<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.1 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-rsalz-tls-tls12-frozen-02" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.1 -->
  <front>
    <title abbrev="tls1.2-frozen">TLS 1.2 is in Feature Freeze</title>
    <seriesInfo name="Internet-Draft" value="draft-rsalz-tls-tls12-frozen-02"/>
    <author fullname="Rich Salz">
      <organization>Akamai Technologies</organization>
      <address>
        <email>rsalz@akamai.com</email>
      </address>
    </author>
    <author fullname="Nimrod Aviram">
      <organization/>
      <address>
        <email>nimrod.aviram@gmail.com</email>
      </address>
    </author>
    <date year="2023" month="October" day="05"/>
    <area>Security</area>
    <workgroup>Transport Layer Security</workgroup>
    <keyword>TLS</keyword>
    <keyword>features</keyword>
    <abstract>
      <?line 131?>

<t>TLS 1.2 is in widespread use and can be configured such that it provides good
security properties. TLS 1.3 is also in
widespread use and fixes some known deficiencies with TLS 1.2, such as
removing error-prone cryptographic primitives and encrypting more of the traffic
so that it is not readable by outsiders.</t>
      <t>Both versions have several extension points, so items like new cryptographic
algorithms, new supported groups (formerly "named curves"),  etc., can be
added without defining a new protocol. This document specifies that outside of
urgent security fixes, no new features will be approved for TLS 1.2.
This prescription does not pertain to DTLS (in any DTLS version); it pertains to
TLS only.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-rsalz-tls-tls12-frozen/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Transport Layer Security Working Group mailing list (<eref target="mailto:tls@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tls/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tls/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/richsalz/tls12-frozen"/>.</t>
    </note>
  </front>
  <middle>
    <?line 146?>

<section anchor="sec-reasons">
      <name>Introduction</name>
      <t>TLS 1.2 <xref target="TLS12"/> is in widespread use and can be configured such that it provides good
security properties. However, this protocol version suffers from several
deficiencies:</t>
      <ol spacing="normal" type="1"><li>
          <t>While application layer traffic is always encrypted, most of the handshake
messages are not encrypted. Therefore, the privacy provided is suboptimal.
This is a protocol issue that cannot be addressed by configuration.</t>
        </li>
        <li>
          <t>The list of cryptographic primitives specified for the protocol, both in-use
primitives and deprecated ones, includes several primitives that were a source for
vulnerabilities throughout the years, such as RSA key exchange, CBC cipher suites,
and problematic finite-field Diffie-Hellman group negotiation.
This deficiency may be addressed through proper configuration; however,
experience shows that configuration mistakes are common, especially when
deploying cryptography.
See <xref target="sec-considerations"/> for elaboration.</t>
        </li>
        <li>
          <t>The original protocol, as-is, does not provide security due to the
"Renegotiation" class of attacks (see <xref target="sec-considerations"/>). Rather, some
extensions are required to provide security.</t>
        </li>
      </ol>
      <t>In contrast, TLS 1.3 <xref target="TLS13"/> is also in
widespread use and fixes most known deficiencies with TLS 1.2, such as
encrypting more of the traffic so that it is not readable by outsiders and
removing most cryptographic primitives considered dangerous. Importantly, TLS
1.3 enjoys robust security proofs and provides excellent security as-is.</t>
      <t>Both versions have several extension points, so items like new cryptographic
algorithms, new supported groups (formerly "named curves"),  etc., can be
added without defining a new protocol. This document specifies that outside of
urgent security fixes, no new features will be approved for TLS 1.2.
This prescription does not pertain to DTLS (in any DTLS version); it pertains to
TLS only.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="implications-for-post-quantum-cryptography">
      <name>Implications for post-quantum cryptography</name>
      <t>Quantum computers, once available, will have a huge impact on TLS.
In 2016, the US National Institute of Standards and Technology started a
multi-year effort to standardize algorithms that will be "safe"
once quantum computers are feasible <xref target="PQC"/>. First IETF discussions happened
around the same time <xref target="CFRGSLIDES"/>.</t>
      <t>While the industry is waiting for NIST to finish standardization, the
IETF has several efforts underway.
A working group was formed in early 2013 to work on use of PQC in IETF protocols,
<xref target="PQUIPWG"/>.
Several other working groups, including TLS <xref target="TLSWG"/>,
are working on
drafts to support hybrid algorithms and identifiers, for use during a
transition from classic to a post-quantum world.</t>
      <t>For TLS it is important to note that the focus of these efforts is TLS 1.3
or later.
TLS 1.2 is WILL NOT be supported (see <xref target="iana"/>).</t>
    </section>
    <section anchor="sec-considerations">
      <name>Security Considerations</name>
      <t>TLS 1.2 was specified with several cryptographic primitives and design choices
that have historically hindered its security. The purpose of this section is to
briefly survey several such prominent problems that have affected the protocol.
It should be noted, however, that TLS 1.2 can be configured securely; it is
merely much more difficult to configure it securely as opposed to using its
modern successor, TLS 1.3. See <xref target="RFC9325"/> for a more thorough guide on the
secure deployment of TLS 1.2.</t>
      <t>Firstly, the TLS 1.2 protocol, without any extension points, is vulnerable to
the renegotiation attack and the Triple Handshake attack. Broadly, these attacks
exploit the protocol's support for renegotiation in order to inject a prefix
chosen by the attacker into the plaintext stream. This is usually a devastating
threat in practice, that allows e.g. obtaining secret cookies in a web setting.
Refer to <xref target="RENEG1"/>, <xref target="RENEG2"/>, <xref target="TRIPLESHAKE"/> for elaboration. In light of
the above problems, <xref target="RFC5746"/> specifies an extension that prevents this
category of attacks. To securely deploy TLS 1.2, either renegotiation must be
disabled entirely, or this extension must be present. Additionally, clients must
not allow servers to renegotiate the certificate during a connection.</t>
      <t>Secondly, the original key exchange methods specified for the protocol, namely
RSA key exchange and finite field Diffie-Hellman, suffer from several
weaknesses. As before, to securely deploy the protocol, these key exchange
methods must be disabled.
Refer to draft-obsolete-kex for elaboration (TODO I guess we will anyway
wait for WGLC for draft-obsolete-kex, so no sense to temporarily refer to the
draft.)</t>
      <t>Thirdly, symmetric ciphers which were widely-used in the protocol, namely RC4
and CBC cipher suites, suffer from several weaknesses. RC4 suffers from
exploitable biases in its key stream; see <xref target="RFC7465"/>. CBC cipher suites have
been a source of vulnerabilities throughout the years. A straightforward
implementation of these cipher suites inherently suffers from the Lucky13 timing
attack <xref target="LUCKY13"/>. The first attempt to implement the cipher suites in
constant time introduced an even more severe vulnerability <xref target="LUCKY13FIX"/>.
There have been further similar vulnerabilities throughout the
years exploiting CBC cipher suites; refer to e.g. <xref target="CBCSCANNING"/>
for an example and a survey of similar works.</t>
      <t>And lastly, historically the protocol was affected by several other attacks that
TLS 1.3 is immune to:
BEAST <xref target="BEAST"/>, Logjam <xref target="WEAKDH"/>, FREAK <xref target="FREAK"/>, and SLOTH <xref target="SLOTH"/>.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>IANA will stop accepting registrations for any TLS parameters <xref target="TLS13REG"/>
except for the following:</t>
      <ul spacing="normal">
        <li>
          <t>TLS Exporter Labels</t>
        </li>
        <li>
          <t>TLS Application-Layer Protocol Negotiation (ALPN) Protocol IDs</t>
        </li>
      </ul>
      <t>Entries in any other TLS protocol registry should have an indication like
"For TLS 1.3 or later" in their entry.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="TLS12">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="TLS13">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="TLS13REG">
          <front>
            <title>IANA Registry Updates for TLS and DTLS</title>
            <author fullname="J. Salowey" initials="J." surname="Salowey"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document describes a number of changes to TLS and DTLS IANA registries that range from adding notes to the registry all the way to changing the registration policy. These changes were mostly motivated by WG review of the TLS- and DTLS-related registries undertaken as part of the TLS 1.3 development process.</t>
              <t>This document updates the following RFCs: 3749, 5077, 4680, 5246, 5705, 5878, 6520, and 7301.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8447"/>
          <seriesInfo name="DOI" value="10.17487/RFC8447"/>
        </reference>
        <reference anchor="QUICTLS">
          <front>
            <title>Using TLS to Secure QUIC</title>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <author fullname="S. Turner" initials="S." role="editor" surname="Turner"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document describes how Transport Layer Security (TLS) is used to secure QUIC.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9001"/>
          <seriesInfo name="DOI" value="10.17487/RFC9001"/>
        </reference>
        <reference anchor="DNSTLS">
          <front>
            <title>Usage Profiles for DNS over TLS and DNS over DTLS</title>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
            <author fullname="D. Gillmor" initials="D." surname="Gillmor"/>
            <author fullname="T. Reddy" initials="T." surname="Reddy"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document discusses usage profiles, based on one or more authentication mechanisms, which can be used for DNS over Transport Layer Security (TLS) or Datagram TLS (DTLS). These profiles can increase the privacy of DNS transactions compared to using only cleartext DNS. This document also specifies new authentication mechanisms -- it describes several ways that a DNS client can use an authentication domain name to authenticate a (D)TLS connection to a DNS server. Additionally, it defines (D)TLS protocol profiles for DNS clients and servers implementing DNS over (D)TLS. This document updates RFC 7858.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8310"/>
          <seriesInfo name="DOI" value="10.17487/RFC8310"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC9325">
          <front>
            <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="November" year="2022"/>
            <abstract>
              <t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are used to protect data exchanged over a wide range of application protocols and can also form the basis for secure transport protocols. Over the years, the industry has witnessed several serious attacks on TLS and DTLS, including attacks on the most commonly used cipher suites and their modes of operation. This document provides the latest recommendations for ensuring the security of deployed services that use TLS and DTLS. These recommendations are applicable to the majority of use cases.</t>
              <t>RFC 7525, an earlier version of the TLS recommendations, was published when the industry was transitioning to TLS 1.2. Years later, this transition is largely complete, and TLS 1.3 is widely available. This document updates the guidance given the new environment and obsoletes RFC 7525. In addition, this document updates RFCs 5288 and 6066 in view of recent attacks.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="195"/>
          <seriesInfo name="RFC" value="9325"/>
          <seriesInfo name="DOI" value="10.17487/RFC9325"/>
        </reference>
        <reference anchor="RFC5746">
          <front>
            <title>Transport Layer Security (TLS) Renegotiation Indication Extension</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="M. Ray" initials="M." surname="Ray"/>
            <author fullname="S. Dispensa" initials="S." surname="Dispensa"/>
            <author fullname="N. Oskov" initials="N." surname="Oskov"/>
            <date month="February" year="2010"/>
            <abstract>
              <t>Secure Socket Layer (SSL) and Transport Layer Security (TLS) renegotiation are vulnerable to an attack in which the attacker forms a TLS connection with the target server, injects content of his choice, and then splices in a new TLS connection from a client. The server treats the client's initial TLS handshake as a renegotiation and thus believes that the initial data transmitted by the attacker is from the same entity as the subsequent client data. This specification defines a TLS extension to cryptographically tie renegotiations to the TLS connections they are being performed over, thus preventing this attack. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5746"/>
          <seriesInfo name="DOI" value="10.17487/RFC5746"/>
        </reference>
        <reference anchor="RFC7465">
          <front>
            <title>Prohibiting RC4 Cipher Suites</title>
            <author fullname="A. Popov" initials="A." surname="Popov"/>
            <date month="February" year="2015"/>
            <abstract>
              <t>This document requires that Transport Layer Security (TLS) clients and servers never negotiate the use of RC4 cipher suites when they establish connections. This applies to all TLS versions. This document updates RFCs 5246, 4346, and 2246.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7465"/>
          <seriesInfo name="DOI" value="10.17487/RFC7465"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="PQC" target="https://csrc.nist.gov/projects/post-quantum-cryptography">
          <front>
            <title>Post=Quantum Cryptography</title>
            <author>
              <organization/>
            </author>
            <date year="2017" month="January"/>
          </front>
        </reference>
        <reference anchor="CFRGSLIDES" target="https://www.ietf.org/proceedings/95/slides/slides-95-cfrg-4.pdf">
          <front>
            <title>Post Quantum Secure Cryptography Discussion</title>
            <author initials="D." surname="McGrew" fullname="David McGrew">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="PQUIPWG" target="https://datatracker.ietf.org/wg/pquip/about/">
          <front>
            <title>Post-Quantum Use in Protocols</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="TLSWG" target="https://datatracker.ietf.org/wg/tls/about/">
          <front>
            <title>Transport Layer Security</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="TRIPLESHAKE" target="https://mitls.org/pages/attacks/3SHAKE">
          <front>
            <title>Triple Handshakes Considered Harmful Breaking and Fixing Authentication over TLS</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RENEG1" target="https://web.archive.org/web/20091231034700/http://www.educatedguesswork.org/2009/11/understanding_the_tls_renegoti.html">
          <front>
            <title>Understanding the TLS Renegotiation Attack</title>
            <author initials="E." surname="Rescorla" fullname="Eric Rescorla">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RENEG2" target="https://web.archive.org/web/20091228061844/http://extendedsubset.com/?p=8">
          <front>
            <title>Authentication Gap in TLS Renegotiation</title>
            <author initials="M." surname="Ray" fullname="Marsh Ray">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="LUCKY13" target="http://www.isg.rhul.ac.uk/tls/TLStiming.pdf">
          <front>
            <title>Lucky Thirteen: Breaking the TLS and DTLS record protocols</title>
            <author initials="N. J." surname="Al Fardan">
              <organization/>
            </author>
            <author initials="K. G." surname="Paterson">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="LUCKY13FIX" target="https://nds.rub.de/media/nds/veroeffentlichungen/2016/10/19/tls-attacker-ccs16.pdf">
          <front>
            <title>Systematic fuzzing and testing of TLS libraries</title>
            <author initials="J." surname="Somorovsky" fullname="Juraj Somorovsky">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="CBCSCANNING" target="https://www.usenix.org/system/files/sec19-merget.pdf">
          <front>
            <title>Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities</title>
            <author initials="R." surname="Merget" fullname="Robert Merget">
              <organization/>
            </author>
            <author initials="J." surname="Somorovsky" fullname="Juraj Somorovsky">
              <organization/>
            </author>
            <author initials="N." surname="Aviram" fullname="Nimrod Aviram">
              <organization/>
            </author>
            <author initials="C." surname="Young" fullname="Craig Young">
              <organization/>
            </author>
            <author initials="J." surname="Fliegenschmidt" fullname="Janis Fliegenschmidt">
              <organization/>
            </author>
            <author initials="J." surname="Schwenk" fullname="Jörg Schwenk">
              <organization/>
            </author>
            <author initials="Y." surname="Shavitt" fullname="Yuval Shavitt">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="BEAST" target="http://www.hpcc.ecs.soton.ac.uk/dan/talks/bullrun/Beast.pdf">
          <front>
            <title>Here come the xor ninjas</title>
            <author initials="T." surname="Duong" fullname="Thai Duong">
              <organization/>
            </author>
            <author initials="J." surname="Rizzo" fullname="Juliano Rizzo">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="WEAKDH" target="https://dl.acm.org/doi/pdf/10.1145/2810103.2813707">
          <front>
            <title>Imperfect forward secrecy: How Diffie-Hellman fails in practice</title>
            <author initials="D." surname="Adrian">
              <organization/>
            </author>
            <author initials="K." surname="Bhargavan">
              <organization/>
            </author>
            <author initials="Z." surname="Durumeric">
              <organization/>
            </author>
            <author initials="P." surname="Gaudry">
              <organization/>
            </author>
            <author initials="M." surname="Green">
              <organization/>
            </author>
            <author initials="J. A." surname="Halderman">
              <organization/>
            </author>
            <author initials="N." surname="Heninger">
              <organization/>
            </author>
            <author initials="D." surname="Springall">
              <organization/>
            </author>
            <author initials="E." surname="Thomé">
              <organization/>
            </author>
            <author initials="L." surname="Valenta">
              <organization/>
            </author>
            <author initials="B." surname="VanderSloot">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="FREAK" target="https://inria.hal.science/hal-01114250/file/messy-state-of-the-union-oakland15.pdf">
          <front>
            <title>A messy state of the union: Taming the composite state machines of TLS</title>
            <author initials="B." surname="Beurdouche" fullname="Benjamin Beurdouche">
              <organization/>
            </author>
            <author initials="K." surname="Bhargavan" fullname="Karthikeyan Bhargavan">
              <organization/>
            </author>
            <author initials="A." surname="Delignat-Lavaud" fullname="Antoine Delignat-Lavaud">
              <organization/>
            </author>
            <author initials="C." surname="Fournet" fullname="Cédric Fournet">
              <organization/>
            </author>
            <author initials="M." surname="Kohlweiss" fullname="Markulf Kohlweiss">
              <organization/>
            </author>
            <author initials="A." surname="Pironti" fullname="Alfredo Pironti">
              <organization/>
            </author>
            <author initials="P.-Y." surname="Strub" fullname="Pierre-Yves Strub">
              <organization/>
            </author>
            <author initials="J. K." surname="Zinzindohoue" fullname="Jean Karim Zinzindohoue">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="SLOTH" target="https://inria.hal.science/hal-01244855/file/SLOTH_NDSS16.pdf">
          <front>
            <title>Transcript collision attacks: Breaking authentication in TLS, IKE, and SSH</title>
            <author initials="K." surname="Bhargavan" fullname="Karthikeyan Bhargavan">
              <organization/>
            </author>
            <author initials="G." surname="Leurent" fullname="Gaëtan Leurent">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 283?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>None yet.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
