<?xml version='1.0' encoding='utf-8'?>

<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<?xml-stylesheet type='text/xsl' href='rfc2629.xslt' ?>

<rfc
      xmlns:xi="http://www.w3.org/2001/XInclude"
      category="std"
      docName="draft-ciphersuites-in-sec-syslog-01"
      ipr="trust200902"
      obsoletes=""
      updates="5425 6012"
      submissionType="IETF"
      xml:lang="en"
      tocInclude="true"
      tocDepth="4"
      symRefs="true"
      sortRefs="true"
      version="3">

 <!-- ***** FRONT MATTER ***** -->

 <front>

   <title abbrev="Cipher Suites in Secure Syslog">Updates to the Cipher Suites in Secure Syslog</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-xml2rfc-template-06"/>

   <author fullname="Chris Lonvick" initials="C." surname="Lonvick">
      <address>
        <email>lonvick.ietf@gmail.com</email>
     </address>
    </author>
    
     <author fullname="Sean Turner" initials="S." surname="Turner">
      <organization>sn3rd</organization>
      <address>
        <email>sean@sn3rd.com</email>
     </address>
    </author>
    
     <author fullname="Joe Salowey" initials="J." surname="Salowey">
      <organization>Salesforce</organization>
      <address>
        <email>joe@salowey.net</email>
     </address>
    </author>

    
    <date year="2022"/>

   <!-- Meta-data Declarations -->

   <area>General</area>
    <workgroup>Internet Engineering Task Force</workgroup>
  

	<keyword>syslog</keyword>
	<keyword>secure syslog</keyword>
	<keyword>TLS_RSA_WITH_AES_128_CBC_SHA</keyword>
	<keyword>TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256</keyword>
	<keyword>DTLS</keyword>
	<keyword>TLS</keyword>
	<keyword>cipher suite</keyword>

	<abstract>
		<t>This document updates the cipher suites in RFC 5425, Transport Layer Security 
		(TLS) Transport Mapping for Syslog, and RFC 6012, Datagram Transport Layer 
		Security (DTLS) Transport Mapping for Syslog. It also updates the transport
		protocol in RFC 6012.</t>
    </abstract>
	</front>
	<middle>
    <section numbered="true" toc="default">
    	<name>Introduction</name>
			<t>
			The Syslog Working Group produced 
			<xref target="RFC5425">Transport Layer Security (TLS) Transport Mapping for Syslog</xref>
			and
			<xref target="RFC6012">Datagram Transport Layer Security (DTLS) Transport Mapping for Syslog</xref>.
			</t><t>
			Both <xref target="RFC5425" /> and <xref target="RFC6012" /> 
			<bcp14>MUST</bcp14> support certificates as defined in 
			<xref target="RFC5280" />.
			</t><t>
			<xref target="RFC5425" /> requires that implementations "<bcp14>MUST</bcp14>" 
			support TLS 1.2 <xref target="RFC5246" /> and are "<bcp14>REQUIRED</bcp14>" 
			to support the mandatory to implement cipher suite 
			TLS_RSA_WITH_AES_128_CBC_SHA (Section 4.2). 
			</t><t>
			<xref target="RFC6012" /> requires that implementations "<bcp14>MUST</bcp14>" 
			support DTLS 1.0 <xref target="RFC4347" /> and are also 
			"<bcp14>REQUIRED</bcp14>" to support the mandatory to implement cipher suite 
			TLS_RSA_WITH_AES_128_CBC_SHA (Section 5.2).
			</t><t>
			The TLS_RSA_WITH_AES_128_CBC_SHA cipher suite has been found to be weak and 
			the community is moving away from it and towards more robust suites.
			</t><t>
			The DTLS 1.0 transport <xref target="RFC4347" /> has been deprecated by 
			<xref target="BCP195" /> and the community is moving to DTLS 1.2 
			<xref target="RFC6347" /> and DTLS 1.3 <xref target="I-D.ietf-tls-dtls13" />.
			</t><t>
			This document updates <xref target="RFC5425" /> and <xref target="RFC6012" /> 
			to deprecate the use of TLS_RSA_WITH_AES_128_CBC_SHA and to make new 
			recommendations to a mandatory to implement cipher suite to be used for 
			implementations. 
			
			This document also updates <xref target="RFC6012" /> to make a recommendation 
			of a mandatory to implement secure datagram transport.
			</t>
		</section>
		
		<section anchor="name-terminology" title="Terminology" numbered="true" toc="default">
			<t>
			The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", 
			"<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", 
			"<bcp14>SHALL NOT</bcp14>", "<bcp14>SHOULD</bcp14>", 
			"<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", 
			"<bcp14>NOT RECOMMENDED</bcp14>", "<bcp14>MAY</bcp14>", and 
			"<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
			described in BCP 14
			[<xref target="RFC2119" format="default" sectionFormat="of" derivedContent="RFC2119"/>] 
			[<xref target="RFC8174" format="default" sectionFormat="of" derivedContent="RFC8174"/>]
			when, and only when, they appear in all capitals, as shown here.
			</t>
		</section>

		<section anchor="reasons" title="Support for Updating" numbered="true" toc="default">	
			<t>
			<xref target="I-D.salowey-tls-rfc8447bis" /> generally reminds us that 
			cryptographic algorithms and parameters will be broken or weakened over time.  
			Blindly implementing the cryptographic algorithms listed in any specification 
			is not advised. Implementers and users need to check that the cryptographic 
			algorithms specified continue to provide the expected level of security.
			</t><t>
			As the Syslog Working Group determined, Syslog clients and servers 
			<bcp14>MUST</bcp14> use certificates as defined in <xref target="RFC5280" />.
			Since both <xref target="RFC5425" /> and <xref target="RFC6012" /> 
			<bcp14>REQUIRE</bcp14> the use of TLS_RSA_WITH_AES_128_CBC_SHA, it is very
			likely that RSA certificates have been implemented in devices adhering to
			those specifications. <xref target="BCP195" /> notes that ECDHE cipher suites 
			exist for both RSA and ECDSA certificates, so moving to an ECDHE cipher suite 
			will not require replacing or moving away from any currently installed 
			RSA-based certificates.
			</t><t>
			<xref target="I-D.saviram-tls-deprecate-obsolete-kex" /> documents that the
			cipher suite TLS_RSA_WITH_AES_128_CBC_SHA has been found to be weak. As 
			such, the community is moving away from that and other weak suites and
			towards more robust suites such as TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
			which is also listed as a currently Recommended algorithm in
			<xref target="I-D.salowey-tls-rfc8447bis" />.
			</t><t>
			Along those lines, <xref target="I-D.ietf-uta-rfc7525bis" /> notes that
			TLS_RSA_WITH_AES_128_CBC_SHA does not provide forward secrecy, a feature
			that is highly desirable in securing event messages. That document also goes 
			on to recommend TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 as a cipher suite that
			does provide forward secrecy. 
			</t><t>
			Therefore, the mandatory to implement cipher suites listed in 
			<xref target="RFC5425" /> and <xref target="RFC6012" /> must be updated so 
			that implementations of secure syslog are still considered to provide an
			acceptable and expected level of security.
			</t><t>
			Additionally, <xref target="BCP195" /> 
			[<xref target="RFC8996" format="default" />] deprecates the use 
			of DTLS 1.0 <xref target="RFC4347" />, which is the mandatory to implement 
			transport protocol for <xref target="RFC6012" />. Therefore, the transport
			protocol for <xref target="RFC6012" /> must be updated.
			</t>
		</section>
    
		<section anchor="updates5425" title="Updates to RFC 5425">
			<t>
			Implementations of <xref target="RFC5425" /> <bcp14>MUST NOT</bcp14> offer 
			TLS_RSA_WITH_AES_128_CBC_SHA. The mandatory to implement cipher suite is
			<bcp14>REQUIRED</bcp14> to be TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256.
			</t><t>
			Implementations of <xref target="RFC5425" /> <bcp14>MUST</bcp14> continue to 
			use TLS 1.2 <xref target="RFC5246" /> as the mandatory to implement 
			transport protocol.
			</t><t>
			Implementations of <xref target="RFC5425" /> <bcp14>MAY</bcp14> use 
			TLS 1.3 <xref target="RFC8446" /> as a transport as long as they support
			the currently recommended cipher suites.
			</t><t>
            EDITOR's NOTE: Need to address 0-RTT considerations.
            </t>
		</section>
			
		<section anchor="updates6012" title="Updates to RFC 6012">	
			<t>
			Implementations of <xref target="RFC6012" /> <bcp14>MUST NOT</bcp14> offer 
			TLS_RSA_WITH_AES_128_CBC_SHA. The mandatory to implement cipher suite is
			<bcp14>REQUIRED</bcp14> to be TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256.
			</t><t>
			As specified in <xref target="BCP195" />, implementations of 
			<xref target="RFC6012" /> must not use DTLS 1.0 <xref target="RFC4347" />. 
			Implementations MUST use DTLS 1.2 <xref target="RFC6347" />.
			</t><t>
			DTLS 1.2 <xref target="RFC6347" /> implementations are 
			<bcp14>REQUIRED</bcp14> to support the mandatory to implement 
			cipher suite, which is TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256.
			</t><t>
			Implementations of <xref target="RFC6012" /> <bcp14>MAY</bcp14> use 
			DTLS 1.3 <xref target="I-D.ietf-tls-dtls13" /> as a transport as long
            as they support the currently recommended cipher suites.
            </t><t>
            EDITOR's NOTE: Need to address 0-RTT considerations.
            </t>
		</section>   
   
		<section anchor="notes" title="Authors Notes">
			<t>
			This section will be removed prior to publication.
			</t><t>
			This is version -01. Comments were received regarding the -00 version that 
			this document should not imply that the use of DTLS1.0 is being deprecated by 
			this I-D since that was done by RFC 8996. Edits have been made to clarify 
			that. Also, the authors want this document to update RFC 6012 because it says 
			more about cipher suites than RFC 8996 and, since there will be 1.3, we’re 
			saying ya' gotta use 1.2 (for now).
			</t><t>
			Members of IEC 62351 TC 57 WG15, who prompted this work, have proposed the 
			following text to be inserted into their documents.
			</t><blockquote>
			<t indent="0">
			The selection of TLS connection parameters such as cipher suites, session 
			resumption and renegotiation shall be reused from IEC 62351-3 specification. 
			Note that port TCP/6514 is assigned by IANA to RFC 5425 (syslog-tls). The RFC 
			requires the support of TLS1.2 and a SHA-1 based cipher suite, but does not 
			mandate its use. The cipher does not align with IEC 62351-3 Ed.2  for 
			profiling TLS. Nevertheless, RFC 5425 does not rule out to use stronger cipher 
			suites. With this, clients and server supporting the selection of cipher 
			suites stated in IEC 62351-3 Ed2 will not experience interoperability 
			problems. Caution has to be taken in environments in which interworking with 
			existing services utilizing syslog over TLS is intended. For these, the 
			syslog server needs to be enabled to support the required cipher suites. This 
			ensures connectivity with clients complying to this document and others 
			complying to RFC 5425. Note that meanwhile the work on an update of RFC 5425 
			and RFC 6012 has started. It targets the adoption of stronger cipher suites 
			for TLS and DTLS to protect syslog communication.
			</t>
			</blockquote><t>
			Comments on this text are welcome.
			</t>
		</section>
    
		<section anchor="Acks" numbered="true" toc="default">
			<name>Acknowledgments</name>
			<t>The authors would like to thank Arijit Kumar Bose, Steffen Fries and the 
			members of IEC TC57 WG15 for their review, comments, and suggestions. The
			authors would also like to thank Tom Petch and Juergen Schoenwaelder for 
			their comments and constructive feedback.
			</t>
		</section>

		<section anchor="IANA" numbered="true" toc="default">
			<name>IANA Considerations</name>
			<t>This document makes no requests to IANA.</t>
		</section>
		<section anchor="Security" numbered="true" toc="default">
			<name>Security Considerations</name>
			<t>
			<xref target="BCP195" /> deprecates an insecure DTLS transport protocol 
			from <xref target="RFC6012" /> and deprecates insecure cipher suits from 
			<xref target="RFC5425" /> and <xref target="RFC6012" />. This document 
			specifies mandatory to implement cipher suites to those RFCs and the latest
			version of the DTLS protocol to <xref target="RFC6012" />.
			</t>
		</section>
  </middle>
  <!--  *****BACK MATTER ***** -->

 <back>
   
   <references>
      <name>References</name>
      <references>
        <name>Normative References</name>

<referencegroup anchor="BCP14" target="https://www.rfc-editor.org/info/bcp14">
<!-- reference.RFC.2119.xml -->
<reference  anchor='RFC2119' target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author initials='S.' surname='Bradner' fullname='S. Bradner'><organization /></author>
<date year='1997' month='March' />
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>
<!-- reference.RFC.8174.xml -->
<reference  anchor='RFC8174' target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author initials='B.' surname='Leiba' fullname='B. Leiba'><organization /></author>
<date year='2017' month='May' />
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>
</referencegroup>

<reference  anchor='RFC5425' target='https://www.rfc-editor.org/info/rfc5425'>
<front>
<title>Transport Layer Security (TLS) Transport Mapping for Syslog</title>
<author initials='F.' surname='Miao' fullname='F. Miao' role='editor'><organization /></author>
<author initials='Y.' surname='Ma' fullname='Y. Ma' role='editor'><organization /></author>
<author initials='J.' surname='Salowey' fullname='J. Salowey' role='editor'><organization /></author>
<date year='2009' month='March' />
<abstract><t>This document describes the use of Transport Layer Security (TLS) to provide a secure connection for the transport of syslog messages. This document describes the security threats to syslog and how TLS can be used to counter such threats.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5425'/>
<seriesInfo name='DOI' value='10.17487/RFC5425'/>
</reference>

<reference  anchor='RFC5246' target='https://www.rfc-editor.org/info/rfc5246'>
<front>
<title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
<author initials='T.' surname='Dierks' fullname='T. Dierks'><organization /></author>
<author initials='E.' surname='Rescorla' fullname='E. Rescorla'><organization /></author>
<date year='2008' month='August' />
<abstract><t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol.  The TLS protocol provides communications security over the Internet.  The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5246'/>
<seriesInfo name='DOI' value='10.17487/RFC5246'/>
</reference>

<reference  anchor='RFC8446' target='https://www.rfc-editor.org/info/rfc8446'>
<front>
<title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
<author initials='E.' surname='Rescorla' fullname='E. Rescorla'><organization /></author>
<date year='2018' month='August' />
<abstract><t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t><t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t></abstract>
</front>
<seriesInfo name='RFC' value='8446'/>
<seriesInfo name='DOI' value='10.17487/RFC8446'/>
</reference>

<reference  anchor='RFC6347' target='https://www.rfc-editor.org/info/rfc6347'>
<front>
<title>Datagram Transport Layer Security Version 1.2</title>
<author initials='E.' surname='Rescorla' fullname='E. Rescorla'><organization /></author>
<author initials='N.' surname='Modadugu' fullname='N. Modadugu'><organization /></author>
<date year='2012' month='January' />
<abstract><t>This document specifies version 1.2 of the Datagram Transport Layer Security (DTLS) protocol.  The DTLS protocol provides communications privacy for datagram protocols.  The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.  The DTLS protocol is based on the Transport Layer Security (TLS) protocol and provides equivalent security guarantees.  Datagram semantics of the underlying transport are preserved by the DTLS protocol.  This document updates DTLS 1.0 to work with TLS version 1.2.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6347'/>
<seriesInfo name='DOI' value='10.17487/RFC6347'/>
</reference>

<reference  anchor='RFC4347' target='https://www.rfc-editor.org/info/rfc4347'>
<front>
<title>Datagram Transport Layer Security</title>
<author initials='E.' surname='Rescorla' fullname='E. Rescorla'><organization /></author>
<author initials='N.' surname='Modadugu' fullname='N. Modadugu'><organization /></author>
<date year='2006' month='April' />
<abstract><t>This document specifies Version 1.0 of the Datagram Transport Layer Security (DTLS) protocol.  The DTLS protocol provides communications privacy for datagram protocols.  The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.  The DTLS protocol is based on the Transport Layer Security (TLS) protocol and provides equivalent security guarantees.  Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t></abstract>
</front>
<seriesInfo name='RFC' value='4347'/>
<seriesInfo name='DOI' value='10.17487/RFC4347'/>
</reference>

<reference  anchor='RFC6012' target='https://www.rfc-editor.org/info/rfc6012'>
<front>
<title>Datagram Transport Layer Security (DTLS) Transport Mapping for Syslog</title>
<author initials='J.' surname='Salowey' fullname='J. Salowey'><organization /></author>
<author initials='T.' surname='Petch' fullname='T. Petch'><organization /></author>
<author initials='R.' surname='Gerhards' fullname='R. Gerhards'><organization /></author>
<author initials='H.' surname='Feng' fullname='H. Feng'><organization /></author>
<date year='2010' month='October' />
<abstract><t>This document describes the transport of syslog messages over the Datagram Transport Layer Security (DTLS) protocol.  It provides a secure transport for syslog messages in cases where a connectionless transport is desired.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6012'/>
<seriesInfo name='DOI' value='10.17487/RFC6012'/>
</reference>

<reference  anchor='RFC5280' target='https://www.rfc-editor.org/info/rfc5280'>
<front>
<title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
<author initials='D.' surname='Cooper' fullname='D. Cooper'><organization /></author>
<author initials='S.' surname='Santesson' fullname='S. Santesson'><organization /></author>
<author initials='S.' surname='Farrell' fullname='S. Farrell'><organization /></author>
<author initials='S.' surname='Boeyen' fullname='S. Boeyen'><organization /></author>
<author initials='R.' surname='Housley' fullname='R. Housley'><organization /></author>
<author initials='W.' surname='Polk' fullname='W. Polk'><organization /></author>
<date year='2008' month='May' />
<abstract><t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet.  An overview of this approach and model is provided as an introduction.  The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms.  Standard certificate extensions are described and two Internet-specific extensions are defined.  A set of required certificate extensions is specified.  The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions.  An algorithm for X.509 certification path validation is described.  An ASN.1 module and examples are provided in the appendices.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5280'/>
<seriesInfo name='DOI' value='10.17487/RFC5280'/>
</reference>

<referencegroup anchor="BCP195" target="https://www.rfc-editor.org/info/bcp195">
<!-- reference.RFC.7525.xml -->
<reference  anchor='RFC7525' target='https://www.rfc-editor.org/info/rfc7525'>
<front>
<title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
<author initials='Y.' surname='Sheffer' fullname='Y. Sheffer'><organization /></author>
<author initials='R.' surname='Holz' fullname='R. Holz'><organization /></author>
<author initials='P.' surname='Saint-Andre' fullname='P. Saint-Andre'><organization /></author>
<date year='2015' month='May' />
<abstract><t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are widely used to protect data exchanged over application protocols such as HTTP, SMTP, IMAP, POP, SIP, and XMPP.  Over the last few years, several serious attacks on TLS have emerged, including attacks on its most commonly used cipher suites and their modes of operation.  This document provides recommendations for improving the security of deployed services that use TLS and DTLS. The recommendations are applicable to the majority of use cases.</t></abstract>
</front>
<seriesInfo name='BCP' value='195'/>
<seriesInfo name='RFC' value='7525'/>
<seriesInfo name='DOI' value='10.17487/RFC7525'/>
</reference>
<reference  anchor='RFC8996' target='https://www.rfc-editor.org/info/rfc8996'>
<front>
<title>Deprecating TLS 1.0 and TLS 1.1</title>
<author initials='K.' surname='Moriarty' fullname='K. Moriarty'><organization /></author>
<author initials='S.' surname='Farrell' fullname='S. Farrell'><organization /></author>
<date year='2021' month='March' />
<abstract><t>This document formally deprecates Transport Layer Security (TLS) versions 1.0 (RFC 2246) and 1.1 (RFC 4346). Accordingly, those documents have been moved to Historic status. These versions lack support for current and recommended cryptographic algorithms and mechanisms, and various government and industry profiles of applications using TLS now mandate avoiding these old TLS versions. TLS version 1.2 became the recommended version for IETF protocols in 2008 (subsequently being obsoleted by TLS version 1.3 in 2018), providing sufficient time to transition away from older versions. Removing support for older versions from implementations reduces the attack surface, reduces opportunity for misconfiguration, and streamlines library and product maintenance. </t><t>This document also deprecates Datagram TLS (DTLS) version 1.0 (RFC 4347) but not DTLS version 1.2, and there is no DTLS version 1.1.</t><t>This document updates many RFCs that normatively refer to TLS version 1.0 or TLS version 1.1, as described herein. This document also updates the best practices for TLS usage in RFC 7525; hence, it is part of BCP 195.</t></abstract>
</front>
<seriesInfo name='BCP' value='195'/>
<seriesInfo name='RFC' value='8996'/>
<seriesInfo name='DOI' value='10.17487/RFC8996'/>
</reference>
</referencegroup>

      </references>
      <references>
        <name>Informative References</name>

<reference anchor='I-D.salowey-tls-rfc8447bis'>
<front>
<title>IANA Registry Updates for TLS and DTLS</title>
<author initials='J.' surname='Salowey' fullname='J. Salowey'><organization /></author>
<author initials='S.' surname='Turner' fullname='S. Turner'><organization /></author>
<date month='December' day='2' year='2021' />
<abstract><t>This document describes a number of changes to TLS and DTLS IANA
registries that range from adding notes to the registry all the way
to changing the registration policy.  These changes were mostly
motivated by WG review of the TLS- and DTLS-related registries
undertaken as part of the TLS 1.3 development process.
</t><t>
This document obsoletes RFC8447 and updates the following RFCs: 3749,
5077, 4680, 5246, 5705, 5878, 6520, 7301.</t></abstract>
</front>
<seriesInfo name='Internet-Draft' value='draft-salowey-tls-rfc8447bis-01' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-salowey-tls-rfc8447bis-01.txt' />
</reference>

<reference anchor='I-D.saviram-tls-deprecate-obsolete-kex'>
<front>
<title>Deprecating Obsolete Key Exchange Methods in TLS</title>
<author initials='N.' surname='Aviram' fullname='N. Aviram'><organization /></author>
<date month='July' day='9' year='2021' />
<abstract><t>This document deprecates the use of RSA key exchange in TLS, and
   limits the use of Diffie Hellman key exchange over a finite field
   such as to avoid known vulnerabilities or improper security
   properties.</t></abstract>
</front>
<seriesInfo name='Internet-Draft' value='draft-aviram-tls-deprecate-obsolete-kex-00' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-aviram-tls-deprecate-obsolete-kex-00.txt' />
</reference>

<reference anchor='I-D.ietf-uta-rfc7525bis'>
<front>
<title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
<author initials='Y.' surname='Sheffer' fullname='Y. Sheffer'><organization /></author>
<author initials='R.' surname='Holz' fullname='R. Holz'><organization /></author>
<author initials='P.' surname='Saint-Andre' fullname='P. Saint-Andre'><organization /></author>
<author initials='T.' surname='Fossati' fullname='T. Fossati'><organization /></author>
<date month='December' day='2' year='2021' />
<abstract><t>Transport Layer Security (TLS) and Datagram Transport Layer Security
   (DTLS) are widely used to protect data exchanged over application
   protocols such as HTTP, SMTP, IMAP, POP, SIP, and XMPP.  Over the
   last few years, several serious attacks on TLS have emerged,
   including attacks on its most commonly used cipher suites and their
   modes of operation.  This document provides recommendations for
   improving the security of deployed services that use TLS and DTLS.
   The recommendations are applicable to the majority of use cases.
</t><t>
   This document was published as RFC 7525 when the industry was in the
   midst of its transition to TLS 1.2.  Years later this transition is
   largely complete and TLS 1.3 is widely available.  Given the new
   environment, we believe new guidance is needed.</t></abstract>
</front>
<seriesInfo name='Internet-Draft' value='draft-ietf-uta-rfc7525bis-04' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-uta-rfc7525bis-04.txt' />
</reference>

<reference anchor='I-D.ietf-tls-dtls13'>
<front>
<title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
<author initials='E.' surname='Rescorla' fullname='E. Rescorla'><organization /></author>
<author initials='H.' surname='Tschofenig' fullname='H. Tschofenig'><organization /></author>
<author initials='N.' surname='Modadugu' fullname='N. Modadugu'><organization /></author>
<date month='April' day='30' year='2021' />
<abstract><t>This document specifies Version 1.3 of the Datagram Transport Layer
   Security (DTLS) protocol.  DTLS 1.3 allows client/server applications
   to communicate over the Internet in a way that is designed to prevent
   eavesdropping, tampering, and message forgery.</t><t>
   The DTLS 1.3 protocol is intentionally based on the Transport Layer
   Security (TLS) 1.3 protocol and provides equivalent security
   guarantees with the exception of order protection/non-replayability.
   Datagram semantics of the underlying transport are preserved by the
   DTLS protocol.</t><t>
   This document obsoletes RFC 6347.</t></abstract>
</front>
<seriesInfo name='Internet-Draft' value='draft-ietf-tls-dtls13' />
<format type='TXT'
        target='https://www.ietf.org/archive/id/draft-ietf-tls-dtls13-43.txt' />
</reference>
      </references>
    </references>
    
 </back>
</rfc>
