<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.33 (Ruby 2.6.10) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-rsalz-tls-tls12-frozen-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.17.1 -->
  <front>
    <title abbrev="tls1.2-frozen">TLS 1.2 is Frozen</title>
    <seriesInfo name="Internet-Draft" value="draft-rsalz-tls-tls12-frozen-00"/>
    <author fullname="Rich Salz">
      <organization>Akamai Technologies</organization>
      <address>
        <email>rsalz@akamai.com</email>
      </address>
    </author>
    <author fullname="Nimrod Aviram">
      <organization/>
      <address>
        <email>nimrod.aviram@gmail.com</email>
      </address>
    </author>
    <date year="2023" month="May" day="17"/>
    <area>Security</area>
    <workgroup>Transport Layer Security</workgroup>
    <keyword>TLS</keyword>
    <keyword>features</keyword>
    <abstract>
      <?line 131?>

<t>TLS 1.2 is in widespread use and can be configured such that it provides good
security properties. TLS 1.3 is also in
widespread use and fixes some known deficiencies with TLS 1.2, such as
removing error-prone cryptographic primitives and encrypting more of the traffic
so that it is not readable by outsiders.</t>
      <t>Both versions have several extension points, so items like new cryptographic
algorithms, new supported groups (formerly "named curves"),  etc., can be
added without defining a new protocol. This document specifies that TLS 1.2
is frozen: no new algorithms or extensions will be approved.</t>
      <t>Further, TLS 1.3 use is widespread, and new protocols should require and
assume its existence.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-rsalz-tls-tls12-frozen/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Transport Layer Security Working Group mailing list (<eref target="mailto:tls@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tls/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tls/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/richsalz/tls12-frozen"/>.</t>
    </note>
  </front>
  <middle>
    <?line 147?>

<section anchor="sec-reasons">
      <name>Introduction</name>
      <t>TLS 1.2 <xref target="TLS12"/> is in widespread use and can be configured such that it provides good
security properties. However, this protocol version suffers from several
deficiencies:</t>
      <ol spacing="normal" type="1"><li>While application layer traffic is always encrypted, most of the handshake
messages are not encrypted. Therefore, the privacy provided is suboptimal.</li>
        <li>The list of cryptographic primitives specified for the protocol, both in-use
primitives and deprecated ones, includes several primitives that were a source for
vulnerabilities throughout the years, such as RSA key exchange, CBC cipher suites,
and problematic finite-field Diffie-Hellman group negotiation.
See <xref target="sec-considerations"/> for elaboration.</li>
        <li>The original protocol, as-is, does not provide security (cite Renegotiation
attack). Rather, some extensions are required to provide security.</li>
      </ol>
      <t>In contrast, TLS 1.3 <xref target="TLS13"/> is also in
widespread use and fixes most known deficiencies with TLS 1.2, such as
encrypting more of the traffic so that it is not readable by outsiders and
removing most cryptographic primitives considered dangerous. Importantly, TLS
1.3 enjoys robust security proofs and provides excellent security as-is.</t>
      <t>Both versions have several extension points, so items like new cryptographic
algorithms, new supported groups (formerly "named curves"),  etc., can be
added without defining a new protocol. This document specifies that TLS 1.2
is frozen: no new algorithms or extensions will be approved.</t>
      <t>Further, TLS 1.3 use is widespread, and new protocols should require and
assume its existence.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="implications-for-post-quantum-cryptography">
      <name>Implications for post-quantum cryptography</name>
      <t>Quantum computers, once available, will have a huge impact on TLS.
In 2016, the US National Institute of Standards and Technology started a
multi-year effort to standardize algorithms that will be "safe"
once quantum computers are feasible <xref target="PQC"/>. First IETF discussions happened
around the same time <xref target="CFRGSLIDES"/>.</t>
      <t>While the industry is waiting for NIST to finish standardization, the
IETF has several efforts underway.
A working group was formed in early 2013 to work on use of PQC in IETF protocols,
<xref target="PQUIPWG"/>.
Several other working groups, including TLS <xref target="TLSWG"/>,
are working on
drafts to support hybrid algorithms and identifiers, for use during a
transition from classic to a post-quantum world.</t>
      <t>For TLS it is important to note that the focus of these efforts is TLS 1.3
or later.
TLS 1.2 is WILL NOT be supported (see <xref target="iana"/>).</t>
    </section>
    <section anchor="tls-use-by-other-protocols">
      <name>TLS Use by Other Protocols</name>
      <t>Any new protocol that uses TLS <bcp14>MUST</bcp14> specify TLS 1.3 as its default.
For example, QUIC <xref target="QUICTLS"/> requires TLS 1.3 and specifies that endpoints
<bcp14>MUST</bcp14> terminate the connection if an older version is used.</t>
      <t>If deployment considerations are a concern, the protocol <bcp14>MAY</bcp14> specify TLS 1.2 as
an additional, non-default option.
As a counter example, the Usage Profile for DNS over TLS <xref target="DNSTLS"/> specifies
TLS 1.2 as the default, while also allowing TLS 1.3.
For newer specifications that choose to support TLS 1.2, those preferences are
to be reversed.</t>
    </section>
    <section anchor="sec-considerations">
      <name>Security Considerations</name>
      <t>TLS 1.2 was specified with several cryptographic primitives and design choices
that have historically hindered its security. The purpose of this section is to
briefly survey several such prominent problems that have affected the protocol.
It should be noted, however, that TLS 1.2 can be configured securely; it is
merely much more difficult to configure it securely as opposed to using its
modern successor, TLS 1.3. See <xref target="RFC9325"/> for a more thorough guide on the
secure deployment of TLS 1.2.</t>
      <t>Firstly, the TLS 1.2 protocol, without any extension points, is vulnerable to
the renegotiation attack and the Triple Handshake attack. Broadly, these attacks
exploit the protocol's support for renegotiation in order to inject a prefix
chosen by the attacker into the plaintext stream. This is usually a devastating
threat in practice, that allows e.g. obtaining secret cookies in a web setting.
Refer to <xref target="RENEG1"/>, <xref target="RENEG2"/>, <xref target="TRIPLESHAKE"/> for elaboration. In light of
the above problems, <xref target="RFC5746"/> specifies an extension that prevents this
category of attacks. To securely deploy TLS 1.2, either renegotiation must be
disabled entirely, or this extension must be present. Additionally, clients must
not allow servers to renegotiate the certificate during a connection.</t>
      <t>Secondly, the original key exchange methods specified for the protocol, namely
RSA key exchange and finite field Diffie-Hellman, suffer from several
weaknesses. As before, to securely deploy the protocol, these key exchange
methods must be disabled.
Refer to draft-obsolete-kex for elaboration (TODO I guess we will anyway
wait for WGLC for draft-obsolete-kex, so no sense to temporarily refer to the
draft.)</t>
      <t>Thirdly, symmetric ciphers which were widely-used in the protocol, namely RC4
and CBC cipher suites, suffer from several weaknesses. RC4 suffers from
exploitable biases in its key stream; see <xref target="RFC7465"/>. CBC cipher suites have
been a source of vulnerabilities throughout the years. A straightforward
implementation of these cipher suites inherently suffers from the Lucky13 timing
attack <xref target="LUCKY13"/>. The first attempt to implement the cipher suites in
constant time introduced an even more severe vulnerability.
There have been further similar vulnerabilities throughout the
years exploiting CBC cipher suites; refer to e.g. <xref target="CBCSCANNING"/>
for an example and a survey of similar works.</t>
      <t>And lastly, historically the protocol was affected by several other attacks that
TLS 1.3 is immune to:
BEAST <xref target="BEAST"/>, Logjam <xref target="WEAKDH"/>, FREAK <xref target="FREAK"/>, and SLOTH <xref target="SLOTH"/>.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>IANA will stop accepting registrations for any TLS parameters <xref target="TLS13REG"/>
except for the following:</t>
      <ul spacing="normal">
        <li>TLS Exporter Labels</li>
        <li>TLS Application-Layer Protocol Negotiation (ALPN) Protocol IDs</li>
      </ul>
      <t>Entries in any other TLS protocol registry should have an indication like
"For TLS 1.3 or later" in their entry.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="TLS12">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks">
              <organization/>
            </author>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol.  The TLS protocol provides communications security over the Internet.  The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="TLS13">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="TLS13REG">
          <front>
            <title>IANA Registry Updates for TLS and DTLS</title>
            <author fullname="J. Salowey" initials="J." surname="Salowey">
              <organization/>
            </author>
            <author fullname="S. Turner" initials="S." surname="Turner">
              <organization/>
            </author>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document describes a number of changes to TLS and DTLS IANA registries that range from adding notes to the registry all the way to changing the registration policy.  These changes were mostly motivated by WG review of the TLS- and DTLS-related registries undertaken as part of the TLS 1.3 development process.</t>
              <t>This document updates the following RFCs: 3749, 5077, 4680, 5246, 5705, 5878, 6520, and 7301.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8447"/>
          <seriesInfo name="DOI" value="10.17487/RFC8447"/>
        </reference>
        <reference anchor="QUICTLS">
          <front>
            <title>Using TLS to Secure QUIC</title>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson">
              <organization/>
            </author>
            <author fullname="S. Turner" initials="S." role="editor" surname="Turner">
              <organization/>
            </author>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document describes how Transport Layer Security (TLS) is used to secure QUIC.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9001"/>
          <seriesInfo name="DOI" value="10.17487/RFC9001"/>
        </reference>
        <reference anchor="DNSTLS">
          <front>
            <title>Usage Profiles for DNS over TLS and DNS over DTLS</title>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson">
              <organization/>
            </author>
            <author fullname="D. Gillmor" initials="D." surname="Gillmor">
              <organization/>
            </author>
            <author fullname="T. Reddy" initials="T." surname="Reddy">
              <organization/>
            </author>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document discusses usage profiles, based on one or more authentication mechanisms, which can be used for DNS over Transport Layer Security (TLS) or Datagram TLS (DTLS).  These profiles can increase the privacy of DNS transactions compared to using only cleartext DNS.  This document also specifies new authentication mechanisms -- it describes several ways that a DNS client can use an authentication domain name to authenticate a (D)TLS connection to a DNS server.  Additionally, it defines (D)TLS protocol profiles for DNS clients and servers implementing DNS over (D)TLS.  This document updates RFC 7858.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8310"/>
          <seriesInfo name="DOI" value="10.17487/RFC8310"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC9325">
          <front>
            <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer">
              <organization/>
            </author>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre">
              <organization/>
            </author>
            <author fullname="T. Fossati" initials="T." surname="Fossati">
              <organization/>
            </author>
            <date month="November" year="2022"/>
            <abstract>
              <t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are used to protect data exchanged over a wide range of application protocols and can also form the basis for secure transport protocols.  Over the years, the industry has witnessed several serious attacks on TLS and DTLS, including attacks on the most commonly used cipher suites and their modes of operation.  This document provides the latest recommendations for ensuring the security of deployed services that use TLS and DTLS. These recommendations are applicable to the majority of use cases.</t>
              <t>RFC 7525, an earlier version of the TLS recommendations, was published when the industry was transitioning to TLS 1.2. Years later, this transition is largely complete, and TLS 1.3 is widely available. This document updates the guidance given the new environment and obsoletes RFC 7525. In addition, this document updates RFCs 5288 and 6066 in view of recent attacks.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="195"/>
          <seriesInfo name="RFC" value="9325"/>
          <seriesInfo name="DOI" value="10.17487/RFC9325"/>
        </reference>
        <reference anchor="RFC5746">
          <front>
            <title>Transport Layer Security (TLS) Renegotiation Indication Extension</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <author fullname="M. Ray" initials="M." surname="Ray">
              <organization/>
            </author>
            <author fullname="S. Dispensa" initials="S." surname="Dispensa">
              <organization/>
            </author>
            <author fullname="N. Oskov" initials="N." surname="Oskov">
              <organization/>
            </author>
            <date month="February" year="2010"/>
            <abstract>
              <t>Secure Socket Layer (SSL) and Transport Layer Security (TLS) renegotiation are vulnerable to an attack in which the attacker forms a TLS connection with the target server, injects content of his choice, and then splices in a new TLS connection from a client.  The server treats the client's initial TLS handshake as a renegotiation and thus believes that the initial data transmitted by the attacker is from the same entity as the subsequent client data.  This specification defines a TLS extension to cryptographically tie renegotiations to the TLS connections they are being performed over, thus preventing this attack.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5746"/>
          <seriesInfo name="DOI" value="10.17487/RFC5746"/>
        </reference>
        <reference anchor="RFC7465">
          <front>
            <title>Prohibiting RC4 Cipher Suites</title>
            <author fullname="A. Popov" initials="A." surname="Popov">
              <organization/>
            </author>
            <date month="February" year="2015"/>
            <abstract>
              <t>This document requires that Transport Layer Security (TLS) clients and servers never negotiate the use of RC4 cipher suites when they establish connections.  This applies to all TLS versions.  This document updates RFCs 5246, 4346, and 2246.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7465"/>
          <seriesInfo name="DOI" value="10.17487/RFC7465"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="PQC" target="https://csrc.nist.gov/projects/post-quantum-cryptography">
          <front>
            <title>Post=Quantum Cryptography</title>
            <author>
              <organization/>
            </author>
            <date year="2017" month="January"/>
          </front>
        </reference>
        <reference anchor="CFRGSLIDES" target="https://www.ietf.org/proceedings/95/slides/slides-95-cfrg-4.pdf">
          <front>
            <title>Post Quantum Secure Cryptography Discussion</title>
            <author initials="D." surname="McGrew" fullname="David McGrew">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="PQUIPWG" target="https://datatracker.ietf.org/wg/pquip/about/">
          <front>
            <title>Post-Quantum Use in Protocols</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="TLSWG" target="https://datatracker.ietf.org/wg/tls/about/">
          <front>
            <title>Transport Layer Security</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="TRIPLESHAKE" target="https://mitls.org/pages/attacks/3SHAKE">
          <front>
            <title>Triple Handshakes Considered Harmful Breaking and Fixing Authentication over TLS</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RENEG1" target="https://web.archive.org/web/20091231034700/http://www.educatedguesswork.org/2009/11/understanding_the_tls_renegoti.html">
          <front>
            <title>Understanding the TLS Renegotiation Attack</title>
            <author initials="E." surname="Rescorla" fullname="Eric Rescorla">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RENEG2" target="https://web.archive.org/web/20091228061844/http://extendedsubset.com/?p=8">
          <front>
            <title>Authentication Gap in TLS Renegotiation</title>
            <author initials="M." surname="Ray" fullname="Marsh Ray">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="LUCKY13" target="http://www.isg.rhul.ac.uk/tls/TLStiming.pdf">
          <front>
            <title>Lucky Thirteen: Breaking the TLS and DTLS record protocols</title>
            <author initials="N. J." surname="Al Fardan">
              <organization/>
            </author>
            <author initials="K. G." surname="Paterson">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="LUCKY13FIX" target="https://nds.rub.de/media/nds/veroeffentlichungen/2016/10/19/tls-attacker-ccs16.pdf">
          <front>
            <title>Systematic fuzzing and testing of TLS libraries</title>
            <author initials="J." surname="Somorovsky" fullname="Juraj Somorovsky">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="CBCSCANNING" target="https://www.usenix.org/system/files/sec19-merget.pdf">
          <front>
            <title>Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities</title>
            <author initials="R." surname="Merget" fullname="Robert Merget">
              <organization/>
            </author>
            <author initials="J." surname="Somorovsky" fullname="Juraj Somorovsky">
              <organization/>
            </author>
            <author initials="N." surname="Aviram" fullname="Nimrod Aviram">
              <organization/>
            </author>
            <author initials="C." surname="Young" fullname="Craig Young">
              <organization/>
            </author>
            <author initials="J." surname="Fliegenschmidt" fullname="Janis Fliegenschmidt">
              <organization/>
            </author>
            <author initials="J." surname="Schwenk" fullname="Jörg Schwenk">
              <organization/>
            </author>
            <author initials="Y." surname="Shavitt" fullname="Yuval Shavitt">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="BEAST" target="http://www.hpcc.ecs.soton.ac.uk/dan/talks/bullrun/Beast.pdf">
          <front>
            <title>Here come the xor ninjas</title>
            <author initials="T." surname="Duong" fullname="Thai Duong">
              <organization/>
            </author>
            <author initials="J." surname="Rizzo" fullname="Juliano Rizzo">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="WEAKDH" target="https://dl.acm.org/doi/pdf/10.1145/2810103.2813707">
          <front>
            <title>Imperfect forward secrecy: How Diffie-Hellman fails in practice</title>
            <author initials="D." surname="Adrian">
              <organization/>
            </author>
            <author initials="K." surname="Bhargavan">
              <organization/>
            </author>
            <author initials="Z." surname="Durumeric">
              <organization/>
            </author>
            <author initials="P." surname="Gaudry">
              <organization/>
            </author>
            <author initials="M." surname="Green">
              <organization/>
            </author>
            <author initials="J. A." surname="Halderman">
              <organization/>
            </author>
            <author initials="N." surname="Heninger">
              <organization/>
            </author>
            <author initials="D." surname="Springall">
              <organization/>
            </author>
            <author initials="E." surname="Thomé">
              <organization/>
            </author>
            <author initials="L." surname="Valenta">
              <organization/>
            </author>
            <author initials="B." surname="VanderSloot">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="FREAK" target="https://inria.hal.science/hal-01114250/file/messy-state-of-the-union-oakland15.pdf">
          <front>
            <title>A messy state of the union: Taming the composite state machines of TLS</title>
            <author initials="B." surname="Beurdouche" fullname="Benjamin Beurdouche">
              <organization/>
            </author>
            <author initials="K." surname="Bhargavan" fullname="Karthikeyan Bhargavan">
              <organization/>
            </author>
            <author initials="A." surname="Delignat-Lavaud" fullname="Antoine Delignat-Lavaud">
              <organization/>
            </author>
            <author initials="C." surname="Fournet" fullname="Cédric Fournet">
              <organization/>
            </author>
            <author initials="M." surname="Kohlweiss" fullname="Markulf Kohlweiss">
              <organization/>
            </author>
            <author initials="A." surname="Pironti" fullname="Alfredo Pironti">
              <organization/>
            </author>
            <author initials="P.-Y." surname="Strub" fullname="Pierre-Yves Strub">
              <organization/>
            </author>
            <author initials="J. K." surname="Zinzindohoue" fullname="Jean Karim Zinzindohoue">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="SLOTH" target="https://inria.hal.science/hal-01244855/file/SLOTH_NDSS16.pdf">
          <front>
            <title>Transcript collision attacks: Breaking authentication in TLS, IKE, and SSH</title>
            <author initials="K." surname="Bhargavan" fullname="Karthikeyan Bhargavan">
              <organization/>
            </author>
            <author initials="G." surname="Leurent" fullname="Gaëtan Leurent">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 293?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>None yet.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
