<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.17 (Ruby 3.0.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc rfcedstyle="yes"?>
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc text-list-symbols="-o*+"?>
<?rfc docmapping="yes"?>

<rfc ipr="trust200902" docName="draft-tschofenig-tls-extended-key-update-02" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="Extended Key Update for TLS">Extended Key Update for Transport Layer Security (TLS) 1.3</title>

    <author initials="H." surname="Tschofenig" fullname="Hannes Tschofenig">
      <organization>Siemens</organization>
      <address>
        <email>hannes.tschofenig@gmx.net</email>
      </address>
    </author>
    <author initials="M." surname="Tüxen" fullname="Michael Tüxen">
      <organization>Münster Univ. of Applied Sciences</organization>
      <address>
        <email>tuexen@fh-muenster.de</email>
      </address>
    </author>
    <author initials="T." surname="Reddy" fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author initials="S." surname="Fries" fullname="Steffen Fries">
      <organization>Siemens</organization>
      <address>
        <email>steffen.fries@siemens.com</email>
      </address>
    </author>
    <author initials="Y." surname="Rosomakho" fullname="Yaroslav Rosomakho">
      <organization>Zscaler</organization>
      <address>
        <email>yrosomakho@zscaler.com</email>
      </address>
    </author>

    <date year="2024" month="July" day="08"/>

    <area>Security</area>
    <workgroup>Transport Layer Security</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 82?>

<t>The Transport Layer Security (TLS) 1.3 specification offers a dedicated
message to update cryptographic keys during the lifetime of an ongoing session.
The traffic secret and the initialization vector are updated directionally
but the sender may trigger the recipient, via the request_update field,
to transmit a key update message in the reverse direction.</t>

<t>In environments where sessions are long-lived, such as industrial IoT or
telecommunication networks, this key update alone is insufficient since
forward secrecy is not offered via this mechanism. Earlier versions
of TLS allowed the two peers to perform renegotiation, which is a handshake
that establishes new cryptographic parameters for an existing session.
When a security vulnerability with the renegotiation mechanism was discovered,
RFC 5746 was developed as a fix. Renegotiation has, however, been removed from
version 1.3 leaving a gap in the feature set of TLS.</t>

<t>This specification defines an extended key update that supports forward secrecy.</t>



    </abstract>



  </front>

  <middle>


<?line 101?>

<section anchor="introduction"><name>Introduction</name>

<t>The features of TLS and DTLS have changed over the years and while newer versions
optimized the protocol and at the same time enhanced features (often with the help
of extensions) some functionality was removed without replacement. The ability to
update keys and initialization vectors has been added in TLS 1.3 <xref target="I-D.ietf-tls-rfc8446bis"/>
using the KeyUpdate message and it intended to (partially) replace renegotiation from earlier
TLS versions. The renegotiation feature, while complex, offered additional
functionality that is not supported with TLS 1.3 anymore, including the update
keys with a Diffie-Hellman exchange during the lifetime of a session.</t>

<t>There are use cases of TLS and DTLS where long-lived sessions are common. In those
environments, such as industrial IoT and telecommunication networks, availability
is important and an interruption of the communication due to periodic session
resumptions is not an option. Re-running a handshake with (EC)DHE and switching from
the old to the new session may be a solution for some applications but introduces
complexity, impacts performance and may lead to service interruption as well.</t>

<t>Some deployments have used IPsec in the past to secure their communication protocol
and have now decided to switch to TLS or DTLS instead. The requirement for updates of
cryptographic keys for an existing session has become a requirement. For IPsec, NIST,
BSI, and ANSSI recommend to re-run Diffie-Hellman exchanges frequently to provide forward
secrecy and force attackers to perform a dynamic key extraction <xref target="RFC7624"/>. ANSSI
writes "It is recommended to force the periodic renewal of the keys, e.g., every
hour and every 100 GB of data, in order to limit the impact of a key compromise."
<xref target="ANSSI-DAT-NT-003"/>. While IPsec/IKEv2 <xref target="RFC7296"/> offers the desired functionality,
developers often decide to use TLS/DTLS to simplify integration with cloud-based
environments.</t>

<t>This specification defines a new, extended key update message supporting perfect
forward secrecy.  It does so by utilizing a Diffie-Hellman exchange using one of
the groups negotiated during the initial exchange.  The support for this extension
is signaled using the TLS flags extension mechanism.  The frequent re-running of
extended key update forces an attacker to do dynamic key exfiltration.</t>

<t>This specification is applicable to both TLS 1.3 <xref target="I-D.ietf-tls-rfc8446bis"/> and
DTLS 1.3 <xref target="RFC9147"/>. Throughout the specification we do not distinguish between
these two protocols unless necessary for better understanding.</t>

</section>
<section anchor="terminology-and-requirements-language"><name>Terminology and Requirements Language</name>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119 <xref target="RFC2119"/>.</t>

<t>To distinguish the key update procedure defined in <xref target="I-D.ietf-tls-rfc8446bis"/>
from the key update procedure specified in this document, we use the terms
"key update" and "extended key update", respectively.</t>

</section>
<section anchor="key-exfiltration-and-forward-secrecy"><name>Key Exfiltration and Forward Secrecy</name>

<t><xref target="RFC9325"/> provides a good summary of what (perfect) forward secrecy
is and how it relates to the TLS protocol. In summary, it says:</t>

<t>"Forward secrecy (also called "perfect forward secrecy" or "PFS") is a
defense against an attacker who records encrypted conversations where
the session keys are only encrypted with the communicating parties'
long-term keys. Should the attacker be able to obtain these long-term
keys at some point later in time, the session keys and thus the entire
conversation could be decrypted."</t>

<t>Appendix F of <xref target="I-D.ietf-tls-rfc8446bis"/> goes into details of
explaining the security properties of the TLS 1.3 protocol and notes
"... forward secrecy without rerunning (EC)DHE does not stop an attacker
from doing static key exfiltration". It concludes with a recommendation
by saying: "Frequently rerunning (EC)DHE forces an attacker to do dynamic
key exfiltration (or content exfiltration)." The terms static and dynamic
key exfiltration are defined in <xref target="RFC7624"/>. Dynamic key exfiltration,
refers to attacks in which the collaborator delivers keying material to
the attacker frequently, e.g., on a per-session basis. Static key
exfiltration means that the transfer of keys happens once or rarely
and that the transferred key is typically long-lived.</t>

</section>
<section anchor="negotiating-the-extended-key-update"><name>Negotiating the Extended Key Update</name>

<t>Client and servers use the TLS flags extension
<xref target="I-D.ietf-tls-tlsflags"/> to indicate support for the functionality
defined in this document.  We call this the "extended_key_update"
extension and the corresponding flag is called "Extended_Key_Update"
flag.</t>

<t>The "Extended_Key_Update" flag proposed by the client in the
ClientHello (CH) MUST be acknowledged in the EncryptedExtensions
(EE), if the server also supports the functionality defined in this
document and is configured to use it.</t>

<t>If the "Extended_Key_Update" flag is not set, servers ignore any the
functionality specified in this document and applications that
require perfect forward security will have to initiate a full
handshake.</t>

</section>
<section anchor="ext-key-update"><name>Extended Key Update Message</name>

<t>The ExtendedKeyUpdate handshake message is used to indicate an update
of cryptographic keys. This key update process can be sent by either
peer after it has sent a Finished message.  Implementations that
receive a ExtendedKeyUpdate message prior to receiving a Finished
message MUST terminate the connection with an "unexpected_message"
alert.</t>

<t>The KeyShare entry in the ExtendedKeyUpdate message MUST be the same
group mutually supported by the client and server during the initial
handshake. The peers MUST NOT send a KeyShare Entry in the ExtendedKeyUpdate
message that is not mutually supported by the client and server during
the initial handshake. An implementation that receives any other value
MUST terminate the connection with an "illegal_parameter" alert.</t>

<t><xref target="fig-key-update"/> shows the interaction graphically.
First, support for the functionality in this specification
is negotiated in the ClientHello and the EncryptedExtensions
messages. Then, the ExtendedKeyUpdate exchange is sent to
update the application traffic secrets.</t>

<figure title="Extended Key Update Message Exchange." anchor="fig-key-update"><artwork><![CDATA[
       Client                                           Server

Key  ^ ClientHello
Exch | + key_share
     | + signature_algorithms
     v + Extended_Key_Update       -------->
                                                  ServerHello  ^ Key
                                                  + key_share  | Exch
                                                               v
                                        {EncryptedExtensions   ^ Server
                                       + Extended_Key_Update}  | Params
                                         {CertificateRequest}  v
                                                {Certificate}  ^
                                          {CertificateVerify}  | Auth
                                                   {Finished}  v
                               <--------
     ^ {Certificate}
Auth | {CertificateVerify}
     v {Finished}              -------->
       [Application Data]      <------->  [Application Data]
                                  ...
[ExtendedKeyUpdateRequest]     -------->
                               <--------  [ExtendedKeyUpdateResponse]
                                  ...
            [NewKeyUpdate]     <-------
                               -------->  [NewKeyUpdate]
                                  ...
       [Application Data]      <------->  [Application Data]
]]></artwork></figure>

<t>The structure of the ExtendedKeyUpdate message is shown below.</t>

<figure><artwork><![CDATA[
struct {
  KeyShareEntry key_share;
} ExtendedKeyUpdateRequest;

struct {
  KeyShareEntry key_share;
} ExtendedKeyUpdateResponse;

struct {
} NewKeyUpdate;
]]></artwork></figure>

<t>key_exchange:  Key exchange information.  The contents of this field
  are determined by the specified group and its corresponding
  definition. The structures are defined in <xref target="I-D.ietf-tls-rfc8446bis"/>.</t>

<t>The extended key update exchange is performed between the initiator and the
responder whereby the initiator may be the TLS client or the TLS server. The
exchange has the following steps:</t>

<t><list style="numbers" type="1">
  <t>Initiator sends a ExtendedKeyUpdateRequest message, which contains
a key share. While an extended key update is in progress, the initiator
MUST NOT initiate further key updates.</t>
  <t>On receipt of the ExtendedKeyUpdateRequest message, the responder
sends the ExtendedKeyUpdateResponse message. This message contains the
key share of the responder. While an extended key update is in progress,
the responder MUST NOT initiate further key updates.</t>
  <t>On receipt of the ExtendedKeyUpdateResponse message, the initiator
is able to derive a secret key based on the exchanged key shares.
After sending a NewKeyUpdate message, the initiator MUST update its
traffic keys and MUST send all its traffic using the next generation of keys.</t>
  <t>On receipt of the NewKeyUpdate message by the responder, it MUST update
its receive keys. In response, the responder transmits a NewKeyUpdate message
and MUST update its sending keys.</t>
</list></t>

<t>Both sender and receiver MUST encrypt their NewKeyUpdate messages with
the old keys. Additionally, both sides MUST enforce that a NewKeyUpdate
with the old key is received before accepting any messages encrypted
with the new key.</t>

<t>If TLS peers independently initiate the extended key update
procedure and the requests cross in flight, the ExtendedKeyUpdateRequest
message with the lower lexicographic order for the key_exchange value
in the KeyShareEntry will be discarded by the TLS peers. This approach prevents
each side incrementing keys by two generations.</t>

<t>Endpoints MAY handle an excessive number of ExtendedKeyUpdateRequest messages by
terminating the connection using a "too_many_extendedkeyupdate_requested" alert (alert number TBD).</t>

<figure title="Handshake Structure." anchor="fig-handshake"><artwork><![CDATA[
      struct {
          HandshakeType msg_type;    /* handshake type */
          uint24 length;             /* bytes in message */
          select (Handshake.msg_type) {
              case client_hello:          ClientHello;
              case server_hello:          ServerHello;
              case end_of_early_data:     EndOfEarlyData;
              case encrypted_extensions:  EncryptedExtensions;
              case certificate_request:   CertificateRequest;
              case certificate:           Certificate;
              case certificate_verify:    CertificateVerify;
              case finished:              Finished;
              case new_session_ticket:    NewSessionTicket;
              case key_update:            KeyUpdate;
              case extended_key_update:   ExtendedKeyUpdate;
          };
      } Handshake;
]]></artwork></figure>

<t>The ExtendedKeyUpdate and the KeyUpdates MAY be used in combination
over the lifetime of a TLS communication session, depending on the
desired security properties.</t>

</section>
<section anchor="key_update"><name>Updating Traffic Secrets</name>

<t>The ExtendedKeyUpdate handshake message is used to indicate that
the sender is updating its sending cryptographic keys.  This message can
be sent by either endpoint after the Finished messages have been exchanged.</t>

<t>The design of the key derivation function for computing the next generation
of application_traffic_secret is motivated by the desire to include</t>

<t><list style="symbols">
  <t>the old traffic secret as well as a secret derived from the DH
exchange or from the hybrid key exchange,</t>
  <t>the concatenation of the ExtendedKeyUpdateRequest and the
ExtendedKeyUpdateResponse messages, which contain the key shares, binding
the encapsulated shared secret ciphertext to IKM in case of hybrid key
exchange, providing MAL-BIND-K-CT security (see <xref target="CDM23"/>), and</t>
  <t>a new label string to distinguish it from the application traffic
secret computation defined in <xref target="I-D.ietf-tls-rfc8446bis"/> for use with
the regular KeyUpdate.</t>
</list></t>

<figure><artwork><![CDATA[
sk = HKDF-Extract(Transcript-Hash(KeyUpdateMessages), secret)

application_traffic_secret_N+1 =
    HKDF-Expand-Label(sk,
                      "traffic up2", application_traffic_secret_N,
                      Hash.length)
]]></artwork></figure>

<t>The traffic keys are re-derived from the client_/server_application_traffic_secret_N+1
as described in Section 7.3 of <xref target="I-D.ietf-tls-rfc8446bis"/>.</t>

<t>Once client_/server_application_traffic_secret_N+1 and its associated
traffic keys have been computed, implementations SHOULD delete
client_/server_application_traffic_secret_N and its associated
traffic keys. Note: The client_/server_application_traffic_secret_N and
its associated traffic keys can only be deleted after receiving the
NewKeyUpdate message.</t>

</section>
<section anchor="example"><name>Example</name>

<t><xref target="fig-key-update"/> shows the interaction between a TLS 1.3 client
and server graphically. This section shows an example message exchange
where a client updates its sending keys.</t>

<t>There are two phases:</t>

<t><list style="numbers" type="1">
  <t>The support for the functionality in this specification
is negotiated in the ClientHello and the EncryptedExtensions
messages.</t>
  <t>Once the initial handshake is completed, a key update can be
triggered.</t>
</list></t>

<t><xref target="fig-key-update2"/> provides an overview of the exchange starting
with the initial negotiation followed by the key update.</t>

<figure title="Extended Key Update Message Exchange." anchor="fig-key-update2"><artwork><![CDATA[
       Client                                           Server

Key  ^ ClientHello
Exch | + key_share
     | + signature_algorithms
     v + extended_key_update
                             -------->
                                                  ServerHello  ^ Key
                                                  + key_share  | Exch
                                                               v
                                        {EncryptedExtensions   ^ Server
                                       + extended_key_update}  | Params
                                         {CertificateRequest}  v
                                                {Certificate}  ^
                                          {CertificateVerify}  | Auth
                                                   {Finished}  v
                               <--------
     ^ {Certificate}
Auth | {CertificateVerify}
     v {Finished}              -------->
                                  ...
                              some time later
                                  ...
 [ExtendedKeyUpdateRequest]    -------->
  (with KeyShare)
                               <-------- [ExtendedKeyUpdateResponse]
                                           (with KeyShare)
 [NewKeyUpdate]                -------->
                               <-------- [NewKeyUpdate]
]]></artwork></figure>

</section>
<section anchor="dtls-13-considerations"><name>DTLS 1.3 Considerations</name>

<t>Due to the possibility of a NewKeyUpdate message being lost and
thereby preventing the sender of the NewKeyUpdate message
from updating its keying material, receivers MUST retain the
pre-update keying material until receipt and successful decryption
of a message using the new keys.</t>

<t>Due to loss and/or reordering, DTLS 1.3 implementations may receive a
record with an older epoch than the current one. They SHOULD attempt to
process those records with that epoch but MAY opt to discard
such out-of-epoch records.</t>

</section>
<section anchor="post-quantum-cryptogrphy-considerations"><name>Post-Quantum Cryptogrphy Considerations</name>

<t>Hybrid key exchange refers to using multiple key exchange algorithms
simultaneously and combining the result with the goal of providing
security even if all but one of the component algorithms is broken.
The transition to post-quantum cryptography motivates the introduction
of hybrid key exchanges to TLS, as described in
<xref target="I-D.ietf-tls-hybrid-design"/>. When the hybrid key exchange is used
then the key_exchange field of a KeyShareEntry in the initial exchange
is the concatenation of the key_exchange field for each of the algorithms.
The same approach is then re-used in the extended key update when
key shares are exchanged.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>This entire document is about security.</t>

<t>When utilizing this extension it is important to understand the interaction
with ticket-based resumption since resumption without the execution of
a Diffie-Hellman exchange offering forward secrecy will potentially undo
updates to the application traffic secret derivation, depending on when
tickets have been exchanged.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>IANA is requested to allocate value TBD for the "too_many_extendedkeyupdate_requested" alert
in the "TLS Alerts" registry. The value for the "DTLS-OK" column is "Y".</t>

<t>IANA is requested to add the following entry to the "TLS Flags"
extension registry <xref target="TLS-Ext-Registry"/>:</t>

<t><list style="symbols">
  <t>Value: TBD1</t>
  <t>Flag Name: extended_key_update</t>
  <t>Messages: CH, EE</t>
  <t>Recommended: Y</t>
  <t>Reference: [This document]</t>
</list></t>

<t>IANA is requested to add the following entry to the "TLS
HandshakeType" registry <xref target="TLS-Ext-Registry"/>:</t>

<t><list style="symbols">
  <t>Value: TBD2</t>
  <t>Description: extended_key_update</t>
  <t>DTLS-OK: Y</t>
  <t>Reference: [This document]</t>
  <t>Comment:</t>
</list></t>

</section>


  </middle>

  <back>


    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>


<reference anchor="I-D.ietf-tls-rfc8446bis">
   <front>
      <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
      <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
         <organization>Windy Hill Systems, LLC</organization>
      </author>
      <date day="3" month="March" year="2024"/>
      <abstract>
	 <t>   This document specifies version 1.3 of the Transport Layer Security
   (TLS) protocol.  TLS allows client/server applications to communicate
   over the Internet in a way that is designed to prevent eavesdropping,
   tampering, and message forgery.

   This document updates RFCs 5705, 6066, 7627, and 8422 and obsoletes
   RFCs 5077, 5246, 6961, and 8446.  This document also specifies new
   requirements for TLS 1.2 implementations.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8446bis-10"/>
   
</reference>

<reference anchor="RFC9147">
  <front>
    <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
    <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
    <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
    <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
    <date month="April" year="2022"/>
    <abstract>
      <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
      <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
      <t>This document obsoletes RFC 6347.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9147"/>
  <seriesInfo name="DOI" value="10.17487/RFC9147"/>
</reference>


<reference anchor="I-D.ietf-tls-tlsflags">
   <front>
      <title>A Flags Extension for TLS 1.3</title>
      <author fullname="Yoav Nir" initials="Y." surname="Nir">
         <organization>Dell Technologies</organization>
      </author>
      <date day="16" month="March" year="2024"/>
      <abstract>
	 <t>   A number of extensions are proposed in the TLS working group that
   carry no interesting information except the 1-bit indication that a
   certain optional feature is supported.  Such extensions take 4 octets
   each.  This document defines a flags extension that can provide such
   indications at an average marginal cost of 1 bit each.  More
   precisely, it provides as many flag extensions as needed at 4 + the
   order of the last set bit divided by 8.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-tls-tlsflags-13"/>
   
</reference>




    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="RFC9325">
  <front>
    <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
    <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
    <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
    <author fullname="T. Fossati" initials="T." surname="Fossati"/>
    <date month="November" year="2022"/>
    <abstract>
      <t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are used to protect data exchanged over a wide range of application protocols and can also form the basis for secure transport protocols. Over the years, the industry has witnessed several serious attacks on TLS and DTLS, including attacks on the most commonly used cipher suites and their modes of operation. This document provides the latest recommendations for ensuring the security of deployed services that use TLS and DTLS. These recommendations are applicable to the majority of use cases.</t>
      <t>RFC 7525, an earlier version of the TLS recommendations, was published when the industry was transitioning to TLS 1.2. Years later, this transition is largely complete, and TLS 1.3 is widely available. This document updates the guidance given the new environment and obsoletes RFC 7525. In addition, this document updates RFCs 5288 and 6066 in view of recent attacks.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="195"/>
  <seriesInfo name="RFC" value="9325"/>
  <seriesInfo name="DOI" value="10.17487/RFC9325"/>
</reference>

<reference anchor="RFC7296">
  <front>
    <title>Internet Key Exchange Protocol Version 2 (IKEv2)</title>
    <author fullname="C. Kaufman" initials="C." surname="Kaufman"/>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <author fullname="Y. Nir" initials="Y." surname="Nir"/>
    <author fullname="P. Eronen" initials="P." surname="Eronen"/>
    <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
    <date month="October" year="2014"/>
    <abstract>
      <t>This document describes version 2 of the Internet Key Exchange (IKE) protocol. IKE is a component of IPsec used for performing mutual authentication and establishing and maintaining Security Associations (SAs). This document obsoletes RFC 5996, and includes all of the errata for it. It advances IKEv2 to be an Internet Standard.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="79"/>
  <seriesInfo name="RFC" value="7296"/>
  <seriesInfo name="DOI" value="10.17487/RFC7296"/>
</reference>

<reference anchor="RFC7624">
  <front>
    <title>Confidentiality in the Face of Pervasive Surveillance: A Threat Model and Problem Statement</title>
    <author fullname="R. Barnes" initials="R." surname="Barnes"/>
    <author fullname="B. Schneier" initials="B." surname="Schneier"/>
    <author fullname="C. Jennings" initials="C." surname="Jennings"/>
    <author fullname="T. Hardie" initials="T." surname="Hardie"/>
    <author fullname="B. Trammell" initials="B." surname="Trammell"/>
    <author fullname="C. Huitema" initials="C." surname="Huitema"/>
    <author fullname="D. Borkmann" initials="D." surname="Borkmann"/>
    <date month="August" year="2015"/>
    <abstract>
      <t>Since the initial revelations of pervasive surveillance in 2013, several classes of attacks on Internet communications have been discovered. In this document, we develop a threat model that describes these attacks on Internet confidentiality. We assume an attacker that is interested in undetected, indiscriminate eavesdropping. The threat model is based on published, verified attacks.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7624"/>
  <seriesInfo name="DOI" value="10.17487/RFC7624"/>
</reference>


<reference anchor="I-D.ietf-tls-hybrid-design">
   <front>
      <title>Hybrid key exchange in TLS 1.3</title>
      <author fullname="Douglas Stebila" initials="D." surname="Stebila">
         <organization>University of Waterloo</organization>
      </author>
      <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
         <organization>Cisco Systems</organization>
      </author>
      <author fullname="Shay Gueron" initials="S." surname="Gueron">
         <organization>University of Haifa</organization>
      </author>
      <date day="5" month="April" year="2024"/>
      <abstract>
	 <t>   Hybrid key exchange refers to using multiple key exchange algorithms
   simultaneously and combining the result with the goal of providing
   security even if all but one of the component algorithms is broken.
   It is motivated by transition to post-quantum cryptography.  This
   document provides a construction for hybrid key exchange in the
   Transport Layer Security (TLS) protocol version 1.3.

   Discussion of this work is encouraged to happen on the TLS IETF
   mailing list tls@ietf.org or on the GitHub repository which contains
   the draft: https://github.com/dstebila/draft-ietf-tls-hybrid-design.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-tls-hybrid-design-10"/>
   
</reference>


<reference anchor="ANSSI-DAT-NT-003" target="https://www.ssi.gouv.fr/uploads/2015/09/NT_IPsec_EN.pdf">
  <front>
    <title>Recommendations for securing networks with IPsec, Technical Report</title>
    <author >
      <organization>ANSSI</organization>
    </author>
    <date year="2015" month="August"/>
  </front>
</reference>
<reference anchor="TLS-Ext-Registry" target="https://www.iana.org/assignments/tls-extensiontype-values">
  <front>
    <title>Transport Layer Security (TLS) Extensions</title>
    <author >
      <organization>IANA</organization>
    </author>
    <date year="2023" month="November"/>
  </front>
</reference>
<reference anchor="CDM23" target="https://eprint.iacr.org/2023/1933.pdf">
  <front>
    <title>Keeping Up with the KEMs: Stronger Security Notions for KEMs and automated analysis of KEM-based protocols</title>
    <author >
      <organization>ACM</organization>
    </author>
    <date year="2023" month="November"/>
  </front>
</reference>


    </references>


<?line 485?>

<section anchor="acknowledgments"><name>Acknowledgments</name>

<t>We would like to thank the members of the "TSVWG DTLS for SCTP
Requirements Design Team" for their discussion. The members, in
no particular order, were:</t>

<t><list style="symbols">
  <t>Marcelo Ricardo Leitner</t>
  <t>Zaheduzzaman Sarker</t>
  <t>Magnus Westerlund</t>
  <t>John Mattsson</t>
  <t>Claudio Porfiri</t>
  <t>Xin Long</t>
  <t>Michael Tüxen</t>
  <t>Hannes Tschofenig</t>
  <t>K Tirumaleswar Reddy</t>
  <t>Bertrand Rault</t>
</list></t>

<t>Additionally, we would like to thank the chairs of the
Transport and Services Working Group (tsvwg) Gorry Fairhurst and
Marten Seemann as well as the responsible area director Martin Duke.</t>

<t>Finally, we would like to thank Martin Thomson, Ilari Liusvaara,
Benjamin Kaduk, Scott Fluhrer, Dennis Jackson, David Benjamin,
and Thom Wiggers for their review comments.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

