<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.1 (Ruby 3.0.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc rfcedstyle="yes"?>
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc text-list-symbols="o-*+"?>
<?rfc compact="yes"?>
<?rfc subcompact="yes"?>
<?rfc consensus="no"?>

<rfc ipr="trust200902" docName="draft-ietf-uta-tls13-iot-profile-11" category="std" consensus="true" submissionType="IETF" updates="7925" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="TLS/DTLS 1.3 IoT Profiles">TLS/DTLS 1.3 Profiles for the Internet of Things</title>

    <author initials="H." surname="Tschofenig" fullname="Hannes Tschofenig">
      <organization abbrev="H-BRS">University of Applied Sciences Bonn-Rhein-Sieg</organization>
      <address>
        <postal>
          <country>Germany</country>
        </postal>
        <email>Hannes.Tschofenig@gmx.net</email>
      </address>
    </author>
    <author initials="T." surname="Fossati" fullname="Thomas Fossati">
      <organization>Linaro</organization>
      <address>
        <email>Thomas.Fossati@linaro.com</email>
      </address>
    </author>
    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>

    <date year="2024" month="October" day="20"/>

    <area>Security</area>
    <workgroup>UTA</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 111?>

<t>This document is a companion to RFC 7925 and defines TLS/DTLS 1.3 profiles for
Internet of Things devices.  It also updates RFC 7925 with regards to the X.509
certificate profile and ciphersuite requirements.</t>



    </abstract>



  </front>

  <middle>


<?line 117?>

<section anchor="introduction"><name>Introduction</name>

<t>In the rapidly evolving Internet of Things (IoT) ecosystem, securing device-to-device communication is a critical requirement. The Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) protocols have been foundational for ensuring encryption, integrity, and authenticity in network communications. However, the inherent constraints of IoT devices, such as limited processing capacity, memory, and energy, render conventional, off-the-shelf TLS/DTLS implementations suboptimal for many IoT use cases. This document, TLS/DTLS 1.3 Profiles for the Internet of Things (IoT), addresses these limitations by specifying profiles of TLS 1.3 and DTLS 1.3, optimized for the operational constraints of resource-constrained IoT systems.</t>

<t>These profiles aim to balance strong security with the hardware and software limitations of IoT devices. TLS/DTLS 1.3 introduces numerous enhancements over previous versions, including reduced handshake overhead, more efficient encryption schemes, and mechanisms to thwart replay and downgrade attacks. However, the default configurations may still present excessive computational and memory demands for constrained devices with limited CPU, RAM, and power resources. The document mitigates these challenges by defining lightweight protocol configurations while maintaining the essential security guarantees of TLS/DTLS. This specification also updates <xref target="RFC7925"/> with regards to the X.509 certificate profile (<xref target="certificate_profile"/>) and ciphersuites requirements (<xref target="ciphersuites"/>).</t>

<t>Key adaptations in the IoT-specific profiles include streamlining the handshake protocol, minimizing cryptographic operation complexity, and reducing the reliance on resource-heavy certificate chains. For example, where mutual authentication is needed, the profiles advocate the use of pre-shared keys (PSKs) over a full public key infrastructure (PKI) to mitigate the overhead associated with certificate management. Moreover, the profiles address session resumption techniques and the handling of stateful versus stateless session management, which are pivotal for maintaining resource-efficient, persistent connections in IoT deployments.</t>

<t>TLS 1.3 has been re-designed and several previously defined extensions are not
applicable to the new version of TLS/DTLS anymore. The following features changed
with the transition from TLS 1.2 to 1.3:</t>

<t><list style="symbols">
  <t>TLS 1.3 introduced the concept of post-handshake authentication messages, which
partially replaced the need for the re-negotiation feature <xref target="RFC5746"/> available
in earlier TLS versions. However, rekeying defined in <xref section="4.6.3" sectionFormat="of" target="TLS13"/>
does not provide forward secrecy and post-handshake authentication defined in
<xref section="4.6.2" sectionFormat="of" target="TLS13"/> only offers client-to-server authentication.
The "Exported Authenticator" specification, see <xref target="RFC9261"/>, recently added support for mutual,
post-handshake authentication but
requires the Certificate, CertificateVerify and the Finished messages to be exchanged by the application layer protocol, as it is exercised for HTTP/2 and HTTP/3 in <xref target="I-D.ietf-httpbis-secondary-server-certs"/>.</t>
  <t>Rekeying of the application traffic secret does not lead to an update of the
exporter secret (see <xref section="7.5" sectionFormat="of" target="TLS13"/>) since the derived export secret is
based on the exporter_master_secret and not on the application traffic secret.</t>
  <t>Flight #4, which was used by EAP-TLS 1.2 <xref target="RFC5216"/>, does not exist in TLS 1.3.
As a consequence, EAP-TLS 1.3 <xref target="RFC9190"/> introduced a dummy message.</t>
  <t><xref target="RFC4279"/> introduced PSK-based authentication to TLS, a feature re-designed
in TLS 1.3. The "PSK identity hint" defined in <xref target="RFC4279"/>, which is used by the
server to help the client in selecting which PSK identity to use, is, however, not
available anymore in TLS 1.3.</t>
  <t>Finally, ciphersuites were depreciated and the RSA-based key transport is not yet
supported in TLS 1.3.</t>
</list></t>

<t>The profiles in this specification are designed to be adaptable to the broad spectrum of IoT applications, from low-power consumer devices to large-scale industrial deployments. It provides guidelines for implementing TLS/DTLS 1.3 in diverse networking contexts, including reliable, connection-oriented transport via TCP for TLS, and lightweight, connectionless communication via UDP for DTLS. In particular, DTLS is emphasized for scenarios where low-latency communication is paramount, such as multi-hop mesh networks and low-power wide-area networks, where the amount of data exchanged needs to be minimized.</t>

<t>In conclusion, this document offers comprehensive guidance for deploying secure communication in resource-constrained IoT environments. It outlines best practices for configuring TLS/DTLS 1.3 to meet the unique needs of IoT devices, ensuring robust security without overwhelming their limited processing, memory, and power resources. The document plays a vital role in facilitating secure, efficient IoT deployments, supporting the broad adoption of secure communication standards.</t>

<section anchor="conventions-and-terminology"><name>Conventions and Terminology</name>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
<?line -6?></t>

<t>This document reuses the terms "SHOULD+", "SHOULD-" and "MUST-" from <xref target="RFC8221"/>.</t>

</section>
</section>
<section anchor="credential-types"><name>Credential Types</name>

<t>In accordance with the recommendations in <xref target="RFC7925"/>, a compliant
implementation MUST implement TLS_AES_128_CCM_8_SHA256. It SHOULD implement
TLS_CHACHA20_POLY1305_SHA256.</t>

<t>Pre-shared key based authentication is integrated into the main TLS/DTLS 1.3
specification and has been harmonized with session resumption.</t>

<t>A compliant implementation supporting authentication based on certificates and
raw public keys MUST support digital signatures with ecdsa_secp256r1_sha256. A
compliant implementation MUST support the key exchange with secp256r1 (NIST
P-256) and SHOULD support key exchange with X25519.</t>

<t>A plain PSK-based TLS/DTLS client or server MUST implement the following
extensions:</t>

<t><list style="symbols">
  <t>Supported Versions,</t>
  <t>Cookie,</t>
  <t>Server Name Indication (SNI),</t>
  <t>Pre-Shared Key,</t>
  <t>PSK Key Exchange Modes, and</t>
  <t>Application-Layer Protocol Negotiation (ALPN).</t>
</list></t>

<t>For use of external pre-shared keys <xref target="RFC9258"/> makes the following
recommendation:</t>

<ul empty="true"><li>
  <t>Applications SHOULD provision separate PSKs for (D)TLS 1.3 and prior versions.</t>
</li></ul>

<t>Where possible, the importer interface defined in <xref target="RFC9258"/> MUST be used
for external PSKs. This ensures that external PSKs used in (D)TLS 1.3
are bound to a specific key derivation function (KDF) and hash function.</t>

<t>The SNI extension is discussed in this document and the justification
for implementing and using the ALPN extension can be found in <xref target="RFC9325"/>.</t>

<t>For TLS/DTLS clients and servers implementing raw public keys and/or
certificates the guidance for mandatory-to-implement extensions described in
Section 9.2 of <xref target="RFC8446"/> MUST be followed.</t>

</section>
<section anchor="error-handling"><name>Error Handling</name>

<t>TLS 1.3 simplified the Alert protocol but the underlying challenge in an
embedded context remains unchanged, namely what should an IoT device do when it
encounters an error situation. The classical approach used in a desktop
environment where the user is prompted is often not applicable with unattended
devices. Hence, it is more important for a developer to find out from which
error cases a device can recover from.</t>

</section>
<section anchor="session-resumption"><name>Session Resumption</name>

<t>TLS 1.3 has built-in support for session resumption by utilizing PSK-based
credentials established in an earlier exchange.</t>

</section>
<section anchor="compression"><name> Compression</name>

<t>TLS 1.3 does not have support for compression of application data traffic, as offered
by previous versions of TLS. Applications are therefore responsible for transmitting
payloads that are either compressed or use a more efficient encoding otherwise.</t>

<t>With regards to the handshake itself, various strategies have
been applied to reduce the size of the exchanged payloads. TLS and DTLS 1.3 use less
overhead, depending on the type of key confirmations, when compared to previous versions of the
protocol. Additionally, the work on Compact TLS (cTLS) <xref target="I-D.ietf-tls-ctls"/> has taken compression of the handshake
a step further by utilizing out-of-band knowledge between the communication parties to reduce
the amount of data to be transmitted at each individual handshake, among applying other techniques.</t>

</section>
<section anchor="forward-secrecy"><name> Forward Secrecy</name>

<t>RFC 8446 has removed Static RSA and Static Diffie-Hellman cipher suites, therefore all public-key-based key exchange mechanisms available in TLS 1.3 provide forward secrecy.</t>

<t>Pre-shared keys (PSKs) can be used with (EC)DHE key exchange to provide forward secrecy or can be used alone, at the cost of losing forward secrecy for the application data.</t>

</section>
<section anchor="authentication-and-integrity-only-cipher-suites"><name>Authentication and Integrity-only Cipher Suites</name>

<t>For a few, very specific Industrial IoT use cases <xref target="RFC9150"/> defines two cipher suites that provide data authenticity, but not data confidentiality.
Please review the security and privacy considerations about their use detailed in <xref section="9" sectionFormat="of" target="RFC9150"/>.</t>

</section>
<section anchor="keep-alive"><name>Keep-Alive</name>

<t>The discussion in Section 10 of <xref target="RFC7925"/> is applicable.</t>

</section>
<section anchor="timers-and-acks"><name>Timers and ACKs</name>

<t>Compared to DTLS 1.2 timeout-based whole flight retransmission, DTLS 1.3 ACKs sensibly decrease the risk of congestion collapse which was the basis for the very conservative recommendations given in <xref section="11" sectionFormat="of" target="RFC7925"/>.</t>

<t>In general, the recommendations in <xref section="7.3" sectionFormat="of" target="DTLS13"/> regarding ACKs apply.
In particular, "[w]hen DTLS 1.3 is used in deployments with lossy networks, such as low-power, long-range radio networks as well as low-power mesh networks, the use of ACKs is recommended" to signal any sign of disruption or lack of progress.
This allows for selective or early retransmission, which leads to more efficient use of bandwidth and memory resources.</t>

<t>Due to the vast range of network technologies used in IoT deployments, from wired LAN to GSM-SMS, it's not possible to provide a universal recommendation for an initial timeout.
Therefore, it is RECOMMENDED that DTLS 1.3 implementations allow developers to explicitly set the initial timer value.
Developers SHOULD set the initial timeout to be twice the expected round-trip time (RTT), but no less than 1000ms.
For specific application/network combinations, a sub-second initial timeout MAY be set.
In cases where no RTT estimates are available, a 1000ms initial timeout is suitable for the general Internet.</t>

<t>For RRC, the recommendations in <xref section="7.5" sectionFormat="of" target="I-D.ietf-tls-dtls-rrc"/> apply.
Just like the handshake initial timers, it is RECOMMENDED that DTLS 1.2 and 1.3 implementations offer an option for their developers to explicitly set the RRC timer.</t>

</section>
<section anchor="random-number-generation"><name> Random Number Generation</name>

<t>The discussion in Section 12 of <xref target="RFC7925"/> is applicable with one exception:
the ClientHello and the ServerHello messages in TLS 1.3 do not contain
gmt_unix_time component anymore.</t>

</section>
<section anchor="server-name-indication"><name>Server Name Indication</name>

<t>This specification mandates the implementation of the Server Name Indication (SNI)
extension. Where privacy requirements require it, the ECH (Encrypted Client Hello)
extension <xref target="I-D.ietf-tls-esni"/> prevents an on-path attacker to determine the domain
name the client is trying to connect to.</t>

<t>Since the Encrypted Client Hello extension requires use of Hybrid Public Key
Encryption (HPKE) <xref target="I-D.irtf-cfrg-hpke"/> and additional protocols require
further protocol exchanges and cryptographic operations, there is a certain
overhead associated with this privacy feature.</t>

<t>Note that in industrial IoT deployments the use of ECH may not be an option because
network administrators inspect DNS traffic generated by IoT devices in order to
detect malicious behaviour.</t>

<t>Besides, to avoid leaking DNS lookups from network inspection altogether further
protocols are needed, including DoH <xref target="RFC8484"/> and DPRIVE <xref target="RFC7858"/> <xref target="RFC8094"/>.
For use of such techniques in managed networks, the reader is advised to keep up to
date with the protocols defined by the Adaptive DNS Discovery (add) working group <xref target="ADD"/>.</t>

</section>
<section anchor="maximum-fragment-length-negotiation"><name> Maximum Fragment Length Negotiation</name>

<t>The Maximum Fragment Length Negotiation (MFL) extension has been superseded by
the Record Size Limit (RSL) extension <xref target="RFC8449"/>. Implementations in
compliance with this specification MUST implement the RSL extension and SHOULD
use it to indicate their RAM limitations.</t>

</section>
<section anchor="crypto-agility"><name>Crypto Agility</name>

<t>The recommendations in Section 19 of <xref target="RFC7925"/> are applicable.</t>

</section>
<section anchor="key-length-recommendations"><name>Key Length Recommendations</name>

<t>The recommendations in Section 20 of <xref target="RFC7925"/> are applicable.</t>

</section>
<section anchor="rtt-data"><name>0-RTT Data</name>

<t><xref section="E.5" sectionFormat="of" target="TLS13"/> establishes that:</t>

<ul empty="true"><li>
  <t>Application protocols MUST NOT use 0-RTT data without a profile that
defines its use.  That profile needs to identify which messages or
interactions are safe to use with 0-RTT and how to handle the
situation when the server rejects 0-RTT and falls back to 1-RTT.</t>
</li></ul>

<t>At the time of writing, no such profile has been defined for CoAP <xref target="CoAP"/>.
Therefore, 0-RTT MUST NOT be used by CoAP applications.</t>

</section>
<section anchor="certificate_profile"><name>Certificate Profile</name>

<t>This section contains updates and clarifications to the certificate profile
defined in <xref target="RFC7925"/>. The content of Table 1 of <xref target="RFC7925"/> has been
split by certificate "type" in order to clarify exactly what requirements and
recommendations apply to which entity in the PKI hierarchy.</t>

<t>The content is also better aligned with the IEEE 802.1AR <xref target="_8021AR"/>
specification, which introduces the terms Initial Device Identifier
(IDevID) and Locally Significant Device Identifiers (LDevIDs).
IDevIDs and LDevIDs are Device Identifier (DevID) and a DevID consists of</t>

<t><list style="symbols">
  <t>a private key,</t>
  <t>a certificate (containing the public key and the identifier certified by
the certificate's issuer), and</t>
  <t>a certificate chain up to a trust anchor. The trust anchor is is usually
the root certificate).</t>
</list></t>

<t>The IDevID is typically provisioned by a manufacturer and signed by the
manufacturer CA. It is then used to obtain operational certificates,
the LDevIDs, from the operator or owner of the device. Some protocols
also introduce an additional hierarchy with application instance
certificates, which are obtained for use with specific applications.</t>

<t>IDevIDs are primarily used with device onboarding or bootstrapping protocols,
such as the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol
<xref target="RFC8995"/> or by LwM2M Bootstrap <xref target="LwM2M"/>. Hence, the use of IDevIDs
is limited in purpose even though they have a long lifetime, or do not expire
at all. While some bootstrapping protocols use TLS (and therefore make use of
the IDevID as part of client authentication) there are other bootstrapping
protocols that do not use TLS/DTLS for client authentication, such as FIDO
Device Onboarding (FDO) <xref target="FDO"/>.  In many cases, a profile for the certificate
content is provided by those specifications. For these reasons, this
specification focuses on the description of LDevIDs.</t>

<t>While the IEEE 802.1AR terminology is utilized in this document,
this specification does not claim conformance to IEEE 802.1AR
since such a compliance statement goes beyond the use of the terminology
and the certificate content and would include the use of management
protocols, fulfillment of certain hardware security requirements, and
interfaces to access these hardware security modules. Placing these
requirements on network equipment like routers may be appropriate but
designers of constrained IoT devices have opted for different protocols
and hardware security choices.</t>

<section anchor="all-certificates"><name>All Certificates</name>

<t>To avoid repetition, this section outlines requirements on X.509
certificates applicable to all PKI entities.</t>

<section anchor="version"><name>Version</name>

<t>Certificates MUST be of type X.509 v3. Note that TLS 1.3 allows to
convey payloads other than X.509 certificates in the Certificate
message. The description in this section only focuses on X.509 v3
certificates and leaves the description of other formats to other
sections or even other specifications.</t>

</section>
<section anchor="serial-number"><name>Serial Number</name>

<t>CAs MUST generate non-sequential serial numbers greater than or equal to eight
(8) octets from a cryptographically secure pseudo-random number generator.
<xref target="RFC5280"/> limits this field to a maximum of 20 octets.
The serial number MUST be unique
for each certificate issued by a given CA (i.e., the issuer name
and the serial number uniquely identify a certificate).</t>

<t>This requirement is aligned with <xref target="RFC5280"/>.</t>

</section>
<section anchor="signature"><name>Signature</name>

<t>The signature MUST be ecdsa-with-SHA256 or stronger <xref target="RFC5758"/>.</t>

<t>Note: In contrast to IEEE 802.1AR this specification does not require
end entity certificates, subordinate CA certificates, and CA
certificates to use the same signature algorithm. Furthermore,
this specification does not utlize RSA for use with constrained IoT
devices and networks.</t>

</section>
<section anchor="issuer"><name>Issuer</name>

<t>The issuer field MUST contain a non-empty distinguished name (DN)
of the entity that has signed and issued the certificate in accordance
to <xref target="RFC5280"/>.</t>

</section>
<section anchor="validity"><name> Validity</name>

<t>In IoT deployment scenarios it is often expected that the IDevIDs have
no maximum validity period. For this purpose the use of a special value
for the notAfter date field, the GeneralizedTime value of 99991231235959Z,
is utilized. If this is done, then the CA certificates and the certificates
of subordinate CAs cannot have a maximum validity period either. Hence,
it requires careful consideration whether it is appropriate to issue
IDevID certificates with no maximum validity period.</t>

<t>LDevID certificates are, however, issued by the operator or owner,
and may be renewed at a regular interval using protocols, such
as Enrollment over Secure Transport (EST) <xref target="RFC7030"/> or the
Certificate Management Protocol (CMP) <xref target="RFC9483"/>.
It is therefore RECOMMENDED to limit the lifetime of these LDevID certificates
using the notBefore and notAfter fields, as described in Section 4.1.2.5 of
<xref target="RFC5280"/>. Values MUST be expressed in Greenwich Mean Time (Zulu) and
MUST include seconds even where the number of seconds is zero.</t>

<t>Note that the validity period is defined as the period of time from notBefore
through notAfter, inclusive. This means that a hypothetical certificate with a
notBefore date of 9 June 2021 at 03:42:01 and a notAfter date of 7 September
2021 at 03:42:01 becomes valid at the beginning of the :01 second, and only
becomes invalid at the :02 second, a period that is 90 days plus 1 second.  So
for a 90-day, notAfter must actually be 03:42:00.</t>

<t>For devices without a reliable source of time we advise the use of a device
management solution, which typically includes a certificate management protocol,
to manage the lifetime of all the certificates used by the device. While this
approach does not utilize certificates to its widest extent, it is a solution
that extends the capabilities offered by a raw public key approach.</t>

</section>
<section anchor="subject-public-key-info"><name> Subject Public Key Info</name>

<t>The SubjectPublicKeyInfo structure indicates the algorithm and any associated
parameters for the ECC public key. This profile uses the id-ecPublicKey
algorithm identifier for ECDSA signature keys, as defined and specified in
<xref target="RFC5480"/>. This specification assumes that devices supported one of the
following algorithms:</t>

<t><list style="symbols">
  <t>id-ecPublicKey with secp256r1,</t>
  <t>id-ecPublicKey with secp384r1, and</t>
  <t>id-ecPublicKey with secp521r1.</t>
</list></t>

<t>There is no requirement to use CA certificates and certificates of
subordinate CAs to use the same algorithm as the end-entity certificate.
Certificates with longer lifetime may well use a cryptographic stronger
algorithm.</t>

</section>
<section anchor="certificate-revocation-checks"><name>Certificate Revocation Checks</name>

<t>The guidance in <xref section="4.4.3" sectionFormat="of" target="RFC7925"/> still holds: for certificate
revocation, neither the Online Certificate Status Protocol (OCSP) nor
Certificate Revocation Lists (CRLs) are used by constrained IoT devices.</t>

<t>Since the publication of RFC 7925 the need for firmware update mechanisms
has been reinforced and the work on standardizing a secure and
interoperable firmware update mechanism has made substantial progress,
see <xref target="RFC9019"/>. RFC 7925 recommends to use a software / firmware update
mechanism to provision devices with new trust anchors. This approach only addresses the distribution of trust anchors and not end-entity certificates or certificates of subordinate CAs.</t>

<t>The use of device management protocols for IoT devices, which often include
an onboarding or bootstrapping mechanism, has also seen considerable uptake
in deployed devices. These protocols, some of which are standardized,
allow for the distribution and updating of certificates on demand. This enables a
deployment model where IoT device utilize end-entity certificates with
shorter lifetime making certificate revocation protocols, like OCSP
and CRLs, less relevant. Whenever certificates are updated the TLS stack
needs to be informed since the communication endpoints need to be aware
of the new certificates. This is particularly important when long-lived
TLS connections are used. In such a case, the a post-handshake
authentication exchange is triggered when the application requires it. TLS 1.3 provides
client-to-server post-handshake authentication only. Mutual
authentication via post-handshake messages is available by the use of the "Exported
Authenticator" <xref target="RFC9261"/> but requires the application layer protocol
to carry the payloads.</t>

<t>Hence, instead of performing certificate revocation checks on the IoT device
itself this specification recommends to delegate this task to the IoT device
operator and to take the necessary action to allow IoT devices to remain
operational.</t>

<t>The CRL distribution points extension has been defined in RFC 5280 to
identify how CRL information is obtained. The authority information access
extension indicates how to access information like the online certificate
status service (OCSP). Both extensions SHOULD NOT be set. If set, they
MUST NOT be marked critical.</t>

</section>
</section>
<section anchor="root-ca-certificate"><name>Root CA Certificate</name>

<t>This section outlines the requirements for root CA certificates.</t>

<section anchor="subject"><name>Subject</name>

<t><xref target="RFC5280"/> mandates that Root CA certificates MUST have a non-empty subject field. The subject field MUST contain the commonName, the organizationName, and the countryName attribute and MAY contain an organizationalUnitName attribute.</t>

</section>
<section anchor="authority-key-identifier"><name>Authority Key Identifier</name>

<t>Section 4.2.1.1 of <xref target="RFC5280"/> defines the Authority Key Identifier as follows:
"The authority key identifier extension provides a means of identifying the
public key corresponding to the private key used to sign a certificate. This
extension is used where an issuer has multiple signing keys."</t>

<t>The Authority Key Identifier extension MAY be omitted. If it is set, it MUST NOT be
marked critical, and MUST contain the subjectKeyIdentifier of this certificate.</t>

<t>[Editor's Note: Do we need to set the Authority Key Identifier in the CA certificate?]</t>

</section>
<section anchor="subject-key-identifier"><name>Subject Key Identifier</name>

<t>Section 4.2.1.2 of <xref target="RFC5280"/> defines the Subject Key Identifier as follows:
"The subject key identifier extension provides a means of identifying
certificates that contain a particular public key."</t>

<t>The Subject Key Identifier extension MUST be set, MUST NOT be marked critical, and MUST
contain the key identifier of the public key contained in the subject public key
info field.</t>

<t>[Editor's Note: Do we need to set the Subject Key Identifier in the CA certificate?]</t>

</section>
<section anchor="key-usage"><name>Key Usage</name>

<t><xref target="RFC5280"/> defines the key usage field as follows: "The key usage extension defines
the purpose (e.g., encipherment, signature, certificate signing) of the key contained
in the certificate."</t>

<t>The Key Usage extension SHOULD be set. If it is set, it MUST be marked critical and
the keyCertSign or cRLSign purposes MUST be set. Additional key usages MAY be set
depending on the intended usage of the public key.</t>

<t>[Editor's Note: Should we harden the requirement to "The Key Usage extension MUST  be set.]</t>

<t><xref target="RFC5280"/> defines the extended key usage as follows: "This extension indicates
one or more purposes for which the certified public key may be used, in addition to
or in place of the basic purposes indicated in the key usage extension."</t>

<t>This extendedKeyUsage extension MUST NOT be set.</t>

</section>
<section anchor="basic-constraints"><name>Basic Constraints</name>

<t><xref target="RFC5280"/> states that "The Basic Constraints extension identifies whether the subject
of the certificate is a CA and the maximum depth of valid certification paths that include
this certificate. The cA boolean indicates whether the certified public key may be used to
verify certificate signatures."</t>

<t>For the pathLenConstraint RFC 5280 makes further statements:</t>

<t><list style="symbols">
  <t>"The pathLenConstraint field is meaningful only if the cA boolean is asserted and the
key usage extension, if present, asserts the keyCertSign bit. In this case, it gives the
maximum number of non-self-issued intermediate certificates that may follow this
certificate in a valid certification path."</t>
  <t>"A pathLenConstraint of zero indicates that no non-self-issued intermediate CA
certificates may follow in a valid certification path."</t>
  <t>"Where pathLenConstraint does not appear, no limit is imposed."</t>
  <t>"Conforming CAs MUST include this extension in all CA certificates that contain public
keys used to validate digital signatures on certificates and MUST mark the extension as
critical in such certificates."</t>
</list></t>

<t>The Basic Constraints extension MUST be set, MUST be marked critical, the cA flag MUST
be set to true and the pathLenConstraint MUST be omitted.</t>

<t>[Editor's Note: Should we soften the requirement to: "The pathLenConstraint field SHOULD NOT be present."]</t>

</section>
</section>
<section anchor="subordinate-ca-certificate"><name>Subordinate CA Certificate</name>

<t>This section outlines the requirements for subordinate CA certificates.</t>

<section anchor="subject-1"><name>Subject</name>

<t>The subject field MUST be set and MUST contain the commonName, the organizationName,
and the countryName attribute and MAY contain an organizationalUnitName attribute.</t>

</section>
<section anchor="authority-key-identifier-1"><name>Authority Key Identifier</name>

<t>The Authority Key Identifier extension MUST be set, MUST NOT be marked critical, and
MUST contain the subjectKeyIdentifier of the CA that issued this certificate.</t>

</section>
<section anchor="subject-key-identifier-1"><name>Subject Key Identifier</name>

<t>The Subject Key Identifier extension MUST be set, MUST NOT be marked critical, and MUST
contain the key identifier of the public key contained in the subject public key info
field.</t>

</section>
<section anchor="key-usage-1"><name>Key Usage</name>

<t>The Key Usage extension MUST be set, MUST be marked critical, the keyCertSign or
cRLSign purposes MUST be set, and the digitalSignature purpose SHOULD be set.</t>

<t>The extendedKeyUsage extensed MAY be set depending on the intended usage of the
public key.</t>

<t>[Editor's Note: Should we harden the requirement to "The extendedKeyUsage MUST NOT be present."]</t>

</section>
<section anchor="basic-constraints-1"><name>Basic Constraints</name>

<t>The Basic Constraints extension MUST be set, MUST be marked critical, the cA flag
MUST be set to true and the pathLenConstraint MUST be set to 0.</t>

<t>[Editor's Note: Should we soften the requriement to "The pathLenConstraint field MAY be present."]</t>

</section>
<section anchor="crl-distribution-point"><name>CRL Distribution Point</name>

<t>The CRL Distribution Point extension SHOULD NOT be set. If it is set, it MUST NOT
be marked critical and MUST identify the CRL relevant for this certificate.</t>

</section>
<section anchor="authority-information-access"><name>Authority Information Access</name>

<t>The Authority Information Access extension SHOULD NOT be set. If it is set, it MUST
NOT be marked critical and MUST identify the location of the certificate of the CA
that issued this certificate and the location it provides an online certificate
status service (OCSP).</t>

</section>
</section>
<section anchor="end-entity-certificate"><name>End Entity Certificate</name>

<t>This section outlines the requirements for end entity certificates.</t>

<section anchor="subject-2"><name>Subject</name>

<t><xref section="2" sectionFormat="comma" target="RFC9525"/> mandates that the subject field not be used to identify a service.
For IoT purposes, an empty subject field avoids all confusion for End Entity certificates.</t>

<t>The requirement in Section 4.4.2 of <xref target="RFC7925"/> to only use EUI-64 for end
entity certificates as a subject field is lifted.</t>

<t>Two fields are typically used to encode a device identifer, namely the
Subject and the subjectAltName fields. Protocol specifications tend to offer
recommendations what identifiers to use and the deployment situation is
fragmented.</t>

<t>The subject field MAY include a unique device serial number. If the serial
number is included, it MUST be encoded in the X520SerialNumber attribute.</t>

<t><xref target="RFC5280"/> defines: "The subject alternative name extension allows identities
to be bound to the subject of the certificate. These identities may be included
in addition to or in place of the identity in the subject field of the certificate."</t>

<t>The subject alternative name extension MAY be set. If it is set, it MUST NOT be
marked critical, except when the subject DN contains an empty sequence.</t>

<t>If the EUI-64 format is used to identify the subject of an end entity
certificate, it MUST be encoded in a subjectAltName of type DNS-ID as a string
of the form <spanx style="verb">HH-HH-HH-HH-HH-HH-HH-HH</spanx> where 'H' is one of the symbols '0'-'9'
or 'A'-'F'.</t>

<t>Domain names MUST NOT be encoded in the subject commonName. Instead they
MUST be encoded in a subjectAltName of type DNS-ID. Domain names MUST NOT
contain wildcard (<spanx style="verb">*</spanx>) characters. The subjectAltName MUST NOT contain multiple
names.</t>

<t>Note: The IEEE 802.1AR recomments to encode information about a Trusted
Platform Module (TPM), if present, in the HardwareModuleName. This
specification does not follow this recommendation.</t>

</section>
<section anchor="authority-key-identifier-2"><name>Authority Key Identifier</name>

<t>The Authority Key Identifier extension MUST be set, MUST NOT be marked critical,
and MUST contain the subjectKeyIdentifier of the CA that issued this certificate.</t>

</section>
<section anchor="subject-key-identifier-2"><name>Subject Key Identifier</name>

<t>The Subject Key Identifier SHOULD NOT be included in end-entity certificates.
If it is included, then the Subject Key Identifier extension MUST NOT be marked
critical, and MUST contain the key identifier of the public key contained in the
subject public key info field.</t>

<t>[Editor's Note: Should we harden the requirement and state: "The Subject Key Identifier MUST NOT be included in end-entity certificates."]</t>

</section>
<section anchor="key-usage-2"><name>Key Usage</name>

<t>The key usage extension MUST be set and MUST be marked as critical. For
signature verification keys the digitialSignature key usage purpose MUST
be specified. Other key usages are set according to the intended usage
of the key.</t>

<t>If enrollment of new certificates uses server-side key generation, encrypted
delivery of the private key is required. In such cases the key usage
keyEncipherment or keyAgreement MUST be set because the encrypted delivery
of the newly generated key involves encryption or agreement of a symmetric
key. On-device key generation is, however, the preferred approach.</t>

<t>The extendedKeyUsage MUST be present and contain at least one of
id-kp-serverAuth or id-kp-clientAuth.</t>

</section>
</section>
</section>
<section anchor="certificate-overhead"><name>Certificate Overhead</name>

<t>In a public key-based key exchange, certificates and public keys are a major
contributor to the size of the overall handshake. For example, in a regular TLS
1.3 handshake with minimal ECC certificates and no subordinate CA utilizing
the secp256r1 curve with mutual authentication, around 40% of the entire
handshake payload is consumed by the two exchanged certificates.</t>

<t>Hence, it is not surprising that there is a strong desire to reduce the size of
certificates and certificate chains. This has lead to various standardization
efforts. Below is a brief summary of what options an implementer has to reduce
the bandwidth requirements of a public key-based key exchange. Note that many
of the standardized extensions are not readily available in TLS/DTLS stacks since
optimizations typically get implemented last.</t>

<t><list style="symbols">
  <t>Use elliptic curve cryptography (ECC) instead of RSA-based certificate due to
the smaller certificate size. This document recommends the use of elliptic
curve cryptography only.</t>
  <t>Avoid deep and complex CA hierarchies to reduce the number of subordinate CA
certificates that need to be transmitted and processed. See
<xref target="I-D.irtf-t2trg-taxonomy-manufacturer-anchors"/> for a discussion about CA
hierarchies.</t>
  <t>Pay attention to the amount of information conveyed inside certificates.</t>
  <t>Use session resumption to reduce the number of times a full handshake is
needed.  Use Connection IDs <xref target="RFC9146"/>, when possible, to enable
long-lasting connections.</t>
  <t>Use the TLS cached info <xref target="RFC7924"/> extension to avoid sending certificates
with every full handshake.</t>
  <t>Use client certificate URLs <xref target="RFC6066"/> instead of full certificates for
clients. When applications perform TLS client authentication via
DNS-Based Authentication of Named Entities (DANE) TLSA records then the
<xref target="I-D.ietf-dance-tls-clientid"/> specification may be used to reduce the
packets on the wire. Note: The term "TLSA" does not stand for anything;
it is just the name of the RRtype, as explained in <xref target="RFC6698"/>.</t>
  <t>Use certificate compression as defined in
<xref target="RFC8879"/>.</t>
  <t>Use alternative certificate formats, where possible, such as raw public keys
<xref target="RFC7250"/> or CBOR-encoded certificates
<xref target="I-D.ietf-cose-cbor-encoded-cert"/>.</t>
</list></t>

<t>The use of certificate handles, as introduced in cTLS <xref target="I-D.ietf-tls-ctls"/>,
is a form of caching or compressing certificates as well.</t>

<t>Whether to utilize any of the above extensions or a combination of them depends
on the anticipated deployment environment, the availability of code, and the
constraints imposed by already deployed infrastructure (e.g., CA
infrastructure, tool support).</t>

</section>
<section anchor="ciphersuites"><name>Ciphersuites</name>

<t>According to <xref section="4.5.3" sectionFormat="of" target="DTLS13"/>, the use of AES-CCM with 8-octet
authentication tags (CCM_8) is considered unsuitable for general use with DTLS.
This is because it has low integrity limits (i.e., high sensitivity to
forgeries) which makes endpoints that negotiate ciphersuites based on such AEAD
vulnerable to a trivial DoS attack. See also Sections <xref target="I-D.irtf-cfrg-aead-limits" section="5.3" sectionFormat="bare"/> and <xref target="I-D.irtf-cfrg-aead-limits" section="5.4" sectionFormat="bare"/> of <xref target="I-D.irtf-cfrg-aead-limits"/> for further discussion on this topic, as well as
references to the analysis supporting these conclusions.</t>

<t>Specifically, <xref target="DTLS13"/> warns that:</t>

<figure><artwork><![CDATA[
> TLS_AES_128_CCM_8_SHA256 MUST NOT be used in DTLS without additional
> safeguards against forgery. Implementations MUST set usage limits for
> AEAD_AES_128_CCM_8 based on an understanding of any additional forgery
> protections that are used.
]]></artwork></figure>

<t>Since all the ciphersuites required by <xref target="RFC7925"/> and <xref target="CoAP"/> rely on CCM_8,
there is no alternate ciphersuite available for applications that aim to
eliminate the security and availability threats related to CCM_8 while retaining
interoperability with the larger ecosystem.</t>

<t>In order to ameliorate the situation, this document RECOMMENDS that
implementations support the following two ciphersuites:</t>

<t><list style="symbols">
  <t><spanx style="verb">TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256</spanx></t>
  <t><spanx style="verb">TLS_ECDHE_ECDSA_WITH_AES_128_CCM</spanx></t>
</list></t>

<t>and offer them as their first choice.  These ciphersuites provide
confidentiality and integrity limits that are considered acceptable in the most
general settings.  For the details on the exact bounds of both ciphersuites see
<xref section="4.5.3" sectionFormat="of" target="DTLS13"/>.  Note that the GCM-based ciphersuite offers
superior interoperability with cloud services at the cost of a slight increase
in the wire and peak RAM footprints.</t>

<t>When the GCM-based ciphersuite is used with TLS 1.2, the recommendations in
<xref section="7.2.1" sectionFormat="of" target="RFC9325"/> related to deterministic nonce generation
apply.  In addition, the integrity limits on key usage detailed in <xref section="4.4" sectionFormat="of" target="RFC9325"/> also apply.</t>

<t><xref target="tab-cipher-reqs"/> summarizes the recommendations regarding ciphersuites:</t>

<texttable align="left" title="Ciphersuite requirements" anchor="tab-cipher-reqs">
      <ttcol align='left'>Ciphersuite</ttcol>
      <ttcol align='left'>Requirement</ttcol>
      <c><spanx style="verb">TLS_AES_128_CCM_8_SHA256</spanx></c>
      <c>MUST-</c>
      <c><spanx style="verb">TLS_ECDHE_ECDSA_WITH_AES_128_CCM</spanx></c>
      <c>SHOULD+</c>
      <c><spanx style="verb">TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256</spanx></c>
      <c>SHOULD+</c>
</texttable>

</section>
<section anchor="fault-attacks-on-deterministic-signature-schemes"><name>Fault Attacks on Deterministic Signature Schemes</name>

<t>A number of passive side-channel attacks as well as active fault-injection
attacks (e.g., <xref target="Ambrose2017"/>) have been demonstrated to be successful in allowing a malicious
third party to gain information about the signing key if a fully deterministic
signature scheme (e.g., <xref target="RFC6979"/> ECDSA or EdDSA <xref target="RFC8032"/>) is used.</t>

<t>Most of these attacks assume physical access to the device and are therefore
especially relevant to smart cards as well as IoT deployments with poor or
non-existent physical security.</t>

<t>In this security model, it is recommended to combine both randomness and
determinism, for example, as described in
<xref target="I-D.irtf-cfrg-det-sigs-with-noise"/>.</t>

</section>
<section anchor="post-quantum-cryptography-pqc-considerations"><name>Post-Quantum Cryptography (PQC) Considerations</name>

<t>As detailed in <xref target="I-D.ietf-pquip-pqc-engineers"/>, the IETF is actively working to address the challenges of adopting PQC in various protocols, including TLS. The document highlights key aspects engineers must consider, such as algorithm selection, performance impacts, and deployment strategies. It emphasizes the importance of gradual integration of PQC to ensure secure communication while accounting for the increased computational, memory, and bandwidth requirements of PQC algorithms. These challenges are especially relevant in the context of IoT, where device constraints limit the adoption of larger key sizes and more complex cryptographic operations <xref target="PQC-PERF"/>. Besides, any choice need to careful evaluate the associated energy requirements <xref target="PQC-ENERGY"/>.</t>

<t>Incorporating PQC into TLS is still ongoing, with key exchange message sizes increasing due to larger public keys. These larger keys demand more flash storage and higher RAM usage, presenting significant obstacles for resource-constrained IoT devices. The transition from classical cryptographic algorithms to PQC will be a significant challenge for constrained IoT devices, requiring careful planning to select hardware suitable for the task considering the lifetime of an IoT product.</t>

</section>
<section anchor="open-issues"><name>Open Issues</name>

<t>A list of open issues can be found at https://github.com/thomas-fossati/draft-tls13-iot/issues</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>This entire document is about security.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document makes no requests to IANA.</t>

</section>


  </middle>

  <back>


    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="DTLS13">
  <front>
    <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
    <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
    <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
    <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
    <date month="April" year="2022"/>
    <abstract>
      <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
      <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
      <t>This document obsoletes RFC 6347.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9147"/>
  <seriesInfo name="DOI" value="10.17487/RFC9147"/>
</reference>

<reference anchor="TLS13">
  <front>
    <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
    <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
    <date month="August" year="2018"/>
    <abstract>
      <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
      <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8446"/>
  <seriesInfo name="DOI" value="10.17487/RFC8446"/>
</reference>

<reference anchor="RFC7925">
  <front>
    <title>Transport Layer Security (TLS) / Datagram Transport Layer Security (DTLS) Profiles for the Internet of Things</title>
    <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig"/>
    <author fullname="T. Fossati" initials="T." surname="Fossati"/>
    <date month="July" year="2016"/>
    <abstract>
      <t>A common design pattern in Internet of Things (IoT) deployments is the use of a constrained device that collects data via sensors or controls actuators for use in home automation, industrial control systems, smart cities, and other IoT deployments.</t>
      <t>This document defines a Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) 1.2 profile that offers communications security for this data exchange thereby preventing eavesdropping, tampering, and message forgery. The lack of communication security is a common vulnerability in IoT products that can easily be solved by using these well-researched and widely deployed Internet security protocols.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7925"/>
  <seriesInfo name="DOI" value="10.17487/RFC7925"/>
</reference>

<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>

<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>

<reference anchor="RFC8221">
  <front>
    <title>Cryptographic Algorithm Implementation Requirements and Usage Guidance for Encapsulating Security Payload (ESP) and Authentication Header (AH)</title>
    <author fullname="P. Wouters" initials="P." surname="Wouters"/>
    <author fullname="D. Migault" initials="D." surname="Migault"/>
    <author fullname="J. Mattsson" initials="J." surname="Mattsson"/>
    <author fullname="Y. Nir" initials="Y." surname="Nir"/>
    <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
    <date month="October" year="2017"/>
    <abstract>
      <t>This document replaces RFC 7321, "Cryptographic Algorithm Implementation Requirements and Usage Guidance for Encapsulating Security Payload (ESP) and Authentication Header (AH)". The goal of this document is to enable ESP and AH to benefit from cryptography that is up to date while making IPsec interoperable.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8221"/>
  <seriesInfo name="DOI" value="10.17487/RFC8221"/>
</reference>

<reference anchor="RFC9258">
  <front>
    <title>Importing External Pre-Shared Keys (PSKs) for TLS 1.3</title>
    <author fullname="D. Benjamin" initials="D." surname="Benjamin"/>
    <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
    <date month="July" year="2022"/>
    <abstract>
      <t>This document describes an interface for importing external Pre-Shared Keys (PSKs) into TLS 1.3.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9258"/>
  <seriesInfo name="DOI" value="10.17487/RFC9258"/>
</reference>

<reference anchor="RFC9325">
  <front>
    <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
    <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
    <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
    <author fullname="T. Fossati" initials="T." surname="Fossati"/>
    <date month="November" year="2022"/>
    <abstract>
      <t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are used to protect data exchanged over a wide range of application protocols and can also form the basis for secure transport protocols. Over the years, the industry has witnessed several serious attacks on TLS and DTLS, including attacks on the most commonly used cipher suites and their modes of operation. This document provides the latest recommendations for ensuring the security of deployed services that use TLS and DTLS. These recommendations are applicable to the majority of use cases.</t>
      <t>RFC 7525, an earlier version of the TLS recommendations, was published when the industry was transitioning to TLS 1.2. Years later, this transition is largely complete, and TLS 1.3 is widely available. This document updates the guidance given the new environment and obsoletes RFC 7525. In addition, this document updates RFCs 5288 and 6066 in view of recent attacks.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="195"/>
  <seriesInfo name="RFC" value="9325"/>
  <seriesInfo name="DOI" value="10.17487/RFC9325"/>
</reference>

<reference anchor="RFC8446">
  <front>
    <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
    <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
    <date month="August" year="2018"/>
    <abstract>
      <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
      <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8446"/>
  <seriesInfo name="DOI" value="10.17487/RFC8446"/>
</reference>


<reference anchor="I-D.ietf-tls-dtls-rrc">
   <front>
      <title>Return Routability Check for DTLS 1.2 and DTLS 1.3</title>
      <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
         </author>
      <author fullname="Achim Kraus" initials="A." surname="Kraus">
         </author>
      <author fullname="Thomas Fossati" initials="T." surname="Fossati">
         <organization>Linaro</organization>
      </author>
      <date day="24" month="September" year="2024"/>
      <abstract>
	 <t>   This document specifies a return routability check for use in context
   of the Connection ID (CID) construct for the Datagram Transport Layer
   Security (DTLS) protocol versions 1.2 and 1.3.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Discussion of this document takes place on the Transport Layer
   Security Working Group mailing list (tls@ietf.org), which is archived
   at https://mailarchive.ietf.org/arch/browse/tls/.

   Source for this draft and an issue tracker can be found at
   https://github.com/tlswg/dtls-rrc.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-tls-dtls-rrc-12"/>
   
</reference>

<reference anchor="RFC8449">
  <front>
    <title>Record Size Limit Extension for TLS</title>
    <author fullname="M. Thomson" initials="M." surname="Thomson"/>
    <date month="August" year="2018"/>
    <abstract>
      <t>An extension to Transport Layer Security (TLS) is defined that allows endpoints to negotiate the maximum size of protected records that each will send the other.</t>
      <t>This replaces the maximum fragment length extension defined in RFC 6066.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8449"/>
  <seriesInfo name="DOI" value="10.17487/RFC8449"/>
</reference>

<reference anchor="RFC5280">
  <front>
    <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
    <author fullname="D. Cooper" initials="D." surname="Cooper"/>
    <author fullname="S. Santesson" initials="S." surname="Santesson"/>
    <author fullname="S. Farrell" initials="S." surname="Farrell"/>
    <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
    <author fullname="R. Housley" initials="R." surname="Housley"/>
    <author fullname="W. Polk" initials="W." surname="Polk"/>
    <date month="May" year="2008"/>
    <abstract>
      <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5280"/>
  <seriesInfo name="DOI" value="10.17487/RFC5280"/>
</reference>

<reference anchor="RFC5758">
  <front>
    <title>Internet X.509 Public Key Infrastructure: Additional Algorithms and Identifiers for DSA and ECDSA</title>
    <author fullname="Q. Dang" initials="Q." surname="Dang"/>
    <author fullname="S. Santesson" initials="S." surname="Santesson"/>
    <author fullname="K. Moriarty" initials="K." surname="Moriarty"/>
    <author fullname="D. Brown" initials="D." surname="Brown"/>
    <author fullname="T. Polk" initials="T." surname="Polk"/>
    <date month="January" year="2010"/>
    <abstract>
      <t>This document updates RFC 3279 to specify algorithm identifiers and ASN.1 encoding rules for the Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA) digital signatures when using SHA-224, SHA-256, SHA-384, or SHA-512 as the hashing algorithm. This specification applies to the Internet X.509 Public Key infrastructure (PKI) when digital signatures are used to sign certificates and certificate revocation lists (CRLs). This document also identifies all four SHA2 hash algorithms for use in the Internet X.509 PKI. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5758"/>
  <seriesInfo name="DOI" value="10.17487/RFC5758"/>
</reference>

<reference anchor="RFC5480">
  <front>
    <title>Elliptic Curve Cryptography Subject Public Key Information</title>
    <author fullname="S. Turner" initials="S." surname="Turner"/>
    <author fullname="D. Brown" initials="D." surname="Brown"/>
    <author fullname="K. Yiu" initials="K." surname="Yiu"/>
    <author fullname="R. Housley" initials="R." surname="Housley"/>
    <author fullname="T. Polk" initials="T." surname="Polk"/>
    <date month="March" year="2009"/>
    <abstract>
      <t>This document specifies the syntax and semantics for the Subject Public Key Information field in certificates that support Elliptic Curve Cryptography. This document updates Sections 2.3.5 and 5, and the ASN.1 module of "Algorithms and Identifiers for the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile", RFC 3279. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5480"/>
  <seriesInfo name="DOI" value="10.17487/RFC5480"/>
</reference>

<reference anchor="RFC9525">
  <front>
    <title>Service Identity in TLS</title>
    <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
    <author fullname="R. Salz" initials="R." surname="Salz"/>
    <date month="November" year="2023"/>
    <abstract>
      <t>Many application technologies enable secure communication between two entities by means of Transport Layer Security (TLS) with Internet Public Key Infrastructure using X.509 (PKIX) certificates. This document specifies procedures for representing and verifying the identity of application services in such interactions.</t>
      <t>This document obsoletes RFC 6125.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9525"/>
  <seriesInfo name="DOI" value="10.17487/RFC9525"/>
</reference>




    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="RFC9146">
  <front>
    <title>Connection Identifier for DTLS 1.2</title>
    <author fullname="E. Rescorla" initials="E." role="editor" surname="Rescorla"/>
    <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig"/>
    <author fullname="T. Fossati" initials="T." surname="Fossati"/>
    <author fullname="A. Kraus" initials="A." surname="Kraus"/>
    <date month="March" year="2022"/>
    <abstract>
      <t>This document specifies the Connection ID (CID) construct for the Datagram Transport Layer Security (DTLS) protocol version 1.2.</t>
      <t>A CID is an identifier carried in the record layer header that gives the recipient additional information for selecting the appropriate security association. In "classical" DTLS, selecting a security association of an incoming DTLS record is accomplished with the help of the 5-tuple. If the source IP address and/or source port changes during the lifetime of an ongoing DTLS session, then the receiver will be unable to locate the correct security context.</t>
      <t>The new ciphertext record format with the CID also provides content type encryption and record layer padding.</t>
      <t>This document updates RFC 6347.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9146"/>
  <seriesInfo name="DOI" value="10.17487/RFC9146"/>
</reference>


<reference anchor="I-D.ietf-pquip-pqc-engineers">
   <front>
      <title>Post-Quantum Cryptography for Engineers</title>
      <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
         <organization>Nokia</organization>
      </author>
      <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
         <organization>Nokia</organization>
      </author>
      <author fullname="Dimitrios Schoinianakis" initials="D." surname="Schoinianakis">
         <organization>Nokia</organization>
      </author>
      <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
         <organization>DigiCert</organization>
      </author>
      <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
         <organization>Entrust Limited</organization>
      </author>
      <date day="12" month="September" year="2024"/>
      <abstract>
	 <t>   The presence of a Cryptographically Relevant Quantum Computer (CRQC)
   would render state-of-the-art, traditional public-key algorithms
   deployed today obsolete, since the assumptions about the
   intractability of the mathematical problems for these algorithms that
   offer confident levels of security today no longer apply in the
   presence of a CRQC.  This means there is a requirement to update
   protocols and infrastructure to use post-quantum algorithms, which
   are public-key algorithms designed to be secure against CRQCs as well
   as classical computers.  These new public-key algorithms behave
   similarly to previous public key algorithms, however the intractable
   mathematical problems have been carefully chosen so they are hard for
   CRQCs as well as classical computers.  This document explains why
   engineers need to be aware of and understand post-quantum
   cryptography.  It emphasizes the potential impact of CRQCs on current
   cryptographic systems and the need to transition to post-quantum
   algorithms to ensure long-term security.  The most important thing to
   understand is that this transition is not like previous transitions
   from DES to AES or from SHA-1 to SHA-2.  While drop-in replacement
   may be possible in some cases, others will require protocol re-design
   to accommodate significant differences in behavior between the new
   post-quantum algorithms and the classical algorithms that they are
   replacing.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqc-engineers-05"/>
   
</reference>

<reference anchor="PQC-ENERGY">
  <front>
    <title>Energy Consumption Evaluation of Post-Quantum TLS 1.3 for Resource-Constrained Embedded Devices</title>
    <author fullname="George Tasopoulos" initials="G." surname="Tasopoulos">
      <organization>Industrial Systems Institute, R.C. ATHENA, Patras, Greece</organization>
    </author>
    <author fullname="Charis Dimopoulos" initials="C." surname="Dimopoulos">
      <organization>Industrial Systems Institute, R.C. ATHENA &amp;amp; Electrical and Computer Engineering, Dpt, University of Patras, Patras, Greece</organization>
    </author>
    <author fullname="Apostolos P. Fournaris" initials="A." surname="Fournaris">
      <organization>Industrial Systems Institute, R.C. ATHENA, Patras, Greece</organization>
    </author>
    <author fullname="Raymond K. Zhao" initials="R." surname="Zhao">
      <organization>CSIRO's Data61 Sydney, Australia</organization>
    </author>
    <author fullname="Amin Sakzad" initials="A." surname="Sakzad">
      <organization>Monash University, Melbourne, Australia</organization>
    </author>
    <author fullname="Ron Steinfeld" initials="R." surname="Steinfeld">
      <organization>Monash University, Melbourne, Australia</organization>
    </author>
    <date month="May" year="2023"/>
  </front>
  <seriesInfo name="Proceedings of the 20th ACM International Conference on Computing" value="Frontiers"/>
  <seriesInfo name="DOI" value="10.1145/3587135.3592821"/>
<refcontent>ACM</refcontent></reference>

<reference anchor="PQC-PERF">
  <front>
    <title>Performance Evaluation of Post-Quantum TLS 1.3 on Resource-Constrained Embedded Systems</title>
    <author fullname="George Tasopoulos" initials="G." surname="Tasopoulos">
      <organization/>
    </author>
    <author fullname="Jinhui Li" initials="J." surname="Li">
      <organization/>
    </author>
    <author fullname="Apostolos P. Fournaris" initials="A." surname="Fournaris">
      <organization/>
    </author>
    <author fullname="Raymond K. Zhao" initials="R." surname="Zhao">
      <organization/>
    </author>
    <author fullname="Amin Sakzad" initials="A." surname="Sakzad">
      <organization/>
    </author>
    <author fullname="Ron Steinfeld" initials="R." surname="Steinfeld">
      <organization/>
    </author>
    <date year="2022"/>
  </front>
  <seriesInfo name="Lecture Notes in Computer Science" value="pp. 432-451"/>
  <seriesInfo name="DOI" value="10.1007/978-3-031-21280-2_24"/>
  <seriesInfo name="ISBN" value="[&quot;9783031212796&quot;, &quot;9783031212802&quot;]"/>
<refcontent>Springer International Publishing</refcontent></reference>

<reference anchor="CoAP">
  <front>
    <title>The Constrained Application Protocol (CoAP)</title>
    <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
    <author fullname="K. Hartke" initials="K." surname="Hartke"/>
    <author fullname="C. Bormann" initials="C." surname="Bormann"/>
    <date month="June" year="2014"/>
    <abstract>
      <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
      <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7252"/>
  <seriesInfo name="DOI" value="10.17487/RFC7252"/>
</reference>


<reference anchor="ADD" target="https://datatracker.ietf.org/wg/add/about/">
  <front>
    <title>Adaptive DNS Discovery (add) Working Group</title>
    <author >
      <organization>IETF</organization>
    </author>
    <date year="2023" month="September"/>
  </front>
</reference>
<reference anchor="_8021AR" target="https://1.ieee802.org/security/802-1ar">
  <front>
    <title>IEEE Standard for Local and metropolitan area networks – Secure Device Identity, IEEE 802.1AR-2018</title>
    <author >
      <organization>IEEE</organization>
    </author>
    <date year="2018" month="August"/>
  </front>
</reference>
<reference anchor="FDO" target="https://fidoalliance.org/specifications/download-iot-specifications/">
  <front>
    <title>FIDO Device Onboard Specification 1.1</title>
    <author >
      <organization>FIDO Alliance</organization>
    </author>
    <date year="2022" month="April"/>
  </front>
</reference>
<reference anchor="LwM2M" target="https://openmobilealliance.org/release/LightweightM2M/V1_2_1-20221209-A/">
  <front>
    <title>Lightweight Machine to Machine (LwM2M) V.1.2.1 Technical Specification: Transport Bindings</title>
    <author >
      <organization>OMA SpecWorks</organization>
    </author>
    <date year="2022" month="December"/>
  </front>
</reference>
<reference anchor="Ambrose2017" target="https://eprint.iacr.org/2017/975.pdf">
  <front>
    <title>Differential Attacks on Deterministic Signatures</title>
    <author initials="C." surname="Ambrose" fullname="Christopher Ambrose">
      <organization></organization>
    </author>
    <author initials="J. W." surname="Bos" fullname="Joppe W. Bos">
      <organization></organization>
    </author>
    <author initials="B." surname="Fay" fullname="Björn Fay">
      <organization></organization>
    </author>
    <author initials="M." surname="Joye" fullname="Marc Joye">
      <organization></organization>
    </author>
    <author initials="M." surname="Lochter" fullname="Manfred Lochter">
      <organization></organization>
    </author>
    <author initials="B." surname="Murray" fullname="Bruce Murray">
      <organization></organization>
    </author>
    <date year="2017"/>
  </front>
</reference>


<reference anchor="RFC5746">
  <front>
    <title>Transport Layer Security (TLS) Renegotiation Indication Extension</title>
    <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
    <author fullname="M. Ray" initials="M." surname="Ray"/>
    <author fullname="S. Dispensa" initials="S." surname="Dispensa"/>
    <author fullname="N. Oskov" initials="N." surname="Oskov"/>
    <date month="February" year="2010"/>
    <abstract>
      <t>Secure Socket Layer (SSL) and Transport Layer Security (TLS) renegotiation are vulnerable to an attack in which the attacker forms a TLS connection with the target server, injects content of his choice, and then splices in a new TLS connection from a client. The server treats the client's initial TLS handshake as a renegotiation and thus believes that the initial data transmitted by the attacker is from the same entity as the subsequent client data. This specification defines a TLS extension to cryptographically tie renegotiations to the TLS connections they are being performed over, thus preventing this attack. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5746"/>
  <seriesInfo name="DOI" value="10.17487/RFC5746"/>
</reference>

<reference anchor="RFC9261">
  <front>
    <title>Exported Authenticators in TLS</title>
    <author fullname="N. Sullivan" initials="N." surname="Sullivan"/>
    <date month="July" year="2022"/>
    <abstract>
      <t>This document describes a mechanism that builds on Transport Layer Security (TLS) or Datagram Transport Layer Security (DTLS) and enables peers to provide proof of ownership of an identity, such as an X.509 certificate. This proof can be exported by one peer, transmitted out of band to the other peer, and verified by the receiving peer.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9261"/>
  <seriesInfo name="DOI" value="10.17487/RFC9261"/>
</reference>


<reference anchor="I-D.ietf-httpbis-secondary-server-certs">
   <front>
      <title>Secondary Certificate Authentication of HTTP Servers</title>
      <author fullname="Eric Gorbaty" initials="E." surname="Gorbaty">
         <organization>Apple</organization>
      </author>
      <author fullname="Mike Bishop" initials="M." surname="Bishop">
         <organization>Akamai</organization>
      </author>
      <date day="12" month="October" year="2024"/>
      <abstract>
	 <t>   This document defines a way for HTTP/2 and HTTP/3 servers to send
   additional certificate-based credentials after a TLS connection is
   established, based on TLS Exported Authenticators.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-httpbis-secondary-server-certs-01"/>
   
</reference>

<reference anchor="RFC5216">
  <front>
    <title>The EAP-TLS Authentication Protocol</title>
    <author fullname="D. Simon" initials="D." surname="Simon"/>
    <author fullname="B. Aboba" initials="B." surname="Aboba"/>
    <author fullname="R. Hurst" initials="R." surname="Hurst"/>
    <date month="March" year="2008"/>
    <abstract>
      <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides support for multiple authentication methods. Transport Layer Security (TLS) provides for mutual authentication, integrity-protected ciphersuite negotiation, and key exchange between two endpoints. This document defines EAP-TLS, which includes support for certificate-based mutual authentication and key derivation.</t>
      <t>This document obsoletes RFC 2716. A summary of the changes between this document and RFC 2716 is available in Appendix A. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5216"/>
  <seriesInfo name="DOI" value="10.17487/RFC5216"/>
</reference>

<reference anchor="RFC9190">
  <front>
    <title>EAP-TLS 1.3: Using the Extensible Authentication Protocol with TLS 1.3</title>
    <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
    <author fullname="M. Sethi" initials="M." surname="Sethi"/>
    <date month="February" year="2022"/>
    <abstract>
      <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides a standard mechanism for support of multiple authentication methods. This document specifies the use of EAP-TLS with TLS 1.3 while remaining backwards compatible with existing implementations of EAP-TLS. TLS 1.3 provides significantly improved security and privacy, and reduced latency when compared to earlier versions of TLS. EAP-TLS with TLS 1.3 (EAP-TLS 1.3) further improves security and privacy by always providing forward secrecy, never disclosing the peer identity, and by mandating use of revocation checking when compared to EAP-TLS with earlier versions of TLS. This document also provides guidance on authentication, authorization, and resumption for EAP-TLS in general (regardless of the underlying TLS version used). This document updates RFC 5216.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9190"/>
  <seriesInfo name="DOI" value="10.17487/RFC9190"/>
</reference>

<reference anchor="RFC4279">
  <front>
    <title>Pre-Shared Key Ciphersuites for Transport Layer Security (TLS)</title>
    <author fullname="P. Eronen" initials="P." role="editor" surname="Eronen"/>
    <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig"/>
    <date month="December" year="2005"/>
    <abstract>
      <t>This document specifies three sets of new ciphersuites for the Transport Layer Security (TLS) protocol to support authentication based on pre-shared keys (PSKs). These pre-shared keys are symmetric keys, shared in advance among the communicating parties. The first set of ciphersuites uses only symmetric key operations for authentication. The second set uses a Diffie-Hellman exchange authenticated with a pre-shared key, and the third set combines public key authentication of the server with pre-shared key authentication of the client. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4279"/>
  <seriesInfo name="DOI" value="10.17487/RFC4279"/>
</reference>


<reference anchor="I-D.ietf-tls-ctls">
   <front>
      <title>Compact TLS 1.3</title>
      <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
         <organization>Windy Hill Systems, LLC</organization>
      </author>
      <author fullname="Richard Barnes" initials="R." surname="Barnes">
         <organization>Cisco</organization>
      </author>
      <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
         </author>
      <author fullname="Benjamin M. Schwartz" initials="B. M." surname="Schwartz">
         <organization>Meta Platforms, Inc.</organization>
      </author>
      <date day="17" month="April" year="2024"/>
      <abstract>
	 <t>   This document specifies a &quot;compact&quot; version of TLS 1.3 and DTLS 1.3.
   It saves bandwidth by trimming obsolete material, tighter encoding, a
   template-based specialization technique, and alternative
   cryptographic techniques. cTLS is not directly interoperable with TLS
   1.3 or DTLS 1.3 since the over-the-wire framing is different.  A
   single server can, however, offer cTLS alongside TLS or DTLS.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-tls-ctls-10"/>
   
</reference>

<reference anchor="RFC9150">
  <front>
    <title>TLS 1.3 Authentication and Integrity-Only Cipher Suites</title>
    <author fullname="N. Cam-Winget" initials="N." surname="Cam-Winget"/>
    <author fullname="J. Visoky" initials="J." surname="Visoky"/>
    <date month="April" year="2022"/>
    <abstract>
      <t>This document defines the use of cipher suites for TLS 1.3 based on Hashed Message Authentication Code (HMAC). Using these cipher suites provides server and, optionally, mutual authentication and data authenticity, but not data confidentiality. Cipher suites with these properties are not of general applicability, but there are use cases, specifically in Internet of Things (IoT) and constrained environments, that do not require confidentiality of exchanged messages while still requiring integrity protection, server authentication, and optional client authentication. This document gives examples of such use cases, with the caveat that prior to using these integrity-only cipher suites, a threat model for the situation at hand is needed, and a threat analysis must be performed within that model to determine whether the use of integrity-only cipher suites is appropriate. The approach described in this document is not endorsed by the IETF and does not have IETF consensus, but it is presented here to enable interoperable implementation of a reduced-security mechanism that provides authentication and message integrity without supporting confidentiality.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9150"/>
  <seriesInfo name="DOI" value="10.17487/RFC9150"/>
</reference>


<reference anchor="I-D.ietf-tls-esni">
   <front>
      <title>TLS Encrypted Client Hello</title>
      <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
         <organization>Independent</organization>
      </author>
      <author fullname="Kazuho Oku" initials="K." surname="Oku">
         <organization>Fastly</organization>
      </author>
      <author fullname="Nick Sullivan" initials="N." surname="Sullivan">
         <organization>Cryptography Consulting LLC</organization>
      </author>
      <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
         <organization>Cloudflare</organization>
      </author>
      <date day="15" month="September" year="2024"/>
      <abstract>
	 <t>   This document describes a mechanism in Transport Layer Security (TLS)
   for encrypting a ClientHello message under a server public key.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/tlswg/draft-ietf-tls-esni
   (https://github.com/tlswg/draft-ietf-tls-esni).

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-tls-esni-22"/>
   
</reference>


<reference anchor="I-D.irtf-cfrg-hpke">
   <front>
      <title>Hybrid Public Key Encryption</title>
      <author fullname="Richard Barnes" initials="R." surname="Barnes">
         <organization>Cisco</organization>
      </author>
      <author fullname="Karthikeyan Bhargavan" initials="K." surname="Bhargavan">
         <organization>Inria</organization>
      </author>
      <author fullname="Benjamin Lipp" initials="B." surname="Lipp">
         <organization>Inria</organization>
      </author>
      <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
         <organization>Cloudflare</organization>
      </author>
      <date day="2" month="September" year="2021"/>
      <abstract>
	 <t>This document describes a scheme for hybrid public key encryption (HPKE). This scheme provides a variant of public key encryption of arbitrary-sized plaintexts for a recipient public key. It also includes three authenticated variants, including one that authenticates possession of a pre-shared key and two optional ones that authenticate possession of a key encapsulation mechanism (KEM) private key. HPKE works for any combination of an asymmetric KEM, key derivation function (KDF), and authenticated encryption with additional data (AEAD) encryption function. Some authenticated variants may not be supported by all KEMs. We provide instantiations of the scheme using widely used and efficient primitives, such as Elliptic Curve Diffie-Hellman (ECDH) key agreement, HMAC-based key derivation function (HKDF), and SHA2.

 This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF.
	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-irtf-cfrg-hpke-12"/>
   
</reference>

<reference anchor="RFC8484">
  <front>
    <title>DNS Queries over HTTPS (DoH)</title>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <author fullname="P. McManus" initials="P." surname="McManus"/>
    <date month="October" year="2018"/>
    <abstract>
      <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS. Each DNS query-response pair is mapped into an HTTP exchange.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8484"/>
  <seriesInfo name="DOI" value="10.17487/RFC8484"/>
</reference>

<reference anchor="RFC7858">
  <front>
    <title>Specification for DNS over Transport Layer Security (TLS)</title>
    <author fullname="Z. Hu" initials="Z." surname="Hu"/>
    <author fullname="L. Zhu" initials="L." surname="Zhu"/>
    <author fullname="J. Heidemann" initials="J." surname="Heidemann"/>
    <author fullname="A. Mankin" initials="A." surname="Mankin"/>
    <author fullname="D. Wessels" initials="D." surname="Wessels"/>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <date month="May" year="2016"/>
    <abstract>
      <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS. Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626. In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
      <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group. It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7858"/>
  <seriesInfo name="DOI" value="10.17487/RFC7858"/>
</reference>

<reference anchor="RFC8094">
  <front>
    <title>DNS over Datagram Transport Layer Security (DTLS)</title>
    <author fullname="T. Reddy" initials="T." surname="Reddy"/>
    <author fullname="D. Wing" initials="D." surname="Wing"/>
    <author fullname="P. Patil" initials="P." surname="Patil"/>
    <date month="February" year="2017"/>
    <abstract>
      <t>DNS queries and responses are visible to network elements on the path between the DNS client and its server. These queries and responses can contain privacy-sensitive information, which is valuable to protect.</t>
      <t>This document proposes the use of Datagram Transport Layer Security (DTLS) for DNS, to protect against passive listeners and certain active attacks. As latency is critical for DNS, this proposal also discusses mechanisms to reduce DTLS round trips and reduce the DTLS handshake size. The proposed mechanism runs over port 853.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8094"/>
  <seriesInfo name="DOI" value="10.17487/RFC8094"/>
</reference>

<reference anchor="RFC8995">
  <front>
    <title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
    <author fullname="M. Pritikin" initials="M." surname="Pritikin"/>
    <author fullname="M. Richardson" initials="M." surname="Richardson"/>
    <author fullname="T. Eckert" initials="T." surname="Eckert"/>
    <author fullname="M. Behringer" initials="M." surname="Behringer"/>
    <author fullname="K. Watsen" initials="K." surname="Watsen"/>
    <date month="May" year="2021"/>
    <abstract>
      <t>This document specifies automated bootstrapping of an Autonomic Control Plane. To do this, a Secure Key Infrastructure is bootstrapped. This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline. We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device. The established secure connection can be used to deploy a locally issued certificate to the device as well.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8995"/>
  <seriesInfo name="DOI" value="10.17487/RFC8995"/>
</reference>

<reference anchor="RFC7030">
  <front>
    <title>Enrollment over Secure Transport</title>
    <author fullname="M. Pritikin" initials="M." role="editor" surname="Pritikin"/>
    <author fullname="P. Yee" initials="P." role="editor" surname="Yee"/>
    <author fullname="D. Harkins" initials="D." role="editor" surname="Harkins"/>
    <date month="October" year="2013"/>
    <abstract>
      <t>This document profiles certificate enrollment for clients using Certificate Management over CMS (CMC) messages over a secure transport. This profile, called Enrollment over Secure Transport (EST), describes a simple, yet functional, certificate management protocol targeting Public Key Infrastructure (PKI) clients that need to acquire client certificates and associated Certification Authority (CA) certificates. It also supports client-generated public/private key pairs as well as key pairs generated by the CA.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7030"/>
  <seriesInfo name="DOI" value="10.17487/RFC7030"/>
</reference>

<reference anchor="RFC9483">
  <front>
    <title>Lightweight Certificate Management Protocol (CMP) Profile</title>
    <author fullname="H. Brockhaus" initials="H." surname="Brockhaus"/>
    <author fullname="D. von Oheimb" initials="D." surname="von Oheimb"/>
    <author fullname="S. Fries" initials="S." surname="Fries"/>
    <date month="November" year="2023"/>
    <abstract>
      <t>This document aims at simple, interoperable, and automated PKI management operations covering typical use cases of industrial and Internet of Things (IoT) scenarios. This is achieved by profiling the Certificate Management Protocol (CMP), the related Certificate Request Message Format (CRMF), and transfer based on HTTP or Constrained Application Protocol (CoAP) in a succinct but sufficiently detailed and self-contained way. To make secure certificate management for simple scenarios and constrained devices as lightweight as possible, only the most crucial types of operations and options are specified as mandatory. More specialized or complex use cases are supported with optional features.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9483"/>
  <seriesInfo name="DOI" value="10.17487/RFC9483"/>
</reference>

<reference anchor="RFC9019">
  <front>
    <title>A Firmware Update Architecture for Internet of Things</title>
    <author fullname="B. Moran" initials="B." surname="Moran"/>
    <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
    <author fullname="D. Brown" initials="D." surname="Brown"/>
    <author fullname="M. Meriac" initials="M." surname="Meriac"/>
    <date month="April" year="2021"/>
    <abstract>
      <t>Vulnerabilities in Internet of Things (IoT) devices have raised the need for a reliable and secure firmware update mechanism suitable for devices with resource constraints. Incorporating such an update mechanism is a fundamental requirement for fixing vulnerabilities, but it also enables other important capabilities such as updating configuration settings and adding new functionality.</t>
      <t>In addition to the definition of terminology and an architecture, this document provides the motivation for the standardization of a manifest format as a transport-agnostic means for describing and protecting firmware updates.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9019"/>
  <seriesInfo name="DOI" value="10.17487/RFC9019"/>
</reference>


<reference anchor="I-D.irtf-t2trg-taxonomy-manufacturer-anchors">
   <front>
      <title>A Taxonomy of operational security considerations for manufacturer installed keys and Trust Anchors</title>
      <author fullname="Michael Richardson" initials="M." surname="Richardson">
         <organization>Sandelman Software Works</organization>
      </author>
      <date day="26" month="August" year="2024"/>
      <abstract>
	 <t>   This document provides a taxonomy of methods used by manufacturers of
   silicon and devices to secure private keys and public trust anchors.
   This deals with two related activities: how trust anchors and private
   keys are installed into devices during manufacturing, and how the
   related manufacturer held private keys are secured against
   disclosure.

   This document does not evaluate the different mechanisms, but rather
   just serves to name them in a consistent manner in order to aid in
   communication.

   RFCEDITOR: please remove this paragraph.  This work is occurring in
   https://github.com/mcr/idevid-security-considerations

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-irtf-t2trg-taxonomy-manufacturer-anchors-04"/>
   
</reference>

<reference anchor="RFC7924">
  <front>
    <title>Transport Layer Security (TLS) Cached Information Extension</title>
    <author fullname="S. Santesson" initials="S." surname="Santesson"/>
    <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
    <date month="July" year="2016"/>
    <abstract>
      <t>Transport Layer Security (TLS) handshakes often include fairly static information, such as the server certificate and a list of trusted certification authorities (CAs). This information can be of considerable size, particularly if the server certificate is bundled with a complete certificate chain (i.e., the certificates of intermediate CAs up to the root CA).</t>
      <t>This document defines an extension that allows a TLS client to inform a server of cached information, thereby enabling the server to omit already available information.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7924"/>
  <seriesInfo name="DOI" value="10.17487/RFC7924"/>
</reference>

<reference anchor="RFC6066">
  <front>
    <title>Transport Layer Security (TLS) Extensions: Extension Definitions</title>
    <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
    <date month="January" year="2011"/>
    <abstract>
      <t>This document provides specifications for existing TLS extensions. It is a companion document for RFC 5246, "The Transport Layer Security (TLS) Protocol Version 1.2". The extensions specified are server_name, max_fragment_length, client_certificate_url, trusted_ca_keys, truncated_hmac, and status_request. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6066"/>
  <seriesInfo name="DOI" value="10.17487/RFC6066"/>
</reference>


<reference anchor="I-D.ietf-dance-tls-clientid">
   <front>
      <title>TLS Extension for DANE Client Identity</title>
      <author fullname="Shumon Huque" initials="S." surname="Huque">
         <organization>Salesforce</organization>
      </author>
      <author fullname="Viktor Dukhovni" initials="V." surname="Dukhovni">
         <organization>Two Sigma</organization>
      </author>
      <date day="8" month="January" year="2024"/>
      <abstract>
	 <t>   This document specifies a TLS and DTLS extension to convey a DNS-
   Based Authentication of Named Entities (DANE) Client Identity to a
   TLS or DTLS server.  This is useful for applications that perform TLS
   client authentication via DANE TLSA records.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-dance-tls-clientid-03"/>
   
</reference>

<reference anchor="RFC6698">
  <front>
    <title>The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA</title>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <author fullname="J. Schlyter" initials="J." surname="Schlyter"/>
    <date month="August" year="2012"/>
    <abstract>
      <t>Encrypted communication on the Internet often uses Transport Layer Security (TLS), which depends on third parties to certify the keys used. This document improves on that situation by enabling the administrators of domain names to specify the keys used in that domain's TLS servers. This requires matching improvements in TLS client software, but no change in TLS server software. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6698"/>
  <seriesInfo name="DOI" value="10.17487/RFC6698"/>
</reference>

<reference anchor="RFC8879">
  <front>
    <title>TLS Certificate Compression</title>
    <author fullname="A. Ghedini" initials="A." surname="Ghedini"/>
    <author fullname="V. Vasiliev" initials="V." surname="Vasiliev"/>
    <date month="December" year="2020"/>
    <abstract>
      <t>In TLS handshakes, certificate chains often take up the majority of the bytes transmitted.</t>
      <t>This document describes how certificate chains can be compressed to reduce the amount of data transmitted and avoid some round trips.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8879"/>
  <seriesInfo name="DOI" value="10.17487/RFC8879"/>
</reference>

<reference anchor="RFC7250">
  <front>
    <title>Using Raw Public Keys in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
    <author fullname="P. Wouters" initials="P." role="editor" surname="Wouters"/>
    <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig"/>
    <author fullname="J. Gilmore" initials="J." surname="Gilmore"/>
    <author fullname="S. Weiler" initials="S." surname="Weiler"/>
    <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
    <date month="June" year="2014"/>
    <abstract>
      <t>This document specifies a new certificate type and two TLS extensions for exchanging raw public keys in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS). The new certificate type allows raw public keys to be used for authentication.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7250"/>
  <seriesInfo name="DOI" value="10.17487/RFC7250"/>
</reference>


<reference anchor="I-D.ietf-cose-cbor-encoded-cert">
   <front>
      <title>CBOR Encoded X.509 Certificates (C509 Certificates)</title>
      <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
         <organization>Ericsson AB</organization>
      </author>
      <author fullname="Göran Selander" initials="G." surname="Selander">
         <organization>Ericsson AB</organization>
      </author>
      <author fullname="Shahid Raza" initials="S." surname="Raza">
         <organization>RISE AB</organization>
      </author>
      <author fullname="Joel Höglund" initials="J." surname="Höglund">
         <organization>RISE AB</organization>
      </author>
      <author fullname="Martin Furuhed" initials="M." surname="Furuhed">
         <organization>Nexus Group</organization>
      </author>
      <date day="8" month="July" year="2024"/>
      <abstract>
	 <t>   This document specifies a CBOR encoding of X.509 certificates.  The
   resulting certificates are called C509 Certificates.  The CBOR
   encoding supports a large subset of RFC 5280 and all certificates
   compatible with the RFC 7925, IEEE 802.1AR (DevID), CNSA, RPKI, GSMA
   eUICC, and CA/Browser Forum Baseline Requirements profiles.  When
   used to re-encode DER encoded X.509 certificates, the CBOR encoding
   can in many cases reduce the size of RFC 7925 profiled certificates
   with over 50% while also significantly reducing memory and code size
   compared to ASN.1.  The CBOR encoded structure can alternatively be
   signed directly (&quot;natively signed&quot;), which does not require re-
   encoding for the signature to be verified.  The document also
   specifies C509 Certificate Signing Requests, C509 COSE headers, a
   C509 TLS certificate type, and a C509 file format.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-cose-cbor-encoded-cert-11"/>
   
</reference>


<reference anchor="I-D.irtf-cfrg-aead-limits">
   <front>
      <title>Usage Limits on AEAD Algorithms</title>
      <author fullname="Felix Günther" initials="F." surname="Günther">
         <organization>IBM Research Europe - Zurich</organization>
      </author>
      <author fullname="Martin Thomson" initials="M." surname="Thomson">
         <organization>Mozilla</organization>
      </author>
      <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
         <organization>Cloudflare</organization>
      </author>
      <date day="9" month="October" year="2024"/>
      <abstract>
	 <t>   An Authenticated Encryption with Associated Data (AEAD) algorithm
   provides confidentiality and integrity.  Excessive use of the same
   key can give an attacker advantages in breaking these properties.
   This document provides simple guidance for users of common AEAD
   functions about how to limit the use of keys in order to bound the
   advantage given to an attacker.  It considers limits in both single-
   and multi-key settings.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-irtf-cfrg-aead-limits-09"/>
   
</reference>

<reference anchor="RFC6979">
  <front>
    <title>Deterministic Usage of the Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA)</title>
    <author fullname="T. Pornin" initials="T." surname="Pornin"/>
    <date month="August" year="2013"/>
    <abstract>
      <t>This document defines a deterministic digital signature generation procedure. Such signatures are compatible with standard Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA) digital signatures and can be processed with unmodified verifiers, which need not be aware of the procedure described therein. Deterministic signatures retain the cryptographic security features associated with digital signatures but can be more easily implemented in various environments, since they do not need access to a source of high-quality randomness.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6979"/>
  <seriesInfo name="DOI" value="10.17487/RFC6979"/>
</reference>

<reference anchor="RFC8032">
  <front>
    <title>Edwards-Curve Digital Signature Algorithm (EdDSA)</title>
    <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
    <author fullname="I. Liusvaara" initials="I." surname="Liusvaara"/>
    <date month="January" year="2017"/>
    <abstract>
      <t>This document describes elliptic curve signature scheme Edwards-curve Digital Signature Algorithm (EdDSA). The algorithm is instantiated with recommended parameters for the edwards25519 and edwards448 curves. An example implementation and test vectors are provided.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8032"/>
  <seriesInfo name="DOI" value="10.17487/RFC8032"/>
</reference>


<reference anchor="I-D.irtf-cfrg-det-sigs-with-noise">
   <front>
      <title>Hedged ECDSA and EdDSA Signatures</title>
      <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
         <organization>Ericsson</organization>
      </author>
      <author fullname="Erik Thormarker" initials="E." surname="Thormarker">
         <organization>Ericsson</organization>
      </author>
      <author fullname="Sini Ruohomaa" initials="S." surname="Ruohomaa">
         <organization>Ericsson</organization>
      </author>
      <date day="16" month="March" year="2024"/>
      <abstract>
	 <t>   Deterministic elliptic-curve signatures such as deterministic ECDSA
   and EdDSA have gained popularity over randomized ECDSA as their
   security does not depend on a source of high-quality randomness.
   Recent research, however, has found that implementations of these
   signature algorithms may be vulnerable to certain side-channel and
   fault injection attacks due to their deterministic nature.  One
   countermeasure to such attacks is hedged signatures where the
   calculation of the per-message secret number includes both fresh
   randomness and the message.  This document updates RFC 6979 and RFC
   8032 to recommend hedged constructions in deployments where side-
   channel attacks and fault injection attacks are a concern.  The
   updates are invisible to the validator of the signature and
   compatible with existing ECDSA and EdDSA validators.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-irtf-cfrg-det-sigs-with-noise-03"/>
   
</reference>




    </references>


<?line 829?>

<section numbered="false" anchor="acknowledgments"><name>Acknowledgments</name>

<t>We would like to thank
Ben Kaduk,
Hendrik Brockhaus,
and
John Mattsson.</t>

</section>

    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
        <name>Contributors</name>
    <contact initials="J." surname="Sosinowicz" fullname="Juliusz Sosinowicz">
      <organization></organization>
      <address>
      </address>
    </contact>
    <contact initials="A." surname="Kraus" fullname="Achim Kraus">
      <organization></organization>
      <address>
      </address>
    </contact>
    </section>

  </back>

<!-- ##markdown-source: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-->

</rfc>

