<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.11 (Ruby 3.1.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-turner-netconf-over-tls13-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.12.10 -->
  <front>
    <title abbrev="NETCONF over TLS 1.3">NETCONF over TLS 1.3</title>
    <seriesInfo name="Internet-Draft" value="draft-turner-netconf-over-tls13-00"/>
    <author initials="S." surname="Turner" fullname="Sean Turner">
      <organization>sn3rd</organization>
      <address>
        <email>sean@sn3rd.com</email>
      </address>
    </author>
    <author initials="R." surname="Housley" fullname="Russ Housley">
      <organization abbrev="Vigil Security">Vigil Security, LLC</organization>
      <address>
        <postal>
          <street>516 Dranesville Road</street>
          <city>Herndon, VA</city>
          <code>20170</code>
          <country>US</country>
        </postal>
        <email>housley@vigilsec.com</email>
      </address>
    </author>
    <date year="2022" month="June" day="17"/>
    <area>Operations and Management</area>
    <workgroup>Network Configuration</workgroup>
    <keyword>NETCONF</keyword>
    <keyword>TLS 1.3</keyword>
    <abstract>
      <t>RFC 7589 defines how to protect NETCONF messages with TLS 1.2.
This document describes how to protect NETCONF messages with TLS 1.3.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Network Configuration Working Group mailing list (netconf@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/netconf/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/seanturner/netconf-over-tls13"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t><xref target="RFC7589"/> defines how to protect NETCONF messages <xref target="RFC6241"/> with
TLS 1.2 <xref target="RFC5246"/>. This document describes defines how to protect
NETCONF messages with TLS 1.3 <xref target="I-D.ietf-tls-rfc8446bis"/>.</t>
      <t>This document addresses cipher suites and the use of early data, which is also
known as 0-RTT data. It also updates the "netconf-tls" IANA Registered Port
Number entry to refer to this document. All other provisions set forth
in <xref target="RFC7589"/> are unchanged, including connection initiation, message framing,
connection closure, certificate validation, server identity, and client
identity.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="early-data">
      <name>Early Data</name>
      <t>Early data (aka 0-RTT data) is a mechanism defined in TLS 1.3
<xref target="I-D.ietf-tls-rfc8446bis"/> that allows a client to send data ("early data")
as part of the first flight of messages to a server. Early data is
permitted by TLS 1.3 when the client and server share a PSK, either obtained
externally or via a previous handshake. The client uses the PSK to
authenticate the server and to encrypt the early data.</t>
      <t>As noted in <xref section="2.3" sectionFormat="of" target="I-D.ietf-tls-rfc8446bis"/>, the security
properties for early data are weaker than those for subsequent TLS-protected
data. In particular, early data is not forward secret, and there are no
protection against the replay of early data between connections.
<xref section="E.5" sectionFormat="of" target="I-D.ietf-tls-rfc8446bis"/> requires applicaitons not
use early data without a profile that defines its use. This document
specifies that implementations <bcp14>MUST NOT</bcp14> use early data.</t>
    </section>
    <section anchor="cipher-suites">
      <name>Cipher Suites</name>
      <t>Implementations <bcp14>MUST</bcp14> support TLS 1.3 <xref target="I-D.ietf-tls-rfc8446bis"/>, and
implementation are <bcp14>REQUIRED</bcp14> to support the mandatory-to-implement cipher
suites listed in <xref section="9.1" sectionFormat="of" target="I-D.ietf-tls-rfc8446bis"/>.</t>
      <t>Implementations <bcp14>MAY</bcp14> implement additional TLS cipher suites that provide
mutual authentication and confidentiality, which are required for NETCONF
<xref target="RFC6241"/>.</t>
      <t>Implementations <bcp14>SHOULD</bcp14> follow the recommendations given in
<xref target="I-D.ietf-uta-rfc7525bis"/>.</t>
      <artwork><![CDATA[
So, this is what {{Section 9.1 of I-D.ietf-tls-rfc8446bis}} says:

  A TLS-compliant application MUST implement the TLS_AES_128_GCM_SHA256
  [GCM] cipher suite and SHOULD implement the TLS_AES_256_GCM_SHA384
  [GCM] and TLS_CHACHA20_POLY1305_SHA256 [RFC8439] cipher suites (see
  Appendix B.4).

  A TLS-compliant application MUST support digital signatures with
  rsa_pkcs1_sha256 (for certificates), rsa_pss_rsae_sha256 (for
  CertificateVerify and certificates), and ecdsa_secp256r1_sha256.  A
  TLS-compliant application MUST support key exchange with secp256r1
  (NIST P-256) and SHOULD support key exchange with X25519 [RFC7748].

Is there any reason to narrow the algorithm choices?

My guess is not.  These ought to be available in all TLS libraries.
]]></artwork>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Please review the Security Considerations in TLS 1.3 <xref target="I-D.ietf-tls-rfc8446bis"/>.</t>
      <t>Please review the recommendations regarding Diffie-Hellman exponent reuse
in <xref section="7.4" sectionFormat="of" target="I-D.ietf-uta-rfc7525bis"/>.</t>
      <t>Please review the Security Considerations in NETCONF <xref target="RFC6241"/>.</t>
      <t>NETCONF is used to access configuration and state information and to
modify configuration information. TLS 1.3 mutual authentication is used
to ensure that only authorized users and systems are able to view the
NETCONF server's configuration and state or to modify the NETCONF
server's configuration. To this end, neither the client nor the server
should establish a NETCONF over TLS 1.3 connection with an unknown,
unexpected, or incorrect peer identity; see <xref section="7" sectionFormat="of" target="RFC7589"/>. If
deployments make use of this list of Certification Authority (CA)
certificates <xref target="RFC5280"/>, then the listed CAs should only issue certificates
to parties that are authorized to access the NETCONF servers. Doing otherwise
will allow certificates that were issued for other purposes to be
inappropriately accepted by a NETCONF server.</t>
      <t>Please review <xref target="RFC6125"/> for further details on generic host name
validation in the TLS context.</t>
      <t>Please review the recommendations regarding certificate revocation checking
in <xref section="7.5" sectionFormat="of" target="I-D.ietf-uta-rfc7525bis"/>.</t>
      <t><xref target="RFC5539"/> assumes that the end-of-message (EOM) sequence, ]]&gt;]]&gt;,
cannot appear in any well-formed XML document, which turned out to be
mistaken. The EOM sequence can cause operational problems and open
space for attacks if sent deliberately in NETCONF messages. While it is
possible, the likelihood is believed to be very low.  The EOM sequence is
used for the initial &lt;hello&gt; message to avoid incompatibility with existing
implementations.  When the client and server both implement the :base:1.1
capability, a proper framing protocol (see <xref section="3" sectionFormat="of" target="RFC7589"/>) is used
for the rest of the NETCONF session, to avoid injection attacks.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to add a reference to this document in the
"netconf-tls" entry in the "Registered Port Numbers". The updated
registry entry would appear as follows:</t>
      <artwork><![CDATA[
 Service Name:           netconf-tls
 Transport Protocol(s):  TCP
 Assignee:               IESG <iesg@ietf.org>
 Contact:                IETF Chair <chair@ietf.org>
 Description:            NETCONF over TLS
 Reference:              RFC 7589, [THIS RFC]
 Port Number:            6513
]]></artwork>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC7589">
          <front>
            <title>Using the NETCONF Protocol over Transport Layer Security (TLS) with Mutual X.509 Authentication</title>
            <author fullname="M. Badra" initials="M." surname="Badra">
              <organization/>
            </author>
            <author fullname="A. Luchuk" initials="A." surname="Luchuk">
              <organization/>
            </author>
            <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder">
              <organization/>
            </author>
            <date month="June" year="2015"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) provides mechanisms to install, manipulate, and delete the configuration of network devices. This document describes how to use the Transport Layer Security (TLS) protocol with mutual X.509 authentication to secure the exchange of NETCONF messages.  This revision of RFC 5539 documents the new message framing used by NETCONF 1.1 and it obsoletes RFC 5539.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7589"/>
          <seriesInfo name="DOI" value="10.17487/RFC7589"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns">
              <organization/>
            </author>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund">
              <organization/>
            </author>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder">
              <organization/>
            </author>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman">
              <organization/>
            </author>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices.  It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages.  The NETCONF protocol operations are realized as remote procedure calls (RPCs).  This document obsoletes RFC 4741.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="I-D.ietf-tls-rfc8446bis">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="Eric Rescorla">
              <organization>Mozilla</organization>
            </author>
            <date day="7" month="March" year="2022"/>
            <abstract>
              <t>   This document specifies version 1.3 of the Transport Layer Security
   (TLS) protocol.  TLS allows client/server applications to communicate
   over the Internet in a way that is designed to prevent eavesdropping,
   tampering, and message forgery.

   This document updates RFCs 5705, 6066, 7627, and 8422 and obsoletes
   RFCs 5077, 5246, 6961, and 8446.  This document also specifies new
   requirements for TLS 1.2 implementations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8446bis-04"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="I-D.ietf-uta-rfc7525bis">
          <front>
            <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Yaron Sheffer">
              <organization>Intuit</organization>
            </author>
            <author fullname="Peter Saint-Andre">
              <organization>independent</organization>
            </author>
            <author fullname="Thomas Fossati">
              <organization>arm</organization>
            </author>
            <date day="26" month="May" year="2022"/>
            <abstract>
              <t>   Transport Layer Security (TLS) and Datagram Transport Layer Security
   (DTLS) are widely used to protect data exchanged over application
   protocols such as HTTP, SMTP, IMAP, POP, SIP, and XMPP.  Over the
   years, the industry has witnessed several serious attacks on TLS and
   DTLS, including attacks on the most commonly used cipher suites and
   their modes of operation.  This document provides the latest
   recommendations for ensuring the security of deployed services that
   use TLS and DTLS.  These recommendations are applicable to the
   majority of use cases.

   An earlier version of this document was published as RFC 7525 when
   the industry was in the midst of its transition to TLS 1.2.  Years
   later this transition is largely complete and TLS 1.3 is widely
   available.  This document updates the guidance given the new
   environment and obsoletes RFC 7525.  In addition, the document
   updates RFC 5288 and RFC 6066 in view of recent attacks.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-uta-rfc7525bis-07"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper">
              <organization/>
            </author>
            <author fullname="S. Santesson" initials="S." surname="Santesson">
              <organization/>
            </author>
            <author fullname="S. Farrell" initials="S." surname="Farrell">
              <organization/>
            </author>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen">
              <organization/>
            </author>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <author fullname="W. Polk" initials="W." surname="Polk">
              <organization/>
            </author>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet.  An overview of this approach and model is provided as an introduction.  The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms.  Standard certificate extensions are described and two Internet-specific extensions are defined.  A set of required certificate extensions is specified.  The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions.  An algorithm for X.509 certification path validation is described.  An ASN.1 module and examples are provided in the appendices.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC5539">
          <front>
            <title>NETCONF over Transport Layer Security (TLS)</title>
            <author fullname="M. Badra" initials="M." surname="Badra">
              <organization/>
            </author>
            <date month="May" year="2009"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) provides mechanisms to install, manipulate, and delete the configuration of network devices. This document describes how to use the Transport Layer Security (TLS) protocol to secure NETCONF exchanges.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5539"/>
          <seriesInfo name="DOI" value="10.17487/RFC5539"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC5246">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks">
              <organization/>
            </author>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol.  The TLS protocol provides communications security over the Internet.  The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="RFC6125">
          <front>
            <title>Representation and Verification of Domain-Based Application Service Identity within Internet Public Key Infrastructure Using X.509 (PKIX) Certificates in the Context of Transport Layer Security (TLS)</title>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre">
              <organization/>
            </author>
            <author fullname="J. Hodges" initials="J." surname="Hodges">
              <organization/>
            </author>
            <date month="March" year="2011"/>
            <abstract>
              <t>Many application technologies enable secure communication between two entities by means of Internet Public Key Infrastructure Using X.509 (PKIX) certificates in the context of Transport Layer Security (TLS). This document specifies procedures for representing and verifying the identity of application services in such interactions.   [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6125"/>
          <seriesInfo name="DOI" value="10.17487/RFC6125"/>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We would like to thank the following people TBD.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
