<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.20 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-mattsson-tls-psk-ke-dont-dont-dont-05" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.16.0 -->
  <front>
    <title abbrev="NULL and psk_ke don't don't don't">NULL Encryption and Key Exchange Without Forward Secrecy are Discouraged</title>
    <seriesInfo name="Internet-Draft" value="draft-mattsson-tls-psk-ke-dont-dont-dont-05"/>
    <author initials="J." surname="Preuß Mattsson" fullname="John Preuß Mattsson">
      <organization abbrev="Ericsson">Ericsson AB</organization>
      <address>
        <postal>
          <street>SE-164 80 Stockholm</street>
          <country>Sweden</country>
        </postal>
        <email>john.mattsson@ericsson.com</email>
      </address>
    </author>
    <date year="2023" month="January" day="19"/>
    <area>Security</area>
    <workgroup>Transport Layer Security</workgroup>
    <keyword>next generation</keyword>
    <keyword>unicorn</keyword>
    <keyword>sparkling distributed ledger</keyword>
    <abstract>
      <t>Massive pervasive monitoring attacks using key exfiltration and made possible by key exchange without forward secrecy have been reported. If key exchange without Diffie-Hellman is used, static exfiltration of the long-term authentication keys enables passive attackers to compromise all past and future connections. Malicious actors can get access to long-term keys in different ways: physical attacks, hacking, social engineering attacks, espionage, or by simply demanding access to keying material with or without a court order. Exfiltration attacks are a major cybersecurity threat.  If NULL encryption is used an on-path attacker can read all application data. The use of psk_ke and NULL encryption are not following zero trust principles of minimizing the impact of breach and governments have already made deadlines for their deprecation. This document evaluates TLS pre-shared key exchange modes, (EC)DHE groups, signature algorithms, and cipher suites and downgrades many entries to "N" and "D" where "D" indicates that the entries are "Discouraged".</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://emanjon.github.io/draft-mattsson-tls-psk-ke-dont-dont-dont/draft-mattsson-tls-psk-ke-dont-dont-dont.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-mattsson-tls-psk-ke-dont-dont-dont/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Transport Layer Security Working Group mailing list (<eref target="mailto:tls@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tls/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tls/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/emanjon/draft-mattsson-tls-psk-ke-dont-dont-dont"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t><xref target="RFC8447"/> added a Recommended column to many of the TLS registries. The Recommended column did originally non-normatively indicate parameters that are generally recommended for implementations to support. The meaning of the column was changed by <xref target="I-D.ietf-tls-rfc8447bis"/> to indicate that the IETF has consensus that the item is RECOMMENDED, i.e., using normative <xref target="RFC2119"/> language. <xref target="I-D.ietf-tls-rfc8447bis"/> also introduced a third value "D" indicating that an item is discouraged and SHOULD NOT or MUST NOT be used. This means that all current values need to be reevaluated. The current values also need to be reevaluated as attacks, government requirements, and best practices have changed in the more than 4 years since <xref target="RFC8446"/> and <xref target="RFC8447"/> were published.</t>
      <t>This document evaluates TLS pre-shared key exchange modes, (EC)DHE groups, signature algorithms, and cipher suites and downgrades many entries to "N" and "D" where "D" indicates that the entries are "Discouraged". While TLS 1.2 is obsolete <xref target="RFC8446"/> and two NIST compatible <xref target="NIST-TLS"/> implementations will therefore never negotiate TLS 1.2 after January 1, 2024, DTLS 1.3 <xref target="RFC9147"/> was recently published. DTLS 1.2 will therefore continue to be allowed for several years and a distinction between recommended and discouraged parameters is warranted.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      </section>
    </section>
    <section anchor="key-exchange-without-forward-secrecy">
      <name>Key Exchange Without Forward Secrecy</name>
      <t>Key exchange without forward secrecy enables passive monitoring <xref target="RFC7258"/>. Massive pervasive monitoring attacks using key exfiltration and made possible by key exchange without forward secrecy have been reported <xref target="Heist"/>, and many more have likely happened without ever being reported.  If key exchange without Diffie-Hellman is used, access to the long-term authentication keys enables passive attackers to compromise all past and future connections. Malicious actors can get access to long-term keys in different ways: physical attacks, hacking, social engineering attacks, espionage, or by simply demanding access to keying material with or without a court order. Exfiltration attacks are a major cybersecurity threat <xref target="Exfiltration"/>.</t>
      <t>All cipher suites without forward secrecy have been marked as NOT RECOMMENDED in TLS 1.2 <xref target="I-D.ietf-tls-rfc8447bis"/>, and static RSA and DH are forbidden in TLS 1.3 <xref target="RFC8446"/>. A large number of TLS profiles and implementations forbid the use of key exchange without Diffie-Hellman.</t>
      <ul spacing="normal">
        <li>ANSSI states that for all versions of TLS: "The perfect forward secrecy property must be ensured" <xref target="ANSSI-TLS"/>.</li>
        <li>The general 3GPP TLS 1.2 profile follows <xref target="RFC9113"/> and states: "Only cipher suites with AEAD (e.g., GCM) and PFS (e.g.  ECDHE, DHE) shall be supported" <xref target="TS.33.210"/>.</li>
        <li>BoringSSL has chosen to not implement psk_ke, so that TLS 1.3 resumption always incorporates fresh key material <xref target="BoringSSL"/>.</li>
      </ul>
      <t>Unfortunately, TLS 1.3 allows key exchange without forward secrecy in both full handshakes and resumption handshakes with the psk_ke. As stated in <xref target="RFC8446"/>, psk_ke does not fulfill one of the fundamental TLS 1.3 security properties, namely "Forward secret with respect to long-term keys".  When the PSK is a group key, which is now formally allowed in TLS 1.3 <xref target="RFC9257"/>, psk_ke fails yet another one of the fundamental TLS 1.3 security properties, namely "Secrecy of the session keys" <xref target="Akhmetzyanova"/> <xref target="RFC9257"/>. PSK authentication has yet another big inherent weakness as it often does not provide "Protection of endpoint identities".  It could be argued that PSK authentication should be not recommended solely based on this significant privacy weakness. The 3GPP radio access network that to a large degree relies on PSK are fixing the vulnerabilities by augmenting PSK with ECIES and ECDHE, see Annex C of <xref target="TS.33.501"/> and <xref target="I-D.ietf-emu-aka-pfs"/>.</t>
      <t>Together with ffdhe2048 and rsa_pkcs1, psk_ke is one of the bad apples in the standards track TLS 1.3 fruit basket.  Organizations like BSI <xref target="BSI"/> has already produced recommendations regarding its deprecation.</t>
      <ul spacing="normal">
        <li>BSI states regarding psk_ke that "This mode should only be used in special applications after consultation of an expert." and has set a deadline that use is only allowed until 2026.</li>
      </ul>
      <t>Two essential zero trust principles are to assume that breach is inevitable or has likely already occurred <xref target="NSA-ZT"/>, and to minimize impact when breach occur <xref target="NIST-ZT"/>. One type of breach is key compromise or key exfiltration. Different types of exfiltration are defined and discussed in <xref target="RFC7624"/>. Static exfiltration where the keys are transferred once has a lower risk profile than dynamic exfiltration where keying material or content is transferred to the attacker frequently. Forcing an attacker to do dynamic exfiltration minimizes the impact of breach and should be considered best practice. This significantly increases the risk of discovery for the attacker.</t>
      <t>One way to force an attacker to do dynamic exfiltration is to frequently rerun ephemeral Diffie-Hellman. For IPsec, ANSSI <xref target="ANSSI-PFS"/> recommends enforcing periodic rekeying with ephemeral Diffie-Hellman, e.g., every hour and every 100 GB of data, in order to limit the impact of a key compromise. This should be considered best practice for all protocols and systems. The Double Ratchet Algorithm in the Signal protocol <xref target="Signal"/> enables very frequent use of ephemeral Diffie-Hellman. The practice of frequently rerunning ephemeral Diffie-Hellman follows directly from the two zero trust principles mentioned above.</t>
      <t>In TLS 1.3, the application_traffic_secret can be rekeyed using key_update, a resumption handshake, or a full handshake. The term forward secrecy is not very specific, and it is often better to talk about the property that compromise of key A does not lead to compromise of key B. <xref target="fig-impact"/> illustrates the impact of some examples of static key exfiltration when psk_ke, key_update, and (ec)dhe are used for rekeying.  Each time period T<contact fullname="ᵢ"/> uses a single application_traffic_secret. <contact fullname="✘"/> means that the attacker has access to the application_traffic_secret in that time period and can passively eavesdrop on the communication. <contact fullname="✔"/> means that the attacker does not have access to the application_traffic_secret. Exfiltration and frequently rerunning EC(DHE) is discussed in Appendix F of <xref target="I-D.ietf-tls-rfc8446bis"/>.</t>
      <figure anchor="fig-impact">
        <name>Impact of static key exfiltration in time period T3 when psk_ke, key_update, and (ec)dhe are used.</name>
        <artset>
          <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="400" width="544" viewBox="0 0 544 400" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px">
              <path d="M 8,64 L 8,96" fill="none" stroke="black"/>
              <path d="M 8,192 L 8,224" fill="none" stroke="black"/>
              <path d="M 8,320 L 8,352" fill="none" stroke="black"/>
              <path d="M 56,64 L 56,96" fill="none" stroke="black"/>
              <path d="M 56,192 L 56,224" fill="none" stroke="black"/>
              <path d="M 56,320 L 56,352" fill="none" stroke="black"/>
              <path d="M 104,64 L 104,96" fill="none" stroke="black"/>
              <path d="M 104,192 L 104,224" fill="none" stroke="black"/>
              <path d="M 104,320 L 104,352" fill="none" stroke="black"/>
              <path d="M 152,64 L 152,96" fill="none" stroke="black"/>
              <path d="M 152,192 L 152,224" fill="none" stroke="black"/>
              <path d="M 152,320 L 152,352" fill="none" stroke="black"/>
              <path d="M 200,64 L 200,96" fill="none" stroke="black"/>
              <path d="M 200,192 L 200,224" fill="none" stroke="black"/>
              <path d="M 200,320 L 200,352" fill="none" stroke="black"/>
              <path d="M 248,64 L 248,96" fill="none" stroke="black"/>
              <path d="M 248,192 L 248,224" fill="none" stroke="black"/>
              <path d="M 248,320 L 248,352" fill="none" stroke="black"/>
              <path d="M 296,64 L 296,96" fill="none" stroke="black"/>
              <path d="M 296,192 L 296,224" fill="none" stroke="black"/>
              <path d="M 296,320 L 296,352" fill="none" stroke="black"/>
              <path d="M 344,64 L 344,96" fill="none" stroke="black"/>
              <path d="M 344,192 L 344,224" fill="none" stroke="black"/>
              <path d="M 344,320 L 344,352" fill="none" stroke="black"/>
              <path d="M 392,64 L 392,96" fill="none" stroke="black"/>
              <path d="M 392,192 L 392,224" fill="none" stroke="black"/>
              <path d="M 392,320 L 392,352" fill="none" stroke="black"/>
              <path d="M 440,64 L 440,96" fill="none" stroke="black"/>
              <path d="M 440,192 L 440,224" fill="none" stroke="black"/>
              <path d="M 440,320 L 440,352" fill="none" stroke="black"/>
              <path d="M 488,64 L 488,96" fill="none" stroke="black"/>
              <path d="M 488,192 L 488,224" fill="none" stroke="black"/>
              <path d="M 488,320 L 488,352" fill="none" stroke="black"/>
              <path d="M 536,64 L 536,96" fill="none" stroke="black"/>
              <path d="M 536,192 L 536,224" fill="none" stroke="black"/>
              <path d="M 536,320 L 536,352" fill="none" stroke="black"/>
              <path d="M 8,64 L 392,64" fill="none" stroke="black"/>
              <path d="M 440,64 L 536,64" fill="none" stroke="black"/>
              <path d="M 8,96 L 392,96" fill="none" stroke="black"/>
              <path d="M 440,96 L 536,96" fill="none" stroke="black"/>
              <path d="M 16,128 L 528,128" fill="none" stroke="black"/>
              <path d="M 8,192 L 392,192" fill="none" stroke="black"/>
              <path d="M 440,192 L 536,192" fill="none" stroke="black"/>
              <path d="M 8,224 L 392,224" fill="none" stroke="black"/>
              <path d="M 440,224 L 536,224" fill="none" stroke="black"/>
              <path d="M 160,256 L 528,256" fill="none" stroke="black"/>
              <path d="M 8,320 L 392,320" fill="none" stroke="black"/>
              <path d="M 440,320 L 536,320" fill="none" stroke="black"/>
              <path d="M 8,352 L 392,352" fill="none" stroke="black"/>
              <path d="M 440,352 L 536,352" fill="none" stroke="black"/>
              <path d="M 160,384 L 192,384" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="536,256 524,250.4 524,261.6" fill="black" transform="rotate(0,528,256)"/>
              <polygon class="arrowhead" points="536,128 524,122.4 524,133.6" fill="black" transform="rotate(0,528,128)"/>
              <polygon class="arrowhead" points="200,384 188,378.4 188,389.6" fill="black" transform="rotate(0,192,384)"/>
              <polygon class="arrowhead" points="168,384 156,378.4 156,389.6" fill="black" transform="rotate(180,160,384)"/>
              <polygon class="arrowhead" points="168,256 156,250.4 156,261.6" fill="black" transform="rotate(180,160,256)"/>
              <polygon class="arrowhead" points="24,128 12,122.4 12,133.6" fill="black" transform="rotate(180,16,128)"/>
              <g class="text">
                <text x="44" y="36">rekeying</text>
                <text x="100" y="36">with</text>
                <text x="148" y="36">psk_ke</text>
                <text x="36" y="52">static</text>
                <text x="116" y="52">exfiltration</text>
                <text x="180" y="52">of</text>
                <text x="208" y="52">psk</text>
                <text x="236" y="52">in</text>
                <text x="264" y="52">T₃:</text>
                <text x="32" y="84">✘</text>
                <text x="80" y="84">✘</text>
                <text x="128" y="84">✘</text>
                <text x="176" y="84">✘</text>
                <text x="224" y="84">✘</text>
                <text x="272" y="84">✘</text>
                <text x="320" y="84">✘</text>
                <text x="368" y="84">✘</text>
                <text x="416" y="84">...</text>
                <text x="464" y="84">✘</text>
                <text x="512" y="84">✘</text>
                <text x="36" y="116">T₀</text>
                <text x="84" y="116">T₁</text>
                <text x="132" y="116">T₂</text>
                <text x="180" y="116">T₃</text>
                <text x="228" y="116">T₄</text>
                <text x="276" y="116">T₅</text>
                <text x="324" y="116">T₆</text>
                <text x="372" y="116">T₇</text>
                <text x="416" y="116">...</text>
                <text x="468" y="116">Tₙ₋₁</text>
                <text x="516" y="116">Tₙ</text>
                <text x="44" y="164">rekeying</text>
                <text x="100" y="164">with</text>
                <text x="164" y="164">key_update</text>
                <text x="36" y="180">static</text>
                <text x="116" y="180">exfiltration</text>
                <text x="180" y="180">of</text>
                <text x="300" y="180">application_traffic_secret</text>
                <text x="420" y="180">in</text>
                <text x="448" y="180">T₃:</text>
                <text x="32" y="212">✔</text>
                <text x="80" y="212">✔</text>
                <text x="128" y="212">✔</text>
                <text x="176" y="212">✘</text>
                <text x="224" y="212">✘</text>
                <text x="272" y="212">✘</text>
                <text x="320" y="212">✘</text>
                <text x="368" y="212">✘</text>
                <text x="416" y="212">...</text>
                <text x="464" y="212">✘</text>
                <text x="512" y="212">✘</text>
                <text x="36" y="244">T₀</text>
                <text x="84" y="244">T₁</text>
                <text x="132" y="244">T₂</text>
                <text x="180" y="244">T₃</text>
                <text x="228" y="244">T₄</text>
                <text x="276" y="244">T₅</text>
                <text x="324" y="244">T₆</text>
                <text x="372" y="244">T₇</text>
                <text x="416" y="244">...</text>
                <text x="468" y="244">Tₙ₋₁</text>
                <text x="516" y="244">Tₙ</text>
                <text x="44" y="292">rekeying</text>
                <text x="100" y="292">with</text>
                <text x="152" y="292">(ec)dhe</text>
                <text x="36" y="308">static</text>
                <text x="116" y="308">exfiltration</text>
                <text x="180" y="308">of</text>
                <text x="208" y="308">all</text>
                <text x="244" y="308">keys</text>
                <text x="276" y="308">in</text>
                <text x="304" y="308">T₃:</text>
                <text x="32" y="340">✔</text>
                <text x="80" y="340">✔</text>
                <text x="128" y="340">✔</text>
                <text x="176" y="340">✘</text>
                <text x="224" y="340">✔</text>
                <text x="272" y="340">✔</text>
                <text x="320" y="340">✔</text>
                <text x="368" y="340">✔</text>
                <text x="416" y="340">...</text>
                <text x="464" y="340">✔</text>
                <text x="512" y="340">✔</text>
                <text x="36" y="372">T₀</text>
                <text x="84" y="372">T₁</text>
                <text x="132" y="372">T₂</text>
                <text x="180" y="372">T₃</text>
                <text x="228" y="372">T₄</text>
                <text x="276" y="372">T₅</text>
                <text x="324" y="372">T₆</text>
                <text x="372" y="372">T₇</text>
                <text x="416" y="372">...</text>
                <text x="468" y="372">Tₙ₋₁</text>
                <text x="516" y="372">Tₙ</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art" align="center"><![CDATA[
 rekeying with psk_ke
 static exfiltration of psk in T₃:
+-----+-----+-----+-----+-----+-----+-----+-----+     +-----+-----+
|  ✘  |  ✘  |  ✘  |  ✘  |  ✘  |  ✘  |  ✘  |  ✘  | ... |  ✘  |  ✘  |
+-----+-----+-----+-----+-----+-----+-----+-----+     +-----+-----+
   T₀    T₁    T₂    T₃    T₄    T₅    T₆    T₇   ...   Tₙ₋₁   Tₙ
 <--------------------------------------------------------------->

 rekeying with key_update
 static exfiltration of application_traffic_secret in T₃:
+-----+-----+-----+-----+-----+-----+-----+-----+     +-----+-----+
|  ✔  |  ✔  |  ✔  |  ✘  |  ✘  |  ✘  |  ✘  |  ✘  | ... |  ✘  |  ✘  |
+-----+-----+-----+-----+-----+-----+-----+-----+     +-----+-----+
   T₀    T₁    T₂    T₃    T₄    T₅    T₆    T₇   ...   Tₙ₋₁   Tₙ
                   <--------------------------------------------->

 rekeying with (ec)dhe
 static exfiltration of all keys in T₃:
+-----+-----+-----+-----+-----+-----+-----+-----+     +-----+-----+
|  ✔  |  ✔  |  ✔  |  ✘  |  ✔  |  ✔  |  ✔  |  ✔  | ... |  ✔  |  ✔  |
+-----+-----+-----+-----+-----+-----+-----+-----+     +-----+-----+
   T₀    T₁    T₂    T₃    T₄    T₅    T₆    T₇   ...   Tₙ₋₁   Tₙ
                   <--->
]]></artwork>
        </artset>
      </figure>
      <t>Modern ephemeral key exchange algorithms like x25519 <xref target="RFC7748"/> are very fast and have small message overhead. The public keys are 32 bytes long and the cryptographic operations take 53 microseconds per endpoint on a single core AMD Ryzen 5 5560U <xref target="eBACS-DH"/>. Ephemeral key exchange with the quantum-resistant algorithm Kyber that NIST will standardize is even faster. For the current non-standardized version of Kyber512 the cryptographic operations take 12 microseconds for the client and 8 microseconds for the server <xref target="eBACS-KEM"/>.</t>
      <!--(102661 + 110972) / 4.062 / 10^3 -->
<!--(21880 + 26067) / 4.062 / 10^3 -->
<!--(32241) / 4.062 / 10^3 -->

<t>Unfortunately, psk_ke is marked as "Recommended" in the IANA PskKeyExchangeMode registry. This may severely weaken security in deployments following the "Recommended" column.  Introducing TLS 1.3 in 3GPP had the unfortunate and surprising effect of drastically lowering the minimum security when TLS is used with PSK authentication.  Some companies in 3GPP have been unwilling to mark psk_ke as not recommended as it is so clearly marked as "Recommended" by the IETF. By labeling psk_ke as "Recommended", IETF is legitimizing and implicitly promoting bad security practice.</t>
      <t>This document sets the "Recommended" value of psk_ke to "D" indicating that it is "Discouraged".</t>
      <t><xref target="RFC9113"/> describes and classifies prohibited TLS 1.2 cipher suites without forward secrecy. This document sets the "Recommended" value of all cipher suites listed in Appendix A of <xref target="RFC9113"/> as well as TLS_PSK_WITH_CHACHA20_POLY1305_SHA256 to "D" indicating that they are "Discouraged".</t>
    </section>
    <section anchor="cipher-suites-with-null-encryption">
      <name>Cipher Suites with NULL Encryption</name>
      <t>Cipher suites with NULL encryption enables passive monitoring <xref target="RFC7258"/> and were completely removed from TLS 1.3 <xref target="RFC8446"/>. Unfortunately, the independent stream document <xref target="RFC9150"/> reintroduced cipher suites with NULL Encryption in TLS 1.3 even though NULL encryption violates several of the fundamental TLS 1.3 security properties, namely "Protection of endpoint identities", "Confidentiality", and "Length concealment". Some companies in 3GPP have already suggested to use <xref target="RFC9150"/> in QUIC but luckily this is forbidden by <xref target="RFC9001"/> and hopefully it will stay like that.</t>
      <t>Modern encryption algorithms like AES-GCM <xref target="RFC5288"/> are very fast and have small message overhead. Upcoming algorithms like AEGIS <xref target="I-D.irtf-cfrg-aegis-aead"/> is much faster than AES-GCM <xref target="AEGIS-PERF"/>. NULL encryption has no raison d'<contact fullname="ê"/>tre in two-party protocols.</t>
      <t>Two essential zero trust principles are to assume that breach is inevitable or has likely already occurred <xref target="NSA-ZT"/>, and to minimize impact when breach occur <xref target="NIST-ZT"/>. One type of breach is an on-path attacker present on the enterprise network. In <xref target="NIST-ZT2"/>, NIST states as the first basic assumption for network connectivity for any organization that utilizes zero trust is that:</t>
      <ul spacing="normal">
        <li>"The entire enterprise private network is not considered an implicit trust zone. Assets should always act as if an attacker is present on the enterprise network, and communication should be done in the most secure manner available. This entails actions such as authenticating all connections and encrypting all traffic."</li>
      </ul>
      <t>This document sets the "Recommended" value of TLS_SHA256_SHA256 and TLS_SHA384_SHA384 to "D" indicating that they are  "Discouraged".</t>
    </section>
    <section anchor="obsolete-key-exchange">
      <name>Obsolete Key Exchange</name>
      <t>Government organizations like NIST, ANSSI, BSI, and NSA have already produced recommendations regarding the deprecation of key exchange algorithms with less than 128-bit security such as ffdhe2048. NIST <xref target="NIST-Lifetime"/> and ANSSI <xref target="ANSSI-TLS"/> only allow 2048-bit Finite Field Diffie-Hellman if the application data does not have to be protected after 2030. If the application data had a security life of ten years, NIST and ANSSI allowed use of ffdhe2048 until December 31, 2020. BSI <xref target="BSI"/> allowed use of ffdhe2048 up to the year 2022. The Commercial National Security Algorithm Suite (CNSA) <xref target="RFC9151"/> forbids the use of ffdhe2048.  ECDHE groups that offer less than 128-bit security are forbidden to use in TLS 1.3. This document sets the "Recommended" value of ffdhe2048, secp160k1, secp160r1, secp160r2, sect163k1, sect163r1, sect163r2, secp192k1, secp192r1, sect193r1, sect193r2, secp224k1, secp224r1m sect233k1, sect233r1, and sect239k1 to "D" indicating that they are  "Discouraged".</t>
      <t><xref target="I-D.ietf-tls-deprecate-obsolete-kex"/> describes and classifies cipher suites with obsolete key exchange methods in TLS 1.2 but does not downgrade the "Recommended" value. This document sets the "Recommended" value of all cipher suites listed in Appendix A of <xref target="I-D.ietf-tls-deprecate-obsolete-kex"/> to "D" indicating that they are "Discouraged".</t>
    </section>
    <section anchor="signature-algorithms-with-pkcs-1-v15-padding-or-sha-1">
      <name>Signature Algorithms with PKCS #1 v1.5 Padding or SHA-1</name>
      <t>Recommendations regarding RSASSA-PKCS1-v1_5 in certificates varies. The RSA Cryptography Specifications <xref target="RFC8017"/> specifies that "RSASSA-PSS is REQUIRED in new applications. RSASSA-PKCS1-v1_5 is included only for compatibility with existing applications.". BSI <xref target="BSI"/> allows use of the PKCS #1 v1.5 padding scheme in certificates up to the year 2025. The Commercial National Security Algorithm (CNSA) <xref target="RFC9151"/> requires offer of rsa_pkcs1_sha384 in certificates. This document sets the "Recommended" value of rsa_pkcs1_sha256, rsa_pkcs1_sha384, and rsa_pkcs1_sha512 to "N".</t>
      <t><xref target="RFC8446"/> forbids the use of RSASSA-PKCS1-v1_5 in signed TLS handshake messages. <xref target="I-D.davidben-tls13-pkcs1"/> registered new RSASSA-PKCS1-v1_5 signature algorithms for use in signed TLS 1.3 handshake messages. This document sets the "Recommended" value of rsa_pkcs1_sha256_legacy, rsa_pkcs1_sha384_legacy, and rsa_pkcs1_sha512_legacy to "D" indicating that they are "Discouraged".</t>
      <t><xref target="RFC8446"/> labels rsa_pkcs1_sha1 and ecdsa_sha1 as legacy algorithms which are being deprecated and that endpoints SHOULD NOT or MUST NOT negotiate. This document sets the "Recommended" value of rsa_pkcs1_sha1 and ecdsa_sha1 to "D" indicating that they are "Discouraged".</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="tls-pskkeyexchangemode">
        <name>TLS PskKeyExchangeMode</name>
        <t>IANA is requested to update the TLS PskKeyExchangeMode registry under the Transport Layer Security (TLS) Parameters heading. For the following entry the "Recommended" value has been set to "D" indicating that the item is "Discouraged".</t>
        <table>
          <name>Downgraded TLS PSK Key Exchange Modes</name>
          <thead>
            <tr>
              <th align="left">Description</th>
              <th align="center">Recommended</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">psk_ke</td>
              <td align="center">D</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="tls-cipher-suites">
        <name>TLS Cipher Suites</name>
        <t>IANA is requested to update the TLS Cipher Suites registry under the Transport Layer Security (TLS) Parameters heading. For all cipher suites listed in Appendix A of <xref target="RFC9113"/>, all cipher suites listed in Appendix A of <xref target="I-D.ietf-tls-deprecate-obsolete-kex"/>, and the following entries the "Recommended" value have been set to "D" indicating that the items are "Discouraged".</t>
        <table>
          <name>Downgraded TLS Cipher Suites</name>
          <thead>
            <tr>
              <th align="left">Description</th>
              <th align="center">Recommended</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">TLS_SHA256_SHA256</td>
              <td align="center">D</td>
            </tr>
            <tr>
              <td align="left">TLS_SHA384_SHA384</td>
              <td align="center">D</td>
            </tr>
            <tr>
              <td align="left">TLS_PSK_WITH_CHACHA20_POLY1305_SHA256</td>
              <td align="center">D</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="tls-supported-groups">
        <name>TLS Supported Groups</name>
        <t>IANA is requested to update the TLS Supported Groups registry under the Transport Layer Security (TLS) Parameters heading. For the following entries the "Recommended" value have been set to "D" indicating that the items are "Discouraged".</t>
        <table>
          <name>Downgraded TLS Supported Groups</name>
          <thead>
            <tr>
              <th align="left">Description</th>
              <th align="center">Recommended</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">sect163k1</td>
              <td align="center">D</td>
            </tr>
            <tr>
              <td align="left">sect163r1</td>
              <td align="center">D</td>
            </tr>
            <tr>
              <td align="left">sect163r2</td>
              <td align="center">D</td>
            </tr>
            <tr>
              <td align="left">sect193r1</td>
              <td align="center">D</td>
            </tr>
            <tr>
              <td align="left">sect193r2</td>
              <td align="center">D</td>
            </tr>
            <tr>
              <td align="left">sect233k1</td>
              <td align="center">D</td>
            </tr>
            <tr>
              <td align="left">sect233r1</td>
              <td align="center">D</td>
            </tr>
            <tr>
              <td align="left">sect239k1</td>
              <td align="center">D</td>
            </tr>
            <tr>
              <td align="left">secp160k1</td>
              <td align="center">D</td>
            </tr>
            <tr>
              <td align="left">secp160r1</td>
              <td align="center">D</td>
            </tr>
            <tr>
              <td align="left">secp160r2</td>
              <td align="center">D</td>
            </tr>
            <tr>
              <td align="left">secp192k1</td>
              <td align="center">D</td>
            </tr>
            <tr>
              <td align="left">secp192r1</td>
              <td align="center">D</td>
            </tr>
            <tr>
              <td align="left">secp224k1</td>
              <td align="center">D</td>
            </tr>
            <tr>
              <td align="left">secp224r1</td>
              <td align="center">D</td>
            </tr>
            <tr>
              <td align="left">ffdhe2048</td>
              <td align="center">D</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="tls-signaturescheme">
        <name>TLS SignatureScheme</name>
        <t>IANA is requested to update the TLS SignatureScheme registry under the Transport Layer Security (TLS) Parameters heading. For the following entries the "Recommended" value have been set to "N" or "D" where "D" indicates that the items are "Discouraged".</t>
        <table>
          <name>Downgraded TLS Signature Schemes</name>
          <thead>
            <tr>
              <th align="left">Description</th>
              <th align="center">Recommended</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">rsa_pkcs1_sha1</td>
              <td align="center">D</td>
            </tr>
            <tr>
              <td align="left">ecdsa_sha1</td>
              <td align="center">D</td>
            </tr>
            <tr>
              <td align="left">rsa_pkcs1_sha256</td>
              <td align="center">N</td>
            </tr>
            <tr>
              <td align="left">rsa_pkcs1_sha256_legacy</td>
              <td align="center">D</td>
            </tr>
            <tr>
              <td align="left">rsa_pkcs1_sha384</td>
              <td align="center">N</td>
            </tr>
            <tr>
              <td align="left">rsa_pkcs1_sha384_legacy</td>
              <td align="center">D</td>
            </tr>
            <tr>
              <td align="left">rsa_pkcs1_sha512</td>
              <td align="center">N</td>
            </tr>
            <tr>
              <td align="left">rsa_pkcs1_sha512_legacy</td>
              <td align="center">D</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC9113">
          <front>
            <title>HTTP/2</title>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson">
              <organization/>
            </author>
            <author fullname="C. Benfield" initials="C." role="editor" surname="Benfield">
              <organization/>
            </author>
            <date month="June" year="2022"/>
            <abstract>
              <t>This specification describes an optimized expression of the semantics of the Hypertext Transfer Protocol (HTTP), referred to as HTTP version 2 (HTTP/2). HTTP/2 enables a more efficient use of network resources and a reduced latency by introducing field compression and allowing multiple concurrent exchanges on the same connection.</t>
              <t>This document obsoletes RFCs 7540 and 8740.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9113"/>
          <seriesInfo name="DOI" value="10.17487/RFC9113"/>
        </reference>
        <reference anchor="RFC9147">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig">
              <organization/>
            </author>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu">
              <organization/>
            </author>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability.  Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="I-D.ietf-tls-deprecate-obsolete-kex">
          <front>
            <title>Deprecating Obsolete Key Exchange Methods in TLS</title>
            <author fullname="Carrick Bartle" initials="C." surname="Bartle">
              <organization>Apple, Inc.</organization>
            </author>
            <author fullname="Nimrod Aviram" initials="N." surname="Aviram">
         </author>
            <date day="11" month="December" year="2022"/>
            <abstract>
              <t>   This document makes several prescriptions regarding the following key
   exchange methods in TLS, most of which have been superseded by better
   options:

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-deprecate-obsolete-kex-01"/>
        </reference>
        <reference anchor="I-D.ietf-tls-rfc8447bis">
          <front>
            <title>IANA Registry Updates for TLS and DTLS</title>
            <author fullname="Joseph A. Salowey" initials="J. A." surname="Salowey">
              <organization>Venafi</organization>
            </author>
            <author fullname="Sean Turner" initials="S." surname="Turner">
              <organization>sn3rd</organization>
            </author>
            <date day="24" month="October" year="2022"/>
            <abstract>
              <t>   This document describes a number of changes to TLS and DTLS IANA
   registries that range from adding notes to the registry all the way
   to changing the registration policy.  These changes were mostly
   motivated by WG review of the TLS- and DTLS-related registries
   undertaken as part of the TLS 1.3 development process.

   This document obsoletes RFC 8447 and updates the following RFCs:
   3749, 5077, 4680, 5246, 5705, 5878, 6520, and 7301.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8447bis-02"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC5288">
          <front>
            <title>AES Galois Counter Mode (GCM) Cipher Suites for TLS</title>
            <author fullname="J. Salowey" initials="J." surname="Salowey">
              <organization/>
            </author>
            <author fullname="A. Choudhury" initials="A." surname="Choudhury">
              <organization/>
            </author>
            <author fullname="D. McGrew" initials="D." surname="McGrew">
              <organization/>
            </author>
            <date month="August" year="2008"/>
            <abstract>
              <t>This memo describes the use of the Advanced Encryption Standard (AES) in Galois/Counter Mode (GCM) as a Transport Layer Security (TLS) authenticated encryption operation.  GCM provides both confidentiality and data origin authentication, can be efficiently implemented in hardware for speeds of 10 gigabits per second and above, and is also well-suited to software implementations.  This memo defines TLS cipher suites that use AES-GCM with RSA, DSA, and Diffie-Hellman-based key exchange mechanisms.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5288"/>
          <seriesInfo name="DOI" value="10.17487/RFC5288"/>
        </reference>
        <reference anchor="RFC7258">
          <front>
            <title>Pervasive Monitoring Is an Attack</title>
            <author fullname="S. Farrell" initials="S." surname="Farrell">
              <organization/>
            </author>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig">
              <organization/>
            </author>
            <date month="May" year="2014"/>
            <abstract>
              <t>Pervasive monitoring is a technical attack that should be mitigated in the design of IETF protocols, where possible.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="188"/>
          <seriesInfo name="RFC" value="7258"/>
          <seriesInfo name="DOI" value="10.17487/RFC7258"/>
        </reference>
        <reference anchor="RFC7624">
          <front>
            <title>Confidentiality in the Face of Pervasive Surveillance: A Threat Model and Problem Statement</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes">
              <organization/>
            </author>
            <author fullname="B. Schneier" initials="B." surname="Schneier">
              <organization/>
            </author>
            <author fullname="C. Jennings" initials="C." surname="Jennings">
              <organization/>
            </author>
            <author fullname="T. Hardie" initials="T." surname="Hardie">
              <organization/>
            </author>
            <author fullname="B. Trammell" initials="B." surname="Trammell">
              <organization/>
            </author>
            <author fullname="C. Huitema" initials="C." surname="Huitema">
              <organization/>
            </author>
            <author fullname="D. Borkmann" initials="D." surname="Borkmann">
              <organization/>
            </author>
            <date month="August" year="2015"/>
            <abstract>
              <t>Since the initial revelations of pervasive surveillance in 2013, several classes of attacks on Internet communications have been discovered.  In this document, we develop a threat model that describes these attacks on Internet confidentiality.  We assume an attacker that is interested in undetected, indiscriminate eavesdropping.  The threat model is based on published, verified attacks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7624"/>
          <seriesInfo name="DOI" value="10.17487/RFC7624"/>
        </reference>
        <reference anchor="RFC7748">
          <front>
            <title>Elliptic Curves for Security</title>
            <author fullname="A. Langley" initials="A." surname="Langley">
              <organization/>
            </author>
            <author fullname="M. Hamburg" initials="M." surname="Hamburg">
              <organization/>
            </author>
            <author fullname="S. Turner" initials="S." surname="Turner">
              <organization/>
            </author>
            <date month="January" year="2016"/>
            <abstract>
              <t>This memo specifies two elliptic curves over prime fields that offer a high level of practical security in cryptographic applications, including Transport Layer Security (TLS).  These curves are intended to operate at the ~128-bit and ~224-bit security level, respectively, and are generated deterministically based on a list of required properties.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7748"/>
          <seriesInfo name="DOI" value="10.17487/RFC7748"/>
        </reference>
        <reference anchor="RFC8017">
          <front>
            <title>PKCS #1: RSA Cryptography Specifications Version 2.2</title>
            <author fullname="K. Moriarty" initials="K." role="editor" surname="Moriarty">
              <organization/>
            </author>
            <author fullname="B. Kaliski" initials="B." surname="Kaliski">
              <organization/>
            </author>
            <author fullname="J. Jonsson" initials="J." surname="Jonsson">
              <organization/>
            </author>
            <author fullname="A. Rusch" initials="A." surname="Rusch">
              <organization/>
            </author>
            <date month="November" year="2016"/>
            <abstract>
              <t>This document provides recommendations for the implementation of public-key cryptography based on the RSA algorithm, covering cryptographic primitives, encryption schemes, signature schemes with appendix, and ASN.1 syntax for representing keys and for identifying the schemes.</t>
              <t>This document represents a republication of PKCS #1 v2.2 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series.  By publishing this RFC, change control is transferred to the IETF.</t>
              <t>This document also obsoletes RFC 3447.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8017"/>
          <seriesInfo name="DOI" value="10.17487/RFC8017"/>
        </reference>
        <reference anchor="RFC8447">
          <front>
            <title>IANA Registry Updates for TLS and DTLS</title>
            <author fullname="J. Salowey" initials="J." surname="Salowey">
              <organization/>
            </author>
            <author fullname="S. Turner" initials="S." surname="Turner">
              <organization/>
            </author>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document describes a number of changes to TLS and DTLS IANA registries that range from adding notes to the registry all the way to changing the registration policy.  These changes were mostly motivated by WG review of the TLS- and DTLS-related registries undertaken as part of the TLS 1.3 development process.</t>
              <t>This document updates the following RFCs: 3749, 5077, 4680, 5246, 5705, 5878, 6520, and 7301.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8447"/>
          <seriesInfo name="DOI" value="10.17487/RFC8447"/>
        </reference>
        <reference anchor="RFC9001">
          <front>
            <title>Using TLS to Secure QUIC</title>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson">
              <organization/>
            </author>
            <author fullname="S. Turner" initials="S." role="editor" surname="Turner">
              <organization/>
            </author>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document describes how Transport Layer Security (TLS) is used to secure QUIC.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9001"/>
          <seriesInfo name="DOI" value="10.17487/RFC9001"/>
        </reference>
        <reference anchor="RFC9150">
          <front>
            <title>TLS 1.3 Authentication and Integrity-Only Cipher Suites</title>
            <author fullname="N. Cam-Winget" initials="N." surname="Cam-Winget">
              <organization/>
            </author>
            <author fullname="J. Visoky" initials="J." surname="Visoky">
              <organization/>
            </author>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document defines the use of cipher suites for TLS 1.3 based on Hashed  Message Authentication Code (HMAC). Using these cipher suites provides server and, optionally, mutual authentication and data authenticity, but not data confidentiality. Cipher suites with these properties are not of general applicability, but there are use cases, specifically in Internet of Things (IoT) and constrained environments, that do not require confidentiality of exchanged messages while still requiring integrity protection, server authentication, and optional client authentication. This document gives examples of such use cases, with the caveat that prior to using these integrity-only cipher suites, a threat model for the situation at hand is needed, and a threat analysis must be performed within that model to determine whether the use of integrity-only cipher suites is appropriate. The approach described in this document is not endorsed by the IETF and does not have IETF consensus, but it is presented here to enable interoperable implementation of a reduced-security mechanism that provides authentication and message integrity without supporting confidentiality.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9150"/>
          <seriesInfo name="DOI" value="10.17487/RFC9150"/>
        </reference>
        <reference anchor="RFC9151">
          <front>
            <title>Commercial National Security Algorithm (CNSA) Suite Profile for TLS and DTLS 1.2 and 1.3</title>
            <author fullname="D. Cooley" initials="D." surname="Cooley">
              <organization/>
            </author>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document defines a base profile for TLS protocol versions 1.2 and 1.3 as well as DTLS protocol versions 1.2 and 1.3 for use with the US Commercial National Security Algorithm (CNSA) Suite. </t>
              <t>The profile applies to the capabilities, configuration, and operation of all components of US National Security Systems that use TLS or DTLS. It is also appropriate for all other US Government systems that process high-value information. </t>
              <t>The profile is made publicly available here for use by developers and operators of these and any other system deployments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9151"/>
          <seriesInfo name="DOI" value="10.17487/RFC9151"/>
        </reference>
        <reference anchor="RFC9257">
          <front>
            <title>Guidance for External Pre-Shared Key (PSK) Usage in TLS</title>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <author fullname="J. Hoyland" initials="J." surname="Hoyland">
              <organization/>
            </author>
            <author fullname="M. Sethi" initials="M." surname="Sethi">
              <organization/>
            </author>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood">
              <organization/>
            </author>
            <date month="July" year="2022"/>
            <abstract>
              <t>This document provides usage guidance for external Pre-Shared Keys (PSKs) in Transport Layer Security (TLS) 1.3 as defined in RFC 8446. It lists TLS security properties provided by PSKs under certain assumptions, then it demonstrates how violations of these assumptions lead to attacks. Advice for applications to help meet these assumptions is provided. This document also discusses PSK use cases and provisioning processes. Finally, it lists the privacy and security properties that are not provided by TLS 1.3 when external PSKs are used.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9257"/>
          <seriesInfo name="DOI" value="10.17487/RFC9257"/>
        </reference>
        <reference anchor="I-D.ietf-emu-aka-pfs">
          <front>
            <title>Forward Secrecy for the Extensible Authentication Protocol Method for Authentication and Key Agreement (EAP-AKA' FS)</title>
            <author fullname="Jari Arkko" initials="J." surname="Arkko">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Karl Norrman" initials="K." surname="Norrman">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Vesa Torvinen" initials="V." surname="Torvinen">
              <organization>Ericsson</organization>
            </author>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson</organization>
            </author>
            <date day="23" month="October" year="2022"/>
            <abstract>
              <t>   Many different attacks have been reported as part of revelations
   associated with pervasive surveillance.  Some of the reported attacks
   involved compromising the smart card supply chain, such as attacking
   SIM card manufacturers and operators in an effort to compromise
   shared secrets stored on these cards.  Since the publication of those
   reports, manufacturing and provisioning processes have gained much
   scrutiny and have improved.  However, the danger of resourceful
   attackers for these systems is still a concern.  Always assuming
   breach such as key compromise and minimizing the impact of breach are
   essential zero-trust principles.

   This specification updates RFC 9048, the EAP-AKA' authentication
   method, with an optional extension.  Similarly, this specification
   also updates the earlier version of the EAP-AKA' specification in RFC
   5448.  The extension, when negotiated, provides Forward Secrecy for
   the session key generated as a part of the authentication run in EAP-
   AKA'.  This prevents an attacker who has gained access to the long-
   term pre-shared secret in a SIM card from being able to decrypt any
   past communications.  In addition, if the attacker stays merely a
   passive eavesdropper, the extension prevents attacks against future
   sessions.  This forces attackers to use active attacks instead.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-emu-aka-pfs-08"/>
        </reference>
        <reference anchor="I-D.ietf-tls-rfc8446bis">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Mozilla</organization>
            </author>
            <date day="24" month="October" year="2022"/>
            <abstract>
              <t>   This document specifies version 1.3 of the Transport Layer Security
   (TLS) protocol.  TLS allows client/server applications to communicate
   over the Internet in a way that is designed to prevent eavesdropping,
   tampering, and message forgery.

   This document updates RFCs 5705, 6066, 7627, and 8422 and obsoletes
   RFCs 5077, 5246, 6961, and 8446.  This document also specifies new
   requirements for TLS 1.2 implementations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8446bis-05"/>
        </reference>
        <reference anchor="I-D.irtf-cfrg-aegis-aead">
          <front>
            <title>The AEGIS family of authenticated encryption algorithms</title>
            <author fullname="Frank Denis" initials="F." surname="Denis">
              <organization>Fastly Inc.</organization>
            </author>
            <author fullname="Fabio Enrico Renzo Scotoni" initials="F. E. R." surname="Scotoni">
              <organization>Individual Contributor</organization>
            </author>
            <author fullname="Samuel Lucas" initials="S." surname="Lucas">
              <organization>Individual Contributor</organization>
            </author>
            <date day="5" month="August" year="2022"/>
            <abstract>
              <t>   This document describes AEGIS-128L and AEGIS-256, two AES-based
   authenticated encryption algorithms designed for high-performance
   applications.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/jedisct1/draft-aegis-aead.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-cfrg-aegis-aead-00"/>
        </reference>
        <reference anchor="I-D.davidben-tls13-pkcs1">
          <front>
            <title>Legacy RSASSA-PKCS1-v1_5 codepoints for TLS 1.3</title>
            <author fullname="David Benjamin" initials="D." surname="Benjamin">
              <organization>Google LLC</organization>
            </author>
            <date day="29" month="July" year="2019"/>
            <abstract>
              <t>   This document allocates code points for the use of RSASSA-PKCS1-v1_5
   with client certificates in TLS 1.3.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-davidben-tls13-pkcs1-00"/>
        </reference>
        <reference anchor="Akhmetzyanova" target="https://eprint.iacr.org/2019/421.pdf">
          <front>
            <title>Continuing to reflect on TLS 1.3 with external PSK</title>
            <author initials="L." surname="Akhmetzyanova">
              <organization/>
            </author>
            <author initials="E." surname="Alekseev">
              <organization/>
            </author>
            <author initials="E." surname="Smyshlyaeva">
              <organization/>
            </author>
            <author initials="A." surname="Sokolov">
              <organization/>
            </author>
            <date year="2019" month="April"/>
          </front>
        </reference>
        <reference anchor="AEGIS-PERF" target="https://github.com/jedisct1/openssl-family-bench/blob/master/img/boring-aeads.png">
          <front>
            <title>BoringSSL AEADs comparison</title>
            <author initials="" surname="Frank Denis">
              <organization/>
            </author>
            <date year="2022" month="October"/>
          </front>
        </reference>
        <reference anchor="ANSSI-PFS" target="https://www.ssi.gouv.fr/uploads/2015/09/NT_IPsec_EN.pdf">
          <front>
            <title>Recommendations for securing networks with IPsec</title>
            <author initials="" surname="Agence nationale de la sécurité des systèmes d'information">
              <organization/>
            </author>
            <date year="2015" month="August"/>
          </front>
        </reference>
        <reference anchor="ANSSI-TLS" target="https://www.ssi.gouv.fr/uploads/2017/02/security-recommendations-for-tls_v1.1.pdf">
          <front>
            <title>Security Recommendations for TLS</title>
            <author initials="" surname="Agence nationale de la sécurité des systèmes d'information">
              <organization/>
            </author>
            <date year="2017" month="January"/>
          </front>
        </reference>
        <reference anchor="BoringSSL" target="https://boringssl.googlesource.com/boringssl/">
          <front>
            <title>BoringSSL</title>
            <author initials="" surname="Google">
              <organization/>
            </author>
            <date year="2023" month="January"/>
          </front>
        </reference>
        <reference anchor="BSI" target="https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/TechGuidelines/TG02102/BSI-TR-02102-2.pdf">
          <front>
            <title>Technical Guideline TR-02102-2 Cryptographic Mechanisms: Recommendations and Key Lengths Part 2 – Use of Transport Layer Security (TLS)</title>
            <author initials="" surname="Bundesamt für Sicherheit in der Informationstechnik">
              <organization/>
            </author>
            <date year="2022" month="February"/>
          </front>
        </reference>
        <reference anchor="eBACS-DH" target="https://bench.cr.yp.to/results-dh.html">
          <front>
            <title>Measurements of public-key Diffie–Hellman secret-sharing systems, indexed by machine</title>
            <author initials="" surname="eBACS: ECRYPT Benchmarking of Cryptographic Systems">
              <organization/>
            </author>
            <date year="2023" month="January"/>
          </front>
        </reference>
        <reference anchor="eBACS-KEM" target="https://bench.cr.yp.to/results-kem.html">
          <front>
            <title>Measurements of key-encapsulation mechanisms, indexed by machine</title>
            <author initials="" surname="eBACS: ECRYPT Benchmarking of Cryptographic Systems">
              <organization/>
            </author>
            <date year="2023" month="January"/>
          </front>
        </reference>
        <reference anchor="Exfiltration" target="https://blog.apnic.net/2022/03/31/how-to-detect-and-prevent-common-data-exfiltration-attacks/">
          <front>
            <title>How to: Detect and prevent common data exfiltration attacks</title>
            <author initials="" surname="APNIC">
              <organization/>
            </author>
            <date year="2022" month="March"/>
          </front>
        </reference>
        <reference anchor="Heist" target="https://theintercept.com/2015/02/19/great-sim-heist/">
          <front>
            <title>How Spies Stole the Keys to the Encryption Castle</title>
            <author initials="" surname="The Intercept">
              <organization/>
            </author>
            <date year="2015" month="February"/>
          </front>
        </reference>
        <reference anchor="NIST-Lifetime" target="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r5.pdf">
          <front>
            <title>Recommendation for Key Management: Part 1 – General</title>
            <author initials="" surname="National Institute of Standards and Technology">
              <organization/>
            </author>
            <date year="2020" month="May"/>
          </front>
        </reference>
        <reference anchor="NIST-TLS" target="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-52r2.pdf">
          <front>
            <title>Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations</title>
            <author initials="" surname="National Institute of Standards and Technology">
              <organization/>
            </author>
            <date year="2019" month="August"/>
          </front>
        </reference>
        <reference anchor="NIST-ZT" target="https://www.nccoe.nist.gov/sites/default/files/2022-12/zta-nist-sp-1800-35b-preliminary-draft-2.pdf">
          <front>
            <title>Implementing a Zero Trust Architecture</title>
            <author initials="" surname="National Institute of Standards and Technology">
              <organization/>
            </author>
            <date year="2022" month="December"/>
          </front>
        </reference>
        <reference anchor="NIST-ZT2" target="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-207.pdf">
          <front>
            <title>Zero Trust Architecture</title>
            <author initials="" surname="National Institute of Standards and Technology">
              <organization/>
            </author>
            <date year="2020" month="August"/>
          </front>
        </reference>
        <reference anchor="NSA-ZT" target="https://media.defense.gov/2021/Feb/25/2002588479/-1/-1/0/CSI_EMBRACING_ZT_SECURITY_MODEL_UOO115131-21.PDF">
          <front>
            <title>Embracing a Zero Trust Security Model</title>
            <author initials="" surname="National Security Agency">
              <organization/>
            </author>
            <date year="2021" month="February"/>
          </front>
        </reference>
        <reference anchor="Signal" target="https://signal.org/docs/specifications/doubleratchet/">
          <front>
            <title>The Double Ratchet Algorithm</title>
            <author initials="" surname="Signal">
              <organization/>
            </author>
            <date year="2016" month="November"/>
          </front>
        </reference>
        <reference anchor="TS.33.210" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=2279">
          <front>
            <title>TS 33.210 Network Domain Security (NDS); IP network layer security</title>
            <author initials="" surname="3GPP">
              <organization/>
            </author>
            <date year="2022" month="September"/>
          </front>
          <seriesInfo name="3GPP TS 33.210 17.1.0" value=""/>
        </reference>
        <reference anchor="TS.33.501" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3169">
          <front>
            <title>TS 33.501 Security architecture and procedures for 5G System</title>
            <author initials="" surname="3GPP">
              <organization/>
            </author>
            <date year="2022" month="December"/>
          </front>
          <seriesInfo name="3GPP TS 33.501 18.0.0" value=""/>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>The authors want to thank <contact fullname="Ari Keränen"/>, <contact fullname="Eric Rescorla"/>, and <contact fullname="Paul Wouters"/> for their valuable comments and feedback.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
