<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.3.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-tls-ech-keylogfile-01" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.2 -->
  <front>
    <title>SSLKEYLOGFILE Extension for Encrypted Client Hello (ECH)</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-tls-ech-keylogfile-01"/>
    <author initials="Y." surname="Rosomakho" fullname="Yaroslav Rosomakho">
      <organization>Zscaler</organization>
      <address>
        <email>yrosomakho@zscaler.com</email>
      </address>
    </author>
    <author initials="H." surname="Tschofenig" fullname="Hannes Tschofenig">
      <organization abbrev="H-BRS">University of Applied Sciences Bonn-Rhein-Sieg</organization>
      <address>
        <email>Hannes.Tschofenig@gmx.net</email>
      </address>
    </author>
    <date year="2024" month="October" day="21"/>
    <area>Security</area>
    <workgroup>Transport Layer Security</workgroup>
    <keyword>encrypted client hello</keyword>
    <keyword>sslkeylog</keyword>
    <abstract>
      <?line 41?>

<t>This document specifies an extension to the SSLKEYLOGFILE format to support the logging of information about Encrypted Client Hello (ECH) related secrets. Two new labels are introduced, namely ECH_SECRET and ECH_CONFIG, which log the Hybrid Public Key Encryption (HPKE)-derived shared secret and the ECHConfig used for the ECH, respectively.</t>
      <t>This extension aims to facilitate debugging of TLS connections employing ECH.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://tlswg.github.io/draft-ietf-tls-ech-keylogfile/draft-ietf-tls-ech-keylogfile.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-tls-ech-keylogfile/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Transport Layer Security Working Group mailing list (<eref target="mailto:tls@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tls/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tls/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/tlswg/draft-ietf-tls-ech-keylogfile"/>.</t>
    </note>
  </front>
  <middle>
    <?line 47?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Debugging protocols with TLS can be difficult due to encrypted communications. Analyzing these messages in diagnostic and debug tools requires inspecting the encrypted content. Various TLS implementations have informally adopted a file format to log the secret values generated by the TLS key schedule, aiding in this analysis.</t>
      <t>In many implementations, the file that the secrets are logged to is specified in an environment variable named "SSLKEYLOGFILE". <xref target="I-D.ietf-tls-keylogfile"/> standardizes this format.  With the introduction of <xref target="I-D.ietf-tls-esni"/> additional secrets are derived during the handshake to encrypt the ClientHello message using Hybrid Public Key Encryption (HPKE) <xref target="RFC9180"/>. This document extends the SSLKEYLOGFILE format to also offer support for the ECH extension to enable debugging of ECH-enabled connections. The proposed extension can also be used with all protocols that support ECH, including TLS 1.3 <xref target="RFC8446"/>, DTLS 1.3 <xref target="RFC9147"/> and QUIC <xref target="RFC9000"/><xref target="RFC9001"/>.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="labels">
      <name>SSLKEYLOGFILE Labels for ECH</name>
      <t>This document defines two new labels for SSLKEYLOGFILE format: ECH_SECRET and ECH_CONFIG. The client <bcp14>SHOULD</bcp14> log the labels if it offered ECH regardless of server acceptance. The server <bcp14>MAY</bcp14> log the labels only if it successfully decrypted and accepted ECH offered by the client. The 32-byte random value from the Outer ClientHello message is used as the client_random value for these log records. The client <bcp14>MUST NOT</bcp14> log the labels for connections that use the GREASE ECH extension (see Section 6.2 of <xref target="I-D.ietf-tls-esni"/>).</t>
      <section anchor="echsecret">
        <name>ECH_SECRET</name>
        <t>This label corresponds to the KEM shared secret derived during the HPKE key schedule process. Length of the secret is defined by the KEM negotiated for use with ECH.</t>
      </section>
      <section anchor="echconfig">
        <name>ECH_CONFIG</name>
        <t>This label is used to log the ECHConfig used for construction of the ECH extension. Note that the value is logged in hexadecimal representation, similarly to other entries in the SSLKEYLOGFILE.</t>
      </section>
    </section>
    <section anchor="clientrandom-for-other-tls-13-sslkeylogfile-entries">
      <name>Client_random for other TLS 1.3 SSLKEYLOGFILE Entries</name>
      <t>The SSLKEYLOGFILE uses the random value from the ClientHello message as a "connection identifier". This creates ambiguity since the TLS handshake with ECH contains two different random values, one in the Outer ClientHello structure and the second one in the Inner ClientHello.</t>
      <t>The SSLKEYLOGFILE entries corresponding to TLS 1.3 secrets for connections that successfully negotiated ECH <bcp14>MUST</bcp14> use the random from the Inner ClientHello structure. In all other cases the random value from the Outer ClientHello structure <bcp14>MUST</bcp14> be used.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The applicability statement of <xref target="I-D.ietf-tls-keylogfile"/> also applies to this document: if unauthorized entities gain access to the logged secrets then the core guarantees that TLS provides are completely undermined.</t>
      <t>This specification extends the SSLKEYLOGFILE specification <xref target="I-D.ietf-tls-keylogfile"/> and therefore introduces the following threats:</t>
      <ul spacing="normal">
        <li>
          <t>Access to the ECH_SECRET record in the SSLKEYLOGFILE allows the attacker to decrypt the ECH extension and thereby reveal the content of the ClientHello message, including the payload of the Server Name Indication (SNI) extension.</t>
        </li>
        <li>
          <t>Access to the HPKE-established shared secret introduces a potential attack surface against the HPKE library since access to this keying material is normally not available otherwise.</t>
        </li>
      </ul>
      <t>Implementers <bcp14>MUST</bcp14> take measures to prevent unauthorized access to the SSLKEYLOGFILE text file.</t>
      <t>As per the SSLKEYLOGFILE specification <xref target="I-D.ietf-tls-keylogfile"/>, this extension is intended for use in environments where TLS protects only test data. While the access it provides to TLS connections can be valuable for debugging during development, this mechanism <bcp14>MUST NOT</bcp14> be used in production environments. To minimize the risk of accidental activation in production, implementers <bcp14>SHOULD</bcp14> incorporate appropriate compile-time controls.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to create a new registry "SSLKEYLOGFILE Labels", within the existing "Transport Layer Security (TLS) Parameters" registry page.
This new registry reserves labels used for SSLKEYLOGFILE entries.
The initial contents of this registry are as follows.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Value</th>
            <th align="left">Description</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">CLIENT_RANDOM</td>
            <td align="left">Master secret in TLS 1.2 and earlier</td>
            <td align="left">
              <xref target="I-D.ietf-tls-keylogfile"/></td>
          </tr>
          <tr>
            <td align="left">CLIENT_EARLY_TRAFFIC_SECRET</td>
            <td align="left">Secret for client early data records</td>
            <td align="left">
              <xref target="I-D.ietf-tls-keylogfile"/></td>
          </tr>
          <tr>
            <td align="left">EARLY_EXPORTER_MASTER_SECRET</td>
            <td align="left">Early exporters secret</td>
            <td align="left">
              <xref target="I-D.ietf-tls-keylogfile"/></td>
          </tr>
          <tr>
            <td align="left">CLIENT_HANDSHAKE_TRAFFIC_SECRET</td>
            <td align="left">Secret protecting client handshake</td>
            <td align="left">
              <xref target="I-D.ietf-tls-keylogfile"/></td>
          </tr>
          <tr>
            <td align="left">SERVER_HANDSHAKE_TRAFFIC_SECRET</td>
            <td align="left">Secret protecting server handshake</td>
            <td align="left">
              <xref target="I-D.ietf-tls-keylogfile"/></td>
          </tr>
          <tr>
            <td align="left">CLIENT_TRAFFIC_SECRET_0</td>
            <td align="left">Secret protecting client records post handshake</td>
            <td align="left">
              <xref target="I-D.ietf-tls-keylogfile"/></td>
          </tr>
          <tr>
            <td align="left">SERVER_TRAFFIC_SECRET_0</td>
            <td align="left">Secret protecting server records post handshake</td>
            <td align="left">
              <xref target="I-D.ietf-tls-keylogfile"/></td>
          </tr>
          <tr>
            <td align="left">EXPORTER_SECRET</td>
            <td align="left">Exporter secret after handshake</td>
            <td align="left">
              <xref target="I-D.ietf-tls-keylogfile"/></td>
          </tr>
        </tbody>
      </table>
      <t>This documents defines two additional labels in <xref target="labels"/>:</t>
      <ul spacing="normal">
        <li>
          <t>ECH_SECRET, which contains KEM shared secret for the ECH</t>
        </li>
        <li>
          <t>ECH_CONFIG, which contains ECHConfig used for construction of the ECH</t>
        </li>
      </ul>
      <t>New assignments in the "SSLKEYLOGFILE Labels" registry will be administered by IANA through Expert Review <xref target="RFC8126"/>.
Designated Experts are requested to ensure that defined labels do not overlap in names or semantics, and have clear definitions.</t>
      <t>Registration requests must be sent to the tls@ietf.org mailing list for review and comment, with an appropriate subject
(e.g., "Request for SSLKEYLOGFILE Label: example").</t>
      <t>Within the review period of two weeks, the Designated Experts will either approve or deny the registration request,
communicating this decision to the review list and IANA.  Denials should include an explanation and, if applicable,
suggestions as to how to make the request successful.</t>
      <t>IANA must only accept registry updates from the Designated Experts and should direct all requests for registration
to the TLS mailing list.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="I-D.ietf-tls-keylogfile">
          <front>
            <title>The SSLKEYLOGFILE Format for TLS</title>
            <author fullname="Martin Thomson" initials="M." surname="Thomson">
              <organization>Mozilla</organization>
            </author>
            <date day="29" month="April" year="2024"/>
            <abstract>
              <t>   A format that supports the logging information about the secrets used
   in a TLS connection is described.  Recording secrets to a file in
   SSLKEYLOGFILE format allows diagnostic and logging tools that use
   this file to decrypt messages exchanged by TLS endpoints.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-keylogfile-02"/>
        </reference>
        <reference anchor="I-D.ietf-tls-esni">
          <front>
            <title>TLS Encrypted Client Hello</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Independent</organization>
            </author>
            <author fullname="Kazuho Oku" initials="K." surname="Oku">
              <organization>Fastly</organization>
            </author>
            <author fullname="Nick Sullivan" initials="N." surname="Sullivan">
              <organization>Cryptography Consulting LLC</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="15" month="September" year="2024"/>
            <abstract>
              <t>   This document describes a mechanism in Transport Layer Security (TLS)
   for encrypting a ClientHello message under a server public key.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/tlswg/draft-ietf-tls-esni
   (https://github.com/tlswg/draft-ietf-tls-esni).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-esni-22"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9180">
          <front>
            <title>Hybrid Public Key Encryption</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="K. Bhargavan" initials="K." surname="Bhargavan"/>
            <author fullname="B. Lipp" initials="B." surname="Lipp"/>
            <author fullname="C. Wood" initials="C." surname="Wood"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>This document describes a scheme for hybrid public key encryption (HPKE). This scheme provides a variant of public key encryption of arbitrary-sized plaintexts for a recipient public key. It also includes three authenticated variants, including one that authenticates possession of a pre-shared key and two optional ones that authenticate possession of a key encapsulation mechanism (KEM) private key. HPKE works for any combination of an asymmetric KEM, key derivation function (KDF), and authenticated encryption with additional data (AEAD) encryption function. Some authenticated variants may not be supported by all KEMs. We provide instantiations of the scheme using widely used and efficient primitives, such as Elliptic Curve Diffie-Hellman (ECDH) key agreement, HMAC-based key derivation function (HKDF), and SHA2.</t>
              <t>This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9180"/>
          <seriesInfo name="DOI" value="10.17487/RFC9180"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC9147">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="RFC9000">
          <front>
            <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
            <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9000"/>
          <seriesInfo name="DOI" value="10.17487/RFC9000"/>
        </reference>
        <reference anchor="RFC9001">
          <front>
            <title>Using TLS to Secure QUIC</title>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <author fullname="S. Turner" initials="S." role="editor" surname="Turner"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document describes how Transport Layer Security (TLS) is used to secure QUIC.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9001"/>
          <seriesInfo name="DOI" value="10.17487/RFC9001"/>
        </reference>
      </references>
    </references>
    <?line 144?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We would like to thank Stephen Farrell, Rich Salz, Martin Thomson and Peter Wu for their review comments.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
