<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.39 (Ruby 3.2.2) -->
<?rfc rfcedstyle="yes"?>
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc text-list-symbols="o-*+"?>
<?rfc compact="yes"?>
<?rfc subcompact="yes"?>
<?rfc consensus="no"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-uta-tls13-iot-profile-09" category="std" consensus="true" submissionType="IETF" updates="7925" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.0 -->
  <front>
    <title abbrev="TLS/DTLS 1.3 IoT Profiles">TLS/DTLS 1.3 Profiles for the Internet of Things</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-uta-tls13-iot-profile-09"/>
    <author initials="H." surname="Tschofenig" fullname="Hannes Tschofenig">
      <organization/>
      <address>
        <email>Hannes.Tschofenig@gmx.net</email>
      </address>
    </author>
    <author initials="T." surname="Fossati" fullname="Thomas Fossati">
      <organization>Linaro</organization>
      <address>
        <email>Thomas.Fossati@linaro.com</email>
      </address>
    </author>
    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <date year="2024" month="March" day="03"/>
    <area>Security</area>
    <workgroup>UTA</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 106?>

<t>This document is a companion to RFC 7925 and defines TLS/DTLS 1.3 profiles for
Internet of Things devices.  It also updates RFC 7925 with regards to the X.509
certificate profile.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Source for this draft and an issue tracker can be found at
  <eref target="https://github.com/thomas-fossati/draft-tls13-iot"/>.</t>
    </note>
  </front>
  <middle>
    <?line 112?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This document defines a profile of DTLS 1.3 <xref target="DTLS13"/> and TLS
1.3 <xref target="RFC8446"/> that offers communication security services for IoT
applications and is reasonably implementable on many constrained devices.
Profile thereby means that available configuration options and protocol
extensions are utilized to best support the IoT environment.</t>
      <t>For IoT profiles using TLS/DTLS 1.2 please consult <xref target="RFC7925"/>. This document
re-uses the communication pattern defined in <xref target="RFC7925"/> and makes IoT-domain
specific recommendations for version 1.3 (where necessary).</t>
      <t>TLS 1.3 has been re-designed and several previously defined extensions are not
applicable to the new version of TLS/DTLS anymore. The following features changed
with the transition from TLS 1.2 to 1.3:</t>
      <ul spacing="compact">
        <li>TLS 1.3 introduced the concept of post-handshake authentication messages, which
partially replaced the need for the re-negotiation feature <xref target="RFC5746"/> available
in earlier TLS versions. However, rekeying defined in <xref section="4.6.3" sectionFormat="of" target="TLS13"/>
does not provide forward secrecy and post-handshake authentication defined in
<xref section="4.6.2" sectionFormat="of" target="TLS13"/> only offers client-to-server authentication.
The "Exported Authenticator" specification, see <xref target="RFC9261"/>, recently added support for mutual,
post-handshake authentication but
requires payloads to be exchanged by the application layer protocol.</li>
        <li>Rekeying of the application traffic secret does not lead to an update of the
exporter secret (see <xref section="7.5" sectionFormat="of" target="TLS13"/>) since the derived export secret is
based on the exporter_master_secret and not on the application traffic secret.</li>
        <li>Flight #4, which was used by EAP-TLS 1.2 <xref target="RFC5216"/>, does not exist in TLS 1.3.
As a consequence, EAP-TLS 1.3 <xref target="RFC9190"/> introduced a dummy message.</li>
        <li>
          <xref target="RFC4279"/> introduced PSK-based authentication to TLS, a feature re-designed
in TLS 1.3. The "PSK identity hint" defined in <xref target="RFC4279"/>, which is used by the
server to help the client in selecting which PSK identity to use, is, however, not
available anymore in TLS 1.3.</li>
      </ul>
      <t>Finally, ciphersuites were depreciated and the RSA-based key transport is not yet
supported in TLS 1.3.</t>
      <section anchor="conventions-and-terminology">
        <name>Conventions and Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
<?line -6?>
        </t>
        <t>This document reuses the terms "SHOULD+", "SHOULD-" and "MUST-" from <xref target="RFC8221"/>.</t>
      </section>
    </section>
    <section anchor="credential-types">
      <name>Credential Types</name>
      <t>In accordance with the recommendations in <xref target="RFC7925"/>, a compliant
implementation MUST implement TLS_AES_128_CCM_8_SHA256. It SHOULD implement
TLS_CHACHA20_POLY1305_SHA256.</t>
      <t>Pre-shared key based authentication is integrated into the main TLS/DTLS 1.3
specification and has been harmonized with session resumption.</t>
      <t>A compliant implementation supporting authentication based on certificates and
raw public keys MUST support digital signatures with ecdsa_secp256r1_sha256. A
compliant implementation MUST support the key exchange with secp256r1 (NIST
P-256) and SHOULD support key exchange with X25519.</t>
      <t>A plain PSK-based TLS/DTLS client or server MUST implement the following
extensions:</t>
      <ul spacing="compact">
        <li>Supported Versions,</li>
        <li>Cookie,</li>
        <li>Server Name Indication (SNI),</li>
        <li>Pre-Shared Key,</li>
        <li>PSK Key Exchange Modes, and</li>
        <li>Application-Layer Protocol Negotiation (ALPN).</li>
      </ul>
      <t>For use of external pre-shared keys <xref target="RFC9258"/> makes the following
recommendation:</t>
      <ul empty="true">
        <li>
          <t>Applications SHOULD provision separate PSKs for (D)TLS 1.3 and prior versions.</t>
        </li>
      </ul>
      <t>Where possible, the importer interface defined in <xref target="RFC9258"/> MUST be used
for external PSKs. This ensures that external PSKs used in (D)TLS 1.3
are bound to a specific key derivation function (KDF) and hash function.</t>
      <t>The SNI extension is discussed in this document and the justification
for implementing and using the ALPN extension can be found in <xref target="RFC9325"/>.</t>
      <t>For TLS/DTLS clients and servers implementing raw public keys and/or
certificates the guidance for mandatory-to-implement extensions described in
Section 9.2 of <xref target="RFC8446"/> MUST be followed.</t>
    </section>
    <section anchor="error-handling">
      <name>Error Handling</name>
      <t>TLS 1.3 simplified the Alert protocol but the underlying challenge in an
embedded context remains unchanged, namely what should an IoT device do when it
encounters an error situation. The classical approach used in a desktop
environment where the user is prompted is often not applicable with unattended
devices. Hence, it is more important for a developer to find out from which
error cases a device can recover from.</t>
    </section>
    <section anchor="session-resumption">
      <name>Session Resumption</name>
      <t>TLS 1.3 has built-in support for session resumption by utilizing PSK-based
credentials established in an earlier exchange.</t>
    </section>
    <section anchor="compression">
      <name> Compression</name>
      <t>TLS 1.3 does not have support for compression of application data traffic, as offered
by previous versions of TLS. Applications are therefore responsible for transmitting
payloads that are either compressed or use a more efficient encoding otherwise.</t>
      <t>With regards to the handshake itself, various strategies have
been applied to reduce the size of the exchanged payloads. TLS and DTLS 1.3 use less
overhead, depending on the type of key confirmations, when compared to previous versions of the
protocol. Additionally, the work on Compact TLS (cTLS) <xref target="I-D.ietf-tls-ctls"/> has taken compression of the handshake
a step further by utilizing out-of-band knowledge between the communication parties to reduce
the amount of data to be transmitted at each individual handshake, among applying other techniques.</t>
    </section>
    <section anchor="perfect-forward-secrecy">
      <name> Perfect Forward Secrecy</name>
      <t>TLS 1.3 allows the use of PFS with all ciphersuites since the support for it is
negotiated independently.</t>
    </section>
    <section anchor="keep-alive">
      <name>Keep-Alive</name>
      <t>The discussion in Section 10 of <xref target="RFC7925"/> is applicable.</t>
    </section>
    <section anchor="timers-and-acks">
      <name>Timers and ACKs</name>
      <t>Compared to DTLS 1.2 timeout-based whole flight retransmission, DTLS 1.3 ACKs sensibly decrease the risk of congestion collapse which was the basis for the very conservative recommendations given in <xref section="11" sectionFormat="of" target="RFC7925"/>.</t>
      <t>In general, the recommendations in <xref section="7.3" sectionFormat="of" target="DTLS13"/> regarding ACKs apply.
In particular, "[w]hen DTLS 1.3 is used in deployments with lossy networks, such as low-power, long-range radio networks as well as low-power mesh networks, the use of ACKs is recommended" to signal any sign of disruption or lack of progress.
This allows for selective or early retransmission, which leads to more efficient use of bandwidth and memory resources.</t>
      <t>Due to the vast range of network technologies used in IoT deployments, from wired LAN to GSM-SMS, it's not possible to provide a universal recommendation for an initial timeout.
Therefore, it is RECOMMENDED that DTLS 1.3 implementations allow developers to explicitly set the initial timer value.
Developers SHOULD set the initial timeout to be twice the expected round-trip time (RTT), but no less than 1000ms.
For specific application/network combinations, a sub-second initial timeout MAY be set.
In cases where no RTT estimates are available, a 1000ms initial timeout is suitable for the general Internet.</t>
      <t>For RRC, the recommendations in <xref section="7.5" sectionFormat="of" target="I-D.ietf-tls-dtls-rrc"/> apply.
Just like the handshake initial timers, it is RECOMMENDED that DTLS 1.2 and 1.3 implementations offer an option for their developers to explicitly set the RRC timer.</t>
    </section>
    <section anchor="random-number-generation">
      <name> Random Number Generation</name>
      <t>The discussion in Section 12 of <xref target="RFC7925"/> is applicable with one exception:
the ClientHello and the ServerHello messages in TLS 1.3 do not contain
gmt_unix_time component anymore.</t>
    </section>
    <section anchor="server-name-indication">
      <name>Server Name Indication</name>
      <t>This specification mandates the implementation of the Server Name Indication (SNI)
extension. Where privacy requirements require it, the ECH (Encrypted Client Hello)
extension <xref target="I-D.ietf-tls-esni"/> prevents an on-path attacker to determine the domain
name the client is trying to connect to.</t>
      <t>Since the Encrypted Client Hello extension requires use of Hybrid Public Key
Encryption (HPKE) <xref target="I-D.irtf-cfrg-hpke"/> and additional protocols require
further protocol exchanges and cryptographic operations, there is a certain
overhead associated with this privacy feature.</t>
      <t>Note that in industrial IoT deployments the use of ECH may not be an option because
network administrators inspect DNS traffic generated by IoT devices in order to
detect malicious behaviour.</t>
      <t>Besides, to avoid leaking DNS lookups from network inspection altogether further
protocols are needed, including DoH <xref target="RFC8484"/> and DPRIVE <xref target="RFC7858"/> <xref target="RFC8094"/>.
For use of such techniques in managed networks, the reader is advised to keep up to
date with the protocols defined by the Adaptive DNS Discovery (add) working group <xref target="ADD"/>.</t>
    </section>
    <section anchor="maximum-fragment-length-negotiation">
      <name> Maximum Fragment Length Negotiation</name>
      <t>The Maximum Fragment Length Negotiation (MFL) extension has been superseded by
the Record Size Limit (RSL) extension <xref target="RFC8449"/>. Implementations in
compliance with this specification MUST implement the RSL extension and SHOULD
use it to indicate their RAM limitations.</t>
    </section>
    <section anchor="crypto-agility">
      <name>Crypto Agility</name>
      <t>The recommendations in Section 19 of <xref target="RFC7925"/> are applicable.</t>
    </section>
    <section anchor="key-length-recommendations">
      <name>Key Length Recommendations</name>
      <t>The recommendations in Section 20 of <xref target="RFC7925"/> are applicable.</t>
    </section>
    <section anchor="rtt-data">
      <name>0-RTT Data</name>
      <t><xref section="E.5" sectionFormat="of" target="TLS13"/> establishes that:</t>
      <ul empty="true">
        <li>
          <t>Application protocols MUST NOT use 0-RTT data without a profile that
defines its use.  That profile needs to identify which messages or
interactions are safe to use with 0-RTT and how to handle the
situation when the server rejects 0-RTT and falls back to 1-RTT.</t>
        </li>
      </ul>
      <t>At the time of writing, no such profile has been defined for CoAP <xref target="CoAP"/>.
Therefore, 0-RTT MUST NOT be used by CoAP applications.</t>
    </section>
    <section anchor="certificate-profile">
      <name>Certificate Profile</name>
      <t>This section contains updates and clarifications to the certificate profile
defined in <xref target="RFC7925"/>. The content of Table 1 of <xref target="RFC7925"/> has been
split by certificate "type" in order to clarify exactly what requirements and
recommendations apply to which entity in the PKI hierarchy.</t>
      <t>The content is also better aligned with the IEEE 802.1AR <xref target="_8021AR"/>
specification, which introduces the terms Initial Device Identifier
(IDevID) and Locally Significant Device Identifiers (LDevIDs).
IDevIDs and LDevIDs are Device Identifier (DevID) and a DevID consists of</t>
      <ul spacing="compact">
        <li>a private key,</li>
        <li>a certificate (containing the public key and the identifier certified by
the certificate's issuer), and</li>
        <li>a certificate chain up to a trust anchor. The trust anchor is is usually
the root certificate).</li>
      </ul>
      <t>The IDevID is typically provisioned by a manufacturer and signed by the
manufacturer CA. It is then used to obtain operational certificates,
the LDevIDs, from the operator or owner of the device. Some protocols
also introduce an additional hierarchy with application instance
certificates, which are obtained for use with specific applications.</t>
      <t>IDevIDs are primarily used with device onboarding or bootstrapping protocols,
such as the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol
<xref target="RFC8995"/> or by LwM2M Bootstrap <xref target="LwM2M"/>. Hence, the use of IDevIDs
is limited in purpose even though they have a long lifetime, or do not expire
at all. While some bootstrapping protocols use TLS (and therefore make use of
the IDevID as part of client authentication) there are other bootstrapping
protocols that do not use TLS/DTLS for client authentication, such as FIDO
Device Onboarding (FDO) <xref target="FDO"/>.  In many cases, a profile for the certificate
content is provided by those specifications. For these reasons, this
specification focuses on the description of LDevIDs.</t>
      <t>While the IEEE 802.1AR terminology is utilized in this document,
this specification does not claim conformance to IEEE 802.1AR
since such a compliance statement goes beyond the use of the terminology
and the certificate content and would include the use of management
protocols, fulfillment of certain hardware security requirements, and
interfaces to access these hardware security modules. Placing these
requirements on network equipment like routers may be appropriate but
designers of constrained IoT devices have opted for different protocols
and hardware security choices.</t>
      <section anchor="all-certificates">
        <name>All Certificates</name>
        <t>To avoid repetition, this section outlines requirements on X.509
certificates applicable to all PKI entities.</t>
        <section anchor="version">
          <name>Version</name>
          <t>Certificates MUST be of type X.509 v3. Note that TLS 1.3 allows to
convey payloads other than X.509 certificates in the Certificate
message. The description in this section only focuses on X.509 v3
certificates and leaves the description of other formats to other
sections or even other specifications.</t>
        </section>
        <section anchor="serial-number">
          <name>Serial Number</name>
          <t>CAs MUST generate non-sequential serial numbers greater than or equal to eight
(8) octets from a cryptographically secure pseudo-random number generator.
<xref target="RFC5280"/> limits this field to a maximum of 20 octets.
The serial number MUST be unique
for each certificate issued by a given CA (i.e., the issuer name
and the serial number uniquely identify a certificate).</t>
          <t>This requirement is aligned with <xref target="RFC5280"/>.</t>
        </section>
        <section anchor="signature">
          <name>Signature</name>
          <t>The signature MUST be ecdsa-with-SHA256 or stronger <xref target="RFC5758"/>.</t>
          <t>Note: In contrast to IEEE 802.1AR this specification does not require
end entity certificates, subordinate CA certificates, and CA
certificates to use the same signature algorithm. Furthermore,
this specification does not utlize RSA for use with constrained IoT
devices and networks.</t>
        </section>
        <section anchor="issuer">
          <name>Issuer</name>
          <t>The issuer field MUST contain a non-empty distinguished name (DN)
of the entity that has signed and issued the certificate in accordance
to <xref target="RFC5280"/>.</t>
        </section>
        <section anchor="validity">
          <name> Validity</name>
          <t>In IoT deployment scenarios it is often expected that the IDevIDs have
no maximum validity period. For this purpose the use of a special value
for the notAfter date field, the GeneralizedTime value of 99991231235959Z,
is utilized. If this is done, then CA certificates and certificates of
subordinate CAs cannot have a maximum validity period either. Hence,
it requires careful consideration whether it is appropriate to issue
IDevID certificates with no maximum validity period.</t>
          <t>LDevID certificates are, however, issued by the operator or owner,
and may be renewed at a regular interval using protocols, such
as Enrollment over Secure Transport (EST) <xref target="RFC7030"/> or the
Certificate Management Protocol (CMP) <xref target="RFC9483"/>.
It is therefore RECOMMENDED to limit the lifetime of these LDevID certificates
using the notBefore and notAfter fields, as described in Section 4.1.2.5 of
<xref target="RFC5280"/>. Values MUST be expressed in Greenwich Mean Time (Zulu) and
MUST include seconds even where the number of seconds is zero.</t>
          <t>Note that the validity period is defined as the period of time from notBefore
through notAfter, inclusive. This means that a hypothetical certificate with a
notBefore date of 9 June 2021 at 03:42:01 and a notAfter date of 7 September
2021 at 03:42:01 becomes valid at the beginning of the :01 second, and only
becomes invalid at the :02 second, a period that is 90 days plus 1 second.  So
for a 90-day, notAfter must actually be 03:42:00.</t>
          <t>For devices without a reliable source of time we advise the use of a device
management solution, which typically includes a certificate management protocol,
to manage the lifetime of all the certificates used by the device. While this
approach does not utilize certificates to its widest extent, it is a solution
that extends the capabilities offered by a raw public key approach.</t>
        </section>
        <section anchor="subject-public-key-info">
          <name> Subject Public Key Info</name>
          <t>The SubjectPublicKeyInfo structure indicates the algorithm and any associated
parameters for the ECC public key. This profile uses the id-ecPublicKey
algorithm identifier for ECDSA signature keys, as defined and specified in
<xref target="RFC5480"/>. This specification assumes that devices supported one of the
following algorithms:</t>
          <ul spacing="compact">
            <li>id-ecPublicKey with secp256r1,</li>
            <li>id-ecPublicKey with secp384r1, and</li>
            <li>id-ecPublicKey with secp521r1.</li>
          </ul>
          <t>There is no requirement to use CA certificates and certificates of
subordinate CAs to use the same algorithm as the end-entity certificate.
Certificates with longer lifetime may well use a cryptographic stronger
algorithm.</t>
        </section>
        <section anchor="certificate-revocation-checks">
          <name>Certificate Revocation Checks</name>
          <t>The guidance in <xref section="4.4.3" sectionFormat="of" target="RFC7925"/> still holds: for certificate
revocation, neither the Online Certificate Status Protocol (OCSP) nor
Certificate Revocation Lists (CRLs) are used by constrained IoT devices.</t>
          <t>Since the publication of RFC 7925 the need for firmware update mechanisms
has been reinforced and the work on standardizing a secure and
interoperable firmware update mechanism has made substantial progress,
see <xref target="RFC9019"/>. RFC 7925 recommends to use a software / firmware update
mechanism to provision devices with new trust anchors.</t>
          <t>The use of device management protocols for IoT devices, which often include
an onboarding or bootstrapping mechanism, has also seen considerable uptake
in deployed devices and these protocols, some of which are standardized,
allow updates of certificates on demand. This enables a
deployment model where IoT device utilize end-entity certificates with
shorter lifetime making certificate revocation protocols, like OCSP
and CRLs, less relevant. Whenever certificates
are updated the TLS stack needs to be informed since the communication
endpoints need to be aware of the new certificates. This is particularly
important when long-lived TLS connections are used. In such a case, the
a post-handshake authentication exchange needs to be triggered. TLS 1.3
provides client-to-server post-handshake authentication only. Mutual
authentication via post-handshake messages is available via <xref target="RFC9261"/>
but requires the application layer protocol to carry the payloads.</t>
          <t>Hence, instead of performing certificate revocation checks on the IoT device
itself this specification recommends to delegate this task to the IoT device
operator and to take the necessary action to allow IoT devices to remain
operational.</t>
          <t>The CRL distribution points extension has been defined in RFC 5280 to
identify how CRL information is obtained. The authority information access
extension indicates how to access information like the online certificate
status service (OCSP). Both extensions SHOULD NOT be set. If set, they
MUST NOT be marked critical.</t>
        </section>
      </section>
      <section anchor="root-ca-certificate">
        <name>Root CA Certificate</name>
        <t>This section outlines the requirements for root CA certificates.</t>
        <section anchor="subject">
          <name>Subject</name>
          <t><xref target="RFC5280"/> defines the Subject field as follows: "The subject field identifies
the entity associated with the public key stored in the subject public key
field." RFC 5280 adds "If the subject is a CA then the subject field MUST be
populated with a non-empty distinguished name matching the contents of the
issuer field in all certificates issued by the subject CA."</t>
          <t>The Subject field MUST be present and MUST contain the commonName, the organizationName,
and the countryName attribute and MAY contain an organizationalUnitName attribute.</t>
        </section>
        <section anchor="authority-key-identifier">
          <name>Authority Key Identifier</name>
          <t>Section 4.2.1.1 of <xref target="RFC5280"/> defines the Authority Key Identifier as follows:
"The authority key identifier extension provides a means of identifying the
public key corresponding to the private key used to sign a certificate. This
extension is used where an issuer has multiple signing keys."</t>
          <t>The Authority Key Identifier extension MAY be omitted. If it is set, it MUST NOT be
marked critical, and MUST contain the subjectKeyIdentifier of this certificate.</t>
          <t>[Editor's Note: Do we need to set the Authority Key Identifier in the CA certificate?]</t>
        </section>
        <section anchor="subject-key-identifier">
          <name>Subject Key Identifier</name>
          <t>Section 4.2.1.2 of <xref target="RFC5280"/> defines the Subject Key Identifier as follows:
"The subject key identifier extension provides a means of identifying
certificates that contain a particular public key."</t>
          <t>The Subject Key Identifier extension MUST be set, MUST NOT be marked critical, and MUST
contain the key identifier of the public key contained in the subject public key
info field.</t>
          <t>[Editor's Note: Do we need to set the Subject Key Identifier in the CA certificate?]</t>
        </section>
        <section anchor="key-usage">
          <name>Key Usage</name>
          <t><xref target="RFC5280"/> defines the key usage field as follows: "The key usage extension defines
the purpose (e.g., encipherment, signature, certificate signing) of the key contained
in the certificate."</t>
          <t>The Key Usage extension SHOULD be set. If it is set, it MUST be marked critical and
the keyCertSign or cRLSign purposes MUST be set. Additional key usages MAY be set
depending on the intended usage of the public key.</t>
          <t>[Editor's Note: Should we harden the requirement to "The Key Usage extension MUST  be set.]</t>
          <t><xref target="RFC5280"/> defines the extended key usage as follows: "This extension indicates
one or more purposes for which the certified public key may be used, in addition to
or in place of the basic purposes indicated in the key usage extension."</t>
          <t>This extendedKeyUsage extension MUST NOT be set.</t>
        </section>
        <section anchor="basic-constraints">
          <name>Basic Constraints</name>
          <t><xref target="RFC5280"/> states that "The Basic Constraints extension identifies whether the subject
of the certificate is a CA and the maximum depth of valid certification paths that include
this certificate. The cA boolean indicates whether the certified public key may be used to
verify certificate signatures."</t>
          <t>For the pathLenConstraint RFC 5280 makes further statements:</t>
          <ul spacing="compact">
            <li>"The pathLenConstraint field is meaningful only if the cA boolean is asserted and the
key usage extension, if present, asserts the keyCertSign bit. In this case, it gives the
maximum number of non-self-issued intermediate certificates that may follow this
certificate in a valid certification path."</li>
            <li>"A pathLenConstraint of zero indicates that no non-self-issued intermediate CA
certificates may follow in a valid certification path."</li>
            <li>"Where pathLenConstraint does not appear, no limit is imposed."</li>
            <li>"Conforming CAs MUST include this extension in all CA certificates that contain public
keys used to validate digital signatures on certificates and MUST mark the extension as
critical in such certificates."</li>
          </ul>
          <t>The Basic Constraints extension MUST be set, MUST be marked critical, the cA flag MUST
be set to true and the pathLenConstraint MUST be omitted.</t>
          <t>[Editor's Note: Should we soften the requirement to: "The pathLenConstraint field SHOULD NOT be present."]</t>
        </section>
      </section>
      <section anchor="subordinate-ca-certificate">
        <name>Subordinate CA Certificate</name>
        <t>This section outlines the requirements for subordinate CA certificates.</t>
        <section anchor="subject-1">
          <name>Subject</name>
          <t>The Subject field MUST be set and MUST contain the commonName, the organizationName,
and the countryName attribute and MAY contain an organizationalUnitName attribute.</t>
        </section>
        <section anchor="authority-key-identifier-1">
          <name>Authority Key Identifier</name>
          <t>The Authority Key Identifier extension MUST be set, MUST NOT be marked critical, and
MUST contain the subjectKeyIdentifier of the CA that issued this certificate.</t>
        </section>
        <section anchor="subject-key-identifier-1">
          <name>Subject Key Identifier</name>
          <t>The Subject Key Identifier extension MUST be set, MUST NOT be marked critical, and MUST
contain the key identifier of the public key contained in the subject public key info
field.</t>
        </section>
        <section anchor="key-usage-1">
          <name>Key Usage</name>
          <t>The Key Usage extension MUST be set, MUST be marked critical, the keyCertSign or
cRLSign purposes MUST be set, and the digitalSignature purpose SHOULD be set.</t>
          <t>The extendedKeyUsage extensed MAY be set depending on the intended usage of the
public key.</t>
          <t>[Editor's Note: Should we harden the requirement to "The extendedKeyUsage MUST NOT be present."]</t>
        </section>
        <section anchor="basic-constraints-1">
          <name>Basic Constraints</name>
          <t>The Basic Constraints extension MUST be set, MUST be marked critical, the cA flag
MUST be set to true and the pathLenConstraint MUST be set to 0.</t>
          <t>[Editor's Note: Should we soften the requriement to "The pathLenConstraint field MAY be present."]</t>
        </section>
        <section anchor="crl-distribution-point">
          <name>CRL Distribution Point</name>
          <t>The CRL Distribution Point extension SHOULD NOT be set. If it is set, it MUST NOT
be marked critical and MUST identify the CRL relevant for this certificate.</t>
        </section>
        <section anchor="authority-information-access">
          <name>Authority Information Access</name>
          <t>The Authority Information Access extension SHOULD NOT be set. If it is set, it MUST
NOT be marked critical and MUST identify the location of the certificate of the CA
that issued this certificate and the location it provides an online certificate
status service (OCSP).</t>
        </section>
      </section>
      <section anchor="end-entity-certificate">
        <name>End Entity Certificate</name>
        <t>This section outlines the requirements for end entity certificates.</t>
        <section anchor="subject-2">
          <name>Subject</name>
          <t>The requirement in Section 4.4.2 of <xref target="RFC7925"/> to only use EUI-64 for end
entity certificates as a Subject name is lifted.</t>
          <t>Two fields are typically used to encode a device identifer, namely the
Subject and the subjectAltName fields. Protocol specifications tend to offer
recommendations what identifiers to use and the deployment situation is
fragmented.</t>
          <t>The Subject field MAY include a unique device serial number. If the serial
number is included, it MUST be encoded in the serialNumber attribute.</t>
          <t><xref target="RFC5280"/> defines: "The subject alternative name extension allows identities
to be bound to the subject of the certificate. These identities may be included
in addition to or in place of the identity in the subject field of the certificate."</t>
          <t>The subject alternative name extension MAY be set. If it is set, it MUST NOT be
marked critical, except when the subject DN contains an empty sequence.</t>
          <t>If the EUI-64 format is used to identify the subject of an end entity
certificate, it MUST be encoded in a subjectAltName of type DNS-ID as a string
of the form <tt>HH-HH-HH-HH-HH-HH-HH-HH</tt> where 'H' is one of the symbols '0'-'9'
or 'A'-'F'.</t>
          <t>Domain names MUST NOT be encoded in the subject commonName. Instead they
MUST be encoded in a subjectAltName of type DNS-ID. Domain names MUST NOT
contain wildcard (<tt>*</tt>) characters. The subjectAltName MUST NOT contain multiple
names.</t>
          <t>Note: The IEEE 802.1AR recomments to encode information about a Trusted
Platform Module (TPM), if present, in the HardwareModuleName. This
specification does not follow this recommendation.</t>
        </section>
        <section anchor="authority-key-identifier-2">
          <name>Authority Key Identifier</name>
          <t>The Authority Key Identifier extension MUST be set, MUST NOT be marked critical,
and MUST contain the subjectKeyIdentifier of the CA that issued this certificate.</t>
        </section>
        <section anchor="subject-key-identifier-2">
          <name>Subject Key Identifier</name>
          <t>The Subject Key Identifier SHOULD NOT be included in end-entity certificates.
If it is included, then the Subject Key Identifier extension MUST NOT be marked
critical, and MUST contain the key identifier of the public key contained in the
subject public key info field.</t>
          <t>[Editor's Note: Should we harden the requirement and state: "The Subject Key Identifier MUST NOT be included in end-entity certificates."]</t>
        </section>
        <section anchor="key-usage-2">
          <name>Key Usage</name>
          <t>The key usage extension MUST be set and MUST be marked as critical. For
signature verification keys the digitialSignature key usage purpose MUST
be specified. Other key usages are set according to the intended usage
of the key.</t>
          <t>If enrollment of new certificates uses server-side key generation, encrypted
delivery of the private key is required. In such cases the key usage
keyEncipherment or keyAgreement MUST be set because the encrypted delivery
of the newly generated key involves encryption or agreement of a symmetric
key. On-device key generation is, however, the preferred approach.</t>
          <t>The extendedKeyUsage MUST be present and contain at least one of
id-kp-serverAuth or id-kp-clientAuth.</t>
        </section>
      </section>
    </section>
    <section anchor="certificate-overhead">
      <name>Certificate Overhead</name>
      <t>In a public key-based key exchange, certificates and public keys are a major
contributor to the size of the overall handshake. For example, in a regular TLS
1.3 handshake with minimal ECC certificates and no subordinate CA utilizing
the secp256r1 curve with mutual authentication, around 40% of the entire
handshake payload is consumed by the two exchanged certificates.</t>
      <t>Hence, it is not surprising that there is a strong desire to reduce the size of
certificates and certificate chains. This has lead to various standardization
efforts. Below is a brief summary of what options an implementer has to reduce
the bandwidth requirements of a public key-based key exchange. Note that many
of the standardized extensions are not readily available in TLS/DTLS stacks since
optimizations typically get implemented last.</t>
      <ul spacing="compact">
        <li>Use elliptic curve cryptography (ECC) instead of RSA-based certificate due to
the smaller certificate size. This document recommends the use of elliptic
curve cryptography only.</li>
        <li>Avoid deep and complex CA hierarchies to reduce the number of subordinate CA
certificates that need to be transmitted and processed. See
<xref target="I-D.irtf-t2trg-taxonomy-manufacturer-anchors"/> for a discussion about CA
hierarchies.</li>
        <li>Pay attention to the amount of information conveyed inside certificates.</li>
        <li>Use session resumption to reduce the number of times a full handshake is
needed.  Use Connection IDs <xref target="RFC9146"/>, when possible, to enable
long-lasting connections.</li>
        <li>Use the TLS cached info <xref target="RFC7924"/> extension to avoid sending certificates
with every full handshake.</li>
        <li>Use client certificate URLs <xref target="RFC6066"/> instead of full certificates for
clients. When applications perform TLS client authentication via
DNS-Based Authentication of Named Entities (DANE) TLSA records then the
<xref target="I-D.ietf-dance-tls-clientid"/> specification may be used to reduce the
packets on the wire. Note: The term "TLSA" does not stand for anything;
it is just the name of the RRtype, as explained in <xref target="RFC6698"/>.</li>
        <li>Use certificate compression as defined in
<xref target="RFC8879"/>.</li>
        <li>Use alternative certificate formats, where possible, such as raw public keys
<xref target="RFC7250"/> or CBOR-encoded certificates
<xref target="I-D.ietf-cose-cbor-encoded-cert"/>.</li>
      </ul>
      <t>The use of certificate handles, as introduced in cTLS <xref target="I-D.ietf-tls-ctls"/>,
is a form of caching or compressing certificates as well.</t>
      <t>Whether to utilize any of the above extensions or a combination of them depends
on the anticipated deployment environment, the availability of code, and the
constraints imposed by already deployed infrastructure (e.g., CA
infrastructure, tool support).</t>
    </section>
    <section anchor="ciphersuites">
      <name>Ciphersuites</name>
      <t>According to <xref section="4.5.3" sectionFormat="of" target="DTLS13"/>, the use of AES-CCM with 8-octet
authentication tags (CCM_8) is considered unsuitable for general use with DTLS.
This is because it has low integrity limits (i.e., high sensitivity to
forgeries) which makes endpoints that negotiate ciphersuites based on such AEAD
vulnerable to a trivial DoS attack. See also Sections <xref target="I-D.irtf-cfrg-aead-limits" section="5.3" sectionFormat="bare"/> and <xref target="I-D.irtf-cfrg-aead-limits" section="5.4" sectionFormat="bare"/> of <xref target="I-D.irtf-cfrg-aead-limits"/> for further discussion on this topic, as well as
references to the analysis supporting these conclusions.</t>
      <t>Specifically, <xref target="DTLS13"/> warns that:</t>
      <artwork><![CDATA[
> TLS_AES_128_CCM_8_SHA256 MUST NOT be used in DTLS without additional
> safeguards against forgery. Implementations MUST set usage limits for
> AEAD_AES_128_CCM_8 based on an understanding of any additional forgery
> protections that are used.
]]></artwork>
      <t>Since all the ciphersuites required by <xref target="RFC7925"/> and <xref target="CoAP"/> rely on CCM_8,
there is no alternate ciphersuite available for applications that aim to
eliminate the security and availability threats related to CCM_8 while retaining
interoperability with the larger ecosystem.</t>
      <t>In order to ameliorate the situation, this document RECOMMENDS that
implementations support the following two ciphersuites:</t>
      <ul spacing="compact">
        <li>
          <tt>TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256</tt></li>
        <li>
          <tt>TLS_ECDHE_ECDSA_WITH_AES_128_CCM</tt></li>
      </ul>
      <t>and offer them as their first choice.  These ciphersuites provide
confidentiality and integrity limits that are considered acceptable in the most
general settings.  For the details on the exact bounds of both ciphersuites see
<xref section="4.5.3" sectionFormat="of" target="DTLS13"/>.  Note that the GCM-based ciphersuite offers
superior interoperability with cloud services at the cost of a slight increase
in the wire and peak RAM footprints.</t>
      <t>When the GCM-based ciphersuite is used with TLS 1.2, the recommendations in
<xref section="7.2.1" sectionFormat="of" target="RFC9325"/> related to deterministic nonce generation
apply.  In addition, the integrity limits on key usage detailed in <xref section="4.4" sectionFormat="of" target="RFC9325"/> also apply.</t>
      <t><xref target="tab-cipher-reqs"/> summarizes the recommendations regarding ciphersuites:</t>
      <table align="left" anchor="tab-cipher-reqs">
        <name>Ciphersuite requirements</name>
        <thead>
          <tr>
            <th align="left">Ciphersuite</th>
            <th align="left">Requirement</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">
              <tt>TLS_AES_128_CCM_8_SHA256</tt></td>
            <td align="left">MUST-</td>
          </tr>
          <tr>
            <td align="left">
              <tt>TLS_ECDHE_ECDSA_WITH_AES_128_CCM</tt></td>
            <td align="left">SHOULD+</td>
          </tr>
          <tr>
            <td align="left">
              <tt>TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256</tt></td>
            <td align="left">SHOULD+</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="fault-attacks-on-deterministic-signature-schemes">
      <name>Fault Attacks on Deterministic Signature Schemes</name>
      <t>A number of passive side-channel attacks as well as active fault-injection
attacks (e.g., <xref target="Ambrose2017"/>) have been demonstrated to be successful in allowing a malicious
third party to gain information about the signing key if a fully deterministic
signature scheme (e.g., <xref target="RFC6979"/> ECDSA or EdDSA <xref target="RFC8032"/>) is used.</t>
      <t>Most of these attacks assume physical access to the device and are therefore
especially relevant to smart cards as well as IoT deployments with poor or
non-existent physical security.</t>
      <t>In this security model, it is recommended to combine both randomness and
determinism, for example, as described in
<xref target="I-D.irtf-cfrg-det-sigs-with-noise"/>.</t>
    </section>
    <section anchor="open-issues">
      <name>Open Issues</name>
      <t>A list of open issues can be found at https://github.com/thomas-fossati/draft-tls13-iot/issues</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This entire document is about security.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document makes no requests to IANA.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="DTLS13">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="TLS13">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC7925">
          <front>
            <title>Transport Layer Security (TLS) / Datagram Transport Layer Security (DTLS) Profiles for the Internet of Things</title>
            <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>A common design pattern in Internet of Things (IoT) deployments is the use of a constrained device that collects data via sensors or controls actuators for use in home automation, industrial control systems, smart cities, and other IoT deployments.</t>
              <t>This document defines a Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) 1.2 profile that offers communications security for this data exchange thereby preventing eavesdropping, tampering, and message forgery. The lack of communication security is a common vulnerability in IoT products that can easily be solved by using these well-researched and widely deployed Internet security protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7925"/>
          <seriesInfo name="DOI" value="10.17487/RFC7925"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8221">
          <front>
            <title>Cryptographic Algorithm Implementation Requirements and Usage Guidance for Encapsulating Security Payload (ESP) and Authentication Header (AH)</title>
            <author fullname="P. Wouters" initials="P." surname="Wouters"/>
            <author fullname="D. Migault" initials="D." surname="Migault"/>
            <author fullname="J. Mattsson" initials="J." surname="Mattsson"/>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <date month="October" year="2017"/>
            <abstract>
              <t>This document replaces RFC 7321, "Cryptographic Algorithm Implementation Requirements and Usage Guidance for Encapsulating Security Payload (ESP) and Authentication Header (AH)". The goal of this document is to enable ESP and AH to benefit from cryptography that is up to date while making IPsec interoperable.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8221"/>
          <seriesInfo name="DOI" value="10.17487/RFC8221"/>
        </reference>
        <reference anchor="RFC9258">
          <front>
            <title>Importing External Pre-Shared Keys (PSKs) for TLS 1.3</title>
            <author fullname="D. Benjamin" initials="D." surname="Benjamin"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <date month="July" year="2022"/>
            <abstract>
              <t>This document describes an interface for importing external Pre-Shared Keys (PSKs) into TLS 1.3.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9258"/>
          <seriesInfo name="DOI" value="10.17487/RFC9258"/>
        </reference>
        <reference anchor="RFC9325">
          <front>
            <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="November" year="2022"/>
            <abstract>
              <t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are used to protect data exchanged over a wide range of application protocols and can also form the basis for secure transport protocols. Over the years, the industry has witnessed several serious attacks on TLS and DTLS, including attacks on the most commonly used cipher suites and their modes of operation. This document provides the latest recommendations for ensuring the security of deployed services that use TLS and DTLS. These recommendations are applicable to the majority of use cases.</t>
              <t>RFC 7525, an earlier version of the TLS recommendations, was published when the industry was transitioning to TLS 1.2. Years later, this transition is largely complete, and TLS 1.3 is widely available. This document updates the guidance given the new environment and obsoletes RFC 7525. In addition, this document updates RFCs 5288 and 6066 in view of recent attacks.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="195"/>
          <seriesInfo name="RFC" value="9325"/>
          <seriesInfo name="DOI" value="10.17487/RFC9325"/>
        </reference>
        <reference anchor="I-D.ietf-tls-dtls-rrc">
          <front>
            <title>Return Routability Check for DTLS 1.2 and DTLS 1.3</title>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
         </author>
            <author fullname="Achim Kraus" initials="A." surname="Kraus">
         </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <date day="9" month="October" year="2023"/>
            <abstract>
              <t>   This document specifies a return routability check for use in context
   of the Connection ID (CID) construct for the Datagram Transport Layer
   Security (DTLS) protocol versions 1.2 and 1.3.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Discussion of this document takes place on the Transport Layer
   Security Working Group mailing list (tls@ietf.org), which is archived
   at https://mailarchive.ietf.org/arch/browse/tls/.

   Source for this draft and an issue tracker can be found at
   https://github.com/tlswg/dtls-rrc.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-dtls-rrc-10"/>
        </reference>
        <reference anchor="RFC8449">
          <front>
            <title>Record Size Limit Extension for TLS</title>
            <author fullname="M. Thomson" initials="M." surname="Thomson"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>An extension to Transport Layer Security (TLS) is defined that allows endpoints to negotiate the maximum size of protected records that each will send the other.</t>
              <t>This replaces the maximum fragment length extension defined in RFC 6066.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8449"/>
          <seriesInfo name="DOI" value="10.17487/RFC8449"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC5758">
          <front>
            <title>Internet X.509 Public Key Infrastructure: Additional Algorithms and Identifiers for DSA and ECDSA</title>
            <author fullname="Q. Dang" initials="Q." surname="Dang"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="K. Moriarty" initials="K." surname="Moriarty"/>
            <author fullname="D. Brown" initials="D." surname="Brown"/>
            <author fullname="T. Polk" initials="T." surname="Polk"/>
            <date month="January" year="2010"/>
            <abstract>
              <t>This document updates RFC 3279 to specify algorithm identifiers and ASN.1 encoding rules for the Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA) digital signatures when using SHA-224, SHA-256, SHA-384, or SHA-512 as the hashing algorithm. This specification applies to the Internet X.509 Public Key infrastructure (PKI) when digital signatures are used to sign certificates and certificate revocation lists (CRLs). This document also identifies all four SHA2 hash algorithms for use in the Internet X.509 PKI. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5758"/>
          <seriesInfo name="DOI" value="10.17487/RFC5758"/>
        </reference>
        <reference anchor="RFC5480">
          <front>
            <title>Elliptic Curve Cryptography Subject Public Key Information</title>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <author fullname="D. Brown" initials="D." surname="Brown"/>
            <author fullname="K. Yiu" initials="K." surname="Yiu"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="T. Polk" initials="T." surname="Polk"/>
            <date month="March" year="2009"/>
            <abstract>
              <t>This document specifies the syntax and semantics for the Subject Public Key Information field in certificates that support Elliptic Curve Cryptography. This document updates Sections 2.3.5 and 5, and the ASN.1 module of "Algorithms and Identifiers for the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile", RFC 3279. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5480"/>
          <seriesInfo name="DOI" value="10.17487/RFC5480"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC9146">
          <front>
            <title>Connection Identifier for DTLS 1.2</title>
            <author fullname="E. Rescorla" initials="E." role="editor" surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <author fullname="A. Kraus" initials="A." surname="Kraus"/>
            <date month="March" year="2022"/>
            <abstract>
              <t>This document specifies the Connection ID (CID) construct for the Datagram Transport Layer Security (DTLS) protocol version 1.2.</t>
              <t>A CID is an identifier carried in the record layer header that gives the recipient additional information for selecting the appropriate security association. In "classical" DTLS, selecting a security association of an incoming DTLS record is accomplished with the help of the 5-tuple. If the source IP address and/or source port changes during the lifetime of an ongoing DTLS session, then the receiver will be unable to locate the correct security context.</t>
              <t>The new ciphertext record format with the CID also provides content type encryption and record layer padding.</t>
              <t>This document updates RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9146"/>
          <seriesInfo name="DOI" value="10.17487/RFC9146"/>
        </reference>
        <reference anchor="CoAP">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="ADD" target="https://datatracker.ietf.org/wg/add/about/">
          <front>
            <title>Adaptive DNS Discovery (add) Working Group</title>
            <author>
              <organization>IETF</organization>
            </author>
            <date year="2023" month="September"/>
          </front>
        </reference>
        <reference anchor="_8021AR" target="https://1.ieee802.org/security/802-1ar">
          <front>
            <title>IEEE Standard for Local and metropolitan area networks – Secure Device Identity, IEEE 802.1AR-2018</title>
            <author>
              <organization>IEEE</organization>
            </author>
            <date year="2018" month="August"/>
          </front>
        </reference>
        <reference anchor="FDO" target="https://fidoalliance.org/specifications/download-iot-specifications/">
          <front>
            <title>FIDO Device Onboard Specification 1.1</title>
            <author>
              <organization>FIDO Alliance</organization>
            </author>
            <date year="2022" month="April"/>
          </front>
        </reference>
        <reference anchor="LwM2M" target="https://openmobilealliance.org/release/LightweightM2M/V1_2_1-20221209-A/">
          <front>
            <title>Lightweight Machine to Machine (LwM2M) V.1.2.1 Technical Specification: Transport Bindings</title>
            <author>
              <organization>OMA SpecWorks</organization>
            </author>
            <date year="2022" month="December"/>
          </front>
        </reference>
        <reference anchor="Ambrose2017" target="https://eprint.iacr.org/2017/975.pdf">
          <front>
            <title>Differential Attacks on Deterministic Signatures</title>
            <author initials="C." surname="Ambrose" fullname="Christopher Ambrose">
              <organization/>
            </author>
            <author initials="J. W." surname="Bos" fullname="Joppe W. Bos">
              <organization/>
            </author>
            <author initials="B." surname="Fay" fullname="Björn Fay">
              <organization/>
            </author>
            <author initials="M." surname="Joye" fullname="Marc Joye">
              <organization/>
            </author>
            <author initials="M." surname="Lochter" fullname="Manfred Lochter">
              <organization/>
            </author>
            <author initials="B." surname="Murray" fullname="Bruce Murray">
              <organization/>
            </author>
            <date year="2017"/>
          </front>
        </reference>
        <reference anchor="RFC5746">
          <front>
            <title>Transport Layer Security (TLS) Renegotiation Indication Extension</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="M. Ray" initials="M." surname="Ray"/>
            <author fullname="S. Dispensa" initials="S." surname="Dispensa"/>
            <author fullname="N. Oskov" initials="N." surname="Oskov"/>
            <date month="February" year="2010"/>
            <abstract>
              <t>Secure Socket Layer (SSL) and Transport Layer Security (TLS) renegotiation are vulnerable to an attack in which the attacker forms a TLS connection with the target server, injects content of his choice, and then splices in a new TLS connection from a client. The server treats the client's initial TLS handshake as a renegotiation and thus believes that the initial data transmitted by the attacker is from the same entity as the subsequent client data. This specification defines a TLS extension to cryptographically tie renegotiations to the TLS connections they are being performed over, thus preventing this attack. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5746"/>
          <seriesInfo name="DOI" value="10.17487/RFC5746"/>
        </reference>
        <reference anchor="RFC9261">
          <front>
            <title>Exported Authenticators in TLS</title>
            <author fullname="N. Sullivan" initials="N." surname="Sullivan"/>
            <date month="July" year="2022"/>
            <abstract>
              <t>This document describes a mechanism that builds on Transport Layer Security (TLS) or Datagram Transport Layer Security (DTLS) and enables peers to provide proof of ownership of an identity, such as an X.509 certificate. This proof can be exported by one peer, transmitted out of band to the other peer, and verified by the receiving peer.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9261"/>
          <seriesInfo name="DOI" value="10.17487/RFC9261"/>
        </reference>
        <reference anchor="RFC5216">
          <front>
            <title>The EAP-TLS Authentication Protocol</title>
            <author fullname="D. Simon" initials="D." surname="Simon"/>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="R. Hurst" initials="R." surname="Hurst"/>
            <date month="March" year="2008"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides support for multiple authentication methods. Transport Layer Security (TLS) provides for mutual authentication, integrity-protected ciphersuite negotiation, and key exchange between two endpoints. This document defines EAP-TLS, which includes support for certificate-based mutual authentication and key derivation.</t>
              <t>This document obsoletes RFC 2716. A summary of the changes between this document and RFC 2716 is available in Appendix A. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5216"/>
          <seriesInfo name="DOI" value="10.17487/RFC5216"/>
        </reference>
        <reference anchor="RFC9190">
          <front>
            <title>EAP-TLS 1.3: Using the Extensible Authentication Protocol with TLS 1.3</title>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="M. Sethi" initials="M." surname="Sethi"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides a standard mechanism for support of multiple authentication methods. This document specifies the use of EAP-TLS with TLS 1.3 while remaining backwards compatible with existing implementations of EAP-TLS. TLS 1.3 provides significantly improved security and privacy, and reduced latency when compared to earlier versions of TLS. EAP-TLS with TLS 1.3 (EAP-TLS 1.3) further improves security and privacy by always providing forward secrecy, never disclosing the peer identity, and by mandating use of revocation checking when compared to EAP-TLS with earlier versions of TLS. This document also provides guidance on authentication, authorization, and resumption for EAP-TLS in general (regardless of the underlying TLS version used). This document updates RFC 5216.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9190"/>
          <seriesInfo name="DOI" value="10.17487/RFC9190"/>
        </reference>
        <reference anchor="RFC4279">
          <front>
            <title>Pre-Shared Key Ciphersuites for Transport Layer Security (TLS)</title>
            <author fullname="P. Eronen" initials="P." role="editor" surname="Eronen"/>
            <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document specifies three sets of new ciphersuites for the Transport Layer Security (TLS) protocol to support authentication based on pre-shared keys (PSKs). These pre-shared keys are symmetric keys, shared in advance among the communicating parties. The first set of ciphersuites uses only symmetric key operations for authentication. The second set uses a Diffie-Hellman exchange authenticated with a pre-shared key, and the third set combines public key authentication of the server with pre-shared key authentication of the client. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4279"/>
          <seriesInfo name="DOI" value="10.17487/RFC4279"/>
        </reference>
        <reference anchor="I-D.ietf-tls-ctls">
          <front>
            <title>Compact TLS 1.3</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Windy Hill Systems, LLC</organization>
            </author>
            <author fullname="Richard Barnes" initials="R." surname="Barnes">
              <organization>Cisco</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
         </author>
            <author fullname="Benjamin M. Schwartz" initials="B. M." surname="Schwartz">
              <organization>Google</organization>
            </author>
            <date day="23" month="October" year="2023"/>
            <abstract>
              <t>   This document specifies a "compact" version of TLS 1.3 and DTLS 1.3.
   It saves bandwidth by trimming obsolete material, tighter encoding, a
   template-based specialization technique, and alternative
   cryptographic techniques. cTLS is not directly interoperable with TLS
   1.3 or DTLS 1.3 since the over-the-wire framing is different.  A
   single server can, however, offer cTLS alongside TLS or DTLS.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-ctls-09"/>
        </reference>
        <reference anchor="I-D.ietf-tls-esni">
          <front>
            <title>TLS Encrypted Client Hello</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>RTFM, Inc.</organization>
            </author>
            <author fullname="Kazuho Oku" initials="K." surname="Oku">
              <organization>Fastly</organization>
            </author>
            <author fullname="Nick Sullivan" initials="N." surname="Sullivan">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="9" month="October" year="2023"/>
            <abstract>
              <t>   This document describes a mechanism in Transport Layer Security (TLS)
   for encrypting a ClientHello message under a server public key.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/tlswg/draft-ietf-tls-esni
   (https://github.com/tlswg/draft-ietf-tls-esni).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-esni-17"/>
        </reference>
        <reference anchor="I-D.irtf-cfrg-hpke">
          <front>
            <title>Hybrid Public Key Encryption</title>
            <author fullname="Richard Barnes" initials="R." surname="Barnes">
              <organization>Cisco</organization>
            </author>
            <author fullname="Karthikeyan Bhargavan" initials="K." surname="Bhargavan">
              <organization>Inria</organization>
            </author>
            <author fullname="Benjamin Lipp" initials="B." surname="Lipp">
              <organization>Inria</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="2" month="September" year="2021"/>
            <abstract>
              <t>This document describes a scheme for hybrid public key encryption (HPKE). This scheme provides a variant of public key encryption of arbitrary-sized plaintexts for a recipient public key. It also includes three authenticated variants, including one that authenticates possession of a pre-shared key and two optional ones that authenticate possession of a key encapsulation mechanism (KEM) private key. HPKE works for any combination of an asymmetric KEM, key derivation function (KDF), and authenticated encryption with additional data (AEAD) encryption function. Some authenticated variants may not be supported by all KEMs. We provide instantiations of the scheme using widely used and efficient primitives, such as Elliptic Curve Diffie-Hellman (ECDH) key agreement, HMAC-based key derivation function (HKDF), and SHA2.

 This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF.
              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-cfrg-hpke-12"/>
        </reference>
        <reference anchor="RFC8484">
          <front>
            <title>DNS Queries over HTTPS (DoH)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS. Each DNS query-response pair is mapped into an HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8484"/>
          <seriesInfo name="DOI" value="10.17487/RFC8484"/>
        </reference>
        <reference anchor="RFC7858">
          <front>
            <title>Specification for DNS over Transport Layer Security (TLS)</title>
            <author fullname="Z. Hu" initials="Z." surname="Hu"/>
            <author fullname="L. Zhu" initials="L." surname="Zhu"/>
            <author fullname="J. Heidemann" initials="J." surname="Heidemann"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <author fullname="D. Wessels" initials="D." surname="Wessels"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS. Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626. In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
              <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group. It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7858"/>
          <seriesInfo name="DOI" value="10.17487/RFC7858"/>
        </reference>
        <reference anchor="RFC8094">
          <front>
            <title>DNS over Datagram Transport Layer Security (DTLS)</title>
            <author fullname="T. Reddy" initials="T." surname="Reddy"/>
            <author fullname="D. Wing" initials="D." surname="Wing"/>
            <author fullname="P. Patil" initials="P." surname="Patil"/>
            <date month="February" year="2017"/>
            <abstract>
              <t>DNS queries and responses are visible to network elements on the path between the DNS client and its server. These queries and responses can contain privacy-sensitive information, which is valuable to protect.</t>
              <t>This document proposes the use of Datagram Transport Layer Security (DTLS) for DNS, to protect against passive listeners and certain active attacks. As latency is critical for DNS, this proposal also discusses mechanisms to reduce DTLS round trips and reduce the DTLS handshake size. The proposed mechanism runs over port 853.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8094"/>
          <seriesInfo name="DOI" value="10.17487/RFC8094"/>
        </reference>
        <reference anchor="RFC8995">
          <front>
            <title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="T. Eckert" initials="T." surname="Eckert"/>
            <author fullname="M. Behringer" initials="M." surname="Behringer"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document specifies automated bootstrapping of an Autonomic Control Plane. To do this, a Secure Key Infrastructure is bootstrapped. This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline. We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device. The established secure connection can be used to deploy a locally issued certificate to the device as well.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8995"/>
          <seriesInfo name="DOI" value="10.17487/RFC8995"/>
        </reference>
        <reference anchor="RFC7030">
          <front>
            <title>Enrollment over Secure Transport</title>
            <author fullname="M. Pritikin" initials="M." role="editor" surname="Pritikin"/>
            <author fullname="P. Yee" initials="P." role="editor" surname="Yee"/>
            <author fullname="D. Harkins" initials="D." role="editor" surname="Harkins"/>
            <date month="October" year="2013"/>
            <abstract>
              <t>This document profiles certificate enrollment for clients using Certificate Management over CMS (CMC) messages over a secure transport. This profile, called Enrollment over Secure Transport (EST), describes a simple, yet functional, certificate management protocol targeting Public Key Infrastructure (PKI) clients that need to acquire client certificates and associated Certification Authority (CA) certificates. It also supports client-generated public/private key pairs as well as key pairs generated by the CA.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7030"/>
          <seriesInfo name="DOI" value="10.17487/RFC7030"/>
        </reference>
        <reference anchor="RFC9483">
          <front>
            <title>Lightweight Certificate Management Protocol (CMP) Profile</title>
            <author fullname="H. Brockhaus" initials="H." surname="Brockhaus"/>
            <author fullname="D. von Oheimb" initials="D." surname="von Oheimb"/>
            <author fullname="S. Fries" initials="S." surname="Fries"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document aims at simple, interoperable, and automated PKI management operations covering typical use cases of industrial and Internet of Things (IoT) scenarios. This is achieved by profiling the Certificate Management Protocol (CMP), the related Certificate Request Message Format (CRMF), and transfer based on HTTP or Constrained Application Protocol (CoAP) in a succinct but sufficiently detailed and self-contained way. To make secure certificate management for simple scenarios and constrained devices as lightweight as possible, only the most crucial types of operations and options are specified as mandatory. More specialized or complex use cases are supported with optional features.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9483"/>
          <seriesInfo name="DOI" value="10.17487/RFC9483"/>
        </reference>
        <reference anchor="RFC9019">
          <front>
            <title>A Firmware Update Architecture for Internet of Things</title>
            <author fullname="B. Moran" initials="B." surname="Moran"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="D. Brown" initials="D." surname="Brown"/>
            <author fullname="M. Meriac" initials="M." surname="Meriac"/>
            <date month="April" year="2021"/>
            <abstract>
              <t>Vulnerabilities in Internet of Things (IoT) devices have raised the need for a reliable and secure firmware update mechanism suitable for devices with resource constraints. Incorporating such an update mechanism is a fundamental requirement for fixing vulnerabilities, but it also enables other important capabilities such as updating configuration settings and adding new functionality.</t>
              <t>In addition to the definition of terminology and an architecture, this document provides the motivation for the standardization of a manifest format as a transport-agnostic means for describing and protecting firmware updates.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9019"/>
          <seriesInfo name="DOI" value="10.17487/RFC9019"/>
        </reference>
        <reference anchor="I-D.irtf-t2trg-taxonomy-manufacturer-anchors">
          <front>
            <title>A Taxonomy of operational security considerations for manufacturer installed keys and Trust Anchors</title>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <date day="30" month="January" year="2024"/>
            <abstract>
              <t>   This document provides a taxonomy of methods used by manufacturers of
   silicon and devices to secure private keys and public trust anchors.
   This deals with two related activities: how trust anchors and private
   keys are installed into devices during manufacturing, and how the
   related manufacturer held private keys are secured against
   disclosure.

   This document does not evaluate the different mechanisms, but rather
   just serves to name them in a consistent manner in order to aid in
   communication.

   RFCEDITOR: please remove this paragraph.  This work is occurring in
   https://github.com/mcr/idevid-security-considerations

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-t2trg-taxonomy-manufacturer-anchors-03"/>
        </reference>
        <reference anchor="RFC7924">
          <front>
            <title>Transport Layer Security (TLS) Cached Information Extension</title>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>Transport Layer Security (TLS) handshakes often include fairly static information, such as the server certificate and a list of trusted certification authorities (CAs). This information can be of considerable size, particularly if the server certificate is bundled with a complete certificate chain (i.e., the certificates of intermediate CAs up to the root CA).</t>
              <t>This document defines an extension that allows a TLS client to inform a server of cached information, thereby enabling the server to omit already available information.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7924"/>
          <seriesInfo name="DOI" value="10.17487/RFC7924"/>
        </reference>
        <reference anchor="RFC6066">
          <front>
            <title>Transport Layer Security (TLS) Extensions: Extension Definitions</title>
            <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
            <date month="January" year="2011"/>
            <abstract>
              <t>This document provides specifications for existing TLS extensions. It is a companion document for RFC 5246, "The Transport Layer Security (TLS) Protocol Version 1.2". The extensions specified are server_name, max_fragment_length, client_certificate_url, trusted_ca_keys, truncated_hmac, and status_request. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6066"/>
          <seriesInfo name="DOI" value="10.17487/RFC6066"/>
        </reference>
        <reference anchor="I-D.ietf-dance-tls-clientid">
          <front>
            <title>TLS Extension for DANE Client Identity</title>
            <author fullname="Shumon Huque" initials="S." surname="Huque">
              <organization>Salesforce</organization>
            </author>
            <author fullname="Viktor Dukhovni" initials="V." surname="Dukhovni">
              <organization>Two Sigma</organization>
            </author>
            <date day="8" month="January" year="2024"/>
            <abstract>
              <t>   This document specifies a TLS and DTLS extension to convey a DNS-
   Based Authentication of Named Entities (DANE) Client Identity to a
   TLS or DTLS server.  This is useful for applications that perform TLS
   client authentication via DANE TLSA records.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-dance-tls-clientid-03"/>
        </reference>
        <reference anchor="RFC6698">
          <front>
            <title>The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="J. Schlyter" initials="J." surname="Schlyter"/>
            <date month="August" year="2012"/>
            <abstract>
              <t>Encrypted communication on the Internet often uses Transport Layer Security (TLS), which depends on third parties to certify the keys used. This document improves on that situation by enabling the administrators of domain names to specify the keys used in that domain's TLS servers. This requires matching improvements in TLS client software, but no change in TLS server software. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6698"/>
          <seriesInfo name="DOI" value="10.17487/RFC6698"/>
        </reference>
        <reference anchor="RFC8879">
          <front>
            <title>TLS Certificate Compression</title>
            <author fullname="A. Ghedini" initials="A." surname="Ghedini"/>
            <author fullname="V. Vasiliev" initials="V." surname="Vasiliev"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>In TLS handshakes, certificate chains often take up the majority of the bytes transmitted.</t>
              <t>This document describes how certificate chains can be compressed to reduce the amount of data transmitted and avoid some round trips.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8879"/>
          <seriesInfo name="DOI" value="10.17487/RFC8879"/>
        </reference>
        <reference anchor="RFC7250">
          <front>
            <title>Using Raw Public Keys in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="P. Wouters" initials="P." role="editor" surname="Wouters"/>
            <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig"/>
            <author fullname="J. Gilmore" initials="J." surname="Gilmore"/>
            <author fullname="S. Weiler" initials="S." surname="Weiler"/>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>This document specifies a new certificate type and two TLS extensions for exchanging raw public keys in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS). The new certificate type allows raw public keys to be used for authentication.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7250"/>
          <seriesInfo name="DOI" value="10.17487/RFC7250"/>
        </reference>
        <reference anchor="I-D.ietf-cose-cbor-encoded-cert">
          <front>
            <title>CBOR Encoded X.509 Certificates (C509 Certificates)</title>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Shahid Raza" initials="S." surname="Raza">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Joel Höglund" initials="J." surname="Höglund">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Martin Furuhed" initials="M." surname="Furuhed">
              <organization>Nexus Group</organization>
            </author>
            <date day="20" month="October" year="2023"/>
            <abstract>
              <t>   This document specifies a CBOR encoding of X.509 certificates.  The
   resulting certificates are called C509 Certificates.  The CBOR
   encoding supports a large subset of RFC 5280 and all certificates
   compatible with the RFC 7925, IEEE 802.1AR (DevID), CNSA, RPKI, GSMA
   eUICC, and CA/Browser Forum Baseline Requirements profiles.  When
   used to re-encode DER encoded X.509 certificates, the CBOR encoding
   can in many cases reduce the size of RFC 7925 profiled certificates
   with over 50%.  The CBOR encoded structure can alternatively be
   signed directly ("natively signed"), which does not require re-
   encoding for the signature to be verified.  The document also
   specifies C509 COSE headers, a C509 TLS certificate type, and a C509
   file format.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-cbor-encoded-cert-07"/>
        </reference>
        <reference anchor="I-D.irtf-cfrg-aead-limits">
          <front>
            <title>Usage Limits on AEAD Algorithms</title>
            <author fullname="Felix Günther" initials="F." surname="Günther">
              <organization>ETH Zurich</organization>
            </author>
            <author fullname="Martin Thomson" initials="M." surname="Thomson">
              <organization>Mozilla</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="31" month="May" year="2023"/>
            <abstract>
              <t>   An Authenticated Encryption with Associated Data (AEAD) algorithm
   provides confidentiality and integrity.  Excessive use of the same
   key can give an attacker advantages in breaking these properties.
   This document provides simple guidance for users of common AEAD
   functions about how to limit the use of keys in order to bound the
   advantage given to an attacker.  It considers limits in both single-
   and multi-key settings.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-cfrg-aead-limits-07"/>
        </reference>
        <reference anchor="RFC6979">
          <front>
            <title>Deterministic Usage of the Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA)</title>
            <author fullname="T. Pornin" initials="T." surname="Pornin"/>
            <date month="August" year="2013"/>
            <abstract>
              <t>This document defines a deterministic digital signature generation procedure. Such signatures are compatible with standard Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA) digital signatures and can be processed with unmodified verifiers, which need not be aware of the procedure described therein. Deterministic signatures retain the cryptographic security features associated with digital signatures but can be more easily implemented in various environments, since they do not need access to a source of high-quality randomness.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6979"/>
          <seriesInfo name="DOI" value="10.17487/RFC6979"/>
        </reference>
        <reference anchor="RFC8032">
          <front>
            <title>Edwards-Curve Digital Signature Algorithm (EdDSA)</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <author fullname="I. Liusvaara" initials="I." surname="Liusvaara"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes elliptic curve signature scheme Edwards-curve Digital Signature Algorithm (EdDSA). The algorithm is instantiated with recommended parameters for the edwards25519 and edwards448 curves. An example implementation and test vectors are provided.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8032"/>
          <seriesInfo name="DOI" value="10.17487/RFC8032"/>
        </reference>
        <reference anchor="I-D.irtf-cfrg-det-sigs-with-noise">
          <front>
            <title>Hedged ECDSA and EdDSA Signatures</title>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Erik Thormarker" initials="E." surname="Thormarker">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Sini Ruohomaa" initials="S." surname="Ruohomaa">
              <organization>Ericsson</organization>
            </author>
            <date day="1" month="March" year="2024"/>
            <abstract>
              <t>   Deterministic elliptic-curve signatures such as deterministic ECDSA
   and EdDSA have gained popularity over randomized ECDSA as their
   security does not depend on a source of high-quality randomness.
   Recent research, however, has found that implementations of these
   signature algorithms may be vulnerable to certain side-channel and
   fault injection attacks due to their deterministic nature.  One
   countermeasure to such attacks is hedged signatures where the
   calculation of the per-message secret number includes both fresh
   randomness and the message.  This document updates RFC 6979 and RFC
   8032 to recommend constructions with additional randomness for
   deployments where side-channel attacks and fault injection attacks
   are a concern.  The updates are invisible to the validator of the
   signature and compatible with existing ECDSA and EdDSA validators.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-cfrg-det-sigs-with-noise-02"/>
        </reference>
      </references>
    </references>
    <?line 816?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We would like to thank
Ben Kaduk,
Hendrik Brockhaus,
and
John Mattsson.</t>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="J." surname="Sosinowicz" fullname="Juliusz Sosinowicz">
        <organization/>
        <address>
      </address>
      </contact>
      <contact initials="A." surname="Kraus" fullname="Achim Kraus">
        <organization/>
        <address>
      </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
