<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.1 (Ruby 2.6.10) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-rsalz-uta-require-tls13-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.1 -->
  <front>
    <title abbrev="require-tls1.3">New Protocols Must Require TLS 1.3</title>
    <seriesInfo name="Internet-Draft" value="draft-rsalz-uta-require-tls13-00"/>
    <author fullname="Rich Salz">
      <organization>Akamai Technologies</organization>
      <address>
        <email>rsalz@akamai.com</email>
      </address>
    </author>
    <author fullname="Nimrod Aviram">
      <organization/>
      <address>
        <email>nimrod.aviram@gmail.com</email>
      </address>
    </author>
    <date year="2023" month="October" day="05"/>
    <area>Security</area>
    <workgroup>Transport Layer Security</workgroup>
    <keyword>TLS</keyword>
    <keyword>features</keyword>
    <abstract>
      <?line 130?>

<t>TLS 1.2 is in widespread use and can be configured such that it provides good
security properties. TLS 1.3 is also in
widespread use and fixes some known deficiencies with TLS 1.2, such as
removing error-prone cryptographic primitives and encrypting more of the traffic
so that it is not readable by outsiders.</t>
      <t>Since TLS 1.3 use is widespread, new protocols must require and
assume its existence.
This prescription does not pertain to DTLS (in any DTLS version); it pertains to
TLS only.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-rsalz-uta-require-tls13/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Transport Layer Security Working Group mailing list (<eref target="mailto:tls@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tls/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tls/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/richsalz/tls12-frozen"/>.</t>
    </note>
  </front>
  <middle>
    <?line 143?>

<section anchor="sec-reasons">
      <name>Introduction</name>
      <t>TLS 1.2 <xref target="TLS12"/> is in widespread use and can be configured such that it provides good
security properties. However, this protocol version suffers from several
deficiencies:</t>
      <ol spacing="normal" type="1"><li>
          <t>While application layer traffic is always encrypted, most of the handshake
messages are not encrypted. Therefore, the privacy provided is suboptimal.
This is a protocol issue that cannot be addressed by configuration.</t>
        </li>
        <li>
          <t>The list of cryptographic primitives specified for the protocol, both in-use
primitives and deprecated ones, includes several primitives that were a source for
vulnerabilities throughout the years, such as RSA key exchange, CBC cipher suites,
and problematic finite-field Diffie-Hellman group negotiation.
This deficiency may be addressed through proper configuration; however,
experience shows that configuration mistakes are common, especially when
deploying cryptography.
See <xref target="sec-considerations"/> for elaboration.</t>
        </li>
        <li>
          <t>The original protocol, as-is, does not provide security <xref target="RENEG1"/>,
<xref target="RENEG2"/>, <xref target="TRIPLESHAKE"/>. Rather, some extensions are required to provide
security.</t>
        </li>
      </ol>
      <t>In contrast, TLS 1.3 <xref target="TLS13"/> is also in
widespread use and fixes most known deficiencies with TLS 1.2, such as
encrypting more of the traffic so that it is not readable by outsiders and
removing most cryptographic primitives considered dangerous. Importantly, TLS
1.3 enjoys robust security proofs and provides excellent security as-is.</t>
      <t>This document specifies that, since TLS 1.3 use is widespread, new protocols
must require and assume its existence.
This prescription does not pertain to DTLS (in any DTLS version); it pertains to
TLS only.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="implications-for-post-quantum-cryptography">
      <name>Implications for post-quantum cryptography</name>
      <t>Quantum computers, once available, will have a huge impact on TLS.
In 2016, the US National Institute of Standards and Technology started a
multi-year effort to standardize algorithms that will be "safe"
once quantum computers are feasible <xref target="PQC"/>. First IETF discussions happened
around the same time <xref target="CFRGSLIDES"/>.</t>
      <t>While the industry is waiting for NIST to finish standardization, the
IETF has several efforts underway.
A working group was formed in early 2013 to work on use of PQC in IETF protocols,
<xref target="PQUIPWG"/>.
Several other working groups, including TLS <xref target="TLSWG"/>,
are working on
drafts to support hybrid algorithms and identifiers, for use during a
transition from classic to a post-quantum world.</t>
      <t>For TLS it is important to note that the focus of these efforts is TLS 1.3
or later.
TLS 1.2 is WILL NOT be supported (see <xref target="iana"/>).
This is one more reason for new protocols to default to TLS 1.3, where
post-quantum cryptography is expected to be supported.</t>
    </section>
    <section anchor="tls-use-by-other-protocols">
      <name>TLS Use by Other Protocols</name>
      <t>Any new protocol that uses TLS <bcp14>MUST</bcp14> specify as its default TLS 1.3 (or a higher
TLS version, when one becomes stadardized).
For example, QUIC <xref target="QUICTLS"/> requires TLS 1.3 and specifies that endpoints
<bcp14>MUST</bcp14> terminate the connection if an older version is used.</t>
      <t>If deployment considerations are a concern, the protocol <bcp14>MAY</bcp14> specify TLS 1.2 as
an additional, non-default option.
As a counter example, the Usage Profile for DNS over TLS <xref target="DNSTLS"/> specifies
TLS 1.2 as the default, while also allowing TLS 1.3.
For newer specifications that choose to support TLS 1.2, those preferences are
to be reversed.</t>
    </section>
    <section anchor="sec-considerations">
      <name>Security Considerations</name>
      <t>TLS 1.2 was specified with several cryptographic primitives and design choices
that have historically hindered its security. The purpose of this section is to
briefly survey several such prominent problems that have affected the protocol.
It should be noted, however, that TLS 1.2 can be configured securely; it is
merely much more difficult to configure it securely as opposed to using its
modern successor, TLS 1.3. See <xref target="RFC9325"/> for a more thorough guide on the
secure deployment of TLS 1.2.</t>
      <t>Firstly, the TLS 1.2 protocol, without any extension points, is vulnerable to
the renegotiation attack and the Triple Handshake attack. Broadly, these attacks
exploit the protocol's support for renegotiation in order to inject a prefix
chosen by the attacker into the plaintext stream. This is usually a devastating
threat in practice, that allows e.g. obtaining secret cookies in a web setting.
Refer to <xref target="RENEG1"/>, <xref target="RENEG2"/>, <xref target="TRIPLESHAKE"/> for elaboration. In light of
the above problems, <xref target="RFC5746"/> specifies an extension that prevents this
category of attacks. To securely deploy TLS 1.2, either renegotiation must be
disabled entirely, or this extension must be present. Additionally, clients must
not allow servers to renegotiate the certificate during a connection.</t>
      <t>Secondly, the original key exchange methods specified for the protocol, namely
RSA key exchange and finite field Diffie-Hellman, suffer from several
weaknesses. As before, to securely deploy the protocol, these key exchange
methods must be disabled.
Refer to draft-obsolete-kex for elaboration (TODO I guess we will anyway
wait for WGLC for draft-obsolete-kex, so no sense to temporarily refer to the
draft.)</t>
      <t>Thirdly, symmetric ciphers which were widely-used in the protocol, namely RC4
and CBC cipher suites, suffer from several weaknesses. RC4 suffers from
exploitable biases in its key stream; see <xref target="RFC7465"/>. CBC cipher suites have
been a source of vulnerabilities throughout the years. A straightforward
implementation of these cipher suites inherently suffers from the Lucky13 timing
attack <xref target="LUCKY13"/>. The first attempt to implement the cipher suites in
constant time introduced an even more severe vulnerability <xref target="LUCKY13FIX"/>.
There have been further similar vulnerabilities throughout the
years exploiting CBC cipher suites; refer to e.g. <xref target="CBCSCANNING"/>
for an example and a survey of similar works.</t>
      <t>And lastly, historically the protocol was affected by several other attacks that
TLS 1.3 is immune to:
BEAST <xref target="BEAST"/>, Logjam <xref target="WEAKDH"/>, FREAK <xref target="FREAK"/>, and SLOTH <xref target="SLOTH"/>.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>This document makes no requests to IANA.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="TLS12">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="TLS13">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="QUICTLS">
          <front>
            <title>Using TLS to Secure QUIC</title>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <author fullname="S. Turner" initials="S." role="editor" surname="Turner"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document describes how Transport Layer Security (TLS) is used to secure QUIC.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9001"/>
          <seriesInfo name="DOI" value="10.17487/RFC9001"/>
        </reference>
        <reference anchor="DNSTLS">
          <front>
            <title>Usage Profiles for DNS over TLS and DNS over DTLS</title>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
            <author fullname="D. Gillmor" initials="D." surname="Gillmor"/>
            <author fullname="T. Reddy" initials="T." surname="Reddy"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document discusses usage profiles, based on one or more authentication mechanisms, which can be used for DNS over Transport Layer Security (TLS) or Datagram TLS (DTLS). These profiles can increase the privacy of DNS transactions compared to using only cleartext DNS. This document also specifies new authentication mechanisms -- it describes several ways that a DNS client can use an authentication domain name to authenticate a (D)TLS connection to a DNS server. Additionally, it defines (D)TLS protocol profiles for DNS clients and servers implementing DNS over (D)TLS. This document updates RFC 7858.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8310"/>
          <seriesInfo name="DOI" value="10.17487/RFC8310"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC9325">
          <front>
            <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="November" year="2022"/>
            <abstract>
              <t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are used to protect data exchanged over a wide range of application protocols and can also form the basis for secure transport protocols. Over the years, the industry has witnessed several serious attacks on TLS and DTLS, including attacks on the most commonly used cipher suites and their modes of operation. This document provides the latest recommendations for ensuring the security of deployed services that use TLS and DTLS. These recommendations are applicable to the majority of use cases.</t>
              <t>RFC 7525, an earlier version of the TLS recommendations, was published when the industry was transitioning to TLS 1.2. Years later, this transition is largely complete, and TLS 1.3 is widely available. This document updates the guidance given the new environment and obsoletes RFC 7525. In addition, this document updates RFCs 5288 and 6066 in view of recent attacks.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="195"/>
          <seriesInfo name="RFC" value="9325"/>
          <seriesInfo name="DOI" value="10.17487/RFC9325"/>
        </reference>
        <reference anchor="RFC5746">
          <front>
            <title>Transport Layer Security (TLS) Renegotiation Indication Extension</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="M. Ray" initials="M." surname="Ray"/>
            <author fullname="S. Dispensa" initials="S." surname="Dispensa"/>
            <author fullname="N. Oskov" initials="N." surname="Oskov"/>
            <date month="February" year="2010"/>
            <abstract>
              <t>Secure Socket Layer (SSL) and Transport Layer Security (TLS) renegotiation are vulnerable to an attack in which the attacker forms a TLS connection with the target server, injects content of his choice, and then splices in a new TLS connection from a client. The server treats the client's initial TLS handshake as a renegotiation and thus believes that the initial data transmitted by the attacker is from the same entity as the subsequent client data. This specification defines a TLS extension to cryptographically tie renegotiations to the TLS connections they are being performed over, thus preventing this attack. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5746"/>
          <seriesInfo name="DOI" value="10.17487/RFC5746"/>
        </reference>
        <reference anchor="RFC7465">
          <front>
            <title>Prohibiting RC4 Cipher Suites</title>
            <author fullname="A. Popov" initials="A." surname="Popov"/>
            <date month="February" year="2015"/>
            <abstract>
              <t>This document requires that Transport Layer Security (TLS) clients and servers never negotiate the use of RC4 cipher suites when they establish connections. This applies to all TLS versions. This document updates RFCs 5246, 4346, and 2246.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7465"/>
          <seriesInfo name="DOI" value="10.17487/RFC7465"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="PQC" target="https://csrc.nist.gov/projects/post-quantum-cryptography">
          <front>
            <title>Post=Quantum Cryptography</title>
            <author>
              <organization/>
            </author>
            <date year="2017" month="January"/>
          </front>
        </reference>
        <reference anchor="CFRGSLIDES" target="https://www.ietf.org/proceedings/95/slides/slides-95-cfrg-4.pdf">
          <front>
            <title>Post Quantum Secure Cryptography Discussion</title>
            <author initials="D." surname="McGrew" fullname="David McGrew">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="PQUIPWG" target="https://datatracker.ietf.org/wg/pquip/about/">
          <front>
            <title>Post-Quantum Use in Protocols</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="TLSWG" target="https://datatracker.ietf.org/wg/tls/about/">
          <front>
            <title>Transport Layer Security</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="TRIPLESHAKE" target="https://mitls.org/pages/attacks/3SHAKE">
          <front>
            <title>Triple Handshakes Considered Harmful Breaking and Fixing Authentication over TLS</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RENEG1" target="https://web.archive.org/web/20091231034700/http://www.educatedguesswork.org/2009/11/understanding_the_tls_renegoti.html">
          <front>
            <title>Understanding the TLS Renegotiation Attack</title>
            <author initials="E." surname="Rescorla" fullname="Eric Rescorla">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RENEG2" target="https://web.archive.org/web/20091228061844/http://extendedsubset.com/?p=8">
          <front>
            <title>Authentication Gap in TLS Renegotiation</title>
            <author initials="M." surname="Ray" fullname="Marsh Ray">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="LUCKY13" target="http://www.isg.rhul.ac.uk/tls/TLStiming.pdf">
          <front>
            <title>Lucky Thirteen: Breaking the TLS and DTLS record protocols</title>
            <author initials="N. J." surname="Al Fardan">
              <organization/>
            </author>
            <author initials="K. G." surname="Paterson">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="LUCKY13FIX" target="https://nds.rub.de/media/nds/veroeffentlichungen/2016/10/19/tls-attacker-ccs16.pdf">
          <front>
            <title>Systematic fuzzing and testing of TLS libraries</title>
            <author initials="J." surname="Somorovsky" fullname="Juraj Somorovsky">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="CBCSCANNING" target="https://www.usenix.org/system/files/sec19-merget.pdf">
          <front>
            <title>Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities</title>
            <author initials="R." surname="Merget" fullname="Robert Merget">
              <organization/>
            </author>
            <author initials="J." surname="Somorovsky" fullname="Juraj Somorovsky">
              <organization/>
            </author>
            <author initials="N." surname="Aviram" fullname="Nimrod Aviram">
              <organization/>
            </author>
            <author initials="C." surname="Young" fullname="Craig Young">
              <organization/>
            </author>
            <author initials="J." surname="Fliegenschmidt" fullname="Janis Fliegenschmidt">
              <organization/>
            </author>
            <author initials="J." surname="Schwenk" fullname="Jörg Schwenk">
              <organization/>
            </author>
            <author initials="Y." surname="Shavitt" fullname="Yuval Shavitt">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="BEAST" target="http://www.hpcc.ecs.soton.ac.uk/dan/talks/bullrun/Beast.pdf">
          <front>
            <title>Here come the xor ninjas</title>
            <author initials="T." surname="Duong" fullname="Thai Duong">
              <organization/>
            </author>
            <author initials="J." surname="Rizzo" fullname="Juliano Rizzo">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="WEAKDH" target="https://dl.acm.org/doi/pdf/10.1145/2810103.2813707">
          <front>
            <title>Imperfect forward secrecy: How Diffie-Hellman fails in practice</title>
            <author initials="D." surname="Adrian">
              <organization/>
            </author>
            <author initials="K." surname="Bhargavan">
              <organization/>
            </author>
            <author initials="Z." surname="Durumeric">
              <organization/>
            </author>
            <author initials="P." surname="Gaudry">
              <organization/>
            </author>
            <author initials="M." surname="Green">
              <organization/>
            </author>
            <author initials="J. A." surname="Halderman">
              <organization/>
            </author>
            <author initials="N." surname="Heninger">
              <organization/>
            </author>
            <author initials="D." surname="Springall">
              <organization/>
            </author>
            <author initials="E." surname="Thomé">
              <organization/>
            </author>
            <author initials="L." surname="Valenta">
              <organization/>
            </author>
            <author initials="B." surname="VanderSloot">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="FREAK" target="https://inria.hal.science/hal-01114250/file/messy-state-of-the-union-oakland15.pdf">
          <front>
            <title>A messy state of the union: Taming the composite state machines of TLS</title>
            <author initials="B." surname="Beurdouche" fullname="Benjamin Beurdouche">
              <organization/>
            </author>
            <author initials="K." surname="Bhargavan" fullname="Karthikeyan Bhargavan">
              <organization/>
            </author>
            <author initials="A." surname="Delignat-Lavaud" fullname="Antoine Delignat-Lavaud">
              <organization/>
            </author>
            <author initials="C." surname="Fournet" fullname="Cédric Fournet">
              <organization/>
            </author>
            <author initials="M." surname="Kohlweiss" fullname="Markulf Kohlweiss">
              <organization/>
            </author>
            <author initials="A." surname="Pironti" fullname="Alfredo Pironti">
              <organization/>
            </author>
            <author initials="P.-Y." surname="Strub" fullname="Pierre-Yves Strub">
              <organization/>
            </author>
            <author initials="J. K." surname="Zinzindohoue" fullname="Jean Karim Zinzindohoue">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="SLOTH" target="https://inria.hal.science/hal-01244855/file/SLOTH_NDSS16.pdf">
          <front>
            <title>Transcript collision attacks: Breaking authentication in TLS, IKE, and SSH</title>
            <author initials="K." surname="Bhargavan" fullname="Karthikeyan Bhargavan">
              <organization/>
            </author>
            <author initials="G." surname="Leurent" fullname="Gaëtan Leurent">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 286?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>None yet.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
