.</organization>
            </author>
            <date day="30" month="April" year="2021"/>
            <abstract>
              <t>   This document specifies Version 1.3 of the Datagram Transport Layer
   Security (DTLS) protocol.  DTLS 1.3 allows client/server applications
   to communicate over the Internet in a way that is designed to prevent
   eavesdropping, tampering, and message forgery.

   The DTLS 1.3 protocol is intentionally based on the Transport Layer
   Security (TLS) 1.3 protocol and provides equivalent security
   guarantees with the exception of order protection/non-replayability.
   Datagram semantics of the underlying transport are preserved by the
   DTLS protocol.

   This document obsoletes RFC 6347.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-dtls13-43"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC6176" target="https://www.rfc-editor.org/info/rfc6176">
          <front>
            <title>Prohibiting Secure Sockets Layer (SSL) Version 2.0</title>
            <author fullname="S. Turner" initials="S." surname="Turner">
              <organization/>
            </author>
            <author fullname="T. Polk" initials="T." surname="Polk">
              <organization/>
            </author>
            <date month="March" year="2011"/>
            <abstract>
              <t>This document requires that when Transport Layer Security (TLS) clients and servers establish connections, they never negotiate the use of  Secure Sockets Layer (SSL) version 2.0.  This document updates the  backward compatibility sections found in the Transport Layer Security (TLS). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6176"/>
          <seriesInfo name="DOI" value="10.17487/RFC6176"/>
        </reference>
        <reference anchor="RFC5746" target="https://www.rfc-editor.org/info/rfc5746">
          <front>
            <title>Transport Layer Security (TLS) Renegotiation Indication Extension</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <author fullname="M. Ray" initials="M." surname="Ray">
              <organization/>
            </author>
            <author fullname="S. Dispensa" initials="S." surname="Dispensa">
              <organization/>
            </author>
            <author fullname="N. Oskov" initials="N." surname="Oskov">
              <organization/>
            </author>
            <date month="February" year="2010"/>
            <abstract>
              <t>Secure Socket Layer (SSL) and Transport Layer Security (TLS) renegotiation are vulnerable to an attack in which the attacker forms a TLS connection with the target server, injects content of his choice, and then splices in a new TLS connection from a client.  The server treats the client's initial TLS handshake as a renegotiation and thus believes that the initial data transmitted by the attacker is from the same entity as the subsequent client data.  This specification defines a TLS extension to cryptographically tie renegotiations to the TLS connections they are being performed over, thus preventing this attack.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5746"/>
          <seriesInfo name="DOI" value="10.17487/RFC5746"/>
        </reference>
        <reference anchor="RFC7627" target="https://www.rfc-editor.org/info/rfc7627">
          <front>
            <title>Transport Layer Security (TLS) Session Hash and Extended Master Secret Extension</title>
            <author fullname="K. Bhargavan" initials="K." role="editor" surname="Bhargavan">
              <organization/>
            </author>
            <author fullname="A. Delignat-Lavaud" initials="A." surname="Delignat-Lavaud">
              <organization/>
            </author>
            <author fullname="A. Pironti" initials="A." surname="Pironti">
              <organization/>
            </author>
            <author fullname="A. Langley" initials="A." surname="Langley">
              <organization/>
            </author>
            <author fullname="M. Ray" initials="M." surname="Ray">
              <organization/>
            </author>
            <date month="September" year="2015"/>
            <abstract>
              <t>The Transport Layer Security (TLS) master secret is not cryptographically bound to important session parameters such as the server certificate.  Consequently, it is possible for an active attacker to set up two sessions, one with a client and another with a server, such that the master secrets on the two sessions are the same.  Thereafter, any mechanism that relies on the master secret for authentication, including session resumption, becomes vulnerable to a man-in-the-middle attack, where the attacker can simply forward messages back and forth between the client and server.  This specification defines a TLS extension that contextually binds the master secret to a log of the full handshake that computes it, thus preventing such attacks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7627"/>
          <seriesInfo name="DOI" value="10.17487/RFC7627"/>
        </reference>
        <reference anchor="RFC8740" target="https://www.rfc-editor.org/info/rfc8740">
          <front>
            <title>Using TLS 1.3 with HTTP/2</title>
            <author fullname="D. Benjamin" initials="D." surname="Benjamin">
              <organization/>
            </author>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document updates RFC 7540 by forbidding TLS 1.3 post-handshake authentication, as an analog to the existing TLS 1.2 renegotiation restriction.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8740"/>
          <seriesInfo name="DOI" value="10.17487/RFC8740"/>
        </reference>
        <reference anchor="RFC7301" target="https://www.rfc-editor.org/info/rfc7301">
          <front>
            <title>Transport Layer Security (TLS) Application-Layer Protocol Negotiation Extension</title>
            <author fullname="S. Friedl" initials="S." surname="Friedl">
              <organization/>
            </author>
            <author fullname="A. Popov" initials="A." surname="Popov">
              <organization/>
            </author>
            <author fullname="A. Langley" initials="A." surname="Langley">
              <organization/>
            </author>
            <author fullname="E. Stephan" initials="E." surname="Stephan">
              <organization/>
            </author>
            <date month="July" year="2014"/>
            <abstract>
              <t>This document describes a Transport Layer Security (TLS) extension for application-layer protocol negotiation within the TLS handshake. For instances in which multiple application protocols are supported on the same TCP or UDP port, this extension allows the application layer to negotiate which protocol will be used within the TLS connection.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7301"/>
          <seriesInfo name="DOI" value="10.17487/RFC7301"/>
        </reference>
        <reference anchor="RFC3766" target="https://www.rfc-editor.org/info/rfc3766">
          <front>
            <title>Determining Strengths For Public Keys Used For Exchanging Symmetric Keys</title>
            <author fullname="H. Orman" initials="H." surname="Orman">
              <organization/>
            </author>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman">
              <organization/>
            </author>
            <date month="April" year="2004"/>
            <abstract>
              <t>Implementors of systems that use public key cryptography to exchange symmetric keys need to make the public keys resistant to some predetermined level of attack.  That level of attack resistance is the strength of the system, and the symmetric keys that are exchanged must be at least as strong as the system strength requirements.  The three quantities, system strength, symmetric key strength, and public key strength, must be consistently matched for any network protocol usage.  While it is fairly easy to express the system strength requirements in terms of a symmetric key length and to choose a cipher that has a key length equal to or exceeding that requirement, it is harder to choose a public key that has a cryptographic strength meeting a symmetric key strength requirement.  This document explains how to determine the length of an asymmetric key as a function of a symmetric key strength requirement.  Some rules of thumb for estimating equivalent resistance to large-scale attacks on various algorithms are given.  The document also addresses how changing the sizes of the underlying large integers (moduli, group sizes, exponents, and so on) changes the time to use the algorithms for key exchange.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="86"/>
          <seriesInfo name="RFC" value="3766"/>
          <seriesInfo name="DOI" value="10.17487/RFC3766"/>
        </reference>
        <reference anchor="RFC6979" target="https://www.rfc-editor.org/info/rfc6979">
          <front>
            <title>Deterministic Usage of the Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA)</title>
            <author fullname="T. Pornin" initials="T." surname="Pornin">
              <organization/>
            </author>
            <date month="August" year="2013"/>
            <abstract>
              <t>This document defines a deterministic digital signature generation procedure.  Such signatures are compatible with standard Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA) digital signatures and can be processed with unmodified verifiers, which need not be aware of the procedure described therein.  Deterministic signatures retain the cryptographic security features associated with digital signatures but can be more easily implemented in various environments, since they do not need access to a source of high-quality randomness.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6979"/>
          <seriesInfo name="DOI" value="10.17487/RFC6979"/>
        </reference>
        <reference anchor="RFC8422" target="https://www.rfc-editor.org/info/rfc8422">
          <front>
            <title>Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS) Versions 1.2 and Earlier</title>
            <author fullname="Y. Nir" initials="Y." surname="Nir">
              <organization/>
            </author>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson">
              <organization/>
            </author>
            <author fullname="M. Pegourie-Gonnard" initials="M." surname="Pegourie-Gonnard">
              <organization/>
            </author>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document describes key exchange algorithms based on Elliptic Curve Cryptography (ECC) for the Transport Layer Security (TLS) protocol.  In particular, it specifies the use of Ephemeral Elliptic Curve Diffie-Hellman (ECDHE) key agreement in a TLS handshake and the use of the Elliptic Curve Digital Signature Algorithm (ECDSA) and Edwards-curve Digital Signature Algorithm (EdDSA) as authentication mechanisms.</t>
              <t>This document obsoletes RFC 4492.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8422"/>
          <seriesInfo name="DOI" value="10.17487/RFC8422"/>
        </reference>
        <reference anchor="RFC7748" target="https://www.rfc-editor.org/info/rfc7748">
          <front>
            <title>Elliptic Curves for Security</title>
            <author fullname="A. Langley" initials="A." surname="Langley">
              <organization/>
            </author>
            <author fullname="M. Hamburg" initials="M." surname="Hamburg">
              <organization/>
            </author>
            <author fullname="S. Turner" initials="S." surname="Turner">
              <organization/>
            </author>
            <date month="January" year="2016"/>
            <abstract>
              <t>This memo specifies two elliptic curves over prime fields that offer a high level of practical security in cryptographic applications, including Transport Layer Security (TLS).  These curves are intended to operate at the ~128-bit and ~224-bit security level, respectively, and are generated deterministically based on a list of required properties.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7748"/>
          <seriesInfo name="DOI" value="10.17487/RFC7748"/>
        </reference>
        <reference anchor="RFC9155" target="https://www.rfc-editor.org/info/rfc9155">
          <front>
            <title>Deprecating MD5 and SHA-1 Signature Hashes in TLS 1.2 and DTLS 1.2</title>
            <author fullname="L. Velvindron" initials="L." surname="Velvindron">
              <organization/>
            </author>
            <author fullname="K. Moriarty" initials="K." surname="Moriarty">
              <organization/>
            </author>
            <author fullname="A. Ghedini" initials="A." surname="Ghedini">
              <organization/>
            </author>
            <date month="December" year="2021"/>
            <abstract>
              <t>The MD5 and SHA-1 hashing algorithms are increasingly vulnerable to attack, and this document deprecates their use in TLS 1.2 and DTLS 1.2 digital signatures. However, this document does not deprecate SHA-1 with Hashed Message Authentication Code (HMAC), as used in record protection. This document updates RFC 5246.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9155"/>
          <seriesInfo name="DOI" value="10.17487/RFC9155"/>
        </reference>
        <reference anchor="I-D.ietf-httpbis-semantics" target="https://www.ietf.org/archive/id/draft-ietf-httpbis-semantics-19.txt">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="Roy T. Fielding">
              <organization>Adobe</organization>
            </author>
            <author fullname="Mark Nottingham">
              <organization>Fastly</organization>
            </author>
            <author fullname="Julian Reschke">
              <organization>greenbytes GmbH</organization>
            </author>
            <date day="12" month="September" year="2021"/>
            <abstract>
              <t>   The Hypertext Transfer Protocol (HTTP) is a stateless application-
   level protocol for distributed, collaborative, hypertext information
   systems.  This document describes the overall architecture of HTTP,
   establishes common terminology, and defines aspects of the protocol
   that are shared by all versions.  In this definition are core
   protocol elements, extensibility mechanisms, and the "http" and
   "https" Uniform Resource Identifier (URI) schemes.

   This document updates RFC 3864 and obsoletes RFC 2818, RFC 7231, RFC
   7232, RFC 7233, RFC 7235, RFC 7538, RFC 7615, RFC 7694, and portions
   of RFC 7230.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-httpbis-semantics-19"/>
        </reference>
        <reference anchor="RFC6125" target="https://www.rfc-editor.org/info/rfc6125">
          <front>
            <title>Representation and Verification of Domain-Based Application Service Identity within Internet Public Key Infrastructure Using X.509 (PKIX) Certificates in the Context of Transport Layer Security (TLS)</title>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre">
              <organization/>
            </author>
            <author fullname="J. Hodges" initials="J." surname="Hodges">
              <organization/>
            </author>
            <date month="March" year="2011"/>
            <abstract>
              <t>Many application technologies enable secure communication between two entities by means of Internet Public Key Infrastructure Using X.509 (PKIX) certificates in the context of Transport Layer Security (TLS). This document specifies procedures for representing and verifying the identity of application services in such interactions.   [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6125"/>
          <seriesInfo name="DOI" value="10.17487/RFC6125"/>
        </reference>
        <reference anchor="RFC5288" target="https://www.rfc-editor.org/info/rfc5288">
          <front>
            <title>AES Galois Counter Mode (GCM) Cipher Suites for TLS</title>
            <author fullname="J. Salowey" initials="J." surname="Salowey">
              <organization/>
            </author>
            <author fullname="A. Choudhury" initials="A." surname="Choudhury">
              <organization/>
            </author>
            <author fullname="D. McGrew" initials="D." surname="McGrew">
              <organization/>
            </author>
            <date month="August" year="2008"/>
            <abstract>
              <t>This memo describes the use of the Advanced Encryption Standard (AES) in Galois/Counter Mode (GCM) as a Transport Layer Security (TLS) authenticated encryption operation.  GCM provides both confidentiality and data origin authentication, can be efficiently implemented in hardware for speeds of 10 gigabits per second and above, and is also well-suited to software implementations.  This memo defines TLS cipher suites that use AES-GCM with RSA, DSA, and Diffie-Hellman-based key exchange mechanisms.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5288"/>
          <seriesInfo name="DOI" value="10.17487/RFC5288"/>
        </reference>
        <reference anchor="RFC6066" target="https://www.rfc-editor.org/info/rfc6066">
          <front>
            <title>Transport Layer Security (TLS) Extensions: Extension Definitions</title>
            <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd">
              <organization/>
            </author>
            <date month="January" year="2011"/>
            <abstract>
              <t>This document provides specifications for existing TLS extensions.  It is a companion document for RFC 5246, "The Transport Layer Security (TLS) Protocol Version 1.2".  The extensions specified are server_name, max_fragment_length, client_certificate_url, trusted_ca_keys, truncated_hmac, and status_request.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6066"/>
          <seriesInfo name="DOI" value="10.17487/RFC6066"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="Chung18">
          <front>
            <title>Is the Web Ready for OCSP Must-Staple?</title>
            <author fullname="Taejoong Chung" initials="T." surname="Chung">
              <organization/>
            </author>
            <author fullname="Jay Lok" initials="J." surname="Lok">
              <organization/>
            </author>
            <author fullname="Balakrishnan Chandrasekaran" initials="B." surname="Chandrasekaran">
              <organization/>
            </author>
            <author fullname="David Choffnes" initials="D." surname="Choffnes">
              <organization/>
            </author>
            <author fullname="Dave Levin" initials="D." surname="Levin">
              <organization/>
            </author>
            <author fullname="Bruce M. Maggs" initials="B." surname="Maggs">
              <organization/>
            </author>
            <author fullname="Alan Mislove" initials="A." surname="Mislove">
              <organization/>
            </author>
            <author fullname="John Rula" initials="J." surname="Rula">
              <organization/>
            </author>
            <author fullname="Nick Sullivan" initials="N." surname="Sullivan">
              <organization/>
            </author>
            <author fullname="Christo Wilson" initials="C." surname="Wilson">
              <organization/>
            </author>
            <date month="October" year="2018"/>
          </front>
          <seriesInfo name="Proceedings of the Internet Measurement Conference" value="2018"/>
          <seriesInfo name="DOI" value="10.1145/3278532.3278543"/>
        </reference>
        <reference anchor="CRLite">
          <front>
            <title>CRLite: A Scalable System for Pushing All TLS Revocations to All Browsers</title>
            <author fullname="James Larisch" initials="J." surname="Larisch">
              <organization/>
            </author>
            <author fullname="David Choffnes" initials="D." surname="Choffnes">
              <organization/>
            </author>
            <author fullname="Dave Levin" initials="D." surname="Levin">
              <organization/>
            </author>
            <author fullname="Bruce M. Maggs" initials="B." surname="Maggs">
              <organization/>
            </author>
            <author fullname="Alan Mislove" initials="A." surname="Mislove">
              <organization/>
            </author>
            <author fullname="Christo Wilson" initials="C." surname="Wilson">
              <organization/>
            </author>
            <date month="May" year="2017"/>
          </front>
          <seriesInfo name="2017 IEEE Symposium on Security and Privacy" value="(SP)"/>
          <seriesInfo name="DOI" value="10.1109/sp.2017.17"/>
        </reference>
        <reference anchor="LetsRevoke">
          <front>
            <title>Let's Revoke: Scalable Global Certificate Revocation</title>
            <author fullname="Trevor Smith" initials="T." surname="Smith">
              <organization/>
            </author>
            <author fullname="Luke Dickinson" initials="L." surname="Dickinson">
              <organization/>
            </author>
            <author fullname="Kent Seamons" initials="K." surname="Seamons">
              <organization/>
            </author>
            <date year="2020"/>
          </front>
          <seriesInfo name="Proceedings 2020 Network and Distributed System Security" value="Symposium"/>
          <seriesInfo name="DOI" value="10.14722/ndss.2020.24084"/>
        </reference>
        <reference anchor="DegabrieleP07">
          <front>
            <title>Attacking the IPsec Standards in Encryption-only Configurations</title>
            <author fullname="Jean Paul Degabriele" initials="J." surname="Degabriele">
              <organization/>
            </author>
            <author fullname="Kenneth G. Paterson" initials="K." surname="Paterson">
              <organization/>
            </author>
            <date month="May" year="2007"/>
          </front>
          <seriesInfo name="2007 IEEE Symposium on Security and Privacy (SP" value="'07)"/>
          <seriesInfo name="DOI" value="10.1109/sp.2007.8"/>
        </reference>
        <reference anchor="triple-handshake">
          <front>
            <title>Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS</title>
            <author fullname="Karthikeyan Bhargavan" initials="K." surname="Bhargavan">
              <organization/>
            </author>
            <author fullname="Antoine Delignat Lavaud" initials="A." surname="Lavaud">
              <organization/>
            </author>
            <author fullname="Cedric Fournet" initials="C." surname="Fournet">
              <organization/>
            </author>
            <author fullname="Alfredo Pironti" initials="A." surname="Pironti">
              <organization/>
            </author>
            <author fullname="Pierre Yves Strub" initials="P." surname="Strub">
              <organization/>
            </author>
            <date month="May" year="2014"/>
          </front>
          <seriesInfo name="2014 IEEE Symposium on Security and" value="Privacy"/>
          <seriesInfo name="DOI" value="10.1109/sp.2014.14"/>
        </reference>
        <reference anchor="Soghoian2011">
          <front>
            <title>Certified Lies: Detecting and Defeating Government Interception Attacks Against SSL</title>
            <author fullname="Christopher Soghoian" initials="C." surname="Soghoian">
              <organization/>
            </author>
            <author fullname="Sid Stamm" initials="S." surname="Stamm">
              <organization/>
            </author>
            <date year="2010"/>
          </front>
          <seriesInfo name="SSRN Electronic" value="Journal"/>
          <seriesInfo name="DOI" value="10.2139/ssrn.1591033"/>
        </reference>
        <reference anchor="Logjam">
          <front>
            <title>Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice</title>
            <author fullname="David Adrian" initials="D." surname="Adrian">
              <organization/>
            </author>
            <author fullname="Karthikeyan Bhargavan" initials="K." surname="Bhargavan">
              <organization/>
            </author>
            <author fullname="Zakir Durumeric" initials="Z." surname="Durumeric">
              <organization/>
            </author>
            <author fullname="Pierrick Gaudry" initials="P." surname="Gaudry">
              <organization/>
            </author>
            <author fullname="Matthew Green" initials="M." surname="Green">
              <organization/>
            </author>
            <author fullname="J. Alex Halderman" initials="J." surname="Halderman">
              <organization/>
            </author>
            <author fullname="Nadia Heninger" initials="N." surname="Heninger">
              <organization/>
            </author>
            <author fullname="Drew Springall" initials="D." surname="Springall">
              <organization/>
            </author>
            <author fullname="Emmanuel Thomé" initials="E." surname="Thomé">
              <organization/>
            </author>
            <author fullname="Luke Valenta" initials="L." surname="Valenta">
              <organization/>
            </author>
            <author fullname="Benjamin VanderSloot" initials="B." surname="VanderSloot">
              <organization/>
            </author>
            <author fullname="Eric Wustrow" initials="E." surname="Wustrow">
              <organization/>
            </author>
            <author fullname="Santiago Zanella-Béguelin" initials="S." surname="Zanella-Béguelin">
              <organization/>
            </author>
            <author fullname="Paul Zimmermann" initials="P." surname="Zimmermann">
              <organization/>
            </author>
            <date month="October" year="2015"/>
          </front>
          <seriesInfo name="Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications" value="Security"/>
          <seriesInfo name="DOI" value="10.1145/2810103.2813707"/>
        </reference>
        <reference anchor="POODLE" target="https://www.us-cert.gov/ncas/alerts/TA14-290A">
          <front>
            <title>SSL 3.0 Protocol Vulnerability and POODLE Attack</title>
            <author>
              <organization>US-CERT</organization>
            </author>
            <date year="2014" month="October"/>
          </front>
        </reference>
        <reference anchor="CAB-Baseline" target="https://www.cabforum.org/documents.html">
          <front>
            <title>Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates Version 1.1.6</title>
            <author>
              <organization>CA/Browser Forum</organization>
            </author>
            <date year="2013"/>
          </front>
        </reference>
        <reference anchor="Heninger2012">
          <front>
            <title>Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices</title>
            <author initials="N." surname="Heninger" fullname="Nadia Heninger">
              <organization/>
            </author>
            <author initials="Z." surname="Durumeric" fullname="Zakir Durumeric">
              <organization/>
            </author>
            <author initials="E." surname="Wustrow" fullname="Eric Wustrow">
              <organization/>
            </author>
            <author initials="J.A." surname="Halderman" fullname="J. Alex Halderman">
              <organization/>
            </author>
            <date year="2012"/>
          </front>
          <seriesInfo name="Usenix Security Symposium" value="2012"/>
        </reference>
        <reference anchor="Sy2018">
          <front>
            <title>Tracking Users across the Web via TLS Session Resumption</title>
            <author fullname="Erik Sy" initials="E." surname="Sy">
              <organization/>
            </author>
            <author fullname="Christian Burkert" initials="C." surname="Burkert">
              <organization/>
            </author>
            <author fullname="Hannes Federrath" initials="H." surname="Federrath">
              <organization/>
            </author>
            <author fullname="Mathias Fischer" initials="M." surname="Fischer">
              <organization/>
            </author>
            <date month="December" year="2018"/>
          </front>
          <seriesInfo name="Proceedings of the 34th Annual Computer Security Applications" value="Conference"/>
          <seriesInfo name="DOI" value="10.1145/3274694.3274708"/>
        </reference>
        <reference anchor="DANE-SMTP" target="https://www.rfc-editor.org/info/rfc7672">
          <front>
            <title>SMTP Security via Opportunistic DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS)</title>
            <author fullname="V. Dukhovni" initials="V." surname="Dukhovni">
              <organization/>
            </author>
            <author fullname="W. Hardaker" initials="W." surname="Hardaker">
              <organization/>
            </author>
            <date month="October" year="2015"/>
            <abstract>
              <t>This memo describes a downgrade-resistant protocol for SMTP transport security between Message Transfer Agents (MTAs), based on the DNS-Based Authentication of Named Entities (DANE) TLSA DNS record. Adoption of this protocol enables an incremental transition of the Internet email backbone to one using encrypted and authenticated Transport Layer Security (TLS).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7672"/>
          <seriesInfo name="DOI" value="10.17487/RFC7672"/>
        </reference>
        <reference anchor="PatersonRS11">
          <front>
            <title>Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol</title>
            <author fullname="Kenneth G. Paterson" initials="K." surname="Paterson">
              <organization/>
            </author>
            <author fullname="Thomas Ristenpart" initials="T." surname="Ristenpart">
              <organization/>
            </author>
            <author fullname="Thomas Shrimpton" initials="T." surname="Shrimpton">
              <organization/>
            </author>
            <date year="2011"/>
          </front>
          <seriesInfo name="Lecture Notes in Computer Science" value="pp. 372-389"/>
          <seriesInfo name="DOI" value="10.1007/978-3-642-25385-0_20"/>
        </reference>
        <reference anchor="DANE-SRV" target="https://www.rfc-editor.org/info/rfc7673">
          <front>
            <title>Using DNS-Based Authentication of Named Entities (DANE) TLSA Records with SRV Records</title>
            <author fullname="T. Finch" initials="T." surname="Finch">
              <organization/>
            </author>
            <author fullname="M. Miller" initials="M." surname="Miller">
              <organization/>
            </author>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre">
              <organization/>
            </author>
            <date month="October" year="2015"/>
            <abstract>
              <t>The DNS-Based Authentication of Named Entities (DANE) specification (RFC 6698) describes how to use TLSA resource records secured by DNSSEC (RFC 4033) to associate a server's connection endpoint with its Transport Layer Security (TLS) certificate (thus enabling administrators of domain names to specify the keys used in that domain's TLS servers).  However, application protocols that use SRV records (RFC 2782) to indirectly name the target server connection endpoints for a service domain name cannot apply the rules from RFC 6698.  Therefore, this document provides guidelines that enable such protocols to locate and use TLSA records.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7673"/>
          <seriesInfo name="DOI" value="10.17487/RFC7673"/>
        </reference>
        <reference anchor="Kleinjung2010">
          <front>
            <title>Factorization of a 768-Bit RSA Modulus</title>
            <author fullname="Thorsten Kleinjung" initials="T." surname="Kleinjung">
              <organization/>
            </author>
            <author fullname="Kazumaro Aoki" initials="K." surname="Aoki">
              <organization/>
            </author>
            <author fullname="Jens Franke" initials="J." surname="Franke">
              <organization/>
            </author>
            <author fullname="Arjen K. Lenstra" initials="A." surname="Lenstra">
              <organization/>
            </author>
            <author fullname="Emmanuel Thomé" initials="E." surname="Thomé">
              <organization/>
            </author>
            <author fullname="Joppe W. Bos" initials="J." surname="Bos">
              <organization/>
            </author>
            <author fullname="Pierrick Gaudry" initials="P." surname="Gaudry">
              <organization/>
            </author>
            <author fullname="Alexander Kruppa" initials="A." surname="Kruppa">
              <organization/>
            </author>
            <author fullname="Peter L. Montgomery" initials="P." surname="Montgomery">
              <organization/>
            </author>
            <author fullname="Dag Arne Osvik" initials="D." surname="Osvik">
              <organization/>
            </author>
            <author fullname="Herman te Riele" initials="H." surname="te Riele">
              <organization/>
            </author>
            <author fullname="Andrey Timofeev" initials="A." surname="Timofeev">
              <organization/>
            </author>
            <author fullname="Paul Zimmermann" initials="P." surname="Zimmermann">
              <organization/>
            </author>
            <date year="2010"/>
          </front>
          <seriesInfo name="Advances in Cryptology - CRYPTO 2010" value="pp. 333-350"/>
          <seriesInfo name="DOI" value="10.1007/978-3-642-14623-7_18"/>
        </reference>
        <reference anchor="IANA_TLS" target="https://www.iana.org/assignments/tls-parameters">
          <front>
            <title>Transport Layer Security (TLS) Parameters</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="Multiple-Encryption">
          <front>
            <title>On the security of multiple encryption</title>
            <author fullname="Ralph C. Merkle" initials="R." surname="Merkle">
              <organization/>
            </author>
            <author fullname="Martin E. Hellman" initials="M." surname="Hellman">
              <organization/>
            </author>
            <date month="July" year="1981"/>
          </front>
          <seriesInfo name="Communications of the ACM" value="Vol. 24, pp. 465-467"/>
          <seriesInfo name="DOI" value="10.1145/358699.358718"/>
        </reference>
        <reference anchor="BETTERCRYPTO" target="https://bettercrypto.org/">
          <front>
            <title>Applied Crypto Hardening</title>
            <author>
              <organization>bettercrypto.org</organization>
            </author>
            <date year="2015" month="April"/>
          </front>
        </reference>
        <reference anchor="NIST.SP.800-56A">
          <front>
            <title>Recommendation for pair-wise key-establishment schemes using discrete logarithm cryptography</title>
            <author fullname="Elaine Barker" initials="E." surname="Barker">
              <organization/>
            </author>
            <author fullname="Lily Chen" initials="L." surname="Chen">
              <organization/>
            </author>
            <author fullname="Allen Roginsky" initials="A." surname="Roginsky">
              <organization/>
            </author>
            <author fullname="Apostol Vassilev" initials="A." surname="Vassilev">
              <organization/>
            </author>
            <author fullname="Richard Davis" initials="R." surname="Davis">
              <organization/>
            </author>
            <date month="April" year="2018"/>
          </front>
          <seriesInfo name="National Institute of Standards and Technology" value="report"/>
          <seriesInfo name="DOI" value="10.6028/nist.sp.800-56ar3"/>
        </reference>
        <reference anchor="Springall16">
          <front>
            <title>Measuring the Security Harm of TLS Crypto Shortcuts</title>
            <author fullname="Drew Springall" initials="D." surname="Springall">
              <organization/>
            </author>
            <author fullname="Zakir Durumeric" initials="Z." surname="Durumeric">
              <organization/>
            </author>
            <author fullname="J. Alex Halderman" initials="J." surname="Halderman">
              <organization/>
            </author>
            <date month="November" year="2016"/>
          </front>
          <seriesInfo name="Proceedings of the 2016 Internet Measurement" value="Conference"/>
          <seriesInfo name="DOI" value="10.1145/2987443.2987480"/>
        </reference>
        <reference anchor="DEP-SSLv3" target="https://www.rfc-editor.org/info/rfc7568">
          <front>
            <title>Deprecating Secure Sockets Layer Version 3.0</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes">
              <organization/>
            </author>
            <author fullname="M. Thomson" initials="M." surname="Thomson">
              <organization/>
            </author>
            <author fullname="A. Pironti" initials="A." surname="Pironti">
              <organization/>
            </author>
            <author fullname="A. Langley" initials="A." surname="Langley">
              <organization/>
            </author>
            <date month="June" year="2015"/>
            <abstract>
              <t>The Secure Sockets Layer version 3.0 (SSLv3), as specified in RFC 6101, is not sufficiently secure.  This document requires that SSLv3 not be used.  The replacement versions, in particular, Transport Layer Security (TLS) 1.2 (RFC 5246), are considerably more secure and capable protocols.</t>
              <t>This document updates the backward compatibility section of RFC 5246 and its predecessors to prohibit fallback to SSLv3.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7568"/>
          <seriesInfo name="DOI" value="10.17487/RFC7568"/>
        </reference>
        <reference anchor="Boeck2016" target="https://eprint.iacr.org/2016/475.pdf">
          <front>
            <title>Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS</title>
            <author initials="H." surname="Böck" fullname="Hanno Böck">
              <organization/>
            </author>
            <author initials="A." surname="Zauner" fullname="Aaron Zauner">
              <organization/>
            </author>
            <author initials="S." surname="Devlin" fullname="Sean Devlin">
              <organization/>
            </author>
            <author initials="J." surname="Somorovsky" fullname="Juraj Somorovsky">
              <organization/>
            </author>
            <author initials="P." surname="Jovanovic" fullname="Philipp Jovanovic">
              <organization/>
            </author>
            <date year="2016" month="May"/>
          </front>
        </reference>
        <reference anchor="Joux2006" target="https://csrc.nist.gov/csrc/media/projects/block-cipher-techniques/documents/bcm/comments/800-38-series-drafts/gcm/joux_comments.pdf">
          <front>
            <title>Authentication Failures in NIST version of GCM</title>
            <author initials="A." surname="Joux" fullname="Antoine Joux">
              <organization/>
            </author>
            <date year="2006"/>
          </front>
        </reference>
        <reference anchor="CVE" target="https://cve.mitre.org">
          <front>
            <title>Common Vulnerabilities and Exposures</title>
            <author>
              <organization>MITRE</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="ALPACA" target="https://www.usenix.org/conference/usenixsecurity21/presentation/brinkmann">
          <front>
            <title>ALPACA: Application Layer Protocol Confusion - Analyzing and Mitigating Cracks in TLS Authentication</title>
            <author initials="M." surname="Brinkmann" fullname="Marcus Brinkmann">
              <organization/>
            </author>
            <author initials="C." surname="Dresen" fullname="Christian Dresen">
              <organization/>
            </author>
            <author initials="R." surname="Merget" fullname="Robert Merget">
              <organization/>
            </author>
            <author initials="D." surname="Poddebniak" fullname="Damian Poddebniak">
              <organization/>
            </author>
            <author initials="J." surname="Müller" fullname="Jens Müller">
              <organization/>
            </author>
            <author initials="J." surname="Somorovsky" fullname="Juraj Somorovsky">
              <organization/>
            </author>
            <author initials="J." surname="Schwenk" fullname="Jörg Schwenk">
              <organization/>
            </author>
            <author initials="S." surname="Schinzel" fullname="Sebastian Schinzel">
              <organization/>
            </author>
            <date year="2021"/>
          </front>
          <seriesInfo name="30th USENIX Security Symposium (USENIX Security 21)" value=""/>
        </reference>
        <reference anchor="RACCOON" target="https://www.usenix.org/conference/usenixsecurity21/presentation/merget">
          <front>
            <title>Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E)</title>
            <author initials="R." surname="Merget" fullname="Robert Merget">
              <organization/>
            </author>
            <author initials="M." surname="Brinkmann" fullname="Marcus Brinkmann">
              <organization/>
            </author>
            <author initials="N." surname="Aviram" fullname="Nimrod Aviram">
              <organization/>
            </author>
            <author initials="J." surname="Somorovsky" fullname="Juraj Somorovsky">
              <organization/>
            </author>
            <author initials="J." surname="Mittmann" fullname="Johannes Mittmann">
              <organization/>
            </author>
            <author initials="J." surname="Schwenk" fullname="Jörg Schwenk">
              <organization/>
            </author>
            <date year="2021"/>
          </front>
          <seriesInfo name="30th USENIX Security Symposium (USENIX Security 21)" value=""/>
        </reference>
        <reference anchor="Antipa2003">
          <front>
            <title>Validation of Elliptic Curve Public Keys</title>
            <author initials="A." surname="Antipa" fullname="Adrian Antipa">
              <organization/>
            </author>
            <author initials="D.R.L." surname="Brown" fullname="Daniel R. L. Brown">
              <organization/>
            </author>
            <author initials="A." surname="Menezes" fullname="Alfred Menezes">
              <organization/>
            </author>
            <author initials="R." surname="Struik" fullname="Rene Struik">
              <organization/>
            </author>
            <author initials="S.A." surname="Vanstone" fullname="Scott A. Vanstone">
              <organization/>
            </author>
            <date year="2003"/>
          </front>
          <seriesInfo name="Public Key Cryptography - PKC 2003" value=""/>
        </reference>
        <reference anchor="Jager2015">
          <front>
            <title>Practical Invalid Curve Attacks on TLS-ECDH</title>
            <author initials="T." surname="Jager" fullname="Tibor Jager">
              <organization/>
            </author>
            <author initials="J." surname="Schwenk" fullname="Jorg Schwenk">
              <organization/>
            </author>
            <author initials="J." surname="Somorovsky" fullname="Juraj Somorovsky">
              <organization/>
            </author>
            <date year="2015"/>
          </front>
          <seriesInfo name="European Symposium on Research in Computer Security (ESORICS) 2015" value=""/>
        </reference>
        <reference anchor="SAFECURVES" target="https://safecurves.cr.yp.to">
          <front>
            <title>SafeCurves: Choosing Safe Curves for Elliptic-Curve Cryptography</title>
            <author initials="D.J." surname="Bernstein" fullname="Daniel J. Bernstein">
              <organization/>
            </author>
            <author initials="T." surname="Lange" fullname="Tanja Lange">
              <organization/>
            </author>
            <date year="2014" month="December"/>
          </front>
        </reference>
        <reference anchor="RFC3602" target="https://www.rfc-editor.org/info/rfc3602">
          <front>
            <title>The AES-CBC Cipher Algorithm and Its Use with IPsec</title>
            <author fullname="S. Frankel" initials="S." surname="Frankel">
              <organization/>
            </author>
            <author fullname="R. Glenn" initials="R." surname="Glenn">
              <organization/>
            </author>
            <author fullname="S. Kelly" initials="S." surname="Kelly">
              <organization/>
            </author>
            <date month="September" year="2003"/>
            <abstract>
              <t>This document describes the use of the Advanced Encryption Standard (AES) Cipher Algorithm in Cipher Block Chaining (CBC) Mode, with an explicit Initialization Vector (IV), as a confidentiality mechanism within the context of the IPsec Encapsulating Security Payload (ESP).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3602"/>
          <seriesInfo name="DOI" value="10.17487/RFC3602"/>
        </reference>
        <reference anchor="RFC7457" target="https://www.rfc-editor.org/info/rfc7457">
          <front>
            <title>Summarizing Known Attacks on Transport Layer Security (TLS) and Datagram TLS (DTLS)</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer">
              <organization/>
            </author>
            <author fullname="R. Holz" initials="R." surname="Holz">
              <organization/>
            </author>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre">
              <organization/>
            </author>
            <date month="February" year="2015"/>
            <abstract>
              <t>Over the last few years, there have been several serious attacks on Transport Layer Security (TLS), including attacks on its most commonly used ciphers and modes of operation.  This document summarizes these attacks, with the goal of motivating generic and protocol-specific recommendations on the usage of TLS and Datagram TLS (DTLS).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7457"/>
          <seriesInfo name="DOI" value="10.17487/RFC7457"/>
        </reference>
        <reference anchor="RFC7525" target="https://www.rfc-editor.org/info/rfc7525">
          <front>
            <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer">
              <organization/>
            </author>
            <author fullname="R. Holz" initials="R." surname="Holz">
              <organization/>
            </author>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre">
              <organization/>
            </author>
            <date month="May" year="2015"/>
            <abstract>
              <t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are widely used to protect data exchanged over application protocols such as HTTP, SMTP, IMAP, POP, SIP, and XMPP.  Over the last few years, several serious attacks on TLS have emerged, including attacks on its most commonly used cipher suites and their modes of operation.  This document provides recommendations for improving the security of deployed services that use TLS and DTLS. The recommendations are applicable to the majority of use cases.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="195"/>
          <seriesInfo name="RFC" value="7525"/>
          <seriesInfo name="DOI" value="10.17487/RFC7525"/>
        </reference>
        <reference anchor="RFC4949" target="https://www.rfc-editor.org/info/rfc4949">
          <front>
            <title>Internet Security Glossary, Version 2</title>
            <author fullname="R. Shirey" initials="R." surname="Shirey">
              <organization/>
            </author>
            <date month="August" year="2007"/>
            <abstract>
              <t>This Glossary provides definitions, abbreviations, and explanations of terminology for information system security. The 334 pages of entries offer recommendations to improve the comprehensibility of written material that is generated in the Internet Standards Process (RFC 2026). The recommendations follow the principles that such writing should (a) use the same term or definition whenever the same concept is mentioned; (b) use terms in their plainest, dictionary sense; (c) use terms that are already well-established in open publications; and (d) avoid terms that either favor a particular vendor or favor a particular technology or mechanism over other, competing techniques that already exist or could be developed.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="FYI" value="36"/>
          <seriesInfo name="RFC" value="4949"/>
          <seriesInfo name="DOI" value="10.17487/RFC4949"/>
        </reference>
        <reference anchor="RFC6101" target="https://www.rfc-editor.org/info/rfc6101">
          <front>
            <title>The Secure Sockets Layer (SSL) Protocol Version 3.0</title>
            <author fullname="A. Freier" initials="A." surname="Freier">
              <organization/>
            </author>
            <author fullname="P. Karlton" initials="P." surname="Karlton">
              <organization/>
            </author>
            <author fullname="P. Kocher" initials="P." surname="Kocher">
              <organization/>
            </author>
            <date month="August" year="2011"/>
            <abstract>
              <t>This document is published as a historical record of the SSL 3.0 protocol.  The original Abstract follows.</t>
              <t>This document specifies version 3.0 of the Secure Sockets Layer (SSL 3.0) protocol, a security protocol that provides communications privacy over the Internet.  The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.  This document defines a  Historic Document for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6101"/>
          <seriesInfo name="DOI" value="10.17487/RFC6101"/>
        </reference>
        <reference anchor="RFC2246" target="https://www.rfc-editor.org/info/rfc2246">
          <front>
            <title>The TLS Protocol Version 1.0</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks">
              <organization/>
            </author>
            <author fullname="C. Allen" initials="C." surname="Allen">
              <organization/>
            </author>
            <date month="January" year="1999"/>
            <abstract>
              <t>This document specifies Version 1.0 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications privacy over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2246"/>
          <seriesInfo name="DOI" value="10.17487/RFC2246"/>
        </reference>
        <reference anchor="RFC4346" target="https://www.rfc-editor.org/info/rfc4346">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.1</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks">
              <organization/>
            </author>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="April" year="2006"/>
            <abstract>
              <t>This document specifies Version 1.1 of the Transport Layer Security (TLS) protocol.  The TLS protocol provides communications security over the Internet.  The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4346"/>
          <seriesInfo name="DOI" value="10.17487/RFC4346"/>
        </reference>
        <reference anchor="RFC9001" target="https://www.rfc-editor.org/info/rfc9001">
          <front>
            <title>Using TLS to Secure QUIC</title>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson">
              <organization/>
            </author>
            <author fullname="S. Turner" initials="S." role="editor" surname="Turner">
              <organization/>
            </author>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document describes how Transport Layer Security (TLS) is used to secure QUIC.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9001"/>
          <seriesInfo name="DOI" value="10.17487/RFC9001"/>
        </reference>
        <reference anchor="RFC4347" target="https://www.rfc-editor.org/info/rfc4347">
          <front>
            <title>Datagram Transport Layer Security</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu">
              <organization/>
            </author>
            <date month="April" year="2006"/>
            <abstract>
              <t>This document specifies Version 1.0 of the Datagram Transport Layer Security (DTLS) protocol.  The DTLS protocol provides communications privacy for datagram protocols.  The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.  The DTLS protocol is based on the Transport Layer Security (TLS) protocol and provides equivalent security guarantees.  Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4347"/>
          <seriesInfo name="DOI" value="10.17487/RFC4347"/>
        </reference>
        <reference anchor="RFC7507" target="https://www.rfc-editor.org/info/rfc7507">
          <front>
            <title>TLS Fallback Signaling Cipher Suite Value (SCSV) for Preventing Protocol Downgrade Attacks</title>
            <author fullname="B. Moeller" initials="B." surname="Moeller">
              <organization/>
            </author>
            <author fullname="A. Langley" initials="A." surname="Langley">
              <organization/>
            </author>
            <date month="April" year="2015"/>
            <abstract>
              <t>This document defines a Signaling Cipher Suite Value (SCSV) that prevents protocol downgrade attacks on the Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) protocols.  It updates RFCs 2246, 4346, 4347, 5246, and 6347.  Server update considerations are included.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7507"/>
          <seriesInfo name="DOI" value="10.17487/RFC7507"/>
        </reference>
        <reference anchor="RFC6797" target="https://www.rfc-editor.org/info/rfc6797">
          <front>
            <title>HTTP Strict Transport Security (HSTS)</title>
            <author fullname="J. Hodges" initials="J." surname="Hodges">
              <organization/>
            </author>
            <author fullname="C. Jackson" initials="C." surname="Jackson">
              <organization/>
            </author>
            <author fullname="A. Barth" initials="A." surname="Barth">
              <organization/>
            </author>
            <date month="November" year="2012"/>
            <abstract>
              <t>This specification defines a mechanism enabling web sites to declare themselves accessible only via secure connections and/or for users to be able to direct their user agent(s) to interact with given sites only over secure connections.  This overall policy is referred to as HTTP Strict Transport Security (HSTS).  The policy is declared by web sites via the Strict-Transport-Security HTTP response header field and/or by other means, such as user agent configuration, for example. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6797"/>
          <seriesInfo name="DOI" value="10.17487/RFC6797"/>
        </reference>
        <reference anchor="RFC5077" target="https://www.rfc-editor.org/info/rfc5077">
          <front>
            <title>Transport Layer Security (TLS) Session Resumption without Server-Side State</title>
            <author fullname="J. Salowey" initials="J." surname="Salowey">
              <organization/>
            </author>
            <author fullname="H. Zhou" initials="H." surname="Zhou">
              <organization/>
            </author>
            <author fullname="P. Eronen" initials="P." surname="Eronen">
              <organization/>
            </author>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig">
              <organization/>
            </author>
            <date month="January" year="2008"/>
            <abstract>
              <t>This document describes a mechanism that enables the Transport Layer Security (TLS) server to resume sessions and avoid keeping per-client session state.  The TLS server encapsulates the session state into a ticket and forwards it to the client.  The client can subsequently resume a session using the obtained ticket.  This document obsoletes RFC 4507.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5077"/>
          <seriesInfo name="DOI" value="10.17487/RFC5077"/>
        </reference>
        <reference anchor="I-D.ietf-tls-esni" target="https://www.ietf.org/archive/id/draft-ietf-tls-esni-14.txt">
          <front>
            <title>TLS Encrypted Client Hello</title>
            <author fullname="Eric Rescorla">
              <organization>RTFM, Inc.</organization>
            </author>
            <author fullname="Kazuho Oku">
              <organization>Fastly</organization>
            </author>
            <author fullname="Nick Sullivan">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Christopher A. Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="13" month="February" year="2022"/>
            <abstract>
              <t>   This document describes a mechanism in Transport Layer Security (TLS)
   for encrypting a ClientHello message under a server public key.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/tlswg/draft-ietf-tls-esni
   (https://github.com/tlswg/draft-ietf-tls-esni).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-esni-14"/>
        </reference>
        <reference anchor="RFC8470" target="https://www.rfc-editor.org/info/rfc8470">
          <front>
            <title>Using Early Data in HTTP</title>
            <author fullname="M. Thomson" initials="M." surname="Thomson">
              <organization/>
            </author>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham">
              <organization/>
            </author>
            <author fullname="W. Tarreau" initials="W." surname="Tarreau">
              <organization/>
            </author>
            <date month="September" year="2018"/>
            <abstract>
              <t>Using TLS early data creates an exposure to the possibility of a replay attack.  This document defines mechanisms that allow clients to communicate with servers about HTTP requests that are sent in early data.  Techniques are described that use these mechanisms to mitigate the risk of replay.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8470"/>
          <seriesInfo name="DOI" value="10.17487/RFC8470"/>
        </reference>
        <reference anchor="RFC7919" target="https://www.rfc-editor.org/info/rfc7919">
          <front>
            <title>Negotiated Finite Field Diffie-Hellman Ephemeral Parameters for Transport Layer Security (TLS)</title>
            <author fullname="D. Gillmor" initials="D." surname="Gillmor">
              <organization/>
            </author>
            <date month="August" year="2016"/>
            <abstract>
              <t>Traditional finite-field-based Diffie-Hellman (DH) key exchange during the Transport Layer Security (TLS) handshake suffers from a number of security, interoperability, and efficiency shortcomings. These shortcomings arise from lack of clarity about which DH group parameters TLS servers should offer and clients should accept.  This document offers a solution to these shortcomings for compatible peers by using a section of the TLS "Supported Groups Registry" (renamed from "EC Named Curve Registry" by this document) to establish common finite field DH parameters with known structure and a mechanism for peers to negotiate support for these groups.</t>
              <t>This document updates TLS versions 1.0 (RFC 2246), 1.1 (RFC 4346), and 1.2 (RFC 5246), as well as the TLS Elliptic Curve Cryptography (ECC) extensions (RFC 4492).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7919"/>
          <seriesInfo name="DOI" value="10.17487/RFC7919"/>
        </reference>
        <reference anchor="RFC5116" target="https://www.rfc-editor.org/info/rfc5116">
          <front>
            <title>An Interface and Algorithms for Authenticated Encryption</title>
            <author fullname="D. McGrew" initials="D." surname="McGrew">
              <organization/>
            </author>
            <date month="January" year="2008"/>
            <abstract>
              <t>This document defines algorithms for Authenticated Encryption with Associated Data (AEAD), and defines a uniform interface and a registry for such algorithms.  The interface and registry can be used as an application-independent set of cryptoalgorithm suites.  This approach provides advantages in efficiency and security, and promotes the reuse of crypto implementations.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5116"/>
          <seriesInfo name="DOI" value="10.17487/RFC5116"/>
        </reference>
        <reference anchor="I-D.irtf-cfrg-aead-limits" target="https://www.ietf.org/archive/id/draft-irtf-cfrg-aead-limits-04.txt">
          <front>
            <title>Usage Limits on AEAD Algorithms</title>
            <author fullname="Felix Günther">
              <organization>ETH Zurich</organization>
            </author>
            <author fullname="Martin Thomson">
              <organization>Mozilla</organization>
            </author>
            <author fullname="Christopher A. Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="7" month="March" year="2022"/>
            <abstract>
              <t>   An Authenticated Encryption with Associated Data (AEAD) algorithm
   provides confidentiality and integrity.  Excessive use of the same
   key can give an attacker advantages in breaking these properties.
   This document provides simple guidance for users of common AEAD
   functions about how to limit the use of keys in order to bound the
   advantage given to an attacker.  It considers limits in both single-
   and multi-key settings.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-cfrg-aead-limits-04"/>
        </reference>
        <reference anchor="RFC7590" target="https://www.rfc-editor.org/info/rfc7590">
          <front>
            <title>Use of Transport Layer Security (TLS) in the Extensible Messaging and Presence Protocol (XMPP)</title>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre">
              <organization/>
            </author>
            <author fullname="T. Alkemade" initials="T." surname="Alkemade">
              <organization/>
            </author>
            <date month="June" year="2015"/>
            <abstract>
              <t>This document provides recommendations for the use of Transport Layer Security (TLS) in the Extensible Messaging and Presence Protocol (XMPP).  This document updates RFC 6120.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7590"/>
          <seriesInfo name="DOI" value="10.17487/RFC7590"/>
        </reference>
        <reference anchor="RFC6120" target="https://www.rfc-editor.org/info/rfc6120">
          <front>
            <title>Extensible Messaging and Presence Protocol (XMPP): Core</title>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre">
              <organization/>
            </author>
            <date month="March" year="2011"/>
            <abstract>
              <t>The Extensible Messaging and Presence Protocol (XMPP) is an application profile of the Extensible Markup Language (XML) that enables the near-real-time exchange of structured yet extensible data between any two or more network entities.  This document defines XMPP's core protocol methods: setup and teardown of XML streams, channel encryption, authentication, error handling, and communication primitives for messaging, network availability ("presence"), and request-response interactions.  This document obsoletes RFC 3920.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6120"/>
          <seriesInfo name="DOI" value="10.17487/RFC6120"/>
        </reference>
        <reference anchor="RFC2026" target="https://www.rfc-editor.org/info/rfc2026">
          <front>
            <title>The Internet Standards Process -- Revision 3</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="October" year="1996"/>
            <abstract>
              <t>This memo documents the process used by the Internet community for the standardization of protocols and procedures.  It defines the stages in the standardization process, the requirements for moving a document between stages and the types of documents used during this process. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="9"/>
          <seriesInfo name="RFC" value="2026"/>
          <seriesInfo name="DOI" value="10.17487/RFC2026"/>
        </reference>
        <reference anchor="RFC7435" target="https://www.rfc-editor.org/info/rfc7435">
          <front>
            <title>Opportunistic Security: Some Protection Most of the Time</title>
            <author fullname="V. Dukhovni" initials="V." surname="Dukhovni">
              <organization/>
            </author>
            <date month="December" year="2014"/>
            <abstract>
              <t>This document defines the concept "Opportunistic Security" in the context of communications protocols.  Protocol designs based on Opportunistic Security use encryption even when authentication is not available, and use authentication when possible, thereby removing barriers to the widespread use of encryption on the Internet.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7435"/>
          <seriesInfo name="DOI" value="10.17487/RFC7435"/>
        </reference>
        <reference anchor="RFC5280" target="https://www.rfc-editor.org/info/rfc5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper">
              <organization/>
            </author>
            <author fullname="S. Santesson" initials="S." surname="Santesson">
              <organization/>
            </author>
            <author fullname="S. Farrell" initials="S." surname="Farrell">
              <organization/>
            </author>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen">
              <organization/>
            </author>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <author fullname="W. Polk" initials="W." surname="Polk">
              <organization/>
            </author>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet.  An overview of this approach and model is provided as an introduction.  The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms.  Standard certificate extensions are described and two Internet-specific extensions are defined.  A set of required certificate extensions is specified.  The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions.  An algorithm for X.509 certification path validation is described.  An ASN.1 module and examples are provided in the appendices.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC8452" target="https://www.rfc-editor.org/info/rfc8452">
          <front>
            <title>AES-GCM-SIV: Nonce Misuse-Resistant Authenticated Encryption</title>
            <author fullname="S. Gueron" initials="S." surname="Gueron">
              <organization/>
            </author>
            <author fullname="A. Langley" initials="A." surname="Langley">
              <organization/>
            </author>
            <author fullname="Y. Lindell" initials="Y." surname="Lindell">
              <organization/>
            </author>
            <date month="April" year="2019"/>
            <abstract>
              <t>This memo specifies two authenticated encryption algorithms that are nonce misuse resistant -- that is, they do not fail catastrophically if a nonce is repeated.</t>
              <t>This document is the product of the Crypto Forum Research Group.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8452"/>
          <seriesInfo name="DOI" value="10.17487/RFC8452"/>
        </reference>
        <reference anchor="RFC9162" target="https://www.rfc-editor.org/info/rfc9162">
          <front>
            <title>Certificate Transparency Version 2.0</title>
            <author fullname="B. Laurie" initials="B." surname="Laurie">
              <organization/>
            </author>
            <author fullname="E. Messeri" initials="E." surname="Messeri">
              <organization/>
            </author>
            <author fullname="R. Stradling" initials="R." surname="Stradling">
              <organization/>
            </author>
            <date month="December" year="2021"/>
            <abstract>
              <t>This document describes version 2.0 of the Certificate Transparency (CT) protocol for publicly logging the existence of Transport Layer Security (TLS) server certificates as they are issued or observed, in a manner that allows anyone to audit certification authority (CA) activity and notice the issuance of suspect certificates as well as to audit the certificate logs themselves. The intent is that eventually clients would refuse to honor certificates that do not appear in a log, effectively forcing CAs to add all issued certificates to the logs.</t>
              <t>This document obsoletes RFC 6962.  It also specifies a new TLS extension that is used to send various CT log artifacts.</t>
              <t>Logs are network services that implement the protocol operations for submissions and queries that are defined in this document.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9162"/>
          <seriesInfo name="DOI" value="10.17487/RFC9162"/>
        </reference>
        <reference anchor="RFC6960" target="https://www.rfc-editor.org/info/rfc6960">
          <front>
            <title>X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP</title>
            <author fullname="S. Santesson" initials="S." surname="Santesson">
              <organization/>
            </author>
            <author fullname="M. Myers" initials="M." surname="Myers">
              <organization/>
            </author>
            <author fullname="R. Ankney" initials="R." surname="Ankney">
              <organization/>
            </author>
            <author fullname="A. Malpani" initials="A." surname="Malpani">
              <organization/>
            </author>
            <author fullname="S. Galperin" initials="S." surname="Galperin">
              <organization/>
            </author>
            <author fullname="C. Adams" initials="C." surname="Adams">
              <organization/>
            </author>
            <date month="June" year="2013"/>
            <abstract>
              <t>This document specifies a protocol useful in determining the current status of a digital certificate without requiring Certificate Revocation Lists (CRLs). Additional mechanisms addressing PKIX operational requirements are specified in separate documents.  This document obsoletes RFCs 2560 and 6277.  It also updates RFC 5912.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6960"/>
          <seriesInfo name="DOI" value="10.17487/RFC6960"/>
        </reference>
        <reference anchor="RFC7633" target="https://www.rfc-editor.org/info/rfc7633">
          <front>
            <title>X.509v3 Transport Layer Security (TLS) Feature Extension</title>
            <author fullname="P. Hallam-Baker" initials="P." surname="Hallam-Baker">
              <organization/>
            </author>
            <date month="October" year="2015"/>
            <abstract>
              <t>The purpose of the TLS feature extension is to prevent downgrade attacks that are not otherwise prevented by the TLS protocol.  In particular, the TLS feature extension may be used to mandate support for revocation checking features in the TLS protocol such as Online Certificate Status Protocol (OCSP) stapling.  Informing clients that an OCSP status response will always be stapled permits an immediate failure in the case that the response is not stapled.  This in turn prevents a denial-of-service attack that might otherwise be possible.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7633"/>
          <seriesInfo name="DOI" value="10.17487/RFC7633"/>
        </reference>
        <reference anchor="RFC6961" target="https://www.rfc-editor.org/info/rfc6961">
          <front>
            <title>The Transport Layer Security (TLS) Multiple Certificate Status Request Extension</title>
            <author fullname="Y. Pettersen" initials="Y." surname="Pettersen">
              <organization/>
            </author>
            <date month="June" year="2013"/>
            <abstract>
              <t>This document defines the Transport Layer Security (TLS) Certificate Status Version 2 Extension to allow clients to specify and support several certificate status methods.  (The use of the Certificate Status extension is commonly referred to as "OCSP stapling".)  Also defined is a new method based on the Online Certificate Status Protocol (OCSP) that servers can use to provide status information about not only the server's own certificate but also the status of intermediate certificates in the chain.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6961"/>
          <seriesInfo name="DOI" value="10.17487/RFC6961"/>
        </reference>
        <reference anchor="RFC6698" target="https://www.rfc-editor.org/info/rfc6698">
          <front>
            <title>The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman">
              <organization/>
            </author>
            <author fullname="J. Schlyter" initials="J." surname="Schlyter">
              <organization/>
            </author>
            <date month="August" year="2012"/>
            <abstract>
              <t>Encrypted communication on the Internet often uses Transport Layer Security (TLS), which depends on third parties to certify the keys used.  This document improves on that situation by enabling the administrators of domain names to specify the keys used in that domain's TLS servers.  This requires matching improvements in TLS client software, but no change in TLS server software.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6698"/>
          <seriesInfo name="DOI" value="10.17487/RFC6698"/>
        </reference>
      </references>
    </references>
    <section anchor="diff-rfc">
      <name>Differences from RFC 7525</name>
      <t>This revision of the Best Current Practices contains numerous changes, and this section is focused
on the normative changes.</t>
      <ul spacing="normal">
        <li>
          <t>High level differences:
          </t>
          <ul spacing="normal">
            <li>Clarified items (e.g. renegotiation) that only apply to TLS 1.2.</li>
            <li>Changed status of TLS 1.0 and 1.1 from <bcp14>SHOULD NOT</bcp14> to <bcp14>MUST NOT</bcp14>.</li>
            <li>Added TLS 1.3 at a <bcp14>SHOULD</bcp14> level.</li>
            <li>Similar changes to DTLS, pending publication of DTLS 1.3.</li>
            <li>Specific guidance for multiplexed protocols.</li>
            <li>
              <bcp14>MUST</bcp14>-level implementation requirement for ALPN, and more specific <bcp14>SHOULD</bcp14>-level guidance for ALPN and SNI.</li>
            <li>Limits on key usage.</li>
            <li>New attacks since <xref target="RFC7457"/>: ALPACA, Raccoon, Logjam, "Nonce-Disrespecting Adversaries".</li>
            <li>RFC 6961 (OCSP status_request_v2) has been deprecated.</li>
          </ul>
        </li>
        <li>
          <t>Differences specific to TLS 1.2:
          </t>
          <ul spacing="normal">
            <li>
              <bcp14>SHOULD</bcp14>-level guidance on AES-GCM nonce generation.</li>
            <li>
              <bcp14>SHOULD NOT</bcp14> use (static or ephemeral) finite-field DH key agreement.</li>
            <li>
              <bcp14>SHOULD NOT</bcp14> reuse ephemeral finite-field DH keys across multiple connections.</li>
            <li>2048-bit DH now a <bcp14>MUST</bcp14>, ECDH minimal curve size is 224, vs. 192 previously.</li>
            <li>Support for <tt>extended_master_secret</tt> is a <bcp14>SHOULD</bcp14>. Also removed other, more complicated, related mitigations.</li>
            <li>
              <bcp14>SHOULD</bcp14>-level restriction on the TLS session duration, depending on the rotation period of an <xref target="RFC5077"/> ticket key.</li>
            <li>Drop TLS_DHE_RSA_WITH_AES from the recommended ciphers</li>
            <li>Add TLS_ECDHE_ECDSA_WITH_AES to the recommended ciphers</li>
            <li>
              <bcp14>SHOULD NOT</bcp14> use the old MTI cipher suite, TLS_RSA_WITH_AES_128_CBC_SHA.</li>
            <li>Recommend curve X25519 alongside NIST P-256</li>
          </ul>
        </li>
        <li>
          <t>Differences specific to TLS 1.3:
          </t>
          <ul spacing="normal">
            <li>New TLS 1.3 capabilities: 0-RTT.</li>
            <li>Removed capabilities: renegotiation, compression.</li>
            <li>Added mention of TLS Encrypted Client Hello, but no recommendation to use until it is finalized.</li>
            <li>
              <bcp14>SHOULD</bcp14>-level requirement for forward secrecy in TLS 1.3 session resumption.</li>
            <li>Generic <bcp14>SHOULD</bcp14>-level guidance to avoid 0-RTT unless it is documented for the particular protocol.</li>
          </ul>
        </li>
      </ul>
    </section>
    <section anchor="document-history">
      <name>Document History</name>
      <t><cref>Note to RFC Editor: please remove before publication.</cref></t>
      <section anchor="draft-ietf-uta-rfc7525bis-06">
        <name>draft-ietf-uta-rfc7525bis-06</name>
        <ul spacing="normal">
          <li>Addressed several I-D nits raised by the document shepherd.</li>
        </ul>
      </section>
      <section anchor="draft-ietf-uta-rfc7525bis-05">
        <name>draft-ietf-uta-rfc7525bis-05</name>
        <ul spacing="normal">
          <li>
            <t>Addressed WG Last Call comments, specifically:
            </t>
            <ul spacing="normal">
              <li>More clarity and guidance on session resumption.</li>
              <li>Clarity on TLS 1.2 renegotiation.</li>
              <li>Wording on the 0-RTT feature aligned with RFC 8446.</li>
              <li>
                <bcp14>SHOULD NOT</bcp14> guidance on static and ephemeral finite field DH cipher suites.</li>
              <li>Revamped the recommended TLS 1.2 cipher suites, removing DHE and adding ECDSA. The latter due to the wide adoption of ECDSA certificates and in line with RFC 8446.</li>
              <li>Recommendation to use deterministic ECDSA.</li>
              <li>Finally deprecated the old TLS 1.2 MTI cipher suite.</li>
              <li>Deeper discussion of ECDH public key reuse issues, and as a result, recommended support of X25519.</li>
              <li>Reworded the section on certificate revocation and OCSP following a long mailing list thread.</li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="draft-ietf-uta-rfc7525bis-04">
        <name>draft-ietf-uta-rfc7525bis-04</name>
        <ul spacing="normal">
          <li>No version fallback from TLS 1.2 to earlier versions, therefore no SCSV.</li>
        </ul>
      </section>
      <section anchor="draft-ietf-uta-rfc7525bis-03">
        <name>draft-ietf-uta-rfc7525bis-03</name>
        <ul spacing="normal">
          <li>Cipher integrity and confidentiality limits.</li>
          <li>Require <tt>extended_master_secret</tt>.</li>
        </ul>
      </section>
      <section anchor="draft-ietf-uta-rfc7525bis-02">
        <name>draft-ietf-uta-rfc7525bis-02</name>
        <ul spacing="normal">
          <li>Adjusted text about ALPN support in application protocols</li>
          <li>Incorporated text from draft-ietf-tls-md5-sha1-deprecate</li>
        </ul>
      </section>
      <section anchor="draft-ietf-uta-rfc7525bis-01">
        <name>draft-ietf-uta-rfc7525bis-01</name>
        <ul spacing="normal">
          <li>
            <t>Many more changes, including:
            </t>
            <ul spacing="normal">
              <li>
                <bcp14>SHOULD</bcp14>-level requirement for forward secrecy in TLS 1.3 session resumption.</li>
              <li>Removed TLS 1.2 capabilities: renegotiation, compression.</li>
              <li>Specific guidance for multiplexed protocols.</li>
              <li>
                <bcp14>MUST</bcp14>-level implementation requirement for ALPN, and more specific <bcp14>SHOULD</bcp14>-level guidance for ALPN and SNI.</li>
              <li>Generic <bcp14>SHOULD</bcp14>-level guidance to avoid 0-RTT unless it is documented for the particular protocol.</li>
              <li>
                <bcp14>SHOULD</bcp14>-level guidance on AES-GCM nonce generation in TLS 1.2.</li>
              <li>
                <bcp14>SHOULD NOT</bcp14> use static DH keys or reuse ephemeral DH keys across multiple connections.</li>
              <li>2048-bit DH now a <bcp14>MUST</bcp14>, ECDH minimal curve size is 224, up from 192.</li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="draft-ietf-uta-rfc7525bis-00">
        <name>draft-ietf-uta-rfc7525bis-00</name>
        <ul spacing="normal">
          <li>Renamed: WG document.</li>
          <li>Started populating list of changes from RFC 7525.</li>
          <li>General rewording of abstract and intro for revised version.</li>
          <li>Protocol versions, fallback.</li>
          <li>Reference to ECHO.</li>
        </ul>
      </section>
      <section anchor="draft-sheffer-uta-rfc7525bis-00">
        <name>draft-sheffer-uta-rfc7525bis-00</name>
        <ul spacing="normal">
          <li>Renamed, since the BCP number does not change.</li>
          <li>Added an empty "Differences from RFC 7525" section.</li>
        </ul>
      </section>
      <section anchor="draft-sheffer-uta-bcp195bis-00">
        <name>draft-sheffer-uta-bcp195bis-00</name>
        <ul spacing="normal">
          <li>Initial release, the RFC 7525 text as-is, with some minor editorial
changes to the references.</li>
        </ul>
      </section>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
