<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.1 (Ruby 3.0.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc rfcedstyle="yes"?>
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc text-list-symbols="o-*+"?>
<?rfc compact="yes"?>
<?rfc subcompact="yes"?>
<?rfc consensus="no"?>

<rfc ipr="trust200902" docName="draft-ietf-uta-tls13-iot-profile-08" category="std" consensus="true" submissionType="IETF" updates="7925" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="TLS/DTLS 1.3 IoT Profiles">TLS/DTLS 1.3 Profiles for the Internet of Things</title>

    <author initials="H." surname="Tschofenig" fullname="Hannes Tschofenig">
      <organization></organization>
      <address>
        <email>Hannes.Tschofenig@gmx.net</email>
      </address>
    </author>
    <author initials="T." surname="Fossati" fullname="Thomas Fossati">
      <organization>Linaro</organization>
      <address>
        <email>Thomas.Fossati@linaro.com</email>
      </address>
    </author>
    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>

    <date year="2023" month="October" day="22"/>

    <area>Security</area>
    <workgroup>UTA</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 98?>

<t>This document is a companion to RFC 7925 and defines TLS/DTLS 1.3 profiles for
Internet of Things devices.  It also updates RFC 7925 with regards to the X.509
certificate profile.</t>



    </abstract>



  </front>

  <middle>


<?line 104?>

<section anchor="introduction"><name>Introduction</name>

<t>This document defines a profile of DTLS 1.3 <xref target="DTLS13"/> and TLS
1.3 <xref target="RFC8446"/> that offers communication security services for IoT
applications and is reasonably implementable on many constrained devices.
Profile thereby means that available configuration options and protocol
extensions are utilized to best support the IoT environment.</t>

<t>For IoT profiles using TLS/DTLS 1.2 please consult <xref target="RFC7925"/>. This document
re-uses the communication pattern defined in <xref target="RFC7925"/> and makes IoT-domain
specific recommendations for version 1.3 (where necessary).</t>

<t>TLS 1.3 has been re-designed and several previously defined extensions are not
applicable to the new version of TLS/DTLS anymore. This clean-up also
simplifies this document.  Furthermore, many outdated ciphersuites have been
omitted from the TLS/DTLS 1.3 specification.</t>

<section anchor="conventions-and-terminology"><name>Conventions and Terminology</name>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
<?line -6?></t>

</section>
</section>
<section anchor="credential-types"><name>Credential Types</name>

<t>In accordance with the recommendations in <xref target="RFC7925"/>, a compliant
implementation MUST implement TLS_AES_128_CCM_8_SHA256. It SHOULD implement
TLS_CHACHA20_POLY1305_SHA256.</t>

<t>Pre-shared key based authentication is integrated into the main TLS/DTLS 1.3
specification and has been harmonized with session resumption.</t>

<t>A compliant implementation supporting authentication based on certificates and
raw public keys MUST support digital signatures with ecdsa_secp256r1_sha256. A
compliant implementation MUST support the key exchange with secp256r1 (NIST
P-256) and SHOULD support key exchange with X25519.</t>

<t>A plain PSK-based TLS/DTLS client or server MUST implement the following
extensions:</t>

<t><list style="symbols">
  <t>Supported Versions,</t>
  <t>Cookie,</t>
  <t>Server Name Indication (SNI),</t>
  <t>Pre-Shared Key,</t>
  <t>PSK Key Exchange Modes, and</t>
  <t>Application-Layer Protocol Negotiation (ALPN).</t>
</list></t>

<t>For use of external pre-shared keys <xref target="RFC9258"/> makes the following
recommendation:</t>

<ul empty="true"><li>
  <t>Applications SHOULD provision separate PSKs for (D)TLS 1.3 and prior versions.</t>
</li></ul>

<t>Where possible, the importer interface defined in <xref target="RFC9258"/> MUST be used
for external PSKs. This ensures that external PSKs used in (D)TLS 1.3
are bound to a specific key derivation function (KDF) and hash function.</t>

<t>The SNI extension is discussed in this document and the justification
for implementing and using the ALPN extension can be found in <xref target="RFC9325"/>.</t>

<t>For TLS/DTLS clients and servers implementing raw public keys and/or
certificates the guidance for mandatory-to-implement extensions described in
Section 9.2 of <xref target="RFC8446"/> MUST be followed.</t>

</section>
<section anchor="error-handling"><name>Error Handling</name>

<t>TLS 1.3 simplified the Alert protocol but the underlying challenge in an
embedded context remains unchanged, namely what should an IoT device do when it
encounters an error situation. The classical approach used in a desktop
environment where the user is prompted is often not applicable with unattended
devices. Hence, it is more important for a developer to find out from which
error cases a device can recover from.</t>

</section>
<section anchor="session-resumption"><name>Session Resumption</name>

<t>TLS 1.3 has built-in support for session resumption by utilizing PSK-based
credentials established in an earlier exchange.</t>

</section>
<section anchor="compression"><name> Compression</name>

<t>TLS 1.3 does not have support for compression of application data traffic, as offered
by previous versions of TLS. Applications are therefore responsible for transmitting
payloads that are either compressed or use a more efficient encoding otherwise.</t>

<t>With regards to the handshake itself, various strategies have
been applied to reduce the size of the exchanged payloads. TLS and DTLS 1.3 use less
overhead, depending on the type of key confirmations, when compared to previous versions of the
protocol. Additionally, the work on Compact TLS (cTLS) <xref target="I-D.ietf-tls-ctls"/> has taken compression of the handshake
a step further by utilizing out-of-band knowledge between the communication parties to reduce
the amount of data to be transmitted at each individual handshake, among applying other techniques.</t>

</section>
<section anchor="perfect-forward-secrecy"><name> Perfect Forward Secrecy</name>

<t>TLS 1.3 allows the use of PFS with all ciphersuites since the support for it is
negotiated independently.</t>

</section>
<section anchor="keep-alive"><name>Keep-Alive</name>

<t>The discussion in Section 10 of <xref target="RFC7925"/> is applicable.</t>

</section>
<section anchor="timeouts"><name>Timeouts</name>

<t>The recommendation in Section 11 of <xref target="RFC7925"/> is applicable. In particular
this document RECOMMENDED to use an initial timer value of 9 seconds with
exponential back off up to no less then 60 seconds.</t>

</section>
<section anchor="random-number-generation"><name> Random Number Generation</name>

<t>The discussion in Section 12 of <xref target="RFC7925"/> is applicable with one exception:
the ClientHello and the ServerHello messages in TLS 1.3 do not contain
gmt_unix_time component anymore.</t>

</section>
<section anchor="server-name-indication"><name>Server Name Indication</name>

<t>This specification mandates the implementation of the Server Name Indication (SNI)
extension. Where privacy requirements require it, the ECH (Encrypted Client Hello)
extension <xref target="I-D.ietf-tls-esni"/> prevents an on-path attacker to determine the domain
name the client is trying to connect to.</t>

<t>Since the Encrypted Client Hello extension requires use of Hybrid Public Key
Encryption (HPKE) <xref target="I-D.irtf-cfrg-hpke"/> and additional protocols require
further protocol exchanges and cryptographic operations, there is a certain
overhead associated with this privacy feature.</t>

<t>Note that in industrial IoT deployments the use of ECH may not be an option because
network administrators inspect DNS traffic generated by IoT devices in order to
detect malicious behaviour.</t>

<t>Besides, to avoid leaking DNS lookups from network inspection altogether further
protocols are needed, including DoH <xref target="RFC8484"/> and DPRIVE <xref target="RFC7858"/> <xref target="RFC8094"/>.
For use of such techniques in managed networks, the reader is advised to keep up to
date with the protocols defined by the Adaptive DNS Discovery (add) working group <xref target="ADD"/>.</t>

</section>
<section anchor="maximum-fragment-length-negotiation"><name> Maximum Fragment Length Negotiation</name>

<t>The Maximum Fragment Length Negotiation (MFL) extension has been superseded by
the Record Size Limit (RSL) extension <xref target="RFC8449"/>. Implementations in
compliance with this specification MUST implement the RSL extension and SHOULD
use it to indicate their RAM limitations.</t>

</section>
<section anchor="crypto-agility"><name>Crypto Agility</name>

<t>The recommendations in Section 19 of <xref target="RFC7925"/> are applicable.</t>

</section>
<section anchor="key-length-recommendations"><name>Key Length Recommendations</name>

<t>The recommendations in Section 20 of <xref target="RFC7925"/> are applicable.</t>

</section>
<section anchor="rtt-data"><name>0-RTT Data</name>

<t><xref section="E.5" sectionFormat="of" target="TLS13"/> establishes that:</t>

<ul empty="true"><li>
  <t>Application protocols MUST NOT use 0-RTT data without a profile that
defines its use.  That profile needs to identify which messages or
interactions are safe to use with 0-RTT and how to handle the
situation when the server rejects 0-RTT and falls back to 1-RTT.</t>
</li></ul>

<t>At the time of writing, no such profile has been defined for CoAP <xref target="CoAP"/>.
Therefore, 0-RTT MUST NOT be used by CoAP applications.</t>

</section>
<section anchor="certificate-profile"><name>Certificate Profile</name>

<t>This section contains updates and clarifications to the certificate profile
defined in <xref target="RFC7925"/>. The content of Table 1 of <xref target="RFC7925"/> has been
split by certificate "type" in order to clarify exactly what requirements and
recommendations apply to which entity in the PKI hierarchy.</t>

<t>The content is also better aligned with the IEEE 802.1AR <xref target="_8021AR"/>
specification, which introduces the terms Initial Device Identifier
(IDevID) and Locally Significant Device Identifiers (LDevIDs).
IDevIDs and LDevIDs are Device Identifier (DevID) and a DevID consists of</t>

<t><list style="symbols">
  <t>a private key,</t>
  <t>a certificate (containing the public key and the identifier certified by
the certificate's issuer), and</t>
  <t>a certificate chain up to a trust anchor. The trust anchor is is usually
the root certificate).</t>
</list></t>

<t>The IDevID is typically provisioned by a manufacturer and signed by the
manufacturer CA. It is then used to obtain operational certificates,
the LDevIDs, from the operator or owner of the device. Some protocols
also introduce an additional hierarchy with application instance
certificates, which are obtained for use with specific applications.</t>

<t>IDevIDs are primarily used with device onboarding or bootstrapping protocols,
such as the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol
<xref target="RFC8995"/> or by LwM2M Bootstrap <xref target="LwM2M"/>. Hence, the use of IDevIDs
is limited in purpose even though they have a long lifetime, or do not expire
at all. While some bootstrapping protocols use TLS (and therefore make use of
the IDevID as part of client authentication) there are other bootstrapping
protocols that do not use TLS/DTLS for client authentication, such as FIDO
Device Onboarding (FDO) <xref target="FDO"/>.  In many cases, a profile for the certificate
content is provided by those specifications. For these reasons, this
specification focuses on the description of LDevIDs.</t>

<t>While the IEEE 802.1AR terminology is utilized in this document,
this specification does not claim conformance to IEEE 802.1AR
since such a compliance statement goes beyond the use of the terminology
and the certificate content and would include the use of management
protocols, fulfillment of certain hardware security requirements, and
interfaces to access these hardware security modules. Placing these
requirements on network equipment like routers may be appropriate but
designers of constrained IoT devices have opted for different protocols
and hardware security choices.</t>

<section anchor="all-certificates"><name>All Certificates</name>

<t>To avoid repetition, this section outlines requirements on X.509
certificates applicable to all PKI entities.</t>

<section anchor="version"><name>Version</name>

<t>Certificates MUST be of type X.509 v3. Note that TLS 1.3 allows to
convey payloads other than X.509 certificates in the Certificate
message. The description in this section only focuses on X.509 v3
certificates and leaves the description of other formats to other
sections or even other specifications.</t>

</section>
<section anchor="serial-number"><name>Serial Number</name>

<t>CAs MUST generate non-sequential serial numbers greater than zero
(0) up to 20 octects from a cryptographically secure
pseudo-random number generator. The serial number MUST be unique
for each certificate issued by a given CA (i.e., the issuer name
and the serial number uniquely identify a certificate).</t>

<t>This requirement is aligned with <xref target="RFC5280"/>.</t>

</section>
<section anchor="signature"><name>Signature</name>

<t>The signature MUST be ecdsa-with-SHA256 or stronger <xref target="RFC5758"/>.</t>

<t>Note: In contrast to IEEE 802.1AR this specification does not require
end entity certificates, subordinate CA certificates, and CA
certificates to use the same signature algorithm. Furthermore,
this specification does not utlize RSA for use with constrained IoT
devices and networks.</t>

</section>
<section anchor="issuer"><name>Issuer</name>

<t>The issuer field MUST contain a non-empty distinguished name (DN)
of the entity that has signed and issued the certificate in accordance
to <xref target="RFC5280"/>.</t>

</section>
<section anchor="validity"><name> Validity</name>

<t>In IoT deployment scenarios it is often expected that the IDevIDs have
no maximum validity period. For this purpose the use of a special value
for the notAfter date field, the GeneralizedTime value of 99991231235959Z,
is utilized. If this is done, then CA certificates and certificates of
subordinate CAs cannot have a maximum validity period either. Hence,
it requires careful consideration whether it is appropriate to issue
IDevID certificates with no maximum validity period.</t>

<t>LDevID certificates are, however, issued by the operator or owner,
and may be renewed at a regular interval using protocols, such
as Enrollment over Secure Transport (EST) <xref target="RFC7030"/> or the
Certificate Management Protocol (CMP) <xref target="I-D.ietf-lamps-lightweight-cmp-profile"/>.
It is therefore RECOMMENDED to limit the lifetime of these LDevID certificates
using the notBefore and notAfter fields, as described in Section 4.1.2.5 of
<xref target="RFC5280"/>. Values MUST be expressed in Greenwich Mean Time (Zulu) and
MUST include seconds even where the number of seconds is zero.</t>

<t>Note that the validity period is defined as the period of time from notBefore
through notAfter, inclusive. This means that a hypothetical certificate with a
notBefore date of 9 June 2021 at 03:42:01 and a notAfter date of 7 September
2021 at 03:42:01 becomes valid at the beginning of the :01 second, and only
becomes invalid at the :02 second, a period that is 90 days plus 1 second.  So
for a 90-day, notAfter must actually be 03:42:00.</t>

<t>For devices without a reliable source of time we advise the use of a device
management solution, which typically includes a certificate management protocol,
to manage the lifetime of all the certificates used by the device. While this
approach does not utilize certificates to its widest extent, it is a solution
that extends the capabilities offered by a raw public key approach.</t>

</section>
<section anchor="subject-public-key-info"><name> Subject Public Key Info</name>

<t>The SubjectPublicKeyInfo structure indicates the algorithm and any associated
parameters for the ECC public key. This profile uses the id-ecPublicKey
algorithm identifier for ECDSA signature keys, as defined and specified in
<xref target="RFC5480"/>. This specification assumes that devices supported one of the
following algorithms:</t>

<t><list style="symbols">
  <t>id-ecPublicKey with secp256r1,</t>
  <t>id-ecPublicKey with secp384r1, and</t>
  <t>id-ecPublicKey with secp521r1.</t>
</list></t>

<t>There is no requirement to use CA certificates and certificates of
subordinate CAs to use the same algorithm as the end-entity certificate.
Certificates with longer lifetime may well use a cryptographic stronger
algorithm.</t>

</section>
<section anchor="certificate-revocation-checks"><name>Certificate Revocation Checks</name>

<t>The considerations in Section 4.4.3 of <xref target="RFC7925"/> hold.</t>

<t>Since the publication of RFC 7925 the need for firmware update mechanisms
has been reinforced and the work on standardizing a secure and
interoperable firmware update mechanism has made substantial progress,
see <xref target="RFC9019"/>. RFC 7925 recommends to use a software / firmware update
mechanism to provision devices with new trust anchors.</t>

<t>The use of device management protocols for IoT devices, which often include
an onboarding or bootstrapping mechanism, has also seen considerable uptake
in deployed devices and these protocols, some of which are standardized,
allow provision of certificates on a regular basis. This enables a
deployment model where IoT device utilize end-entity certificates with
shorter lifetime making certificate revocation protocols, like OCSP
and CRLs, less relevant.</t>

<t>Hence, instead of performing certificate revocation checks on the IoT device
itself this specification recommends to delegate this task to the IoT device
operator and to take thenecessary action to allow IoT devices to remain
operational.</t>

<t>The CRL distribution points extension has been defined in RFC 5280 to
identify how CRL information is obtained. The authority information access
extension indicates how to access information like the online certificate
status service (OCSP). Both extensions SHOULD NOT be set. If set, they
MUST NOT be marked critical.</t>

</section>
</section>
<section anchor="root-ca-certificate"><name>Root CA Certificate</name>

<t>This section outlines the requirements for root CA certificates.</t>

<section anchor="subject"><name>Subject</name>

<t><xref target="RFC5280"/> defines the Subject field as follows: "The subject field identifies
the entity associated with the public key stored in the subject public key
field." RFC 5280 adds "If the subject is a CA then the subject field MUST be
populated with a non-empty distinguished name matching the contents of the
issuer field in all certificates issued by the subject CA."</t>

<t>The Subject field MUST be present and MUST contain the commonName, the organizationName,
and the countryName attribute and MAY contain an organizationalUnitName attribute.</t>

</section>
<section anchor="authority-key-identifier"><name>Authority Key Identifier</name>

<t>Section 4.2.1.1 of <xref target="RFC5280"/> defines the Authority Key Identifier as follows:
"The authority key identifier extension provides a means of identifying the
public key corresponding to the private key used to sign a certificate. This
extension is used where an issuer has multiple signing keys."</t>

<t>The Authority Key Identifier extension MAY be omitted. If it is set, it MUST NOT be
marked critical, and MUST contain the subjectKeyIdentifier of this certificate.</t>

<t>[Editor's Note: Do we need to set the Authority Key Identifier in the CA certificate?]</t>

</section>
<section anchor="subject-key-identifier"><name>Subject Key Identifier</name>

<t>Section 4.2.1.2 of <xref target="RFC5280"/> defines the Subject Key Identifier as follows:
"The subject key identifier extension provides a means of identifying
certificates that contain a particular public key."</t>

<t>The Subject Key Identifier extension MUST be set, MUST NOT be marked critical, and MUST
contain the key identifier of the public key contained in the subject public key
info field.</t>

<t>[Editor's Note: Do we need to set the Subject Key Identifier in the CA certificate?]</t>

</section>
<section anchor="key-usage"><name>Key Usage</name>

<t><xref target="RFC5280"/> defines the key usage field as follows: "The key usage extension defines
the purpose (e.g., encipherment, signature, certificate signing) of the key contained
in the certificate."</t>

<t>The Key Usage extension SHOULD be set. If it is set, it MUST be marked critical and
the keyCertSign or cRLSign purposes MUST be set. Additional key usages MAY be set
depending on the intended usage of the public key.</t>

<t>[Editor's Note: Should we harden the requirement to "The Key Usage extension MUST  be set.]</t>

<t><xref target="RFC5280"/> defines the extended key usage as follows: "This extension indicates
one or more purposes for which the certified public key may be used, in addition to
or in place of the basic purposes indicated in the key usage extension."</t>

<t>This extendedKeyUsage extension MUST NOT be set.</t>

</section>
<section anchor="basic-constraints"><name>Basic Constraints</name>

<t><xref target="RFC5280"/> states that "The Basic Constraints extension identifies whether the subject
of the certificate is a CA and the maximum depth of valid certification paths that include
this certificate. The cA boolean indicates whether the certified public key may be used to
verify certificate signatures."</t>

<t>For the pathLenConstraint RFC 5280 makes further statements:</t>

<t><list style="symbols">
  <t>"The pathLenConstraint field is meaningful only if the cA boolean is asserted and the
key usage extension, if present, asserts the keyCertSign bit. In this case, it gives the
maximum number of non-self-issued intermediate certificates that may follow this
certificate in a valid certification path."</t>
  <t>"A pathLenConstraint of zero indicates that no non-self-issued intermediate CA
certificates may follow in a valid certification path."</t>
  <t>"Where pathLenConstraint does not appear, no limit is imposed."</t>
  <t>"Conforming CAs MUST include this extension in all CA certificates that contain public
keys used to validate digital signatures on certificates and MUST mark the extension as
critical in such certificates."</t>
</list></t>

<t>The Basic Constraints extension MUST be set, MUST be marked critical, the cA flag MUST
be set to true and the pathLenConstraint MUST be omitted.</t>

<t>[Editor's Note: Should we soften the requirement to: "The pathLenConstraint field SHOULD NOT be present."]</t>

</section>
</section>
<section anchor="subordinate-ca-certificate"><name>Subordinate CA Certificate</name>

<t>This section outlines the requirements for subordinate CA certificates.</t>

<section anchor="subject-1"><name>Subject</name>

<t>The Subject field MUST be set and MUST contain the commonName, the organizationName,
and the countryName attribute and MAY contain an organizationalUnitName attribute.</t>

</section>
<section anchor="authority-key-identifier-1"><name>Authority Key Identifier</name>

<t>The Authority Key Identifier extension MUST be set, MUST NOT be marked critical, and
MUST contain the subjectKeyIdentifier of the CA that issued this certificate.</t>

</section>
<section anchor="subject-key-identifier-1"><name>Subject Key Identifier</name>

<t>The Subject Key Identifier extension MUST be set, MUST NOT be marked critical, and MUST
contain the key identifier of the public key contained in the subject public key info
field.</t>

</section>
<section anchor="key-usage-1"><name>Key Usage</name>

<t>The Key Usage extension MUST be set, MUST be marked critical, the keyCertSign or
cRLSign purposes MUST be set, and the digitalSignature purpose SHOULD be set.</t>

<t>The extendedKeyUsage extensed MAY be set depending on the intended usage of the
public key.</t>

<t>[Editor's Note: Should we harden the requirement to "The extendedKeyUsage MUST NOT be present."]</t>

</section>
<section anchor="basic-constraints-1"><name>Basic Constraints</name>

<t>The Basic Constraints extension MUST be set, MUST be marked critical, the cA flag
MUST be set to true and the pathLenConstraint MUST be set to 0.</t>

<t>[Editor's Note: Should we soften the requriement to "The pathLenConstraint field MAY be present."]</t>

</section>
<section anchor="crl-distribution-point"><name>CRL Distribution Point</name>

<t>The CRL Distribution Point extension SHOULD NOT be set. If it is set, it MUST NOT
be marked critical and MUST identify the CRL relevant for this certificate.</t>

</section>
<section anchor="authority-information-access"><name>Authority Information Access</name>

<t>The Authority Information Access extension SHOULD NOT be set. If it is set, it MUST
NOT be marked critical and MUST identify the location of the certificate of the CA
that issued this certificate and the location it provides an online certificate
status service (OCSP).</t>

</section>
</section>
<section anchor="end-entity-certificate"><name>End Entity Certificate</name>

<t>This section outlines the requirements for end entity certificates.</t>

<section anchor="subject-2"><name>Subject</name>

<t>The requirement in Section 4.4.2 of <xref target="RFC7925"/> to only use EUI-64 for end
entity certificates as a Subject name is lifted.</t>

<t>Two fields are typically used to encode a device identifer, namely the
Subject and the subjectAltName fields. Protocol specifications tend to offer
recommendations what identifiers to use and the deployment situation is
fragmented.</t>

<t>The Subject field MAY include a unique device serial number. If the serial
number is included, it MUST be encoded in the serialNumber attribute.</t>

<t><xref target="RFC5280"/> defines: "The subject alternative name extension allows identities
to be bound to the subject of the certificate. These identities may be included
in addition to or in place of the identity in the subject field of the certificate."</t>

<t>The subject alternative name extension MAY be set. If it is set, it MUST NOT be
marked critical, except when the subject DN contains an empty sequence.</t>

<t>If the EUI-64 format is used to identify the subject of an end entity
certificate, it MUST be encoded in a subjectAltName of type DNS-ID as a string
of the form <spanx style="verb">HH-HH-HH-HH-HH-HH-HH-HH</spanx> where 'H' is one of the symbols '0'-'9'
or 'A'-'F'.</t>

<t>Domain names MUST NOT be encoded in the subject commonName. Instead they
MUST be encoded in a subjectAltName of type DNS-ID. Domain names MUST NOT
contain wildcard (<spanx style="verb">*</spanx>) characters. The subjectAltName MUST NOT contain multiple
names.</t>

<t>Note: The IEEE 802.1AR recomments to encode information about a Trusted
Platform Module (TPM), if present, in the HardwareModuleName. This
specification does not follow this recommendation.</t>

</section>
<section anchor="authority-key-identifier-2"><name>Authority Key Identifier</name>

<t>The Authority Key Identifier extension MUST be set, MUST NOT be marked critical,
and MUST contain the subjectKeyIdentifier of the CA that issued this certificate.</t>

</section>
<section anchor="subject-key-identifier-2"><name>Subject Key Identifier</name>

<t>The Subject Key Identifier SHOULD NOT be included in end-entity certificates.
If it is included, then the Subject Key Identifier extension MUST NOT be marked
critical, and MUST contain the key identifier of the public key contained in the
subject public key info field.</t>

<t>[Editor's Note: Should we harden the requirement and state: "The Subject Key Identifier MUST NOT be included in end-entity certificates."]</t>

</section>
<section anchor="key-usage-2"><name>Key Usage</name>

<t>The key usage extension MUST be set and MUST be marked as critical. For
signature verification keys the digitialSignature key usage purpose MUST
be specified. Other key usages are set according to the intended usage
of the key.</t>

<t>If enrollment of new certificates uses server-side key generation, encrypted
delivery of the private key is required. In such cases the key usage
keyEncipherment or keyAgreement MUST be set because the encrypted delivery
of the newly generated key involves encryption or agreement of a symmetric
key. On-device key generation is, however, the preferred approach.</t>

<t>The extendedKeyUsage MUST be present and contain at least one of
id-kp-serverAuth or id-kp-clientAuth.</t>

</section>
</section>
</section>
<section anchor="certificate-overhead"><name>Certificate Overhead</name>

<t>In a public key-based key exchange, certificates and public keys are a major
contributor to the size of the overall handshake. For example, in a regular TLS
1.3 handshake with minimal ECC certificates and no subordinate CA utilizing
the secp256r1 curve with mutual authentication, around 40% of the entire
handshake payload is consumed by the two exchanged certificates.</t>

<t>Hence, it is not surprising that there is a strong desire to reduce the size of
certificates and certificate chains. This has lead to various standardization
efforts. Below is a brief summary of what options an implementer has to reduce
the bandwidth requirements of a public key-based key exchange. Note that many
of the standardized extensions are not readily available in TLS/DTLS stacks since
optimizations typically get implemented last.</t>

<t><list style="symbols">
  <t>Use elliptic curve cryptography (ECC) instead of RSA-based certificate due to
the smaller certificate size. This document recommends the use of elliptic
curve cryptography only.</t>
  <t>Avoid deep and complex CA hierarchies to reduce the number of subordinate CA
certificates that need to be transmitted and processed. See
<xref target="I-D.irtf-t2trg-taxonomy-manufacturer-anchors"/> for a discussion about CA
hierarchies.</t>
  <t>Pay attention to the amount of information conveyed inside certificates.</t>
  <t>Use session resumption to reduce the number of times a full handshake is
needed.  Use Connection IDs <xref target="RFC9146"/>, when possible, to enable
long-lasting connections.</t>
  <t>Use the TLS cached info <xref target="RFC7924"/> extension to avoid sending certificates
with every full handshake.</t>
  <t>Use client certificate URLs <xref target="RFC6066"/> instead of full certificates for
clients. When applications perform TLS client authentication via
DNS-Based Authentication of Named Entities (DANE) TLSA records then the
<xref target="I-D.ietf-dance-tls-clientid"/> specification may be used to reduce the
packets on the wire. Note: The term "TLSA" does not stand for anything;
it is just the name of the RRtype, as explained in <xref target="RFC668"/>.</t>
  <t>Use certificate compression as defined in
<xref target="RFC8879"/>.</t>
  <t>Use alternative certificate formats, where possible, such as raw public keys
<xref target="RFC7250"/> or CBOR-encoded certificates
<xref target="I-D.ietf-cose-cbor-encoded-cert"/>.</t>
</list></t>

<t>The use of certificate handles, as introduced in cTLS <xref target="I-D.ietf-tls-ctls"/>,
is a form of caching or compressing certificates as well.</t>

<t>Whether to utilize any of the above extensions or a combination of them depends
on the anticipated deployment environment, the availability of code, and the
constraints imposed by already deployed infrastructure (e.g., CA
infrastructure, tool support).</t>

</section>
<section anchor="ciphersuites"><name>Ciphersuites</name>

<t>Section 4.5.3 of <xref target="DTLS13"/> flags AES-CCM with 8-octet authentication tags
(CCM_8) as unsuitable for general use with DTLS.  In fact, due to its low
integrity limits (i.e., a high sensitivity to forgeries), endpoints that
negotiate ciphersuites based on such AEAD are susceptible to a trivial DoS.
(See also Section 5.3 and 5.4 of <xref target="I-D.irtf-cfrg-aead-limits"/> for further
discussion on this topic, as well as references to the analysis supporting
these conclusions.)</t>

<t>Specifically, <xref target="DTLS13"/> warns that:</t>

<figure><artwork><![CDATA[
> "TLS_AES_128_CCM_8_SHA256 MUST NOT be used in DTLS without additional
> safeguards against forgery. Implementations MUST set usage limits for
> AEAD_AES_128_CCM_8 based on an understanding of any additional forgery
> protections that are used."
]]></artwork></figure>

<t>Since all the ciphersuites mandated by <xref target="RFC7925"/> and <xref target="CoAP"/> are based on
CCM_8, there is no stand-by ciphersuite to use for applications that want to
avoid the security and availability risks associated with CCM_8 while retaining
interoperability with the rest of the ecosystem.</t>

<t>In order to ameliorate the situation, this document RECOMMENDS that
implementations support the following two ciphersuites:</t>

<t><list style="symbols">
  <t>TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256</t>
  <t>TLS_ECDHE_ECDSA_WITH_AES_128_CCM</t>
</list></t>

<t>and offer them as their first choice.  These ciphersuites provide
confidentiality and integrity limits that are considered acceptable in the most
general settings.  For the details on the exact bounds of both ciphersuites see
Section 4.5.3 of <xref target="DTLS13"/>.  Note that the GCM-based ciphersuite offers
superior interoperability with cloud services at the cost of a slight increase
in the wire and peak RAM footprints.</t>

<t>When the GCM-based ciphersuite is used with TLS 1.2, the recommendations in
Section 6.2.1 of <xref target="RFC9325"/> related to deterministic nonce generation
apply.  In addition, the integrity limits on key usage detailed in Section 4.4
of <xref target="RFC9325"/> also apply.</t>

</section>
<section anchor="fault-attacks-on-deterministic-signature-schemes"><name>Fault Attacks on Deterministic Signature Schemes</name>

<t>A number of passive side-channel attacks as well as active fault-injection
attacks (e.g., <xref target="Ambrose2017"/>) have been demonstrated that allow a malicious
third party to gain information about the signing key if a fully deterministic
signature scheme (e.g., <xref target="RFC6979"/> ECDSA or EdDSA <xref target="RFC8032"/>) is used.</t>

<t>Most of these attacks assume physical access to the device and are therefore
especially relevant to smart cards as well as IoT deployments with poor or
non-existent physical security.</t>

<t>In this security model, it is recommended to combine both randomness and
determinism, for example, as described in
<xref target="I-D.mattsson-cfrg-det-sigs-with-noise"/>.</t>

</section>
<section anchor="open-issues"><name>Open Issues</name>

<t>A list of open issues can be found at https://github.com/thomas-fossati/draft-tls13-iot/issues</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>This entire document is about security.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document makes no requests to IANA.</t>

</section>


  </middle>

  <back>


    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="DTLS13">
  <front>
    <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
    <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
    <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
    <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
    <date month="April" year="2022"/>
    <abstract>
      <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
      <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
      <t>This document obsoletes RFC 6347.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9147"/>
  <seriesInfo name="DOI" value="10.17487/RFC9147"/>
</reference>

<reference anchor="TLS13">
  <front>
    <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
    <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
    <date month="August" year="2018"/>
    <abstract>
      <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
      <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8446"/>
  <seriesInfo name="DOI" value="10.17487/RFC8446"/>
</reference>

<reference anchor="RFC8446">
  <front>
    <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
    <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
    <date month="August" year="2018"/>
    <abstract>
      <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
      <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8446"/>
  <seriesInfo name="DOI" value="10.17487/RFC8446"/>
</reference>

<reference anchor="RFC7925">
  <front>
    <title>Transport Layer Security (TLS) / Datagram Transport Layer Security (DTLS) Profiles for the Internet of Things</title>
    <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig"/>
    <author fullname="T. Fossati" initials="T." surname="Fossati"/>
    <date month="July" year="2016"/>
    <abstract>
      <t>A common design pattern in Internet of Things (IoT) deployments is the use of a constrained device that collects data via sensors or controls actuators for use in home automation, industrial control systems, smart cities, and other IoT deployments.</t>
      <t>This document defines a Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) 1.2 profile that offers communications security for this data exchange thereby preventing eavesdropping, tampering, and message forgery. The lack of communication security is a common vulnerability in IoT products that can easily be solved by using these well-researched and widely deployed Internet security protocols.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7925"/>
  <seriesInfo name="DOI" value="10.17487/RFC7925"/>
</reference>

<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>

<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>

<reference anchor="RFC9258">
  <front>
    <title>Importing External Pre-Shared Keys (PSKs) for TLS 1.3</title>
    <author fullname="D. Benjamin" initials="D." surname="Benjamin"/>
    <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
    <date month="July" year="2022"/>
    <abstract>
      <t>This document describes an interface for importing external Pre-Shared Keys (PSKs) into TLS 1.3.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9258"/>
  <seriesInfo name="DOI" value="10.17487/RFC9258"/>
</reference>

<reference anchor="RFC8449">
  <front>
    <title>Record Size Limit Extension for TLS</title>
    <author fullname="M. Thomson" initials="M." surname="Thomson"/>
    <date month="August" year="2018"/>
    <abstract>
      <t>An extension to Transport Layer Security (TLS) is defined that allows endpoints to negotiate the maximum size of protected records that each will send the other.</t>
      <t>This replaces the maximum fragment length extension defined in RFC 6066.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8449"/>
  <seriesInfo name="DOI" value="10.17487/RFC8449"/>
</reference>

<reference anchor="RFC5280">
  <front>
    <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
    <author fullname="D. Cooper" initials="D." surname="Cooper"/>
    <author fullname="S. Santesson" initials="S." surname="Santesson"/>
    <author fullname="S. Farrell" initials="S." surname="Farrell"/>
    <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
    <author fullname="R. Housley" initials="R." surname="Housley"/>
    <author fullname="W. Polk" initials="W." surname="Polk"/>
    <date month="May" year="2008"/>
    <abstract>
      <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5280"/>
  <seriesInfo name="DOI" value="10.17487/RFC5280"/>
</reference>

<reference anchor="RFC5758">
  <front>
    <title>Internet X.509 Public Key Infrastructure: Additional Algorithms and Identifiers for DSA and ECDSA</title>
    <author fullname="Q. Dang" initials="Q." surname="Dang"/>
    <author fullname="S. Santesson" initials="S." surname="Santesson"/>
    <author fullname="K. Moriarty" initials="K." surname="Moriarty"/>
    <author fullname="D. Brown" initials="D." surname="Brown"/>
    <author fullname="T. Polk" initials="T." surname="Polk"/>
    <date month="January" year="2010"/>
    <abstract>
      <t>This document updates RFC 3279 to specify algorithm identifiers and ASN.1 encoding rules for the Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA) digital signatures when using SHA-224, SHA-256, SHA-384, or SHA-512 as the hashing algorithm. This specification applies to the Internet X.509 Public Key infrastructure (PKI) when digital signatures are used to sign certificates and certificate revocation lists (CRLs). This document also identifies all four SHA2 hash algorithms for use in the Internet X.509 PKI. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5758"/>
  <seriesInfo name="DOI" value="10.17487/RFC5758"/>
</reference>

<reference anchor="RFC5480">
  <front>
    <title>Elliptic Curve Cryptography Subject Public Key Information</title>
    <author fullname="S. Turner" initials="S." surname="Turner"/>
    <author fullname="D. Brown" initials="D." surname="Brown"/>
    <author fullname="K. Yiu" initials="K." surname="Yiu"/>
    <author fullname="R. Housley" initials="R." surname="Housley"/>
    <author fullname="T. Polk" initials="T." surname="Polk"/>
    <date month="March" year="2009"/>
    <abstract>
      <t>This document specifies the syntax and semantics for the Subject Public Key Information field in certificates that support Elliptic Curve Cryptography. This document updates Sections 2.3.5 and 5, and the ASN.1 module of "Algorithms and Identifiers for the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile", RFC 3279. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5480"/>
  <seriesInfo name="DOI" value="10.17487/RFC5480"/>
</reference>




    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="RFC9146">
  <front>
    <title>Connection Identifier for DTLS 1.2</title>
    <author fullname="E. Rescorla" initials="E." role="editor" surname="Rescorla"/>
    <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig"/>
    <author fullname="T. Fossati" initials="T." surname="Fossati"/>
    <author fullname="A. Kraus" initials="A." surname="Kraus"/>
    <date month="March" year="2022"/>
    <abstract>
      <t>This document specifies the Connection ID (CID) construct for the Datagram Transport Layer Security (DTLS) protocol version 1.2.</t>
      <t>A CID is an identifier carried in the record layer header that gives the recipient additional information for selecting the appropriate security association. In "classical" DTLS, selecting a security association of an incoming DTLS record is accomplished with the help of the 5-tuple. If the source IP address and/or source port changes during the lifetime of an ongoing DTLS session, then the receiver will be unable to locate the correct security context.</t>
      <t>The new ciphertext record format with the CID also provides content type encryption and record layer padding.</t>
      <t>This document updates RFC 6347.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9146"/>
  <seriesInfo name="DOI" value="10.17487/RFC9146"/>
</reference>

<reference anchor="CoAP">
  <front>
    <title>The Constrained Application Protocol (CoAP)</title>
    <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
    <author fullname="K. Hartke" initials="K." surname="Hartke"/>
    <author fullname="C. Bormann" initials="C." surname="Bormann"/>
    <date month="June" year="2014"/>
    <abstract>
      <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
      <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7252"/>
  <seriesInfo name="DOI" value="10.17487/RFC7252"/>
</reference>


<reference anchor="ADD" target="https://datatracker.ietf.org/wg/add/about/">
  <front>
    <title>Adaptive DNS Discovery (add) Working Group</title>
    <author >
      <organization>IETF</organization>
    </author>
    <date year="2023" month="September"/>
  </front>
</reference>
<reference anchor="_8021AR" target="https://1.ieee802.org/security/802-1ar">
  <front>
    <title>IEEE Standard for Local and metropolitan area networks – Secure Device Identity, IEEE 802.1AR-2018</title>
    <author >
      <organization>IEEE</organization>
    </author>
    <date year="2018" month="August"/>
  </front>
</reference>
<reference anchor="FDO" target="https://fidoalliance.org/specifications/download-iot-specifications/">
  <front>
    <title>FIDO Device Onboard Specification 1.1</title>
    <author >
      <organization>FIDO Alliance</organization>
    </author>
    <date year="2022" month="April"/>
  </front>
</reference>
<reference anchor="LwM2M" target="https://openmobilealliance.org/release/LightweightM2M/V1_2_1-20221209-A/">
  <front>
    <title>Lightweight Machine to Machine (LwM2M) V.1.2.1 Technical Specification: Transport Bindings</title>
    <author >
      <organization>OMA SpecWorks</organization>
    </author>
    <date year="2022" month="December"/>
  </front>
</reference>
<reference anchor="Ambrose2017" target="https://eprint.iacr.org/2017/975.pdf">
  <front>
    <title>Differential Attacks on Deterministic Signatures</title>
    <author initials="C." surname="Ambrose" fullname="Christopher Ambrose">
      <organization></organization>
    </author>
    <author initials="J. W." surname="Bos" fullname="Joppe W. Bos">
      <organization></organization>
    </author>
    <author initials="B." surname="Fay" fullname="Björn Fay">
      <organization></organization>
    </author>
    <author initials="M." surname="Joye" fullname="Marc Joye">
      <organization></organization>
    </author>
    <author initials="M." surname="Lochter" fullname="Manfred Lochter">
      <organization></organization>
    </author>
    <author initials="B." surname="Murray" fullname="Bruce Murray">
      <organization></organization>
    </author>
    <date year="2017"/>
  </front>
</reference>


<reference anchor="RFC9325">
  <front>
    <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
    <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
    <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
    <author fullname="T. Fossati" initials="T." surname="Fossati"/>
    <date month="November" year="2022"/>
    <abstract>
      <t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are used to protect data exchanged over a wide range of application protocols and can also form the basis for secure transport protocols. Over the years, the industry has witnessed several serious attacks on TLS and DTLS, including attacks on the most commonly used cipher suites and their modes of operation. This document provides the latest recommendations for ensuring the security of deployed services that use TLS and DTLS. These recommendations are applicable to the majority of use cases.</t>
      <t>RFC 7525, an earlier version of the TLS recommendations, was published when the industry was transitioning to TLS 1.2. Years later, this transition is largely complete, and TLS 1.3 is widely available. This document updates the guidance given the new environment and obsoletes RFC 7525. In addition, this document updates RFCs 5288 and 6066 in view of recent attacks.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="195"/>
  <seriesInfo name="RFC" value="9325"/>
  <seriesInfo name="DOI" value="10.17487/RFC9325"/>
</reference>


<reference anchor="I-D.ietf-tls-ctls">
   <front>
      <title>Compact TLS 1.3</title>
      <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
         <organization>Mozilla</organization>
      </author>
      <author fullname="Richard Barnes" initials="R." surname="Barnes">
         <organization>Cisco</organization>
      </author>
      <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
         </author>
      <author fullname="Benjamin M. Schwartz" initials="B. M." surname="Schwartz">
         <organization>Google</organization>
      </author>
      <date day="13" month="March" year="2023"/>
      <abstract>
	 <t>   This document specifies a &quot;compact&quot; version of TLS 1.3 and DTLS 1.3.
   It saves bandwidth by trimming obsolete material, tighter encoding, a
   template-based specialization technique, and alternative
   cryptographic techniques. cTLS is not directly interoperable with TLS
   1.3 or DTLS 1.3 since the over-the-wire framing is different.  A
   single server can, however, offer cTLS alongside TLS or DTLS.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-tls-ctls-08"/>
   
</reference>


<reference anchor="I-D.ietf-tls-esni">
   <front>
      <title>TLS Encrypted Client Hello</title>
      <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
         <organization>RTFM, Inc.</organization>
      </author>
      <author fullname="Kazuho Oku" initials="K." surname="Oku">
         <organization>Fastly</organization>
      </author>
      <author fullname="Nick Sullivan" initials="N." surname="Sullivan">
         <organization>Cloudflare</organization>
      </author>
      <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
         <organization>Cloudflare</organization>
      </author>
      <date day="9" month="October" year="2023"/>
      <abstract>
	 <t>   This document describes a mechanism in Transport Layer Security (TLS)
   for encrypting a ClientHello message under a server public key.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/tlswg/draft-ietf-tls-esni
   (https://github.com/tlswg/draft-ietf-tls-esni).

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-tls-esni-17"/>
   
</reference>


<reference anchor="I-D.irtf-cfrg-hpke">
   <front>
      <title>Hybrid Public Key Encryption</title>
      <author fullname="Richard Barnes" initials="R." surname="Barnes">
         <organization>Cisco</organization>
      </author>
      <author fullname="Karthikeyan Bhargavan" initials="K." surname="Bhargavan">
         <organization>Inria</organization>
      </author>
      <author fullname="Benjamin Lipp" initials="B." surname="Lipp">
         <organization>Inria</organization>
      </author>
      <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
         <organization>Cloudflare</organization>
      </author>
      <date day="2" month="September" year="2021"/>
      <abstract>
	 <t>This document describes a scheme for hybrid public key encryption (HPKE). This scheme provides a variant of public key encryption of arbitrary-sized plaintexts for a recipient public key. It also includes three authenticated variants, including one that authenticates possession of a pre-shared key and two optional ones that authenticate possession of a key encapsulation mechanism (KEM) private key. HPKE works for any combination of an asymmetric KEM, key derivation function (KDF), and authenticated encryption with additional data (AEAD) encryption function. Some authenticated variants may not be supported by all KEMs. We provide instantiations of the scheme using widely used and efficient primitives, such as Elliptic Curve Diffie-Hellman (ECDH) key agreement, HMAC-based key derivation function (HKDF), and SHA2.

 This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF.
	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-irtf-cfrg-hpke-12"/>
   
</reference>

<reference anchor="RFC8484">
  <front>
    <title>DNS Queries over HTTPS (DoH)</title>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <author fullname="P. McManus" initials="P." surname="McManus"/>
    <date month="October" year="2018"/>
    <abstract>
      <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS. Each DNS query-response pair is mapped into an HTTP exchange.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8484"/>
  <seriesInfo name="DOI" value="10.17487/RFC8484"/>
</reference>

<reference anchor="RFC7858">
  <front>
    <title>Specification for DNS over Transport Layer Security (TLS)</title>
    <author fullname="Z. Hu" initials="Z." surname="Hu"/>
    <author fullname="L. Zhu" initials="L." surname="Zhu"/>
    <author fullname="J. Heidemann" initials="J." surname="Heidemann"/>
    <author fullname="A. Mankin" initials="A." surname="Mankin"/>
    <author fullname="D. Wessels" initials="D." surname="Wessels"/>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <date month="May" year="2016"/>
    <abstract>
      <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS. Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626. In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
      <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group. It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7858"/>
  <seriesInfo name="DOI" value="10.17487/RFC7858"/>
</reference>

<reference anchor="RFC8094">
  <front>
    <title>DNS over Datagram Transport Layer Security (DTLS)</title>
    <author fullname="T. Reddy" initials="T." surname="Reddy"/>
    <author fullname="D. Wing" initials="D." surname="Wing"/>
    <author fullname="P. Patil" initials="P." surname="Patil"/>
    <date month="February" year="2017"/>
    <abstract>
      <t>DNS queries and responses are visible to network elements on the path between the DNS client and its server. These queries and responses can contain privacy-sensitive information, which is valuable to protect.</t>
      <t>This document proposes the use of Datagram Transport Layer Security (DTLS) for DNS, to protect against passive listeners and certain active attacks. As latency is critical for DNS, this proposal also discusses mechanisms to reduce DTLS round trips and reduce the DTLS handshake size. The proposed mechanism runs over port 853.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8094"/>
  <seriesInfo name="DOI" value="10.17487/RFC8094"/>
</reference>

<reference anchor="RFC8995">
  <front>
    <title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
    <author fullname="M. Pritikin" initials="M." surname="Pritikin"/>
    <author fullname="M. Richardson" initials="M." surname="Richardson"/>
    <author fullname="T. Eckert" initials="T." surname="Eckert"/>
    <author fullname="M. Behringer" initials="M." surname="Behringer"/>
    <author fullname="K. Watsen" initials="K." surname="Watsen"/>
    <date month="May" year="2021"/>
    <abstract>
      <t>This document specifies automated bootstrapping of an Autonomic Control Plane. To do this, a Secure Key Infrastructure is bootstrapped. This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline. We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device. The established secure connection can be used to deploy a locally issued certificate to the device as well.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8995"/>
  <seriesInfo name="DOI" value="10.17487/RFC8995"/>
</reference>

<reference anchor="RFC7030">
  <front>
    <title>Enrollment over Secure Transport</title>
    <author fullname="M. Pritikin" initials="M." role="editor" surname="Pritikin"/>
    <author fullname="P. Yee" initials="P." role="editor" surname="Yee"/>
    <author fullname="D. Harkins" initials="D." role="editor" surname="Harkins"/>
    <date month="October" year="2013"/>
    <abstract>
      <t>This document profiles certificate enrollment for clients using Certificate Management over CMS (CMC) messages over a secure transport. This profile, called Enrollment over Secure Transport (EST), describes a simple, yet functional, certificate management protocol targeting Public Key Infrastructure (PKI) clients that need to acquire client certificates and associated Certification Authority (CA) certificates. It also supports client-generated public/private key pairs as well as key pairs generated by the CA.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7030"/>
  <seriesInfo name="DOI" value="10.17487/RFC7030"/>
</reference>


<reference anchor="I-D.ietf-lamps-lightweight-cmp-profile">
   <front>
      <title>Lightweight Certificate Management Protocol (CMP) Profile</title>
      <author fullname="Hendrik Brockhaus" initials="H." surname="Brockhaus">
         <organization>Siemens</organization>
      </author>
      <author fullname="David von Oheimb" initials="D." surname="von Oheimb">
         <organization>Siemens</organization>
      </author>
      <author fullname="Steffen Fries" initials="S." surname="Fries">
         <organization>Siemens AG</organization>
      </author>
      <date day="17" month="February" year="2023"/>
      <abstract>
	 <t>   This document aims at simple, interoperable, and automated PKI
   management operations covering typical use cases of industrial and
   IoT scenarios.  This is achieved by profiling the Certificate
   Management Protocol (CMP), the related Certificate Request Message
   Format (CRMF), and HTTP-based or CoAP-based transfer in a succinct
   but sufficiently detailed and self-contained way.  To make secure
   certificate management for simple scenarios and constrained devices
   as lightweight as possible, only the most crucial types of operations
   and options are specified as mandatory.  More specialized or complex
   use cases are supported with optional features.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-lightweight-cmp-profile-21"/>
   
</reference>

<reference anchor="RFC9019">
  <front>
    <title>A Firmware Update Architecture for Internet of Things</title>
    <author fullname="B. Moran" initials="B." surname="Moran"/>
    <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
    <author fullname="D. Brown" initials="D." surname="Brown"/>
    <author fullname="M. Meriac" initials="M." surname="Meriac"/>
    <date month="April" year="2021"/>
    <abstract>
      <t>Vulnerabilities in Internet of Things (IoT) devices have raised the need for a reliable and secure firmware update mechanism suitable for devices with resource constraints. Incorporating such an update mechanism is a fundamental requirement for fixing vulnerabilities, but it also enables other important capabilities such as updating configuration settings and adding new functionality.</t>
      <t>In addition to the definition of terminology and an architecture, this document provides the motivation for the standardization of a manifest format as a transport-agnostic means for describing and protecting firmware updates.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9019"/>
  <seriesInfo name="DOI" value="10.17487/RFC9019"/>
</reference>


<reference anchor="I-D.irtf-t2trg-taxonomy-manufacturer-anchors">
   <front>
      <title>A Taxonomy of operational security considerations for manufacturer installed keys and Trust Anchors</title>
      <author fullname="Michael Richardson" initials="M." surname="Richardson">
         <organization>Sandelman Software Works</organization>
      </author>
      <date day="6" month="August" year="2023"/>
      <abstract>
	 <t>   This document provides a taxonomy of methods used by manufacturers of
   silicon and devices to secure private keys and public trust anchors.
   This deals with two related activities: how trust anchors and private
   keys are installed into devices during manufacturing, and how the
   related manufacturer held private keys are secured against
   disclosure.

   This document does not evaluate the different mechanisms, but rather
   just serves to name them in a consistent manner in order to aid in
   communication.

   RFCEDITOR: please remove this paragraph.  This work is occurring in
   https://github.com/mcr/idevid-security-considerations

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-irtf-t2trg-taxonomy-manufacturer-anchors-02"/>
   
</reference>

<reference anchor="RFC7924">
  <front>
    <title>Transport Layer Security (TLS) Cached Information Extension</title>
    <author fullname="S. Santesson" initials="S." surname="Santesson"/>
    <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
    <date month="July" year="2016"/>
    <abstract>
      <t>Transport Layer Security (TLS) handshakes often include fairly static information, such as the server certificate and a list of trusted certification authorities (CAs). This information can be of considerable size, particularly if the server certificate is bundled with a complete certificate chain (i.e., the certificates of intermediate CAs up to the root CA).</t>
      <t>This document defines an extension that allows a TLS client to inform a server of cached information, thereby enabling the server to omit already available information.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7924"/>
  <seriesInfo name="DOI" value="10.17487/RFC7924"/>
</reference>

<reference anchor="RFC6066">
  <front>
    <title>Transport Layer Security (TLS) Extensions: Extension Definitions</title>
    <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
    <date month="January" year="2011"/>
    <abstract>
      <t>This document provides specifications for existing TLS extensions. It is a companion document for RFC 5246, "The Transport Layer Security (TLS) Protocol Version 1.2". The extensions specified are server_name, max_fragment_length, client_certificate_url, trusted_ca_keys, truncated_hmac, and status_request. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6066"/>
  <seriesInfo name="DOI" value="10.17487/RFC6066"/>
</reference>


<reference anchor="I-D.ietf-dance-tls-clientid">
   <front>
      <title>TLS Extension for DANE Client Identity</title>
      <author fullname="Shumon Huque" initials="S." surname="Huque">
         <organization>Salesforce</organization>
      </author>
      <author fullname="Viktor Dukhovni" initials="V." surname="Dukhovni">
         <organization>Two Sigma</organization>
      </author>
      <date day="12" month="May" year="2023"/>
      <abstract>
	 <t>   This document specifies a TLS and DTLS extension to convey a DNS-
   Based Authentication of Named Entities (DANE) Client Identity to a
   TLS or DTLS server.  This is useful for applications that perform TLS
   client authentication via DANE TLSA records.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-dance-tls-clientid-02"/>
   
</reference>



<reference anchor="RFC668">
<front>
<title>Not Issued</title>
<author fullname="" initials="" surname=""><organization/></author>
</front>
<seriesInfo name="RFC" value="668"/>
</reference>

<reference anchor="RFC8879">
  <front>
    <title>TLS Certificate Compression</title>
    <author fullname="A. Ghedini" initials="A." surname="Ghedini"/>
    <author fullname="V. Vasiliev" initials="V." surname="Vasiliev"/>
    <date month="December" year="2020"/>
    <abstract>
      <t>In TLS handshakes, certificate chains often take up the majority of the bytes transmitted.</t>
      <t>This document describes how certificate chains can be compressed to reduce the amount of data transmitted and avoid some round trips.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8879"/>
  <seriesInfo name="DOI" value="10.17487/RFC8879"/>
</reference>

<reference anchor="RFC7250">
  <front>
    <title>Using Raw Public Keys in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
    <author fullname="P. Wouters" initials="P." role="editor" surname="Wouters"/>
    <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig"/>
    <author fullname="J. Gilmore" initials="J." surname="Gilmore"/>
    <author fullname="S. Weiler" initials="S." surname="Weiler"/>
    <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
    <date month="June" year="2014"/>
    <abstract>
      <t>This document specifies a new certificate type and two TLS extensions for exchanging raw public keys in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS). The new certificate type allows raw public keys to be used for authentication.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7250"/>
  <seriesInfo name="DOI" value="10.17487/RFC7250"/>
</reference>


<reference anchor="I-D.ietf-cose-cbor-encoded-cert">
   <front>
      <title>CBOR Encoded X.509 Certificates (C509 Certificates)</title>
      <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
         <organization>Ericsson AB</organization>
      </author>
      <author fullname="Göran Selander" initials="G." surname="Selander">
         <organization>Ericsson AB</organization>
      </author>
      <author fullname="Shahid Raza" initials="S." surname="Raza">
         <organization>RISE AB</organization>
      </author>
      <author fullname="Joel Höglund" initials="J." surname="Höglund">
         <organization>RISE AB</organization>
      </author>
      <author fullname="Martin Furuhed" initials="M." surname="Furuhed">
         <organization>Nexus Group</organization>
      </author>
      <date day="20" month="October" year="2023"/>
      <abstract>
	 <t>   This document specifies a CBOR encoding of X.509 certificates.  The
   resulting certificates are called C509 Certificates.  The CBOR
   encoding supports a large subset of RFC 5280 and all certificates
   compatible with the RFC 7925, IEEE 802.1AR (DevID), CNSA, RPKI, GSMA
   eUICC, and CA/Browser Forum Baseline Requirements profiles.  When
   used to re-encode DER encoded X.509 certificates, the CBOR encoding
   can in many cases reduce the size of RFC 7925 profiled certificates
   with over 50%.  The CBOR encoded structure can alternatively be
   signed directly (&quot;natively signed&quot;), which does not require re-
   encoding for the signature to be verified.  The document also
   specifies C509 COSE headers, a C509 TLS certificate type, and a C509
   file format.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-cose-cbor-encoded-cert-07"/>
   
</reference>


<reference anchor="I-D.irtf-cfrg-aead-limits">
   <front>
      <title>Usage Limits on AEAD Algorithms</title>
      <author fullname="Felix Günther" initials="F." surname="Günther">
         <organization>ETH Zurich</organization>
      </author>
      <author fullname="Martin Thomson" initials="M." surname="Thomson">
         <organization>Mozilla</organization>
      </author>
      <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
         <organization>Cloudflare</organization>
      </author>
      <date day="31" month="May" year="2023"/>
      <abstract>
	 <t>   An Authenticated Encryption with Associated Data (AEAD) algorithm
   provides confidentiality and integrity.  Excessive use of the same
   key can give an attacker advantages in breaking these properties.
   This document provides simple guidance for users of common AEAD
   functions about how to limit the use of keys in order to bound the
   advantage given to an attacker.  It considers limits in both single-
   and multi-key settings.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-irtf-cfrg-aead-limits-07"/>
   
</reference>

<reference anchor="RFC6979">
  <front>
    <title>Deterministic Usage of the Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA)</title>
    <author fullname="T. Pornin" initials="T." surname="Pornin"/>
    <date month="August" year="2013"/>
    <abstract>
      <t>This document defines a deterministic digital signature generation procedure. Such signatures are compatible with standard Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA) digital signatures and can be processed with unmodified verifiers, which need not be aware of the procedure described therein. Deterministic signatures retain the cryptographic security features associated with digital signatures but can be more easily implemented in various environments, since they do not need access to a source of high-quality randomness.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6979"/>
  <seriesInfo name="DOI" value="10.17487/RFC6979"/>
</reference>

<reference anchor="RFC8032">
  <front>
    <title>Edwards-Curve Digital Signature Algorithm (EdDSA)</title>
    <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
    <author fullname="I. Liusvaara" initials="I." surname="Liusvaara"/>
    <date month="January" year="2017"/>
    <abstract>
      <t>This document describes elliptic curve signature scheme Edwards-curve Digital Signature Algorithm (EdDSA). The algorithm is instantiated with recommended parameters for the edwards25519 and edwards448 curves. An example implementation and test vectors are provided.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8032"/>
  <seriesInfo name="DOI" value="10.17487/RFC8032"/>
</reference>


<reference anchor="I-D.mattsson-cfrg-det-sigs-with-noise">
   <front>
      <title>Deterministic ECDSA and EdDSA Signatures with Additional Randomness</title>
      <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
         <organization>Ericsson</organization>
      </author>
      <author fullname="Erik Thormarker" initials="E." surname="Thormarker">
         <organization>Ericsson</organization>
      </author>
      <author fullname="Sini Ruohomaa" initials="S." surname="Ruohomaa">
         <organization>Ericsson</organization>
      </author>
      <date day="15" month="February" year="2022"/>
      <abstract>
	 <t>   Deterministic elliptic-curve signatures such as deterministic ECDSA
   and EdDSA have gained popularity over randomized ECDSA as their
   security do not depend on a source of high-quality randomness.
   Recent research has however found that implementations of these
   signature algorithms may be vulnerable to certain side-channel and
   fault injection attacks due to their determinism.  One countermeasure
   to such attacks is to re-add randomness to the otherwise
   deterministic calculation of the per-message secret number.  This
   document updates RFC 6979 and RFC 8032 to recommend constructions
   with additional randomness for deployments where side-channel attacks
   and fault injection attacks are a concern.  The updates are invisible
   to the validator of the signature and compatible with existing ECDSA
   and EdDSA validators.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-mattsson-cfrg-det-sigs-with-noise-04"/>
   
</reference>




    </references>


<?line 753?>

<section numbered="false" anchor="acknowledgments"><name>Acknowledgments</name>

<t>We would like to thank Ben Kaduk, Hendrik Brockhaus, John Mattsson and Michael Richardson.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

