<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.24 (Ruby 2.5.1) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc rfcedstyle="yes"?>
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc text-list-symbols="o-*+"?>
<?rfc compact="yes"?>
<?rfc subcompact="yes"?>
<?rfc consensus="no"?>

<rfc ipr="trust200902" docName="draft-ietf-uta-tls13-iot-profile-07" category="std" consensus="true" submissionType="IETF" updates="7925" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="TLS/DTLS 1.3 IoT Profiles">TLS/DTLS 1.3 Profiles for the Internet of Things</title>

    <author initials="H." surname="Tschofenig" fullname="Hannes Tschofenig">
      <organization></organization>
      <address>
        <email>Hannes.Tschofenig@gmx.net</email>
      </address>
    </author>
    <author initials="T." surname="Fossati" fullname="Thomas Fossati">
      <organization>Linaro</organization>
      <address>
        <email>Thomas.Fossati@linaro.com</email>
      </address>
    </author>

    <date year="2023" month="September" day="14"/>

    <area>Security</area>
    <workgroup>UTA</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document is a companion to RFC 7925 and defines TLS/DTLS 1.3 profiles for
Internet of Things devices.  It also updates RFC 7925 with regards to the X.509
certificate profile.</t>



    </abstract>



  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>

<t>This document defines a profile of DTLS 1.3 <xref target="DTLS13"/> and TLS
1.3 <xref target="RFC8446"/> that offers communication security services for IoT
applications and is reasonably implementable on many constrained devices.
Profile thereby means that available configuration options and protocol
extensions are utilized to best support the IoT environment.</t>

<t>For IoT profiles using TLS/DTLS 1.2 please consult <xref target="RFC7925"/>. This document
re-uses the communication pattern defined in <xref target="RFC7925"/> and makes IoT-domain
specific recommendations for version 1.3 (where necessary).</t>

<t>TLS 1.3 has been re-designed and several previously defined extensions are not
applicable to the new version of TLS/DTLS anymore. This clean-up also
simplifies this document.  Furthermore, many outdated ciphersuites have been
omitted from the TLS/DTLS 1.3 specification.</t>

<section anchor="conventions-and-terminology"><name>Conventions and Terminology</name>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

</section>
</section>
<section anchor="credential-types"><name>Credential Types</name>

<t>In accordance with the recommendations in <xref target="RFC7925"/>, a compliant
implementation MUST implement TLS_AES_128_CCM_8_SHA256. It SHOULD implement
TLS_CHACHA20_POLY1305_SHA256.</t>

<t>Pre-shared key based authentication is integrated into the main TLS/DTLS 1.3
specification and has been harmonized with session resumption.</t>

<t>A compliant implementation supporting authentication based on certificates and
raw public keys MUST support digital signatures with ecdsa_secp256r1_sha256. A
compliant implementation MUST support the key exchange with secp256r1 (NIST
P-256) and SHOULD support key exchange with X25519.</t>

<t>A plain PSK-based TLS/DTLS client or server MUST implement the following
extensions:</t>

<t><list style="symbols">
  <t>Supported Versions,</t>
  <t>Cookie,</t>
  <t>Server Name Indication (SNI),</t>
  <t>Pre-Shared Key,</t>
  <t>PSK Key Exchange Modes, and</t>
  <t>Application-Layer Protocol Negotiation (ALPN).</t>
</list></t>

<t>For use of external pre-shared keys <xref target="RFC9258"/> makes the following
recommendation:</t>

<ul empty="true"><li>
  <t>Applications SHOULD provision separate PSKs for (D)TLS 1.3 and prior versions.</t>
</li></ul>

<t>Where possible, the importer interface defined in <xref target="RFC9258"/> MUST be used
for external PSKs. This ensures that external PSKs used in (D)TLS 1.3
are bound to a specific key derivation function (KDF) and hash function.</t>

<t>The SNI extension is discussed in this document and the justification
for implementing and using the ALPN extension can be found in <xref target="RFC9325"/>.</t>

<t>For TLS/DTLS clients and servers implementing raw public keys and/or
certificates the guidance for mandatory-to-implement extensions described in
Section 9.2 of <xref target="RFC8446"/> MUST be followed.</t>

</section>
<section anchor="error-handling"><name>Error Handling</name>

<t>TLS 1.3 simplified the Alert protocol but the underlying challenge in an
embedded context remains unchanged, namely what should an IoT device do when it
encounters an error situation. The classical approach used in a desktop
environment where the user is prompted is often not applicable with unattended
devices. Hence, it is more important for a developer to find out from which
error cases a device can recover from.</t>

</section>
<section anchor="session-resumption"><name>Session Resumption</name>

<t>TLS 1.3 has built-in support for session resumption by utilizing PSK-based
credentials established in an earlier exchange.</t>

</section>
<section anchor="compression"><name> Compression</name>

<t>TLS 1.3 does not have support for compression of application data traffic, as offered
by previous versions of TLS. Applications are therefore responsible for transmitting
payloads that are either compressed or use a more efficient encoding otherwise.</t>

<t>With regards to the handshake itself, various strategies have
been applied to reduce the size of the exchanged payloads. TLS and DTLS 1.3 use less
overhead, depending on the type of key confirmations, when compared to previous versions of the
protocol. Additionally, the work on Compact TLS (cTLS) <xref target="I-D.ietf-tls-ctls"/> has taken compression of the handshake
a step further by utilizing out-of-band knowledge between the communication parties to reduce
the amount of data to be transmitted at each individual handshake, among applying other techniques.</t>

</section>
<section anchor="perfect-forward-secrecy"><name> Perfect Forward Secrecy</name>

<t>TLS 1.3 allows the use of PFS with all ciphersuites since the support for it is
negotiated independently.</t>

</section>
<section anchor="keep-alive"><name>Keep-Alive</name>

<t>The discussion in Section 10 of <xref target="RFC7925"/> is applicable.</t>

</section>
<section anchor="timeouts"><name>Timeouts</name>

<t>The recommendation in Section 11 of <xref target="RFC7925"/> is applicable. In particular
this document RECOMMENDED to use an initial timer value of 9 seconds with
exponential back off up to no less then 60 seconds.</t>

</section>
<section anchor="random-number-generation"><name> Random Number Generation</name>

<t>The discussion in Section 12 of <xref target="RFC7925"/> is applicable with one exception:
the ClientHello and the ServerHello messages in TLS 1.3 do not contain
gmt_unix_time component anymore.</t>

</section>
<section anchor="server-name-indication"><name>Server Name Indication</name>

<t>This specification mandates the implementation of the Server Name Indication (SNI)
extension. Where privacy requirements require it, the ECH (Encrypted Client Hello)
extension <xref target="I-D.ietf-tls-esni"/> prevents an on-path attacker to determine the domain
name the client is trying to connect to.</t>

<t>Since the Encrypted Client Hello extension requires use of Hybrid Public Key
Encryption (HPKE) <xref target="I-D.irtf-cfrg-hpke"/> and additional protocols require
further protocol exchanges and cryptographic operations, there is a certain
overhead associated with this privacy feature.</t>

<t>Note that in industrial IoT deployments the use of ECH may not be an option because
network administrators inspect DNS traffic generated by IoT devices in order to
detect malicious behaviour.</t>

<t>Besides, to avoid leaking DNS lookups from network inspection altogether further
protocols are needed, including DoH <xref target="RFC8484"/> and DPRIVE <xref target="RFC7858"/> <xref target="RFC8094"/>.
For use of such techniques in managed networks, the reader is advised to keep up to
date with the protocols defined by the Adaptive DNS Discovery (add) working group <xref target="ADD"/>.</t>

</section>
<section anchor="maximum-fragment-length-negotiation"><name> Maximum Fragment Length Negotiation</name>

<t>The Maximum Fragment Length Negotiation (MFL) extension has been superseded by
the Record Size Limit (RSL) extension <xref target="RFC8449"/>. Implementations in
compliance with this specification MUST implement the RSL extension and SHOULD
use it to indicate their RAM limitations.</t>

</section>
<section anchor="crypto-agility"><name>Crypto Agility</name>

<t>The recommendations in Section 19 of <xref target="RFC7925"/> are applicable.</t>

</section>
<section anchor="key-length-recommendations"><name>Key Length Recommendations</name>

<t>The recommendations in Section 20 of <xref target="RFC7925"/> are applicable.</t>

</section>
<section anchor="rtt-data"><name>0-RTT Data</name>

<t><xref section="E.5" sectionFormat="of" target="TLS13"/> establishes that:</t>

<ul empty="true"><li>
  <t>Application protocols MUST NOT use 0-RTT data without a profile that
defines its use.  That profile needs to identify which messages or
interactions are safe to use with 0-RTT and how to handle the
situation when the server rejects 0-RTT and falls back to 1-RTT.</t>
</li></ul>

<t>At the time of writing, no such profile has been defined for CoAP <xref target="CoAP"/>.
Therefore, 0-RTT MUST NOT be used by CoAP applications.</t>

</section>
<section anchor="certificate-profile"><name>Certificate Profile</name>

<t>This section contains updates and clarifications to the certificate profile
defined in <xref target="RFC7925"/>.  The content of Table 1 of <xref target="RFC7925"/> has been
split by certificate "type" in order to clarify exactly what requirements and
recommendations apply to which entity in the PKI hierarchy.</t>

<section anchor="all-certificates"><name>All Certificates</name>

<section anchor="version"><name>Version</name>

<t>Certificates MUST be of type X.509 v3.</t>

</section>
<section anchor="serial-number"><name>Serial Number</name>

<t>CAs SHALL generate non-sequential certificate serial numbers greater than zero
(0) containing at least 64 bits of output from a CSPRNG (cryptographically
secure pseudo-random number generator).</t>

</section>
<section anchor="signature"><name>Signature</name>

<t>The signature MUST be ecdsa-with-SHA256 or stronger <xref target="RFC5758"/>.</t>

</section>
<section anchor="issuer"><name>Issuer</name>

<t>Contains the DN of the issuing CA.</t>

</section>
<section anchor="validity"><name> Validity</name>

<t>No maximum validity period is mandated.  Validity values are expressed in
notBefore and notAfter fields, as described in Section 4.1.2.5 of <xref target="RFC5280"/>.
In particular, values MUST be expressed in Greenwich Mean Time (Zulu) and MUST
include seconds even where the number of seconds is zero.</t>

<t>Note that the validity period is defined as the period of time from notBefore
through notAfter, inclusive.  This means that a hypothetical certificate with a
notBefore date of 9 June 2021 at 03:42:01 and a notAfter date of 7 September
2021 at 03:42:01 becomes valid at the beginning of the :01 second, and only
becomes invalid at the :02 second, a period that is 90 days plus 1 second.  So
for a 90-day, notAfter must actually be 03:42:00.</t>

<t>In many cases it is necessary to indicate that a certificate does not expire.
This is likely to be the case for manufacturer-provisioned certificates.
RFC 5280 provides a simple solution to convey the fact that a certificate
has no well-defined expiration date by setting the notAfter to the
GeneralizedTime value of 99991231235959Z.</t>

<t>Some devices might not have a reliable source of time and for those devices it
is also advisable to use certificates with no expiration date and to let a
device management solution manage the lifetime of all the certificates used by
the device. While this approach does not utilize certificates to its widest extent,
it is a solution that extends the capabilities offered by a raw public key approach.</t>

</section>
<section anchor="subjectpublickeyinfo"><name> subjectPublicKeyInfo</name>

<t>The SubjectPublicKeyInfo structure indicates the algorithm and any associated
parameters for the ECC public key.  This profile uses the id-ecPublicKey
algorithm  identifier for ECDSA signature keys, as defined and specified in
<xref target="RFC5480"/>.</t>

</section>
</section>
<section anchor="root-ca-certificate"><name>Root CA Certificate</name>

<t><list style="symbols">
  <t>basicConstraints MUST be present and MUST be marked critical.  The cA field
MUST be set true.  The pathLenConstraint field SHOULD NOT be present.</t>
  <t>keyUsage MUST be present and MUST be marked critical.  Bit position for
keyCertSign MUST be set.</t>
  <t>extendedKeyUsage MUST NOT be present.</t>
</list></t>

</section>
<section anchor="subordinate-ca-certificate"><name>Subordinate CA Certificate</name>

<t><list style="symbols">
  <t>basicConstraints MUST be present and MUST be marked critical.  The cA field
MUST be set true.  The pathLenConstraint field MAY be present.</t>
  <t>keyUsage MUST be present and MUST be marked critical.  Bit position for
keyCertSign MUST be set.</t>
  <t>extendedKeyUsage MUST NOT be present.</t>
</list></t>

</section>
<section anchor="end-entity-certificate"><name>End Entity Certificate</name>

<t><list style="symbols">
  <t>extendedKeyUsage MUST be present and contain at least one of
id-kp-serverAuth or id-kp-clientAuth.</t>
  <t>keyUsage MAY be present and contain one of digitalSignature or
keyAgreement.</t>
  <t>Domain names MUST NOT be encoded in the subject commonName, instead they
MUST be encoded in a subjectAltName of type DNS-ID.  Domain names MUST NOT
contain wildcard (<spanx style="verb">*</spanx>) characters.  subjectAltName MUST NOT contain multiple
names.</t>
</list></t>

<section anchor="client-certificate-subject"><name>Client Certificate Subject</name>

<t>The requirement in Section 4.4.2 of <xref target="RFC7925"/> to only use EUI-64 for client
certificates is lifted.</t>

<t>If the EUI-64 format is used to identify the subject of a client certificate,
it MUST be encoded in a subjectAltName of type DNS-ID as a string of the form
<spanx style="verb">HH-HH-HH-HH-HH-HH-HH-HH</spanx> where 'H' is one of the symbols '0'-'9' or 'A'-'F'.</t>

</section>
</section>
</section>
<section anchor="certificate-revocation-checks"><name>Certificate Revocation Checks</name>

<t>The considerations in Section 4.4.3 of <xref target="RFC7925"/> hold.</t>

<t>Since the publication of
RFC 7925 the need for firmware update mechanisms has been reinforced and the work
on standardizing a secure and interoperable firmware update mechanism has made
substantial progress, see <xref target="RFC9019"/>. RFC 7925 recommends to use
a software / firmware update mechanism to provision devices with new trust anchors.</t>

<t>The use of device management protocols for IoT devices, which often include an onboarding
or bootstrapping mechanism, has also seen considerable uptake in deployed devices and
these protocols, some of which are standardized, allow provision of certificates on a
regular basis. This enables a deployment model where IoT device utilize end-entity
certificates with shorter lifetime making certificate revocation protocols, like OCSP
and CRLs, less relevant.</t>

<t>Hence, instead of performing certificate revocation checks on the IoT device itself this
specification recommends to delegate this task to the IoT device operator and to take the
necessary action to allow IoT devices to remain operational.</t>

</section>
<section anchor="certificate-overhead"><name>Certificate Overhead</name>

<t>In a public key-based key exchange, certificates and public keys are a major
contributor to the size of the overall handshake. For example, in a regular TLS
1.3 handshake with minimal ECC certificates and no subordinate CA utilizing
the secp256r1 curve with mutual authentication, around 40% of the entire
handshake payload is consumed by the two exchanged certificates.</t>

<t>Hence, it is not surprising that there is a strong desire to reduce the size of
certificates and certificate chains. This has lead to various standardization
efforts. Here is a brief summary of what options an implementer has to reduce
the bandwidth requirements of a public key-based key exchange:</t>

<t><list style="symbols">
  <t>Use elliptic curve cryptography (ECC) instead of RSA-based certificate due to
the smaller certificate size.</t>
  <t>Avoid deep and complex CA hierarchies to reduce the number of subordinate CA
certificates that need to be transmitted.</t>
  <t>Pay attention to the amount of information conveyed inside certificates.</t>
  <t>Use session resumption to reduce the number of times a full handshake is
needed.  Use Connection IDs <xref target="DTLS-CID"/>, when possible, to enable
long-lasting connections.</t>
  <t>Use the TLS cached info <xref target="RFC7924"/> extension to avoid sending certificates
with every full handshake.</t>
  <t>Use client certificate URLs <xref target="RFC6066"/> instead of full certificates for
clients.</t>
  <t>Use certificate compression as defined in
<xref target="I-D.ietf-tls-certificate-compression"/>.</t>
  <t>Use alternative certificate formats, where possible, such as raw public keys
<xref target="RFC7250"/> or CBOR-encoded certificates
<xref target="I-D.ietf-cose-cbor-encoded-cert"/>.</t>
</list></t>

<t>The use of certificate handles, as introduced in cTLS <xref target="I-D.ietf-tls-ctls"/>,
is a form of caching or compressing certificates as well.</t>

<t>Whether to utilize any of the above extensions or a combination of them depends
on the anticipated deployment environment, the availability of code, and the
constraints imposed by already deployed infrastructure (e.g., CA
infrastructure, tool support).</t>

</section>
<section anchor="ciphersuites"><name>Ciphersuites</name>

<t>Section 4.5.3 of <xref target="DTLS13"/> flags AES-CCM with 8-octet authentication tags
(CCM_8) as unsuitable for general use with DTLS.  In fact, due to its low
integrity limits (i.e., a high sensitivity to forgeries), endpoints that
negotiate ciphersuites based on such AEAD are susceptible to a trivial DoS.
(See also Section 5.3 and 5.4 of <xref target="I-D.irtf-cfrg-aead-limits"/> for further
discussion on this topic, as well as references to the analysis supporting
these conclusions.)</t>

<t>Specifically, <xref target="DTLS13"/> warns that:</t>

<ul empty="true"><li>
  <t>"TLS_AES_128_CCM_8_SHA256 MUST NOT be used in DTLS without additional
safeguards against forgery. Implementations MUST set usage limits for
AEAD_AES_128_CCM_8 based on an understanding of any additional forgery
protections that are used."</t>
</li></ul>

<t>Since all the ciphersuites mandated by <xref target="RFC7925"/> and <xref target="CoAP"/> are based on
CCM_8, there is no stand-by ciphersuite to use for applications that want to
avoid the security and availability risks associated with CCM_8 while retaining
interoperability with the rest of the ecosystem.</t>

<t>In order to ameliorate the situation, this document RECOMMENDS that
implementations support the following two ciphersuites:</t>

<t><list style="symbols">
  <t>TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256</t>
  <t>TLS_ECDHE_ECDSA_WITH_AES_128_CCM</t>
</list></t>

<t>and offer them as their first choice.  These ciphersuites provide
confidentiality and integrity limits that are considered acceptable in the most
general settings.  For the details on the exact bounds of both ciphersuites see
Section 4.5.3 of <xref target="DTLS13"/>.  Note that the GCM-based ciphersuite offers
superior interoperability with cloud services at the cost of a slight increase
in the wire and peak RAM footprints.</t>

<t>When the GCM-based ciphersuite is used with TLS 1.2, the recommendations in
Section 6.2.1 of <xref target="RFC9325"/> related to deterministic nonce generation
apply.  In addition, the integrity limits on key usage detailed in Section 4.4
of <xref target="RFC9325"/> also apply.</t>

</section>
<section anchor="fault-attacks-on-deterministic-signature-schemes"><name>Fault Attacks on Deterministic Signature Schemes</name>

<t>A number of passive side-channel attacks as well as active fault-injection
attacks (e.g., <xref target="Ambrose2017"/>) have been demonstrated that allow a malicious
third party to gain information about the signing key if a fully deterministic
signature scheme (e.g., <xref target="RFC6979"/> ECDSA or EdDSA <xref target="RFC8032"/>) is used.</t>

<t>Most of these attacks assume physical access to the device and are therefore
especially relevant to smart cards as well as IoT deployments with poor or
non-existent physical security.</t>

<t>In this security model, it is recommended to combine both randomness and
determinism, for example, as described in
<xref target="I-D.mattsson-cfrg-det-sigs-with-noise"/>.</t>

</section>
<section anchor="open-issues"><name>Open Issues</name>

<t>A list of open issues can be found at https://github.com/thomas-fossati/draft-tls13-iot/issues</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>This entire document is about security.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document makes no requests to IANA.</t>

</section>


  </middle>

  <back>


    <references title='Normative References'>



<reference anchor='DTLS13'>
  <front>
    <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
    <author fullname='E. Rescorla' initials='E.' surname='Rescorla'/>
    <author fullname='H. Tschofenig' initials='H.' surname='Tschofenig'/>
    <author fullname='N. Modadugu' initials='N.' surname='Modadugu'/>
    <date month='April' year='2022'/>
    <abstract>
      <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
      <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
      <t>This document obsoletes RFC 6347.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='9147'/>
  <seriesInfo name='DOI' value='10.17487/RFC9147'/>
</reference>

<reference anchor='TLS13'>
  <front>
    <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
    <author fullname='E. Rescorla' initials='E.' surname='Rescorla'/>
    <date month='August' year='2018'/>
    <abstract>
      <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
      <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8446'/>
  <seriesInfo name='DOI' value='10.17487/RFC8446'/>
</reference>

<reference anchor='RFC8446'>
  <front>
    <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
    <author fullname='E. Rescorla' initials='E.' surname='Rescorla'/>
    <date month='August' year='2018'/>
    <abstract>
      <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
      <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8446'/>
  <seriesInfo name='DOI' value='10.17487/RFC8446'/>
</reference>

<reference anchor='RFC7925'>
  <front>
    <title>Transport Layer Security (TLS) / Datagram Transport Layer Security (DTLS) Profiles for the Internet of Things</title>
    <author fullname='H. Tschofenig' initials='H.' role='editor' surname='Tschofenig'/>
    <author fullname='T. Fossati' initials='T.' surname='Fossati'/>
    <date month='July' year='2016'/>
    <abstract>
      <t>A common design pattern in Internet of Things (IoT) deployments is the use of a constrained device that collects data via sensors or controls actuators for use in home automation, industrial control systems, smart cities, and other IoT deployments.</t>
      <t>This document defines a Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) 1.2 profile that offers communications security for this data exchange thereby preventing eavesdropping, tampering, and message forgery. The lack of communication security is a common vulnerability in IoT products that can easily be solved by using these well-researched and widely deployed Internet security protocols.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='7925'/>
  <seriesInfo name='DOI' value='10.17487/RFC7925'/>
</reference>

<reference anchor='RFC2119'>
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname='S. Bradner' initials='S.' surname='Bradner'/>
    <date month='March' year='1997'/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name='BCP' value='14'/>
  <seriesInfo name='RFC' value='2119'/>
  <seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>

<reference anchor='RFC8174'>
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname='B. Leiba' initials='B.' surname='Leiba'/>
    <date month='May' year='2017'/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name='BCP' value='14'/>
  <seriesInfo name='RFC' value='8174'/>
  <seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>

<reference anchor='RFC9258'>
  <front>
    <title>Importing External Pre-Shared Keys (PSKs) for TLS 1.3</title>
    <author fullname='D. Benjamin' initials='D.' surname='Benjamin'/>
    <author fullname='C. A. Wood' initials='C. A.' surname='Wood'/>
    <date month='July' year='2022'/>
    <abstract>
      <t>This document describes an interface for importing external Pre-Shared Keys (PSKs) into TLS 1.3.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='9258'/>
  <seriesInfo name='DOI' value='10.17487/RFC9258'/>
</reference>

<reference anchor='RFC8449'>
  <front>
    <title>Record Size Limit Extension for TLS</title>
    <author fullname='M. Thomson' initials='M.' surname='Thomson'/>
    <date month='August' year='2018'/>
    <abstract>
      <t>An extension to Transport Layer Security (TLS) is defined that allows endpoints to negotiate the maximum size of protected records that each will send the other.</t>
      <t>This replaces the maximum fragment length extension defined in RFC 6066.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8449'/>
  <seriesInfo name='DOI' value='10.17487/RFC8449'/>
</reference>

<reference anchor='RFC5758'>
  <front>
    <title>Internet X.509 Public Key Infrastructure: Additional Algorithms and Identifiers for DSA and ECDSA</title>
    <author fullname='Q. Dang' initials='Q.' surname='Dang'/>
    <author fullname='S. Santesson' initials='S.' surname='Santesson'/>
    <author fullname='K. Moriarty' initials='K.' surname='Moriarty'/>
    <author fullname='D. Brown' initials='D.' surname='Brown'/>
    <author fullname='T. Polk' initials='T.' surname='Polk'/>
    <date month='January' year='2010'/>
    <abstract>
      <t>This document updates RFC 3279 to specify algorithm identifiers and ASN.1 encoding rules for the Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA) digital signatures when using SHA-224, SHA-256, SHA-384, or SHA-512 as the hashing algorithm. This specification applies to the Internet X.509 Public Key infrastructure (PKI) when digital signatures are used to sign certificates and certificate revocation lists (CRLs). This document also identifies all four SHA2 hash algorithms for use in the Internet X.509 PKI. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='5758'/>
  <seriesInfo name='DOI' value='10.17487/RFC5758'/>
</reference>

<reference anchor='RFC5280'>
  <front>
    <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
    <author fullname='D. Cooper' initials='D.' surname='Cooper'/>
    <author fullname='S. Santesson' initials='S.' surname='Santesson'/>
    <author fullname='S. Farrell' initials='S.' surname='Farrell'/>
    <author fullname='S. Boeyen' initials='S.' surname='Boeyen'/>
    <author fullname='R. Housley' initials='R.' surname='Housley'/>
    <author fullname='W. Polk' initials='W.' surname='Polk'/>
    <date month='May' year='2008'/>
    <abstract>
      <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='5280'/>
  <seriesInfo name='DOI' value='10.17487/RFC5280'/>
</reference>

<reference anchor='RFC5480'>
  <front>
    <title>Elliptic Curve Cryptography Subject Public Key Information</title>
    <author fullname='S. Turner' initials='S.' surname='Turner'/>
    <author fullname='D. Brown' initials='D.' surname='Brown'/>
    <author fullname='K. Yiu' initials='K.' surname='Yiu'/>
    <author fullname='R. Housley' initials='R.' surname='Housley'/>
    <author fullname='T. Polk' initials='T.' surname='Polk'/>
    <date month='March' year='2009'/>
    <abstract>
      <t>This document specifies the syntax and semantics for the Subject Public Key Information field in certificates that support Elliptic Curve Cryptography. This document updates Sections 2.3.5 and 5, and the ASN.1 module of "Algorithms and Identifiers for the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile", RFC 3279. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='5480'/>
  <seriesInfo name='DOI' value='10.17487/RFC5480'/>
</reference>




    </references>

    <references title='Informative References'>



<reference anchor='DTLS-CID'>
  <front>
    <title>Connection Identifier for DTLS 1.2</title>
    <author fullname='E. Rescorla' initials='E.' role='editor' surname='Rescorla'/>
    <author fullname='H. Tschofenig' initials='H.' role='editor' surname='Tschofenig'/>
    <author fullname='T. Fossati' initials='T.' surname='Fossati'/>
    <author fullname='A. Kraus' initials='A.' surname='Kraus'/>
    <date month='March' year='2022'/>
    <abstract>
      <t>This document specifies the Connection ID (CID) construct for the Datagram Transport Layer Security (DTLS) protocol version 1.2.</t>
      <t>A CID is an identifier carried in the record layer header that gives the recipient additional information for selecting the appropriate security association. In "classical" DTLS, selecting a security association of an incoming DTLS record is accomplished with the help of the 5-tuple. If the source IP address and/or source port changes during the lifetime of an ongoing DTLS session, then the receiver will be unable to locate the correct security context.</t>
      <t>The new ciphertext record format with the CID also provides content type encryption and record layer padding.</t>
      <t>This document updates RFC 6347.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='9146'/>
  <seriesInfo name='DOI' value='10.17487/RFC9146'/>
</reference>

<reference anchor='CoAP'>
  <front>
    <title>The Constrained Application Protocol (CoAP)</title>
    <author fullname='Z. Shelby' initials='Z.' surname='Shelby'/>
    <author fullname='K. Hartke' initials='K.' surname='Hartke'/>
    <author fullname='C. Bormann' initials='C.' surname='Bormann'/>
    <date month='June' year='2014'/>
    <abstract>
      <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
      <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='7252'/>
  <seriesInfo name='DOI' value='10.17487/RFC7252'/>
</reference>


<reference anchor="ADD" target="https://datatracker.ietf.org/wg/add/about/">
  <front>
    <title>Adaptive DNS Discovery (add) Working Group</title>
    <author >
      <organization>IETF</organization>
    </author>
    <date year="2023" month="September"/>
  </front>
</reference>
<reference anchor="Ambrose2017" target="https://eprint.iacr.org/2017/975.pdf">
  <front>
    <title>Differential Attacks on Deterministic Signatures</title>
    <author initials="C." surname="Ambrose" fullname="Christopher Ambrose">
      <organization></organization>
    </author>
    <author initials="J. W." surname="Bos" fullname="Joppe W. Bos">
      <organization></organization>
    </author>
    <author initials="B." surname="Fay" fullname="Björn Fay">
      <organization></organization>
    </author>
    <author initials="M." surname="Joye" fullname="Marc Joye">
      <organization></organization>
    </author>
    <author initials="M." surname="Lochter" fullname="Manfred Lochter">
      <organization></organization>
    </author>
    <author initials="B." surname="Murray" fullname="Bruce Murray">
      <organization></organization>
    </author>
    <date year="2017"/>
  </front>
</reference>


<reference anchor='RFC9325'>
  <front>
    <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
    <author fullname='Y. Sheffer' initials='Y.' surname='Sheffer'/>
    <author fullname='P. Saint-Andre' initials='P.' surname='Saint-Andre'/>
    <author fullname='T. Fossati' initials='T.' surname='Fossati'/>
    <date month='November' year='2022'/>
    <abstract>
      <t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are used to protect data exchanged over a wide range of application protocols and can also form the basis for secure transport protocols. Over the years, the industry has witnessed several serious attacks on TLS and DTLS, including attacks on the most commonly used cipher suites and their modes of operation. This document provides the latest recommendations for ensuring the security of deployed services that use TLS and DTLS. These recommendations are applicable to the majority of use cases.</t>
      <t>RFC 7525, an earlier version of the TLS recommendations, was published when the industry was transitioning to TLS 1.2. Years later, this transition is largely complete, and TLS 1.3 is widely available. This document updates the guidance given the new environment and obsoletes RFC 7525. In addition, this document updates RFCs 5288 and 6066 in view of recent attacks.</t>
    </abstract>
  </front>
  <seriesInfo name='BCP' value='195'/>
  <seriesInfo name='RFC' value='9325'/>
  <seriesInfo name='DOI' value='10.17487/RFC9325'/>
</reference>


<reference anchor='I-D.ietf-tls-ctls'>
   <front>
      <title>Compact TLS 1.3</title>
      <author fullname='Eric Rescorla' initials='E.' surname='Rescorla'>
         <organization>Mozilla</organization>
      </author>
      <author fullname='Richard Barnes' initials='R.' surname='Barnes'>
         <organization>Cisco</organization>
      </author>
      <author fullname='Hannes Tschofenig' initials='H.' surname='Tschofenig'>
         </author>
      <author fullname='Benjamin M. Schwartz' initials='B. M.' surname='Schwartz'>
         <organization>Google</organization>
      </author>
      <date day='13' month='March' year='2023'/>
      <abstract>
	 <t>   This document specifies a &quot;compact&quot; version of TLS 1.3 and DTLS 1.3.
   It saves bandwidth by trimming obsolete material, tighter encoding, a
   template-based specialization technique, and alternative
   cryptographic techniques. cTLS is not directly interoperable with TLS
   1.3 or DTLS 1.3 since the over-the-wire framing is different.  A
   single server can, however, offer cTLS alongside TLS or DTLS.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-tls-ctls-08'/>
   
</reference>


<reference anchor='I-D.ietf-tls-esni'>
   <front>
      <title>TLS Encrypted Client Hello</title>
      <author fullname='Eric Rescorla' initials='E.' surname='Rescorla'>
         <organization>RTFM, Inc.</organization>
      </author>
      <author fullname='Kazuho Oku' initials='K.' surname='Oku'>
         <organization>Fastly</organization>
      </author>
      <author fullname='Nick Sullivan' initials='N.' surname='Sullivan'>
         <organization>Cloudflare</organization>
      </author>
      <author fullname='Christopher A. Wood' initials='C. A.' surname='Wood'>
         <organization>Cloudflare</organization>
      </author>
      <date day='6' month='April' year='2023'/>
      <abstract>
	 <t>   This document describes a mechanism in Transport Layer Security (TLS)
   for encrypting a ClientHello message under a server public key.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/tlswg/draft-ietf-tls-esni
   (https://github.com/tlswg/draft-ietf-tls-esni).

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-tls-esni-16'/>
   
</reference>


<reference anchor='I-D.irtf-cfrg-hpke'>
   <front>
      <title>Hybrid Public Key Encryption</title>
      <author fullname='Richard Barnes' initials='R.' surname='Barnes'>
         <organization>Cisco</organization>
      </author>
      <author fullname='Karthikeyan Bhargavan' initials='K.' surname='Bhargavan'>
         <organization>Inria</organization>
      </author>
      <author fullname='Benjamin Lipp' initials='B.' surname='Lipp'>
         <organization>Inria</organization>
      </author>
      <author fullname='Christopher A. Wood' initials='C. A.' surname='Wood'>
         <organization>Cloudflare</organization>
      </author>
      <date day='2' month='September' year='2021'/>
      <abstract>
	 <t>This document describes a scheme for hybrid public key encryption (HPKE). This scheme provides a variant of public key encryption of arbitrary-sized plaintexts for a recipient public key. It also includes three authenticated variants, including one that authenticates possession of a pre-shared key and two optional ones that authenticate possession of a key encapsulation mechanism (KEM) private key. HPKE works for any combination of an asymmetric KEM, key derivation function (KDF), and authenticated encryption with additional data (AEAD) encryption function. Some authenticated variants may not be supported by all KEMs. We provide instantiations of the scheme using widely used and efficient primitives, such as Elliptic Curve Diffie-Hellman (ECDH) key agreement, HMAC-based key derivation function (HKDF), and SHA2.

 This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF.
	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-irtf-cfrg-hpke-12'/>
   
</reference>

<reference anchor='RFC8484'>
  <front>
    <title>DNS Queries over HTTPS (DoH)</title>
    <author fullname='P. Hoffman' initials='P.' surname='Hoffman'/>
    <author fullname='P. McManus' initials='P.' surname='McManus'/>
    <date month='October' year='2018'/>
    <abstract>
      <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS. Each DNS query-response pair is mapped into an HTTP exchange.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8484'/>
  <seriesInfo name='DOI' value='10.17487/RFC8484'/>
</reference>

<reference anchor='RFC7858'>
  <front>
    <title>Specification for DNS over Transport Layer Security (TLS)</title>
    <author fullname='Z. Hu' initials='Z.' surname='Hu'/>
    <author fullname='L. Zhu' initials='L.' surname='Zhu'/>
    <author fullname='J. Heidemann' initials='J.' surname='Heidemann'/>
    <author fullname='A. Mankin' initials='A.' surname='Mankin'/>
    <author fullname='D. Wessels' initials='D.' surname='Wessels'/>
    <author fullname='P. Hoffman' initials='P.' surname='Hoffman'/>
    <date month='May' year='2016'/>
    <abstract>
      <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS. Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626. In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
      <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group. It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='7858'/>
  <seriesInfo name='DOI' value='10.17487/RFC7858'/>
</reference>

<reference anchor='RFC8094'>
  <front>
    <title>DNS over Datagram Transport Layer Security (DTLS)</title>
    <author fullname='T. Reddy' initials='T.' surname='Reddy'/>
    <author fullname='D. Wing' initials='D.' surname='Wing'/>
    <author fullname='P. Patil' initials='P.' surname='Patil'/>
    <date month='February' year='2017'/>
    <abstract>
      <t>DNS queries and responses are visible to network elements on the path between the DNS client and its server. These queries and responses can contain privacy-sensitive information, which is valuable to protect.</t>
      <t>This document proposes the use of Datagram Transport Layer Security (DTLS) for DNS, to protect against passive listeners and certain active attacks. As latency is critical for DNS, this proposal also discusses mechanisms to reduce DTLS round trips and reduce the DTLS handshake size. The proposed mechanism runs over port 853.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8094'/>
  <seriesInfo name='DOI' value='10.17487/RFC8094'/>
</reference>

<reference anchor='RFC9019'>
  <front>
    <title>A Firmware Update Architecture for Internet of Things</title>
    <author fullname='B. Moran' initials='B.' surname='Moran'/>
    <author fullname='H. Tschofenig' initials='H.' surname='Tschofenig'/>
    <author fullname='D. Brown' initials='D.' surname='Brown'/>
    <author fullname='M. Meriac' initials='M.' surname='Meriac'/>
    <date month='April' year='2021'/>
    <abstract>
      <t>Vulnerabilities in Internet of Things (IoT) devices have raised the need for a reliable and secure firmware update mechanism suitable for devices with resource constraints. Incorporating such an update mechanism is a fundamental requirement for fixing vulnerabilities, but it also enables other important capabilities such as updating configuration settings and adding new functionality.</t>
      <t>In addition to the definition of terminology and an architecture, this document provides the motivation for the standardization of a manifest format as a transport-agnostic means for describing and protecting firmware updates.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='9019'/>
  <seriesInfo name='DOI' value='10.17487/RFC9019'/>
</reference>

<reference anchor='RFC7924'>
  <front>
    <title>Transport Layer Security (TLS) Cached Information Extension</title>
    <author fullname='S. Santesson' initials='S.' surname='Santesson'/>
    <author fullname='H. Tschofenig' initials='H.' surname='Tschofenig'/>
    <date month='July' year='2016'/>
    <abstract>
      <t>Transport Layer Security (TLS) handshakes often include fairly static information, such as the server certificate and a list of trusted certification authorities (CAs). This information can be of considerable size, particularly if the server certificate is bundled with a complete certificate chain (i.e., the certificates of intermediate CAs up to the root CA).</t>
      <t>This document defines an extension that allows a TLS client to inform a server of cached information, thereby enabling the server to omit already available information.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='7924'/>
  <seriesInfo name='DOI' value='10.17487/RFC7924'/>
</reference>

<reference anchor='RFC6066'>
  <front>
    <title>Transport Layer Security (TLS) Extensions: Extension Definitions</title>
    <author fullname='D. Eastlake 3rd' initials='D.' surname='Eastlake 3rd'/>
    <date month='January' year='2011'/>
    <abstract>
      <t>This document provides specifications for existing TLS extensions. It is a companion document for RFC 5246, "The Transport Layer Security (TLS) Protocol Version 1.2". The extensions specified are server_name, max_fragment_length, client_certificate_url, trusted_ca_keys, truncated_hmac, and status_request. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='6066'/>
  <seriesInfo name='DOI' value='10.17487/RFC6066'/>
</reference>


<reference anchor='I-D.ietf-tls-certificate-compression'>
   <front>
      <title>TLS Certificate Compression</title>
      <author fullname='Alessandro Ghedini' initials='A.' surname='Ghedini'>
         <organization>Cloudflare, Inc.</organization>
      </author>
      <author fullname='Victor Vasiliev' initials='V.' surname='Vasiliev'>
         <organization>Google</organization>
      </author>
      <date day='6' month='January' year='2020'/>
      <abstract>
	 <t>In TLS handshakes, certificate chains often take up the majority of the bytes transmitted.

 This document describes how certificate chains can be compressed to reduce the amount of data transmitted and avoid some round trips.
	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-tls-certificate-compression-10'/>
   
</reference>

<reference anchor='RFC7250'>
  <front>
    <title>Using Raw Public Keys in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
    <author fullname='P. Wouters' initials='P.' role='editor' surname='Wouters'/>
    <author fullname='H. Tschofenig' initials='H.' role='editor' surname='Tschofenig'/>
    <author fullname='J. Gilmore' initials='J.' surname='Gilmore'/>
    <author fullname='S. Weiler' initials='S.' surname='Weiler'/>
    <author fullname='T. Kivinen' initials='T.' surname='Kivinen'/>
    <date month='June' year='2014'/>
    <abstract>
      <t>This document specifies a new certificate type and two TLS extensions for exchanging raw public keys in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS). The new certificate type allows raw public keys to be used for authentication.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='7250'/>
  <seriesInfo name='DOI' value='10.17487/RFC7250'/>
</reference>


<reference anchor='I-D.ietf-cose-cbor-encoded-cert'>
   <front>
      <title>CBOR Encoded X.509 Certificates (C509 Certificates)</title>
      <author fullname='John Preuß Mattsson' initials='J. P.' surname='Mattsson'>
         <organization>Ericsson AB</organization>
      </author>
      <author fullname='Göran Selander' initials='G.' surname='Selander'>
         <organization>Ericsson AB</organization>
      </author>
      <author fullname='Shahid Raza' initials='S.' surname='Raza'>
         <organization>RISE AB</organization>
      </author>
      <author fullname='Joel Höglund' initials='J.' surname='Höglund'>
         <organization>RISE AB</organization>
      </author>
      <author fullname='Martin Furuhed' initials='M.' surname='Furuhed'>
         <organization>Nexus Group</organization>
      </author>
      <date day='7' month='July' year='2023'/>
      <abstract>
	 <t>   This document specifies a CBOR encoding of X.509 certificates.  The
   resulting certificates are called C509 Certificates.  The CBOR
   encoding supports a large subset of RFC 5280 and all certificates
   compatible with the RFC 7925, IEEE 802.1AR (DevID), CNSA, RPKI, GSMA
   eUICC, and CA/Browser Forum Baseline Requirements profiles.  When
   used to re-encode DER encoded X.509 certificates, the CBOR encoding
   can in many cases reduce the size of RFC 7925 profiled certificates
   with over 50%.  The CBOR encoded structure can alternatively be
   signed directly (&quot;natively signed&quot;), which does not require re-
   encoding for the signature to be verified.  The document also
   specifies C509 COSE headers, a C509 TLS certificate type, and a C509
   file format.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-cose-cbor-encoded-cert-06'/>
   
</reference>


<reference anchor='I-D.irtf-cfrg-aead-limits'>
   <front>
      <title>Usage Limits on AEAD Algorithms</title>
      <author fullname='Felix Günther' initials='F.' surname='Günther'>
         <organization>ETH Zurich</organization>
      </author>
      <author fullname='Martin Thomson' initials='M.' surname='Thomson'>
         <organization>Mozilla</organization>
      </author>
      <author fullname='Christopher A. Wood' initials='C. A.' surname='Wood'>
         <organization>Cloudflare</organization>
      </author>
      <date day='31' month='May' year='2023'/>
      <abstract>
	 <t>   An Authenticated Encryption with Associated Data (AEAD) algorithm
   provides confidentiality and integrity.  Excessive use of the same
   key can give an attacker advantages in breaking these properties.
   This document provides simple guidance for users of common AEAD
   functions about how to limit the use of keys in order to bound the
   advantage given to an attacker.  It considers limits in both single-
   and multi-key settings.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-irtf-cfrg-aead-limits-07'/>
   
</reference>

<reference anchor='RFC6979'>
  <front>
    <title>Deterministic Usage of the Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA)</title>
    <author fullname='T. Pornin' initials='T.' surname='Pornin'/>
    <date month='August' year='2013'/>
    <abstract>
      <t>This document defines a deterministic digital signature generation procedure. Such signatures are compatible with standard Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA) digital signatures and can be processed with unmodified verifiers, which need not be aware of the procedure described therein. Deterministic signatures retain the cryptographic security features associated with digital signatures but can be more easily implemented in various environments, since they do not need access to a source of high-quality randomness.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='6979'/>
  <seriesInfo name='DOI' value='10.17487/RFC6979'/>
</reference>

<reference anchor='RFC8032'>
  <front>
    <title>Edwards-Curve Digital Signature Algorithm (EdDSA)</title>
    <author fullname='S. Josefsson' initials='S.' surname='Josefsson'/>
    <author fullname='I. Liusvaara' initials='I.' surname='Liusvaara'/>
    <date month='January' year='2017'/>
    <abstract>
      <t>This document describes elliptic curve signature scheme Edwards-curve Digital Signature Algorithm (EdDSA). The algorithm is instantiated with recommended parameters for the edwards25519 and edwards448 curves. An example implementation and test vectors are provided.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8032'/>
  <seriesInfo name='DOI' value='10.17487/RFC8032'/>
</reference>


<reference anchor='I-D.mattsson-cfrg-det-sigs-with-noise'>
   <front>
      <title>Deterministic ECDSA and EdDSA Signatures with Additional Randomness</title>
      <author fullname='John Preuß Mattsson' initials='J. P.' surname='Mattsson'>
         <organization>Ericsson</organization>
      </author>
      <author fullname='Erik Thormarker' initials='E.' surname='Thormarker'>
         <organization>Ericsson</organization>
      </author>
      <author fullname='Sini Ruohomaa' initials='S.' surname='Ruohomaa'>
         <organization>Ericsson</organization>
      </author>
      <date day='15' month='February' year='2022'/>
      <abstract>
	 <t>   Deterministic elliptic-curve signatures such as deterministic ECDSA
   and EdDSA have gained popularity over randomized ECDSA as their
   security do not depend on a source of high-quality randomness.
   Recent research has however found that implementations of these
   signature algorithms may be vulnerable to certain side-channel and
   fault injection attacks due to their determinism.  One countermeasure
   to such attacks is to re-add randomness to the otherwise
   deterministic calculation of the per-message secret number.  This
   document updates RFC 6979 and RFC 8032 to recommend constructions
   with additional randomness for deployments where side-channel attacks
   and fault injection attacks are a concern.  The updates are invisible
   to the validator of the signature and compatible with existing ECDSA
   and EdDSA validators.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-mattsson-cfrg-det-sigs-with-noise-04'/>
   
</reference>




    </references>


<section numbered="false" anchor="acknowledgments"><name>Acknowledgments</name>

<t>We would like to thank Ben Kaduk, John Mattsson and Michael Richardson.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

