<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version  -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc docmapping="yes"?>

<rfc ipr="trust200902" docName="draft-kampanakis-tls-scas-latest-02" category="exp">

  <front>
    <title abbrev="Suppress CAs">Suppressing CA Certificates in TLS 1.3</title>

    <author initials="M." surname="Thomson" fullname="Martin Thomson">
      <organization>Mozilla</organization>
      <address>
        <email>mt@lowentropy.net</email>
      </address>
    </author>
    <author initials="P." surname="Kampanakis" fullname="Panos Kampanakis">
      <organization>AWS</organization>
      <address>
        <email>kpanos@amazon.com</email>
      </address>
    </author>
    <author initials="C." surname="Bytheway" fullname="Cameron Bytheway">
      <organization>AWS</organization>
      <address>
        <email>bythewc@amazon.com</email>
      </address>
    </author>
    <author initials="B.E." surname="Westerbaan" fullname="Bas Westerbaan">
      <organization>Cloudflare</organization>
      <address>
        <email>bas@cloudflare.com</email>
      </address>
    </author>

    <date year="2022" month="July" day="08"/>

    <area>Transport</area>
    <workgroup>TLS</workgroup>
    

    <abstract>


<t>A TLS client or server that has access to the complete set of published
intermediate certificates can inform its peer to avoid sending
certificate authority certificates, thus reducing the size of
the TLS handshake.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>The most data heavy part of a TLS handshake is authentication. It usually
consists of a signature, an end-entity certificate and Certificate Authority
(CA) certificates used to authenticate the end-entity to a trusted root CA.
These chains can sometime add to a few kB of data which could be problematic
for some use cases. <xref target="EAPTLSCERT"/> and
<xref target="EAP-TLS13"/> discuss the issues big certificate
chains in EAP authentication. Additionally, it is known that IEEE 802.15.4
<xref target="IEEE802154"/> mesh networks and Wi-SUN <xref target="WISUN"/> Field Area Networks
often notice significant delays due to EAP-TLS authentication in
constrained bandwidth mediums.</t>

<t>To alleviate the data exchanged in TLS
<xref target="RFC8879"/> shrinks certificates by compressing them.
<xref target="CBOR-CERTS"/> uses different
certificate encodings for constrained environments. On the other hand,
<xref target="CTLS"/> proposes the use of certificate dictionaries
to omit sending CA certificates in a Compact TLS handshake.</t>

<t>In a post-quantum context
<xref target="I-D.hoffman-c2pq"/><xref target="NIST_PQ"/><xref target="I-D.ietf-tls-hybrid-design"/>, the TLS
authentication data issue is exacerbated. <xref target="CONEXT-PQTLS13SSH"/><xref target="NDSS-PQTLS13"/>
show that post-quantum certificate chains exceeding the initial TCP
congestion window (10MSS <xref target="RFC6928"/>) will slow down the handshake due
to the extra round-trips they introduce. <xref target="PQTLS"/> shows that big certificate
chains (even smaller than the initial TCP congestion window) will
slow down the handshake in lossy environments. <xref target="TLS-SUPPRESS"/>
quantifies the post-quantum authentication data in QUIC and TLS
and shows that even the leanest post-quantum signature algorithms
will impact QUIC and TLS. <xref target="CL-BLOG"/> also shows that 9-10 kilobyte
certificate chains (even with 30MSS initial TCP congestion window)
will lead to double digit TLS handshake slowdowns. What’s more, it
shows that some clients or middleboxes cannot handle chains larger
than 10kB.</t>

<t>Mechanisms like
<xref target="RFC8879"/><xref target="CBOR-CERTS"/>
would not alleviate the issue with post-quantum certificates
as the bulk of the certificate size is in the post-quantum
public key or signature which is incompressible.</t>

<t>Thus, this document introduces a backwards-compatible mechanism
to shrink the certificate data exchanged in TLS 1.3. In some uses
of public key infrastructure (PKI), intermediate CA certificates
sign end-entity certificates.  In the web PKI, clients require
that certificate authorities disclose all intermediate certificates
that they create. Although the set of intermediate certificates
is large, the size is bounded. Additionally, in some use cases the
set of communicating peers is limited.</t>

<t>For a client or server that has the necessary intermediates,
receiving them during the TLS handshake, increases the data
transmission unnecessarily. This
document defines a signal that a client or server can send to
inform its peer that it already has the intermediate CA
certificates. A peer that receives this signal can
limit the certificate chain it sends to just the
end-entity certificate, saving on handshake size.</t>

<t>This mechanism is intended to be complementary with
certificate compression <xref target="RFC8879"/> in that it
further reduces the size of the handshake especially
for post-quantum certificates.</t>

<t>It is worth noting that <xref target="RFC7924"/> attempted to address the
issue by omitting all certificates in the handshake if the client
or server had cached the peer certificate. This standard has not
seen wide adoption and could allow for TLS session correlation.
Additionally, the short lifetime certificates used today and the
large size of peers in some use cases make the peer certificate
cache update and maintenance mechanism challenging — not the
least because of privacy concerns.  The
mechanism proposed in this document is not susceptible to
these challenges.</t>

</section>
<section anchor="terms-and-definitions" title="Terms and Definitions">

<t>The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL
NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”,
“MAY”, and “OPTIONAL” in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when,
and only when, they appear in all capitals, as shown here.</t>

</section>
<section anchor="suppress-ca-certificates-flag" title="Suppress CA Certificates Flag">

<t>The goal is when a client or server has the intermediate CAs
to build the certificate chain for the peer it is establishing
a TLS connection with, to signal to the peer to not send
these certificates. TLS <xref target="RFC5246"/>
<xref target="RFC8446"/> allows for the root CA certificate to be
omitted from the handshake under the assumption that
the remote peer already possesses it in order to validate
its peers. Thus, a client or server in possession of
the CA certificates would only need the peer end-entity
certificate to validate its identity which would alleviate
the data flowing in TLS.</t>

<t>This draft assumes that the endpoint can keep as set of ICAs
in memory to use them while building certificate chains to
authenticate a peer. Most usually the set will be stored locally
in non-volatile memory. In constrained devices the intermediates
could be cached, kept and updated only in volatile memory
especially when the communicating peers’ PKI domains are
limited.</t>

<t>How CA certificates are identified and stored is dependent on
the use case. In some use cases (e.g. WebPKI <xref target="ICA-PRELOAD"/>) the
peer may assume that all intermediates are assembled, distributed
and updated regularly using an out-of-band mechanism. In other
use cases when the communicating peers’ PKI domains are
limited and not all CA certificates can be stored (i.e.,
constrained devices), or distributed, intermediates could be
cached and updated dynamically using a caching mechanism. 
Such mechanisms are discussed in <xref target="TLS-SUPPRESS"/>.</t>

<t>Although this document uses mechanisms to minimize TLS
authentication failures due to stale or incomplete ICA lists,
an endpoint is expected to re-attempt a TLS connection if it
failed to authenticate a peer certificate after requesting ICA
suppression. [EDNOTE: draft-ietf-tls-esni already requires
the client to retry a connection when ECH is “securely replaced
by the server” or “securely disabled by the server”. ]</t>

<t>[EDNOTE: To prevent failuers, one additional option
could be to use a TLS extension like the one defined
in <xref target="RFC7924"/> to include the chain fingerprint so the
peer can confirm that he does not need to send the chain because
the peer asking for suppression has the correct chain to validate the
server. That could prevent inadvertent mistakes where the client thinks
it has the intermediates to validate the server, but what it has is wrong.
The shortcoming is that could be used as a cookie.
Alternatively we could HMAC the chain to make it indistinguisable.
Another option is for the server to provide a ticket so client returning
visits tell the server that the client has the ICAs and it does not
need to send them. These options require further evaluation only if
we think that the complexity is worth the benefit.]</t>

<t>The 0xTBD1 flag used to signal CA suppression can only be sent
in a ClientHello or CertificateRequest message as defined below.
Endpoints that receive a 0xTBD1 flag with a value of 1 in any other
handshake message MUST generate a fatal illegal_parameter alert.</t>

<section anchor="client" title="Client">

<t>A client that believes that it has a current, complete set of intermediate
certificates to authenticate the server sends the tls_flags extension
<xref target="TLS-FLAGS"/> with the 0xTBD1 flag set to 1 in
its ClientHello message.</t>

<t>To prevent a failed TLS connection, a client MAY choose not to send the
flag if its list of ICAs hasn’t been updated in TBD3 time or has any other
reason to believe it does not include the ICAs for its peer.</t>

<t>A server that receives a value of 1 in the 0xTBD1 flag of a ClientHello
message SHOULD omit all certificates other than the end-entity certificate
from its Certificate message that it sends in response. Otherwise if it
does not support CA certificate suppression, the server SHOULD ignore the
0xTBD1 flag.</t>

<t>To prevent a failed TLS connection, a server could choose to send its
intermediates regardless of the flag from the client, if it has a reason
to believe the issuing CAs do not exist in the client ICA list. For
example, if the server’s certificate chain contains ICAs with
technical constraints which are not disclosed, the server SHOULD send
the chain back to the client regardless of the suppression flag in the
ClientHello.</t>

<t>If the connection still fails because the client cannot build the
certificate chain to authenticate the server, the client MUST NOT
send the flag in a subsequent connection to the server.</t>

</section>
<section anchor="server-mutual-tls-authentication" title="Server (mutual TLS authentication)">

<t>In a mutual TLS authentication scenario, a server that believes that it
has a current, complete set of intermediate certificates to authenticate
the client, sends the tls_flags extension <xref target="TLS-FLAGS"/>
with the 0xTBD1 flag set to 1 in its CertificateRequest message.</t>

<t>To prevent a failed TLS connection, a server MAY choose not to send the
flag if its list of ICAs hasn’t been updated in TBD3 time or has any other
reason to believe it does not include the ICAs for its peer.</t>

<t>A client that receives a value of 1 in the 0xTBD1 flag in a CertificateRequest
message SHOULD omit all certificates other than the end-entity certificate
from the Certificate message that it sends in response. Otherwise if it
does not support CA certificate suppression, the client SHOULD ignore the
0xTBD flag.</t>

<t>To prevent a failed TLS connection, a client could choose to send its
intermediates regardless of the flag from the server, if it has a reason
to believe the issuing CAs do not exist in the server ICA list. For
example, if the client’s certificate chain contains ICAs with technical
constraints which are not disclosed, the client SHOULD send the chain
back to the server regardless of the CA suppression flag in the
CertificateRequest. [EDNOTE: MSRP 2.8 may require constrained
intermediates which would mean this could change for WebPKI.]</t>

<t>If the connection still fails because the server cannot build the
certificate chain to authenticate the client, the server MUST NOT
send the flag in a subsequent connection from the client.
[EDNOTE: There is a challenge with this in that the server needs to keep
track of failed client connections.]</t>

</section>
</section>
<section anchor="security-considerations" title="Security Considerations">

<t>This document creates an unencrypted signal in the ClientHello that
might be used to identify which clients believe that they have
intermediates to build the certificate chain for their peer.
Although it does not reveal any additional information about the
peers, it might allow clients to be more effectively fingerprinted
by peers or any passive observers in the network path. A
mitigation against this concern is to encrypt the ClientHello in
TLS 1.3 <xref target="ESNI"/> which would hide the CA certificate
suppression signal.</t>

<t>Even when the 0xTBD1 flag is encrypted in the handshake,
a passive observer could fingerprint the peers by analyzing the TLS
handshake data sizes flowing each direction. Widespread adoption of
the TLS CA suppression mechanism described in this document will deem
the use of the signal for fingerprinting impractical.
<!-- [EDNOTE: Commenting this out as the probabilistic TLS suppression for the same source-destination would reveal trying to hide TLS suppression. Maybe we can rethink it later] 
To alleviate this
concern the client or server could randomly choose to not request
suppression although it has the CA certificates to validate the peer.
That would prevent a passive attacker concluding if the CA certificate
suppression signal is supported by the client or server. The
probability distribution for chosing to request suppression or not
is a trade-off decision between the risk of fingerprinting and TLS
performance. --></t>

</section>
<section anchor="iana-considerations" title="IANA Considerations">

<t>This document registers the 0xTBD1 in the registry created by
<xref target="TLS-FLAGS"/>.</t>

</section>
<section anchor="acknowledgements" title="Acknowledgements">

<t>We would like to thank Ilari Liusvaara, Ryan Sleevi
Filippo Valsorda and for their valuable feedback contributions
to this document.</t>

<t>The authors would also like to thank Filippo Valsorda for his feedback
regarding ICA lists <xref target="FILOSOTTILE"/>.</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>





<reference  anchor="RFC2119" target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author initials='S.' surname='Bradner' fullname='S. Bradner'><organization /></author>
<date year='1997' month='March' />
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference  anchor="RFC8174" target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author initials='B.' surname='Leiba' fullname='B. Leiba'><organization /></author>
<date year='2017' month='May' />
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>


<reference anchor="TLS-FLAGS">
   <front>
      <title>A Flags Extension for TLS 1.3</title>
      <author fullname="Yoav Nir">
	 <organization>Dell Technologies</organization>
      </author>
      <date month="March" day="7" year="2022" />
      <abstract>
	 <t>   A number of extensions are proposed in the TLS working group that
   carry no interesting information except the 1-bit indication that a
   certain optional feature is supported.  Such extensions take 4 octets
   each.  This document defines a flags extension that can provide such
   indications at an average marginal cost of 1 bit each.  More
   precisely, it provides as many flag extensions as needed at 4 + the
   order of the last set bit divided by 8.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-tls-tlsflags-09" />
   <format type="TXT" target="https://www.ietf.org/archive/id/draft-ietf-tls-tlsflags-09.txt" />
</reference>




    </references>

    <references title='Informative References'>

<reference anchor="IEEE802154" >
  <front>
    <title>IEEE Standard for Low-Rate Wireless Networks</title>
    <author >
      <organization></organization>
    </author>
    <date year="2020" month="July"/>
  </front>
  <seriesInfo name="DOI" value="10.1109/IEEESTD.2020.9144691"/>
</reference>
<reference anchor="WISUN" target="https://wi-sun.org/">
  <front>
    <title>WI-SUN Alliance</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="CL-BLOG" target="https://blog.cloudflare.com/sizing-up-post-quantum-signatures/">
  <front>
    <title>Sizing Up Post-Quantum Signatures</title>
    <author initials="B.E." surname="Westerbaan" fullname="Bas Westerbaan">
      <organization></organization>
    </author>
    <date year="2021" month="November"/>
  </front>
</reference>
<reference anchor="CONEXT-PQTLS13SSH" >
  <front>
    <title>Assessing the Overhead of Post-Quantum Cryptography in TLS 1.3 and SSH</title>
    <author initials="D." surname="Sikeridis" fullname="Dimitrios Sikeridis">
      <organization></organization>
    </author>
    <author initials="P." surname="Kampanakis" fullname="Panos Kampanakis">
      <organization></organization>
    </author>
    <author initials="M." surname="Devetsikiotis" fullname="Michael Devetsikiotis">
      <organization></organization>
    </author>
    <date year="2020" month="November"/>
  </front>
  <seriesInfo name="DOI" value="10.1145/3386367.3431305"/>
  <seriesInfo name="ISBN" value="9781450379489"/>
</reference>
<reference anchor="NDSS-PQTLS13" >
  <front>
    <title>Post-Quantum Authentication in TLS 1.3: A Performance Study</title>
    <author initials="D." surname="Sikeridis" fullname="Dimitrios Sikeridis">
      <organization></organization>
    </author>
    <author initials="P." surname="Kampanakis" fullname="Panos Kampanakis">
      <organization></organization>
    </author>
    <author initials="M." surname="Devetsikiotis" fullname="Michael Devetsikiotis">
      <organization></organization>
    </author>
    <date year="2020" month="February"/>
  </front>
  <seriesInfo name="DOI" value="10.14722/ndss.2020.24203"/>
</reference>
<reference anchor="PQTLS" target="https://ia.cr/2019/1447">
  <front>
    <title>Benchmarking Post-Quantum Cryptography in TLS</title>
    <author initials="C." surname="Paquin" fullname="Christian Paquin">
      <organization></organization>
    </author>
    <author initials="D." surname="Stebila" fullname="Douglas Stebila">
      <organization></organization>
    </author>
    <author initials="G." surname="Tamvada" fullname="Goutam Tamvada">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
</reference>
<reference anchor="TLS-SUPPRESS" target="https://www.amazon.science/publications/speeding-up-post-quantum-tls-handshakes-by-suppressing-intermediate-ca-certificates">
  <front>
    <title>Speeding up post-quantum TLS handshakes by suppressing intermediate CA certificates</title>
    <author initials="P." surname="Kampanakis" fullname="Panos Kampanakis">
      <organization></organization>
    </author>
    <author initials="M." surname="Kallitsis" fullname="Michael Kallitsis">
      <organization></organization>
    </author>
    <date year="2021"/>
  </front>
</reference>
<reference anchor="ICA-PRELOAD" target="https://blog.mozilla.org/security/2020/11/13/preloading-intermediate-ca-certificates-into-firefox/">
  <front>
    <title>Preloading Intermediate CA Certificates into Firefox</title>
    <author initials="D." surname="Keeler" fullname="Dana Keeler">
      <organization></organization>
    </author>
    <date year="2020" month="November"/>
  </front>
</reference>
<reference anchor="NIST_PQ" target="https://csrc.nist.gov/projects/post-quantum-cryptography">
  <front>
    <title>Post-Quantum Cryptography</title>
    <author initials="." surname="NIST" fullname="National Institute of Standards and Technology">
      <organization></organization>
    </author>
    <date year="2021"/>
  </front>
</reference>
<reference anchor="FILOSOTTILE" target="https://github.com/FiloSottile/intermediates">
  <front>
    <title>filippo.io/intermediates</title>
    <author initials="F." surname="Valsorda" fullname="Filippo Valsorda">
      <organization></organization>
    </author>
    <date year="2022"/>
  </front>
</reference>



<reference anchor="EAPTLSCERT">
   <front>
      <title>Handling Large Certificates and Long Certificate Chains in TLS-Based EAP Methods</title>
      <author fullname="Mohit Sethi">
	 <organization>Ericsson</organization>
      </author>
      <author fullname="John Mattsson">
	 <organization>Ericsson</organization>
      </author>
      <author fullname="Sean Turner">
	 <organization>sn3rd</organization>
      </author>
      <date month="November" day="20" year="2020" />
      <abstract>
	 <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides a standard mechanism for support of multiple authentication methods.  EAP-TLS and other TLS-based EAP methods are widely deployed and used for network access authentication.  Large certificates and long certificate chains combined with authenticators that drop an EAP session after only 40 - 50 round trips is a major deployment problem.  This document looks at this problem in detail and describes the potential solutions available.
	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-emu-eaptlscert-08" />
   <format type="TXT" target="https://www.ietf.org/archive/id/draft-ietf-emu-eaptlscert-08.txt" />
</reference>



<reference anchor="EAP-TLS13">
<front>
<title>Using EAP-TLS with TLS 1.3 (EAP-TLS 1.3)</title>
<author initials='J' surname='Mattsson' fullname='John Mattsson'>
<organization />
</author>
<author initials='M' surname='Sethi' fullname='Mohit Sethi'>
<organization />
</author>
<date year='2021' month='October' day='20' />
<abstract><t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides a standard mechanism for support of multiple authentication methods.  This document specifies the use of EAP-Transport Layer Security (EAP-TLS) with TLS 1.3 while remaining backwards compatible with existing implementations of EAP-TLS.  TLS 1.3 provides significantly improved security and privacy, and reduced latency when compared to earlier versions of TLS.  EAP-TLS with TLS 1.3 (EAP-TLS 1.3) further improves security and privacy by always providing forward secrecy, never disclosing the peer identity, and by mandating use of revocation checking, when compared to EAP-TLS with earlier versions of TLS.  This document also provides guidance on authentication, authorization, and resumption for EAP-TLS in general (regardless of the underlying TLS version used).  This document updates RFC 5216.</t></abstract>
</front>
<seriesInfo name='Internet-Draft' value='draft-ietf-emu-eap-tls13-21'/>
<format type='TXT' target='https://www.ietf.org/internet-drafts/draft-ietf-emu-eap-tls13-21.txt'/>
</reference>



<reference  anchor="RFC8879" target='https://www.rfc-editor.org/info/rfc8879'>
<front>
<title>TLS Certificate Compression</title>
<author initials='A.' surname='Ghedini' fullname='A. Ghedini'><organization /></author>
<author initials='V.' surname='Vasiliev' fullname='V. Vasiliev'><organization /></author>
<date year='2020' month='December' />
<abstract><t>In TLS handshakes, certificate chains often take up the majority of the bytes transmitted.</t><t>This document describes how certificate chains can be compressed to reduce the amount of data transmitted and avoid some round trips.</t></abstract>
</front>
<seriesInfo name='RFC' value='8879'/>
<seriesInfo name='DOI' value='10.17487/RFC8879'/>
</reference>


<reference anchor="CBOR-CERTS">
   <front>
      <title>CBOR Encoded X.509 Certificates (C509 Certificates)</title>
      <author fullname="John Preuß Mattsson">
	 <organization>Ericsson AB</organization>
      </author>
      <author fullname="Göran Selander">
	 <organization>Ericsson AB</organization>
      </author>
      <author fullname="Shahid Raza">
	 <organization>RISE AB</organization>
      </author>
      <author fullname="Joel Höglund">
	 <organization>RISE AB</organization>
      </author>
      <author fullname="Martin Furuhed">
	 <organization>Nexus Group</organization>
      </author>
      <date month="January" day="10" year="2022" />
      <abstract>
	 <t>   This document specifies a CBOR encoding of X.509 certificates.  The
   resulting certificates are called C509 Certificates.  The CBOR
   encoding supports a large subset of RFC 5280 and all certificates
   compatible with the RFC 7925, IEEE 802.1AR (DevID), CNSA, RPKI, GSMA
   eUICC, and CA/Browser Forum Baseline Requirements profiles.  When
   used to re-encode DER encoded X.509 certificates, the CBOR encoding
   can in many cases reduce the size of RFC 7925 profiled certificates
   with over 50%.  The CBOR encoded structure can alternatively be
   signed directly (&quot;natively signed&quot;), which does not require re-
   encoding for the signature to be verified.  The document also
   specifies C509 COSE headers, a C509 TLS certificate type, and a C509
   file format.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-cose-cbor-encoded-cert-03" />
   <format type="TXT" target="https://www.ietf.org/archive/id/draft-ietf-cose-cbor-encoded-cert-03.txt" />
</reference>


<reference anchor="CTLS">
   <front>
      <title>Compact TLS 1.3</title>
      <author fullname="Eric Rescorla">
	 <organization>Mozilla</organization>
      </author>
      <author fullname="Richard Barnes">
	 <organization>Cisco</organization>
      </author>
      <author fullname="Hannes Tschofenig">
	 <organization>Arm Limited</organization>
      </author>
      <date month="March" day="7" year="2022" />
      <abstract>
	 <t>   This document specifies a &quot;compact&quot; version of TLS 1.3.  It is
   isomorphic to TLS 1.3 but saves space by trimming obsolete material,
   tighter encoding, a template-based specialization technique, and
   alternative cryptographic techniques. cTLS is not directly
   interoperable with TLS 1.3, but it should eventually be possible for
   a cTLS/TLS 1.3 server to exist and successfully interoperate.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-tls-ctls-05" />
   <format type="TXT" target="https://www.ietf.org/archive/id/draft-ietf-tls-ctls-05.txt" />
</reference>


<reference anchor="I-D.hoffman-c2pq">
   <front>
      <title>The Transition from Classical to Post-Quantum Cryptography</title>
      <author fullname="Paul Hoffman">
	 <organization>ICANN</organization>
      </author>
      <date month="May" day="26" year="2020" />
      <abstract>
	 <t>   Quantum computing is the study of computers that use quantum features
   in calculations.  For over 20 years, it has been known that if very
   large, specialized quantum computers could be built, they could have
   a devastating effect on asymmetric classical cryptographic algorithms
   such as RSA and elliptic curve signatures and key exchange, as well
   as (but in smaller scale) on symmetric cryptographic algorithms such
   as block ciphers, MACs, and hash functions.  There has already been a
   great deal of study on how to create algorithms that will resist
   large, specialized quantum computers, but so far, the properties of
   those algorithms make them onerous to adopt before they are needed.

   Small quantum computers are being built today, but it is still far
   from clear when large, specialized quantum computers will be built
   that can recover private or secret keys in classical algorithms at
   the key sizes commonly used today.  It is important to be able to
   predict when large, specialized quantum computers usable for
   cryptanalysis will be possible so that organization can change to
   post-quantum cryptographic algorithms well before they are needed.

   This document describes quantum computing, how it might be used to
   attack classical cryptographic algorithms, and possibly how to
   predict when large, specialized quantum computers will become
   feasible.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-hoffman-c2pq-07" />
   <format type="TXT" target="https://www.ietf.org/archive/id/draft-hoffman-c2pq-07.txt" />
</reference>


<reference anchor="I-D.ietf-tls-hybrid-design">
   <front>
      <title>Hybrid key exchange in TLS 1.3</title>
      <author fullname="Douglas Stebila">
	 <organization>University of Waterloo</organization>
      </author>
      <author fullname="Scott Fluhrer">
	 <organization>Cisco Systems</organization>
      </author>
      <author fullname="Shay Gueron">
	 <organization>University of Haifa and Amazon Web Services</organization>
      </author>
      <date month="January" day="11" year="2022" />
      <abstract>
	 <t>   Hybrid key exchange refers to using multiple key exchange algorithms
   simultaneously and combining the result with the goal of providing
   security even if all but one of the component algorithms is broken.
   It is motivated by transition to post-quantum cryptography.  This
   document provides a construction for hybrid key exchange in the
   Transport Layer Security (TLS) protocol version 1.3.

   Discussion of this work is encouraged to happen on the TLS IETF
   mailing list tls@ietf.org or on the GitHub repository which contains
   the draft: https://github.com/dstebila/draft-ietf-tls-hybrid-design.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-tls-hybrid-design-04" />
   <format type="TXT" target="https://www.ietf.org/archive/id/draft-ietf-tls-hybrid-design-04.txt" />
</reference>



<reference  anchor="RFC6928" target='https://www.rfc-editor.org/info/rfc6928'>
<front>
<title>Increasing TCP's Initial Window</title>
<author initials='J.' surname='Chu' fullname='J. Chu'><organization /></author>
<author initials='N.' surname='Dukkipati' fullname='N. Dukkipati'><organization /></author>
<author initials='Y.' surname='Cheng' fullname='Y. Cheng'><organization /></author>
<author initials='M.' surname='Mathis' fullname='M. Mathis'><organization /></author>
<date year='2013' month='April' />
<abstract><t>This document proposes an experiment to increase the permitted TCP initial window (IW) from between 2 and 4 segments, as specified in RFC 3390, to 10 segments with a fallback to the existing recommendation when performance issues are detected.  It discusses the motivation behind the increase, the advantages and disadvantages of the higher initial window, and presents results from several large-scale experiments showing that the higher initial window improves the overall performance of many web services without resulting in a congestion collapse.  The document closes with a discussion of usage and deployment for further experimental purposes recommended by the IETF TCP Maintenance and Minor Extensions (TCPM) working group.</t></abstract>
</front>
<seriesInfo name='RFC' value='6928'/>
<seriesInfo name='DOI' value='10.17487/RFC6928'/>
</reference>



<reference  anchor="RFC7924" target='https://www.rfc-editor.org/info/rfc7924'>
<front>
<title>Transport Layer Security (TLS) Cached Information Extension</title>
<author initials='S.' surname='Santesson' fullname='S. Santesson'><organization /></author>
<author initials='H.' surname='Tschofenig' fullname='H. Tschofenig'><organization /></author>
<date year='2016' month='July' />
<abstract><t>Transport Layer Security (TLS) handshakes often include fairly static information, such as the server certificate and a list of trusted certification authorities (CAs).  This information can be of considerable size, particularly if the server certificate is bundled with a complete certificate chain (i.e., the certificates of intermediate CAs up to the root CA).</t><t>This document defines an extension that allows a TLS client to inform a server of cached information, thereby enabling the server to omit already available information.</t></abstract>
</front>
<seriesInfo name='RFC' value='7924'/>
<seriesInfo name='DOI' value='10.17487/RFC7924'/>
</reference>



<reference  anchor="RFC5246" target='https://www.rfc-editor.org/info/rfc5246'>
<front>
<title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
<author initials='T.' surname='Dierks' fullname='T. Dierks'><organization /></author>
<author initials='E.' surname='Rescorla' fullname='E. Rescorla'><organization /></author>
<date year='2008' month='August' />
<abstract><t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol.  The TLS protocol provides communications security over the Internet.  The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5246'/>
<seriesInfo name='DOI' value='10.17487/RFC5246'/>
</reference>



<reference  anchor="RFC8446" target='https://www.rfc-editor.org/info/rfc8446'>
<front>
<title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
<author initials='E.' surname='Rescorla' fullname='E. Rescorla'><organization /></author>
<date year='2018' month='August' />
<abstract><t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t><t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t></abstract>
</front>
<seriesInfo name='RFC' value='8446'/>
<seriesInfo name='DOI' value='10.17487/RFC8446'/>
</reference>


<reference anchor="ESNI">
   <front>
      <title>TLS Encrypted Client Hello</title>
      <author fullname="Eric Rescorla">
	 <organization>RTFM, Inc.</organization>
      </author>
      <author fullname="Kazuho Oku">
	 <organization>Fastly</organization>
      </author>
      <author fullname="Nick Sullivan">
	 <organization>Cloudflare</organization>
      </author>
      <author fullname="Christopher A. Wood">
	 <organization>Cloudflare</organization>
      </author>
      <date month="February" day="13" year="2022" />
      <abstract>
	 <t>   This document describes a mechanism in Transport Layer Security (TLS)
   for encrypting a ClientHello message under a server public key.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/tlswg/draft-ietf-tls-esni
   (https://github.com/tlswg/draft-ietf-tls-esni).

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-tls-esni-14" />
   <format type="TXT" target="https://www.ietf.org/archive/id/draft-ietf-tls-esni-14.txt" />
</reference>




    </references>




  </back>

<!-- ##markdown-source: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-->

</rfc>

