<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.23 (Ruby 3.3.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-uta-require-tls13-05" category="bcp" consensus="true" submissionType="IETF" updates="9325" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.26.0 -->
  <front>
    <title abbrev="require-tls1.3">New Protocols Must Require TLS 1.3</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-uta-require-tls13-05"/>
    <author fullname="Rich Salz">
      <organization>Akamai Technologies</organization>
      <address>
        <email>rsalz@akamai.com</email>
      </address>
    </author>
    <author fullname="Nimrod Aviram">
      <organization/>
      <address>
        <email>nimrod.aviram@gmail.com</email>
      </address>
    </author>
    <date year="2025" month="February" day="11"/>
    <area>Security</area>
    <workgroup>Using TLS in Applications</workgroup>
    <keyword>TLS</keyword>
    <keyword>features</keyword>
    <abstract>
      <?line 120?>

<t>TLS 1.2 is in use and can be configured such that it provides good security
properties. TLS 1.3 use is increasing, and fixes some known deficiencies
with TLS
1.2, such as removing error-prone cryptographic primitives and encrypting
more of the traffic so that it is not readable by outsiders.
For these reasons, new protocols must require and
assume the existence of TLS 1.3.
As DTLS 1.3 is not widely available or deployed,
this prescription does not pertain to DTLS (in any DTLS version); it pertains to
TLS only.</t>
      <t>This document updates RFC9325.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-uta-require-tls13/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Using TLS in Applications Working Group mailing list (<eref target="mailto:uta@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/uta/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/uta/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/richsalz/draft-use-tls13"/>.</t>
    </note>
  </front>
  <middle>
    <?line 135?>

<section anchor="sec-reasons">
      <name>Introduction</name>
      <t>TLS 1.2 <xref target="TLS12"/> is in use and can be configured such that
it provides good
security properties. However, this protocol version suffers from several
deficiencies:</t>
      <ol spacing="normal" type="1"><li>
          <t>While application layer traffic is always encrypted, most of the handshake
messages are not. Therefore, the privacy provided is suboptimal.
This is a protocol issue that cannot be addressed by configuration.</t>
        </li>
        <li>
          <t>The list of cryptographic primitives specified for the protocol, both in-use
primitives and deprecated ones, includes several primitives that have
been a source for
vulnerabilities throughout the years, such as RSA key exchange, CBC cipher suites,
and problematic finite-field Diffie-Hellman group negotiation.
These issues could be addressed through proper configuration; however,
experience shows that configuration mistakes are common, especially when
deploying cryptography.
See <xref target="sec-considerations"/> for elaboration.</t>
        </li>
        <li>
          <t>The base protocol does not provide security against some
types of attacks (see <xref target="sec-considerations"/>);
extensions are required to provide
security.</t>
        </li>
      </ol>
      <t>TLS 1.3 <xref target="TLS13"/> is also in
widespread use and fixes most known deficiencies with TLS 1.2, such as
encrypting more of the traffic so that it is not readable by outsiders and
removing most cryptographic primitives considered dangerous. Importantly, TLS
1.3 enjoys robust security proofs and provides excellent security without
any additional configuration.</t>
      <t>This document specifies that, since TLS 1.3 use is widespread, new protocols
must require and assume its existence.
It updates <xref target="RFC9325"/> as described in <xref target="rfc9325-updates"/>.
As DTLS 1.3 is not widely available or deployed,
this prescription does not pertain to DTLS (in any DTLS version); it pertains to
TLS only.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="implications-for-post-quantum-cryptography">
      <name>Implications for post-quantum cryptography</name>
      <t>Cryptographically-relevant quantum computers, once available, will
have a huge impact on TLS traffic. To mitigate this, TLS applications
will need to migrate to post-quantum cryptography <xref target="PQC"/>.</t>
      <t>For TLS it is important to note that the focus of these efforts is TLS 1.3
or later, and that TLS 1.2 will not be supported (see <xref target="TLS12FROZEN"/>).
This is one more reason for new protocols to default to TLS 1.3, where
post-quantum cryptography is expected to be supported.</t>
    </section>
    <section anchor="tls-use-by-other-protocols-and-applications">
      <name>TLS Use by Other Protocols and Applications</name>
      <t>Any new protocol that uses TLS <bcp14>MUST</bcp14> specify as its default TLS 1.3.
For example, QUIC <xref target="QUICTLS"/> requires TLS 1.3 and specifies that endpoints
<bcp14>MUST</bcp14> terminate the connection if an older version is used.</t>
      <t>If deployment considerations are a concern, the protocol <bcp14>MAY</bcp14> specify TLS 1.2 as
an additional, non-default option.
As a counter example, the Usage Profile for DNS over TLS <xref target="DNSTLS"/> specifies
TLS 1.2 as the default, while also allowing TLS 1.3.
For newer specifications that choose to support TLS 1.2, those preferences are
to be reversed.</t>
      <t>The initial TLS handshake allows a client to specify which versions of
the TLS protocol it supports and the server is intended to pick the highest
version that it also supports.
This is known as the "TLS version negotiation," and
many TLS libraries provide a way for applications to specify the range
of versions.
When the API allows it, clients <bcp14>SHOULD</bcp14> specify just the minimum version they
want.
This <bcp14>MUST</bcp14> be TLS 1.3 or TLS 1.2, depending on the circumstances described
in the above paragraphs.</t>
    </section>
    <section anchor="rfc9325-updates">
      <name>Changes to RFC 9325</name>
      <t>RFC 9325 provides recommendations for ensuring the security of deployed
services that use TLS and, unlike this document, DTLS as well.
At this time it was published, it described availability of TLS 1.3
as "widely available." The transition and adoption mentioned in that
documnent has grown, and this document now makes two small changes
to the recommendations in <xref section="3.1.1" sectionFormat="comma" target="RFC9325"/>:</t>
      <ul spacing="normal">
        <li>
          <t>That section says that TLS 1.3 <bcp14>SHOULD</bcp14> be supported; this document says
that for new protocols it <bcp14>MUST</bcp14> be supported.</t>
        </li>
        <li>
          <t>That section says that TLS 1.2 <bcp14>MUST</bcp14> be supported; this document says that
it <bcp14>MAY</bcp14> be supported as described above.</t>
        </li>
      </ul>
      <t>Again, these changes only apply to TLS, and not DTLS.</t>
    </section>
    <section anchor="sec-considerations">
      <name>Security Considerations</name>
      <t>TLS 1.2 was specified with several cryptographic primitives and design choices
that have, over time, weakened its security. The purpose of this section is to
briefly survey several such prominent problems that have affected the protocol.
It should be noted, however, that TLS 1.2 can be configured securely; it is
merely much more difficult to configure it securely as opposed to using its
modern successor, TLS 1.3. See <xref target="RFC9325"/> for a more thorough guide on the
secure deployment of TLS 1.2.</t>
      <t>Firstly, the TLS 1.2 protocol, without any extension points, is vulnerable to
renegotiation attacks (see <xref target="RENEG1"/> and <xref target="RENEG2"/>)  and the
Triple Handshake attack (see <xref target="TRIPLESHAKE"/>).
Broadly, these attacks
exploit the protocol's support for renegotiation in order to inject a prefix
chosen by the attacker into the plaintext stream. This is usually a devastating
threat in practice, that allows e.g. obtaining secret cookies in a web setting.
In light of
the above problems, <xref target="RFC5746"/> specifies an extension that prevents this
category of attacks. To securely deploy TLS 1.2, either renegotiation must be
disabled entirely, or this extension must be used. Additionally, clients must
not allow servers to renegotiate the certificate during a connection.</t>
      <t>Secondly, the original key exchange methods specified for the protocol, namely
RSA key exchange and finite field Diffie-Hellman, suffer from several
weaknesses. Similarly, to securely deploy the protocol, these key exchange
methods must be disabled.
See <xref target="I-D.draft-ietf-tls-deprecate-obsolete-kex"/> for details.</t>
      <t>Thirdly, symmetric ciphers which were widely-used in the protocol, namely RC4
and CBC cipher suites, suffer from several weaknesses. RC4 suffers from
exploitable biases in its key stream; see <xref target="RFC7465"/>. CBC cipher suites have
been a source of vulnerabilities throughout the years. A straightforward
implementation of these cipher suites inherently suffers from the Lucky13 timing
attack <xref target="LUCKY13"/>. The first attempt to implement the cipher suites in
constant time introduced an even more severe vulnerability <xref target="LUCKY13FIX"/>.
There have been further similar vulnerabilities throughout the
years exploiting CBC cipher suites; refer to e.g. <xref target="CBCSCANNING"/>
for an example and a survey of similar works.</t>
      <t>And lastly, historically the protocol was affected by several other attacks that
TLS 1.3 is immune to:
BEAST <xref target="BEAST"/>, Logjam <xref target="WEAKDH"/>, FREAK <xref target="FREAK"/>, and SLOTH <xref target="SLOTH"/>.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>This document makes no requests to IANA.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="TLS12">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="TLS13">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Independent</organization>
            </author>
            <date day="14" month="September" year="2024"/>
            <abstract>
              <t>   This document specifies version 1.3 of the Transport Layer Security
   (TLS) protocol.  TLS allows client/server applications to communicate
   over the Internet in a way that is designed to prevent eavesdropping,
   tampering, and message forgery.

   This document updates RFCs 5705, 6066, 7627, and 8422 and obsoletes
   RFCs 5077, 5246, 6961, 8422, and 8446.  This document also specifies
   new requirements for TLS 1.2 implementations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8446bis-11"/>
        </reference>
        <reference anchor="TLS12FROZEN">
          <front>
            <title>TLS 1.2 is in Feature Freeze</title>
            <author fullname="Rich Salz" initials="R." surname="Salz">
              <organization>Akamai Technologies</organization>
            </author>
            <author fullname="Nimrod Aviram" initials="N." surname="Aviram">
         </author>
            <date day="29" month="January" year="2025"/>
            <abstract>
              <t>   Use of TLS 1.3 is growing and fixes some known deficiencies in TLS
   1.2.  This document specifies that outside of urgent security fixes,
   new TLS Exporter Labels, or new Application-Layer Protocol
   Negotiation (ALPN) Protocol IDs, no changes will be approved for TLS
   1.2.  This prescription does not pertain to DTLS (in any DTLS
   version); it pertains to TLS only.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-tls12-frozen-06"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC9325">
          <front>
            <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="November" year="2022"/>
            <abstract>
              <t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are used to protect data exchanged over a wide range of application protocols and can also form the basis for secure transport protocols. Over the years, the industry has witnessed several serious attacks on TLS and DTLS, including attacks on the most commonly used cipher suites and their modes of operation. This document provides the latest recommendations for ensuring the security of deployed services that use TLS and DTLS. These recommendations are applicable to the majority of use cases.</t>
              <t>RFC 7525, an earlier version of the TLS recommendations, was published when the industry was transitioning to TLS 1.2. Years later, this transition is largely complete, and TLS 1.3 is widely available. This document updates the guidance given the new environment and obsoletes RFC 7525. In addition, this document updates RFCs 5288 and 6066 in view of recent attacks.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="195"/>
          <seriesInfo name="RFC" value="9325"/>
          <seriesInfo name="DOI" value="10.17487/RFC9325"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="QUICTLS">
          <front>
            <title>Using TLS to Secure QUIC</title>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <author fullname="S. Turner" initials="S." role="editor" surname="Turner"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document describes how Transport Layer Security (TLS) is used to secure QUIC.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9001"/>
          <seriesInfo name="DOI" value="10.17487/RFC9001"/>
        </reference>
        <reference anchor="DNSTLS">
          <front>
            <title>Usage Profiles for DNS over TLS and DNS over DTLS</title>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
            <author fullname="D. Gillmor" initials="D." surname="Gillmor"/>
            <author fullname="T. Reddy" initials="T." surname="Reddy"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document discusses usage profiles, based on one or more authentication mechanisms, which can be used for DNS over Transport Layer Security (TLS) or Datagram TLS (DTLS). These profiles can increase the privacy of DNS transactions compared to using only cleartext DNS. This document also specifies new authentication mechanisms -- it describes several ways that a DNS client can use an authentication domain name to authenticate a (D)TLS connection to a DNS server. Additionally, it defines (D)TLS protocol profiles for DNS clients and servers implementing DNS over (D)TLS. This document updates RFC 7858.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8310"/>
          <seriesInfo name="DOI" value="10.17487/RFC8310"/>
        </reference>
        <reference anchor="PQC" target="https://www.nist.gov/cybersecurity/what-post-quantum-cryptography">
          <front>
            <title>What Is Post-Quantum Cryptography?</title>
            <author>
              <organization/>
            </author>
            <date year="2024" month="August"/>
          </front>
        </reference>
        <reference anchor="TRIPLESHAKE" target="https://mitls.org/pages/attacks/3SHAKE">
          <front>
            <title>Triple Handshakes Considered Harmful Breaking and Fixing Authentication over TLS</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RENEG1" target="https://web.archive.org/web/20091231034700/http://www.educatedguesswork.org/2009/11/understanding_the_tls_renegoti.html">
          <front>
            <title>Understanding the TLS Renegotiation Attack</title>
            <author initials="E." surname="Rescorla" fullname="Eric Rescorla">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RENEG2" target="https://web.archive.org/web/20091228061844/http://extendedsubset.com/?p=8">
          <front>
            <title>Authentication Gap in TLS Renegotiation</title>
            <author initials="M." surname="Ray" fullname="Marsh Ray">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="LUCKY13" target="http://www.isg.rhul.ac.uk/tls/TLStiming.pdf">
          <front>
            <title>Lucky Thirteen: Breaking the TLS and DTLS record protocols</title>
            <author initials="N. J." surname="Al Fardan">
              <organization/>
            </author>
            <author initials="K. G." surname="Paterson">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="LUCKY13FIX" target="https://nds.rub.de/media/nds/veroeffentlichungen/2016/10/19/tls-attacker-ccs16.pdf">
          <front>
            <title>Systematic fuzzing and testing of TLS libraries</title>
            <author initials="J." surname="Somorovsky" fullname="Juraj Somorovsky">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="CBCSCANNING" target="https://www.usenix.org/system/files/sec19-merget.pdf">
          <front>
            <title>Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities</title>
            <author initials="R." surname="Merget" fullname="Robert Merget">
              <organization/>
            </author>
            <author initials="J." surname="Somorovsky" fullname="Juraj Somorovsky">
              <organization/>
            </author>
            <author initials="N." surname="Aviram" fullname="Nimrod Aviram">
              <organization/>
            </author>
            <author initials="C." surname="Young" fullname="Craig Young">
              <organization/>
            </author>
            <author initials="J." surname="Fliegenschmidt" fullname="Janis Fliegenschmidt">
              <organization/>
            </author>
            <author initials="J." surname="Schwenk" fullname="JÃ¶rg Schwenk">
              <organization/>
            </author>
            <author initials="Y." surname="Shavitt" fullname="Yuval Shavitt">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="BEAST" target="http://www.hpcc.ecs.soton.ac.uk/dan/talks/bullrun/Beast.pdf">
          <front>
            <title>Here come the xor ninjas</title>
            <author initials="T." surname="Duong" fullname="Thai Duong">
              <organization/>
            </author>
            <author initials="J." surname="Rizzo" fullname="Juliano Rizzo">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="WEAKDH" target="https://dl.acm.org/doi/pdf/10.1145/2810103.2813707">
          <front>
            <title>Imperfect forward secrecy: How Diffie-Hellman fails in practice</title>
            <author initials="D." surname="Adrian">
              <organization/>
            </author>
            <author initials="K." surname="Bhargavan">
              <organization/>
            </author>
            <author initials="Z." surname="Durumeric">
              <organization/>
            </author>
            <author initials="P." surname="Gaudry">
              <organization/>
            </author>
            <author initials="M." surname="Green">
              <organization/>
            </author>
            <author initials="J. A." surname="Halderman">
              <organization/>
            </author>
            <author initials="N." surname="Heninger">
              <organization/>
            </author>
            <author initials="D." surname="Springall">
              <organization/>
            </author>
            <author initials="E." surname="ThomÃ©">
              <organization/>
            </author>
            <author initials="L." surname="Valenta">
              <organization/>
            </author>
            <author initials="B." surname="VanderSloot">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="FREAK" target="https://inria.hal.science/hal-01114250/file/messy-state-of-the-union-oakland15.pdf">
          <front>
            <title>A messy state of the union: Taming the composite state machines of TLS</title>
            <author initials="B." surname="Beurdouche" fullname="Benjamin Beurdouche">
              <organization/>
            </author>
            <author initials="K." surname="Bhargavan" fullname="Karthikeyan Bhargavan">
              <organization/>
            </author>
            <author initials="A." surname="Delignat-Lavaud" fullname="Antoine Delignat-Lavaud">
              <organization/>
            </author>
            <author initials="C." surname="Fournet" fullname="CÃ©dric Fournet">
              <organization/>
            </author>
            <author initials="M." surname="Kohlweiss" fullname="Markulf Kohlweiss">
              <organization/>
            </author>
            <author initials="A." surname="Pironti" fullname="Alfredo Pironti">
              <organization/>
            </author>
            <author initials="P.-Y." surname="Strub" fullname="Pierre-Yves Strub">
              <organization/>
            </author>
            <author initials="J. K." surname="Zinzindohoue" fullname="Jean Karim Zinzindohoue">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="SLOTH" target="https://inria.hal.science/hal-01244855/file/SLOTH_NDSS16.pdf">
          <front>
            <title>Transcript collision attacks: Breaking authentication in TLS, IKE, and SSH</title>
            <author initials="K." surname="Bhargavan" fullname="Karthikeyan Bhargavan">
              <organization/>
            </author>
            <author initials="G." surname="Leurent" fullname="GaÃ«tan Leurent">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC5746">
          <front>
            <title>Transport Layer Security (TLS) Renegotiation Indication Extension</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="M. Ray" initials="M." surname="Ray"/>
            <author fullname="S. Dispensa" initials="S." surname="Dispensa"/>
            <author fullname="N. Oskov" initials="N." surname="Oskov"/>
            <date month="February" year="2010"/>
            <abstract>
              <t>Secure Socket Layer (SSL) and Transport Layer Security (TLS) renegotiation are vulnerable to an attack in which the attacker forms a TLS connection with the target server, injects content of his choice, and then splices in a new TLS connection from a client. The server treats the client's initial TLS handshake as a renegotiation and thus believes that the initial data transmitted by the attacker is from the same entity as the subsequent client data. This specification defines a TLS extension to cryptographically tie renegotiations to the TLS connections they are being performed over, thus preventing this attack. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5746"/>
          <seriesInfo name="DOI" value="10.17487/RFC5746"/>
        </reference>
        <reference anchor="I-D.draft-ietf-tls-deprecate-obsolete-kex">
          <front>
            <title>Deprecating Obsolete Key Exchange Methods in TLS 1.2</title>
            <author fullname="Carrick Bartle" initials="C." surname="Bartle">
              <organization>Roblox</organization>
            </author>
            <author fullname="Nimrod Aviram" initials="N." surname="Aviram">
         </author>
            <date day="3" month="September" year="2024"/>
            <abstract>
              <t>   This document deprecates the use of RSA key exchange and Diffie
   Hellman over a finite field in TLS 1.2, and discourages the use of
   static elliptic curve Diffie Hellman cipher suites.

   Note that these prescriptions apply only to TLS 1.2 since TLS 1.0 and
   1.1 are deprecated by RFC 8996 and TLS 1.3 either does not use the
   affected algorithm or does not share the relevant configuration
   options.

   This document updates RFCs 9325, 4346, 5246, 4162, 6347, 5932, 5288,
   6209, 6367, 8422, 5289, 5469, 4785, 4279, 5487, 6655, and 7905.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-deprecate-obsolete-kex-05"/>
        </reference>
        <reference anchor="RFC7465">
          <front>
            <title>Prohibiting RC4 Cipher Suites</title>
            <author fullname="A. Popov" initials="A." surname="Popov"/>
            <date month="February" year="2015"/>
            <abstract>
              <t>This document requires that Transport Layer Security (TLS) clients and servers never negotiate the use of RC4 cipher suites when they establish connections. This applies to all TLS versions. This document updates RFCs 5246, 4346, and 2246.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7465"/>
          <seriesInfo name="DOI" value="10.17487/RFC7465"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA81a3XbbOJK+x1Ng3Bc7s0eiLNv5c2Ynrfgn9sRxHMuZnvSc
OX0gEpIQk4SGIC0rPr7aF5nbOXu/DzD7YvtVAaRI2Z7uPnuzuYkMEkChfr76
qsB+vy9KU6Z6X26d66W8KGxpY5s6+aFypbzUf6tMoeXV2VgOo90toSaTQt/g
5cI/6Zep4wexKvXMFqt9OYkXolok+Nvty1e7O8+ESGycqwx7JIWaln2jy2m/
KlW/vchuf/uZcNUkM84Zm5erBd4/Pbo6FnmVTXSxL2jJfRHb3OncVVi8LCot
IMyuUIVWEGqs46ow5WpLLG1xPStstcDoZ2fyGR/B5HK0WKQGwmILtyWu9Qpv
JvtC9ukF+m+qVVkV2okbnVfYT8pfsI6UXt6tH7AvvfWO5tB4pkyKcZz2ezp2
ZIsZDc9MOa8mpEcTz51Kvw28aioXtLElhKrKucW5+3h/WqWpV+ElJsgxZmAU
i6ncfGMp9uXoWmE3eaXjeW5TOzM4hJTaS1DQJt8rfiWKbbax6rnJCpvI0Y0p
VLaelfNwpHj4+xkN8mSR2yLDtjesIKhkuAPJjg+e7ew9DwO7sF7/MGpZHOfq
F9P45d7e84lx9bzjy48/Hp0/+jIpYqc/Lew3nQth8ml700+fTw+wAG/7ant7
iKHD83E98nJ3uI2Ri08H9C7Mo4qZLvflvCwXbn8wWC6XUW5cGc3szSBewb9c
8J3Bcq7K/sK6sv+3SuVllfXjYrUo7axQi/mKV2NPlFujaoYg6cmd7Z29Lb+N
D6UfsIQ8dfKCVvnkV5EHrVXe0OkvTy/OjsYno/dHj8uYYTFHDjNYqJl2A1WW
Kr52g12e097vqjCLVMsTlSdurq61kwdwS5PoQicYLTIYWr5FjLBv4i15bG7p
5wgupvMyOLK0N7rwcSAvj86P3g3327t8zrGgKzGdpmIix8KlzhH4pfErjFhG
nlW7r+R/3s2O4O6Y4WJbpOpxw+hJpIp4Divz0fH3YGd7+9VwBxbd3XuxvT2g
V4MJdVIR8CSzSjtHMc9z6P3BcDio2gL/BIF/gkJ/KoLA0bzM0vqkO52Tbqjl
nVpQyD847SPH7IeDflCFm8tLtfqVh9x5uf18iAipD6lvS41TJABGp0uKvcGb
xX+8xKpnnw/ef0GUteXeOqvi65W8mpui1BqQ0Ni8thbZ/pB+FBo2SOSixvut
B4IGFRs3i4p5lUYqjqrrATQ4wPzSZFg2WiTTR5VgcsDzeST/GMlRKo9Vkai8
+/B9JN9F8gLGKxxrMpzn+PTP3SONV67UFPYx4Orbt9qBkV1K+m2nfK7UTApV
APEenoMUjriIimoSJXqQ6cQoGhjA2a2eTmFoIPm8ymc6hxWGzwfD7cHwFZ20
70NOF/04dsPnTxzXW/yPVaG+yrHNbGFv3DUZ/uDtwfhgdH5+ev6uc6ZxrFI1
QcDiR57XJ4LTWX/Og1QhB06bqPRHvFAJB97HQsWY+6cqzXWhJiY1pUf6x1EO
GSU3t+xmjlU5mJoUaAK8G77qZ5pmPGnHkHIs8LGUH/jdjWePHLv9eDOvtJ8d
FMrM5BcLzW8uiqzm5HFqNGzi4nlmkgf7/s9//vO/ixlUOF/q/Hrj6ZfqRqVy
PEfiKmnm26PR+KrrVycAR4l40hwbt7ZAssu/qqcDYb6I40jHLnIImTyEA/x6
UKoUqDxBLi2qfPBWK/dzCr2aI08fVvbhwavUqNwiyX/7ZvHsh6PR+8OTruCn
2UIXUx2XEvlwidCSMCXCGdTrxC7loZlOje6f6DTNVC6nSNmO0GsBt4Fz6ccD
JKH4zthLEmsGEB9REA2He88GOy+H24DeCP/vvth+8XS8HyLYk8I8Eulv59hO
3Ww++TGCEooKPmji7pMLoIOqkmLVHf6A4QLA1h0lkIlOVAqwzza3AAadaAox
XTwQdrwo8EClaffJUQT72Az+9Y/ug7NI/kmlgAvVHX9L45Rqxqm15G3HlzBb
12gjmSFDrSSyUakposnpqpx525XKaoiGP4J5GLziX8wUkkSOfO4x4HHbmRxK
j+YqjVxsdB7rAX73t4ew3s6zbQ73Ae/e50X7Fuxqrvu8e9+q6xTCD5/9jMu+
1QgOyIkfVZHYKp7rjTfeq6KcGzBqeN1Dg/t3RnlpcR55qFMzy8GzzvBSlWwC
A+k+IapwbKsif4A5SK7XVTqV7+08XWrUC5u7pFMQHysvTIFCwmw8vTC6QM3x
5QZqHaOEmGzGoMYBcBiTyR9NjoST2Lmt6LTjs49XG8F4VSgAFOhXCdulqaHS
RQai1kq/qksoPJnoydP3Rz3G/vH45NfZdmdv7+WzZ962LNZP54fj8ZMp6tfY
6J2C+v8LrEmewdSQWoh+vy/VxJUEIUL4YnBHGsYV5Bc+AlKZnJAH51Mzq4h4
OjgJvBpU2JRENG5ASJ2cWcuIxWRbYBhoRgksqotMXpHXBqopqrm8jqbmFtMd
IfZ1bpe5TDRSJCmF0t8SBRVTV0jW81srB5aTYVsYACa3RR+7wfladB4uBhAA
0TbkDbQLlqPHmCOQ0ppQxdEBqzG2b04EEXNbYguVcDKfrKStSmbdLhLHSCiY
iKPQIcDGezJHfd3wLZlRfR0KYNpZIOdXIRvpW5QmZO0690MtkRg5T91IR2Hz
JXZLVxJWNJ5RYNdEL1K70klPwNQOO2rvoOR4idV+IildwXql9Wv+Fr9VvvJ/
gBiRH//uNRvOv+nwKlve5ukqghPQ2qjrIXJeylDvcy2Gij/yLoO0naRaiO/k
aV6CBlQxC3H3HczfD2q5X/vT3R0XhPf3v9yzxKZnidqzZNuzkBc1DtWTQSPe
BvU5sRxYYOEkKs0MrolhlYq2d+0LuBWqOkSbVOvCX6ZqhYKp9g0srdKlWrna
iWADmaEErJ1oXtdnguCYajqpYHzYg1IO+AgSuu7xq/DKGxWv6sMltDhqAAsz
ZgADr37acH0a4GClvXcSrYSRoTRwRtjfYQG4Z61BFh422uFtwZ29iE/GhVvo
GHQUi0y9Vzeb9uTEIu5MTo0LsRFKcETQEirP4DQaAYCITiuyVNBxew+WG3xN
iwkSPM7lAP0IAOwobrpUF+8WtpoBlEsWZqVRbK1j/nI8kkA4BFEMhc+gUPBw
GZsFNIyXkFxdT5B8OARCJpQWJseDPg6ZJpsUivs/slX3kfo1gxQ07qDWCpM6
yg4SBifsKv61nAd3FPoWTxnWpcNg0ELnbQQRsvZ1cBXwg8zmPanZJKAuK7lE
YhE+5gno2r2KSIy1RlhRuMWhIeA7VogxMqUGaNjGHXa9O0yUWxu4hRjeExvo
lmpGsFAyIgtqfzFLCblP/tY9ufXvXgsuayn2/LECDCYER2GfJpCjGiB2A0Ds
eoBQKbDY5IIg0C0IhRvA8JmCI+9hppB1ppDtTCHWuC//D7jPQN4kHZbgyaiK
1y2ahPwUHgOoAru3AFzUpKteyGe7wJOvFrACf6Wk0YY4O/Wx1oAgvB5uS5jc
vEYHhoSC8J1qSDIDgm8TDbqIXse890noyZCXbqTote43spvYzG4yZDdTunV2
i8TpOnXc3YXkAfMiihPOWhNCPmSMu2Ia07N+ePv+/v9ZOvyOOm43RPHYp6nL
ohlT6G/SrWZMomazk1sfPo+vtnr+f3n+kX9fHn36fHp5dEi/xyejs7Pmhwhv
jE8+fj47XP9azzz4+OHD0fmhn4xR2RkSWx9GX7Y8idr6eHF1+vF8dLZFei07
JqdIhAIAZCYvdQFNEXQjNjq2eHtw8c+/D/dgk9/AYDvD4SsYzP/xcvhiD38Q
IvndSDnhTwTTSiB3AqtpFUAXstTCoHYGdMPehH+5pCQIbf77X0gzf92Xv5/E
i+HeH8IAHbgzWOusM8g6ezjyYLJX4iNDj2zTaLMzvqHprryjL52/a723Bn//
JqVaqD98+eYPgllStr5TYHxud6E7yC7EQRtWKBGAUKUabL6UzQQUkxX113ow
BIK3CYseAgVVL2VbJNp5NYPFswW4Pd7jEA+oh3xgJcHVjGpRcpaebyK27j4E
LYXg9+CdGUhUshs9Kbv8y8Wng7/CykSR+TaFMdXUwEeTEZOByhAIT+GhLiAy
gEdPoZuS6U+If4GVUmolerfjiTWr9PJ5NuSqBW0CWUN6at1AIC+taRWVCZwG
PEtlY3TpO4REVlFVyvIGOXrk7AWI0JNnNwR/gNbS66stE6MILfTZcVL5WBJh
WV/IcY+wrXkxAkK1pfIHBzZ7xXDIeBxfUYgR9tYyN0UFGUHfKnge3ILuVKCV
cLWCUA4I3iiaheimBiSnZIGivnSCN4QVMpN7h2HSnmtP+w3IQS4ttWka5g11
QFw6+uk0IDVDUZcyMDIpGox1kfc6DFQi0JpD1jYHZmGrda5DdrJ5vz67XfiM
N3K8aEVgt9YBLf6ZyDmpnuprNv7h+bi5HYGG/E0TFNToQqz35iXCZuQRXDUQ
W0GY2mV9h9hoHxYkYuoXqqPfE8G5tY6DKTjJmrYgozNL0yhcKJWyjoT3qILI
pdcq5R3OQsj3NLepQLwsrIDUaB90tRYhMThRMBHFnahvD9a1RlmL5ELEETEs
SEFcu/lLC4YBE1/74sfMEL2lqE1f0ynWTL3YOgI9cQvK3Gql4TYR720x4coo
VXduARq2qiQKMrZgG7Tap6X1C+JfAgBTHzoSPyBr8bPRxWmtLANzenU5GVJF
vcpX4jv0OnzfZIj69TGR95ZAgnA0jpHJmkkFDGSjIgC0v1zzE1G0FMjNdINF
Fm7SsDD+Mcg7EHyhCsXo4jwP4aKHj4iUzBfwqLg3+ZMQzcOGOtKVUIbwS1oZ
iG7ai7o72TBKO21olSCzm7gGAyKG4Z6pJ6s8Nde6yzJ6nlPBsEvwVARh6Z+j
riV2CHPBeNUENemcymeMrNlHSGBUBq5anRGBKVub1C/a4mKmpP4co4BnoYkP
fpl5quYpDXcSWMCcQmGO9VDzLfM6m7RJEtxSZlyPlUs4UcZExqucwo+9aUOP
TGADue3JcYDD3WgYDe/v94Xo030A83V+4KiD0Ephu7WvtZPF6w2xaJLgSQ9T
FXRYe1072fzMtjsPJz22adOGIRzupNgOiWdXxaYjKhp7IZEHvXmaSPG5CrnU
K56SNjkLu3X9aUdzsx2U65tJGyXmuqdE7rRuX3DpVzcf/mUbEJKbWU4ITL4t
mu5Ez2cB8lZAu4YjsA+VrgkOX0QvqmJBCM2kxbhGy4YLhwkwaorTIrZuUBXU
EnEtCrsBQ0i9oT/R6o1I0LLAHVopkMso8OfQhSDuhMiZr3teLZs+0ksjuRE6
rz0PE5mmv2RGsjAFSqgbEgei00zkFBCmkqntgs7LkF/xdzLQicgsbEL9tRhK
dLboNZlP+s7Eb9Y1H2O035E619w+mVWE4R4MfUNAt1lCAwE7xCZN4bhorpMV
HXfdpwpFMFd1TfdBeuLSI7PUTaaUEq4oOl81bDQ1/LcRVKfCU8KfO+CPss6F
YvODjLBCQzvXn34w7XxbWJUE2V39sqP2UGpN2TH2v7mGDJDGunICaVBgkn9S
a+Qr3REqJgnmVsTEGHIilpw6wsU25WqPWotUUd6+hVlLsN6M/Nin4spV3GlS
0P2Nojsk6o6Xc7xVtm8Wg6uFZKmjWSTthIplcge+oyRiZ68pP1MJiPiZYLyk
5eDDOdL3bF7WfCMktxADPWjtDX1g9GLveZt2EaVcm5P3XxD/oRRNgdd8l9bq
TXFZ0/iu96d1EtaGeXdXsdzOmGiRGEceQtcEpaHpPckdUab1tRThZc9s5ahh
ofR2TR/oHUEAx9oK3ImT9nrjwKCpic3EEL7vc7Fq0Wp4PqDR5rX7QB4zM9Tf
afdAke/g/sm/buXS9U+6Epv909BSo/6ofKw/2gv98277nLAxp2Yo1D0GtKaq
YAkfar4rhI+A9v6ilr3Wa22Eur355pFPx5rec99OnE01flzr2wAziS7pVtz3
vArWnFshY5d05egbxS6w4CV9JeC5BbW4A114qDV5ebDHTeWHvebH1CPb6sHU
zhVEHfe+u2iU8/FCSYb04sPztfRQQkGBmACCRg/3fqyhTiz3F/TT4bi0k6KQ
DN8ZCEMVEiFv811KyOOdPU1ONTA1MLsXK7Q0f5803JX+8yERUPHuLnz8Q4eg
7DklLKdw1dmC006zc6DF3f34m1DfOmAWGS6biHYAHQAGPq2w7nXn9Kv13sen
f6auIt/D+GTLeptWBeOB8z78M7oTrDsZDEix+sAmryUXbXQqhsi7u9ZnQvf3
gvNgXtejnrXWRAEar+Wgj93Ig0d4niqf+QBDJcKf20HdIploUMMdJmvGYfls
dXpjKtdqqZosq3JKh/uCP6CBrPz//X1PntnZV5VhxH+iQkP82QNG+H8a4Jtt
upzGIP9PCqY+1+h89JDHGZWr+802tKfaueVOBMpHhkiaH64YJ/S14f8CvLAo
0sUsAAA=

-->

</rfc>
