<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.4 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-westerlund-tsvwg-sctp-dtls-handshake-01" category="std" consensus="true" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.19.0 -->
  <front>
    <title abbrev="DTLS in SCTP">Datagram Transport Layer Security (DTLS) in the Stream Control Transmission Protocol (SCTP) DTLS Chunk</title>
    <seriesInfo name="Internet-Draft" value="draft-westerlund-tsvwg-sctp-dtls-handshake-01"/>
    <author initials="M." surname="Westerlund" fullname="Magnus Westerlund">
      <organization>Ericsson</organization>
      <address>
        <email>magnus.westerlund@ericsson.com</email>
      </address>
    </author>
    <author initials="J." surname="Preuß Mattsson" fullname="John Preuß Mattsson">
      <organization>Ericsson</organization>
      <address>
        <email>john.mattsson@ericsson.com</email>
      </address>
    </author>
    <author initials="C." surname="Porfiri" fullname="Claudio Porfiri">
      <organization>Ericsson</organization>
      <address>
        <email>claudio.porfiri@ericsson.com</email>
      </address>
    </author>
    <date year="2024" month="January" day="12"/>
    <area>Transport</area>
    <workgroup>TSVWG</workgroup>
    <abstract>
      <?line 84?>

<t>This document defines a usage of Datagram Transport Layer Security
(DTLS) 1.3 to protect the content of Stream Control Transmission
Protocol (SCTP) packets using the framework provided by the SCTP DTLS
chunk which we name DTLS in SCTP. DTLS in SCTP provides encryption,
source authentication, integrity and replay protection for the SCTP
association with in-band DTLS based key-management and mutual
authentication of the peers. The specification is enabling very
long-lived sessions of weeks and months and supports mutual
re-authentication and rekeying with ephemeral key exchange. This is
intended as an alternative to using DTLS/SCTP <xref target="RFC6083"/> and
SCTP-AUTH <xref target="RFC4895"/>.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-westerlund-tsvwg-sctp-dtls-handshake/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Transport Area Working Group (tsvwg) Working Group mailing list (<eref target="mailto:tsvwg@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tsvwg/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tsvwg/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/gloinul/draft-westerlund-tsvwg-sctp-dtls-handshake"/>.</t>
    </note>
  </front>
  <middle>
    <?line 98?>

<section anchor="introduction">
      <name>Introduction</name>
      <section anchor="overview">
        <name>Overview</name>
        <t>This document describes the usage of the Datagram Transport Layer
   Security (DTLS) protocol, as defined in
   DTLS 1.3 <xref target="RFC9147"/>, in the Stream Control
   Transmission Protocol (SCTP), as defined in <xref target="RFC9260"/> with SCTP
   DTLS chunk <xref target="I-D.westerlund-tsvwg-sctp-dtls-chunk"/>.  This
   specification is intended as an alternative to DTLS/SCTP <xref target="RFC6083"/>
   and usage of SCTP-AUTH <xref target="RFC4895"/>.</t>
        <t>This specification provides mutual authentication of endpoints,
   data confidentiality, data origin authentication, data integrity
   protection, and data replay protection of SCTP packets. Ensuring
   these security services to the application and its upper layer
   protocol over SCTP.  Thus, it allows client/server applications to
   communicate in a way that is designed with communications
   privacy and preventing eavesdropping and detect tampering or
   message forgery.</t>
        <t>Applications using DTLS in SCTP can use all currently existing
   transport features provided by SCTP and its extensions, in some
   cases with some limitations, as specified in
   <xref target="I-D.westerlund-tsvwg-sctp-dtls-chunk"/>. DTLS in SCTP supports:</t>
        <ul spacing="normal">
          <li>
            <t>preservation of message boundaries.</t>
          </li>
          <li>
            <t>no limitation on number of unidirectional and bidirectional streams.</t>
          </li>
          <li>
            <t>ordered and unordered delivery of SCTP user messages.</t>
          </li>
          <li>
            <t>the partial reliability extension as defined in <xref target="RFC3758"/>.</t>
          </li>
          <li>
            <t>multi-homing of the SCTP association per <xref target="RFC9260"/>.</t>
          </li>
          <li>
            <t>the dynamic address reconfiguration extension as defined in
 <xref target="RFC5061"/>.</t>
          </li>
          <li>
            <t>User messages of any size.</t>
          </li>
          <li>
            <t>SCTP Packets with a protected set of chunks up to a size of
2<sup>14</sup> bytes.</t>
          </li>
        </ul>
      </section>
      <section anchor="protocol_overview">
        <name>Protocol Overview</name>
        <t>DTLS in SCTP is a key management specification for the SCTP DTLS
   1.3 chunk <xref target="I-D.westerlund-tsvwg-sctp-dtls-chunk"/> that together
   utilizes all parts of DTLS 1.3 for the security functions like key
   exchange, authentication, encryption, integrity protection, and
   replay protection. All key management message exchange happens
   inband over the SCTP assocation. The basic functionalities and how
   things are related are described below.</t>
        <t>In a SCTP association where DTLS 1.3 Chunk usage has been
   negotiated in the SCTP INIT and INIT-ACK, to initilize and
   authenticate the peer the DTLS handshake is exchanged as SCTP user
   messages with a DTLS-SCTP PPID (see section 10.6 of
   <xref target="I-D.westerlund-tsvwg-sctp-dtls-chunk"/>) until an initial DTLS
   connection has been established.  If the DTLS handshake fails, the
   SCTP association is aborted. With succesful handshake and
   authentication of the peer the key material is configured for the
   DTLS 1.3 chunk. From that point until re-authenticaiton or
   rekeying needs to occurr the DTLS chunk will protect the SCTP
   packets. Now that the DTLS connection has been established PVALID
   chunks are exchanged to verify that no downgrade attack between
   differnet protection solutions has occurred. To prevent
   manipulation, the PVALID chunks are sent encapsulated in DTLS chunks.</t>
        <t>Assuming that the PVALID validation is successful the SCTP
   association is established and the Upper Layer Protocol (ULP) can
   start sending data over the SCTP association. From this point all
   chunks will be protected by encapsulating them in
   DTLS chunks as defined in <xref target="I-D.westerlund-tsvwg-sctp-dtls-chunk"/>.
   The DTLS chunk protects all of the SCTP Chunks to be sent in a SCTP
   packet. Using the selected key-material the DTLS Protection
   operator protects the plain text producing a DTLS Record that is
   encapsualted in the DTLS chunk and the transmitted as a SCTP packet
   with a common header.</t>
        <t>In the receiving SCTP endpoint each incoming SCTP packet on any of
   its interfaces and ports are matched to the SCTP association based
   on ports and VTAG in the common header. In that association context
   for the DTLS chunk the DTLS Connection Index (DCI) is used to look
   up the key-material from the one DTLS connection used to
   authenticate the peer and establish this key-materail. Using the
   identified key-material and context the content of the DTLS chunk
   is attempted to be processed, including replay protection,
   decryption, and integrity checking. And if decryption and integrity
   verification was successful the produced plain text of one or more
   SCTP chunks are provided for normal SCTP processing in the
   identified SCTP association along with associated per-packet meta
   data such as path received on, original packet size, and ECN bits.</t>
        <t>When mutual re-authentication or rekeying with ephemeral key
   exchange is needed or desired by either endpoint a new DTLS
   connection handshake is performed between the SCTP endpoints. A
   different DCI than currently used in the DTLS chunk are used to
   indicate that this is a new handshake. The DCI is sent as pre-amble
   to any DTLS message sent as SCTP user message. When the handshake
   has completed the DTLS in SCTP implementation can simply switch to
   use this DTLS connection's key-material in the DTLS chunk.  After a
   short while (no longer than 2 min) to enable any outstanding
   packets to drain from the network path between the endpoints the
   old DTLS connection can be terminated and the key-material deleted
   from the DTLS chunk's key store.</t>
        <t>The DTLS connection is free to send any alert, handshake message, or
   other non-application data to its peer at any point in time. Thus,
   enabling DTLS 1.3 Key Updates for example.
   All DTLS message will be sent by means of SCTP user messages
   with DTLS-SCTP PPID as specified in
   <xref target="I-D.westerlund-tsvwg-sctp-dtls-chunk"/>.</t>
        <figure anchor="overview-layering">
          <name>DTLS in SCTP layer in regard to SCTP and upper layer protocol</name>
          <artset>
            <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="352" width="496" viewBox="0 0 496 352" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,336" fill="none" stroke="black"/>
                <path d="M 136,32 L 136,96" fill="none" stroke="black"/>
                <path d="M 152,32 L 152,96" fill="none" stroke="black"/>
                <path d="M 184,96 L 184,336" fill="none" stroke="black"/>
                <path d="M 224,208 L 224,272" fill="none" stroke="black"/>
                <path d="M 320,32 L 320,96" fill="none" stroke="black"/>
                <path d="M 400,208 L 400,272" fill="none" stroke="black"/>
                <path d="M 440,80 L 440,224" fill="none" stroke="black"/>
                <path d="M 8,32 L 136,32" fill="none" stroke="black"/>
                <path d="M 152,32 L 320,32" fill="none" stroke="black"/>
                <path d="M 320,64 L 424,64" fill="none" stroke="black"/>
                <path d="M 8,96 L 320,96" fill="none" stroke="black"/>
                <path d="M 424,96 L 456,96" fill="none" stroke="black"/>
                <path d="M 336,128 L 352,128" fill="none" stroke="black"/>
                <path d="M 200,176 L 216,176" fill="none" stroke="black"/>
                <path d="M 8,208 L 184,208" fill="none" stroke="black"/>
                <path d="M 224,208 L 400,208" fill="none" stroke="black"/>
                <path d="M 192,240 L 216,240" fill="none" stroke="black"/>
                <path d="M 408,240 L 424,240" fill="none" stroke="black"/>
                <path d="M 8,272 L 184,272" fill="none" stroke="black"/>
                <path d="M 224,272 L 400,272" fill="none" stroke="black"/>
                <path d="M 200,304 L 216,304" fill="none" stroke="black"/>
                <path d="M 8,336 L 184,336" fill="none" stroke="black"/>
                <path d="M 184,272 L 200,304" fill="none" stroke="black"/>
                <path d="M 320,96 L 336,128" fill="none" stroke="black"/>
                <path d="M 184,208 L 200,176" fill="none" stroke="black"/>
                <path d="M 424,64 C 432.83064,64 440,71.16936 440,80" fill="none" stroke="black"/>
                <path d="M 424,240 C 432.83064,240 440,232.83064 440,224" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="416,240 404,234.4 404,245.6" fill="black" transform="rotate(180,408,240)"/>
                <polygon class="arrowhead" points="224,240 212,234.4 212,245.6" fill="black" transform="rotate(0,216,240)"/>
                <polygon class="arrowhead" points="200,240 188,234.4 188,245.6" fill="black" transform="rotate(180,192,240)"/>
                <g class="text">
                  <text x="228" y="52">DTLS</text>
                  <text x="264" y="52">1.3</text>
                  <text x="356" y="52">Keys</text>
                  <text x="72" y="68">ULP</text>
                  <text x="192" y="84">Key</text>
                  <text x="252" y="84">Management</text>
                  <text x="480" y="100">API</text>
                  <text x="380" y="116">User</text>
                  <text x="384" y="132">Level</text>
                  <text x="36" y="148">SCTP</text>
                  <text x="84" y="148">Chunks</text>
                  <text x="144" y="148">Handler</text>
                  <text x="396" y="148">Messages</text>
                  <text x="244" y="180">SCTP</text>
                  <text x="312" y="180">Unprotected</text>
                  <text x="392" y="180">Payload</text>
                  <text x="92" y="228">DTLS</text>
                  <text x="300" y="228">DTLS</text>
                  <text x="336" y="228">1.3</text>
                  <text x="96" y="244">Chunk</text>
                  <text x="96" y="260">Handler</text>
                  <text x="276" y="260">Protection</text>
                  <text x="356" y="260">Operator</text>
                  <text x="36" y="308">SCTP</text>
                  <text x="84" y="308">Header</text>
                  <text x="144" y="308">Handler</text>
                  <text x="244" y="308">SCTP</text>
                  <text x="304" y="308">Protected</text>
                  <text x="376" y="308">Payload</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art"><![CDATA[
+---------------+ +--------------------+
|               | |       DTLS 1.3     |  Keys
|      ULP      | |                    +-------------.
|               | |   Key Management   |              |
+---------------+-+---+----------------+            --+-- API
|                     |                 \    User     |
|                     |                  +-- Level    |
| SCTP Chunks Handler |                      Messages |
|                     |                               |
|                     | +-- SCTP Unprotected Payload  |
|                     |/                              |
+---------------------+    +---------------------+    |
|        DTLS         |    |       DTLS 1.3      |    |
|        Chunk        |<-->|                     |<--'
|       Handler       |    | Protection Operator |
+---------------------+    +---------------------+
|                     |\
| SCTP Header Handler | +-- SCTP Protected Payload
|                     |
+---------------------+
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="properties-of-dtls-in-sctp">
        <name>Properties of DTLS in SCTP</name>
        <t>DTLS in SCTP (as the combination of the DTLS chunk and the in-band
   authentication and key-management using DTLS handshakes defined in
   this document) has a number of properties that are attractive.</t>
        <ul spacing="normal">
          <li>
            <t>Provides confidentiality, integrity protection, and source
authentication for each SCTP packet.</t>
          </li>
          <li>
            <t>Provides replay protection on SCTP packet level preventing
malicious replay attacks on SCTP, both protecting the data as well
as the SCTP functions themselves.</t>
          </li>
          <li>
            <t>Provides mutual authentication of the endpoints based on any
authentication mechanism supported by DTLS.</t>
          </li>
          <li>
            <t>Uses parallel DTLS connections to enable mutual re-authentication
and rekeying with ephemeral key-exchange. Thus, enabling SCTP
association lifetimes without known limitations and without
needing to drain the SCTP association.</t>
          </li>
          <li>
            <t>Uses core of DTLS as it is and updates and fixes to DTLS security
properties can be implemented without further changes to this
specification.</t>
          </li>
          <li>
            <t>Secures all SCTP packets exchanged after SCTP association has
reached the established state and the initial key-exchange has
completed. Making targeted attacks against the SCTP protocol and
implementation much harder.</t>
          </li>
          <li>
            <t>DTLS in SCTP results in no limitations on user message
transmission or message sizes, those properties are the same as
for an unprotected SCTP association.</t>
          </li>
          <li>
            <t>Limited overhead on a per packet basis, with 4 bytes for the
DTLS chunk plus the DTLS record overhead. The DTLS
overhead is dependent on the DTLS version.</t>
          </li>
          <li>
            <t>Support of SCTP packet plain text payload sizes up to
2<sup>14</sup> bytes.</t>
          </li>
        </ul>
        <section anchor="benefits-compared-to-dtlssctp">
          <name>Benefits Compared to DTLS/SCTP</name>
          <t>DTLS/SCTP as defined by <xref target="I-D.ietf-tsvwg-dtls-over-sctp-bis"/>
   has several important differences most to the benefit of DTLS in
   SCTP. This section reviews these differences.</t>
          <ul spacing="normal">
            <li>
              <t>Replay Protection in DTLS/SCTP has some limitations due to
SCTP-AUTH <xref target="RFC4895"/> and its interaction with the SCTP implementation and
dependencies on the actual SCTP-AUTH rekeying frequency. DTLS
in SCTP relies on DTLS mechanism for replay protection that can
prevent both duplicates from being delivered as well as
preventing packets from outside the current window to be
delivered. Thus, a stronger protection especially for non-DATA
chunk is provided and protects the SCTP stack from replayed or
duplicated packets.</t>
            </li>
            <li>
              <t>Encryption in DTLS/SCTP is only applied to ULP data. For DTLS in
SCTP all chunk types after the association has reached
established state and the initial DTLS handshake has compeleted
will be encrypted. This, makes protocol attacks harder as a
third-party attacker will have less insight into SCTP protocol
state. Also, protocol header information likes PPIDs will also be
encrypted, which makes targeted attacks harder but also make
management and debugging harder.</t>
            </li>
            <li>
              <t>DTLS/SCTP Rekeying is complicated and require advanced API or
user message tracking to determine when a key is no longer needed
so that it can be discarded. A DTLS/SCTP key that is prematurely
discarded can result in loss of parts of a user message and
failure of the assumptions on the transport where the sender
believes it delivered and the receiver never gets it. This
usually will result in the need to terminate the SCTP association
to restart the ULP session to avoid any issues due to
inconsistencies. DTLS in SCTP is robustly handling of any early
discard of the DTLS key-material after having switched to a new
established DTLS connection and its key-material. Any outstanding
packet that has not been decoded yet will simply be treated as
lost between the SCTP endpoints, and SCTP's retransmission will
retransmit any user message data that requires it. Also, the
algorithm for when to discard a DTLS connection can be much
simpler.</t>
            </li>
            <li>
              <t>DTLS/SCTP rekeying can put restrictions on user message sizes
unless the right APIs exist to the SCTP implementation to
determine the state of user messages. No such restriction exists
in DTLS in SCTP.</t>
            </li>
            <li>
              <t>By using the DTLS chunk that is acting on SCTP packet level
instead of user messages the consideration for extensions are
quite different. Only extensions that would affect the common
header or how packets are formed would interact with this
mechanism, any extension that just defines new chunks or
parameters for existing chunks is expected to just work and be
secured by the mechanism. DTLS/SCTP instead interact with
extensions that affects how user messages are handled.</t>
            </li>
            <li>
              <t>A known limitation is that DTLS in SCTP does not support more
than 2<sup>14</sup> bytes of chunks per SCTP packet. If the DTLS
implementation does not support the maximum DTLS record size the
maximum supported packet size might be even lower. However, this
value needs to be compared to the supported MTU of IP, and are
thus in reality often not an actual limitation. Only for some
special deployments or over loopback may this limitation be
visible.</t>
            </li>
          </ul>
          <t>There are several significant differences in regard to
   implementation between the two realizations.</t>
          <ul spacing="normal">
            <li>
              <t>DTLS in SCTP do requires the DTLS chunk to be implemented in
the SCTP stack implementation, and not as an adaptation layer
above the SCTP stack which DTLS/SCTP instead requires. This has
some extra challenges for operating system level
implementations. However, as some updates anyway will be required
to support the corrected SCTP-AUTH the implementation burden is
likely similar in this regard.</t>
            </li>
            <li>
              <t>DTLS in SCTP implemented in operating system kernels will require
that the DTLS implementation is split. Where the protection
operations performed to create DTLS records needs to be
implemented in the kernel and have an appropriate API for setting
keying materia and managed the functions of the protection
operation. While the DTLS handshake is residing as an application
on top of SCTP interface.</t>
            </li>
            <li>
              <t>DTLS in SCTP can use a DTLS implementation that does not rely on
features from outside of the core protocol, where DTLS/SCTP
required a number of features as listed below:  </t>
              <ul spacing="normal">
                <li>
                  <t>DTLS Connection Index to identify which DTLS connection that
should process the DTLS record.</t>
                </li>
                <li>
                  <t>Support for DTLS records of the maximum size of 16 KB.</t>
                </li>
                <li>
                  <t>Optional to support negotiation of maximum DTLS record size
unless not supporting 16 KB records when it is
required. Even if implementing the negotiation,
interoperability failure may occur. DTLS in SCTP will only
require supporting DTLS record sizes that matches the
largest IP packet size that endpoint support or the SCTP
implementation.</t>
                </li>
                <li>
                  <t>Implementation is required to support turning off the DTLS
replay protection.</t>
                </li>
                <li>
                  <t>Implementation is required to not use DTLS Key-update
functionality. Where DTLS in SCTP is agnostic to its usage,
and it provides a useful tool to ensure that the key lifetime
is not an issue.</t>
                </li>
              </ul>
            </li>
          </ul>
          <t>The conclusion of these implementation details is that DTLS
   in SCTP can use existing DTLS implementations, at least for user
   land SCTP implementation. It is not known if any DTLS 1.3 stack
   exist that fully support the requirements of DTLS/SCTP. It is
   expected that a DTLS/SCTP implementation will have to also extend
   some DTLS implementation.</t>
        </section>
      </section>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>This document uses the following terms:</t>
        <dl>
          <dt>Association:</dt>
          <dd>
            <t>An SCTP association.</t>
          </dd>
          <dt>Connection:</dt>
          <dd>
            <t>A DTLS connection. It is uniquely identified by a
   connection index.</t>
          </dd>
          <dt>Restart DCI:</dt>
          <dd>
            <t>A DTLS connection index indicating a DTLS connection to be
used for an SCTP Association Restart</t>
          </dd>
          <dt>Stream:</dt>
          <dd>
            <t>A unidirectional stream of an SCTP association.  It is
   uniquely identified by a stream identifier.</t>
          </dd>
          <dt>Traffic DCI:</dt>
          <dd>
            <t>A DTLS Connection index indicating a DTLS connection used to
protect the regular SCTP traffic, i.e. not a restart DCI.</t>
          </dd>
        </dl>
      </section>
      <section anchor="abbreviations">
        <name>Abbreviations</name>
        <dl>
          <dt>AEAD:</dt>
          <dd>
            <t>Authenticated Encryption with Associated Data</t>
          </dd>
          <dt>DCI:</dt>
          <dd>
            <t>DTLS Connection Index</t>
          </dd>
          <dt>DTLS:</dt>
          <dd>
            <t>Datagram Transport Layer Security</t>
          </dd>
          <dt>MTU:</dt>
          <dd>
            <t>Maximum Transmission Unit</t>
          </dd>
          <dt>PPID:</dt>
          <dd>
            <t>Payload Protocol Identifier</t>
          </dd>
          <dt>SCTP:</dt>
          <dd>
            <t>Stream Control Transmission Protocol</t>
          </dd>
          <dt>SCTP-AUTH:</dt>
          <dd>
            <t>Authenticated Chunks for SCTP <xref target="RFC4895"/></t>
          </dd>
          <dt>ULP:</dt>
          <dd>
            <t>Upper Layer Protocol</t>
          </dd>
        </dl>
      </section>
      <section anchor="conventions">
        <name>Conventions</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
<?line -6?>
        </t>
      </section>
    </section>
    <section anchor="dtls-usage-of-dtls-chunk">
      <name>DTLS usage of DTLS Chunk</name>
      <t>DTLS in SCTP uses the DTLS chunk in the following way. Fields
   not discussed are used as specified in
   <xref target="I-D.westerlund-tsvwg-sctp-dtls-chunk"/>.</t>
      <figure anchor="sctp-dtls-chunk-structure">
        <name>DTLS Chunk Structure</name>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="208" width="528" viewBox="0 0 528 208" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,64 L 8,192" fill="none" stroke="black"/>
              <path d="M 136,64 L 136,96" fill="none" stroke="black"/>
              <path d="M 216,64 L 216,96" fill="none" stroke="black"/>
              <path d="M 232,64 L 232,96" fill="none" stroke="black"/>
              <path d="M 264,64 L 264,96" fill="none" stroke="black"/>
              <path d="M 264,160 L 264,192" fill="none" stroke="black"/>
              <path d="M 520,64 L 520,192" fill="none" stroke="black"/>
              <path d="M 8,64 L 520,64" fill="none" stroke="black"/>
              <path d="M 8,96 L 520,96" fill="none" stroke="black"/>
              <path d="M 264,160 L 520,160" fill="none" stroke="black"/>
              <path d="M 8,192 L 520,192" fill="none" stroke="black"/>
              <g class="text">
                <text x="16" y="36">0</text>
                <text x="176" y="36">1</text>
                <text x="336" y="36">2</text>
                <text x="496" y="36">3</text>
                <text x="16" y="52">0</text>
                <text x="32" y="52">1</text>
                <text x="48" y="52">2</text>
                <text x="64" y="52">3</text>
                <text x="80" y="52">4</text>
                <text x="96" y="52">5</text>
                <text x="112" y="52">6</text>
                <text x="128" y="52">7</text>
                <text x="144" y="52">8</text>
                <text x="160" y="52">9</text>
                <text x="176" y="52">0</text>
                <text x="192" y="52">1</text>
                <text x="208" y="52">2</text>
                <text x="224" y="52">3</text>
                <text x="240" y="52">4</text>
                <text x="256" y="52">5</text>
                <text x="272" y="52">6</text>
                <text x="288" y="52">7</text>
                <text x="304" y="52">8</text>
                <text x="320" y="52">9</text>
                <text x="336" y="52">0</text>
                <text x="352" y="52">1</text>
                <text x="368" y="52">2</text>
                <text x="384" y="52">3</text>
                <text x="400" y="52">4</text>
                <text x="416" y="52">5</text>
                <text x="432" y="52">6</text>
                <text x="448" y="52">7</text>
                <text x="464" y="52">8</text>
                <text x="480" y="52">9</text>
                <text x="496" y="52">0</text>
                <text x="512" y="52">1</text>
                <text x="36" y="84">Type</text>
                <text x="64" y="84">=</text>
                <text x="92" y="84">0x4x</text>
                <text x="172" y="84">reserved</text>
                <text x="224" y="84">R</text>
                <text x="248" y="84">DCI</text>
                <text x="360" y="84">Chunk</text>
                <text x="412" y="84">Length</text>
                <text x="264" y="132">Payload</text>
                <text x="384" y="180">Padding</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type = 0x4x   |reserved |R|DCI|         Chunk Length          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
|                            Payload                            |
|                                                               |
|                               +-------------------------------+
|                               |           Padding             |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </artset>
      </figure>
      <dl>
        <dt>reserved: 5 bits</dt>
        <dd>
          <t>Reserved bits for future use. Sender MUST set these bits to 0 and
MUST be ignored on reception.</t>
        </dd>
        <dt>R: 1 bit (boolean)</dt>
        <dd>
          <t>Restart indicator. If this bit is set this DTLS chunk is protected
with by an restart DTLS Connection with the index indicated by the
DCI. If not set, then a traffic DCI is indicated.</t>
        </dd>
        <dt>DCI: 2 bits (unsigned integer)</dt>
        <dd>
          <t>DTLS Connection Index is the lower two bits of an DTLS Connection
 Index counter for the traffic or restart DTLS connection index.
 This is a counter implemented in DTLS in
 SCTP that is used to identify which DTLS connection instance that
 is capable of processing any received packet or DTLS message over
 an user message. This counter is recommended to be the lower part
 of a larger variable.
 DCI is unrelated to the DTLS Connection ID (CID) <xref target="RFC9147"/>.</t>
        </dd>
        <dt>Payload: variable length</dt>
        <dd>
          <t>One or more DTLS records. In cases more
 than one DTLS record is included all DTLS records except the last
 MUST include a length field. Note that this matches what is
 specified in DTLS 1.3</t>
        </dd>
      </dl>
    </section>
    <section anchor="dtls-user-message">
      <name>DTLS messages over SCTP User Messages</name>
      <t>DTLS messages that are not DTLS records containing protected SCTP
chunk payloads will be sent using SCTP user message using format
defined below. A DTLS handshake message may be fragmented by DTLS to a
set of DTLS records of a maximum configured fragment size. Each DTLS
message fragment is sent as a SCTP user message on the same stream
where each message is configured for reliable and in-order delivery
with the PPID set to DTLS-SCTP
<xref target="I-D.westerlund-tsvwg-sctp-dtls-chunk"/>. Each user message DTLS SHALL
be prepended with a single byte containing the DTLS connection index
value. These user messages MAY contain one or more DTLS records. The
SCTP stream ID used MAY be any stream ID that the ULP alreay uses, and
if not know Stream 0. Note that all fragments of a handshake message
MUST be sent with the same stream ID to ensure the in-order delivery.</t>
      <figure anchor="sctp-dtls-user-message">
        <name>DTLS User Message Structure</name>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="208" width="528" viewBox="0 0 528 208" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,64 L 8,192" fill="none" stroke="black"/>
              <path d="M 88,64 L 88,96" fill="none" stroke="black"/>
              <path d="M 104,64 L 104,96" fill="none" stroke="black"/>
              <path d="M 136,64 L 136,96" fill="none" stroke="black"/>
              <path d="M 264,160 L 264,192" fill="none" stroke="black"/>
              <path d="M 520,64 L 520,160" fill="none" stroke="black"/>
              <path d="M 8,64 L 520,64" fill="none" stroke="black"/>
              <path d="M 8,96 L 136,96" fill="none" stroke="black"/>
              <path d="M 264,160 L 520,160" fill="none" stroke="black"/>
              <path d="M 8,192 L 264,192" fill="none" stroke="black"/>
              <g class="text">
                <text x="16" y="36">0</text>
                <text x="176" y="36">1</text>
                <text x="336" y="36">2</text>
                <text x="496" y="36">3</text>
                <text x="16" y="52">0</text>
                <text x="32" y="52">1</text>
                <text x="48" y="52">2</text>
                <text x="64" y="52">3</text>
                <text x="80" y="52">4</text>
                <text x="96" y="52">5</text>
                <text x="112" y="52">6</text>
                <text x="128" y="52">7</text>
                <text x="144" y="52">8</text>
                <text x="160" y="52">9</text>
                <text x="176" y="52">0</text>
                <text x="192" y="52">1</text>
                <text x="208" y="52">2</text>
                <text x="224" y="52">3</text>
                <text x="240" y="52">4</text>
                <text x="256" y="52">5</text>
                <text x="272" y="52">6</text>
                <text x="288" y="52">7</text>
                <text x="304" y="52">8</text>
                <text x="320" y="52">9</text>
                <text x="336" y="52">0</text>
                <text x="352" y="52">1</text>
                <text x="368" y="52">2</text>
                <text x="384" y="52">3</text>
                <text x="400" y="52">4</text>
                <text x="416" y="52">5</text>
                <text x="432" y="52">6</text>
                <text x="448" y="52">7</text>
                <text x="464" y="52">8</text>
                <text x="480" y="52">9</text>
                <text x="496" y="52">0</text>
                <text x="512" y="52">1</text>
                <text x="44" y="84">reserved</text>
                <text x="96" y="84">R</text>
                <text x="120" y="84">DCI</text>
                <text x="252" y="132">DTLS</text>
                <text x="304" y="132">Message</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|reserved |R|DCI|                                               |
+-+-+-+-+-+-+-+-+                                               |
|                                                               |
|                            DTLS Message                       |
|                                                               |
|                               +-------------------------------+
|                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </artset>
      </figure>
      <dl>
        <dt>reserved: 5 bits</dt>
        <dd>
          <t>Reserved bits for future use. Sender MUST set these bits to 0 and
MUST be ignored on reception.</t>
        </dd>
        <dt>R: 1 bit (boolean)</dt>
        <dd>
          <t>Restart indicator. If this bit is set this DTLS message is for the
restart DTLS Connection with the index indicated by the
DCI field. If not set, then a traffic DCI is indicated.</t>
        </dd>
        <dt>DCI: 2 bits (unsigned integer)</dt>
        <dd>
          <t>DTLS Connection Index is the lower two bits of an DTLS Connection
 Index counter for the traffic or restart DTLS connection index.
 This is a counter implemented in DTLS in
 SCTP that is used to identify which DTLS connection instance that
 is capable of processing any received packet or DTLS message over
 an user message. This counter is recommended to be the lower part
 of a larger variable.
 DCI is unrelated to the DTLS Connection ID <xref target="RFC9147"/>.</t>
        </dd>
        <dt>DTLS Message: variable length</dt>
        <dd>
          <t>One or more DTLS records. In cases more
 than one DTLS record is included all DTLS records except the last
 MUST include a length field. Note that this matches what is
 specified in DTLS 1.3 <xref target="RFC9147"/> will always include the length
 field in each record.</t>
        </dd>
      </dl>
    </section>
    <section anchor="dtls-chunk-integration">
      <name>DTLS Chunk Integration</name>
      <t>The <xref target="I-D.westerlund-tsvwg-sctp-dtls-chunk"/> contains a high-level
description of the basic DTLS in SCTP architecture, this section deals
with details related to the DTLS 1.3 integration with SCTP.</t>
      <section anchor="state-machine">
        <name>State Machine</name>
        <t>DTLS in SCTP uses inband key-establishment, thus the DTLS handshake
establishes shared keys with the remote peer. As soon as the SCTP
State Machine enters PROTECTION INITILIZATION state, DTLS in SCTP is
responsible for progressing to the PROTECTED state when DTLS handshake
has completed. The DCI counter is initialized to the value zero that
is used for the initial DTLS handshake.</t>
        <section anchor="protection-initilization-state">
          <name>PROTECTION INITILIZATION state</name>
          <t>When entering PROTECTION INITILIZATION state, DTLS will start the handshake
according to <xref target="dtls-handshake"/>.</t>
          <t>DTLS being initialized for a new SCTP association will set the Traffic
DCI counter = 0, which implies a DCI field value of 0, for the initial
DTLS connection. The DTLS handshake messages are transmitted from this
endpoint to the peer using SCTP User message <xref target="dtls-user-message"/>
with the PPID value set to DTLS-SCTP
<xref target="I-D.westerlund-tsvwg-sctp-dtls-chunk"/>. Note that in case of SCTP
association restart, the negotiation of the new Traffic DTLS
connection SHALL still use a new Traffic DCI counter = 0 as the restarting
SCTP endpoint may not know the old traffic DCI counter value for the
last active DTLS connection.</t>
          <t>When in PROTECTION INITILIZATION state, DTLS in SCTP MAY create a DTLS
connection for Restart purposes. Such Restart connection is identified
by a Restart DCI, that is based on a DCI counter independent from the
traffic DCI. Whilst the first Restart DCI has value = 0, further
Restart DCI will be increased using the same procedure than Traffic
DCI and implementing the same parallel connection mechanism (see
<xref target="add-dtls-connection"/> and <xref target="remove-dtls-connection"/>).</t>
          <t>When a successful handshake has been completed and the keying material
is established for DTLS connection and set for the DCI the DTLS chunk
Handler will move SCTP State Machine into PROTECTED state.</t>
        </section>
        <section anchor="protected-state">
          <name>PROTECTED state</name>
          <t>In the PROTECTED state the currently active DTLS connection is used
for protection operation of the payload of SCTP chunks in each packet
per below specification.  When necessary to meet requirements on
periodic re-authentication of the peer and establishment of new
forward secrecy keys, the existing DTLS 1.3 connection is being
replaced with a new one by first opening a new parallel DTSL
connection as further specified in <xref target="parallel-dtls"/> and then close
the old DTLS connection.</t>
          <t>When in PROTECTED state, DTLS in SCTP if it has not yet been done,
SHALL create a DTLS connection for Restart purposes.</t>
        </section>
        <section anchor="shutdown-states">
          <name>SHUTDOWN states</name>
          <t>When the SCTP association leaves the ESTABLISHED state per <xref target="RFC9260"/>
to be shutdown the DTLS connection is kept and continues to protect
the SCTP packet payloads through the shutdown process.</t>
          <t>When the association reaches the CLOSED state as part of the SCTP
association closing process all DTLS connections that existed are
terminated without further transmissions, i.e. DTLS close_notify is
not transmitted.</t>
        </section>
      </section>
      <section anchor="dtls-connection-handling">
        <name>DTLS Connection Handling</name>
        <t>It's up to DTLS key-establishment function to manage the DTLS
connections and their related DCI state in the DTLS chunk.</t>
        <section anchor="add-dtls-connection">
          <name>Add a New DTLS Connection</name>
          <t>Either peer can add a new DTLS connection to the SCTP association at
any time, but no more than 2 DTLS connections can exist at the same
time per DTLS connection type (Traffic or Restart).  The new DCI
value shall be the last active Traffic or Restart DCI increased by one.
What is encoded in the DTLS chunk and DTLS user messages are the
DCI value modulo 4. This makes the attempt to create a new DTLS
connection to use the same, known, value of DCI from either peer.  A
new handshake will be initiated by DTLS using the new DCI.  Details of
the handshake are described in <xref target="dtls-handshake"/>.</t>
          <t>As either endpoint can initiate a DTLS handshake at the same time,
either endpoint may receive a DTLS ClientHello message when it has
sent its own ClientHello. In this case the ClientHello from the
endpoint that had the DTLS Client role in the establishment of the
previous DTLS connection shall be continued to be processed and the
other dropped.</t>
          <t>When the handshake has been completed successfully, the new DTLS
connection will be possible to use, if the handshake is
not completed successfully, the new DCI value will not be considered
used and a next attempt will reuse that DCI.</t>
        </section>
        <section anchor="remove-dtls-connection">
          <name>Remove an existing DTLS Connection</name>
          <t>A DTLS connection is removed when a
newer DTLS connection is in use. It is RECOMMENDED to not initiate
removal until at least one SCTP packet protected by the new DTLS
connection has been received, and any transmitted packets protected
using the new DTLS connection has been acknowledge, alternatively one
Maximum Segment Lifetime (120 seconds) has passed since the last SCTP
packet protected by the old DTLS connection was transmitted.</t>
          <t>Either peers can initialize the removal of a DTLS connection from the
current SCTP association when needed when a new have been established.
The closing of the DTLS connection when the SCTP association is in
PROTECTED and ESTABLISHED state is done by having the DTLS connection
send a DTLS close_notify. When DTLS closure for a DTLS connection is
completed, the related DCI information in the DTLS chunk is released.</t>
        </section>
      </section>
      <section anchor="dtls-key-update">
        <name>DTLS Key Update</name>
        <t>To perform a DTLS Key Update when using the DTLS chunk for protection
the following process is performed. Either endpoint can trigger a DTLS
key update when needed to update the key used. The DTLS key-update
process is detailed in Section 8 of <xref target="RFC9147"/> including a example of
the DTLS key update procedure. Note that in line with DTLS, and in
contrast to TLS, DTLS in SCTP endpoints MUST NOT start using new epoch
keys until the DTLS ACK has been recived. This as the user message
tranmission of the KeyUpdate DTLS message occurs using one or more
SCTP packets that are protected using epoch N keys. If the sender
needs to retransmitt any SCTP packets and have switched to Epoch N+1
the receiver will never receive the KeyUpdate DTLS message.</t>
        <t>Note: The below role describes the keys in realtion to the endpoint
and traffic it will receive or send. This will have to be translated
into client or server key depending on the role the endpoint has in
the DTLS connection the KeyUpdate happens in.</t>
        <section anchor="initiator">
          <name>Initiator</name>
          <t>The below assumes that the Intitiator (I) are currentnly using key
epoch N.</t>
          <ol spacing="normal" type="1"><li>
              <t>The endpoint Initiates the key update and generates the new key
  for Epoch N+1. Epoch N+1 transmission key-materaial is set for the
  current DCI and epoch N+1 but not yet enabled for use. DTLS
  generates DTLS records containing the KeyUpdate DTLS message and
  update_requested, which is then sent using SCTP user message
  (<xref target="dtls-user-message"/>) to the responder.</t>
            </li>
            <li>
              <t>Initiator receives a DTLS user message containing the DTLS ACK
  message acknowledging the reception of the KeyUpdate message sent in
  step 1. The Initiator actives the new Epoch N+1 key in the DTLS
  chunk for protection of future transmissions of SCTP packets. The
  epoch N send direction key can be removed from the DTLS chunk key
  store.</t>
            </li>
            <li>
              <t>Initiator receives a DTLS user message with the Responder's
  KeyUpdate message. The initator generates the recevie keys for epoch
  N+1 using the received message and installs them in the DTLS chunks
  key store. Then it generates a DTLS ACK for the KeyUpdate and sends
  it to the responder as a SCTP user message.</t>
            </li>
            <li>
              <t>When the first SCTP packet protected by epoch N+1 has been
  received and succesfully decrypted by DTLS chunk the epoch N reception
  keys can be removed. Although to deal with network reordering, a
  delay is RECOMMENDED.</t>
            </li>
          </ol>
          <t>This completes the key-update procedure.</t>
          <t>Note that even if both endpoints runs the Initiator process the
KeyUpdate will complete. The main difference is that step 3 may occur
before step 2 has happened.</t>
        </section>
        <section anchor="responder">
          <name>Responder</name>
          <t>The process for a responder to a peer initiating KeyUpdate.</t>
          <ol spacing="normal" type="1"><li>
              <t>The responder receives an SCTP DTLS user message containing a
  KeyUpdate message. The epoch N+1 keys reception keys are generated
  and installed into the DTLS chunk key store. A DTLS ACK message is
  generated and transmitted to the peer using a SCTP user message.</t>
            </li>
            <li>
              <t>The responder initiates its own Key Update by generating keys and
  creating the KeyUpdate message. The send direction keys for epoch
  N+1 is installed but not enabled for use. The KeyUpdate message is
  transmitted to the peer using a SCTP user message.</t>
            </li>
            <li>
              <t>The responder receives a DTLS user message containing the DTLS
  ACK message acknowledging the reception of the KeyUpdate message
  sent in step 2. The responder actives the new Epoch N+1 key in the
  DTLS chunk for protection of future transmissions of SCTP
  packets. The epoch N send direction key can be removed from the DTLS
  chunk key store.</t>
            </li>
            <li>
              <t>When the first SCTP packet protected by epoch N+1 has been
  received and succesfully decrypted by DTLS chunk the epoch N reception
  keys can be removed. Although to deal with network reordering, a
  delay is RECOMMENDED.</t>
            </li>
          </ol>
        </section>
      </section>
      <section anchor="error-cases">
        <name>Error Cases</name>
        <t>As DTLS has its own error reporting mechanism by exchanging DTLS alert
messages no new DTLS related cause codes are defined to use the error
handling defined in <xref target="I-D.westerlund-tsvwg-sctp-dtls-chunk"/>.</t>
        <t>When DTLS encounters an error it may report that issue using DTLS
alert message to its peer by putting the created DTLS record in a SCTP
user message (<xref target="dtls-user-message"/>).  This is independent of what to do
in relation to the SCTP association.  Depending on the severance of
the error different paths can be the result:</t>
        <dl>
          <dt>Non-critical:</dt>
          <dd>
            <t>the DTLS connection can continue to protect
   the SCTP association. In this case the issue may be worth reporting
   to the peer using a DTLS alert message, but otherwise continue
   without further action.</t>
          </dd>
          <dt>Critical, but not immediately fatal:</dt>
          <dd>
            <t>If the DTLS connection has a
   critical issue, but can still protect packets then a the endpoint
   SHOULD attempt to establish a new DTLS connection. If that succeeds
   then the SCTP association switches over to the new DTLS connection
   and can terminate the old one including reporting the error. In
   case the establishment fails, then this critical issue MUST be reported
   to the SCTP association so that it can send an ABORT chunk with the
   Error in Protection cause code. This will terminate the SCTP
   association immediately, provide ULP with notification of the
   failure and speeding up any higher layer management of the failure.</t>
          </dd>
          <dt>Critical, and immediately fatal:</dt>
          <dd>
            <t>If the DTLS connection fails so
   that no further data can be protected (i.e. either sent or
   received) with maintained security then it is not possible to
   establish a new DTLS connection and DTLS will
   have to indicate this to the SCTP implementation so it can perform
   a one sides SCTP association termination. This will lead to an
   eventual SCTP association timeout in the peer.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="dtls-considerations">
      <name>DTLS Considerations</name>
      <section anchor="version-of-dtls">
        <name>Version of DTLS</name>
        <t>This document defines the usage of DTLS 1.3 <xref target="RFC9147"/>.
   Earlier versions of DTLS MUST NOT be used
   (see <xref target="RFC8996"/>). It is expected that DTLS in SCTP as described in
   this document will work with future versions of DTLS.</t>
        <t>Only one version of DTLS MUST be used during the lifetime of an
   SCTP Association, meaning that the procedure for replacing the DTLS
   version in use requires the existing SCTP Association to be
   terminated and a new SCTP Association with the desired DTLS version
   to be instantiated.</t>
      </section>
      <section anchor="configuration-of-dtls">
        <name>Configuration of DTLS</name>
        <section anchor="general">
          <name>General</name>
          <t>The DTLS Connection ID SHALL NOT be included in the DTLS records as
   it is not needed, the DTLS chunk indicates which DTLS connection
   the DTLS records are intended for using the DCI bits. Avoiding
   overhead and addition implementation requirements on DTLS
   implementation.</t>
          <t>The DTLS record length field is normally not needed as the DTLS
   Chunk provides a length field unless multiple records are put in
   same DTLS chunk payload or user message. If multiple DTLS records
   are included in one DTLS chunk payload or user message the DTLS
   record length field MUST be present in all but the last.</t>
          <t>DTLS record replay detection MUST be used.</t>
          <t>Sequence number size can be adapted based on how quickly it wraps.</t>
          <t>Many of the TLS registries have a "Recommended" column. Parameters
   not marked as "Y" are NOT RECOMMENDED to support in DTLS in
   SCTP. Non-AEAD cipher suites or cipher suites without
   confidentiality MUST NOT be supported. Cipher suites and parameters
   that do not provide ephemeral key-exchange MUST NOT be supported.</t>
        </section>
        <section anchor="authentication-and-policy-decisions">
          <name>Authentication and Policy Decisions</name>
          <t>DTLS in SCTP MUST be mutually authenticated. Authentication is the
process of establishing the identity of a user or system and verifying
that the identity is valid. DTLS only provides proof of possession of
a key. DTLS in SCTP MUST perform identity authentication. It is
RECOMMENDED that DTLS in SCTP is used with certificate-based
authentication. When certificates are used the application using DTLS
in SCTP is responsible for certificate policies, certificate chain
validation, and identity authentication (HTTPS does for example match
the hostname with a subjectAltName of type dNSName). The application
using DTLS in SCTP defines what the identity is and how it is encoded
and the client and server MUST use the same identity format. Guidance
on server certificate validation can be found in
<xref target="I-D.ietf-uta-rfc6125bis"/>. DTLS in SCTP enables periodic transfer of
mutual revocation information (OSCP stapling) every time a new
parallel connection is set up. All security decisions MUST be based on
the peer's authenticated identity, not on its transport layer
identity.</t>
          <t>It is possible to authenticate DTLS endpoints based on IP addresses in
certificates. SCTP associations can use multiple IP addresses per SCTP
endpoint. Therefore, it is possible that DTLS records will be sent
from a different source IP address or to a different destination IP
address than that originally authenticated. This is not a problem
provided that no security decisions are made based on the source or
destination IP addresses.</t>
        </section>
        <section anchor="new-connections">
          <name>New Connections</name>
          <t>Implementations MUST set up new DTLS connections before any of the
certificates expire. It is RECOMMENDED that all negotiated and
exchanged parameters are the same except for the timestamps in the
certificates. Clients and servers MUST NOT accept a change of identity
during the setup of a new connections, but MAY accept negotiation of
stronger algorithms and security parameters, which might be motivated
by new attacks.</t>
          <t>Allowing new connections can enable denial-of-service attacks. The
endpoints MUST limit the number of simultaneous connections to two.</t>
          <t>To force attackers to do dynamic key exfiltration and limit the
amount of compromised data due to key compromise, implementations MUST
have policies for how often to set up new connections with ephemeral
key exchange such as ECDHE. Implementations SHOULD set up new
connections frequently to force attackers to dynamic key
extraction. E.g., at least every hour and every 100 GB of data which
is a common policy for IPsec <xref target="ANSSI-DAT-NT-003"/>. See
<xref target="I-D.ietf-tls-rfc8446bis"/> for a more detailed discussion on key
compromise and key exfiltration in (D)TLS.</t>
          <t>For many DTLS in SCTP deployments the SCTP association is expected to
have a very long lifetime of months or even years. For associations
with such long lifetimes there is a need to frequently re-authenticate
both client and server by setting up new connections. TLS Certificate
lifetimes significantly shorter than a year are common which is
shorter than many expected SCTP associations protected by DTLS in
SCTP.</t>
        </section>
        <section anchor="padding-of-dtls-records">
          <name>Padding of DTLS Records</name>
          <t>Both SCTP and DTLS contains mechanisms to padd SCTP payloads, and DTLS
records respectively. If padding of SCTP packets are desired to hide
actual message sizes it RECOMMEDED to use the SCTP Padding Chunck
<xref target="RFC4820"/> to generate a consisted SCTP payload size. Support of this
chunk is only required on the sender side. However, if the PAD chunk
is not supported DTLS padding MAY be used.</t>
          <t>It needs to be noted that independent if SCTP padding or DTLS padding
is used the padding is not taken into account by the SCTP congestion
control. Extensive use of padding has potential for worsen congestion
situations as the SCTP association will consume more bandwidth than
its derived share by the congestion control.</t>
          <t>The use of SCTP PAD chunk is recommened as it at least can enable
future extension or SCTP implementation that account also for the
padding. Use of DTLS padding hides this packet expansion from SCTP.</t>
        </section>
        <section anchor="dtls-13">
          <name>DTLS 1.3</name>
          <t>DTLS 1.3 is used instead of DTLS 1.2 being a newer protocol that
addresses known vulnerabilities and only defines strong algorithms
without known major weaknesses at the time of publication.</t>
          <t>DTLS 1.3 requires rekeying before algorithm specific AEAD limits have
been reached. Implementations MAY setup a new DTLS connection instead
of using key-update.</t>
          <t>In DTLS 1.3 any number of tickets can be issued in a connection and
the tickets can be used for resumption as long as they are valid,
which is up to seven days. The nodes in a resumed connection have the
same roles (client or server) as in the connection where the ticket
was issued. Resumption can have significant latency benefits for
quickly restarting a broken DTLS/SCTP association. If tickets and
resumption are used it is enough to issue a single ticket per
connection.</t>
          <t>The PSK key exchange mode psk_ke MUST NOT be used as it does not
provide ephemeral key exchange.</t>
        </section>
      </section>
    </section>
    <section anchor="establishing-dtls-in-sctp">
      <name>Establishing DTLS in SCTP</name>
      <t>This section specifies how DTLS in SCTP is established
   <xref target="I-D.westerlund-tsvwg-sctp-dtls-chunk"/>.</t>
      <t>A DTLS in SCTP Association is built up with traffic
   DTLS connection and Restart DTLS connection.</t>
      <t>Traffic DTLS connection is established as part of extra procedures
   for the DTLS chunk initial handshake (see
   <xref target="initial_dtls_connection"/>) whilst Restart DTLS connection may be
   established when Association is in PROTECTION INITILIZATION state
   or later, and follows the procedure described in
   <xref target="further_dtls_connection"/>.</t>
      <section anchor="dtls-handshake">
        <name>DTLS Handshake</name>
        <section anchor="initial_dtls_connection">
          <name>Handshake of initial DTLS connection</name>
          <t>The handshake of the initial DTLS connection is part of the
   DTLS in SCTP Association initialization.
   The initialization is split in three distinct phases:</t>
          <ul spacing="normal">
            <li>
              <t>SCTP Handshake</t>
            </li>
            <li>
              <t>DTLS Handshake</t>
            </li>
            <li>
              <t>Validation</t>
            </li>
          </ul>
          <t>Moving towards next phase is possible only when the previous
   phase handshake is completed.</t>
          <t>SCTP Handshake is strictly compliant to <xref target="RFC9260"/>.</t>
          <t>As soon the SCTP Association has entered the SCTP state PROTECTION
   INITILIZATION as defined by <xref target="I-D.westerlund-tsvwg-sctp-dtls-chunk"/> the
   DTLS handshake procedure is initiated by the endpoint that has
   initiated the SCTP association. The initial DTLS handshake or as a
   result of a SCTP association restart SHALL use DCI = 0;</t>
          <t>The DTLS endpoint will send the DTLS message in one or more SCTP
   user message depending if the DTLS endpoint fragments the message
   or not <xref target="dtls-user-message"/>.  The DTLS instance SHOULD NOT
   use DTLS retransmission to repair any packet losses of handshake
   message fragment. Note: If the DTLS implementation support
   configuring a MTU larger than the actual IP MTU it MAY be used as
   SCTP provides reliability and fragmentation.</t>
          <t>If the DTLS handshake is successful in establishing a security
   context to protect further communication and the peer identity is
   accepted the keying material is installed for the DTLS chunk. This
   then triggers validated of the association establishment (see
   <xref target="protocol_overview"/>) by handshaking PVALID chunks inside DTLS
   CHUNK payload.</t>
          <t>Once the Association has been validated, then the SCTP association
   is informed that it can move to the PROTECTED state.</t>
          <t>If the DTLS handshake failed the SCTP association SHALL be aborted
   and an ERROR chunk with the Error in Protection error cause, with
   the appropriate extra error causes is generated, the right
   selection of "Error During Protection Handshake" or "Timeout During
   Protection Handshake or Validation".</t>
          <figure anchor="sctp-DTLS-initial-dtls-connection">
            <name>Handshake of initial DTLS connection</name>
            <artset>
              <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="400" width="536" viewBox="0 0 536 400" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                  <path d="M 40,48 L 40,368" fill="none" stroke="black"/>
                  <path d="M 408,48 L 408,368" fill="none" stroke="black"/>
                  <path d="M 440,64 L 440,112" fill="none" stroke="black"/>
                  <path d="M 440,160 L 440,208" fill="none" stroke="black"/>
                  <path d="M 440,256 L 440,272" fill="none" stroke="black"/>
                  <path d="M 440,320 L 440,368" fill="none" stroke="black"/>
                  <path d="M 40,64 L 200,64" fill="none" stroke="black"/>
                  <path d="M 256,64 L 400,64" fill="none" stroke="black"/>
                  <path d="M 48,80 L 184,80" fill="none" stroke="black"/>
                  <path d="M 272,80 L 408,80" fill="none" stroke="black"/>
                  <path d="M 40,96 L 168,96" fill="none" stroke="black"/>
                  <path d="M 280,96 L 400,96" fill="none" stroke="black"/>
                  <path d="M 440,96 L 480,96" fill="none" stroke="black"/>
                  <path d="M 48,112 L 176,112" fill="none" stroke="black"/>
                  <path d="M 280,112 L 408,112" fill="none" stroke="black"/>
                  <path d="M 40,160 L 120,160" fill="none" stroke="black"/>
                  <path d="M 328,160 L 400,160" fill="none" stroke="black"/>
                  <path d="M 48,176 L 64,176" fill="none" stroke="black"/>
                  <path d="M 376,176 L 408,176" fill="none" stroke="black"/>
                  <path d="M 40,192 L 64,192" fill="none" stroke="black"/>
                  <path d="M 368,192 L 400,192" fill="none" stroke="black"/>
                  <path d="M 440,192 L 480,192" fill="none" stroke="black"/>
                  <path d="M 48,208 L 152,208" fill="none" stroke="black"/>
                  <path d="M 288,208 L 408,208" fill="none" stroke="black"/>
                  <path d="M 48,256 L 136,256" fill="none" stroke="black"/>
                  <path d="M 304,256 L 408,256" fill="none" stroke="black"/>
                  <path d="M 40,272 L 136,272" fill="none" stroke="black"/>
                  <path d="M 304,272 L 400,272" fill="none" stroke="black"/>
                  <path d="M 440,272 L 528,272" fill="none" stroke="black"/>
                  <path d="M 40,320 L 96,320" fill="none" stroke="black"/>
                  <path d="M 328,320 L 400,320" fill="none" stroke="black"/>
                  <path d="M 48,336 L 104,336" fill="none" stroke="black"/>
                  <path d="M 336,336 L 408,336" fill="none" stroke="black"/>
                  <path d="M 440,336 L 512,336" fill="none" stroke="black"/>
                  <path d="M 424,48 C 432.83064,48 440,55.16936 440,64" fill="none" stroke="black"/>
                  <path d="M 424,128 C 432.83064,128 440,120.83064 440,112" fill="none" stroke="black"/>
                  <path d="M 424,144 C 432.83064,144 440,151.16936 440,160" fill="none" stroke="black"/>
                  <path d="M 424,224 C 432.83064,224 440,216.83064 440,208" fill="none" stroke="black"/>
                  <path d="M 424,240 C 432.83064,240 440,247.16936 440,256" fill="none" stroke="black"/>
                  <path d="M 424,288 C 432.83064,288 440,280.83064 440,272" fill="none" stroke="black"/>
                  <path d="M 424,304 C 432.83064,304 440,311.16936 440,320" fill="none" stroke="black"/>
                  <polygon class="arrowhead" points="408,320 396,314.4 396,325.6" fill="black" transform="rotate(0,400,320)"/>
                  <polygon class="arrowhead" points="408,272 396,266.4 396,277.6" fill="black" transform="rotate(0,400,272)"/>
                  <polygon class="arrowhead" points="408,192 396,186.4 396,197.6" fill="black" transform="rotate(0,400,192)"/>
                  <polygon class="arrowhead" points="408,160 396,154.4 396,165.6" fill="black" transform="rotate(0,400,160)"/>
                  <polygon class="arrowhead" points="408,96 396,90.4 396,101.6" fill="black" transform="rotate(0,400,96)"/>
                  <polygon class="arrowhead" points="408,64 396,58.4 396,69.6" fill="black" transform="rotate(0,400,64)"/>
                  <polygon class="arrowhead" points="56,336 44,330.4 44,341.6" fill="black" transform="rotate(180,48,336)"/>
                  <polygon class="arrowhead" points="56,256 44,250.4 44,261.6" fill="black" transform="rotate(180,48,256)"/>
                  <polygon class="arrowhead" points="56,208 44,202.4 44,213.6" fill="black" transform="rotate(180,48,208)"/>
                  <polygon class="arrowhead" points="56,176 44,170.4 44,181.6" fill="black" transform="rotate(180,48,176)"/>
                  <polygon class="arrowhead" points="56,112 44,106.4 44,117.6" fill="black" transform="rotate(180,48,112)"/>
                  <polygon class="arrowhead" points="56,80 44,74.4 44,85.6" fill="black" transform="rotate(180,48,80)"/>
                  <g class="text">
                    <text x="40" y="36">Initiator</text>
                    <text x="408" y="36">Responder</text>
                    <text x="228" y="68">[INIT]</text>
                    <text x="228" y="84">[INIT-ACK]</text>
                    <text x="468" y="84">SCTP</text>
                    <text x="200" y="100">[COOKIE</text>
                    <text x="256" y="100">ECHO]</text>
                    <text x="208" y="116">[COOKIE</text>
                    <text x="260" y="116">ACK]</text>
                    <text x="164" y="164">[DATA(DTLS</text>
                    <text x="236" y="164">Client</text>
                    <text x="296" y="164">Hello)]</text>
                    <text x="108" y="180">[DATA(DTLS</text>
                    <text x="180" y="180">Server</text>
                    <text x="232" y="180">Hello</text>
                    <text x="272" y="180">...</text>
                    <text x="332" y="180">Finished)]</text>
                    <text x="468" y="180">DTLS</text>
                    <text x="108" y="196">[DATA(DTLS</text>
                    <text x="200" y="196">Certificate</text>
                    <text x="264" y="196">...</text>
                    <text x="324" y="196">Finished)]</text>
                    <text x="196" y="212">[DATA(DTLS</text>
                    <text x="264" y="212">ACK)]</text>
                    <text x="160" y="260">[DTLS</text>
                    <text x="244" y="260">CHUNK(PVALID)]</text>
                    <text x="492" y="260">VALIDATION</text>
                    <text x="160" y="276">[DTLS</text>
                    <text x="244" y="276">CHUNK(PVALID)]</text>
                    <text x="120" y="324">[DTLS</text>
                    <text x="204" y="324">CHUNK(DATA(APP</text>
                    <text x="296" y="324">DATA))]</text>
                    <text x="464" y="324">APP</text>
                    <text x="500" y="324">DATA</text>
                    <text x="128" y="340">[DTLS</text>
                    <text x="212" y="340">CHUNK(DATA(APP</text>
                    <text x="304" y="340">DATA))]</text>
                    <text x="216" y="356">...</text>
                    <text x="216" y="372">...</text>
                  </g>
                </svg>
              </artwork>
              <artwork type="ascii-art" align="center"><![CDATA[
Initiator                                     Responder
    |                                             | -.
    +--------------------[INIT]------------------>|   |
    |<-----------------[INIT-ACK]-----------------+   | SCTP
    +----------------[COOKIE ECHO]--------------->|   +-----
    |<----------------[COOKIE ACK]----------------+   |
    |                                             | -'
    |                                             | -.
    +----------[DATA(DTLS Client Hello)]--------->|   |
    |<--[DATA(DTLS Server Hello ... Finished)]----+   | DTLS
    +---[DATA(DTLS Certificate ... Finished)]---->|   +-----
    |<-------------[DATA(DTLS ACK)]---------------+   |
    |                                             | -'
    |                                             | -.
    |<-----------[DTLS CHUNK(PVALID)]-------------+   | VALIDATION
    +------------[DTLS CHUNK(PVALID)]------------>|   +-----------
    |                                             | -'
    |                                             | -.
    +-------[DTLS CHUNK(DATA(APP DATA))]--------->|   | APP DATA
    +<-------[DTLS CHUNK(DATA(APP DATA))]---------+   +---------
    |                    ...                      |   |
    |                    ...                      |   |

]]></artwork>
            </artset>
          </figure>
          <t>The <xref target="sctp-DTLS-initial-dtls-connection"/> shows a successfull
handshake and highlits the different parts of the setup. DTLS
handshake messages are transported by means of DATA Chunks
with SCTP-DTLS PPID.</t>
        </section>
        <section anchor="further_dtls_connection">
          <name>Handshake of further DTLS connections</name>
          <t>When the SCTP Association has entered the ESTABLISHED state,
   each of the endpoint can initiate a DTLS handshake.</t>
          <t>The DTLS endpoint will if necessary fragment the handshake into
   multiple records. Each DTLS handshake message fragment
   is sent as a SCTP user message <xref target="dtls-user-message"/>.
   The DTLS instance SHOULD NOT use DTLS retransmission to repair any
   packet losses of handshake message fragment. Note: If the DTLS
   implementation support configuring a MTU larger than the actual IP
   MTU it could be used as SCTP provides reliability and
   fragmentation.</t>
          <t>If the DTLS handshake failed the SCTP association SHALL generate
   an ERROR chunk with the Error in Protection error cause, with
   extra error causes "Error During Protection Handshake".</t>
          <t>The DCI to be used for the handshake depends on the purpose
   of the DTLS connection. If this DTLS connection is being used
   for traffic purpose, DCI value is computed as the last active
   Traffic DCI increased by one modulo 4.
   If this DTLS connection is being used for Restart purpose
   DCI value is computed as the last active Restart DCI increased
   by one modulo 4 and setting R bit to 1.</t>
          <figure anchor="sctp-DTLS-further-dtls-connection">
            <name>Handshake of further DTLS connection</name>
            <artset>
              <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="160" width="448" viewBox="0 0 448 160" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                  <path d="M 40,48 L 40,128" fill="none" stroke="black"/>
                  <path d="M 408,48 L 408,128" fill="none" stroke="black"/>
                  <path d="M 40,64 L 120,64" fill="none" stroke="black"/>
                  <path d="M 328,64 L 400,64" fill="none" stroke="black"/>
                  <path d="M 48,80 L 64,80" fill="none" stroke="black"/>
                  <path d="M 376,80 L 408,80" fill="none" stroke="black"/>
                  <path d="M 40,96 L 64,96" fill="none" stroke="black"/>
                  <path d="M 368,96 L 400,96" fill="none" stroke="black"/>
                  <path d="M 48,112 L 152,112" fill="none" stroke="black"/>
                  <path d="M 288,112 L 408,112" fill="none" stroke="black"/>
                  <polygon class="arrowhead" points="408,96 396,90.4 396,101.6" fill="black" transform="rotate(0,400,96)"/>
                  <polygon class="arrowhead" points="408,64 396,58.4 396,69.6" fill="black" transform="rotate(0,400,64)"/>
                  <polygon class="arrowhead" points="56,112 44,106.4 44,117.6" fill="black" transform="rotate(180,48,112)"/>
                  <polygon class="arrowhead" points="56,80 44,74.4 44,85.6" fill="black" transform="rotate(180,48,80)"/>
                  <g class="text">
                    <text x="40" y="36">Initiator</text>
                    <text x="408" y="36">Responder</text>
                    <text x="164" y="68">[DATA(DTLS</text>
                    <text x="236" y="68">Client</text>
                    <text x="296" y="68">Hello)]</text>
                    <text x="108" y="84">[DATA(DTLS</text>
                    <text x="180" y="84">Server</text>
                    <text x="232" y="84">Hello</text>
                    <text x="272" y="84">...</text>
                    <text x="332" y="84">Finished)]</text>
                    <text x="108" y="100">[DATA(DTLS</text>
                    <text x="200" y="100">Certificate</text>
                    <text x="264" y="100">...</text>
                    <text x="324" y="100">Finished)]</text>
                    <text x="196" y="116">[DATA(DTLS</text>
                    <text x="264" y="116">ACK)]</text>
                  </g>
                </svg>
              </artwork>
              <artwork type="ascii-art" align="center"><![CDATA[
Initiator                                     Responder
    |                                             |
    +----------[DATA(DTLS Client Hello)]--------->|
    |<--[DATA(DTLS Server Hello ... Finished)]----+
    +---[DATA(DTLS Certificate ... Finished)]---->|
    |<-------------[DATA(DTLS ACK)]---------------+
    |                                             |

]]></artwork>
            </artset>
          </figure>
          <t>The <xref target="sctp-DTLS-further-dtls-connection"/> shows a successfull
handshake of a further DTLS connection. Such connections can
be initiated by any of the peers. Same as during the initial
handshake, DTLS handshake messages are transported by means
of DATA chunks with SCTP-DTLS PPID.</t>
        </section>
      </section>
      <section anchor="sctp-restart">
        <name>SCTP Association Restart</name>
        <t>In order to achieve an Association Restart as described in
<xref target="I-D.westerlund-tsvwg-sctp-dtls-chunk"/>, a safe connection
dedicated to Restart SHALL exist and be available.  Furthermore, both
peers SHALL have safely stored both the current Restart DCI value and the
related keying material.  Here we assume that Restart DCI and keying
material are maintained across the events leading to SCTP Restart
request.</t>
        <section anchor="init-dtls-restart-connection">
          <name>Handshake of initial DTLS Restart connection</name>
          <t>As soon as the Association has reached the PROTECTED INITILIZATION state, a
DTLS Restart connection MAY be instantiated.  The instantiation of
the initial DTLS Restart connection follows the rules given in
<xref target="further_dtls_connection"/> where the DCI = 0 (that is initial DCI
= 0) and R bit = 1. Unless a SCTP association restart has happened and
the restart DCI has been used. In this case a new restart DTLS
connection SHALL be established using a restart DCI counter of the current + 1.</t>
          <t>It MAY exist a time gap where the Association is in PROTECTED state
but no DTLS Restart connection exists yet. If a SCTP Restart procedure
will be initiated during that time, it will fail and the Association
will also fail.</t>
          <t>Once initiated, no traffic will be sent over the Restart DTLS
connection so that both endpoints will have a known DTLS record state.</t>
        </section>
        <section anchor="further-dtls-restart-connection">
          <name>Handshake of further DTLS Restart connection</name>
          <t>After the initial DTLS Restart connection has been established, at
least an active DTLS Restart connection shall exist in a known state.
It is recommended that updating of DTLS Restart connection follows the
same times and rules as the traffic DTLS connections and is
implemented by following the rules described in <xref target="parallel-dtls"/>.</t>
          <t>The next DTLS Restart DCI is computed as described in
<xref target="add-dtls-connection"/>.</t>
          <t>The handshake of further DTLS Restart Connection is sequenced as follows:</t>
          <ul spacing="normal">
            <li>
              <t>Perform the DTLS Handshake as described in <xref target="further_dtls_connection"/> on the next Restart DCI</t>
            </li>
            <li>
              <t>The Responder will store the new key before sending DTLS ACK</t>
            </li>
            <li>
              <t>The Initiator at reception of DTLS ACK will initiate closing the current Restart DCI</t>
            </li>
            <li>
              <t>The Responder will reply to the DTLS Close and remove the old key</t>
            </li>
            <li>
              <t>The Initiator receives the answer and remove the old key</t>
            </li>
          </ul>
        </section>
        <section anchor="sctp-assoc-restart-procedure">
          <name>SCTP Association Restart Procedure</name>
          <t>The DTLS in SCTP Association Restart is meant to preserve the security
characteristics.</t>
          <t>In order the Association Restart to proceed both Initiator and Responder
SHALL use the same Restart DCI for COOKIE-ECHO/COOKIE-ACK handshake, that implies
that the Initiator must preserve the Key for that DCI and that the Responder
SHALL NOT change the Key for the Restart DCI during the Restart procedure.</t>
          <figure anchor="sctp-assoc-restart-sequence">
            <name>SCTP Restart sequence for DTLS in SCTP</name>
            <artset>
              <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="464" width="576" viewBox="0 0 576 464" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                  <path d="M 40,48 L 40,432" fill="none" stroke="black"/>
                  <path d="M 408,48 L 408,432" fill="none" stroke="black"/>
                  <path d="M 440,64 L 440,80" fill="none" stroke="black"/>
                  <path d="M 440,128 L 440,144" fill="none" stroke="black"/>
                  <path d="M 440,192 L 440,240" fill="none" stroke="black"/>
                  <path d="M 440,288 L 440,336" fill="none" stroke="black"/>
                  <path d="M 440,384 L 440,432" fill="none" stroke="black"/>
                  <path d="M 40,64 L 200,64" fill="none" stroke="black"/>
                  <path d="M 256,64 L 400,64" fill="none" stroke="black"/>
                  <path d="M 48,80 L 184,80" fill="none" stroke="black"/>
                  <path d="M 272,80 L 408,80" fill="none" stroke="black"/>
                  <path d="M 440,80 L 528,80" fill="none" stroke="black"/>
                  <path d="M 40,128 L 112,128" fill="none" stroke="black"/>
                  <path d="M 320,128 L 400,128" fill="none" stroke="black"/>
                  <path d="M 48,144 L 112,144" fill="none" stroke="black"/>
                  <path d="M 312,144 L 408,144" fill="none" stroke="black"/>
                  <path d="M 440,144 L 520,144" fill="none" stroke="black"/>
                  <path d="M 40,192 L 120,192" fill="none" stroke="black"/>
                  <path d="M 328,192 L 400,192" fill="none" stroke="black"/>
                  <path d="M 48,208 L 64,208" fill="none" stroke="black"/>
                  <path d="M 376,208 L 408,208" fill="none" stroke="black"/>
                  <path d="M 40,224 L 64,224" fill="none" stroke="black"/>
                  <path d="M 368,224 L 400,224" fill="none" stroke="black"/>
                  <path d="M 440,224 L 568,224" fill="none" stroke="black"/>
                  <path d="M 48,240 L 152,240" fill="none" stroke="black"/>
                  <path d="M 288,240 L 408,240" fill="none" stroke="black"/>
                  <path d="M 40,288 L 120,288" fill="none" stroke="black"/>
                  <path d="M 328,288 L 400,288" fill="none" stroke="black"/>
                  <path d="M 48,304 L 64,304" fill="none" stroke="black"/>
                  <path d="M 376,304 L 408,304" fill="none" stroke="black"/>
                  <path d="M 40,320 L 64,320" fill="none" stroke="black"/>
                  <path d="M 368,320 L 400,320" fill="none" stroke="black"/>
                  <path d="M 440,320 L 568,320" fill="none" stroke="black"/>
                  <path d="M 48,336 L 152,336" fill="none" stroke="black"/>
                  <path d="M 288,336 L 408,336" fill="none" stroke="black"/>
                  <path d="M 40,384 L 96,384" fill="none" stroke="black"/>
                  <path d="M 328,384 L 400,384" fill="none" stroke="black"/>
                  <path d="M 48,400 L 104,400" fill="none" stroke="black"/>
                  <path d="M 336,400 L 408,400" fill="none" stroke="black"/>
                  <path d="M 440,400 L 512,400" fill="none" stroke="black"/>
                  <path d="M 424,48 C 432.83064,48 440,55.16936 440,64" fill="none" stroke="black"/>
                  <path d="M 424,96 C 432.83064,96 440,88.83064 440,80" fill="none" stroke="black"/>
                  <path d="M 424,112 C 432.83064,112 440,119.16936 440,128" fill="none" stroke="black"/>
                  <path d="M 424,160 C 432.83064,160 440,152.83064 440,144" fill="none" stroke="black"/>
                  <path d="M 424,176 C 432.83064,176 440,183.16936 440,192" fill="none" stroke="black"/>
                  <path d="M 424,256 C 432.83064,256 440,248.83064 440,240" fill="none" stroke="black"/>
                  <path d="M 424,272 C 432.83064,272 440,279.16936 440,288" fill="none" stroke="black"/>
                  <path d="M 424,352 C 432.83064,352 440,344.83064 440,336" fill="none" stroke="black"/>
                  <path d="M 424,368 C 432.83064,368 440,375.16936 440,384" fill="none" stroke="black"/>
                  <polygon class="arrowhead" points="408,384 396,378.4 396,389.6" fill="black" transform="rotate(0,400,384)"/>
                  <polygon class="arrowhead" points="408,320 396,314.4 396,325.6" fill="black" transform="rotate(0,400,320)"/>
                  <polygon class="arrowhead" points="408,288 396,282.4 396,293.6" fill="black" transform="rotate(0,400,288)"/>
                  <polygon class="arrowhead" points="408,224 396,218.4 396,229.6" fill="black" transform="rotate(0,400,224)"/>
                  <polygon class="arrowhead" points="408,192 396,186.4 396,197.6" fill="black" transform="rotate(0,400,192)"/>
                  <polygon class="arrowhead" points="408,128 396,122.4 396,133.6" fill="black" transform="rotate(0,400,128)"/>
                  <polygon class="arrowhead" points="408,64 396,58.4 396,69.6" fill="black" transform="rotate(0,400,64)"/>
                  <polygon class="arrowhead" points="56,400 44,394.4 44,405.6" fill="black" transform="rotate(180,48,400)"/>
                  <polygon class="arrowhead" points="56,336 44,330.4 44,341.6" fill="black" transform="rotate(180,48,336)"/>
                  <polygon class="arrowhead" points="56,304 44,298.4 44,309.6" fill="black" transform="rotate(180,48,304)"/>
                  <polygon class="arrowhead" points="56,240 44,234.4 44,245.6" fill="black" transform="rotate(180,48,240)"/>
                  <polygon class="arrowhead" points="56,208 44,202.4 44,213.6" fill="black" transform="rotate(180,48,208)"/>
                  <polygon class="arrowhead" points="56,144 44,138.4 44,149.6" fill="black" transform="rotate(180,48,144)"/>
                  <polygon class="arrowhead" points="56,80 44,74.4 44,85.6" fill="black" transform="rotate(180,48,80)"/>
                  <g class="text">
                    <text x="40" y="36">Initiator</text>
                    <text x="408" y="36">Responder</text>
                    <text x="228" y="68">[INIT]</text>
                    <text x="472" y="68">Plain</text>
                    <text x="516" y="68">SCTP</text>
                    <text x="228" y="84">[INIT-ACK]</text>
                    <text x="136" y="132">[DTLS</text>
                    <text x="212" y="132">CHUNK(COOKIE</text>
                    <text x="292" y="132">ECHO)]</text>
                    <text x="488" y="132">Encrypted</text>
                    <text x="136" y="148">[DTLS</text>
                    <text x="212" y="148">CHUNK(COOKIE</text>
                    <text x="288" y="148">ACK)]</text>
                    <text x="164" y="196">[DATA(DTLS</text>
                    <text x="236" y="196">Client</text>
                    <text x="296" y="196">Hello)]</text>
                    <text x="108" y="212">[DATA(DTLS</text>
                    <text x="180" y="212">Server</text>
                    <text x="232" y="212">Hello</text>
                    <text x="272" y="212">...</text>
                    <text x="332" y="212">Finished)]</text>
                    <text x="464" y="212">New</text>
                    <text x="512" y="212">Traffic</text>
                    <text x="560" y="212">DCI</text>
                    <text x="108" y="228">[DATA(DTLS</text>
                    <text x="200" y="228">Certificate</text>
                    <text x="264" y="228">...</text>
                    <text x="324" y="228">Finished)]</text>
                    <text x="196" y="244">[DATA(DTLS</text>
                    <text x="264" y="244">ACK)]</text>
                    <text x="164" y="292">[DATA(DTLS</text>
                    <text x="236" y="292">Client</text>
                    <text x="296" y="292">Hello)]</text>
                    <text x="108" y="308">[DATA(DTLS</text>
                    <text x="180" y="308">Server</text>
                    <text x="232" y="308">Hello</text>
                    <text x="272" y="308">...</text>
                    <text x="332" y="308">Finished)]</text>
                    <text x="464" y="308">New</text>
                    <text x="512" y="308">Restart</text>
                    <text x="560" y="308">DCI</text>
                    <text x="108" y="324">[DATA(DTLS</text>
                    <text x="200" y="324">Certificate</text>
                    <text x="264" y="324">...</text>
                    <text x="324" y="324">Finished)]</text>
                    <text x="196" y="340">[DATA(DTLS</text>
                    <text x="264" y="340">ACK)]</text>
                    <text x="120" y="388">[DTLS</text>
                    <text x="204" y="388">CHUNK(DATA(APP</text>
                    <text x="296" y="388">DATA))]</text>
                    <text x="464" y="388">APP</text>
                    <text x="500" y="388">DATA</text>
                    <text x="128" y="404">[DTLS</text>
                    <text x="212" y="404">CHUNK(DATA(APP</text>
                    <text x="304" y="404">DATA))]</text>
                    <text x="216" y="420">...</text>
                    <text x="216" y="436">...</text>
                  </g>
                </svg>
              </artwork>
              <artwork type="ascii-art" align="center"><![CDATA[
Initiator                                     Responder
    |                                             | -.
    +--------------------[INIT]------------------>|   | Plain SCTP
    |<-----------------[INIT-ACK]-----------------+   +-----------
    |                                             | -'
    |                                             | -.
    +---------[DTLS CHUNK(COOKIE ECHO)]---------->|   | Encrypted
    |<--------[DTLS CHUNK(COOKIE ACK)]------------+   +----------
    |                                             | -'
    |                                             | -.
    +----------[DATA(DTLS Client Hello)]--------->|   |
    |<--[DATA(DTLS Server Hello ... Finished)]----+   | New Traffic DCI
    +---[DATA(DTLS Certificate ... Finished)]---->|   +----------------
    |<-------------[DATA(DTLS ACK)]---------------+   |
    |                                             | -'
    |                                             | -.
    +----------[DATA(DTLS Client Hello)]--------->|   |
    |<--[DATA(DTLS Server Hello ... Finished)]----+   | New Restart DCI
    +---[DATA(DTLS Certificate ... Finished)]---->|   +----------------
    |<-------------[DATA(DTLS ACK)]---------------+   |
    |                                             | -'
    |                                             | -.
    +-------[DTLS CHUNK(DATA(APP DATA))]--------->|   | APP DATA
    +<-------[DTLS CHUNK(DATA(APP DATA))]---------+   +---------
    |                    ...                      |   |
    |                    ...                      |   |

]]></artwork>
            </artset>
          </figure>
          <t>The <xref target="sctp-assoc-restart-sequence"/> shows a successfull
SCTP Association Restart.</t>
          <t>From procedure viewpoint the sequence is the following:</t>
          <ul spacing="normal">
            <li>
              <t>Initiator sends plain INIT (VTag=0), Responder replies INIT-ACK</t>
            </li>
            <li>
              <t>Initiator sends COOKIE-ECHO using DTLS CHUNK encrypted with the Key
tied to the Restart DCI</t>
            </li>
            <li>
              <t>Responder replies with COOKIE-ACK using DTLS CHUNK encrypted with
the Key tied to the Restart DCI</t>
            </li>
            <li>
              <t>Initiator sends handshakes for new Traffic DTLS connnection as well
as new Restart DTLS connection. These DATA chunks will be protected
by the restart DCI.</t>
            </li>
            <li>
              <t>When the handshake for the a new traffic DTLS connection has been
completed, the DCI used to protect
any SCTP chunks is switched from the restart DCI to the new traffic
DCI.</t>
            </li>
          </ul>
          <t>User Data for any ULP traffic MAY be initiated immediately after
COOKIE-ECHO/COOKIE-ACK handshake using the current Restart DCI, that
is even before a new Traffic DCI or a Restart DCI have been
handshaked.  If a problem occurs before the new Restart DCI has been
handshaked, the Association cannot be Restarted, thus it's RECOMMENDED
the new Restart DCI to be handshaked as early as possible.</t>
        </section>
      </section>
    </section>
    <section anchor="parallel-dtls">
      <name>Parallel DTLS Rekeying</name>
      <t>Rekeying in this specification is implemented by replacing the DTLS
connection getting old with a new one by first creating the new DTLS
connection, start using it, then closing the old one.</t>
      <section anchor="criteria-for-rekeying">
        <name>Criteria for Rekeying</name>
        <t>The criteria for rekeying may vary depending on the ULP requirement on
security properties, chosen cipher suits etc. Therefore it is assumed
that the implementation will be configurable by the ULP to meet its demand.</t>
        <t>Likely criteria to impact the need for rekeying through the usage of
new DTLS connection are:</t>
        <ul spacing="normal">
          <li>
            <t>Maximum time since last authentication of the peer</t>
          </li>
          <li>
            <t>Amount of data transferred since last forward secrecy preserving
rekeying</t>
          </li>
          <li>
            <t>The cipher suit's maximum key usage being reached. Although for
DTLS 1.3 usage of the Key Update mechanism can generate new keys
not having the same security properties as opening a new DTLS
connection.</t>
          </li>
        </ul>
      </section>
      <section anchor="procedure-for-rekeying">
        <name>Procedure for Rekeying</name>
        <t>This specification allows up to 2 DTLS connection to be active at the same
time for the current SCTP Association.
The following state machine applies.</t>
        <figure anchor="dtls-rekeying-state-diagram">
          <name>State Diagram for Rekeying</name>
          <artset>
            <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="592" width="472" viewBox="0 0 472 592" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,48 L 8,560" fill="none" stroke="black"/>
                <path d="M 96,32 L 96,64" fill="none" stroke="black"/>
                <path d="M 96,144 L 96,176" fill="none" stroke="black"/>
                <path d="M 96,272 L 96,304" fill="none" stroke="black"/>
                <path d="M 96,368 L 96,400" fill="none" stroke="black"/>
                <path d="M 96,480 L 96,512" fill="none" stroke="black"/>
                <path d="M 136,64 L 136,136" fill="none" stroke="black"/>
                <path d="M 136,176 L 136,264" fill="none" stroke="black"/>
                <path d="M 136,304 L 136,360" fill="none" stroke="black"/>
                <path d="M 136,400 L 136,472" fill="none" stroke="black"/>
                <path d="M 136,512 L 136,560" fill="none" stroke="black"/>
                <path d="M 176,32 L 176,64" fill="none" stroke="black"/>
                <path d="M 176,144 L 176,176" fill="none" stroke="black"/>
                <path d="M 176,272 L 176,304" fill="none" stroke="black"/>
                <path d="M 176,368 L 176,400" fill="none" stroke="black"/>
                <path d="M 176,480 L 176,512" fill="none" stroke="black"/>
                <path d="M 96,32 L 176,32" fill="none" stroke="black"/>
                <path d="M 8,48 L 88,48" fill="none" stroke="black"/>
                <path d="M 96,64 L 176,64" fill="none" stroke="black"/>
                <path d="M 96,144 L 176,144" fill="none" stroke="black"/>
                <path d="M 96,176 L 176,176" fill="none" stroke="black"/>
                <path d="M 96,272 L 176,272" fill="none" stroke="black"/>
                <path d="M 96,304 L 176,304" fill="none" stroke="black"/>
                <path d="M 96,368 L 176,368" fill="none" stroke="black"/>
                <path d="M 96,400 L 176,400" fill="none" stroke="black"/>
                <path d="M 96,480 L 176,480" fill="none" stroke="black"/>
                <path d="M 96,512 L 176,512" fill="none" stroke="black"/>
                <path d="M 8,560 L 136,560" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="144,472 132,466.4 132,477.6" fill="black" transform="rotate(90,136,472)"/>
                <polygon class="arrowhead" points="144,360 132,354.4 132,365.6" fill="black" transform="rotate(90,136,360)"/>
                <polygon class="arrowhead" points="144,264 132,258.4 132,269.6" fill="black" transform="rotate(90,136,264)"/>
                <polygon class="arrowhead" points="144,136 132,130.4 132,141.6" fill="black" transform="rotate(90,136,136)"/>
                <polygon class="arrowhead" points="96,48 84,42.4 84,53.6" fill="black" transform="rotate(0,88,48)"/>
                <g class="text">
                  <text x="136" y="52">YOUNG</text>
                  <text x="224" y="52">There's</text>
                  <text x="276" y="52">only</text>
                  <text x="312" y="52">one</text>
                  <text x="212" y="68">DTLS</text>
                  <text x="276" y="68">connection</text>
                  <text x="344" y="68">until</text>
                  <text x="216" y="84">aging</text>
                  <text x="276" y="84">criteria</text>
                  <text x="328" y="84">are</text>
                  <text x="360" y="84">met</text>
                  <text x="96" y="116">AGING</text>
                  <text x="180" y="116">REMOTE</text>
                  <text x="232" y="116">AGING</text>
                  <text x="132" y="164">AGED</text>
                  <text x="212" y="164">When</text>
                  <text x="244" y="164">in</text>
                  <text x="276" y="164">AGED</text>
                  <text x="320" y="164">state</text>
                  <text x="352" y="164">a</text>
                  <text x="208" y="180">new</text>
                  <text x="244" y="180">DTLS</text>
                  <text x="308" y="180">connection</text>
                  <text x="204" y="196">is</text>
                  <text x="240" y="196">added</text>
                  <text x="284" y="196">with</text>
                  <text x="312" y="196">a</text>
                  <text x="336" y="196">new</text>
                  <text x="384" y="196">Traffic</text>
                  <text x="432" y="196">DCI</text>
                  <text x="72" y="212">NEW</text>
                  <text x="108" y="212">DTLS</text>
                  <text x="212" y="212">Also</text>
                  <text x="240" y="212">a</text>
                  <text x="264" y="212">new</text>
                  <text x="324" y="212">connection</text>
                  <text x="384" y="212">for</text>
                  <text x="432" y="212">Restart</text>
                  <text x="220" y="228">SHOULD</text>
                  <text x="260" y="228">be</text>
                  <text x="296" y="228">added</text>
                  <text x="340" y="228">with</text>
                  <text x="368" y="228">a</text>
                  <text x="208" y="244">new</text>
                  <text x="256" y="244">Restart</text>
                  <text x="304" y="244">DCI</text>
                  <text x="136" y="292">OLD</text>
                  <text x="204" y="292">In</text>
                  <text x="232" y="292">OLD</text>
                  <text x="272" y="292">state</text>
                  <text x="320" y="292">there</text>
                  <text x="208" y="308">are</text>
                  <text x="232" y="308">2</text>
                  <text x="268" y="308">active</text>
                  <text x="316" y="308">DTLS</text>
                  <text x="384" y="308">connections</text>
                  <text x="224" y="324">Traffic</text>
                  <text x="268" y="324">is</text>
                  <text x="316" y="324">switched</text>
                  <text x="364" y="324">to</text>
                  <text x="392" y="324">the</text>
                  <text x="424" y="324">new</text>
                  <text x="456" y="324">one</text>
                  <text x="84" y="340">SWITCH</text>
                  <text x="136" y="388">DRAIN</text>
                  <text x="208" y="388">The</text>
                  <text x="244" y="388">aged</text>
                  <text x="284" y="388">DTLS</text>
                  <text x="348" y="388">connection</text>
                  <text x="204" y="404">is</text>
                  <text x="248" y="404">drained</text>
                  <text x="308" y="404">before</text>
                  <text x="360" y="404">being</text>
                  <text x="408" y="404">ready</text>
                  <text x="204" y="420">to</text>
                  <text x="228" y="420">be</text>
                  <text x="268" y="420">closed</text>
                  <text x="96" y="452">DRAINED</text>
                  <text x="164" y="452">DTLS</text>
                  <text x="236" y="452">close_notify</text>
                  <text x="132" y="500">DEAD</text>
                  <text x="204" y="500">In</text>
                  <text x="236" y="500">DEAD</text>
                  <text x="280" y="500">state</text>
                  <text x="320" y="500">the</text>
                  <text x="356" y="500">aged</text>
                  <text x="236" y="516">connection</text>
                  <text x="292" y="516">is</text>
                  <text x="332" y="516">closed</text>
                  <text x="88" y="548">REMOVED</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art"><![CDATA[
           +---------+
+--------->|  YOUNG  |  There's only one
|          +----+----+  DTLS connection until
|               |       aging criteria are met
|               |
|        AGING  |  REMOTE AGING
|               V
|          +---------+
|          |  AGED   |  When in AGED state a
|          +----+----+  new DTLS connection
|               |       is added with a new Traffic DCI
|      NEW DTLS |       Also a new connection for Restart
|               |       SHOULD be added with a
|               |       new Restart DCI
|               V
|          +---------+
|          |   OLD   |  In OLD state there
|          +----+----+  are 2 active DTLS connections
|               |       Traffic is switched to the new one
|      SWITCH   |
|               V
|          +---------+
|          |  DRAIN  |  The aged DTLS connection
|          +----+----+  is drained before being ready
|               |       to be closed
|               |
|       DRAINED | DTLS close_notify
|               V
|          +---------+
|          |  DEAD   |  In DEAD state the aged
|          +----+----+  connection is closed
|               |
|      REMOVED  |
+---------------+

]]></artwork>
          </artset>
        </figure>
        <t>Trigger for rekeying can either be a local AGING event, triggered by
the DTLS connection meeting the criteria for rekeying, or a REMOTE AGING
event, triggered by receiving a DTLS record on the Traffic DCI that would be
used for new DTLS connection. In such case a new DTLS connection
shall be added according to <xref target="add-dtls-connection"/> with a new Traffic DCI.</t>
        <t>As soon as the new DTLS connection completes handshaking, the traffic
is moved from the old one, then the procedure for closing the old DTLS
connection is initiated, see <xref target="remove-dtls-connection"/>.</t>
        <t>On Restart connection, trigger for rekeying can either be a local
AGING event, triggered by the DTLS connection meeting the criteria for
rekeying, or a REMOTE AGING event, triggered by receiving a DTLS
record on the Restart DCI that would be used for new DTLS
connection. In such case a new DTLS connection shall be added
according to <xref target="add-dtls-connection"/> with a new Restart DCI.</t>
      </section>
      <section anchor="race-condition-in-rekeying">
        <name>Race Condition in Rekeying</name>
        <t>A race condition may happen when both peer experience local AGING event at
the same time and start creation of a new DTLS connection.</t>
        <t>Since the criteria for calculating a new DCI is known and specified in
<xref target="add-dtls-connection"/>, the peers will use the same DCI for
identifying the new DTLS connection. And the race condition is solved
as specified in <xref target="add-dtls-connection"/>.</t>
      </section>
    </section>
    <section anchor="pmtu-discovery-considerations">
      <name>PMTU Discovery Considerations</name>
      <t>Due to the DTLS record limitation for application data SCTP MUST use
2<sup>14</sup> as input to determine absolute maximum MTU when running
PMTUD and using DTLS in SCTP.</t>
      <t>The implementor shall take care of DTLS 1.3 record overhead. This
so that SCTP PMTUD can take this into consideration and ensure that
produced packets that are not PMTUD probes does not become oversized.
This may require updating during the SCTP associations lifetime due to
future handshakes affecting cipher suit in use, or changes to record layer
configurations.</t>
      <t>Note that this implies that DTLS 1.3 is expected to
accept application data payloads of potentially larger sizes than what
it configured to use for messages the DTLS implementation generates
itself for signaling.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <section anchor="general-1">
        <name>General</name>
        <t>The security considerations given in <xref target="RFC9147"/>, <xref target="RFC6347"/>, and
<xref target="RFC9260"/> also apply to this document. BCP 195 <xref target="RFC9325"/>
          <xref target="RFC8996"/> provides recommendations and requirements for improving
the security of deployed services that use DTLS. BCP 195 MUST be
followed which implies that DTLS 1.0 SHALL NOT be supported and are
therefore not defined.</t>
      </section>
      <section anchor="privacy-considerations">
        <name>Privacy Considerations</name>
        <t>Although DTLS in SCTP provides privacy for the actual user message as
well as almost all chunks, some fields are not confidentiality
protected.  In addition to the DTLS record header, the SCTP common
header and the DTLS chunk header are not confidentiality
protected. An attacker can correlate DTLS connections over the same
SCTP association using the SCTP common header.</t>
        <t>To provide identity protection it is RECOMMENDED that DTLS in SCTP is
used with certificate-based authentication in DTLS 1.3 <xref target="RFC9147"/> and
to not reuse tickets.  DTLS 1.3 with external PSK
authentication does not provide identity protection.</t>
        <t>By mandating ephemeral key exchange and cipher suites with
confidentiality DTLS in SCTP effectively mitigate many forms of
passive pervasive monitoring.  By recommending implementations to
frequently set up new DTLS connections with (EC)DHE force attackers to
do dynamic key exfiltration and limits the amount of compromised data
due to key compromise.</t>
      </section>
    </section>
    <section anchor="iana-consideration">
      <name>IANA Consideration</name>
      <t>This document has no IANA considerations currently.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC4820" target="https://www.rfc-editor.org/info/rfc4820" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4820.xml">
          <front>
            <title>Padding Chunk and Parameter for the Stream Control Transmission Protocol (SCTP)</title>
            <author fullname="M. Tuexen" initials="M." surname="Tuexen"/>
            <author fullname="R. Stewart" initials="R." surname="Stewart"/>
            <author fullname="P. Lei" initials="P." surname="Lei"/>
            <date month="March" year="2007"/>
            <abstract>
              <t>This document defines a padding chunk and a padding parameter and describes the required receiver side procedures. The padding chunk is used to pad a Stream Control Transmission Protocol (SCTP) packet to an arbitrary size. The padding parameter is used to pad an SCTP INIT chunk to an arbitrary size. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4820"/>
          <seriesInfo name="DOI" value="10.17487/RFC4820"/>
        </reference>
        <reference anchor="RFC6347" target="https://www.rfc-editor.org/info/rfc6347" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6347.xml">
          <front>
            <title>Datagram Transport Layer Security Version 1.2</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="January" year="2012"/>
            <abstract>
              <t>This document specifies version 1.2 of the Datagram Transport Layer Security (DTLS) protocol. The DTLS protocol provides communications privacy for datagram protocols. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. The DTLS protocol is based on the Transport Layer Security (TLS) protocol and provides equivalent security guarantees. Datagram semantics of the underlying transport are preserved by the DTLS protocol. This document updates DTLS 1.0 to work with TLS version 1.2. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6347"/>
          <seriesInfo name="DOI" value="10.17487/RFC6347"/>
        </reference>
        <reference anchor="RFC8996" target="https://www.rfc-editor.org/info/rfc8996" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8996.xml">
          <front>
            <title>Deprecating TLS 1.0 and TLS 1.1</title>
            <author fullname="K. Moriarty" initials="K." surname="Moriarty"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <date month="March" year="2021"/>
            <abstract>
              <t>This document formally deprecates Transport Layer Security (TLS) versions 1.0 (RFC 2246) and 1.1 (RFC 4346). Accordingly, those documents have been moved to Historic status. These versions lack support for current and recommended cryptographic algorithms and mechanisms, and various government and industry profiles of applications using TLS now mandate avoiding these old TLS versions. TLS version 1.2 became the recommended version for IETF protocols in 2008 (subsequently being obsoleted by TLS version 1.3 in 2018), providing sufficient time to transition away from older versions. Removing support for older versions from implementations reduces the attack surface, reduces opportunity for misconfiguration, and streamlines library and product maintenance.</t>
              <t>This document also deprecates Datagram TLS (DTLS) version 1.0 (RFC 4347) but not DTLS version 1.2, and there is no DTLS version 1.1.</t>
              <t>This document updates many RFCs that normatively refer to TLS version 1.0 or TLS version 1.1, as described herein. This document also updates the best practices for TLS usage in RFC 7525; hence, it is part of BCP 195.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="195"/>
          <seriesInfo name="RFC" value="8996"/>
          <seriesInfo name="DOI" value="10.17487/RFC8996"/>
        </reference>
        <reference anchor="RFC9147" target="https://www.rfc-editor.org/info/rfc9147" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9147.xml">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="RFC9325" target="https://www.rfc-editor.org/info/rfc9325" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9325.xml">
          <front>
            <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="November" year="2022"/>
            <abstract>
              <t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are used to protect data exchanged over a wide range of application protocols and can also form the basis for secure transport protocols. Over the years, the industry has witnessed several serious attacks on TLS and DTLS, including attacks on the most commonly used cipher suites and their modes of operation. This document provides the latest recommendations for ensuring the security of deployed services that use TLS and DTLS. These recommendations are applicable to the majority of use cases.</t>
              <t>RFC 7525, an earlier version of the TLS recommendations, was published when the industry was transitioning to TLS 1.2. Years later, this transition is largely complete, and TLS 1.3 is widely available. This document updates the guidance given the new environment and obsoletes RFC 7525. In addition, this document updates RFCs 5288 and 6066 in view of recent attacks.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="195"/>
          <seriesInfo name="RFC" value="9325"/>
          <seriesInfo name="DOI" value="10.17487/RFC9325"/>
        </reference>
        <reference anchor="RFC9260" target="https://www.rfc-editor.org/info/rfc9260" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9260.xml">
          <front>
            <title>Stream Control Transmission Protocol</title>
            <author fullname="R. Stewart" initials="R." surname="Stewart"/>
            <author fullname="M. Tüxen" initials="M." surname="Tüxen"/>
            <author fullname="K. Nielsen" initials="K." surname="Nielsen"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>This document describes the Stream Control Transmission Protocol (SCTP) and obsoletes RFC 4960. It incorporates the specification of the chunk flags registry from RFC 6096 and the specification of the I bit of DATA chunks from RFC 7053. Therefore, RFCs 6096 and 7053 are also obsoleted by this document. In addition, RFCs 4460 and 8540, which describe errata for SCTP, are obsoleted by this document.</t>
              <t>SCTP was originally designed to transport Public Switched Telephone Network (PSTN) signaling messages over IP networks. It is also suited to be used for other applications, for example, WebRTC.</t>
              <t>SCTP is a reliable transport protocol operating on top of a connectionless packet network, such as IP. It offers the following services to its users:</t>
              <t>The design of SCTP includes appropriate congestion avoidance behavior and resistance to flooding and masquerade attacks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9260"/>
          <seriesInfo name="DOI" value="10.17487/RFC9260"/>
        </reference>
        <reference anchor="I-D.westerlund-tsvwg-sctp-dtls-chunk" target="https://datatracker.ietf.orghttps://datatracker.ietf.org/doc/draft-westerlund-tsvwg-sctp-dtls-chunk/">
          <front>
            <title>Stream Control Transmission Protocol (SCTP) DTLS chunk</title>
            <author initials="M." surname="Westerlund" fullname="Magnus Westerlund">
              <organization>Ericsson</organization>
            </author>
            <author initials="J." surname="Preuß Mattsson" fullname="John Preuß Mattsson">
              <organization>Ericsson</organization>
            </author>
            <author initials="C." surname="Porfiri" fullname="Claudio Porfiri">
              <organization>Ericsson</organization>
            </author>
            <date year="2023" month="June"/>
          </front>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC3758" target="https://www.rfc-editor.org/info/rfc3758" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3758.xml">
          <front>
            <title>Stream Control Transmission Protocol (SCTP) Partial Reliability Extension</title>
            <author fullname="R. Stewart" initials="R." surname="Stewart"/>
            <author fullname="M. Ramalho" initials="M." surname="Ramalho"/>
            <author fullname="Q. Xie" initials="Q." surname="Xie"/>
            <author fullname="M. Tuexen" initials="M." surname="Tuexen"/>
            <author fullname="P. Conrad" initials="P." surname="Conrad"/>
            <date month="May" year="2004"/>
            <abstract>
              <t>This memo describes an extension to the Stream Control Transmission Protocol (SCTP) that allows an SCTP endpoint to signal to its peer that it should move the cumulative ack point forward. When both sides of an SCTP association support this extension, it can be used by an SCTP implementation to provide partially reliable data transmission service to an upper layer protocol. This memo describes the protocol extensions, which consist of a new parameter for INIT and INIT ACK, and a new FORWARD TSN chunk type, and provides one example of a partially reliable service that can be provided to the upper layer via this mechanism. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3758"/>
          <seriesInfo name="DOI" value="10.17487/RFC3758"/>
        </reference>
        <reference anchor="RFC4895" target="https://www.rfc-editor.org/info/rfc4895" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4895.xml">
          <front>
            <title>Authenticated Chunks for the Stream Control Transmission Protocol (SCTP)</title>
            <author fullname="M. Tuexen" initials="M." surname="Tuexen"/>
            <author fullname="R. Stewart" initials="R." surname="Stewart"/>
            <author fullname="P. Lei" initials="P." surname="Lei"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2007"/>
            <abstract>
              <t>This document describes a new chunk type, several parameters, and procedures for the Stream Control Transmission Protocol (SCTP). This new chunk type can be used to authenticate SCTP chunks by using shared keys between the sender and receiver. The new parameters are used to establish the shared keys. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4895"/>
          <seriesInfo name="DOI" value="10.17487/RFC4895"/>
        </reference>
        <reference anchor="RFC5061" target="https://www.rfc-editor.org/info/rfc5061" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5061.xml">
          <front>
            <title>Stream Control Transmission Protocol (SCTP) Dynamic Address Reconfiguration</title>
            <author fullname="R. Stewart" initials="R." surname="Stewart"/>
            <author fullname="Q. Xie" initials="Q." surname="Xie"/>
            <author fullname="M. Tuexen" initials="M." surname="Tuexen"/>
            <author fullname="S. Maruyama" initials="S." surname="Maruyama"/>
            <author fullname="M. Kozuka" initials="M." surname="Kozuka"/>
            <date month="September" year="2007"/>
            <abstract>
              <t>A local host may have multiple points of attachment to the Internet, giving it a degree of fault tolerance from hardware failures. Stream Control Transmission Protocol (SCTP) (RFC 4960) was developed to take full advantage of such a multi-homed host to provide a fast failover and association survivability in the face of such hardware failures. This document describes an extension to SCTP that will allow an SCTP stack to dynamically add an IP address to an SCTP association, dynamically delete an IP address from an SCTP association, and to request to set the primary address the peer will use when sending to an endpoint. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5061"/>
          <seriesInfo name="DOI" value="10.17487/RFC5061"/>
        </reference>
        <reference anchor="RFC6083" target="https://www.rfc-editor.org/info/rfc6083" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6083.xml">
          <front>
            <title>Datagram Transport Layer Security (DTLS) for Stream Control Transmission Protocol (SCTP)</title>
            <author fullname="M. Tuexen" initials="M." surname="Tuexen"/>
            <author fullname="R. Seggelmann" initials="R." surname="Seggelmann"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="January" year="2011"/>
            <abstract>
              <t>This document describes the usage of the Datagram Transport Layer Security (DTLS) protocol over the Stream Control Transmission Protocol (SCTP).</t>
              <t>DTLS over SCTP provides communications privacy for applications that use SCTP as their transport protocol and allows client/server applications to communicate in a way that is designed to prevent eavesdropping and detect tampering or message forgery.</t>
              <t>Applications using DTLS over SCTP can use almost all transport features provided by SCTP and its extensions. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6083"/>
          <seriesInfo name="DOI" value="10.17487/RFC6083"/>
        </reference>
        <reference anchor="I-D.ietf-tls-rfc8446bis" target="https://datatracker.ietf.org/doc/html/draft-ietf-tls-rfc8446bis-09" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-tls-rfc8446bis.xml">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Windy Hill Systems, LLC</organization>
            </author>
            <date day="7" month="July" year="2023"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery. This document updates RFCs 5705, 6066, 7627, and 8422 and obsoletes RFCs 5077, 5246, 6961, and 8446. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8446bis-09"/>
        </reference>
        <reference anchor="I-D.ietf-tsvwg-dtls-over-sctp-bis" target="https://datatracker.ietf.org/doc/html/draft-ietf-tsvwg-dtls-over-sctp-bis-07" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-tsvwg-dtls-over-sctp-bis.xml">
          <front>
            <title>Datagram Transport Layer Security (DTLS) over Stream Control Transmission Protocol (SCTP)</title>
            <author fullname="Magnus Westerlund" initials="M." surname="Westerlund">
              <organization>Ericsson</organization>
            </author>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Claudio Porfiri" initials="C." surname="Porfiri">
              <organization>Ericsson</organization>
            </author>
            <date day="23" month="October" year="2023"/>
            <abstract>
              <t>This document describes the usage of the Datagram Transport Layer Security (DTLS) protocol to protect user messages sent over the Stream Control Transmission Protocol (SCTP). It is an improved alternative to the existing RFC 6083. DTLS over SCTP provides mutual authentication, confidentiality, integrity protection, and partial replay protection for applications that use SCTP as their transport protocol and allows client/server applications to communicate in a way that is designed to give communications privacy and to prevent eavesdropping and detect tampering or message forgery. Applications using DTLS over SCTP can use almost all transport features provided by SCTP and its extensions. This document is an improved alternative to RFC 6083 and removes the 16 kbytes limitation on protected user message size by defining a secure user message fragmentation so that multiple DTLS records can be used to protect a single user message. It further contains a large number of security fixes and improvements. It updates the DTLS versions and SCTP-AUTH HMAC algorithms to use. It mitigates reflection attacks of data and control chunks and replay attacks of data chunks. It simplifies secure implementation by some stricter requirements on the establishment procedures as well as rekeying to align with zero trust principles.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tsvwg-dtls-over-sctp-bis-07"/>
        </reference>
        <reference anchor="I-D.ietf-uta-rfc6125bis" target="https://datatracker.ietf.org/doc/html/draft-ietf-uta-rfc6125bis-15" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-uta-rfc6125bis.xml">
          <front>
            <title>Service Identity in TLS</title>
            <author fullname="Peter Saint-Andre" initials="P." surname="Saint-Andre">
              <organization>independent</organization>
            </author>
            <author fullname="Rich Salz" initials="R." surname="Salz">
              <organization>Akamai Technologies</organization>
            </author>
            <date day="10" month="August" year="2023"/>
            <abstract>
              <t>Many application technologies enable secure communication between two entities by means of Transport Layer Security (TLS) with Internet Public Key Infrastructure Using X.509 (PKIX) certificates. This document specifies procedures for representing and verifying the identity of application services in such interactions. This document obsoletes RFC 6125.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-uta-rfc6125bis-15"/>
        </reference>
        <reference anchor="ANSSI-DAT-NT-003" target="&lt;https://www.ssi.gouv.fr/uploads/2015/09/NT_IPsec_EN.pdf&gt;">
          <front>
            <title>Recommendations for securing networks with IPsec</title>
            <author initials="" surname="Agence nationale de la sécurité des systèmes d'information">
              <organization/>
            </author>
            <date year="2015" month="August"/>
          </front>
          <seriesInfo name="ANSSI Technical Report DAT-NT-003" value=""/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
