<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-westerlund-tsvwg-sctp-dtls-handshake-05" category="std" consensus="true" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.29.0 -->
  <front>
    <title abbrev="DTLS in SCTP">Datagram Transport Layer Security (DTLS) based key-management of the Stream Control Transmission Protocol (SCTP) DTLS Chunk</title>
    <seriesInfo name="Internet-Draft" value="draft-westerlund-tsvwg-sctp-dtls-handshake-05"/>
    <author initials="M." surname="Westerlund" fullname="Magnus Westerlund">
      <organization>Ericsson</organization>
      <address>
        <email>magnus.westerlund@ericsson.com</email>
      </address>
    </author>
    <author initials="J." surname="Preuß Mattsson" fullname="John Preuß Mattsson">
      <organization>Ericsson</organization>
      <address>
        <email>john.mattsson@ericsson.com</email>
      </address>
    </author>
    <author initials="C." surname="Porfiri" fullname="Claudio Porfiri">
      <organization>Ericsson</organization>
      <address>
        <email>claudio.porfiri@ericsson.com</email>
      </address>
    </author>
    <date year="2025" month="July" day="07"/>
    <area>Transport</area>
    <workgroup>TSVWG</workgroup>
    <abstract>
      <?line 100?>

<t>This document defines a key-management solution based on Datagram
Transport Layer Security 1.3 (DTLS) to protect the content of Stream
Control Transmission Protocol (SCTP) packets using the packet
protection framework provided by the SCTP DTLS chunk. The combination
provides encryption, source authentication, integrity and replay
protection for the SCTP association with in-band DTLS based
key-management and mutual authentication of the peers. The
specification is enabling very long-lived sessions of weeks and months
and supports mutual re-authentication and rekeying with ephemeral key
exchange. The key-management solution does not require any additional
defined features or implementation support beyond core DTLS 1.3. This
is intended as a replacement to using DTLS/SCTP (RFC6083) and
SCTP-AUTH (RFC4895).</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-westerlund-tsvwg-sctp-dtls-handshake/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Transport Area Working Group (tsvwg) Working Group mailing list (<eref target="mailto:tsvwg@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tsvwg/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tsvwg/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/gloinul/draft-westerlund-tsvwg-sctp-dtls-handshake"/>.</t>
    </note>
  </front>
  <middle>
    <?line 116?>

<section anchor="introduction">
      <name>Introduction</name>
      <section anchor="overview">
        <name>Overview</name>
        <t>This document describes the usage of the Datagram Transport Layer
   Security version 1.3 (DTLS) <xref target="RFC9147"/> protocol for key-management
   of the SCTP DTLS Chunk packet protection
   <xref target="I-D.westerlund-tsvwg-sctp-dtls-chunk"/> securing Stream Control
   Transmission Protocol (SCTP) <xref target="RFC9260"/>.  This combination of
   specifications is intended as a replacement to DTLS/SCTP
   <xref target="RFC6083"/> and usage of SCTP-AUTH <xref target="RFC4895"/>. The combination of
   SCTP DTLS Chunk and the key-management defined in this document we
   refer to as DTLS in SCTP.</t>
        <t>DTLS in SCTP provides mutual authentication of endpoints, data
   confidentiality, data origin authentication, data integrity
   protection, and data replay protection of SCTP packets. Ensuring
   these security services to the application and its upper layer
   protocol over SCTP.  Thus, it allows client/server applications to
   communicate in a way that is designed with communications privacy
   and preventing eavesdropping and detect tampering or message
   forgery.</t>
        <t>Applications using DTLS in SCTP can use all currently existing
   transport features provided by SCTP and its extensions, in some
   cases with some limitations, as specified in
   <xref target="I-D.westerlund-tsvwg-sctp-dtls-chunk"/>. DTLS in SCTP supports:</t>
        <ul spacing="normal">
          <li>
            <t>preservation of message boundaries.</t>
          </li>
          <li>
            <t>no limitation on number of unidirectional and bidirectional streams.</t>
          </li>
          <li>
            <t>ordered and unordered delivery of SCTP user messages.</t>
          </li>
          <li>
            <t>the partial reliability extension as defined in <xref target="RFC3758"/>.</t>
          </li>
          <li>
            <t>multi-homing of the SCTP association per <xref target="RFC9260"/>.</t>
          </li>
          <li>
            <t>the dynamic address reconfiguration extension as defined in
 <xref target="RFC5061"/> (Limitations apply).</t>
          </li>
          <li>
            <t>User messages of any size.</t>
          </li>
          <li>
            <t>SCTP Packets with a protected set of chunks up to a size of
2<sup>14</sup> (16384) bytes.</t>
          </li>
        </ul>
        <t>The main benefit of this key-management solution over the solution
   proposed by the WG is that this does not require any extensions to
   DTLS 1.3 to be implemented. It solely relies on the core DTLS
   handshake to do mutual authentication, creates a main secret, and
   then relies on the TLS exporter to export necessary secrets for the
   DTLS Chunk.</t>
      </section>
      <section anchor="protocol_overview">
        <name>Protocol Overview</name>
        <t>DTLS in SCTP is a key management specification for the SCTP DTLS
   1.3 chunk <xref target="I-D.westerlund-tsvwg-sctp-dtls-chunk"/> that together
   utilizes DTLS 1.3 for the security functions like key
   exchange, authentication, encryption, integrity protection, and
   replay protection. All key management message exchange happens
   inband over the SCTP assocation.</t>
        <t>In this document we use the terms DTLS Key context for indicating
   the pair of keys, derived from a DTLS connection, and all relevant
   data that needs to be provided to the SCTP DTLS Chunk Protection
   Operator for DTLS encryption and decryption.  DTLS Key context
   includes Keys for sending and receiving, replay window, and last used
   sequence number. Each DTLS key context is associated with a four
   value tuple identifying the context, consisting of SCTP
   Association, the restart indicator, the DTLS Connection ID (if
   used), and the DTLS epoch.</t>
        <t>The basic functionalities and how things are related is described
   below.</t>
        <t>The process starts with a SCTP association where DTLS 1.3 Chunk
   usage has been negotiated and this key-management method has been
   agreed in the SCTP INIT and INIT-ACK. To initialize and authenticate
   the peer the DTLS handshake is exchanged as SCTP user messages with
   the DTLS Chunk Key-Management Messages PPID (see section 10.6 of
   <xref target="I-D.westerlund-tsvwg-sctp-dtls-chunk"/>) until an initial DTLS
   connection has been established.  If the DTLS handshake fails, the
   SCTP association is aborted. With successful handshake and
   authentication of the peer the key material exported from the DTLS
   connection and configured for the DTLS 1.3 chunk. From that point
   until SCTP association termination the DTLS chunk will protect the
   SCTP packets. When the DTLS connection has been established and the
   DTLS Chunk configured with DTLS Key context the PVALID message is
   exchanged to verify that no downgrade attack between any offered
   protection solutions has occurred. To prevent manipulation, the
   PVALID message are sent as SCTP user messages (using DATA chunks)
   encapsulated in DTLS chunks.</t>
        <t>Assuming that the PVALID validation is successful the SCTP
   association is established and the Upper Layer Protocol (ULP) can
   start sending messages over the SCTP association. All chunks are
   protected by encapsulating them in DTLS chunks as defined in
   <xref target="I-D.westerlund-tsvwg-sctp-dtls-chunk"/>.  Using the current DTLS
   Key context the DTLS Chunk Protection operator protects the plain
   text, which is all chunks to be sent in one SCTP packet, producing
   a DTLS Record that is encapsulated in the DTLS chunk and then
   transmitted as a SCTP packet with a common header.</t>
        <t>The DTLS Chunk specifies that in the receiving SCTP endpoint each
   incoming SCTP packet on any of its interfaces and ports are matched
   to the SCTP association based on ports and VTAG in the common
   header. Using the indicated DTLS Key context(s) for that SCTP
   association the content of the DTLS chunk is attempted to be
   processed, including replay protection, decryption, and integrity
   checking. And if decryption and integrity verification was
   successful the produced plain text of one or more SCTP chunks are
   provided for normal SCTP processing in the identified SCTP
   association along with associated per-packet meta data such as path
   received on, original packet size, and ECN bits.</t>
        <t>When mutual re-authentication or rekeying is needed or desired by
   either endpoint a new DTLS connection handshake is performed
   between the SCTP endpoints and a new DTLS Key context is
   created. When the handshake has completed the DTLS in SCTP
   implementation can simply switch to use the new DTLS Key contexts
   in the DTLS chunk.  All rekeying will be using ephemeral key
   exchange and shall not use the DTLS Key-Update mechanism to avoid
   confusion about the properties of the DTLS Key Contexts for the
   DTLS chunk.  After a short while (no longer than 2 min) to enable
   any outstanding packets to drain from the network path between the
   endpoints, the old key-management DTLS connection is closed and
   that signal that the corresponding key context can be deleted from
   the DTLS chunk's key store.</t>
        <t>The DTLS connection may send alerts, handshake messages, or
   other non-application data to its peer at any point in time.
   All DTLS message will be sent by means of SCTP user messages
   with the DTLS Chunk Key-Management Messages PPID as specified in
   <xref target="I-D.westerlund-tsvwg-sctp-dtls-chunk"/>. However, only the
   DTLS close_notify is expected to be used after the handshake has
   been completed in this solution.</t>
        <figure anchor="overview-layering">
          <name>DTLS in SCTP layer in regard to SCTP and upper layer protocol</name>
          <artset>
            <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="352" width="496" viewBox="0 0 496 352" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,336" fill="none" stroke="black"/>
                <path d="M 136,32 L 136,96" fill="none" stroke="black"/>
                <path d="M 152,32 L 152,96" fill="none" stroke="black"/>
                <path d="M 184,96 L 184,336" fill="none" stroke="black"/>
                <path d="M 224,208 L 224,272" fill="none" stroke="black"/>
                <path d="M 320,32 L 320,96" fill="none" stroke="black"/>
                <path d="M 400,208 L 400,272" fill="none" stroke="black"/>
                <path d="M 440,80 L 440,224" fill="none" stroke="black"/>
                <path d="M 8,32 L 136,32" fill="none" stroke="black"/>
                <path d="M 152,32 L 320,32" fill="none" stroke="black"/>
                <path d="M 320,64 L 424,64" fill="none" stroke="black"/>
                <path d="M 8,96 L 320,96" fill="none" stroke="black"/>
                <path d="M 424,96 L 456,96" fill="none" stroke="black"/>
                <path d="M 336,128 L 352,128" fill="none" stroke="black"/>
                <path d="M 200,176 L 216,176" fill="none" stroke="black"/>
                <path d="M 8,208 L 184,208" fill="none" stroke="black"/>
                <path d="M 224,208 L 400,208" fill="none" stroke="black"/>
                <path d="M 192,240 L 216,240" fill="none" stroke="black"/>
                <path d="M 408,240 L 424,240" fill="none" stroke="black"/>
                <path d="M 8,272 L 184,272" fill="none" stroke="black"/>
                <path d="M 224,272 L 400,272" fill="none" stroke="black"/>
                <path d="M 200,304 L 216,304" fill="none" stroke="black"/>
                <path d="M 8,336 L 184,336" fill="none" stroke="black"/>
                <path d="M 184,272 L 200,304" fill="none" stroke="black"/>
                <path d="M 320,96 L 336,128" fill="none" stroke="black"/>
                <path d="M 184,208 L 200,176" fill="none" stroke="black"/>
                <path d="M 424,64 C 432.83064,64 440,71.16936 440,80" fill="none" stroke="black"/>
                <path d="M 424,240 C 432.83064,240 440,232.83064 440,224" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="416,240 404,234.4 404,245.6" fill="black" transform="rotate(180,408,240)"/>
                <polygon class="arrowhead" points="224,240 212,234.4 212,245.6" fill="black" transform="rotate(0,216,240)"/>
                <polygon class="arrowhead" points="200,240 188,234.4 188,245.6" fill="black" transform="rotate(180,192,240)"/>
                <g class="text">
                  <text x="228" y="52">DTLS</text>
                  <text x="264" y="52">1.3</text>
                  <text x="356" y="52">Keys</text>
                  <text x="72" y="68">ULP</text>
                  <text x="192" y="84">Key</text>
                  <text x="252" y="84">Management</text>
                  <text x="480" y="100">API</text>
                  <text x="380" y="116">User</text>
                  <text x="384" y="132">Level</text>
                  <text x="36" y="148">SCTP</text>
                  <text x="84" y="148">Chunks</text>
                  <text x="144" y="148">Handler</text>
                  <text x="396" y="148">Messages</text>
                  <text x="244" y="180">SCTP</text>
                  <text x="312" y="180">Unprotected</text>
                  <text x="392" y="180">Payload</text>
                  <text x="92" y="228">DTLS</text>
                  <text x="300" y="228">DTLS</text>
                  <text x="336" y="228">1.3</text>
                  <text x="96" y="244">Chunk</text>
                  <text x="96" y="260">Handler</text>
                  <text x="276" y="260">Protection</text>
                  <text x="356" y="260">Operator</text>
                  <text x="36" y="308">SCTP</text>
                  <text x="84" y="308">Header</text>
                  <text x="144" y="308">Handler</text>
                  <text x="244" y="308">SCTP</text>
                  <text x="304" y="308">Protected</text>
                  <text x="376" y="308">Payload</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art"><![CDATA[
+---------------+ +--------------------+
|               | |       DTLS 1.3     |  Keys
|      ULP      | |                    +-------------.
|               | |   Key Management   |              |
+---------------+-+---+----------------+            --+-- API
|                     |                 \    User     |
|                     |                  +-- Level    |
| SCTP Chunks Handler |                      Messages |
|                     |                               |
|                     | +-- SCTP Unprotected Payload  |
|                     |/                              |
+---------------------+    +---------------------+    |
|        DTLS         |    |       DTLS 1.3      |    |
|        Chunk        |<-->|                     |<--'
|       Handler       |    | Protection Operator |
+---------------------+    +---------------------+
|                     |\
| SCTP Header Handler | +-- SCTP Protected Payload
|                     |
+---------------------+
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="properties-of-dtls-in-sctp">
        <name>Properties of DTLS in SCTP</name>
        <t>DTLS in SCTP (as the combination of the DTLS chunk and the in-band
   authentication and key-management using DTLS handshakes defined in
   this document) has a number of properties that are attractive.</t>
        <ul spacing="normal">
          <li>
            <t>Provides confidentiality, integrity protection, and source
authentication for each SCTP packet.</t>
          </li>
          <li>
            <t>Provides replay protection on SCTP packet level preventing
malicious replay attacks on SCTP, both protecting the data as well
as the SCTP functions themselves.</t>
          </li>
          <li>
            <t>Provides mutual authentication of the endpoints based on any
authentication mechanism supported by DTLS.</t>
          </li>
          <li>
            <t>Uses parallel DTLS connections to enable mutual re-authentication
and rekeying with ephemeral key-exchange. Thus, enabling SCTP
association lifetimes without known limitations and without
needing to drain the SCTP association.</t>
          </li>
          <li>
            <t>Uses core of DTLS as it is and updates and fixes to DTLS security
properties; can be implemented without further changes to this
specification.</t>
          </li>
          <li>
            <t>No reliance on DTLS implementation used for key-management having
to support any features beyond core DTLS specification and the
TLS exporter.</t>
          </li>
          <li>
            <t>Secures all SCTP packets exchanged after SCTP association has
reached the established state and the initial key-exchange has
completed. Making targeted attacks against the SCTP protocol and
implementation much harder.</t>
          </li>
          <li>
            <t>DTLS in SCTP results in no limitations on user message
transmission or message sizes, those properties are the same as
for an unprotected SCTP association.</t>
          </li>
          <li>
            <t>Limited overhead on a per packet basis, with 4 bytes for the
DTLS chunk plus the DTLS record overhead. The DTLS
overhead is dependent on the DTLS version and cipher suit.</t>
          </li>
          <li>
            <t>Support of SCTP packet plain text payload sizes up to
2<sup>14</sup> bytes.</t>
          </li>
        </ul>
      </section>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>This document uses the following terms:</t>
        <dl>
          <dt>Association:</dt>
          <dd>
            <t>An SCTP association.</t>
          </dd>
          <dt>Connection:</dt>
          <dd>
            <t>A DTLS connection.</t>
          </dd>
          <dt>DTLS Key context:</dt>
          <dd>
            <t>Keys, derived from a DTLS connection, and all relevant data that needs
   to be provided to the SCTP DTLS Chunk.
   Each DTLS key context is associated with a four value
   tuple identifying the context, consisting of SCTP Association, the
   restart indicator, the DTLS Connection ID (if used), and the DTLS
   epoch</t>
          </dd>
          <dt>Restart DTLS Key context:</dt>
          <dd>
            <t>A DTLS Key context to be
used for an SCTP Association Restart</t>
          </dd>
          <dt>Stream:</dt>
          <dd>
            <t>A unidirectional stream of an SCTP association.  It is
   uniquely identified by a stream identifier.</t>
          </dd>
          <dt>Traffic DTLS Key context:</dt>
          <dd>
            <t>A DTLS Key context used to
    protect the regular SCTP traffic, i.e. not a restart DTLS Key context.</t>
          </dd>
        </dl>
      </section>
      <section anchor="abbreviations">
        <name>Abbreviations</name>
        <dl>
          <dt>AEAD:</dt>
          <dd>
            <t>Authenticated Encryption with Associated Data</t>
          </dd>
          <dt>DKC:</dt>
          <dd>
            <t>DTLS Key Context</t>
          </dd>
          <dt>DTLS:</dt>
          <dd>
            <t>Datagram Transport Layer Security</t>
          </dd>
          <dt>MTU:</dt>
          <dd>
            <t>Maximum Transmission Unit</t>
          </dd>
          <dt>PPID:</dt>
          <dd>
            <t>Payload Protocol Identifier</t>
          </dd>
          <dt>SCTP:</dt>
          <dd>
            <t>Stream Control Transmission Protocol</t>
          </dd>
          <dt>ULP:</dt>
          <dd>
            <t>Upper Layer Protocol</t>
          </dd>
        </dl>
      </section>
      <section anchor="conventions">
        <name>Conventions</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
<?line -6?>
        </t>
      </section>
    </section>
    <section anchor="dtls-usage-of-dtls-chunk">
      <name>DTLS usage of DTLS Chunk</name>
      <t>DTLS in SCTP uses the DTLS chunk as specified in
   <xref target="I-D.westerlund-tsvwg-sctp-dtls-chunk"/>. The chunk if just
   repeated here for the reader's convenience.</t>
      <figure anchor="sctp-dtls-chunk-structure">
        <name>DTLS Chunk Structure</name>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="208" width="528" viewBox="0 0 528 208" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,64 L 8,192" fill="none" stroke="black"/>
              <path d="M 136,64 L 136,96" fill="none" stroke="black"/>
              <path d="M 248,64 L 248,96" fill="none" stroke="black"/>
              <path d="M 264,64 L 264,96" fill="none" stroke="black"/>
              <path d="M 264,160 L 264,192" fill="none" stroke="black"/>
              <path d="M 520,64 L 520,192" fill="none" stroke="black"/>
              <path d="M 8,64 L 520,64" fill="none" stroke="black"/>
              <path d="M 8,96 L 520,96" fill="none" stroke="black"/>
              <path d="M 264,160 L 520,160" fill="none" stroke="black"/>
              <path d="M 8,192 L 520,192" fill="none" stroke="black"/>
              <g class="text">
                <text x="16" y="36">0</text>
                <text x="176" y="36">1</text>
                <text x="336" y="36">2</text>
                <text x="496" y="36">3</text>
                <text x="16" y="52">0</text>
                <text x="32" y="52">1</text>
                <text x="48" y="52">2</text>
                <text x="64" y="52">3</text>
                <text x="80" y="52">4</text>
                <text x="96" y="52">5</text>
                <text x="112" y="52">6</text>
                <text x="128" y="52">7</text>
                <text x="144" y="52">8</text>
                <text x="160" y="52">9</text>
                <text x="176" y="52">0</text>
                <text x="192" y="52">1</text>
                <text x="208" y="52">2</text>
                <text x="224" y="52">3</text>
                <text x="240" y="52">4</text>
                <text x="256" y="52">5</text>
                <text x="272" y="52">6</text>
                <text x="288" y="52">7</text>
                <text x="304" y="52">8</text>
                <text x="320" y="52">9</text>
                <text x="336" y="52">0</text>
                <text x="352" y="52">1</text>
                <text x="368" y="52">2</text>
                <text x="384" y="52">3</text>
                <text x="400" y="52">4</text>
                <text x="416" y="52">5</text>
                <text x="432" y="52">6</text>
                <text x="448" y="52">7</text>
                <text x="464" y="52">8</text>
                <text x="480" y="52">9</text>
                <text x="496" y="52">0</text>
                <text x="512" y="52">1</text>
                <text x="36" y="84">Type</text>
                <text x="64" y="84">=</text>
                <text x="92" y="84">0x4x</text>
                <text x="172" y="84">reserved</text>
                <text x="256" y="84">R</text>
                <text x="360" y="84">Chunk</text>
                <text x="412" y="84">Length</text>
                <text x="264" y="132">Payload</text>
                <text x="384" y="180">Padding</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type = 0x4x   |reserved     |R|         Chunk Length          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
|                            Payload                            |
|                                                               |
|                               +-------------------------------+
|                               |           Padding             |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </artset>
      </figure>
      <dl>
        <dt>Type: 8 bits</dt>
        <dd>
          <t>The Chunk Type indicate that this is the DTLS chunk.</t>
        </dd>
        <dt>reserved: 7 bits</dt>
        <dd>
          <t>Reserved bits for future use. Sender MUST set these bits to 0 and
MUST be ignored on reception.</t>
        </dd>
        <dt>R: 1 bit (boolean)</dt>
        <dd>
          <t>Restart indicator. If this bit is set this DTLS chunk is protected
with by a Restart DTLS Key context.</t>
        </dd>
        <dt>Chunk Length: 16 bits (unsigned integer)</dt>
        <dd>
          <t>This value holds the length of the Payload in bytes plus 4.</t>
        </dd>
        <dt>Payload: variable length</dt>
        <dd>
          <t>This holds the encrypted data as one DTLS 1.3 Record <xref target="RFC9147"/>.</t>
        </dd>
        <dt>Padding: 0, 8, 16, or 24 bits</dt>
        <dd>
          <t>To ensure the Chunk is whole 32-bit words long.</t>
        </dd>
      </dl>
    </section>
    <section anchor="dtls-user-message">
      <name>DTLS messages over SCTP User Messages</name>
      <t>DTLS messages for the Handshake DTLS connection, i.e. that are not
DTLS records containing protected SCTP chunk payloads, will be sent as
SCTP user messages using the format defined below. A DTLS handshake
message may be fragmented by DTLS to a set of DTLS records of a
maximum configured fragment size. Each DTLS message fragment is sent
as a SCTP user message on the same stream where each message is
configured for reliable and in-order delivery with the PPID set to
DTLS Chunk Key-Management Messages
<xref target="I-D.westerlund-tsvwg-sctp-dtls-chunk"/>. These user messages MAY
contain one or more DTLS records. The SCTP stream ID used MAY be any
stream ID that the ULP already uses, and if not know Stream 0. Note
that all fragments of a handshake message MUST be sent with the same
stream ID to ensure the in-order delivery.</t>
      <t>The DTLS instance SHOULD NOT use DTLS retransmission to repair any
packet losses of handshake message fragment. Note: If the DTLS
implementation supports configuring a MTU larger than the actual IP
MTU it MAY be used as SCTP provides reliability and fragmentation.</t>
      <figure anchor="sctp-dtls-user-message">
        <name>DTLS User Message Structure</name>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="208" width="528" viewBox="0 0 528 208" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,64 L 8,192" fill="none" stroke="black"/>
              <path d="M 104,64 L 104,96" fill="none" stroke="black"/>
              <path d="M 136,64 L 136,96" fill="none" stroke="black"/>
              <path d="M 264,160 L 264,192" fill="none" stroke="black"/>
              <path d="M 520,64 L 520,160" fill="none" stroke="black"/>
              <path d="M 8,64 L 520,64" fill="none" stroke="black"/>
              <path d="M 8,96 L 136,96" fill="none" stroke="black"/>
              <path d="M 264,160 L 520,160" fill="none" stroke="black"/>
              <path d="M 8,192 L 264,192" fill="none" stroke="black"/>
              <g class="text">
                <text x="16" y="36">0</text>
                <text x="176" y="36">1</text>
                <text x="336" y="36">2</text>
                <text x="496" y="36">3</text>
                <text x="16" y="52">0</text>
                <text x="32" y="52">1</text>
                <text x="48" y="52">2</text>
                <text x="64" y="52">3</text>
                <text x="80" y="52">4</text>
                <text x="96" y="52">5</text>
                <text x="112" y="52">6</text>
                <text x="128" y="52">7</text>
                <text x="144" y="52">8</text>
                <text x="160" y="52">9</text>
                <text x="176" y="52">0</text>
                <text x="192" y="52">1</text>
                <text x="208" y="52">2</text>
                <text x="224" y="52">3</text>
                <text x="240" y="52">4</text>
                <text x="256" y="52">5</text>
                <text x="272" y="52">6</text>
                <text x="288" y="52">7</text>
                <text x="304" y="52">8</text>
                <text x="320" y="52">9</text>
                <text x="336" y="52">0</text>
                <text x="352" y="52">1</text>
                <text x="368" y="52">2</text>
                <text x="384" y="52">3</text>
                <text x="400" y="52">4</text>
                <text x="416" y="52">5</text>
                <text x="432" y="52">6</text>
                <text x="448" y="52">7</text>
                <text x="464" y="52">8</text>
                <text x="480" y="52">9</text>
                <text x="496" y="52">0</text>
                <text x="512" y="52">1</text>
                <text x="52" y="84">Reserved</text>
                <text x="120" y="84">DCI</text>
                <text x="252" y="132">DTLS</text>
                <text x="304" y="132">Message</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Reserved  |DCI|                                               |
+-+-+-+-+-+-+-+-+                                               |
|                                                               |
|                            DTLS Message                       |
|                                                               |
|                               +-------------------------------+
|                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </artset>
      </figure>
      <dl>
        <dt>Reserved: 6 bits</dt>
        <dd>
          <t>Each bit MUST be set to zero (0) on transmission and MUST
be ignored on reception. These bits MAY in the future be assigned
a meaning when set to one (1).</t>
        </dd>
        <dt>DCI: DTLS Connection Index 2 bits (unsigned integer)</dt>
        <dd>
          <t>DTLS Connection Index is the lower two bits of an DTLS Connection
Index counter which corresponds to the epoch used in the SCTP DTLS
Chunk.  This is a counter implemented in DTLS in SCTP that is used
to identify which DTLS connection instance that is capable of
processing the DTLS message over a user message.  This index is
recommended to be the lower part of a 64-bit unsigned integer
variable as this is how DTLS epoch counter is defined.  DCI is
unrelated to the DTLS Connection ID <xref target="RFC9147"/>. The counters
initial value SHALL be three (3).</t>
        </dd>
        <dt>DTLS Message: variable length</dt>
        <dd>
          <t>One or more DTLS records. In cases more
 than one DTLS record is included all DTLS records except the last
 MUST include a length field. Note that this matches what is
 specified in DTLS 1.3 <xref target="RFC9147"/> will always include the length
 field in each record.</t>
        </dd>
      </dl>
    </section>
    <section anchor="PVALID-user-message">
      <name>Protection Valid Message</name>
      <t>The Protection Valid message is sent from the responder to the
Initiator when the responder has confirmed reception of DTLS
chunk protected DTLS messages. This message triggers
requiring protection at the Initiator when it has been received.</t>
      <t>The message SHALL be sent protected.</t>
      <t>The message is 2 bytes and is 0x4F4B. This SCTP user message MUST be sent reliable
and on Stream 0 with in order delivery in relatio to any DTLS ACK message.</t>
    </section>
    <section anchor="dtls-chunk-integration">
      <name>DTLS Chunk Integration</name>
      <t>The <xref target="I-D.westerlund-tsvwg-sctp-dtls-chunk"/> contains a high-level
description of the basic DTLS in SCTP architecture, this section deals
with details related to the DTLS 1.3 inband key-establishment
integration with SCTP.</t>
      <section anchor="sctp-association-life-cycle">
        <name>SCTP Association Life Cycle.</name>
        <t>DTLS in SCTP uses inband key-establishment, thus the DTLS handshake
for a Key-Management DTLS Connection establishes shared keys with the
remote peer. As soon as the SCTP State Machine enters established
state, DTLS in SCTP is responsible for progressing to where the DTLS
Chunk is fully configured and the ULP will be protected.</t>
        <section anchor="protection-initilization">
          <name>PROTECTION INITILIZATION</name>
          <t>When the SCTP Association enter ESTABLISHED state, the initator will
start the handshake according to <xref target="dtls-handshake"/>.</t>
          <t>When a successful handshake has been completed, the Primary DTLS Key
Context and the Restart DTLS Key Context will be created by deriving
the keys and IVs from the key-management DTLS connection. These will
be installed in the DTLS Chunks as defined in this document to
avoid dead lock and ensure successful protection enabling the ULP</t>
        </section>
        <section anchor="sctp-association-ongoing">
          <name>SCTP Association Ongoing</name>
          <t>When an SCTP Association is protected the establishe primary DTLS key
context is used for Chunk protection operation of the payload of SCTP
chunks in each packet per the DTLS Chunk specification
<xref target="I-D.westerlund-tsvwg-sctp-dtls-chunk"/>.</t>
          <t>When necessary to meet requirements on key life time or periodic
re-authentication of the peer and establishment of new forward secrecy
keys, the existing DTLS 1.3 key-managment connection is being replaced
with a new one by first opening a new parallel DTLS connection as
further specified in <xref target="parallel-dtls"/>, derive and install new DTLS
Key Contexts and then close the old DTLS connection and remove the old
DTLS Key contexts.</t>
        </section>
        <section anchor="shutdown-states">
          <name>SHUTDOWN states</name>
          <t>When the SCTP association leaves the ESTABLISHED state per <xref target="RFC9260"/>
to be shutdown the DTLS Chunk's key contexts are kept and continues to
protect the SCTP packet payloads through the shutdown process.</t>
          <t>When the association reaches the CLOSED state as part of the SCTP
association closing process all DTLS connections existing (traffic and
restart) for this association are terminated without further
transmissions, i.e. DTLS close_notify is not transmitted.</t>
        </section>
      </section>
      <section anchor="dtls-connection-handling">
        <name>DTLS Connection Handling</name>
        <t>It's up to DTLS key-establishment function to manage the DTLS
connections and their related DTLS Key context in the DTLS chunk.</t>
        <section anchor="add-dtls-connection">
          <name>Add a New DTLS Connection</name>
          <t>Either peer can add a new DTLS connection to the SCTP association at
any time, but no more than 2 DTLS connections can exist at the same
time. Details of the handshake are described in <xref target="dtls-handshake"/>.</t>
          <t>As either endpoint can initiate a DTLS handshake at the same time,
either endpoint may receive a DTLS ClientHello message when it has
sent its own ClientHello. In this case the ClientHello from the
endpoint that had the DTLS Client role in the establishment of the
previous DTLS connection shall be continued to be processed and the
other dropped.</t>
          <t>When the handshake has been completed successfully, the new DTLS Key
contexts are established by exporting keys and installing the in the
DTLS Chunk, and the new DTLS Key context are immediately started to be
used. If the handshake is not completed successfully, a new DTLS
handshake attempt will be tried using the same DCI.</t>
        </section>
        <section anchor="remove-dtls-connection">
          <name>Remove an existing DTLS Connection</name>
          <t>A DTLS connection is removed when a
newer DTLS connection is in use. It is RECOMMENDED to not initiate
removal until at least one SCTP packet protected by the new DTLS Key Context
has been received, and any transmitted packets protected
using the new DTLS Key Context has been acknowledge, alternatively one
Maximum Segment Lifetime (120 seconds) has passed since the last SCTP
packet protected by the old DTLS connection was transmitted.</t>
          <t>Either peers can initialize the removal of a DTLS connection from the
current SCTP association when needed when a new have been established.
The closing of the DTLS connection when the SCTP association is in
PROTECTED and ESTABLISHED state is done by having the DTLS connection
send a DTLS close_notify. When the DTLS closure of a DTLS connection
is completed, the related DTLS Key Contexts (Traffic and Restart) in
the DTLS chunk are released.</t>
        </section>
        <section anchor="removal_dtls_consideration">
          <name>Considerations about removal of DTLS Connections</name>
          <t>Removal of a DTLS connection may happen under circumstances as
described above in <xref target="remove-dtls-connection"/> in different states
of the Association. This section describes how the implementation
should take care of the DTLS connection removal in details.</t>
          <t>The initial DTLS connection exists as soon as Association reaches the
PROTECTED state. As long as one DTLS connection only exists, that DTLS
connection SHALL NOT be removed as it won't be possible for the
Association to proceed further.</t>
          <t>In general a DTLS connection can be removed when there's another
active DTLS connection with valid DTLS Key Contexts that can be used
for negotiating further key-management DTLS 1.3 connections.  In case
the DTLS connection is removed and no useable DTLS Key Context exist
for key-management DTLS 1.3 negotiation, the Association SHALL be
ABORTED.</t>
          <t>It is up to the implementation to guarantee that a DTLS Key Context exists
all the time, for avoiding that undesired DTLS connection closure causes
the Association abortion.</t>
        </section>
      </section>
      <section anchor="dtls-key-update">
        <name>DTLS Key Update</name>
        <t>DTLS Key Update MUST NOT be used.  DTLS Key Context replacement MUST
be used instead, by means creating a new DTLS connection as specified
in <xref target="parallel-dtls"/>, deriving the new Traffic DTLS Key Context, the
new Restart DTLS Key Context and then closing the old DTLS connection.</t>
      </section>
      <section anchor="error-cases">
        <name>Error Cases</name>
        <t>As DTLS has its own error reporting mechanism by exchanging DTLS alert
messages no new DTLS related cause codes are defined to use the error
handling defined in <xref target="I-D.westerlund-tsvwg-sctp-dtls-chunk"/>.</t>
        <t>When Handshake DTLS connection encounters an error it may report that
issue using DTLS alert message to its peer by putting the created DTLS
record in a SCTP user message (<xref target="dtls-user-message"/>) with the
Handshake PPID. This is independent of what to do in relation to the
SCTP association.  Depending on the severance of the error different
paths can be the result:</t>
        <t>However, as there is not expected that the key-management DTLS
connection will at all have any activity between completing the
handshake, and the DTLS connection closing, there is unlikely
that any error will occur.</t>
      </section>
    </section>
    <section anchor="dtls-considerations">
      <name>DTLS Considerations</name>
      <section anchor="version-of-dtls">
        <name>Version of DTLS</name>
        <t>This document defines the usage of DTLS 1.3 <xref target="RFC9147"/>.
   Earlier versions of DTLS MUST NOT be used
   (see <xref target="RFC8996"/>). It is expected that DTLS in SCTP as described in
   this document will work with future versions of DTLS.</t>
        <t>Only one version of DTLS MUST be used during the lifetime of an
   SCTP Association, meaning that the procedure for replacing the DTLS
   version in use requires the existing SCTP Association to be
   terminated and a new SCTP Association with the desired DTLS version
   to be instantiated.</t>
      </section>
      <section anchor="configuration-of-key-management-dtls">
        <name>Configuration of Key-Management DTLS</name>
        <section anchor="general">
          <name>General</name>
          <t>The DTLS Connection ID SHOULD NOT be used in the Key-Management DTLS
   Connection avoiding overhead and addition implementation
   requirements on DTLS implementation.</t>
          <t>The DTLS record length field is normally not needed as the DTLS
   Chunk provides a length field unless multiple records are put in
   same DTLS chunk payload or user message. If multiple DTLS records
   are included in one DTLS chunk payload or user message the DTLS
   record length field MUST be present in all but the last.</t>
          <t>DTLS record replay detection MUST be used.</t>
          <t>Sequence number size can be adapted based on how quickly it wraps.</t>
          <t>Many of the TLS registries have a "Recommended" column. Parameters
   not marked as "Y" are NOT RECOMMENDED to support.
   Non-AEAD cipher suites or cipher suites without
   confidentiality MUST NOT be supported. Cipher suites and parameters
   that do not provide ephemeral key-exchange MUST NOT be supported.</t>
          <t>The Cipher suites negotiated in the Key-Management DTLS Connection
   SHALL only include those supported by the DTLS Chunk. The DTLS
   Chunk is expected to have an API capability to determine the Cipher
   Suit Capabilities, see Abstract API in Section 10.1 of
   <xref target="I-D.westerlund-tsvwg-sctp-dtls-chunk"/>.</t>
        </section>
        <section anchor="authentication-and-policy-decisions">
          <name>Authentication and Policy Decisions</name>
          <t>DTLS in SCTP MUST be mutually authenticated. Authentication is the
   process of establishing the identity of a user or system and
   verifying that the identity is valid. DTLS only provides proof of
   possession of a key. DTLS in SCTP MUST perform identity
   authentication. It is RECOMMENDED that DTLS in SCTP is used with
   certificate-based authentication.</t>
          <t>When certificates are used the application using DTLS in SCTP is
   responsible for certificate policies, certificate chain validation,
   and identity authentication (HTTPS does for example match the
   hostname with a subjectAltName of type dNSName). The application
   using DTLS in SCTP defines what the identity is and how it is
   encoded and the client and server MUST use the same identity
   format. Guidance on server certificate validation can be found in
   <xref target="RFC9525"/>. DTLS in SCTP enables periodic transfer
   of mutual revocation information (OSCP stapling) every time a new
   parallel connection is set up. All security decisions MUST be based
   on the peer's authenticated identity, not on its transport layer
   identity.</t>
          <t>It is possible to authenticate DTLS endpoints based on IP addresses in
certificates. SCTP associations can use multiple IP addresses per SCTP
endpoint. Therefore, it is possible that DTLS records will be sent
from a different source IP address or to a different destination IP
address than that originally authenticated. This is not a problem
provided that no security decisions are made based on the source or
destination IP addresses.</t>
        </section>
        <section anchor="new-connections">
          <name>New Connections</name>
          <t>Implementations MUST set up a new DTLS connection using a full handshake
before any of the certificates expire.
It is RECOMMENDED that all negotiated and
exchanged parameters are the same except for the timestamps in the
certificates. Clients and servers MUST NOT accept a change of identity
during the setup of a new connections, but MAY accept negotiation of
stronger algorithms and security parameters, which might be motivated
by new attacks.</t>
          <t>Allowing new connections can enable denial-of-service attacks. The
endpoints MUST limit the number of simultaneous connections to two.</t>
          <t>To force attackers to do dynamic key exfiltration and limit the
amount of compromised data due to key compromise, implementations MUST
have policies for how often to set up new connections with ephemeral
key exchange such as ECDHE. Implementations SHOULD set up new
connections frequently to force attackers to dynamic key
extraction. E.g., at least every hour and every 100 GB of data which
is a common policy for IPsec <xref target="ANSSI-DAT-NT-003"/>. See
<xref target="I-D.ietf-tls-rfc8446bis"/> for a more detailed discussion on key
compromise and key exfiltration in (D)TLS. As recommended in
<xref target="KTH-NCSA"/>, resumption can be used to chain the connections,
increasing security by forcing an adversary to break them in sequence.</t>
          <t>For many DTLS in SCTP deployments the SCTP association is expected to
have a very long lifetime of months or even years. For associations
with such long lifetimes there is a need to frequently re-authenticate
both client and server by setting up a new connection using a full
handshake. TLS Certificate
lifetimes significantly shorter than a year are common which is
shorter than many expected SCTP associations protected by DTLS in
SCTP.</t>
        </section>
        <section anchor="dtls-13">
          <name>DTLS 1.3</name>
          <t>DTLS 1.3 is used instead of DTLS 1.2 being a newer protocol that
addresses known vulnerabilities and only defines strong algorithms
without known major weaknesses at the time of publication.</t>
          <t>DTLS 1.3 requires rekeying before algorithm specific AEAD limits have
been reached. Implementations setup a new DTLS connection to handle
the need for new keys, alternatively terminate the SCTP Assocation.</t>
          <t>In DTLS 1.3 any number of tickets can be issued in a connection and
the tickets can be used for resumption as long as they are valid,
which is up to seven days. The nodes in a resumed connection have the
same roles (client or server) as in the connection where the ticket
was issued. Resumption can have significant latency benefits for
quickly restarting a broken DTLS/SCTP association. If tickets and
resumption are used it is enough to issue a single ticket per
connection.</t>
          <t>The PSK key exchange mode : psk_ke MUST NOT be used as it does not
provide ephemeral key exchange.</t>
        </section>
      </section>
    </section>
    <section anchor="establishing-dtls-in-sctp">
      <name>Establishing DTLS in SCTP</name>
      <t>This section specifies how DTLS in SCTP is established using
   Key-Management DTLS Connections and the DTLS Chunk
   <xref target="I-D.westerlund-tsvwg-sctp-dtls-chunk"/>.</t>
      <t>A DTLS in SCTP Association is built up with a Key-Management DTLS
   connection, from that DTLS connection Traffic DTLS Key Context and
   Restart DTLS Key Context are derived and the configures
   the DTLS Context.</t>
      <t>The Key-Management DTLS connection is established as part of extra
   procedures for the DTLS chunk initial handshake (see
   <xref target="initial_dtls_connection"/>).</t>
      <section anchor="dtls-key-derivation">
        <name>DTLS Key Context derivation</name>
        <t>This section describes how DTLS Key Contexts are derived from the
  DTLS handshake using the TLS Exporter as defined by <xref target="RFC9147"/>. The
  TLS exporter label specifications below is following <xref target="RFC5705"/>.</t>
        <t>There are two sets of keys one for the primary DTLS key context and
  one for the restart DTLS Key Context. Each set consists of one
  client and one server side write key. In addition each key needs an
  Initilization Vector (IV) that is used by the record processing in
  TLS to create the nonce, See Section 5.3 of <xref target="RFC8446"/>. The client
  and server roles are here in relation to key-management DTLS session
  roles. So the DTLS Client will install the key derived using the
  EXPORTER_DTLS_IN_SCTP_PRIMARY_CLIENT_KEY label as its write key for
  the traffic context, and use the
  EXPORTER_DTLS_IN_SCTP_PRIMARY_SERVER_KEY as its traffic DTLS context
  read key. Correspondlingly the
  EXPORTER_DTLS_IN_SCTP_RESTART_CLIENT_KEY is used to export the key
  used by the endpoint that acted as DTLS Client as write key for the
  restart DTLS key context. And the
  EXPORTER_DTLS_IN_SCTP_RESTART_SERVER_KEY as the DTLS client's read
  key for the restart DTLS Key Context. Correspondligy the IV values
  needs to be exported using the corresponding _IV label.</t>
        <t>The following labels are defined:</t>
        <ul spacing="normal">
          <li>
            <t>EXPORTER_DTLS_IN_SCTP_PRIMARY_CLIENT_KEY</t>
          </li>
          <li>
            <t>EXPORTER_DTLS_IN_SCTP_PRIMARY_CLIENT_IV</t>
          </li>
          <li>
            <t>EXPORTER_DTLS_IN_SCTP_PRIMARY_SERVER_KEY</t>
          </li>
          <li>
            <t>EXPORTER_DTLS_IN_SCTP_PRIMARY_SERVER_IV</t>
          </li>
          <li>
            <t>EXPORTER_DTLS_IN_SCTP_RESTART_CLIENT_KEY</t>
          </li>
          <li>
            <t>EXPORTER_DTLS_IN_SCTP_RESTART_CLIENT_IV</t>
          </li>
          <li>
            <t>EXPORTER_DTLS_IN_SCTP_RESTART_SERVER_KEY</t>
          </li>
          <li>
            <t>EXPORTER_DTLS_IN_SCTP_RESTART_SERVER_IV</t>
          </li>
        </ul>
        <t>To ensure that downgrade attack on the protection solution offered
  is not possible the context used will be the full sequence of
  Protection Solution Identifiers as include in the DTLS 1.3 Chunk
  Protected Association (Section 4.1 of
  <xref target="I-D.westerlund-tsvwg-sctp-dtls-chunk"/>) sent by the SCTP
  assocation initiator. Thus, any downgrade attack on this will result
  in a mismatch in produced keys as the initiator will use what it
  actually offered and the responder a truncated or modified sequence.</t>
        <t>The length of the exported key or IV material depends on the need for the
  negotiatated cipher suit for the protection.</t>
      </section>
      <section anchor="dtls-handshake">
        <name>DTLS Handshake</name>
        <section anchor="initial_dtls_connection">
          <name>Protection Initilization using DTLS connection</name>
          <t>The handshake of the initial DTLS connection is part of the
   DTLS in SCTP Association initialization. The key-management DTLS
   connections progress interacts with the key installation
   for the SCTP associations DTLS chunk.</t>
          <figure anchor="sctp-DTLS-initial-dtls-connection">
            <name>Handshake of initial DTLS connection</name>
            <artset>
              <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="336" width="520" viewBox="0 0 520 336" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                  <path d="M 40,48 L 40,304" fill="none" stroke="black"/>
                  <path d="M 408,48 L 408,304" fill="none" stroke="black"/>
                  <path d="M 440,64 L 440,112" fill="none" stroke="black"/>
                  <path d="M 440,160 L 440,208" fill="none" stroke="black"/>
                  <path d="M 440,256 L 440,304" fill="none" stroke="black"/>
                  <path d="M 40,64 L 200,64" fill="none" stroke="black"/>
                  <path d="M 256,64 L 400,64" fill="none" stroke="black"/>
                  <path d="M 48,80 L 184,80" fill="none" stroke="black"/>
                  <path d="M 272,80 L 408,80" fill="none" stroke="black"/>
                  <path d="M 40,96 L 168,96" fill="none" stroke="black"/>
                  <path d="M 280,96 L 400,96" fill="none" stroke="black"/>
                  <path d="M 440,96 L 480,96" fill="none" stroke="black"/>
                  <path d="M 48,112 L 176,112" fill="none" stroke="black"/>
                  <path d="M 280,112 L 408,112" fill="none" stroke="black"/>
                  <path d="M 40,160 L 120,160" fill="none" stroke="black"/>
                  <path d="M 328,160 L 400,160" fill="none" stroke="black"/>
                  <path d="M 48,176 L 64,176" fill="none" stroke="black"/>
                  <path d="M 376,176 L 408,176" fill="none" stroke="black"/>
                  <path d="M 40,192 L 64,192" fill="none" stroke="black"/>
                  <path d="M 368,192 L 400,192" fill="none" stroke="black"/>
                  <path d="M 440,192 L 480,192" fill="none" stroke="black"/>
                  <path d="M 48,208 L 152,208" fill="none" stroke="black"/>
                  <path d="M 288,208 L 408,208" fill="none" stroke="black"/>
                  <path d="M 40,256 L 96,256" fill="none" stroke="black"/>
                  <path d="M 328,256 L 400,256" fill="none" stroke="black"/>
                  <path d="M 48,272 L 104,272" fill="none" stroke="black"/>
                  <path d="M 336,272 L 408,272" fill="none" stroke="black"/>
                  <path d="M 440,272 L 512,272" fill="none" stroke="black"/>
                  <path d="M 424,48 C 432.83064,48 440,55.16936 440,64" fill="none" stroke="black"/>
                  <path d="M 424,128 C 432.83064,128 440,120.83064 440,112" fill="none" stroke="black"/>
                  <path d="M 424,144 C 432.83064,144 440,151.16936 440,160" fill="none" stroke="black"/>
                  <path d="M 424,224 C 432.83064,224 440,216.83064 440,208" fill="none" stroke="black"/>
                  <path d="M 424,240 C 432.83064,240 440,247.16936 440,256" fill="none" stroke="black"/>
                  <polygon class="arrowhead" points="408,256 396,250.4 396,261.6" fill="black" transform="rotate(0,400,256)"/>
                  <polygon class="arrowhead" points="408,192 396,186.4 396,197.6" fill="black" transform="rotate(0,400,192)"/>
                  <polygon class="arrowhead" points="408,160 396,154.4 396,165.6" fill="black" transform="rotate(0,400,160)"/>
                  <polygon class="arrowhead" points="408,96 396,90.4 396,101.6" fill="black" transform="rotate(0,400,96)"/>
                  <polygon class="arrowhead" points="408,64 396,58.4 396,69.6" fill="black" transform="rotate(0,400,64)"/>
                  <polygon class="arrowhead" points="56,272 44,266.4 44,277.6" fill="black" transform="rotate(180,48,272)"/>
                  <polygon class="arrowhead" points="56,208 44,202.4 44,213.6" fill="black" transform="rotate(180,48,208)"/>
                  <polygon class="arrowhead" points="56,176 44,170.4 44,181.6" fill="black" transform="rotate(180,48,176)"/>
                  <polygon class="arrowhead" points="56,112 44,106.4 44,117.6" fill="black" transform="rotate(180,48,112)"/>
                  <polygon class="arrowhead" points="56,80 44,74.4 44,85.6" fill="black" transform="rotate(180,48,80)"/>
                  <g class="text">
                    <text x="40" y="36">Initiator</text>
                    <text x="408" y="36">Responder</text>
                    <text x="228" y="68">[INIT]</text>
                    <text x="228" y="84">[INIT-ACK]</text>
                    <text x="468" y="84">SCTP</text>
                    <text x="200" y="100">[COOKIE</text>
                    <text x="256" y="100">ECHO]</text>
                    <text x="208" y="116">[COOKIE</text>
                    <text x="260" y="116">ACK]</text>
                    <text x="164" y="164">[DATA(DTLS</text>
                    <text x="236" y="164">Client</text>
                    <text x="296" y="164">Hello)]</text>
                    <text x="108" y="180">[DATA(DTLS</text>
                    <text x="180" y="180">Server</text>
                    <text x="232" y="180">Hello</text>
                    <text x="272" y="180">...</text>
                    <text x="332" y="180">Finished)]</text>
                    <text x="468" y="180">DTLS</text>
                    <text x="108" y="196">[DATA(DTLS</text>
                    <text x="200" y="196">Certificate</text>
                    <text x="264" y="196">...</text>
                    <text x="324" y="196">Finished)]</text>
                    <text x="196" y="212">[DATA(DTLS</text>
                    <text x="264" y="212">ACK)]</text>
                    <text x="120" y="260">[DTLS</text>
                    <text x="204" y="260">CHUNK(DATA(APP</text>
                    <text x="296" y="260">DATA))]</text>
                    <text x="464" y="260">APP</text>
                    <text x="500" y="260">DATA</text>
                    <text x="128" y="276">[DTLS</text>
                    <text x="212" y="276">CHUNK(DATA(APP</text>
                    <text x="304" y="276">DATA))]</text>
                    <text x="216" y="292">...</text>
                    <text x="216" y="308">...</text>
                  </g>
                </svg>
              </artwork>
              <artwork type="ascii-art" align="center"><![CDATA[
Initiator                                     Responder
    |                                             | -.
    +--------------------[INIT]------------------>|   |
    |<-----------------[INIT-ACK]-----------------+   | SCTP
    +----------------[COOKIE ECHO]--------------->|   +-----
    |<----------------[COOKIE ACK]----------------+   |
    |                                             | -'
    |                                             | -.
    +----------[DATA(DTLS Client Hello)]--------->|   |
    |<--[DATA(DTLS Server Hello ... Finished)]----+   | DTLS
    +---[DATA(DTLS Certificate ... Finished)]---->|   +-----
    |<-------------[DATA(DTLS ACK)]---------------+   |
    |                                             | -'
    |                                             | -.
    +-------[DTLS CHUNK(DATA(APP DATA))]--------->|   | APP DATA
    +<-------[DTLS CHUNK(DATA(APP DATA))]---------+   +---------
    |                    ...                      |   |
    |                    ...                      |   |

]]></artwork>
            </artset>
          </figure>
          <t>SCTP Handshake is strictly compliant to <xref target="RFC9260"/>. The DTLS 1.3
   Chunk Protected Association parameter (Section 4.1 of
   <xref target="I-D.westerlund-tsvwg-sctp-dtls-chunk"/>) is included containing
   the Protection Solution identifier (See <xref target="sec-iana-psi"/>) for this
   documents key-management at a suitable preference position
   depending on local policy. And in case this key-management solution
   is the most preferred then the process continues as stated below
   and depiceted in <xref target="sctp-protection-initilization"/>.</t>
          <figure anchor="sctp-protection-initilization">
            <name>The steps of Interaction between Key-Management and DTLS Chunk API</name>
            <artset>
              <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="336" width="520" viewBox="0 0 520 336" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                  <path d="M 40,48 L 40,304" fill="none" stroke="black"/>
                  <path d="M 408,48 L 408,304" fill="none" stroke="black"/>
                  <path d="M 440,256 L 440,304" fill="none" stroke="black"/>
                  <path d="M 40,64 L 200,64" fill="none" stroke="black"/>
                  <path d="M 256,64 L 400,64" fill="none" stroke="black"/>
                  <path d="M 48,80 L 184,80" fill="none" stroke="black"/>
                  <path d="M 272,80 L 408,80" fill="none" stroke="black"/>
                  <path d="M 40,96 L 168,96" fill="none" stroke="black"/>
                  <path d="M 280,96 L 400,96" fill="none" stroke="black"/>
                  <path d="M 48,112 L 176,112" fill="none" stroke="black"/>
                  <path d="M 280,112 L 408,112" fill="none" stroke="black"/>
                  <path d="M 40,160 L 120,160" fill="none" stroke="black"/>
                  <path d="M 328,160 L 400,160" fill="none" stroke="black"/>
                  <path d="M 48,176 L 64,176" fill="none" stroke="black"/>
                  <path d="M 376,176 L 408,176" fill="none" stroke="black"/>
                  <path d="M 40,192 L 64,192" fill="none" stroke="black"/>
                  <path d="M 368,192 L 400,192" fill="none" stroke="black"/>
                  <path d="M 48,208 L 120,208" fill="none" stroke="black"/>
                  <path d="M 320,208 L 408,208" fill="none" stroke="black"/>
                  <path d="M 40,256 L 96,256" fill="none" stroke="black"/>
                  <path d="M 328,256 L 400,256" fill="none" stroke="black"/>
                  <path d="M 48,272 L 104,272" fill="none" stroke="black"/>
                  <path d="M 336,272 L 408,272" fill="none" stroke="black"/>
                  <path d="M 440,272 L 512,272" fill="none" stroke="black"/>
                  <polygon class="arrowhead" points="408,256 396,250.4 396,261.6" fill="black" transform="rotate(0,400,256)"/>
                  <polygon class="arrowhead" points="408,192 396,186.4 396,197.6" fill="black" transform="rotate(0,400,192)"/>
                  <polygon class="arrowhead" points="408,160 396,154.4 396,165.6" fill="black" transform="rotate(0,400,160)"/>
                  <polygon class="arrowhead" points="408,96 396,90.4 396,101.6" fill="black" transform="rotate(0,400,96)"/>
                  <polygon class="arrowhead" points="408,64 396,58.4 396,69.6" fill="black" transform="rotate(0,400,64)"/>
                  <polygon class="arrowhead" points="56,272 44,266.4 44,277.6" fill="black" transform="rotate(180,48,272)"/>
                  <polygon class="arrowhead" points="56,208 44,202.4 44,213.6" fill="black" transform="rotate(180,48,208)"/>
                  <polygon class="arrowhead" points="56,176 44,170.4 44,181.6" fill="black" transform="rotate(180,48,176)"/>
                  <polygon class="arrowhead" points="56,112 44,106.4 44,117.6" fill="black" transform="rotate(180,48,112)"/>
                  <polygon class="arrowhead" points="56,80 44,74.4 44,85.6" fill="black" transform="rotate(180,48,80)"/>
                  <g class="text">
                    <text x="40" y="36">Initiator</text>
                    <text x="408" y="36">Responder</text>
                    <text x="20" y="68">0.</text>
                    <text x="228" y="68">[INIT]</text>
                    <text x="228" y="84">[INIT-ACK]</text>
                    <text x="200" y="100">[COOKIE</text>
                    <text x="256" y="100">ECHO]</text>
                    <text x="428" y="100">1.</text>
                    <text x="20" y="116">2.</text>
                    <text x="208" y="116">[COOKIE</text>
                    <text x="260" y="116">ACK]</text>
                    <text x="20" y="164">3.</text>
                    <text x="164" y="164">[DATA(DTLS</text>
                    <text x="236" y="164">Client</text>
                    <text x="296" y="164">Hello)]</text>
                    <text x="428" y="164">4.</text>
                    <text x="108" y="180">[DATA(DTLS</text>
                    <text x="180" y="180">Server</text>
                    <text x="232" y="180">Hello</text>
                    <text x="272" y="180">...</text>
                    <text x="332" y="180">Finished)]</text>
                    <text x="428" y="180">5.</text>
                    <text x="20" y="196">6.</text>
                    <text x="108" y="196">[DATA(DTLS</text>
                    <text x="200" y="196">Certificate</text>
                    <text x="264" y="196">...</text>
                    <text x="324" y="196">Finished)]</text>
                    <text x="428" y="196">7.</text>
                    <text x="20" y="212">9.</text>
                    <text x="164" y="212">[DATA(DTLS</text>
                    <text x="228" y="212">ACK,</text>
                    <text x="284" y="212">PVALID)]</text>
                    <text x="428" y="212">8.</text>
                    <text x="16" y="260">10.</text>
                    <text x="120" y="260">[DTLS</text>
                    <text x="204" y="260">CHUNK(DATA(APP</text>
                    <text x="296" y="260">DATA))]</text>
                    <text x="464" y="260">APP</text>
                    <text x="500" y="260">DATA</text>
                    <text x="128" y="276">[DTLS</text>
                    <text x="212" y="276">CHUNK(DATA(APP</text>
                    <text x="304" y="276">DATA))]</text>
                    <text x="216" y="292">...</text>
                    <text x="216" y="308">...</text>
                  </g>
                </svg>
              </artwork>
              <artwork type="ascii-art" align="center"><![CDATA[
Initiator                                     Responder
    |                                             |
 0. +--------------------[INIT]------------------>|
    |<-----------------[INIT-ACK]-----------------+
    +----------------[COOKIE ECHO]--------------->| 1.
 2. |<----------------[COOKIE ACK]----------------+
    |                                             |
    |                                             |
 3. +----------[DATA(DTLS Client Hello)]--------->| 4.
    |<--[DATA(DTLS Server Hello ... Finished)]----+ 5.
 6. +---[DATA(DTLS Certificate ... Finished)]---->| 7.
 9. |<---------[DATA(DTLS ACK, PVALID)]-----------+ 8.
    |                                             |
    |                                             |
10. +-------[DTLS CHUNK(DATA(APP DATA))]--------->|   | APP DATA
    +<-------[DTLS CHUNK(DATA(APP DATA))]---------+   +---------
    |                    ...                      |   |
    |                    ...                      |   |

]]></artwork>
            </artset>
          </figure>
          <ol spacing="normal" type="1"><li>
              <t>The Initiator initiates an SCTP Association and provides the
DTLS 1.3 Chunk Protected Association parameter preference
ordered list of supporter Protection Solutions. The offered
parameter list is remembered by the Key-Management.</t>
            </li>
            <li>
              <t>The Responder peer enter SCTP Established, and the
Key-Management is provided with the full ordered list of
Protection Solutions offered in the INIT Chunk.</t>
            </li>
            <li>
              <t>The Initiator enters SCTP Assocationa Established and the
Key-Management is triggered to perform the next step.</t>
            </li>
            <li>
              <t>Key-Management initiated a DTLS handshake with the the supported
configuration. Taking supported Cipher-suits in the DTLS Chunk
implementation into account when creating its DTLS Client-Hello
mesage. The DTLS messages are sent per <xref target="dtls-user-message"/></t>
            </li>
            <li>
              <t>Responder receives DTLS Client-Hello and generates
the DTLS Server Hello, etc response message(s) for the DTLS handshake.
In case the DTLS server in the responder requires the use of the
retry message an additional message exchange between DTLS Client
and DTLS server is needed before one can progress to 5.</t>
            </li>
            <li>
              <t>Responder uses its the TLS Exporter on the DTLS Connection's
state to derive the primary client write key and IV
<xref target="dtls-key-derivation"/> and install them into the DTLS Chunk's
primary Key Context. Then it sends the DTLS Server's response
message(s).</t>
            </li>
            <li>
              <t>The DTLS client receives the DTLS server's messages (Server
Hello etc.)  and can now export both the client and server write
key for the primary and restart Key Contexts, however their usage
is not yet required and SCTP packets without DTLS chunks are still
accepted. Then the DTLS Client next handshake message is sent.
This message SHALL be protected by the DTLS Chunk using the primary
key Context (Client Write key and IV).</t>
            </li>
            <li>
              <t>The responder's DTLS chunk will receive the SCTP packets containing
the DTLS chunk protected DTLS messages. Concluding the main
process of the DTLS handshake.</t>
            </li>
            <li>
              <t>The responder export the remaining keys and IVs and installs all
primary and restart Server Write Key and IV, as well as restart
client write key and IV. After that it requires all future SCTP
Packets to be protected by DTLS Chunk. If any DTLS ACK message
is to be sent, it SHOULD be sent next.  Then it sends a
protected Protection Valid Message <xref target="PVALID-user-message"/> to
the SCTP Association Initiators Key-Management. The
key-management can now inform the ULP that the SCTP association
is protected.</t>
            </li>
            <li>
              <t>Upon successful reception of the Protection Valid Message the
Initiator's Key-Management configure the DTLS Chunk to
only accept DTLS Chunk Protected SCTP packets.</t>
            </li>
            <li>
              <t>The Initiator's ULP is notified that the SCTP association is
Established and protected and it may generate user messages.</t>
            </li>
          </ol>
          <t>If the DTLS handshake failed the SCTP association SHALL be aborted
   and an ERROR chunk with the Error in Protection error cause, with
   the appropriate extra error causes is generated, the right
   selection of "Error During Protection Handshake" or "Timeout During
   Protection Handshake or Validation".</t>
        </section>
        <section anchor="further_dtls_connection">
          <name>Handshake of further DTLS connections</name>
          <t>When the SCTP Association has entered the PROTECTED state, each of
   the endpoint can initiate a DTLS handshake for rekeying when
   necessary.</t>
          <t>The DTLS endpoint will if necessary fragment the handshake into
   multiple records. Each DTLS handshake message fragment
   is sent as a SCTP user message <xref target="dtls-user-message"/>.
   The DTLS instance SHOULD NOT use DTLS retransmission to repair any
   packet losses of handshake message fragment. Note: If the DTLS
   implementation support configuring a MTU larger than the actual IP
   MTU it could be used as SCTP provides reliability and
   fragmentation.</t>
          <t>If the DTLS handshake failed the SCTP association SHALL generate
   an ERROR chunk with the Error in Protection error cause, with
   extra error causes "Error During Protection Handshake".</t>
          <figure anchor="sctp-DTLS-further-dtls-connection">
            <name>Handshake of further DTLS connection</name>
            <artset>
              <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="160" width="448" viewBox="0 0 448 160" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                  <path d="M 40,48 L 40,128" fill="none" stroke="black"/>
                  <path d="M 408,48 L 408,128" fill="none" stroke="black"/>
                  <path d="M 40,64 L 120,64" fill="none" stroke="black"/>
                  <path d="M 328,64 L 400,64" fill="none" stroke="black"/>
                  <path d="M 48,80 L 64,80" fill="none" stroke="black"/>
                  <path d="M 376,80 L 408,80" fill="none" stroke="black"/>
                  <path d="M 40,96 L 64,96" fill="none" stroke="black"/>
                  <path d="M 368,96 L 400,96" fill="none" stroke="black"/>
                  <path d="M 48,112 L 152,112" fill="none" stroke="black"/>
                  <path d="M 288,112 L 408,112" fill="none" stroke="black"/>
                  <polygon class="arrowhead" points="408,96 396,90.4 396,101.6" fill="black" transform="rotate(0,400,96)"/>
                  <polygon class="arrowhead" points="408,64 396,58.4 396,69.6" fill="black" transform="rotate(0,400,64)"/>
                  <polygon class="arrowhead" points="56,112 44,106.4 44,117.6" fill="black" transform="rotate(180,48,112)"/>
                  <polygon class="arrowhead" points="56,80 44,74.4 44,85.6" fill="black" transform="rotate(180,48,80)"/>
                  <g class="text">
                    <text x="40" y="36">Initiator</text>
                    <text x="408" y="36">Responder</text>
                    <text x="164" y="68">[DATA(DTLS</text>
                    <text x="236" y="68">Client</text>
                    <text x="296" y="68">Hello)]</text>
                    <text x="108" y="84">[DATA(DTLS</text>
                    <text x="180" y="84">Server</text>
                    <text x="232" y="84">Hello</text>
                    <text x="272" y="84">...</text>
                    <text x="332" y="84">Finished)]</text>
                    <text x="108" y="100">[DATA(DTLS</text>
                    <text x="200" y="100">Certificate</text>
                    <text x="264" y="100">...</text>
                    <text x="324" y="100">Finished)]</text>
                    <text x="196" y="116">[DATA(DTLS</text>
                    <text x="264" y="116">ACK)]</text>
                  </g>
                </svg>
              </artwork>
              <artwork type="ascii-art" align="center"><![CDATA[
Initiator                                     Responder
    |                                             |
    +----------[DATA(DTLS Client Hello)]--------->|
    |<--[DATA(DTLS Server Hello ... Finished)]----+
    +---[DATA(DTLS Certificate ... Finished)]---->|
    |<-------------[DATA(DTLS ACK)]---------------+
    |                                             |

]]></artwork>
            </artset>
          </figure>
          <t>The <xref target="sctp-DTLS-further-dtls-connection"/> shows a successful
handshake of a further DTLS connection. Such connections can
be initiated by any of the peers. Same as during the initial
handshake, DTLS handshake messages are transported by means
of DATA chunks with the DTLS Chunk Key-Management Messages PPID.</t>
        </section>
      </section>
      <section anchor="sctp-restart">
        <name>SCTP Association Restart</name>
        <t>In order to achieve an Association Restart as described in
<xref target="I-D.westerlund-tsvwg-sctp-dtls-chunk"/>, a Restart DTLS Key Context
dedicated to Restart SHALL exist and be available.  Furthermore, both
peers SHALL have safely stored both the current Restart DTLS Key Context.
Here we assume that Restart DTLS Key Context is maintained across
the events leading to SCTP Restart request.</t>
        <section anchor="init-dtls-restart-context">
          <name>Installation of initial Restart DTLS Key Context</name>
          <t>As soon as the Association has reached the PROTECTED INITILIZATION
state, after the Traffic DTLS Key context have been installed a
Restart DTLS Key Context SHALL be derived and then installed.</t>
          <t>It MAY exist a short time gap where the Association has entered in
PROTECTED state but no Restart DTLS Key Context has been installed
yet. If a SCTP Restart procedure will be initiated during that time,
it will fail and the Association will also fail. However, this is
unlikely as the restart Init will be sent multiple times following a
exponential back-off timer and in that time the Restart DTLS Key Context is
expected to be in place.</t>
          <t>Once installed, no traffic will be sent over the Restart DTLS Key Context
so that both endpoints will have a known DTLS context state, i.e. the
Sequence number and replay window are both just initialized to default
values for the epoch=3.</t>
        </section>
        <section anchor="installation-of-restart-dtls-key-context-for-further-dtls-connections">
          <name>Installation of Restart DTLS Key Context for further DTLS Connections</name>
          <t>As each subsequent Key-Management DTLS connection complete the DTLS handshake
and the Traffic DTLS Key context has been derived and installed also
the Restart DTLS Key context SHALL be installed. The closing of the previous
DTLS connection SHALL NOT be initiated or completed until the Restart
DTLS Key Context is in place.</t>
        </section>
        <section anchor="sctp-assoc-restart-procedure">
          <name>SCTP Association Restart Procedure</name>
          <t>The DTLS in SCTP Association Restart is meant to preserve the security
characteristics.</t>
          <t>In order the Association Restart to proceed both Initiator and Responder
SHALL use the same Restart DTLS Key Context for COOKIE-ECHO/COOKIE-ACK
handshake, that implies that the Initiator must preserve the Restart
DTLS Key Context and that the Responder SHALL NOT change the Restart
DTLS Key Context during the Restart procedure.</t>
          <figure anchor="sctp-assoc-restart-sequence">
            <name>SCTP Restart sequence for DTLS in SCTP</name>
            <artset>
              <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="496" width="544" viewBox="0 0 544 496" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                  <path d="M 40,48 L 40,464" fill="none" stroke="black"/>
                  <path d="M 408,48 L 408,464" fill="none" stroke="black"/>
                  <path d="M 440,64 L 440,144" fill="none" stroke="black"/>
                  <path d="M 440,192 L 440,240" fill="none" stroke="black"/>
                  <path d="M 440,288 L 440,368" fill="none" stroke="black"/>
                  <path d="M 440,416 L 440,464" fill="none" stroke="black"/>
                  <path d="M 40,64 L 136,64" fill="none" stroke="black"/>
                  <path d="M 288,64 L 400,64" fill="none" stroke="black"/>
                  <path d="M 48,80 L 120,80" fill="none" stroke="black"/>
                  <path d="M 304,80 L 408,80" fill="none" stroke="black"/>
                  <path d="M 440,80 L 496,80" fill="none" stroke="black"/>
                  <path d="M 40,128 L 112,128" fill="none" stroke="black"/>
                  <path d="M 320,128 L 400,128" fill="none" stroke="black"/>
                  <path d="M 48,144 L 112,144" fill="none" stroke="black"/>
                  <path d="M 312,144 L 408,144" fill="none" stroke="black"/>
                  <path d="M 440,144 L 496,144" fill="none" stroke="black"/>
                  <path d="M 40,192 L 120,192" fill="none" stroke="black"/>
                  <path d="M 328,192 L 400,192" fill="none" stroke="black"/>
                  <path d="M 48,208 L 64,208" fill="none" stroke="black"/>
                  <path d="M 376,208 L 408,208" fill="none" stroke="black"/>
                  <path d="M 40,224 L 64,224" fill="none" stroke="black"/>
                  <path d="M 368,224 L 400,224" fill="none" stroke="black"/>
                  <path d="M 48,240 L 152,240" fill="none" stroke="black"/>
                  <path d="M 288,240 L 408,240" fill="none" stroke="black"/>
                  <path d="M 440,240 L 528,240" fill="none" stroke="black"/>
                  <path d="M 440,368 L 536,368" fill="none" stroke="black"/>
                  <path d="M 40,416 L 96,416" fill="none" stroke="black"/>
                  <path d="M 328,416 L 400,416" fill="none" stroke="black"/>
                  <path d="M 48,432 L 104,432" fill="none" stroke="black"/>
                  <path d="M 336,432 L 408,432" fill="none" stroke="black"/>
                  <path d="M 440,432 L 512,432" fill="none" stroke="black"/>
                  <path d="M 424,48 C 432.83064,48 440,55.16936 440,64" fill="none" stroke="black"/>
                  <path d="M 424,160 C 432.83064,160 440,152.83064 440,144" fill="none" stroke="black"/>
                  <path d="M 424,176 C 432.83064,176 440,183.16936 440,192" fill="none" stroke="black"/>
                  <path d="M 424,256 C 432.83064,256 440,248.83064 440,240" fill="none" stroke="black"/>
                  <path d="M 424,272 C 432.83064,272 440,279.16936 440,288" fill="none" stroke="black"/>
                  <path d="M 424,384 C 432.83064,384 440,376.83064 440,368" fill="none" stroke="black"/>
                  <path d="M 424,400 C 432.83064,400 440,407.16936 440,416" fill="none" stroke="black"/>
                  <polygon class="arrowhead" points="408,416 396,410.4 396,421.6" fill="black" transform="rotate(0,400,416)"/>
                  <polygon class="arrowhead" points="408,224 396,218.4 396,229.6" fill="black" transform="rotate(0,400,224)"/>
                  <polygon class="arrowhead" points="408,192 396,186.4 396,197.6" fill="black" transform="rotate(0,400,192)"/>
                  <polygon class="arrowhead" points="408,128 396,122.4 396,133.6" fill="black" transform="rotate(0,400,128)"/>
                  <polygon class="arrowhead" points="408,64 396,58.4 396,69.6" fill="black" transform="rotate(0,400,64)"/>
                  <polygon class="arrowhead" points="56,432 44,426.4 44,437.6" fill="black" transform="rotate(180,48,432)"/>
                  <polygon class="arrowhead" points="56,240 44,234.4 44,245.6" fill="black" transform="rotate(180,48,240)"/>
                  <polygon class="arrowhead" points="56,208 44,202.4 44,213.6" fill="black" transform="rotate(180,48,208)"/>
                  <polygon class="arrowhead" points="56,144 44,138.4 44,149.6" fill="black" transform="rotate(180,48,144)"/>
                  <polygon class="arrowhead" points="56,80 44,74.4 44,85.6" fill="black" transform="rotate(180,48,80)"/>
                  <g class="text">
                    <text x="40" y="36">Initiator</text>
                    <text x="408" y="36">Responder</text>
                    <text x="160" y="68">[DTLS</text>
                    <text x="236" y="68">CHUNK(INIT)]</text>
                    <text x="144" y="84">[DTLS</text>
                    <text x="236" y="84">CHUNK(INIT-ACK)]</text>
                    <text x="472" y="100">Using</text>
                    <text x="468" y="116">SCTP</text>
                    <text x="136" y="132">[DTLS</text>
                    <text x="212" y="132">CHUNK(COOKIE</text>
                    <text x="292" y="132">ECHO)]</text>
                    <text x="476" y="132">Chunks</text>
                    <text x="136" y="148">[DTLS</text>
                    <text x="212" y="148">CHUNK(COOKIE</text>
                    <text x="288" y="148">ACK)]</text>
                    <text x="164" y="196">[DATA(DTLS</text>
                    <text x="236" y="196">Client</text>
                    <text x="296" y="196">Hello)]</text>
                    <text x="108" y="212">[DATA(DTLS</text>
                    <text x="180" y="212">Server</text>
                    <text x="232" y="212">Hello</text>
                    <text x="272" y="212">...</text>
                    <text x="332" y="212">Finished)]</text>
                    <text x="464" y="212">New</text>
                    <text x="500" y="212">DTLS</text>
                    <text x="108" y="228">[DATA(DTLS</text>
                    <text x="200" y="228">Certificate</text>
                    <text x="264" y="228">...</text>
                    <text x="324" y="228">Finished)]</text>
                    <text x="492" y="228">Connection</text>
                    <text x="196" y="244">[DATA(DTLS</text>
                    <text x="264" y="244">ACK)]</text>
                    <text x="216" y="276">...</text>
                    <text x="216" y="292">...</text>
                    <text x="476" y="292">Derive</text>
                    <text x="520" y="292">new</text>
                    <text x="216" y="308">...</text>
                    <text x="480" y="308">Traffic</text>
                    <text x="528" y="308">and</text>
                    <text x="216" y="324">...</text>
                    <text x="480" y="324">Restart</text>
                    <text x="216" y="340">...</text>
                    <text x="468" y="340">DTLS</text>
                    <text x="504" y="340">Key</text>
                    <text x="216" y="356">...</text>
                    <text x="484" y="356">Contexts</text>
                    <text x="216" y="372">...</text>
                    <text x="216" y="388">...</text>
                    <text x="120" y="420">[DTLS</text>
                    <text x="204" y="420">CHUNK(DATA(APP</text>
                    <text x="296" y="420">DATA))]</text>
                    <text x="464" y="420">APP</text>
                    <text x="500" y="420">DATA</text>
                    <text x="128" y="436">[DTLS</text>
                    <text x="212" y="436">CHUNK(DATA(APP</text>
                    <text x="304" y="436">DATA))]</text>
                    <text x="216" y="452">...</text>
                    <text x="216" y="468">...</text>
                  </g>
                </svg>
              </artwork>
              <artwork type="ascii-art" align="center"><![CDATA[
Initiator                                     Responder
    |                                             | -.
    +------------[DTLS CHUNK(INIT)]-------------->|   |
    |<---------[DTLS CHUNK(INIT-ACK)]-------------+   +-------
    |                                             |   | Using
    |                                             |   | SCTP
    +---------[DTLS CHUNK(COOKIE ECHO)]---------->|   | Chunks
    |<--------[DTLS CHUNK(COOKIE ACK)]------------+   +-------
    |                                             | -'
    |                                             | -.
    +----------[DATA(DTLS Client Hello)]--------->|   |
    |<--[DATA(DTLS Server Hello ... Finished)]----+   | New DTLS
    +---[DATA(DTLS Certificate ... Finished)]---->|   | Connection
    |<-------------[DATA(DTLS ACK)]---------------+   +-----------
    |                                             | -'
    |                    ...                      | -.
    |                    ...                      |   | Derive new
    |                    ...                      |   | Traffic and
    |                    ...                      |   | Restart
    |                    ...                      |   | DTLS Key
    |                    ...                      |   | Contexts
    |                    ...                      |   +------------
    |                    ...                      | -'
    |                                             | -.
    +-------[DTLS CHUNK(DATA(APP DATA))]--------->|   | APP DATA
    +<-------[DTLS CHUNK(DATA(APP DATA))]---------+   +---------
    |                    ...                      |   |
    |                    ...                      |   |

]]></artwork>
            </artset>
          </figure>
          <t>The <xref target="sctp-assoc-restart-sequence"/> shows a successful
SCTP Association Restart.</t>
          <t>From procedure viewpoint the sequence is the following:</t>
          <ul spacing="normal">
            <li>
              <t>Initiator sends INIT (VTag=0), Responder replies INIT-ACK
both encrypted using Restart DTLS Key Context</t>
            </li>
            <li>
              <t>Initiator sends COOKIE-ECHO using DTLS CHUNK encrypted with the Key
tied to the Restart DTLS Key Context</t>
            </li>
            <li>
              <t>Responder replies with COOKIE-ACK using DTLS CHUNK encrypted with
the Restart DTLS Key Context</t>
            </li>
            <li>
              <t>Initiator sends handshakes for new Traffic DTLS connection as well
as new Restart DTLS connection.</t>
            </li>
            <li>
              <t>The SCTP Association goes into Established state and jumps directly
to PROTECTED state, and the ULP can resume communication protected
using the Restart DTLS Key Context.</t>
            </li>
            <li>
              <t>A new key-management DTLS handshake is initiated as soon as
PROTECTED state has been reached. When the Key-management DTLS
connection has been completed, new Traffic and Restart DTLS Key
Contexts are derived and installed using Epoch=3. The new Traffic
DTLS Key Context is being used for traffic as soon as the context
have been installed. When Traffic Key Context has been installed
the new Restart DTLS Key Context for epoch=3 are installed.</t>
            </li>
          </ul>
          <t>User Data for any ULP traffic MAY be initiated immediately after
COOKIE-ECHO/COOKIE-ACK handshake using the current Restart DTLS Key Context, that
is even before a new Traffic DTLS Key Context or a Restart DTLS Key Context have been
derived.  If a problem occurs before the new Restart DTLS Key Context has been
installed, the Association cannot be Restarted, thus it's RECOMMENDED
the new Restart DTLS Key Context to be installed as early as possible.</t>
          <t>Note that, different than the initial Association establishment,
the ULP traffic is permitted immediately after the
COOKIE-ECHO/COOKIE-ACK handshake, the reason is that the
validation has already been performed prior to the restart DTLS Key Context was
created.</t>
        </section>
      </section>
    </section>
    <section anchor="parallel-dtls">
      <name>Parallel DTLS Rekeying</name>
      <t>Rekeying in this specification is implemented by replacing the DTLS
connection getting old with a new one by first creating the new DTLS
connection, derive the new DTLS Key contexts, start using it,
then closing the old one.</t>
      <section anchor="criteria-for-rekeying">
        <name>Criteria for Rekeying</name>
        <t>The criteria for rekeying may vary depending on the ULP requirement on
security properties, chosen cipher suits etc. Therefore it is assumed
that the implementation will be configurable by the ULP to meet its demand.</t>
        <t>Likely criteria to impact the need for rekeying through the usage of
new DTLS connection are:</t>
        <ul spacing="normal">
          <li>
            <t>Time duration since last authentication of the peer</t>
          </li>
          <li>
            <t>Amount of data transferred since last forward secrecy preserving
rekeying</t>
          </li>
          <li>
            <t>The cipher suit's maximum key usage being reached.</t>
          </li>
        </ul>
      </section>
      <section anchor="procedure-for-rekeying">
        <name>Procedure for Rekeying</name>
        <t>This specification allows up to 2 DTLS connection to be active at the same
time for the current SCTP Association.
The following state machine applies.</t>
        <figure anchor="dtls-rekeying-state-diagram">
          <name>State Diagram for Rekeying</name>
          <artset>
            <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="592" width="544" viewBox="0 0 544 592" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,48 L 8,560" fill="none" stroke="black"/>
                <path d="M 96,32 L 96,64" fill="none" stroke="black"/>
                <path d="M 96,144 L 96,176" fill="none" stroke="black"/>
                <path d="M 96,272 L 96,304" fill="none" stroke="black"/>
                <path d="M 96,368 L 96,400" fill="none" stroke="black"/>
                <path d="M 96,480 L 96,512" fill="none" stroke="black"/>
                <path d="M 136,64 L 136,136" fill="none" stroke="black"/>
                <path d="M 136,176 L 136,264" fill="none" stroke="black"/>
                <path d="M 136,304 L 136,360" fill="none" stroke="black"/>
                <path d="M 136,400 L 136,472" fill="none" stroke="black"/>
                <path d="M 136,512 L 136,560" fill="none" stroke="black"/>
                <path d="M 176,32 L 176,64" fill="none" stroke="black"/>
                <path d="M 176,144 L 176,176" fill="none" stroke="black"/>
                <path d="M 176,272 L 176,304" fill="none" stroke="black"/>
                <path d="M 176,368 L 176,400" fill="none" stroke="black"/>
                <path d="M 176,480 L 176,512" fill="none" stroke="black"/>
                <path d="M 96,32 L 176,32" fill="none" stroke="black"/>
                <path d="M 8,48 L 88,48" fill="none" stroke="black"/>
                <path d="M 96,64 L 176,64" fill="none" stroke="black"/>
                <path d="M 96,144 L 176,144" fill="none" stroke="black"/>
                <path d="M 96,176 L 176,176" fill="none" stroke="black"/>
                <path d="M 96,272 L 176,272" fill="none" stroke="black"/>
                <path d="M 96,304 L 176,304" fill="none" stroke="black"/>
                <path d="M 96,368 L 176,368" fill="none" stroke="black"/>
                <path d="M 96,400 L 176,400" fill="none" stroke="black"/>
                <path d="M 96,480 L 176,480" fill="none" stroke="black"/>
                <path d="M 96,512 L 176,512" fill="none" stroke="black"/>
                <path d="M 8,560 L 136,560" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="144,472 132,466.4 132,477.6" fill="black" transform="rotate(90,136,472)"/>
                <polygon class="arrowhead" points="144,360 132,354.4 132,365.6" fill="black" transform="rotate(90,136,360)"/>
                <polygon class="arrowhead" points="144,264 132,258.4 132,269.6" fill="black" transform="rotate(90,136,264)"/>
                <polygon class="arrowhead" points="144,136 132,130.4 132,141.6" fill="black" transform="rotate(90,136,136)"/>
                <polygon class="arrowhead" points="96,48 84,42.4 84,53.6" fill="black" transform="rotate(0,88,48)"/>
                <g class="text">
                  <text x="136" y="52">YOUNG</text>
                  <text x="224" y="52">There's</text>
                  <text x="276" y="52">only</text>
                  <text x="312" y="52">one</text>
                  <text x="212" y="68">DTLS</text>
                  <text x="276" y="68">connection</text>
                  <text x="344" y="68">until</text>
                  <text x="216" y="84">aging</text>
                  <text x="276" y="84">criteria</text>
                  <text x="328" y="84">are</text>
                  <text x="360" y="84">met</text>
                  <text x="96" y="116">AGING</text>
                  <text x="180" y="116">REMOTE</text>
                  <text x="232" y="116">AGING</text>
                  <text x="132" y="164">AGED</text>
                  <text x="212" y="164">When</text>
                  <text x="244" y="164">in</text>
                  <text x="276" y="164">AGED</text>
                  <text x="320" y="164">state</text>
                  <text x="352" y="164">a</text>
                  <text x="376" y="164">new</text>
                  <text x="412" y="164">DTLS</text>
                  <text x="476" y="164">connection</text>
                  <text x="532" y="164">is</text>
                  <text x="216" y="180">added</text>
                  <text x="256" y="180">and</text>
                  <text x="308" y="180">deriving</text>
                  <text x="360" y="180">new</text>
                  <text x="408" y="180">Traffic</text>
                  <text x="460" y="180">DTLS</text>
                  <text x="496" y="180">Key</text>
                  <text x="224" y="196">Context</text>
                  <text x="268" y="196">as</text>
                  <text x="300" y="196">well</text>
                  <text x="332" y="196">as</text>
                  <text x="352" y="196">a</text>
                  <text x="376" y="196">new</text>
                  <text x="424" y="196">Restart</text>
                  <text x="476" y="196">DTLS</text>
                  <text x="512" y="196">Key</text>
                  <text x="72" y="212">NEW</text>
                  <text x="108" y="212">DTLS</text>
                  <text x="224" y="212">Context</text>
                  <text x="136" y="292">OLD</text>
                  <text x="204" y="292">In</text>
                  <text x="232" y="292">OLD</text>
                  <text x="272" y="292">state</text>
                  <text x="320" y="292">there</text>
                  <text x="360" y="292">are</text>
                  <text x="384" y="292">2</text>
                  <text x="420" y="292">active</text>
                  <text x="468" y="292">DTLS</text>
                  <text x="240" y="308">connections</text>
                  <text x="320" y="308">Traffic</text>
                  <text x="364" y="308">is</text>
                  <text x="412" y="308">switched</text>
                  <text x="460" y="308">to</text>
                  <text x="488" y="308">the</text>
                  <text x="520" y="308">new</text>
                  <text x="224" y="324">Traffic</text>
                  <text x="276" y="324">DTLS</text>
                  <text x="312" y="324">Key</text>
                  <text x="360" y="324">Context</text>
                  <text x="84" y="340">SWITCH</text>
                  <text x="136" y="388">DRAIN</text>
                  <text x="208" y="388">The</text>
                  <text x="244" y="388">aged</text>
                  <text x="284" y="388">DTLS</text>
                  <text x="348" y="388">connection</text>
                  <text x="204" y="404">is</text>
                  <text x="248" y="404">drained</text>
                  <text x="308" y="404">before</text>
                  <text x="360" y="404">being</text>
                  <text x="408" y="404">ready</text>
                  <text x="204" y="420">to</text>
                  <text x="228" y="420">be</text>
                  <text x="268" y="420">closed</text>
                  <text x="96" y="452">DRAINED</text>
                  <text x="164" y="452">DTLS</text>
                  <text x="236" y="452">close_notify</text>
                  <text x="132" y="500">DEAD</text>
                  <text x="204" y="500">In</text>
                  <text x="236" y="500">DEAD</text>
                  <text x="280" y="500">state</text>
                  <text x="320" y="500">the</text>
                  <text x="356" y="500">aged</text>
                  <text x="236" y="516">connection</text>
                  <text x="292" y="516">is</text>
                  <text x="332" y="516">closed</text>
                  <text x="88" y="548">REMOVED</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art"><![CDATA[
           +---------+
+--------->|  YOUNG  |  There's only one
|          +----+----+  DTLS connection until
|               |       aging criteria are met
|               |
|        AGING  |  REMOTE AGING
|               V
|          +---------+
|          |  AGED   |  When in AGED state a new DTLS connection is
|          +----+----+  added and deriving new Traffic DTLS Key
|               |       Context as well as a new Restart DTLS Key
|      NEW DTLS |       Context
|               |
|               |
|               V
|          +---------+
|          |   OLD   |  In OLD state there are 2 active DTLS
|          +----+----+  connections Traffic is switched to the new
|               |       Traffic DTLS Key Context
|      SWITCH   |
|               V
|          +---------+
|          |  DRAIN  |  The aged DTLS connection
|          +----+----+  is drained before being ready
|               |       to be closed
|               |
|       DRAINED | DTLS close_notify
|               V
|          +---------+
|          |  DEAD   |  In DEAD state the aged
|          +----+----+  connection is closed
|               |
|      REMOVED  |
+---------------+

]]></artwork>
          </artset>
        </figure>
        <t>Trigger for rekeying can either be a local AGING event, triggered by
the DTLS connection meeting the criteria for rekeying, or a REMOTE
AGING event, triggered by receiving a DTLS Connection handshake on the
DTLS Connection Index (next value) that would be used for new DTLS
connection.  In such case a new DTLS connection shall be added
according to <xref target="add-dtls-connection"/>.</t>
        <t>As soon as the new DTLS connection completes handshaking, and the
Traffic and Restart DTLS Key Contexts have been derived and installed,
the protection of the SCTP packets is moved from the old Traffic DTLS
Key Context, then the procedure for closing the old DTLS connection is
initiated, see <xref target="remove-dtls-connection"/>.</t>
      </section>
      <section anchor="race-condition-in-rekeying">
        <name>Race Condition in Rekeying</name>
        <t>A race condition may happen when both peers experience local AGING event at
the same time and start creation of a new DTLS connection.</t>
        <t>The race condition is solved as specified in <xref target="add-dtls-connection"/>.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <section anchor="general-1">
        <name>General</name>
        <t>The security considerations given in <xref target="RFC9147"/>, <xref target="RFC6347"/>, and
<xref target="RFC9260"/> also apply to this document. BCP 195 <xref target="RFC9325"/>
          <xref target="RFC8996"/> provides recommendations and requirements for improving
the security of deployed services that use DTLS. BCP 195 MUST be
followed which implies that DTLS 1.0 SHALL NOT be supported and are
therefore not defined.</t>
      </section>
      <section anchor="privacy-considerations">
        <name>Privacy Considerations</name>
        <t>Although DTLS in SCTP provides privacy for the actual user message as
well as almost all chunks, some fields are not confidentiality
protected.  In addition to the DTLS record header, the SCTP common
header and the DTLS chunk header are not confidentiality
protected. An attacker can correlate DTLS connections over the same
SCTP association using the SCTP common header.</t>
        <t>To provide identity protection it is RECOMMENDED that DTLS in SCTP is
used with certificate-based authentication in DTLS 1.3 <xref target="RFC9147"/> and
to not reuse tickets.  DTLS 1.3 with external PSK
authentication does not provide identity protection.</t>
        <t>By mandating ephemeral key exchange and cipher suites with
confidentiality DTLS in SCTP effectively mitigate many forms of
passive pervasive monitoring.  By recommending implementations to
frequently set up new DTLS connections with (EC)DHE force attackers to
do dynamic key exfiltration and limits the amount of compromised data
due to key compromise.</t>
      </section>
    </section>
    <section anchor="iana-consideration">
      <name>IANA Consideration</name>
      <t>This document requests the following registration.</t>
      <section anchor="sec-iana-psi">
        <name>SCTP Protection Solution Identifier</name>
        <t>IANA is requested to assign one SCTP Protection Solution Identifier to
identify the key-management defined in this document.</t>
        <table anchor="iana-psi">
          <name>SCTP Protection Solution Indicators</name>
          <thead>
            <tr>
              <th align="right">Identifier</th>
              <th align="left">Solution Name</th>
              <th align="left">Reference</th>
              <th align="left">Contact</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="right">4096</td>
              <td align="left">DTLS in SCTP Handshake</td>
              <td align="left">RFC-TBD</td>
              <td align="left">Draft Authors</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="tls-exporter-labels">
        <name>TLS Exporter Labels</name>
        <t>IANA is requested to register the following values in the TLS Exporter
Label Registry <xref target="RFC5705"/> with Reference RFC-TO-BE and empty Comment. The registry was at the time of writing located
at: https://www.iana.org/assignments/tls-parameters/tls-parameters.xhtml#exporter-labels</t>
        <table anchor="iana-tls-exporter">
          <name>TLS Exporter Labels</name>
          <thead>
            <tr>
              <th align="left">Value</th>
              <th align="left">DTLS-OK</th>
              <th align="left">Recommended</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">EXPORTER_DTLS_IN_SCTP_PRIMARY_CLIENT_KEY</td>
              <td align="left">Y</td>
              <td align="left">N</td>
            </tr>
            <tr>
              <td align="left">EXPORTER_DTLS_IN_SCTP_PRIMARY_CLIENT_IV</td>
              <td align="left">Y</td>
              <td align="left">N</td>
            </tr>
            <tr>
              <td align="left">EXPORTER_DTLS_IN_SCTP_PRIMARY_SERVER_KEY</td>
              <td align="left">Y</td>
              <td align="left">N</td>
            </tr>
            <tr>
              <td align="left">EXPORTER_DTLS_IN_SCTP_PRIMARY_SERVER_IV</td>
              <td align="left">Y</td>
              <td align="left">N</td>
            </tr>
            <tr>
              <td align="left">EXPORTER_DTLS_IN_SCTP_RESTART_CLIENT_KEY</td>
              <td align="left">Y</td>
              <td align="left">N</td>
            </tr>
            <tr>
              <td align="left">EXPORTER_DTLS_IN_SCTP_RESTART_CLIENT_IV</td>
              <td align="left">Y</td>
              <td align="left">N</td>
            </tr>
            <tr>
              <td align="left">EXPORTER_DTLS_IN_SCTP_RESTART_SERVER_KEY</td>
              <td align="left">Y</td>
              <td align="left">N</td>
            </tr>
            <tr>
              <td align="left">EXPORTER_DTLS_IN_SCTP_RESTART_SERVER_IV</td>
              <td align="left">Y</td>
              <td align="left">N</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC6347" target="https://www.rfc-editor.org/info/rfc6347" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6347.xml">
          <front>
            <title>Datagram Transport Layer Security Version 1.2</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="January" year="2012"/>
            <abstract>
              <t>This document specifies version 1.2 of the Datagram Transport Layer Security (DTLS) protocol. The DTLS protocol provides communications privacy for datagram protocols. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. The DTLS protocol is based on the Transport Layer Security (TLS) protocol and provides equivalent security guarantees. Datagram semantics of the underlying transport are preserved by the DTLS protocol. This document updates DTLS 1.0 to work with TLS version 1.2. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6347"/>
          <seriesInfo name="DOI" value="10.17487/RFC6347"/>
        </reference>
        <reference anchor="RFC8446" target="https://www.rfc-editor.org/info/rfc8446" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8446.xml">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8996" target="https://www.rfc-editor.org/info/rfc8996" xml:base="https://static.ietf.org/tmp/reference.RFC.8996.xml">
          <front>
            <title>Deprecating TLS 1.0 and TLS 1.1</title>
            <author fullname="K. Moriarty" initials="K." surname="Moriarty"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <date month="March" year="2021"/>
            <abstract>
              <t>This document formally deprecates Transport Layer Security (TLS) versions 1.0 (RFC 2246) and 1.1 (RFC 4346). Accordingly, those documents have been moved to Historic status. These versions lack support for current and recommended cryptographic algorithms and mechanisms, and various government and industry profiles of applications using TLS now mandate avoiding these old TLS versions. TLS version 1.2 became the recommended version for IETF protocols in 2008 (subsequently being obsoleted by TLS version 1.3 in 2018), providing sufficient time to transition away from older versions. Removing support for older versions from implementations reduces the attack surface, reduces opportunity for misconfiguration, and streamlines library and product maintenance.</t>
              <t>This document also deprecates Datagram TLS (DTLS) version 1.0 (RFC 4347) but not DTLS version 1.2, and there is no DTLS version 1.1.</t>
              <t>This document updates many RFCs that normatively refer to TLS version 1.0 or TLS version 1.1, as described herein. This document also updates the best practices for TLS usage in RFC 7525; hence, it is part of BCP 195.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="195"/>
          <seriesInfo name="RFC" value="8996"/>
          <seriesInfo name="DOI" value="10.17487/RFC8996"/>
        </reference>
        <reference anchor="RFC9147" target="https://www.rfc-editor.org/info/rfc9147" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9147.xml">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="RFC9260" target="https://www.rfc-editor.org/info/rfc9260" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9260.xml">
          <front>
            <title>Stream Control Transmission Protocol</title>
            <author fullname="R. Stewart" initials="R." surname="Stewart"/>
            <author fullname="M. Tüxen" initials="M." surname="Tüxen"/>
            <author fullname="K. Nielsen" initials="K." surname="Nielsen"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>This document describes the Stream Control Transmission Protocol (SCTP) and obsoletes RFC 4960. It incorporates the specification of the chunk flags registry from RFC 6096 and the specification of the I bit of DATA chunks from RFC 7053. Therefore, RFCs 6096 and 7053 are also obsoleted by this document. In addition, RFCs 4460 and 8540, which describe errata for SCTP, are obsoleted by this document.</t>
              <t>SCTP was originally designed to transport Public Switched Telephone Network (PSTN) signaling messages over IP networks. It is also suited to be used for other applications, for example, WebRTC.</t>
              <t>SCTP is a reliable transport protocol operating on top of a connectionless packet network, such as IP. It offers the following services to its users:</t>
              <t>The design of SCTP includes appropriate congestion avoidance behavior and resistance to flooding and masquerade attacks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9260"/>
          <seriesInfo name="DOI" value="10.17487/RFC9260"/>
        </reference>
        <reference anchor="RFC9325" target="https://www.rfc-editor.org/info/rfc9325" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9325.xml">
          <front>
            <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="November" year="2022"/>
            <abstract>
              <t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are used to protect data exchanged over a wide range of application protocols and can also form the basis for secure transport protocols. Over the years, the industry has witnessed several serious attacks on TLS and DTLS, including attacks on the most commonly used cipher suites and their modes of operation. This document provides the latest recommendations for ensuring the security of deployed services that use TLS and DTLS. These recommendations are applicable to the majority of use cases.</t>
              <t>RFC 7525, an earlier version of the TLS recommendations, was published when the industry was transitioning to TLS 1.2. Years later, this transition is largely complete, and TLS 1.3 is widely available. This document updates the guidance given the new environment and obsoletes RFC 7525. In addition, this document updates RFCs 5288 and 6066 in view of recent attacks.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="195"/>
          <seriesInfo name="RFC" value="9325"/>
          <seriesInfo name="DOI" value="10.17487/RFC9325"/>
        </reference>
        <reference anchor="I-D.westerlund-tsvwg-sctp-dtls-chunk" target="https://datatracker.ietf.orghttps://datatracker.ietf.org/doc/draft-westerlund-tsvwg-sctp-dtls-chunk/">
          <front>
            <title>Stream Control Transmission Protocol (SCTP) DTLS chunk</title>
            <author initials="M." surname="Westerlund" fullname="Magnus Westerlund">
              <organization>Ericsson</organization>
            </author>
            <author initials="J." surname="Preuß Mattsson" fullname="John Preuß Mattsson">
              <organization>Ericsson</organization>
            </author>
            <author initials="C." surname="Porfiri" fullname="Claudio Porfiri">
              <organization>Ericsson</organization>
            </author>
            <author initials="M." surname="Tüxen" fullname="Michael Tüxen">
              <organization>Münster University of Applied Sciences</organization>
            </author>
            <date year="2025" month="July"/>
          </front>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC3758" target="https://www.rfc-editor.org/info/rfc3758" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3758.xml">
          <front>
            <title>Stream Control Transmission Protocol (SCTP) Partial Reliability Extension</title>
            <author fullname="R. Stewart" initials="R." surname="Stewart"/>
            <author fullname="M. Ramalho" initials="M." surname="Ramalho"/>
            <author fullname="Q. Xie" initials="Q." surname="Xie"/>
            <author fullname="M. Tuexen" initials="M." surname="Tuexen"/>
            <author fullname="P. Conrad" initials="P." surname="Conrad"/>
            <date month="May" year="2004"/>
            <abstract>
              <t>This memo describes an extension to the Stream Control Transmission Protocol (SCTP) that allows an SCTP endpoint to signal to its peer that it should move the cumulative ack point forward. When both sides of an SCTP association support this extension, it can be used by an SCTP implementation to provide partially reliable data transmission service to an upper layer protocol. This memo describes the protocol extensions, which consist of a new parameter for INIT and INIT ACK, and a new FORWARD TSN chunk type, and provides one example of a partially reliable service that can be provided to the upper layer via this mechanism. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3758"/>
          <seriesInfo name="DOI" value="10.17487/RFC3758"/>
        </reference>
        <reference anchor="RFC4895" target="https://www.rfc-editor.org/info/rfc4895" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4895.xml">
          <front>
            <title>Authenticated Chunks for the Stream Control Transmission Protocol (SCTP)</title>
            <author fullname="M. Tuexen" initials="M." surname="Tuexen"/>
            <author fullname="R. Stewart" initials="R." surname="Stewart"/>
            <author fullname="P. Lei" initials="P." surname="Lei"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2007"/>
            <abstract>
              <t>This document describes a new chunk type, several parameters, and procedures for the Stream Control Transmission Protocol (SCTP). This new chunk type can be used to authenticate SCTP chunks by using shared keys between the sender and receiver. The new parameters are used to establish the shared keys. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4895"/>
          <seriesInfo name="DOI" value="10.17487/RFC4895"/>
        </reference>
        <reference anchor="RFC5061" target="https://www.rfc-editor.org/info/rfc5061" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5061.xml">
          <front>
            <title>Stream Control Transmission Protocol (SCTP) Dynamic Address Reconfiguration</title>
            <author fullname="R. Stewart" initials="R." surname="Stewart"/>
            <author fullname="Q. Xie" initials="Q." surname="Xie"/>
            <author fullname="M. Tuexen" initials="M." surname="Tuexen"/>
            <author fullname="S. Maruyama" initials="S." surname="Maruyama"/>
            <author fullname="M. Kozuka" initials="M." surname="Kozuka"/>
            <date month="September" year="2007"/>
            <abstract>
              <t>A local host may have multiple points of attachment to the Internet, giving it a degree of fault tolerance from hardware failures. Stream Control Transmission Protocol (SCTP) (RFC 4960) was developed to take full advantage of such a multi-homed host to provide a fast failover and association survivability in the face of such hardware failures. This document describes an extension to SCTP that will allow an SCTP stack to dynamically add an IP address to an SCTP association, dynamically delete an IP address from an SCTP association, and to request to set the primary address the peer will use when sending to an endpoint. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5061"/>
          <seriesInfo name="DOI" value="10.17487/RFC5061"/>
        </reference>
        <reference anchor="RFC5705" target="https://www.rfc-editor.org/info/rfc5705" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5705.xml">
          <front>
            <title>Keying Material Exporters for Transport Layer Security (TLS)</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="March" year="2010"/>
            <abstract>
              <t>A number of protocols wish to leverage Transport Layer Security (TLS) to perform key establishment but then use some of the keying material for their own purposes. This document describes a general mechanism for allowing that. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5705"/>
          <seriesInfo name="DOI" value="10.17487/RFC5705"/>
        </reference>
        <reference anchor="RFC6083" target="https://www.rfc-editor.org/info/rfc6083" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6083.xml">
          <front>
            <title>Datagram Transport Layer Security (DTLS) for Stream Control Transmission Protocol (SCTP)</title>
            <author fullname="M. Tuexen" initials="M." surname="Tuexen"/>
            <author fullname="R. Seggelmann" initials="R." surname="Seggelmann"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="January" year="2011"/>
            <abstract>
              <t>This document describes the usage of the Datagram Transport Layer Security (DTLS) protocol over the Stream Control Transmission Protocol (SCTP).</t>
              <t>DTLS over SCTP provides communications privacy for applications that use SCTP as their transport protocol and allows client/server applications to communicate in a way that is designed to prevent eavesdropping and detect tampering or message forgery.</t>
              <t>Applications using DTLS over SCTP can use almost all transport features provided by SCTP and its extensions. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6083"/>
          <seriesInfo name="DOI" value="10.17487/RFC6083"/>
        </reference>
        <reference anchor="RFC9525" target="https://www.rfc-editor.org/info/rfc9525" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9525.xml">
          <front>
            <title>Service Identity in TLS</title>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <author fullname="R. Salz" initials="R." surname="Salz"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>Many application technologies enable secure communication between two entities by means of Transport Layer Security (TLS) with Internet Public Key Infrastructure using X.509 (PKIX) certificates. This document specifies procedures for representing and verifying the identity of application services in such interactions.</t>
              <t>This document obsoletes RFC 6125.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9525"/>
          <seriesInfo name="DOI" value="10.17487/RFC9525"/>
        </reference>
        <reference anchor="I-D.ietf-tls-rfc8446bis" target="https://datatracker.ietf.org/doc/html/draft-ietf-tls-rfc8446bis-12" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-tls-rfc8446bis.xml">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Independent</organization>
            </author>
            <date day="17" month="February" year="2025"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery. This document updates RFCs 5705, 6066, 7627, and 8422 and obsoletes RFCs 5077, 5246, 6961, 8422, and 8446. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8446bis-12"/>
        </reference>
        <reference anchor="I-D.ietf-uta-rfc6125bis" target="https://datatracker.ietf.org/doc/html/draft-ietf-uta-rfc6125bis-15" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-uta-rfc6125bis.xml">
          <front>
            <title>Service Identity in TLS</title>
            <author fullname="Peter Saint-Andre" initials="P." surname="Saint-Andre">
              <organization>independent</organization>
            </author>
            <author fullname="Rich Salz" initials="R." surname="Salz">
              <organization>Akamai Technologies</organization>
            </author>
            <date day="10" month="August" year="2023"/>
            <abstract>
              <t>Many application technologies enable secure communication between two entities by means of Transport Layer Security (TLS) with Internet Public Key Infrastructure Using X.509 (PKIX) certificates. This document specifies procedures for representing and verifying the identity of application services in such interactions. This document obsoletes RFC 6125.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-uta-rfc6125bis-15"/>
        </reference>
        <reference anchor="ANSSI-DAT-NT-003" target="&lt;https://www.ssi.gouv.fr/uploads/2015/09/NT_IPsec_EN.pdf&gt;">
          <front>
            <title>Recommendations for securing networks with IPsec</title>
            <author initials="" surname="Agence nationale de la sécurité des systèmes d'information">
              <organization/>
            </author>
            <date year="2015" month="August"/>
          </front>
          <seriesInfo name="ANSSI Technical Report DAT-NT-003" value=""/>
        </reference>
        <reference anchor="KTH-NCSA" target="http://kth.diva-portal.org/smash/get/diva2:1902626/FULLTEXT01.pdf">
          <front>
            <title>On factoring integers, and computing discrete logarithms and orders, quantumly</title>
            <author initials="M." surname="Ekerå" fullname="Martin Ekerå">
              <organization/>
            </author>
            <date year="2024" month="October"/>
          </front>
          <seriesInfo name="KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Theoretical Computer Science, TCS. Swedish NCSA, Swedish Armed Forces." value=""/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
