<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.8 (Ruby 2.6.10) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-uta-require-tls13-01" category="std" consensus="true" submissionType="IETF" updates="9325" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.21.0 -->
  <front>
    <title abbrev="require-tls1.3">New Protocols Must Require TLS 1.3</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-uta-require-tls13-01"/>
    <author fullname="Rich Salz">
      <organization>Akamai Technologies</organization>
      <address>
        <email>rsalz@akamai.com</email>
      </address>
    </author>
    <author fullname="Nimrod Aviram">
      <organization/>
      <address>
        <email>nimrod.aviram@gmail.com</email>
      </address>
    </author>
    <date year="2024" month="July" day="24"/>
    <area>Security</area>
    <workgroup>Using TLS in Applications</workgroup>
    <keyword>TLS</keyword>
    <keyword>features</keyword>
    <abstract>
      <?line 134?>

<t>TLS 1.2 is in widespread use and can be configured such that it provides good
security properties. TLS 1.3 is also in
widespread use and fixes some known deficiencies with TLS 1.2, such as
removing error-prone cryptographic primitives and encrypting more of the traffic
so that it is not readable by outsiders.</t>
      <t>Since TLS 1.3 use is widespread, new protocols must require and
assume its existence.
This prescription does not pertain to DTLS (in any DTLS version); it pertains to
TLS only.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-uta-require-tls13/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Using TLS in Applications Working Group mailing list (<eref target="mailto:uta@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/uta/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/uta/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/richsalz/draft-use-tls13"/>.</t>
    </note>
  </front>
  <middle>
    <?line 147?>

<section anchor="sec-reasons">
      <name>Introduction</name>
      <t>TLS 1.2 <xref target="TLS12"/> is in widespread use and can be configured such that
it provides good
security properties. However, this protocol version suffers from several
deficiencies:</t>
      <ol spacing="normal" type="1"><li>
          <t>While application layer traffic is always encrypted, most of the handshake
messages are not. Therefore, the privacy provided is suboptimal.
This is a protocol issue that cannot be addressed by configuration.</t>
        </li>
        <li>
          <t>The list of cryptographic primitives specified for the protocol, both in-use
primitives and deprecated ones, includes several primitives that have
been a source for
vulnerabilities throughout the years, such as RSA key exchange, CBC cipher suites,
and problematic finite-field Diffie-Hellman group negotiation.
These issues could be addressed through proper configuration; however,
experience shows that configuration mistakes are common, especially when
deploying cryptography.
See <xref target="sec-considerations"/> for elaboration.</t>
        </li>
        <li>
          <t>The base protocol does not provide security against some
types of attacks (see <xref target="sec-considerations"/>);
extensions are required to provide
security.</t>
        </li>
      </ol>
      <t>TLS 1.3 <xref target="TLS13"/> is also in
widespread use and fixes most known deficiencies with TLS 1.2, such as
encrypting more of the traffic so that it is not readable by outsiders and
removing most cryptographic primitives considered dangerous. Importantly, TLS
1.3 enjoys robust security proofs and provides excellent security without
any additional configuration.</t>
      <t>This document specifies that, since TLS 1.3 use is widespread, new protocols
must require and assume its existence.
This prescription does not pertain to DTLS (in any DTLS version); it pertains to
TLS only.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="implications-for-post-quantum-cryptography">
      <name>Implications for post-quantum cryptography</name>
      <t>Cryptographically-relevant
quantum computers, once available, will have a huge impact on TLS.
In 2016, the US National Institute of Standards and Technology (NIST) started a
multi-year effort to standardize algorithms that will be "safe"
once quantum computers are feasible <xref target="PQC"/>. First IETF discussions happened
around the same time <xref target="CFRGSLIDES"/>.</t>
      <t>While the industry is waiting for NIST to finish standardization, the
IETF has several efforts underway.
A working group was formed in early 2023 to work on use operational and
transitional uses of PQC in IETF protocols,
<xref target="PQUIPWG"/>.
Several other working groups, notably LAMPS <xref target="LAMPSWG"/> and TLS <xref target="TLSWG"/>,
are working on
drafts to support hybrid algorithms and identifiers, for use during a
transition from classic to a post-quantum world.</t>
      <t>For TLS it is important to note that the focus of these efforts is TLS 1.3
or later:
TLS 1.2 WILL NOT be supported (see <xref target="iana"/>).
This is one more reason for new protocols to default to TLS 1.3, where
post-quantum cryptography is expected to be supported.</t>
    </section>
    <section anchor="tls-use-by-other-protocols-and-applications">
      <name>TLS Use by Other Protocols and Applications</name>
      <t>Any new protocol that uses TLS <bcp14>MUST</bcp14> specify as its default TLS 1.3.
For example, QUIC <xref target="QUICTLS"/> requires TLS 1.3 and specifies that endpoints
<bcp14>MUST</bcp14> terminate the connection if an older version is used.</t>
      <t>If deployment considerations are a concern, the protocol <bcp14>MAY</bcp14> specify TLS 1.2 as
an additional, non-default option.
As a counter example, the Usage Profile for DNS over TLS <xref target="DNSTLS"/> specifies
TLS 1.2 as the default, while also allowing TLS 1.3.
For newer specifications that choose to support TLS 1.2, those preferences are
to be reversed.</t>
      <t>The initial TLS handshake allows a client to specify which versions of
the TLS protocol it supports and the server is intended to pick the highest
version that it also supports.
This is known as the "TLS version negotiation," and
many TLS libraries provide a way for applications to specify the range
of versions.
When the API allows it, clients <bcp14>SHOULD</bcp14> specify just the minimum version they
want.
This <bcp14>SHOULD</bcp14> be TLS 1.3 or TLS 1.2, depending on the circumstances described
in the above paragraphs.</t>
    </section>
    <section anchor="sec-considerations">
      <name>Security Considerations</name>
      <t>TLS 1.2 was specified with several cryptographic primitives and design choices
that have, over time, weakened its security. The purpose of this section is to
briefly survey several such prominent problems that have affected the protocol.
It should be noted, however, that TLS 1.2 can be configured securely; it is
merely much more difficult to configure it securely as opposed to using its
modern successor, TLS 1.3. See <xref target="RFC9325"/> for a more thorough guide on the
secure deployment of TLS 1.2.</t>
      <t>Firstly, the TLS 1.2 protocol, without any extension points, is vulnerable to
renegotiation attacks (see <xref target="RENEG1"/> and <xref target="RENEG2"/>)  and the
Triple Handshake attack (see <xref target="TRIPLESHAKE"/>).
Broadly, these attacks
exploit the protocol's support for renegotiation in order to inject a prefix
chosen by the attacker into the plaintext stream. This is usually a devastating
threat in practice, that allows e.g. obtaining secret cookies in a web setting.
In light of
the above problems, <xref target="RFC5746"/> specifies an extension that prevents this
category of attacks. To securely deploy TLS 1.2, either renegotiation must be
disabled entirely, or this extension must be used. Additionally, clients must
not allow servers to renegotiate the certificate during a connection.</t>
      <t>Secondly, the original key exchange methods specified for the protocol, namely
RSA key exchange and finite field Diffie-Hellman, suffer from several
weaknesses. Similarly, to securely deploy the protocol, these key exchange
methods must be disabled.
See <xref target="I-D.draft-ietf-tls-deprecate-obsolete-kex"/> for details.</t>
      <t>Thirdly, symmetric ciphers which were widely-used in the protocol, namely RC4
and CBC cipher suites, suffer from several weaknesses. RC4 suffers from
exploitable biases in its key stream; see <xref target="RFC7465"/>. CBC cipher suites have
been a source of vulnerabilities throughout the years. A straightforward
implementation of these cipher suites inherently suffers from the Lucky13 timing
attack <xref target="LUCKY13"/>. The first attempt to implement the cipher suites in
constant time introduced an even more severe vulnerability <xref target="LUCKY13FIX"/>.
There have been further similar vulnerabilities throughout the
years exploiting CBC cipher suites; refer to e.g. <xref target="CBCSCANNING"/>
for an example and a survey of similar works.</t>
      <t>And lastly, historically the protocol was affected by several other attacks that
TLS 1.3 is immune to:
BEAST <xref target="BEAST"/>, Logjam <xref target="WEAKDH"/>, FREAK <xref target="FREAK"/>, and SLOTH <xref target="SLOTH"/>.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>This document makes no requests to IANA.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="TLS12">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="TLS13">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="QUICTLS">
          <front>
            <title>Using TLS to Secure QUIC</title>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <author fullname="S. Turner" initials="S." role="editor" surname="Turner"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document describes how Transport Layer Security (TLS) is used to secure QUIC.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9001"/>
          <seriesInfo name="DOI" value="10.17487/RFC9001"/>
        </reference>
        <reference anchor="DNSTLS">
          <front>
            <title>Usage Profiles for DNS over TLS and DNS over DTLS</title>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
            <author fullname="D. Gillmor" initials="D." surname="Gillmor"/>
            <author fullname="T. Reddy" initials="T." surname="Reddy"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document discusses usage profiles, based on one or more authentication mechanisms, which can be used for DNS over Transport Layer Security (TLS) or Datagram TLS (DTLS). These profiles can increase the privacy of DNS transactions compared to using only cleartext DNS. This document also specifies new authentication mechanisms -- it describes several ways that a DNS client can use an authentication domain name to authenticate a (D)TLS connection to a DNS server. Additionally, it defines (D)TLS protocol profiles for DNS clients and servers implementing DNS over (D)TLS. This document updates RFC 7858.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8310"/>
          <seriesInfo name="DOI" value="10.17487/RFC8310"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC9325">
          <front>
            <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="November" year="2022"/>
            <abstract>
              <t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are used to protect data exchanged over a wide range of application protocols and can also form the basis for secure transport protocols. Over the years, the industry has witnessed several serious attacks on TLS and DTLS, including attacks on the most commonly used cipher suites and their modes of operation. This document provides the latest recommendations for ensuring the security of deployed services that use TLS and DTLS. These recommendations are applicable to the majority of use cases.</t>
              <t>RFC 7525, an earlier version of the TLS recommendations, was published when the industry was transitioning to TLS 1.2. Years later, this transition is largely complete, and TLS 1.3 is widely available. This document updates the guidance given the new environment and obsoletes RFC 7525. In addition, this document updates RFCs 5288 and 6066 in view of recent attacks.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="195"/>
          <seriesInfo name="RFC" value="9325"/>
          <seriesInfo name="DOI" value="10.17487/RFC9325"/>
        </reference>
        <reference anchor="RFC5746">
          <front>
            <title>Transport Layer Security (TLS) Renegotiation Indication Extension</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="M. Ray" initials="M." surname="Ray"/>
            <author fullname="S. Dispensa" initials="S." surname="Dispensa"/>
            <author fullname="N. Oskov" initials="N." surname="Oskov"/>
            <date month="February" year="2010"/>
            <abstract>
              <t>Secure Socket Layer (SSL) and Transport Layer Security (TLS) renegotiation are vulnerable to an attack in which the attacker forms a TLS connection with the target server, injects content of his choice, and then splices in a new TLS connection from a client. The server treats the client's initial TLS handshake as a renegotiation and thus believes that the initial data transmitted by the attacker is from the same entity as the subsequent client data. This specification defines a TLS extension to cryptographically tie renegotiations to the TLS connections they are being performed over, thus preventing this attack. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5746"/>
          <seriesInfo name="DOI" value="10.17487/RFC5746"/>
        </reference>
        <reference anchor="I-D.draft-ietf-tls-deprecate-obsolete-kex">
          <front>
            <title>Deprecating Obsolete Key Exchange Methods in TLS 1.2</title>
            <author fullname="Carrick Bartle" initials="C." surname="Bartle">
              <organization>Roblox</organization>
            </author>
            <author fullname="Nimrod Aviram" initials="N." surname="Aviram">
         </author>
            <date day="26" month="June" year="2024"/>
            <abstract>
              <t>   This document deprecates the use of RSA key exchange and Diffie
   Hellman over a finite field in TLS 1.2, and discourages the use of
   static elliptic curve Diffie Hellman cipher suites.

   Note that these prescriptions apply only to TLS 1.2 since TLS 1.0 and
   1.1 are deprecated by [RFC8996] and TLS 1.3 either does not use the
   affected algorithm or does not share the relevant configuration
   options.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-deprecate-obsolete-kex-04"/>
        </reference>
        <reference anchor="RFC7465">
          <front>
            <title>Prohibiting RC4 Cipher Suites</title>
            <author fullname="A. Popov" initials="A." surname="Popov"/>
            <date month="February" year="2015"/>
            <abstract>
              <t>This document requires that Transport Layer Security (TLS) clients and servers never negotiate the use of RC4 cipher suites when they establish connections. This applies to all TLS versions. This document updates RFCs 5246, 4346, and 2246.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7465"/>
          <seriesInfo name="DOI" value="10.17487/RFC7465"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="PQC" target="https://csrc.nist.gov/projects/post-quantum-cryptography">
          <front>
            <title>Post=Quantum Cryptography</title>
            <author>
              <organization/>
            </author>
            <date year="2017" month="January"/>
          </front>
        </reference>
        <reference anchor="CFRGSLIDES" target="https://www.ietf.org/proceedings/95/slides/slides-95-cfrg-4.pdf">
          <front>
            <title>Post Quantum Secure Cryptography Discussion</title>
            <author initials="D." surname="McGrew" fullname="David McGrew">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="PQUIPWG" target="https://datatracker.ietf.org/wg/pquip/about/">
          <front>
            <title>Post-Quantum Use in Protocols</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="LAMPSWG" target="https://datatracker.ietf.org/wg/lamps/about/">
          <front>
            <title>Limited Additional Mechanisms for PXIK and SMIME</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="TLSWG" target="https://datatracker.ietf.org/wg/tls/about/">
          <front>
            <title>Transport Layer Security</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="TRIPLESHAKE" target="https://mitls.org/pages/attacks/3SHAKE">
          <front>
            <title>Triple Handshakes Considered Harmful Breaking and Fixing Authentication over TLS</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RENEG1" target="https://web.archive.org/web/20091231034700/http://www.educatedguesswork.org/2009/11/understanding_the_tls_renegoti.html">
          <front>
            <title>Understanding the TLS Renegotiation Attack</title>
            <author initials="E." surname="Rescorla" fullname="Eric Rescorla">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RENEG2" target="https://web.archive.org/web/20091228061844/http://extendedsubset.com/?p=8">
          <front>
            <title>Authentication Gap in TLS Renegotiation</title>
            <author initials="M." surname="Ray" fullname="Marsh Ray">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="LUCKY13" target="http://www.isg.rhul.ac.uk/tls/TLStiming.pdf">
          <front>
            <title>Lucky Thirteen: Breaking the TLS and DTLS record protocols</title>
            <author initials="N. J." surname="Al Fardan">
              <organization/>
            </author>
            <author initials="K. G." surname="Paterson">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="LUCKY13FIX" target="https://nds.rub.de/media/nds/veroeffentlichungen/2016/10/19/tls-attacker-ccs16.pdf">
          <front>
            <title>Systematic fuzzing and testing of TLS libraries</title>
            <author initials="J." surname="Somorovsky" fullname="Juraj Somorovsky">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="CBCSCANNING" target="https://www.usenix.org/system/files/sec19-merget.pdf">
          <front>
            <title>Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities</title>
            <author initials="R." surname="Merget" fullname="Robert Merget">
              <organization/>
            </author>
            <author initials="J." surname="Somorovsky" fullname="Juraj Somorovsky">
              <organization/>
            </author>
            <author initials="N." surname="Aviram" fullname="Nimrod Aviram">
              <organization/>
            </author>
            <author initials="C." surname="Young" fullname="Craig Young">
              <organization/>
            </author>
            <author initials="J." surname="Fliegenschmidt" fullname="Janis Fliegenschmidt">
              <organization/>
            </author>
            <author initials="J." surname="Schwenk" fullname="JÃ¶rg Schwenk">
              <organization/>
            </author>
            <author initials="Y." surname="Shavitt" fullname="Yuval Shavitt">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="BEAST" target="http://www.hpcc.ecs.soton.ac.uk/dan/talks/bullrun/Beast.pdf">
          <front>
            <title>Here come the xor ninjas</title>
            <author initials="T." surname="Duong" fullname="Thai Duong">
              <organization/>
            </author>
            <author initials="J." surname="Rizzo" fullname="Juliano Rizzo">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="WEAKDH" target="https://dl.acm.org/doi/pdf/10.1145/2810103.2813707">
          <front>
            <title>Imperfect forward secrecy: How Diffie-Hellman fails in practice</title>
            <author initials="D." surname="Adrian">
              <organization/>
            </author>
            <author initials="K." surname="Bhargavan">
              <organization/>
            </author>
            <author initials="Z." surname="Durumeric">
              <organization/>
            </author>
            <author initials="P." surname="Gaudry">
              <organization/>
            </author>
            <author initials="M." surname="Green">
              <organization/>
            </author>
            <author initials="J. A." surname="Halderman">
              <organization/>
            </author>
            <author initials="N." surname="Heninger">
              <organization/>
            </author>
            <author initials="D." surname="Springall">
              <organization/>
            </author>
            <author initials="E." surname="ThomÃ©">
              <organization/>
            </author>
            <author initials="L." surname="Valenta">
              <organization/>
            </author>
            <author initials="B." surname="VanderSloot">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="FREAK" target="https://inria.hal.science/hal-01114250/file/messy-state-of-the-union-oakland15.pdf">
          <front>
            <title>A messy state of the union: Taming the composite state machines of TLS</title>
            <author initials="B." surname="Beurdouche" fullname="Benjamin Beurdouche">
              <organization/>
            </author>
            <author initials="K." surname="Bhargavan" fullname="Karthikeyan Bhargavan">
              <organization/>
            </author>
            <author initials="A." surname="Delignat-Lavaud" fullname="Antoine Delignat-Lavaud">
              <organization/>
            </author>
            <author initials="C." surname="Fournet" fullname="CÃ©dric Fournet">
              <organization/>
            </author>
            <author initials="M." surname="Kohlweiss" fullname="Markulf Kohlweiss">
              <organization/>
            </author>
            <author initials="A." surname="Pironti" fullname="Alfredo Pironti">
              <organization/>
            </author>
            <author initials="P.-Y." surname="Strub" fullname="Pierre-Yves Strub">
              <organization/>
            </author>
            <author initials="J. K." surname="Zinzindohoue" fullname="Jean Karim Zinzindohoue">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="SLOTH" target="https://inria.hal.science/hal-01244855/file/SLOTH_NDSS16.pdf">
          <front>
            <title>Transcript collision attacks: Breaking authentication in TLS, IKE, and SSH</title>
            <author initials="K." surname="Bhargavan" fullname="Karthikeyan Bhargavan">
              <organization/>
            </author>
            <author initials="G." surname="Leurent" fullname="GaÃ«tan Leurent">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIACysoWYAA71ay3LbSJbd4yuyVYuu6iBBUQ8/5O6uovWwWJZklSh3lXti
oiIJJMm0ACQ7E5BEO7yaH5ntxOznA3p+rM+9mQABSq6yZzHaCEzk4z7PfST6
/X5U6jJTB2LrQt2JS2tKk5jMifPKleJK/aPSVonrs4kYxrtbkZxOrbrFZOvf
9MvM8YtElmpu7OpAuDKNqmWK3+5APN/d2Y+i1CSFzHFGauWs7GtVzvpVKfvt
TXb7GS0pI1dNc+2cNkW5WmLN+Pj6JCqqfKrsQUTbHkSJKZwqXIUDSlupCATt
RtIqCcImKqmsLldb0Z2xN3NrqiVG3zpdzJkNXYjRcplpEIwj3FZ0o1aYmR5E
ok8T6N9MybKyykW3qqhwnhBfsI8Qnt6tn3EuzXpFa2g8lzrDODj+gViPjZ3T
8FyXi2pKstTJwsnsw8CLp3JBIltRJKtyYcB3H/NnVZZ5MV5hgZhgBUaxmSz0
B6biQIxuJE4T1ypZFCYzcw0mhFCeAkuH/CB5SpyYfGPXC51bk4rRrbYyX68q
eDiWPPzDnAZ5cVQYm+PYWxYQRDLcAWUnh/s7e0/CwC4PPNvjgZ/ejg8xyEPP
t7eHGDq6mNQjz3aH21Gki1l708ufDukfJCvtXJUHYlGWS3cwGCTOJnGhXRnP
ze1gac17lZRusDSu7P+jkkVZ5f3ErpalmVu5XKx4E7YdsfWjLCppVz2xsz18
uuW39x5wieV/+ckvF4fd5YcnV68mZ+Oj48njFN3d3cW1comgRKkURuAGz/cH
LtOpcuFf//l+P5nZeX8vXqazzeNFfTybsepQIY60Syr2DF5W24bgP13AG45i
cZ68suouDHrFHkF36frFJTRx+fOrx/mAkGRpZXKj7JqfO7AET10O5NRU5WCT
6H5N9FunyC8aEMHEs9H55eRrD8tkvnSPHHamc10qmGiaarJ3mYlzWDrs3+VO
wHTE5S/j10IWqZicj8+PvRl+7enwvUfOvraycEtjS3EmV8qKGmfojKvx5dnx
5HT0+vjxk0B15rxlyDksQZYljnWDXV7TPUUvMyVOwYJbyBvlxCHABXZjwfap
tDncVbwE0jHCEKMn+p4eRzAGVZQBjoS5BYmMZuLq+OL41fCgfcrbAhu6Estp
KRYyol2pAhBear/DiGl8xNC8TR0DtLDCJcZm8nGPUNNY2mQBX/aSVdPBzvb2
8+EOXH137+n29oCmBt9RaUUhJJ1XyjlCbl5D8wfD4aBqE/wrCP4VAv3VBoLj
RZlnNac7HU43xPJKLslAH3D7CJv9wOi5tG4hruTqK5ncebb9ZAjoq5lU96UC
FynCm1MlIejg++VfnpGLvD18/Q5Y2aZ766xKblbieqFtqRSAvdF5rS3S/RE9
WAUdpGJZO93WA0JreHLz2C6qLJZJXN2wmWN9CZ8q5g0WbQqBYeUiFj/GYpSJ
E2lTWXRfvo7Fq1hcQnnWsSQDPyfjX7osTVauVATuCYLOhw+1AVPQp2czY74y
PbXSIm495IMEDr+IbTWNUzXIgbCSBgYwdqNmMyga8XhRFXNVQAvDJ4Ph9mD4
nDjte5dTtp8kbvjkM+x6jf9YWfleTExurLl1N4z+Lw8nh6OLi/HFqw5Pk0Rm
cgqHxUNR1BzB6Izn8zCTwOtZ45WexUuZsuO9Afhg7d+qrFBWTnUGUON4/Xh4
QV5Q6Hs2M8eiHMx0RnFFJcPn/VzRis/qMSQOBllUCdCkuRvvHmG7/XozO2i/
O7RSz8U7A8lvbkrYLE4yraATlyxynT4493//45//Y+cQ4eJOFTcbb99Vt0D5
yQIhrKSVL49Hk+uuXZ0CHAX8SbFv3CMKQBPv5ecdYbFMklglLnZwmSK4A+x6
UMoMqDxFRmSrYvBSSfd7Ar1eINs6qsxDxqtMy8IgVfvwweDdz8ej10enXcLH
+VLZGTIXCl13cC0BVcKdkUSfmjuE+9lMq/6pyrJcFmKGxMsRei1hNjAu9biD
pOTfOVtJavQA5MML4uFwb3+w82y4DeiN8X/36fbTz/s70ohRavUjnv5ygePk
7eabv8cQgq1ggzrpvrkEOsgqtavu8DmGLYCtO0ogE5/KDGCfbx4BDDpV5GLK
PiB2srR4IbOs++Y4hn5MDvv6r+6Ls1j8TWaAC9kdf0njFGommTFkbSdXUFtX
aSORI0KtUOYA8cijyeiqgrPva5nXEA17RDaKbCVMzCWCRIF47jHgcd3pAkKP
FzKLXaJVkagBnvvbQ2hvZ3+b3X3Ap/d5076Z9XFWn0/vG3mTgfjh/u+Y7EsF
5wCdeKhsaqpkoTZmvJa2XGjURbC6hwr3c0ZFacCPOFKZnhey7J9hUpVuAgPJ
PqVU4cRUtniAOQiuN1U2E6/NIrtTqPo2T8lmSHyMuNQW5aDeeHuplUX1+O4W
Yp2gEJxu+qACA2BG5+LvukDASc3CVMTt5OzN9YYzcn6XIP0qobss05Rmi5Co
tcKv7CYUPpnoifHr457POyenX6fbnb29Z/v7XrdM1q8XR5PJZ0PU1+jolYT4
/xtZkziDqkF1FPX7fSGnjtJe/PJl/Y7QjCt3VJ4swWgqEGqYG0Q1MSVjLmZ6
XlEO6mAvMHBZCl1SznFLi8TcmDRyISOmYQAbxbK47hzQETJzBudEj5wz0/fY
xRGG3xTmrhCpQtAkMWETEFYuwkY7PU+BdJFVOU6HSmAExvZxKMyxVfTB6AAL
SL012Qedgu3oNa1BkGucF8IA0CYRqKsZA7WFKQXRyOF9uhKoBzgPd3EUTTT0
17BGTGjXEl9PFOpunZCJnFopoddBhERICoCVOMgJdY8qlswhjpDsOaxS3grJ
ulKjPCEkTgkVlcbnfN/iWRYr/wPZDxnrdy9YJX6mw1RWrymyVez1jtibZiqK
vhHjokQsrxI+5OM3UFwfdCN7c5/WRvHxI9f0nz79n8wj+jLzQJxToL+HNcy8
F1nNErZDVmdR2lmTIzhiWGZR2zYOomgYi58X8B4h1+0YkXGNFjTrje9Orlxt
Ago6yqncDiawqOutiOCVajQhoSuInkII8gsEaNXjqbCpW5msauZS2hw5vYHG
cji31yIduOYGuFYpb1uUJkKfEBpyQKjaYQMYVy1BJh7q2uFjkQt7Ej9r1W6p
EqSX2ISKX0+eP7QnpgZeowtqJ0UbjpAq6JHLLdiHcj1MS7KKNBVk3D6D6Ub+
paIpAjb4coBymD9OjG67qSvmWlPNAbIlE7NSKJ4ajxVXk5EAYsHmqWafQ6DI
q0Wil5AwJiFYul5E9IEJeF0oFXSBF30wmaWbKRF35USrjiPxK3ZHSNxBrBUW
dYQdKAxG2BX8C7EI5hipe7xlmBYOg0EKndnwJ0Thm2AqiPe5KXpCsUqQiqzE
HQIFjHWZmRVBTrsfFUcTpeBh5HlJKPB9HxHuRqpUKCtMYw673hym0q0V3AIH
b4micTA5JwQoGU8jakpy1hFimfjWffbo715EXKaS73m2AmqlhDzhnMaR4xor
dgNW7Hqs+F2cZ8/7Ypz/bdQWX4jajLtNyGAKPutVybrlkpKdwmIAVcjWDbAV
Neaqx60VYhy5lAGswF4J49sQZ2be1xoQhNXDbBGF19OIYVAYEZTLdU9rEw0Y
UlKTIGbQ6uDz3iYhp68KRtFmMBL//8HoG2pq3VIWxWZGjQzFbk6/iV3FMEFd
eSe2zt9Orrd6/r+4eMPPV8c/vR1fHR/R8+R0dHbWPERhxuT0zduzo/XTeuXh
m/Pz44sjvxijojMUbZ2P3m35XG7rzeX1+M3F6GyL4l/Z0QI5BwQwpYZnqSwk
RWgKc01ZZFMKDMjMDi//+Z/DPfjHH65ODneGw+dwEf/j2fDpHn4QSPjTSDjh
J+x7FSGcAT5pF6AJAsdSozwFmgJICZIKQXEJ0vzTv5Fk/v1A/HmaLId7fw0D
xHBnsJZZZ5Bl9nDkwWIvxEeGHjmmkWZnfEPSXXpH7zq/a7m3Bv/8fUblRn/4
7Pu/RpzD5OvLF4bMdvO/A7ZRdNj2dMJmpDuZQsJcRs0C1GsVtbB6UAT8Cem0
5tZOD74E+VMAROxbVHNoPF8ifcY88ro4Ghd0lfDEpwdvJ+JCBj8eA4R1Wfky
cULdS0kWTcpuLmhW4tuL8eT6OyoTLZsQPDQrdZ9ip1CzGXWcYWguLNcfQEY2
N8CPRR7CEhMIS9xycqa2Iqb/AV9ssTNkeZqg8ePHy58OP32KxYm2wAO6YxNp
c73gwC6sr1BIVQF+1KQDa05Si0XntHp9HYJNosgnYDQJRRYAxq4YhKRm2Cbt
EJPEB/m5W7TYYWGx7CKmYiHXWYhn3wlu/yJ/i6MRoQIXYj7230lWfu7dDSKD
D+1s7+zSUTSTlESQSMG+VgtFgpKqvRpvMYEjJERCuzAZDWD2IpIV35gQq5NA
GpIrpA8dYmA6gEfYzMrfekBM4fYDfs5KP5v4SEkjPbqwbDYwyBTo8s+xrqsl
XzQsVlOr07a6aRcgO5ATAYBslURL/KWV5eq0xZhPmhPuQCa0rey6CI7OUuju
xFh/ockBVNdRjlaAnZC3kmpnwD4Xwi+OrJWDRSH4RNiJLnFRrNZFxM9jDyZk
noEtqCqkIFoWEknHOmemCo5jvK9GmLtuKQWikDJIeAg9hnN7BJsWWe7nEID2
powuKX0m0yaG4xFtRJdXyBjesGLX9+Dc0G1d9EbRCLGuTZWXEBsR7cPg64P0
isCaAmtNcyA4ZqGrewkMA8DQzSjEES5IYSwhPDeCZSK6cR+ZR7o0iD0u4gMh
9VwXslSh+1QUypd3GplfIQz11JqyCuIAucT6eCZ8hspBrZsPMmJIGkyULXqd
8kIAshsma2Uj+uGodSJD/lD0a97N0qczI8ebVhQ21zJg7KTKi0RPzRBW/tHF
pLnKgoT8fTEE1MgiWp/NW4TDyCK4JKRUFIBv7upr+0b60CBVHX6jOo74LH9h
jFNtR2xyUqRrnIIrVKWUJ7GMIm9RlpDBS/WagRBSAFDQ2qa89LSwADKtvJPV
UgTFSHiDisjPovqqZ11IljVJ3i4ZlZUlAXGN7m+YOFfXyY2vbPV8QV9V1Kqv
c2WWTL3Z2gN9Vh6EudVK6NpVVm+LMTSnpK9zZdOUIhLAvGINtopy1+aW9reU
XEcAlJrpGIFEFfxudDmuhaWhTi8uJ0LSUe/ynpJZmg7b1zm8fs0mMqg7IEFg
LaybrhPlgHqsVriA8nehfilqUos8j4IU6bhJ6SLtX6M2QzawlFYyvjjGkPpC
uLmxDUz7/spGqbVus1AEW5fxXALV4e83m1kgSs8LMlYNGqOmSu95h6E4DS9Q
MLqCgmPpmrLDF5PLyi7JmBnPNb8tAzYgW0fgUTMEMlfBulYNRVyTQckQN1lv
qNNbPQKBoizAbAstkCOVlLSGapzCCuqSxbr3Ixsfe6ynxJ9CZKsXPkRFuaJf
IidaOFqk1BVIQkxoFrK3hKVk0WZJ/LJ3VPwVD2QS5QY6oT5TAiE6Y3sNSAhf
oVOqTh8xhbpc+hOpI8tthHlF5u6txhfGqg2o4cIPfFGgpVSLisfar4nddb8m
FINcSjVVuPAY3yO11M0WyrRMZDu39RvFvb/zD2lH+LmDUCtq2Ig2PzQIO9Qb
tD5p4Aj90hqZBtpdPdlRmyQzuuwo+4+uwU2SWJdOOBCqOrJPahHQVzvcKEP5
dx8lBK4FxWD2sXBhS7Bm/AGZJIi7h1pLJAg52bFHrcpV3HGRkP2tpLsR6Bcu
gVll+8YsmFrAFRXPY2GmVKGSOfDdG8VAc0NQRnUX/GeK8ZK24zw/A5qWNTQH
FAg+0AvGsv9070k7QlH0XauTz19SqCA0I8drvpxr9WjAmVnbrrenNVopzSlK
V7Bc1k9VhCSeLISa3aWm5T3BnUHOgGoqwmSfBLS+pqHZNdLSnIjKfZZWCDMM
4euDQ7JBzVyOoes8tJWBUL9c4WdtPqBHzzXl3e1eoMgVzD/97ZYmXWtkq2iz
jxhaS9QnFI/1CXuhj9xtIxM2FtQUhLgngNaMiocex6gNyXeJ8B7QPj+qaa/l
WiuhbvP9Ydw/ilvfPtIHCU0Ptm+mzmQKDzfqPsBMqkq67fW9H8uSc6scx9BV
mm+YupAw3NHtN7V7UNWSPkWIUZtSE1eHe9xcfdhzfUw8oi0eLO204mu/9102
LZ33FwoyJBfvni+EaxAUPrFP1eaDsx9rLFNC8AV9ZRgunSTJJcP9eaQpmSTk
bb638NrqnqkLKheokde9YKCt+bub4a7wn8VEARVRyfmPWogJip4zLpvxVuVL
DjvNySF/6J7HX6z6qorqZx3uX6jcBzoADHxYYdmrDver9dkn41+oAuX7CB9s
WW6zyjIeOG/DvyO7iGUnggLJVx/o5IXg/Ja4YohEtb/+/OXTp4jjYFGn7r6H
WCcKkHhNB5W2ZMEjvEcRypEPMFTC/bkH060nKA1qcofpOuPwdXYd3vhmqXWl
qPO8KigcHkT8YQho5f8or8WZmb+XOUb8pxc0xNf5GOH/NMA3tnTpikH+z92M
b8R4dDF6mMdxvbrZjs35CqAwXLQh02aIpPXh1m1KX9H9C0V6bWRnLQAA

-->

</rfc>
