<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.6.2 (Ruby 3.0.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-tsvwg-dtls-over-sctp-bis-03" category="std" consensus="true" obsoletes="6083" version="3">
  <!-- xml2rfc v2v3 conversion 3.12.3 -->
  <front>
    <title abbrev="DTLS over SCTP">Datagram Transport Layer Security (DTLS) over Stream Control Transmission Protocol (SCTP)</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-tsvwg-dtls-over-sctp-bis-03"/>
    <author initials="M." surname="Westerlund" fullname="Magnus Westerlund">
      <organization>Ericsson</organization>
      <address>
        <email>magnus.westerlund@ericsson.com</email>
      </address>
    </author>
    <author initials="J." surname="Preuß Mattsson" fullname="John Preuß Mattsson">
      <organization>Ericsson</organization>
      <address>
        <email>john.mattsson@ericsson.com</email>
      </address>
    </author>
    <author initials="C." surname="Porfiri" fullname="Claudio Porfiri">
      <organization>Ericsson</organization>
      <address>
        <email>claudio.porfiri@ericsson.com</email>
      </address>
    </author>
    <date year="2022" month="March" day="07"/>
    <area>Transport</area>
    <workgroup>TSVWG</workgroup>
    <abstract>
      <t>This document describes the usage of the Datagram Transport Layer
   Security (DTLS) protocol to protect user messages sent over the
   Stream Control Transmission Protocol (SCTP). It is an improved
   update of the existing rfc6083.</t>
      <t>DTLS over SCTP provides mutual authentication, confidentiality,
   integrity protection, and replay protection for applications that
   use SCTP as their transport protocol and allows client/server
   applications to communicate in a way that is designed to give
   communications privacy and to prevent eavesdropping and detect
   tampering or message forgery.</t>
      <t>Applications using DTLS over SCTP can use almost all transport
   features provided by SCTP and its extensions. This document intends
   to obsolete RFC 6083 and removes the 16 kB limitation due to DTLS
   on user message size by defining a secure user message
   fragmentation so that multiple DTLS records can be used to protect
   a single user message. It further updates the DTLS versions to use,
   as well as the HMAC algorithms for SCTP-AUTH, and simplifies secure
   implementation by some stricter requirements on the establishment
   procedures.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/gloinul/draft-westerlund-tsvwg-dtls-over-sctp-bis"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <section anchor="overview">
        <name>Overview</name>
        <t>This document describes the usage of the Datagram Transport Layer
   Security (DTLS) protocol, as defined in DTLS 1.2 <xref target="RFC6347"/>, and
   DTLS 1.3 <xref target="I-D.ietf-tls-dtls13"/>, over the Stream Control
   Transmission Protocol (SCTP), as defined in <xref target="RFC4960"/> with
   Authenticated Chunks for SCTP (SCTP-AUTH) <xref target="RFC4895"/>.</t>
        <t>This specification provides mutual authentication of endpoints,
   confidentiality, integrity protection, and replay protection of
   user messages for applications that use SCTP as their transport
   protocol.  Thus, it allows client/server applications to communicate
   in a way that is designed to give communications privacy and to
   prevent eavesdropping and detect tampering or message
   forgery. DTLS/SCTP uses DTLS for mutual authentication, key
   exchange with forward secrecy for SCTP-AUTH, and
   confidentiality of user messages. DTLS/SCTP use SCTP and SCTP-AUTH
   for integrity protection and replay protection of user messages.</t>
        <t>Applications using DTLS over SCTP can use almost all transport
   features provided by SCTP and its extensions. DTLS/SCTP supports:</t>
        <ul spacing="normal">
          <li>preservation of message boundaries.</li>
          <li>a large number of unidirectional and bidirectional streams.</li>
          <li>ordered and unordered delivery of SCTP user messages.</li>
          <li>the partial reliability extension as defined in <xref target="RFC3758"/>.</li>
          <li>the dynamic address reconfiguration extension as defined in
 <xref target="RFC5061"/>.</li>
          <li>User messages of any size.</li>
        </ul>
        <t>The method described in this document requires that the SCTP
   implementation supports the optional feature of fragmentation of
   SCTP user messages as defined in <xref target="RFC4960"/>. The implementation is
   required to have an SCTP API (for example the one described in
   <xref target="RFC6458"/>) that supports partial user message delivery and also
   recommended that I-DATA chunks as defined in <xref target="RFC8260"/> is used to
   efficiently implement and support larger user messages.</t>
        <t>To simplify implementation and reduce the risk for security holes,
   limitations have been defined such that STARTTLS as specified in
   <xref target="RFC3788"/> is no longer supported.</t>
        <section anchor="comparison-with-tls-for-sctp">
          <name>Comparison with TLS for SCTP</name>
          <t>TLS, from which DTLS was derived, is designed to run on top of a
   byte-stream-oriented transport protocol providing a reliable, in-
   sequence delivery. TLS over SCTP as described in <xref target="RFC3436"/> has
   some serious limitations:</t>
          <ul spacing="normal">
            <li>It does not support the unordered delivery of SCTP user messages.</li>
            <li>It does not support partial reliability as defined in
<xref target="RFC3758"/>.</li>
            <li>It only supports the usage of the same number of streams in both
 directions.</li>
            <li>It uses a TLS connection for every bidirectional stream, which
 requires a substantial amount of resources and message exchanges
 if a large number of streams is used.</li>
          </ul>
        </section>
        <section anchor="changes-from-rfc-6083">
          <name>Changes from RFC 6083</name>
          <t>The DTLS over SCTP solution defined in RFC 6083 had the following
   limitations:</t>
          <ul spacing="normal">
            <li>The maximum user message size is 2^14 (16384) bytes, which is a single
 DTLS record limit.</li>
            <li>DTLS 1.0 has been deprecated for RFC 6083 requiring at least DTLS
1.2 <xref target="RFC8996"/>. This creates additional limitation as discussed
in <xref target="DTLS-version"/>.</li>
            <li>DTLS messages that don't contain protected user message data
where limited to only be sent on Stream 0 and requiring that
stream to be in-order delivery which could potentially impact
applicaitons.</li>
          </ul>
          <t>This specification defines the following changes compared with RFC
   6083:</t>
          <ul spacing="normal">
            <li>Removes the limitations on user messages sizes by defining a secure
fragmentation mechanism. It is optional to support message sizes
over 2^64-1 bytes.</li>
            <li>Enable DTLS key-change without requiring draining all inflight
user message from SCTP.</li>
            <li>Mandates that more modern DTLS version are used (DTLS 1.2 or
1.3)</li>
            <li>Mandates support of modern HMAC algorithm (SHA-256) in the SCTP
authentication extension <xref target="RFC4895"/>.</li>
            <li>Recommends support of <xref target="RFC8260"/> to enable interleaving of large
SCTP user messages to avoid scheduling issues.</li>
            <li>Applies stricter requirements on always using DTLS for all user
messages in the SCTP association.</li>
            <li>Requires that SCTP-AUTH is applied to all SCTP Chunks that can be
authenticated.</li>
            <li>Requires support of partial delivery of user messages.</li>
          </ul>
        </section>
      </section>
      <section anchor="DTLS-version">
        <name>DTLS Version</name>
        <t>Using DTLS 1.2 instead of using DTLS 1.0 limits the lifetime of a
   DTLS connection and the data volume which can be transferred over a
   DTLS connection.  This is caused by:</t>
        <ul spacing="normal">
          <li>The number of renegotiations in DTLS 1.2 is limited to 65534
compared to unlimited in DTLS 1.0.</li>
          <li>While the AEAD limits in DTLS 1.3 does not formally apply to DTLS
1.2 the mathematical limits apply equally well to DTLS 1.2.</li>
        </ul>
        <t>DTLS 1.3 comes with a large number of significant changes.</t>
        <ul spacing="normal">
          <li>Renegotiations are not supported and instead partly replaced by
KeyUpdates. The number of KeyUpdates is limited to 2^64.</li>
          <li>Strict AEAD significantly limits on how much many packets can be
sent before rekeying.</li>
        </ul>
        <t>Many applications using DTLS/SCTP are of semi-permanent nature and
   use SCTP associations with expected lifetimes of months or even
   years, and where there is a significant cost of bringing down the
   SCTP association in order to restart it. Such DTLS/SCTP usages that
   need:</t>
        <ul spacing="normal">
          <li>Periodic re-authentication and transfer of revocation information
of both endpoints (not only the DTLS client).</li>
          <li>Periodic rerunning of Diffie-Hellman key-exchange to provide
forward secrecy and mitigate static key exfiltration attacks.</li>
          <li>Perform SCTP-AUTH rekeying.</li>
        </ul>
        <t>At the time of publication DTLS 1.3 does not support any of these,
   where DTLS 1.2 renegotiation functionality can provide this
   functionality in the context of DTLS/SCTP. To address these
   requirements from semi-permanent applications, this document use
   several overlapping DTLS connections with either DTLS 1.2 or
   1.3. Having uniform procedures reduces the impact when upgrading
   from 1.2 to 1.3 and avoids using the renegotiation mechanism which
   is disabled by default in many DTLS implementations.</t>
        <t>To address known vulnerabilities in DTLS 1.2 this document
   describes and mandates implementation constraints on ciphers and
   protocol options. The DTLS 1.2 renegotiation mechanism is forbidden
   to be used as it creates need for additional mechanism to handle
   race conditions and interactions between using DTLS connections in
   parallel.</t>
        <t>In the rest of the document, unless the version of DTLS is
   specifically called out the text applies to both versions of DTLS.</t>
      </section>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>This document uses the following terms:</t>
        <t>Association:  An SCTP association.</t>
        <t>Connection: An DTLS connection. It is uniquely identified by a
   connection identifier.</t>
        <t>Stream: A unidirectional stream of an SCTP association.  It is
   uniquely identified by a stream identifier.</t>
      </section>
      <section anchor="abbreviations">
        <name>Abbreviations</name>
        <t>AEAD:  Authenticated Encryption with Associated Data</t>
        <t>DTLS:  Datagram Transport Layer Security</t>
        <t>HMAC: Keyed-Hash Message Authentication Code</t>
        <t>MTU:  Maximum Transmission Unit</t>
        <t>PPID:  Payload Protocol Identifier</t>
        <t>SCTP:  Stream Control Transmission Protocol</t>
        <t>SCTP-AUTH: Authenticated Chunks for SCTP</t>
        <t>TCP:  Transmission Control Protocol</t>
        <t>TLS:  Transport Layer Security</t>
        <t>ULP:  Upper Layer Protocol</t>
      </section>
    </section>
    <section anchor="conventions">
      <name>Conventions</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
   "OPTIONAL" in this document are to be interpreted as described in
   BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all
   capitals, as shown here.</t>
    </section>
    <section anchor="dtls-considerations">
      <name>DTLS Considerations</name>
      <section anchor="version-of-dtls">
        <name>Version of DTLS</name>
        <t>This document defines the usage of either DTLS 1.3
   <xref target="I-D.ietf-tls-dtls13"/>, or DTLS 1.2 <xref target="RFC6347"/>.
   Earlier versions of DTLS MUST NOT be used (see <xref target="RFC8996"/>).
   DTLS 1.3 is RECOMMENDED for security and performance reasons.
   It is expected that DTLS/SCTP as described in this document will work with
   future versions of DTLS.</t>
      </section>
      <section anchor="cipher-suites-and-cryptographic-parameters">
        <name>Cipher Suites and Cryptographic Parameters</name>
        <t>For DTLS 1.2, the cipher suites forbidden by <xref target="RFC7540"/> MUST NOT
   be used. For all versions of DTLS, cryptographic parameters giving
   confidentiality and forward secrecy MUST be used.</t>
      </section>
      <section anchor="Msg-size">
        <name>Message Sizes</name>
        <t>DTLS/SCTP, automatically fragments and reassembles user
   messages. This specification defines how to fragment the user
   messages into DTLS records, where each DTLS record allows a
   maximum of 2^14 protected bytes. Each DTLS record adds some
   overhead, thus using records of maximum possible size are
   recommended to minimize the transmitted overhead. DTLS 1.3
   has much less overhead than DTLS 1.2 per record.</t>
        <t>The sequence of DTLS records is then fragmented into DATA or I-DATA
   Chunks to fit the path MTU by SCTP. These changes ensures that
   DTLS/SCTP has the same capability as SCTP to support user messages
   of any size. However, to simplify implementations it is OPTIONAL to
   support user messages larger than 2^64-1 bytes. This is to allow
   implementation to assume that 64-bit length fields and offset
   pointers will be sufficient.</t>
        <t>Another implementation dependent exception to the support of any
   user message size is the SCTP-API defined in <xref target="RFC6458"/>. That API
   does not allow changing the SCTP-AUTH key used to send a particular
   user message. Thus, the user message size must be limited such that
   completion of the user message can occur within a short time frame
   from the establishment of the new DTLS connection
   (<xref target="Parallel-Dtls"/>).</t>
        <t>The security operations and reassembly process requires that the
   protected user message, i.e., with DTLS record overhead, is buffered
   in the receiver. This buffer space will thus put a limit on the
   largest size of plain text user message that can be transferred
   securely. However, by mandating the use of the partial delivery of
   user messages from SCTP and assuming that no two messages received
   on the same stream are interleaved (as it is the case when using
   the API defined in <xref target="RFC6458"/>) the required buffering prior to
   DTLS processing can be limited to a single DTLS record per used
   incoming stream. This enables the DTLS/SCTP implementation to
   provide the Upper Layer Protocol (ULP) with each DTLS record's
   content when it has been decrypted and its integrity been verified
   enabling partial user message delivery to the ULP. Implementations
   can trade-off buffer memory requirements in the DTLS layer with
   transport overhead by using smaller DTLS records.</t>
        <t>The DTLS/SCTP implementation is expected to behave very similar to
   just SCTP when it comes to handling of user messages and dealing
   with large user messages and their reassembly and
   processing. Making it the ULP responsible for handling any resource
   contention related to large user messages.</t>
      </section>
      <section anchor="replay-protection">
        <name>Replay Protection</name>
        <t>SCTP-AUTH <xref target="RFC4895"/> does not have explicit replay
   protection. However, the combination of SCTP-AUTH's protection of
   DATA or I-DATA chunks and SCTP user message handling will prevent
   third party attempts to inject or replay SCTP packets resulting in
   impact on the received protected user message. In fact, this
   document's solution is dependent on SCTP-AUTH and SCTP to prevent
   reordering, duplication, and removal of the DTLS records within
   each protected user message.  This includes detection of changes to
   what DTLS records start and end the SCTP user message, and removal of
   DTLS records before an increment to the epoch.  Without SCTP-AUTH,
   these would all have required explicit handling.</t>
        <t>DTLS optionally supports record replay detection. Such replay
   detection could result in the DTLS layer dropping valid messages
   received outside of the DTLS replay window. As DTLS/SCTP provides
   replay protection even without DTLS replay protection, the replay
   detection of DTLS MUST NOT be used.</t>
      </section>
      <section anchor="path-mtu-discovery">
        <name>Path MTU Discovery</name>
        <t>DTLS Path MTU Discovery MUST NOT be used.  Since SCTP provides Path
   MTU discovery and fragmentation/reassembly for user messages, and
   specified in <xref target="Msg-size"/>, DTLS can send maximum sized DTLS
   Records.</t>
      </section>
      <section anchor="retransmission-of-messages">
        <name>Retransmission of Messages</name>
        <t>SCTP provides a reliable and in-sequence transport service for DTLS
   messages that require it.  See <xref target="Stream-Usage"/>.  Therefore, DTLS
   procedures for retransmissions MUST NOT be used.</t>
      </section>
    </section>
    <section anchor="sctp-considerations">
      <name>SCTP Considerations</name>
      <section anchor="Mapping-DTLS">
        <name>Mapping of DTLS Records</name>
        <t>The SCTP implementation MUST support fragmentation of user messages
   using DATA <xref target="RFC4960"/>, and optionally I-DATA <xref target="RFC8260"/> chunks.</t>
        <t>DTLS/SCTP works as a shim layer between the user message API and
   SCTP. On the sender side a user message is split
   into fragments m0, m1, m2, each no larger than 2^14 = 16384
   bytes.</t>
        <artwork><![CDATA[
   m0 | m1 | m2 | ... = user_message
]]></artwork>
        <t>The resulting fragments are protected with DTLS and the records are
   concatenated</t>
        <artwork><![CDATA[
   user_message' = DTLS( m0 ) | DTLS( m1 ) | DTLS( m2 ) ...
]]></artwork>
        <t>The new user_message', i.e., the protected user message, is the input
   to SCTP.</t>
        <t>On the receiving side, the length field in each DTLS record can be
   used to determine the boundaries between DTLS records. DTLS can
   decrypt individual records or a concatenated sequence of records.
   The last DTLS record can be found by subtracting the length of
   individual records from the length of user_message'. Whether to
   decrypt individual records, sequences of records, or the whole
   user_message' is left to the implementation. The output from the
   DTLS decryption(s) is the fragments m0, m1, m2 ...
   The user_message is reassembled from decrypted DTLS records as
   user_message = m0 | m1 | m2 ... There are three failure cases an
   implementation needs to detect and then act on:</t>
        <ol spacing="normal" type="1"><li>Failure in decryption and integrity verification process of any
   DTLS record. Due to SCTP-AUTH preventing delivery of injected or
   corrupt fragments of the protected user message this should only
   occur in case of implementation errors or internal hardware
   failures or the necessary security context has been prematurely
   discarded.</li>
          <li>In case the SCTP layer indicates an end to a user message,
   e.g., when receiving a MSG_EOR in a recvmsg() call when using the
   API described in <xref target="RFC6458"/>, and the last buffered DTLS record
   length field does not match, i.e., the DTLS record is incomplete.</li>
          <li>Unable to perform the decryption processes due to lack of
   resources, such as memory, and have to abandon the user message
   fragment. This specification is defined such that the needed
   resources for the DTLS/SCTP operations are bounded for a given
   number of concurrent transmitted SCTP streams or unordered user
   messages.</li>
        </ol>
        <t>The above failure cases all result in the receiver failing to
   recreate the full user message. This is a failure of the transport
   service that is not possible to recover from in the DTLS/SCTP layer
   and the sender could believe the complete message have been
   delivered. This error MUST NOT be ignored, as SCTP lacks any
   facility to declare a failure on a specific stream or user message,
   the DTLS connection and the SCTP association SHOULD be
   terminated. A valid exception to the termination of the SCTP
   association is if the receiver is capable of notifying the ULP
   about the failure in delivery and the ULP is capable of recovering
   from this failure.</t>
        <t>Note that if the SCTP extension for Partial Reliability (PR-SCTP)
   <xref target="RFC3758"/> is used for a user message, user message may be
   partially delivered or abandoned. These failures are not a reason
   for terminating the DTLS connection and SCTP association.</t>
        <t>The DTLS Connection ID MUST be negotiated
   (<xref target="I-D.ietf-tls-dtls-connection-id"/> or Section 9 of
   <xref target="I-D.ietf-tls-dtls13"/>). If DTLS 1.3 is used, the length field in
   the record layer MUST be included in all records. A 16-bit sequence
   number SHOULD be used rather than 8-bit to minimize issues with DTLS
   record sequence number wrapping.</t>
        <t>The ULP may use multiple messages simultanous, and the progress and
   delivery of these messages are progressing indepentely, thus the
   recieving DTLS/SCTP implementation may not receive records in order
   in case of packet loss. Assuming that the sender will send the DTLS
   records in order the DTLS records where created (which may not be
   certain in some implementations), then there is a risk that DTLS
   sequence number have wrapped if the amount of data in flight is
   more than the sequence number covers.  Thus, for 8-bit sequence
   number space with 16384 bytes records the receiver window only
   needs to be 256*16384 = 4,194,304 bytes for this risk to defintely
   exist. While a 16-bit sequence number should not have any sequence
   number wraps for receiver windows up to 1 Gbyte. The DTLS/SCTP may
   not be tightly integrated and the DTLS records may not be requested
   to be sent in strict sequence order, in these case additional
   guard ranges are needed.</t>
        <t>Also, if smaller DTLS records are used, this limit will be
   correspondingly reduced. The DTLS/SCTP Sender needs to choose
   sequence number length and DTLS Record size so that the product is
   larger than the used receiver window, preferably twice as
   large. Receiver implementations that are offering receiver windows
   larger than the product 65536*16384 bytes MUST be capable of
   handling sequence number wraps through trial decoding with a lower
   values in the higher bits of the extended sequence number.</t>
        <t>Section 4 of <xref target="I-D.ietf-tls-dtls-connection-id"/> states "If,
   however, an implementation chooses to receive different lengths of
   CID, the assigned CID values must be self-delineating since there
   is no other mechanism available to determine what connection (and
   thus, what CID length) is in use.". As this solution requires
   multiple connection IDs, using a zero-length CID will be highly
   problematic as it could result in that any DTLS records with a zero
   length CID ends up in another DTLS connection context, and there
   fail the decryption and integrity verification. And in that case to
   avoid losing the DTLS record, it would have to be forwarded to the
   zero-length CID using DTLS Connection and decryption and validation
   must be tried. Resulting in higher resource utilization. Thus, it
   is RECOMMENDED to not use the zero length CID values and instead
   use a single common length for the CID values. A single byte should
   be sufficient, as reuse of old CIDs is possible as long as the
   implementation ensure they are not used in near time to the
   previous usage.</t>
      </section>
      <section anchor="dtls-connection-handling">
        <name>DTLS Connection Handling</name>
        <t>DTLS/SCTP is negotiated on SCTP level as an adaptation layer
   <xref target="Negotiation"/>. After a succesful negotiation of the DTLS/SCTP
   during SCTP association establishment, a DTLS connection MUST be
   established prior to transmission of any ULP user messages. All
   DTLS connections are terminated when the SCTP association is
   terminated. A DTLS connection MUST NOT span multiple SCTP
   associations.</t>
        <t>As it is required to establish the DTLS connection at the beginning
   of the SCTP association, either of the peers should never send any
   SCTP user messages that are not protected by DTLS. So, the case
   that an endpoint receives data that is not either DTLS messages or
   protected user messages in the form of a sequence of DTLS Records
   on any stream is a protocol violation. The receiver MAY terminate
   the SCTP association due to this protocol
   violation. Implementations that does not have a DTLS endpoint
   immediately ready on SCTP handshake completion will have to ensure
   correct caching of the messages until the DTLS endpoint is ready.</t>
        <t>Whenever a mutual authentication, updated security parameters,
   rerun of Diffie-Hellman key-exchange , or SCTP-AUTH rekeying is
   needed, a new DTLS connection is instead setup in parallel with the
   old connection (i.e., there may be up to two simultaneous DTLS
   connections within one association).</t>
      </section>
      <section anchor="payload-protocol-identifier-usage">
        <name>Payload Protocol Identifier Usage</name>
        <t>SCTP Payload Protocol Identifiers are assigned by IANA.
   Application protocols using DTLS over SCTP SHOULD register and use
   a separate Payload Protocol Identifier (PPID) and SHOULD NOT reuse
   the PPID that they registered for running directly over SCTP.</t>
        <t>Using the same PPID does no harm as DTLS/SCTP requires all user
   mesages being DTLS protected and knows that DTLS is used.  However,
   for protocol analyzers, for example, it is much easier if a
   separate PPID is used and avoids different behavior from
   <xref target="RFC6083"/>. This means, in particular, that there is no specific
   PPID for DTLS.</t>
        <t>Messages that are exchanged between DTLS/SCTP peers not containing
   ULP user messages shall use PPID=0 according to section 3.3.1 of
   <xref target="RFC4960"/> as no application identifier can be specified by the
   upper layer for this payload data.</t>
      </section>
      <section anchor="Stream-Usage">
        <name>Stream Usage</name>
        <t>DTLS 1.3 protects the actual content type of the DTLS record and
   have therefore omitted the non-protected content type field. Thus,
   it is not possible to determine which content type the DTLS record
   has on SCTP level. For DTLS 1.2 ULP user messages will be carried
   in DTLS records with content type "application_data".</t>
        <t>DTLS Records carrying protected user message fragments MUST be sent
   in the by ULP indicated SCTP stream and user message. The ULP has
   no limitations in using SCTP facilities for stream and user
   messages. DTLS records of other types MAY be sent on any stream. It
   MAY also be sent in its own SCTP user message as well as
   interleaved with other DTLS records carrying protected user
   messages. Thus, it is allowed to insert between protected user
   message fragments DTLS records of other types as the DTLS receiver
   will process these and not result in any user message data being
   inserted into the ULP's user message. However, DTLS messages of
   other types than protected user message MUST be sent reliable, so
   the DTLS record can only be interleaved in case the ULP user
   message is sent as reliable.</t>
        <t>DTLS is capable of handling reordering of the DTLS
   records. However, depending on stream properties and which user
   message DTLS records of other types are sent in may impact in which
   order and how quickly they are possible to process. Using a stream
   with in-order delivery will ensure that the DTLS Records are
   delivered in the order they are sent in user messages. Thus,
   ensuring that if there are DTLS records that need to be delivered
   in particular order it can be ensured. Alternatively, if it is
   desired that a DTLS record is delvired as early as possible
   avoiding in-order streams with queued messages and considering
   stream priorities can result in faster delviery.</t>
        <t>A simple solution avoiding any protocol issue are to send all DTLS
   messages that are not protected user message fragments is to pick a
   stream not used by the ULP, send the DTLS messages in their own
   user messages with in order delivery. That mimics the RFC 6083
   behavior without impacting the ULP.</t>
      </section>
      <section anchor="chunk-handling">
        <name>Chunk Handling</name>
        <t>DATA chunks of SCTP MUST be sent in an authenticated way as
   described in SCTP-AUTH <xref target="RFC4895"/>.  All other chunks that can be
   authenticated, i.e., all chunk types that can be listed in the Chunk
   List Parameter <xref target="RFC4895"/>, MUST also be sent in an authenticated
   way.  This makes sure that an attacker cannot modify the stream in
   which a message is sent or affect the ordered/unordered delivery of
   the message.</t>
        <t>If PR-SCTP as defined in <xref target="RFC3758"/> is used, FORWARD-TSN chunks
   MUST also be sent in an authenticated way as described in
   <xref target="RFC4895"/>.  This makes sure that it is not possible for an
   attacker to drop messages and use forged FORWARD-TSN, SACK, and/or
   SHUTDOWN chunks to hide this dropping.</t>
        <t>I-DATA chunk type as defined in <xref target="RFC8260"/> is RECOMMENDED to be
   supported to avoid some of the down sides that large user messages
   have on blocking transmission of later arriving high priority user
   messages. However, the support is not mandated and negotiated
   independently from DTLS/SCTP. If I-DATA chunks are used, then
   they MUST be sent in an authenticated way as described in
   <xref target="RFC4895"/>.</t>
      </section>
      <section anchor="sctp-auth-hash-function">
        <name>SCTP-AUTH Hash Function</name>
        <t>When using DTLS/SCTP, the SHA-256 Message Digest Algorithm MUST be
   supported in the SCTP-AUTH <xref target="RFC4895"/> implementation. SHA-1 MUST
   NOT be used when using DTLS/SCTP. <xref target="RFC4895"/> requires support and
   inclusion of SHA-1 in the HMAC-ALGO parameter, thus, to meet
   both requirements the HMAC-ALGO parameter will include both SHA-256
   and SHA-1 with SHA-256 listed prior to SHA-1 to indicate the
   preference.</t>
      </section>
      <section anchor="Parallel-Dtls">
        <name>Parallel DTLS connections</name>
        <t>To enable SCTP-AUTH rekeying, periodic authentication of both
   endpoints, and force attackers to dynamic key extraction
   <xref target="RFC7624"/>, DTLS/SCTP per this specification defines the usage of
   parallel DTLS connections over the same SCTP association. This
   solution ensures that there are no limitations to the lifetime of
   the SCTP association due to DTLS, it also avoids dependency on
   version specific DTLS mechanisms such as renegotiation in DTLS 1.2,
   which is disabled by default in many DTLS implementations, or
   post-handshake messages in DTLS 1.3, which does not allow periodic
   mutual endpoint re-authentication or re-keying of
   SCTP-AUTH. Parallel DTLS connections enable opening a new DTLS
   connection performing a handshake, while the existing DTLS
   connection is kept in place.  In DTLS 1.3 the handshake MAY be a
   full handshake or a resumption handshake and resumption can be done
   while the original connection is still open. In DTLS 1.2 the
   handshake MUST be a full handshake. On handshake completion switch
   to the security context of the new DTLS connection and then ensure
   delivery of all the SCTP chunks using the old DTLS connections
   security context. When that has been achieved close the old DTLS
   connection and discard the related security context.</t>
        <t>As specified in <xref target="Mapping-DTLS"/> the usage of DTLS connection ID is
   required to ensure that the receiver can correctly identify the
   DTLS connection and its security context when performing its
   de-protection operations. There is also only a single SCTP-AUTH key
   exported per DTLS connection ensuring that there is clear mapping
   between the DTLS connection ID and the SCTP-AUTH security context for
   each key-id.</t>
        <t>Application writers should be aware that establishing a new DTLS
   connections may result in changes of security parameters.  See
   <xref target="sec-Consideration"/> for security considerations regarding rekeying.</t>
        <t>A DTLS/SCTP Endpoint MUST NOT have more than two DTLS connections
   open at the same time. Either of the endpoints MAY initiate a new
   DTLS connection by performing a full DTLS handshake. As either
   endpoint can initiate a DTLS handshake on either side at the same
   time, either endpoint may receive a DTLS ClientHello when it has
   sent its own ClientHello. In this case the ClientHello from the
   endpoint that had the DTLS Client role in the establishment of the
   existing DTLS connection shall be continued to be processed and the
   other dropped.</t>
        <t>When performing the DTLS handshake the endpoint MUST verify that
   the peer identifies using the same identity as in the previous DTLS
   connection.</t>
        <t>When the DTLS handshake has been completed, a new SCTP-AUTH key
   will be exported per <xref target="handling-endpoint-secret"/> and the new DTLS
   connection MUST be used for the DTLS protection operation of any
   future protected ULP user message. The endpoint is RECOMMENDED to use
   the security context of the new DTLS connection for any DTLS
   protection operation occurring after the completed handshake. The
   new SCTP-AUTH key SHALL be used for any SCTP user message being
   sent after the DTLS handshake has completed. There is a possibility
   to use the new SCTP-AUTH key for any SCTP packets part of an SCTP
   user message that was initiated but not yet fully transmitted prior
   to the completion of the new DTLS handshake, however the API
   defined in <xref target="RFC6458"/> is not supporting switching the SCTP-AUTH
   key on the sender side. Any SCTP-AUTH receiver implementation is
   expected to be able to select key on SCTP packet basis.</t>
        <t>The DTLS/SCTP endpoint will indicate to its peer when the previous
   DTLS connection and its context are no longer needed for receiving
   any more data from this endpoint. This is done by having DTLS to
   send a DTLS close_notify alert. The endpoint MUST NOT send the
   close_notify until the following two conditions are fulfilled:</t>
        <ol spacing="normal" type="1"><li>All SCTP packets containing part of any DTLS record or message
protected using the security context of this DTLS connection
have been acknowledged in a non-renegable way.</li>
          <li>All SCTP packets using the SCTP-AUTH key associated with the
security context of this DTLS connection have been acknowledged
in a non-renegable way.</li>
        </ol>
        <t>Note: For DTLS 1.2 receiving Close_notify will close the DTLS
   connection for further writes and requires the immediate generation
   of a Close_notify. Thus, this forces the DTLS/SCTP to protect any
   buffered data on DTLS/SCTP layer not yet protected to use the new
   DTLS connection. In addition the DTLS/SCTP layer will have to
   buffer the close_notify generated by the shuting down DTLS
   connection and also not discard the SCTP-AUTH key until it has
   fulfilled the delivery of the data protected by the closing DTLS
   connection security context.</t>
        <t>SCTP implementations exposing APIs like <xref target="RFC6458"/> fulfilling
   these conditions requires draining the SCTP association of all
   outstanding data after having completed all the user messages using
   the previous SCTP-AUTH key identifier. Relying on the
   SCTP_SENDER_DRY_EVENT to know when delivery has been accomplished.
   A richer API could also be used that allows user message level
   tracking of delivery, see <xref target="api-considerations"/> for API
   considerations.</t>
        <t>For SCTP implementations exposing APIs like <xref target="RFC6458"/> where it is
   not possible to change the SCTP-AUTH key for a partial SCTP message
   initiated before the change of security context will be forced to
   track the SCTP messages and determine when all using the old
   security context has been transmitted. This maybe be impossible to
   do completely reliable without tighter integration between the
   DTLS/SCTP layer and the SCTP implementation. This type of
   implementations also has an implicit limitation in how large SCTP
   messages it can support. Each SCTP message needs have completed
   delivery and enabling closing of the previous DTLS connection prior
   to the need to create yet another DTLS connection. Thus, SCTP
   messages can't be larger than that the transmission completes in
   less than the duration between the rekeying or re-authentications
   needed for this SCTP association.</t>
        <t>The consequences of sending a DTLS close_notify alert in the old
   DTLS connection prior to the receiver having received the data can
   result in failure case 1 described in <xref target="Mapping-DTLS"/>, which likely
   result in SCTP association termination.</t>
      </section>
      <section anchor="renegotiation-and-keyupdate">
        <name>Renegotiation and KeyUpdate</name>
        <t>DTLS 1.2 renegotiation enables rekeying (with ephemeral Diffie-
   Hellman) of DTLS as well as mutual reauthentication and transfer of
   revocation information inside an DTLS 1.2 connection. Renegotiation
   has been removed from DTLS 1.3 and partly replaced with
   post-handshake messages such as KeyUpdate. The parallel DTLS
   connection solution was specified due to lack of necessary features
   with DTLS 1.3 considered needed for long lived SCTP associations,
   such as rekeying (with ephemeral Diffie-Hellman) as well as mutual
   reauthentication.</t>
        <t>This specification do not allow usage of DTLS 1.2 renegotiation to
   avoid race conditions and corner cases in the interaction between
   the parallel DTLS connection mechanism and the keying of
   SCTP-AUTH. In addtion renegotiation is also disabled in
   implementation, as well as dealing with the epoch change reliable
   have similar or worse applicaiton impact.</t>
        <t>This specification also recommends against using DTLS 1.3 KeyUpdate
   and instead rely on parallel DTLS connections. For DTLS 1.3 there
   isn't feature parity. It also have the issue that a DTLS
   implementation following the RFC may assume a too limited window
   for SCTP where the previous epoch's security context is maintained
   and thus changes to epoch handling (<xref target="epoch"/>) are necessary. Thus,
   unless the below specified more application impacting draining is
   used there exist risk of losing data that the sender will have
   assumed has been reliably delivered.</t>
        <section anchor="dtls-12-considerations">
          <name>DTLS 1.2 Considerations</name>
          <t>The endpoint MUST NOT use DTLS 1.2 renegotiation.</t>
        </section>
        <section anchor="dtls-13-considerations">
          <name>DTLS 1.3 Considerations</name>
          <t>Before sending a KeyUpdate message, the DTLS endpoint MUST ensure
   that all DTLS messages have been acknowledged by the SCTP peer in a
   non-revokable way.  After sending the KeyUpdate message, it stops
   sending DTLS messages until the corresponding Ack message has been
   processed.</t>
          <t>Prior to processing a received KeyUpdate message, all other received
   SCTP user messages that are buffered in the SCTP layer and can be
   delivered to the DTLS layer MUST be read and processed by DTLS.</t>
        </section>
      </section>
      <section anchor="epoch">
        <name>DTLS Epochs</name>
        <t>In general, DTLS implementations SHOULD discard records from
   earlier epochs.  However, in the context of a reliable
   communication this is not appropriate.</t>
        <section anchor="dtls-12-considerations-1">
          <name>DTLS 1.2 Considerations</name>
          <t>Epochs will not be used as renegotiation is disallowed.</t>
        </section>
        <section anchor="dtls-13-considerations-1">
          <name>DTLS 1.3 Considerations</name>
          <t>The procedures of Section 4.2.1 of <xref target="I-D.ietf-tls-dtls13"/> are
   irrelevant.  When receiving DTLS packets using epoch n, no DTLS
   packets from earlier epochs are received.</t>
        </section>
      </section>
      <section anchor="handling-endpoint-secret">
        <name>Handling of Endpoint-Pair Shared Secrets</name>
        <t>SCTP-AUTH <xref target="RFC4895"/> is keyed using Endpoint-Pair Shared
   Secrets. In SCTP associations where DTLS is used, DTLS is used to
   establish these secrets. The endpoints MUST NOT use another
   mechanism for establishing shared secrets for SCTP-AUTH.
   The endpoint-pair shared secret for Shared Key Identifier 0 is
   empty and MUST be used when establishing the first DTLS connection.</t>
        <t>The initial DTLS connection will be used to establish a new shared
   secret as specified per DTLS version below, and which MUST use
   shared key identifier 1. After sending the DTLS Finished message
   for the initial DTLS connection, the active SCTP-AUTH key MUST be
   switched from key identifier 0 to key identifier 1. Once the
   initial Finished message from the peer has been processed by DTLS,
   the SCTP-AUTH key with Shared Key Identifier 0 MUST be removed.</t>
        <t>When a subsequent DTLS connection is setup, a new a 64-byte shared
   secret is derived using the TLS-Exporter. The shared secret
   identifiers form a sequence. If the previous shared secret used
   Shared Key Identifier n, the new one MUST use Shared Key Identifier
   n+1, unless n= 65535, in which case the new Shared Key Identifier
   is 1.</t>
        <t>After sending the DTLS Finished message, the active SCTP-AUTH key
   MUST be switched to the new one. When the endpoint has both sent
   and received a closeNotify on the old DTLS connection then the
   endpoint SHALL remove shared secret(s) related to old DTLS
   connection.</t>
        <section anchor="dtls-12-considerations-2">
          <name>DTLS 1.2 Considerations</name>
          <artwork><![CDATA[
Whenever a new DTLS connection is established, a 64-byte
endpoint-pair shared secret is derived using the TLS-Exporter
described in {{RFC5705}}.
]]></artwork>
          <t>The 64-byte shared secret MUST be provided to the SCTP stack as
   soon as the computation is possible.  The exporter MUST use the
   label given in <xref target="IANA-Consideration"/> and no context.</t>
        </section>
        <section anchor="dtls-13-considerations-2">
          <name>DTLS 1.3 Considerations</name>
          <t>When the exporter_secret can be computed, a 64-byte shared secret
   is derived from it and provided as a new endpoint-pair shared
   secret by using the TLS-Exporter described in <xref target="RFC8446"/>.</t>
          <t>The 64-byte shared secret MUST be provided to the SCTP stack as
   soon as the computation is possible.  The exporter MUST use the
   label given in Section <xref target="IANA-Consideration"/> and no context.</t>
        </section>
      </section>
      <section anchor="shutdown">
        <name>Shutdown</name>
        <t>To prevent DTLS from discarding DTLS user messages while it is
   shutting down, the below procedure has been defined. Its goal is to
   avoid the need for APIs requiring per user message data level
   acknowledgments and utilizes existing SCTP protocol behavior to
   ensure delivery of the protected user messages data.</t>
        <t>Note, this proceudre currenlty only works for DTLS 1.3. For DTLS
   1.2 users the remote endpoint will be closed for sending more data
   with the reception of the close_notify in step 5, and step 6 will
   not be possible and that data will be lost.</t>
        <t>The interaction between peers and protocol stacks shall be as
   follows:</t>
        <ol spacing="normal" type="1"><li>Local instance of ULP asks for terminating the DTLS/SCTP
   Association.</li>
          <li>Local DTLS/SCTP acknowledge the request, from this time on no
   new data from local instance of ULP will be accepted. In case a
   DTLS connection handshake is ongoing this needs to be aborted
   conclusively at this step to ensure that the necessary DTLS message
   exchange happens prior to draining any outstanding data in the SCTP
   association from this endpoint.</li>
          <li>Local DTLS/SCTP finishes any protection operation on buffered
   user messages and ensures that all protected user message data has
   been successfully transferred to the remote ULP.</li>
          <li>Local DTLS/SCTP sends DTLS Close_notify to remote instance of
   DTLS/SCTP on each and all DTLS connections, keys and session
   state are kept for processing packets received later on.</li>
          <li>When receiving Close_notify on the last open DTLS connection,
   remote DTLS/SCTP instance informs its ULP that remote shutdown has
   been initiated. When two parallel DTLS connections are in place it
   is important to await Close_notify alert on both to not misstake a
   rekeying. No more ULP user message data to be sent to peer can be
   accepted by DTLS/SCTP. In case this endpoint has initiated and DTLS
   connection handshake this MUST be aborted as the peer is unable to
   respond.</li>
          <li>Remote DTLS/SCTP finishes any protection operation on buffered
   user messages and ensures that all protected user message data has
   been successfully transferred to the remote ULP.</li>
          <li>Remote DTLS/SCTP sends Close_notify to Local DTLS/SCTP entity
   for each and all DTLS connections.</li>
          <li>When receiving Close_notify on the last open DTLS connection,
   local DTLS/SCTP instance initiates the SCTP shutdown procedure
   (section 9.2 of <xref target="RFC4960"/>).</li>
          <li>Remote DTLS/SCTP replied to the SCTP shutdown procedure (section
   9.2 of <xref target="RFC4960"/>).</li>
          <li>Upon receiving the information that SCTP has closed the
   Association, independently the local and remote DTLS/SCTP entities
   destroy the DTLS connection.</li>
        </ol>
        <t>The verification in step 3 and 6 that all user data message has been
   successfully delivered to the remote ULP can be provided by the
   SCTP stack that implements <xref target="RFC6458"/> by means of SCTP_SENDER_DRY
   event (section 6.1.9 of <xref target="RFC6458"/>).</t>
        <t>A successful SCTP shutdown will indicate successful delivery of all
   data. However, in cases of communication failures and extensive
   packet loss the SCTP shutdown procedure can time out and result in
   SCTP association termination where its unknown if all data has been
   delivered. The DTLS/SCTP should indicate to ULP successful
   completion or failure to shutdown gracefully.</t>
      </section>
    </section>
    <section anchor="Negotiation">
      <name>DTLS over SCTP Service</name>
      <t>The adoption of DTLS over SCTP according to the current
   specification is meant to add to SCTP the option for transferring
   encrypted data.  When DTLS over SCTP is used, all data being
   transferred MUST be protected by chunk authentication and DTLS
   encrypted.  Chunks that need to be received in an authenticated way
   will be specified in the CHUNK list parameter according to
   <xref target="RFC4895"/>.  Error handling for authenticated chunks is according
   to <xref target="RFC4895"/>.</t>
      <section anchor="adaptation-layer-indication-in-initinit-ack">
        <name>Adaptation Layer Indication in INIT/INIT-ACK</name>
        <t>At the initialization of the association, a sender of the INIT or
   INIT ACK chunk that intends to use DTLS/SCTP as specified in this
   specification MUST include an Adaptation Layer Indication Parameter
   with the IANA assigned value TBD (<xref target="sec-IANA-ACP"/>) to inform its
   peer that it is able to support DTLS over SCTP per this
   specification.</t>
      </section>
      <section anchor="DTLS-init">
        <name>DTLS over SCTP Initialization</name>
        <t>Initialization of DTLS/SCTP requires all the following options to
   be part of the INIT/INIT-ACK handshake:</t>
        <t>RANDOM: defined in <xref target="RFC4895"/></t>
        <t>CHUNKS: list of permitted chunks, defined in <xref target="RFC4895"/></t>
        <t>HMAC-ALGO: defined in <xref target="RFC4895"/></t>
        <t>ADAPTATION-LAYER-INDICATION: defined in <xref target="RFC5061"/></t>
        <t>When all the above options are present and having acceptable
   parameters, the Association will start with support of DTLS/SCTP.
   The set of options indicated are the DTLS/SCTP Mandatory Options.
   No data transfer is permitted before DTLS handshake is
   complete. Chunk bundling is permitted according to <xref target="RFC4960"/>. The
   DTLS handshake will enable authentication of both the peers.</t>
        <t>The extension described in this document is given by the following
   message exchange.</t>
        <artwork><![CDATA[
   --- INIT[RANDOM; CHUNKS; HMAC-ALGO; ADAPTATION-LAYER-IND] --->
   <- INIT-ACK[RANDOM; CHUNKS; HMAC-ALGO; ADAPTATION-LAYER-IND] -
   ------------------------ COOKIE-ECHO ------------------------>
   <------------------------ COOKIE-ACK -------------------------
   ---------------- AUTH; DATA[DTLS Handshake] ----------------->
                               ...
                               ...
   <--------------- AUTH; DATA[DTLS Handshake] ------------------
]]></artwork>
      </section>
      <section anchor="client-use-case">
        <name>Client Use Case</name>
        <t>When a client initiates an SCTP Association with DTLS protection,
   i.e., the SCTP INIT containing DTSL/SCTP Mandatory Options, it can
   receive an INIT-ACK also containing DTLS/SCTP Mandatory Options, in
   that case the Association will proceed as specified in the previous
   <xref target="DTLS-init"/> section.  If the peer replies with an INIT-ACK not
   containing all DTLS/SCTP Mandatory Options, the client SHOULD reply
   with an SCTP ABORT.</t>
      </section>
      <section anchor="server-use-case">
        <name>Server Use Case</name>
        <t>If a SCTP Server supports DTLS/SCTP, i.e., per this specification,
   when receiving an INIT chunk with all DTLS/SCTP Mandatory Options
   it will reply with an INIT-ACK also containing all the DTLS/SCTP
   Mandatory Options, following the sequence for DTLS initialization
   <xref target="DTLS-init"/> and the related traffic case.  If a SCTP Server that
   supports DTLS and configured to use it, receives an INIT chunk
   without all DTLS/SCTP Mandatory Options, it SHOULD reply with an
   SCTP ABORT.</t>
      </section>
      <section anchor="Fallback">
        <name>RFC 6083 Fallback</name>
        <t>This section discusses how an endpoint supporting this
   specification can fallback to follow the DTLS/SCTP behavior in
   RFC6083.  It is recommended to define a setting that represents the
   policy to allow fallback or not. However, the possibility to use
   fallback is based on the ULP can operate using user messages that
   are no longer than 16384 bytes and where the security issues can be
   mitigated or considered acceptable. Fallback is NOT RECOMMEND to be
   enabled as it enables downgrade attacks to weaker algorithms and
   versions of DTLS.</t>
        <t>An SCTP endpoint that receives an INIT chunk or an INIT-ACK chunk
   that does not contain the SCTP-Adaptation-Indication parameter with
   the DTLS/SCTP adaptation layer codepoint, see <xref target="sec-IANA-ACP"/>, may
   in certain cases potentially perform a fallback to RFC 6083
   behavior.  However, the fallback attempt should only be performed
   if policy says that is acceptable.</t>
        <t>If fallback is allowed, it is possible that the client will send
   plain text user messages prior to DTLS handshake as it is allowed
   per RFC 6083.  So that needs to be part of the consideration for a
   policy allowing fallback.</t>
        <section anchor="client-fallback">
          <name>Client Fallback</name>
          <t>A DTLS/SCTP client supporting this specficiation encountering an
   server not compatible with this specficiation MAY attempt RFC 6083
   fallback per this procedure.</t>
          <ol spacing="normal" type="1"><li>Fallback procedure, if enabled, is initiated when receiving an
SCTP INIT-ACK that does not contain the DTLS/SCTP Adaptation
Layer indication. If fallback is not enabled the SCTP handshake
is aborted.</li>
            <li>The client checks that the SCTP INIT-ACK contained the necessary
chunks and parameters to establish SCTP-AUTH per RFC 6083 with
this endpoint. If not all necessary parameters or support
algorithms don't match the client MUST abort the
handshake. Otherwise it complets the SCTP handshake.</li>
            <li>Client performs DTLS connection handshake per RFC 6083 over
established SCTP association. If succesfull authenticating the
targeted server the client has succesfull fallen back to use
RFC 6083. If not terminate the SCTP association.</li>
          </ol>
        </section>
        <section anchor="server-fallback">
          <name>Server Fallback</name>
          <t>A DTLS/SCTP Server that supports both this specification and RFC
   6083 and where fallback has been enabled for the ULP can follow
   this procedure.</t>
          <ol spacing="normal" type="1"><li>When receving an SCTP INIT message without the DTLS/SCTP
adapation layer indicataion fallback procedure is initiated.</li>
            <li>Verify that the SCTP INIT contains SCTP-AUTH parameters required
by RFC 6083 and compatible with this server. If that is not the
case abort the SCTP handshake.</li>
            <li>Send an SCTP INIT ACK with the required SCTP-AUTH chunks and
parameters to the client.</li>
            <li>Complete the SCTP Handshake. Await DTLS handshake per RFC 6083.
Plain text SCTP messages MAY be received.</li>
            <li>Upon succesful completion of DTLS handshake succesfull fallback
to RFC 6083 have been accomplished.</li>
          </ol>
        </section>
      </section>
    </section>
    <section anchor="api-considerations">
      <name>SCTP API Consideration</name>
      <t>DTLS/SCTP needs certain functionality on the API that the SCTP
   implementation provide to the ULP to function optimally. A
   DTLS/SCTP implementation will need to provide its own API to the
   ULP, while itself using the SCTP API. This discussion is focused on
   the needed functionality on the SCTP API.</t>
      <t>The following functionality is needed:</t>
      <ul spacing="normal">
        <li>Controlling SCPT-AUTH negotiation so that SHA-256 algorithm is
inlcuded, and determine that SHA-1 is not selected when the
association is established.</li>
        <li>Determine when all SCTP packets that uses an SCTP-auth key or
contains DTLS records associated to a particular DTLS connection
has been acknowledge in a non-renegable manor.</li>
        <li>Determine when all SCTP packets have been acknowledge in a
non-renegable manor.</li>
        <li>Negotiate the adaptation layer indication that indicates
DTLS/SCTP and determine if it was agreed or not.</li>
        <li>Partial user messages transmission and reception.</li>
      </ul>
    </section>
    <section anchor="socket-api">
      <name>Socket API Considerations</name>
      <t>This section describes how the socket API defined in <xref target="RFC6458"/> is
   extended to provide a way for the application to observe the HMAC
   algorithms used for sending and receiving of AUTH chunks.</t>
      <t>Please note that this section is informational only.</t>
      <t>A socket API implementation based on <xref target="RFC6458"/> is, by means of
   the existing SCTP_AUTHENTICATION_EVENT event, extended to provide
   the event notification whenever a new HMAC algorithm is used in a
   received AUTH chunk.</t>
      <t>Furthermore, two new socket options for the level IPPROTO_SCTP and
   the name SCTP_SEND_HMAC_IDENT and SCTP_EXPOSE_HMAC_IDENT_CHANGES
   are defined as described below.  The first socket option is used to
   query the HMAC algorithm used for sending AUTH chunks.  The second
   enables the monitoring of HMAC algorithms used in received AUTH
   chunks via the SCTP_AUTHENTICATION_EVENT event.</t>
      <t>Support for the SCTP_SEND_HMAC_IDENT and
   SCTP_EXPOSE_HMAC_IDENT_CHANGES socket options also need to be added
   to the function sctp_opt_info().</t>
      <section anchor="socket-option-to-get-the-hmac-identifier-being-sent-sctpsendhmacident">
        <name>Socket Option to Get the HMAC Identifier being Sent (SCTP_SEND_HMAC_IDENT)</name>
        <t>During the SCTP association establishment a HMAC Identifier is
   selected which is used by an SCTP endpoint when sending AUTH
   chunks.  An application can access the result of this selection by
   using this read-only socket option, which uses the level
   IPPROTO_SCTP and the name SCTP_SEND_HMAC_IDENT.</t>
        <t>The following structure is used to access HMAC Identifier used for
   sending AUTH chunks:</t>
        <artwork><![CDATA[
struct sctp_assoc_value {
    sctp_assoc_t assoc_id;
    uint32_t assoc_value;
};
]]></artwork>
        <dl>
          <dt>assoc_id:</dt>
          <dd>
            <t>This parameter is ignored for one-to-one style sockets.
For one-to-many style sockets, the application fills in an association
identifier.
It is an error to use SCTP_{FUTURE|CURRENT|ALL}_ASSOC in assoc_id.</t>
          </dd>
          <dt>assoc_value:</dt>
          <dd>
            <t>This parameter contains the HMAC Identifier used for sending AUTH chunks.</t>
          </dd>
        </dl>
      </section>
      <section anchor="API-SCTP-AUTHENTICATION-EVENT">
        <name>Exposing the HMAC Identifiers being Received</name>
        <t>Section 6.1.8 of <xref target="RFC6458"/> defines the SCTP_AUTHENTICATION_EVENT event,
   which uses the following structure:</t>
        <artwork><![CDATA[
struct sctp_authkey_event {
    uint16_t auth_type;
    uint16_t auth_flags;
    uint32_t auth_length;
    uint16_t auth_keynumber;
    uint32_t auth_indication;
    sctp_assoc_t auth_assoc_id;
};
]]></artwork>
        <t>This document updates this structure to</t>
        <artwork><![CDATA[
struct sctp_authkey_event {
    uint16_t auth_type;
    uint16_t auth_flags;
    uint32_t auth_length;
    uint16_t auth_identifier; /* formerly auth_keynumber */
    uint32_t auth_indication;
    sctp_assoc_t auth_assoc_id;
};
]]></artwork>
        <t>by renaming auth_keynumber to auth_identifier.
   auth_identifier just replaces auth_keynumber in the context of <xref target="RFC6458"/>.
   In addition to that, the SCTP_AUTHENTICATION_EVENT event is extended to
   also indicate when a new HMAC Identifier is received and such reporting is
   explicitly enabled as described in <xref target="API-SCTP-EXPOSE-HMAC-IDENT-CHANGES"/>.
   In this case auth_indication is SCTP_AUTH_NEW_HMAC and the new
   HMAC identifier is reported in auth_identifier.</t>
      </section>
      <section anchor="API-SCTP-EXPOSE-HMAC-IDENT-CHANGES">
        <name>Socket Option to Expose HMAC Identifier Usage (SCTP_EXPOSE_HMAC_IDENT_CHANGES)</name>
        <t>This options allows the application to enable and disable the
   reception of SCTP_AUTHENTICATION_EVENT events when a new HMAC
   Identifiers has been received in an AUTH chunk (see
   <xref target="API-SCTP-AUTHENTICATION-EVENT"/>).  This read/write socket option
   uses the level IPPROTO_SCTP and the name
   SCTP_EXPOSE_HMAC_IDENT_CHANGES.  It is needed to provide backwards
   compatibility and the default is that these events are not
   reported.</t>
        <t>The following structure is used to enable or disable the reporting
   of newly received HMAC Identifiers in AUTH chunks:</t>
        <artwork><![CDATA[
struct sctp_assoc_value {
    sctp_assoc_t assoc_id;
    uint32_t assoc_value;
};
]]></artwork>
        <dl>
          <dt>assoc_id:</dt>
          <dd>
            <t>This parameter is ignored for one-to-one style sockets.
For one-to-many style sockets, the application may fill in an association
identifier or SCTP_{FUTURE|CURRENT|ALL}_ASSOC.</t>
          </dd>
          <dt>assoc_value:</dt>
          <dd>
            <t>Newly received HMAC Identifiers are reported if, and only if, this
parameter is non-zero.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="IANA-Consideration">
      <name>IANA Considerations</name>
      <section anchor="tls-exporter-label">
        <name>TLS Exporter Label</name>
        <t>RFC 6083 defined a TLS Exporter Label registry as described in
   <xref target="RFC5705"/>. IANA is requested to update the reference for the
   label "EXPORTER_DTLS_OVER_SCTP" to this specification.</t>
      </section>
      <section anchor="sec-IANA-ACP">
        <name>SCTP Adaptation Layer Indication Code Point</name>
        <t><xref target="RFC5061"/> defined a IANA registry for Adaptation Code Points to
   be used in the Adaptation Layer Indication parameter. The registry
   was at time of writing located:
   https://www.iana.org/assignments/sctp-parameters/sctp-parameters.xhtml#sctp-parameters-27
   IANA is requested to assign one Adaptation Code Point for DTLS/SCTP
   per the below proposed entry in <xref target="iana-ACP"/>.</t>
        <table anchor="iana-ACP">
          <name>Adaptation Code Point</name>
          <thead>
            <tr>
              <th align="left">Code Point (32-bit number)</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">0x00000002</td>
              <td align="left">DTLS/SCTP</td>
              <td align="left">[RFC-TBD]</td>
            </tr>
          </tbody>
        </table>
        <t>RFC-Editor Note: Please replace [RFC-TBD] with the RFC number given to
this specification.</t>
      </section>
    </section>
    <section anchor="sec-Consideration">
      <name>Security Considerations</name>
      <t>The security considerations given in <xref target="I-D.ietf-tls-dtls13"/>,
   <xref target="RFC4895"/>, and <xref target="RFC4960"/> also apply to this document.</t>
      <section anchor="cryptographic-considerations">
        <name>Cryptographic Considerations</name>
        <t>Over the years, there have been several serious attacks on earlier
   versions of Transport Layer Security (TLS), including attacks on
   its most commonly used ciphers and modes of operation.  <xref target="RFC7457"/>
   summarizes the attacks that were known at the time of publishing
   and BCP 195 <xref target="RFC7525"/> <xref target="RFC8996"/> provide recommendations for
   improving the security of deployed services that use TLS.</t>
        <t>When DTLS/SCTP is used with DTLS 1.2 <xref target="RFC6347"/>, DTLS 1.2 MUST be
   configured to disable options known to provide insufficient
   security. HTTP/2 <xref target="RFC7540"/> gives good minimum requirements based
   on the attacks that where publicly known in 2015. DTLS 1.3
   <xref target="I-D.ietf-tls-dtls13"/> only define strong algorithms without major
   weaknesses at the time of publication. Many of the TLS registries
   have a "Recommended" column. Parameters not marked as "Y" are NOT
   RECOMMENDED to support. DTLS 1.3 is preferred over DTLS 1.2 being a
   newer protocol that addresses known vulnerabilities and only
   defines strong algorithms without known major weaknesses at the
   time of publication.</t>
        <t>DTLS 1.3 requires rekeying before algorithm specific AEAD limits
   have been reached. The AEAD limits equations are equally valid for
   DTLS 1.2 and SHOULD be followed for DTLS/SCTP, but are not mandated
   by the DTLS 1.2 specification.</t>
        <t>HMAC-SHA-256 as used in SCTP-AUTH has a very large tag length and
   very good integrity properties.  The SCTP-AUTH key can be used
   longer than the current algorithms in the TLS record layer. The
   SCTP-AUTH key is rekeyed when a new DTLS connection is set up at
   which point a new SCTP-AUTH key is derived using the TLS-Exporter.</t>
        <t>(D)TLS 1.3 <xref target="RFC8446"/> discusses forward secrecy from EC(DHE),
   KeyUpdate, and tickets/resumption. Forward secrecy limits the
   effect of key leakage in one direction (compromise of a key at
   time T2 does not compromise some key at time T1 where T1 &lt; T2).
   Protection in the other direction (compromise at time T1 does not
   compromise keys at time T2) can be achieved by rerunning EC(DHE).
   If a long-term authentication key has been compromised, a full
   handshake with EC(DHE) gives protection against passive
   attackers. If the resumption_master_secret has been compromised,
   a resumption handshake with EC(DHE) gives protection against passive
   attackers and a full handshake with EC(DHE) gives protection against
   active attackers. If a traffic secret has been compromised, any
   handshake with EC(DHE) gives protection against active attackers.</t>
        <t>The document "Confidentiality in the Face of Pervasive Surveillance:
   A Threat Model and Problem Statement" <xref target="RFC7624"/> defines key
   exfiltration as the transmission of cryptographic keying material
   for an encrypted communication from a collaborator, deliberately or
   unwittingly, to an attacker. Using the terms in RFC 7624, forward
   secrecy without rerunning EC(DHE) still allows an attacker to do
   static key exfiltration. Rerunning EC(DHE) forces and attacker to
   dynamic key exfiltration (or content exfiltration).</t>
        <t>When using DTLS 1.3 <xref target="I-D.ietf-tls-dtls13"/>, AEAD limits and
   forward secrecy can be achieved by sending post-handshake KeyUpdate
   messages, which triggers rekeying of DTLS. Such symmetric rekeying
   gives significantly less protection against key leakage than
   re-running Diffie-Hellman as explained above.  After leakage of
   application_traffic_secret_N, an attacker can passively eavesdrop
   on all future data sent on the connection including data encrypted
   with application_traffic_secret_N+1,
   application_traffic_secret_N+2, etc. Note that KeyUpdate does not
   update the exporter_secret.</t>
        <t>DTLS/SCTP is in many deployments replacing IPsec. For IPsec, NIST
   (US), BSI (Germany), and ANSSI (France) recommends very frequent
   re-run of Diffie-Hellman to provide forward secrecy and
   force attackers to dynamic key extraction <xref target="RFC7624"/>. ANSSI writes
   "It is recommended to force the periodic renewal of the keys, e.g.,
   every hour and every 100 GB of data, in order to limit the impact
   of a key compromise." <xref target="ANSSI-DAT-NT-003"/>.</t>
        <t>For many DTLS/SCTP deployments the SCTP association is expected to
   have a very long lifetime of months or even years. For associations
   with such long lifetimes there is a need to frequently
   re-authenticate both client and server. TLS Certificate lifetimes
   significantly shorter than a year are common which is shorter than
   many expected DTLS/SCTP associations.</t>
        <t>SCTP-AUTH re-rekeying, periodic authentication of both endpoints,
   and frequent re-run of Diffie-Hellman to force attackers to dynamic
   key extraction is in DTLS/SCTP per this specification achieved by
   setting up new DTLS connections over the same SCTP
   association. Implementations SHOULD set up new connections
   frequently to force attackers to dynamic key
   extraction. Implementations MUST set up new connections before any
   of the certificates expire. It is RECOMMENDED that all negotiated
   and exchanged parameters are the same except for the timestamps in
   the certificates. Clients and servers MUST NOT accept a change of
   identity during the setup of a new connections, but MAY accept
   negotiation of stronger algorithms and security parameters, which
   might be motivated by new attacks.</t>
        <t>Allowing new connections can enable denial-of-service attacks.
   The endpoints SHOULD limit the frequency of new connections.</t>
        <t>When DTLS/SCTP is used with DTLS 1.2 <xref target="RFC6347"/>, the TLS Session
   Hash and Extended Master Secret Extension <xref target="RFC7627"/> MUST be used to
   prevent unknown key-share attacks where an attacker establishes the
   same key on several connections. DTLS 1.3 always prevents these
   kinds of attacks. The use of SCTP-AUTH then cryptographically binds
   new connections to the old connection. This together with mandatory
   mutual authentication (on the DTLS layer) and a requirement to not
   accept new identities mitigates MITM attacks that have plagued
   renegotiation <xref target="TRISHAKE"/>.</t>
      </section>
      <section anchor="downgrade-attacks">
        <name>Downgrade Attacks</name>
        <t>A peer supporting DTLS/SCTP according to this specification,
   DTLS/SCTP according to <xref target="RFC6083"/> and/or SCTP without DTLS may be
   vulnerable to downgrade attacks where on on-path attacker
   interferes with the protocol setup to lower or disable security. If
   possible, it is RECOMMENDED that the peers have a policy only
   allowing DTLS/SCTP according to this specification.</t>
      </section>
      <section anchor="targeting-dtls-messages">
        <name>Targeting DTLS Messages</name>
        <t>The DTLS handshake messages and other control messages, i.e. not
   application data can easily be identified when using DTLS 1.2 as
   their content type is not encrypted. With DTLS 1.3 there is no
   unprotected content type. However, they will sent with an PPID of 0
   if sent in their own SCTP user messages. <xref target="Stream-Usage"/> proposes
   a basic behavior that will stil make it easily for anyone to
   detect the DTLS messages that are not proteceted user messages.</t>
      </section>
      <section anchor="authentication-and-policy-decisions">
        <name>Authentication and Policy Decisions</name>
        <t>DTLS/SCTP MUST be mutually authenticated. Authentication is the
   process of establishing the identity of a user or system and
   verifying that the identity is valid. DTLS only provides proof of
   possession of a key.  DTLS/SCTP MUST perform identity
   authentication. It is RECOMMENDED that DTLS/SCTP is used with
   certificate-based authentication. When certificates are used the
   applicatication using DTLS/SCTP is reposible for certificate
   policies, certificate chain validation, and identity authentication
   (HTTPS does for example match the hostname with a subjectAltName of
   type dNSName). The application using DTLS/SCTP MUST define what the
   identity is and how it is encoded and the client and server MUST
   use the same identity format.  Guidance on server certificate
   validation can be found in <xref target="RFC6125"/>.  DTLS/SCTP enables periodic
   transfer of mutual revocation information (OSCP stapling) every
   time a new parallel connection is set up.  All security decisions
   MUST be based on the peer's authenticated identity, not on its
   transport layer identity.</t>
        <t>It is possible to authenticate DTLS endpoints based on IP addresses
   in certificates. SCTP associations can use multiple IP addresses
   per SCTP endpoint. Therefore, it is possible that DTLS records will
   be sent from a different source IP address or to a different
   destination IP address than that originally authenticated. This is
   not a problem provided that no security decisions are made based on
   the source or destination IP addresses.</t>
      </section>
      <section anchor="resumption-and-tickets">
        <name>Resumption and Tickets</name>
        <t>In DTLS 1.3 any number of tickets can be issued in a connection and
   the tickets can be used for resumption as long as they are valid, which
   is up to seven days. The nodes in a resumed connection have the
   same roles (client or server) as in the connection where the ticket
   was issued. In DTLS/SCTP, there are no significant performance
   benefits with resumption and an implementation can chose to never
   issue any tickets. If tickets and resumption are used it is enough
   to issue a single ticket per connection.</t>
      </section>
      <section anchor="privacy-considerations">
        <name>Privacy Considerations</name>
        <t><xref target="RFC6973"/> suggests that the privacy considerations of IETF
   protocols be documented.</t>
        <t>For each SCTP user message, the user also provides a stream
   identifier, a flag to indicate whether the message is sent ordered
   or unordered, and a payload protocol identifier.  Although
   DTLS/SCTP provides privacy for the actual user message, the other
   three information fields are not confidentiality protected.  They
   are sent as cleartext because they are part of the SCTP DATA
   chunk header.</t>
        <t>It is RECOMMENDED that DTLS/SCTP is used with certificate based
   authentication in DTLS 1.3 <xref target="I-D.ietf-tls-dtls13"/> to provide
   identity protection. DTLS/SCTP MUST be used with a key exchange
   method providing forward secrecy.</t>
      </section>
      <section anchor="pervasive-monitoring">
        <name>Pervasive Monitoring</name>
        <t>As required by <xref target="RFC7258"/>, work on IETF protocols needs to
   consider the effects of pervasive monitoring and mitigate them when
   possible.</t>
        <t>Pervasive Monitoring is widespread surveillance of users.  By
   encrypting more information including user identities, DTLS 1.3
   offers much better protection against pervasive monitoring.</t>
        <t>Massive pervasive monitoring attacks relying on key exchange
   without forward secrecy has been reported. By mandating
   forward secrecy, DTLS/SCTP effectively mitigate many forms of
   passive pervasive monitoring and limits the amount of compromised
   data due to key compromise.</t>
        <t>An important mitigation of pervasive monitoring is to force
   attackers to do dynamic key exfiltration instead of static key
   exfiltration. Dynamic key exfiltration increases the risk of
   discovery for the attacker <xref target="RFC7624"/>. DTLS/SCTP per this
   specification encourages implementations to frequently set up new
   DTLS connections with (EC)DHE over the same SCTP association to
   force attackers to do dynamic key exfiltration.</t>
        <t>In addition to the privacy attacks discussed above, surveillance on
   a large scale may enable tracking of a user over a wider
   geographical area and across different access networks.  Using
   information from DTLS/SCTP together with information gathered from
   other protocols increase the risk of identifying individual users.</t>
      </section>
    </section>
    <section anchor="contributors">
      <name>Contributors</name>
      <t>Michael Tuexen contributed as co-author to the intitial versions
   this draft. Michael's contributions include:</t>
      <ul spacing="normal">
        <li>The use of the Adaptation Layer Indication.</li>
        <li>Socket API extension</li>
        <li>Many editorial improvements.</li>
      </ul>
    </section>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors of RFC 6083 which this document is based on are
   Michael Tuexen, Eric Rescorla, and Robin Seggelmann.</t>
      <t>The RFC 6083 authors thanked Anna Brunstrom, Lars Eggert, Gorry
   Fairhurst, Ian Goldberg, Alfred Hoenes, Carsten Hohendorf, Stefan
   Lindskog, Daniel Mentz, and Sean Turner for their invaluable comments.</t>
      <t>The authors of this document want to thank Daria Ivanova, Li Yan,
   and GitHub user vanrein for their contribution.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author initials="S." surname="Bradner" fullname="S. Bradner">
              <organization/>
            </author>
            <date year="1997" month="March"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC3758" target="https://www.rfc-editor.org/info/rfc3758" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.3758.xml">
          <front>
            <title>Stream Control Transmission Protocol (SCTP) Partial Reliability Extension</title>
            <author initials="R." surname="Stewart" fullname="R. Stewart">
              <organization/>
            </author>
            <author initials="M." surname="Ramalho" fullname="M. Ramalho">
              <organization/>
            </author>
            <author initials="Q." surname="Xie" fullname="Q. Xie">
              <organization/>
            </author>
            <author initials="M." surname="Tuexen" fullname="M. Tuexen">
              <organization/>
            </author>
            <author initials="P." surname="Conrad" fullname="P. Conrad">
              <organization/>
            </author>
            <date year="2004" month="May"/>
            <abstract>
              <t>This memo describes an extension to the Stream Control Transmission Protocol (SCTP) that allows an SCTP endpoint to signal to its peer that it should move the cumulative ack point forward.  When both sides of an SCTP association support this extension, it can be used by an SCTP implementation to provide partially reliable data transmission service to an upper layer protocol.  This memo describes the protocol extensions, which consist of a new parameter for INIT and INIT ACK, and a new FORWARD TSN chunk type, and provides one example of a partially reliable service that can be provided to the upper layer via this mechanism.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3758"/>
          <seriesInfo name="DOI" value="10.17487/RFC3758"/>
        </reference>
        <reference anchor="RFC4895" target="https://www.rfc-editor.org/info/rfc4895" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.4895.xml">
          <front>
            <title>Authenticated Chunks for the Stream Control Transmission Protocol (SCTP)</title>
            <author initials="M." surname="Tuexen" fullname="M. Tuexen">
              <organization/>
            </author>
            <author initials="R." surname="Stewart" fullname="R. Stewart">
              <organization/>
            </author>
            <author initials="P." surname="Lei" fullname="P. Lei">
              <organization/>
            </author>
            <author initials="E." surname="Rescorla" fullname="E. Rescorla">
              <organization/>
            </author>
            <date year="2007" month="August"/>
            <abstract>
              <t>This document describes a new chunk type, several parameters, and procedures for the Stream Control Transmission Protocol (SCTP).  This new chunk type can be used to authenticate SCTP chunks by using shared keys between the sender and receiver.  The new parameters are used to establish the shared keys.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4895"/>
          <seriesInfo name="DOI" value="10.17487/RFC4895"/>
        </reference>
        <reference anchor="RFC4960" target="https://www.rfc-editor.org/info/rfc4960" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.4960.xml">
          <front>
            <title>Stream Control Transmission Protocol</title>
            <author initials="R." surname="Stewart" fullname="R. Stewart" role="editor">
              <organization/>
            </author>
            <date year="2007" month="September"/>
            <abstract>
              <t>This document obsoletes RFC 2960 and RFC 3309.  It describes the Stream Control Transmission Protocol (SCTP).  SCTP is designed to transport Public Switched Telephone Network (PSTN) signaling messages over IP networks, but is capable of broader applications.</t>
              <t>SCTP is a reliable transport protocol operating on top of a connectionless packet network such as IP.  It offers the following services to its users:</t>
              <t>--  acknowledged error-free non-duplicated transfer of user data,</t>
              <t>--  data fragmentation to conform to discovered path MTU size,</t>
              <t>--  sequenced delivery of user messages within multiple streams, with an option for order-of-arrival delivery of individual user messages,</t>
              <t>--  optional bundling of multiple user messages into a single SCTP packet, and</t>
              <t>--  network-level fault tolerance through supporting of multi-homing at either or both ends of an association.</t>
              <t> The design of SCTP includes appropriate congestion avoidance behavior and resistance to flooding and masquerade attacks.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4960"/>
          <seriesInfo name="DOI" value="10.17487/RFC4960"/>
        </reference>
        <reference anchor="RFC5705" target="https://www.rfc-editor.org/info/rfc5705" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.5705.xml">
          <front>
            <title>Keying Material Exporters for Transport Layer Security (TLS)</title>
            <author initials="E." surname="Rescorla" fullname="E. Rescorla">
              <organization/>
            </author>
            <date year="2010" month="March"/>
            <abstract>
              <t>A number of protocols wish to leverage Transport Layer Security (TLS) to perform key establishment but then use some of the keying material for their own purposes.  This document describes a general mechanism for allowing that.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5705"/>
          <seriesInfo name="DOI" value="10.17487/RFC5705"/>
        </reference>
        <reference anchor="RFC6347" target="https://www.rfc-editor.org/info/rfc6347" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.6347.xml">
          <front>
            <title>Datagram Transport Layer Security Version 1.2</title>
            <author initials="E." surname="Rescorla" fullname="E. Rescorla">
              <organization/>
            </author>
            <author initials="N." surname="Modadugu" fullname="N. Modadugu">
              <organization/>
            </author>
            <date year="2012" month="January"/>
            <abstract>
              <t>This document specifies version 1.2 of the Datagram Transport Layer Security (DTLS) protocol.  The DTLS protocol provides communications privacy for datagram protocols.  The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.  The DTLS protocol is based on the Transport Layer Security (TLS) protocol and provides equivalent security guarantees.  Datagram semantics of the underlying transport are preserved by the DTLS protocol.  This document updates DTLS 1.0 to work with TLS version 1.2.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6347"/>
          <seriesInfo name="DOI" value="10.17487/RFC6347"/>
        </reference>
        <reference anchor="RFC7627" target="https://www.rfc-editor.org/info/rfc7627" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7627.xml">
          <front>
            <title>Transport Layer Security (TLS) Session Hash and Extended Master Secret Extension</title>
            <author initials="K." surname="Bhargavan" fullname="K. Bhargavan" role="editor">
              <organization/>
            </author>
            <author initials="A." surname="Delignat-Lavaud" fullname="A. Delignat-Lavaud">
              <organization/>
            </author>
            <author initials="A." surname="Pironti" fullname="A. Pironti">
              <organization/>
            </author>
            <author initials="A." surname="Langley" fullname="A. Langley">
              <organization/>
            </author>
            <author initials="M." surname="Ray" fullname="M. Ray">
              <organization/>
            </author>
            <date year="2015" month="September"/>
            <abstract>
              <t>The Transport Layer Security (TLS) master secret is not cryptographically bound to important session parameters such as the server certificate.  Consequently, it is possible for an active attacker to set up two sessions, one with a client and another with a server, such that the master secrets on the two sessions are the same.  Thereafter, any mechanism that relies on the master secret for authentication, including session resumption, becomes vulnerable to a man-in-the-middle attack, where the attacker can simply forward messages back and forth between the client and server.  This specification defines a TLS extension that contextually binds the master secret to a log of the full handshake that computes it, thus preventing such attacks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7627"/>
          <seriesInfo name="DOI" value="10.17487/RFC7627"/>
        </reference>
        <reference anchor="RFC7540" target="https://www.rfc-editor.org/info/rfc7540" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7540.xml">
          <front>
            <title>Hypertext Transfer Protocol Version 2 (HTTP/2)</title>
            <author initials="M." surname="Belshe" fullname="M. Belshe">
              <organization/>
            </author>
            <author initials="R." surname="Peon" fullname="R. Peon">
              <organization/>
            </author>
            <author initials="M." surname="Thomson" fullname="M. Thomson" role="editor">
              <organization/>
            </author>
            <date year="2015" month="May"/>
            <abstract>
              <t>This specification describes an optimized expression of the semantics of the Hypertext Transfer Protocol (HTTP), referred to as HTTP version 2 (HTTP/2).  HTTP/2 enables a more efficient use of network resources and a reduced perception of latency by introducing header field compression and allowing multiple concurrent exchanges on the same connection.  It also introduces unsolicited push of representations from servers to clients.</t>
              <t>This specification is an alternative to, but does not obsolete, the HTTP/1.1 message syntax.  HTTP's existing semantics remain unchanged.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7540"/>
          <seriesInfo name="DOI" value="10.17487/RFC7540"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author initials="B." surname="Leiba" fullname="B. Leiba">
              <organization/>
            </author>
            <date year="2017" month="May"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8260" target="https://www.rfc-editor.org/info/rfc8260" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8260.xml">
          <front>
            <title>Stream Schedulers and User Message Interleaving for the Stream Control Transmission Protocol</title>
            <author initials="R." surname="Stewart" fullname="R. Stewart">
              <organization/>
            </author>
            <author initials="M." surname="Tuexen" fullname="M. Tuexen">
              <organization/>
            </author>
            <author initials="S." surname="Loreto" fullname="S. Loreto">
              <organization/>
            </author>
            <author initials="R." surname="Seggelmann" fullname="R. Seggelmann">
              <organization/>
            </author>
            <date year="2017" month="November"/>
            <abstract>
              <t>The Stream Control Transmission Protocol (SCTP) is a message-oriented transport protocol supporting arbitrarily large user messages.  This document adds a new chunk to SCTP for carrying payload data.  This allows a sender to interleave different user messages that would otherwise result in head-of-line blocking at the sender.  The interleaving of user messages is required for WebRTC data channels.</t>
              <t>Whenever an SCTP sender is allowed to send user data, it may choose from multiple outgoing SCTP streams.  Multiple ways for performing this selection, called stream schedulers, are defined in this document.  A stream scheduler can choose to either implement, or not implement, user message interleaving.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8260"/>
          <seriesInfo name="DOI" value="10.17487/RFC8260"/>
        </reference>
        <reference anchor="RFC8446" target="https://www.rfc-editor.org/info/rfc8446" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8446.xml">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author initials="E." surname="Rescorla" fullname="E. Rescorla">
              <organization/>
            </author>
            <date year="2018" month="August"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8996" target="https://www.rfc-editor.org/info/rfc8996" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8996.xml">
          <front>
            <title>Deprecating TLS 1.0 and TLS 1.1</title>
            <author initials="K." surname="Moriarty" fullname="K. Moriarty">
              <organization/>
            </author>
            <author initials="S." surname="Farrell" fullname="S. Farrell">
              <organization/>
            </author>
            <date year="2021" month="March"/>
            <abstract>
              <t>This document formally deprecates Transport Layer Security (TLS) versions 1.0 (RFC 2246) and 1.1 (RFC 4346). Accordingly, those documents have been moved to Historic status. These versions lack support for current and recommended cryptographic algorithms and mechanisms, and various government and industry profiles of applications using TLS now mandate avoiding these old TLS versions. TLS version 1.2 became the recommended version for IETF protocols in 2008 (subsequently being obsoleted by TLS version 1.3 in 2018), providing sufficient time to transition away from older versions. Removing support for older versions from implementations reduces the attack surface, reduces opportunity for misconfiguration, and streamlines library and product maintenance. </t>
              <t>This document also deprecates Datagram TLS (DTLS) version 1.0 (RFC 4347) but not DTLS version 1.2, and there is no DTLS version 1.1.</t>
              <t>This document updates many RFCs that normatively refer to TLS version 1.0 or TLS version 1.1, as described herein. This document also updates the best practices for TLS usage in RFC 7525; hence, it is part of BCP 195.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="195"/>
          <seriesInfo name="RFC" value="8996"/>
          <seriesInfo name="DOI" value="10.17487/RFC8996"/>
        </reference>
        <reference anchor="I-D.ietf-tls-dtls13" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-tls-dtls13.xml" target="https://www.ietf.org/internet-drafts/draft-ietf-tls-dtls13-43.txt">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author initials="E" surname="Rescorla" fullname="Eric Rescorla">
              <organization/>
            </author>
            <author initials="H" surname="Tschofenig" fullname="Hannes Tschofenig">
              <organization/>
            </author>
            <author initials="N" surname="Modadugu" fullname="Nagendra Modadugu">
              <organization/>
            </author>
            <date year="2021" month="April" day="30"/>
            <abstract>
              <t>This document specifies Version 1.3 of the Datagram Transport Layer Security (DTLS) protocol.  DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t> The DTLS 1.3 protocol is intentionally based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection/non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t> This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-dtls13-43"/>
        </reference>
        <reference anchor="I-D.ietf-tls-dtls-connection-id" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-tls-dtls-connection-id.xml" target="https://www.ietf.org/archive/id/draft-ietf-tls-dtls-connection-id-13.txt">
          <front>
            <title>Connection Identifiers for DTLS 1.2</title>
            <author fullname="Eric Rescorla">
              <organization>RTFM, Inc.</organization>
            </author>
            <author fullname="Hannes Tschofenig">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Thomas Fossati">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Achim Kraus">
              <organization>Bosch.IO GmbH</organization>
            </author>
            <date month="June" day="22" year="2021"/>
            <abstract>
              <t>   This document specifies the Connection ID (CID) construct for the
   Datagram Transport Layer Security (DTLS) protocol version 1.2.

   A CID is an identifier carried in the record layer header that gives
   the recipient additional information for selecting the appropriate
   security association.  In "classical" DTLS, selecting a security
   association of an incoming DTLS record is accomplished with the help
   of the 5-tuple.  If the source IP address and/or source port changes
   during the lifetime of an ongoing DTLS session then the receiver will
   be unable to locate the correct security context.

   The new ciphertext record format with CID also provides content type
   encryption and record-layer padding.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-dtls-connection-id-13"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC3436" target="https://www.rfc-editor.org/info/rfc3436" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.3436.xml">
          <front>
            <title>Transport Layer Security over Stream Control Transmission Protocol</title>
            <author initials="A." surname="Jungmaier" fullname="A. Jungmaier">
              <organization/>
            </author>
            <author initials="E." surname="Rescorla" fullname="E. Rescorla">
              <organization/>
            </author>
            <author initials="M." surname="Tuexen" fullname="M. Tuexen">
              <organization/>
            </author>
            <date year="2002" month="December"/>
            <abstract>
              <t>This document describes the usage of the Transport Layer Security (TLS) protocol, as defined in RFC 2246, over the Stream Control Transmission Protocol (SCTP), as defined in RFC 2960 and RFC 3309. The user of TLS can take advantage of the features provided by SCTP, namely the support of multiple streams to avoid head of line blocking and the support of multi-homing to provide network level fault tolerance. Additionally, discussions of extensions of SCTP are also supported, meaning especially the support of dynamic reconfiguration of IP- addresses.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3436"/>
          <seriesInfo name="DOI" value="10.17487/RFC3436"/>
        </reference>
        <reference anchor="RFC3788" target="https://www.rfc-editor.org/info/rfc3788" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.3788.xml">
          <front>
            <title>Security Considerations for Signaling Transport (SIGTRAN) Protocols</title>
            <author initials="J." surname="Loughney" fullname="J. Loughney">
              <organization/>
            </author>
            <author initials="M." surname="Tuexen" fullname="M. Tuexen" role="editor">
              <organization/>
            </author>
            <author initials="J." surname="Pastor-Balbas" fullname="J. Pastor-Balbas">
              <organization/>
            </author>
            <date year="2004" month="June"/>
            <abstract>
              <t>This document discusses how Transport Layer Security (TLS) and IPsec can be used to secure communication for SIGTRAN protocols.  The main goal is to recommend the minimum security means that a SIGTRAN node must implement in order to attain secured communication.  The support of IPsec is mandatory for all nodes running SIGTRAN protocols.  TLS support is optional.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3788"/>
          <seriesInfo name="DOI" value="10.17487/RFC3788"/>
        </reference>
        <reference anchor="RFC5061" target="https://www.rfc-editor.org/info/rfc5061" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.5061.xml">
          <front>
            <title>Stream Control Transmission Protocol (SCTP) Dynamic Address Reconfiguration</title>
            <author initials="R." surname="Stewart" fullname="R. Stewart">
              <organization/>
            </author>
            <author initials="Q." surname="Xie" fullname="Q. Xie">
              <organization/>
            </author>
            <author initials="M." surname="Tuexen" fullname="M. Tuexen">
              <organization/>
            </author>
            <author initials="S." surname="Maruyama" fullname="S. Maruyama">
              <organization/>
            </author>
            <author initials="M." surname="Kozuka" fullname="M. Kozuka">
              <organization/>
            </author>
            <date year="2007" month="September"/>
            <abstract>
              <t>A local host may have multiple points of attachment to the Internet, giving it a degree of fault tolerance from hardware failures.  Stream Control Transmission Protocol (SCTP) (RFC 4960) was developed to take full advantage of such a multi-homed host to provide a fast failover and association survivability in the face of such hardware failures. This document describes an extension to SCTP that will allow an SCTP stack to dynamically add an IP address to an SCTP association, dynamically delete an IP address from an SCTP association, and to request to set the primary address the peer will use when sending to an endpoint.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5061"/>
          <seriesInfo name="DOI" value="10.17487/RFC5061"/>
        </reference>
        <reference anchor="RFC6083" target="https://www.rfc-editor.org/info/rfc6083" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.6083.xml">
          <front>
            <title>Datagram Transport Layer Security (DTLS) for Stream Control Transmission Protocol (SCTP)</title>
            <author initials="M." surname="Tuexen" fullname="M. Tuexen">
              <organization/>
            </author>
            <author initials="R." surname="Seggelmann" fullname="R. Seggelmann">
              <organization/>
            </author>
            <author initials="E." surname="Rescorla" fullname="E. Rescorla">
              <organization/>
            </author>
            <date year="2011" month="January"/>
            <abstract>
              <t>This document describes the usage of the Datagram Transport Layer Security (DTLS) protocol over the Stream Control Transmission Protocol (SCTP).</t>
              <t>DTLS over SCTP provides communications privacy for applications that use SCTP as their transport protocol and allows client/server applications to communicate in a way that is designed to prevent eavesdropping and detect tampering or message forgery.</t>
              <t>Applications using DTLS over SCTP can use almost all transport features provided by SCTP and its extensions.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6083"/>
          <seriesInfo name="DOI" value="10.17487/RFC6083"/>
        </reference>
        <reference anchor="RFC6125" target="https://www.rfc-editor.org/info/rfc6125" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.6125.xml">
          <front>
            <title>Representation and Verification of Domain-Based Application Service Identity within Internet Public Key Infrastructure Using X.509 (PKIX) Certificates in the Context of Transport Layer Security (TLS)</title>
            <author initials="P." surname="Saint-Andre" fullname="P. Saint-Andre">
              <organization/>
            </author>
            <author initials="J." surname="Hodges" fullname="J. Hodges">
              <organization/>
            </author>
            <date year="2011" month="March"/>
            <abstract>
              <t>Many application technologies enable secure communication between two entities by means of Internet Public Key Infrastructure Using X.509 (PKIX) certificates in the context of Transport Layer Security (TLS). This document specifies procedures for representing and verifying the identity of application services in such interactions.   [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6125"/>
          <seriesInfo name="DOI" value="10.17487/RFC6125"/>
        </reference>
        <reference anchor="RFC6458" target="https://www.rfc-editor.org/info/rfc6458" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.6458.xml">
          <front>
            <title>Sockets API Extensions for the Stream Control Transmission Protocol (SCTP)</title>
            <author initials="R." surname="Stewart" fullname="R. Stewart">
              <organization/>
            </author>
            <author initials="M." surname="Tuexen" fullname="M. Tuexen">
              <organization/>
            </author>
            <author initials="K." surname="Poon" fullname="K. Poon">
              <organization/>
            </author>
            <author initials="P." surname="Lei" fullname="P. Lei">
              <organization/>
            </author>
            <author initials="V." surname="Yasevich" fullname="V. Yasevich">
              <organization/>
            </author>
            <date year="2011" month="December"/>
            <abstract>
              <t>This document describes a mapping of the Stream Control Transmission Protocol (SCTP) into a sockets API.  The benefits of this mapping include compatibility for TCP applications, access to new SCTP features, and a consolidated error and event notification scheme. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6458"/>
          <seriesInfo name="DOI" value="10.17487/RFC6458"/>
        </reference>
        <reference anchor="RFC6973" target="https://www.rfc-editor.org/info/rfc6973" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.6973.xml">
          <front>
            <title>Privacy Considerations for Internet Protocols</title>
            <author initials="A." surname="Cooper" fullname="A. Cooper">
              <organization/>
            </author>
            <author initials="H." surname="Tschofenig" fullname="H. Tschofenig">
              <organization/>
            </author>
            <author initials="B." surname="Aboba" fullname="B. Aboba">
              <organization/>
            </author>
            <author initials="J." surname="Peterson" fullname="J. Peterson">
              <organization/>
            </author>
            <author initials="J." surname="Morris" fullname="J. Morris">
              <organization/>
            </author>
            <author initials="M." surname="Hansen" fullname="M. Hansen">
              <organization/>
            </author>
            <author initials="R." surname="Smith" fullname="R. Smith">
              <organization/>
            </author>
            <date year="2013" month="July"/>
            <abstract>
              <t>This document offers guidance for developing privacy considerations for inclusion in protocol specifications.  It aims to make designers, implementers, and users of Internet protocols aware of privacy-related design choices.  It suggests that whether any individual RFC warrants a specific privacy considerations section will depend on the document's content.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6973"/>
          <seriesInfo name="DOI" value="10.17487/RFC6973"/>
        </reference>
        <reference anchor="RFC7258" target="https://www.rfc-editor.org/info/rfc7258" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7258.xml">
          <front>
            <title>Pervasive Monitoring Is an Attack</title>
            <author initials="S." surname="Farrell" fullname="S. Farrell">
              <organization/>
            </author>
            <author initials="H." surname="Tschofenig" fullname="H. Tschofenig">
              <organization/>
            </author>
            <date year="2014" month="May"/>
            <abstract>
              <t>Pervasive monitoring is a technical attack that should be mitigated in the design of IETF protocols, where possible.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="188"/>
          <seriesInfo name="RFC" value="7258"/>
          <seriesInfo name="DOI" value="10.17487/RFC7258"/>
        </reference>
        <reference anchor="RFC7457" target="https://www.rfc-editor.org/info/rfc7457" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7457.xml">
          <front>
            <title>Summarizing Known Attacks on Transport Layer Security (TLS) and Datagram TLS (DTLS)</title>
            <author initials="Y." surname="Sheffer" fullname="Y. Sheffer">
              <organization/>
            </author>
            <author initials="R." surname="Holz" fullname="R. Holz">
              <organization/>
            </author>
            <author initials="P." surname="Saint-Andre" fullname="P. Saint-Andre">
              <organization/>
            </author>
            <date year="2015" month="February"/>
            <abstract>
              <t>Over the last few years, there have been several serious attacks on Transport Layer Security (TLS), including attacks on its most commonly used ciphers and modes of operation.  This document summarizes these attacks, with the goal of motivating generic and protocol-specific recommendations on the usage of TLS and Datagram TLS (DTLS).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7457"/>
          <seriesInfo name="DOI" value="10.17487/RFC7457"/>
        </reference>
        <reference anchor="RFC7525" target="https://www.rfc-editor.org/info/rfc7525" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7525.xml">
          <front>
            <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author initials="Y." surname="Sheffer" fullname="Y. Sheffer">
              <organization/>
            </author>
            <author initials="R." surname="Holz" fullname="R. Holz">
              <organization/>
            </author>
            <author initials="P." surname="Saint-Andre" fullname="P. Saint-Andre">
              <organization/>
            </author>
            <date year="2015" month="May"/>
            <abstract>
              <t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are widely used to protect data exchanged over application protocols such as HTTP, SMTP, IMAP, POP, SIP, and XMPP.  Over the last few years, several serious attacks on TLS have emerged, including attacks on its most commonly used cipher suites and their modes of operation.  This document provides recommendations for improving the security of deployed services that use TLS and DTLS. The recommendations are applicable to the majority of use cases.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="195"/>
          <seriesInfo name="RFC" value="7525"/>
          <seriesInfo name="DOI" value="10.17487/RFC7525"/>
        </reference>
        <reference anchor="RFC7624" target="https://www.rfc-editor.org/info/rfc7624" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7624.xml">
          <front>
            <title>Confidentiality in the Face of Pervasive Surveillance: A Threat Model and Problem Statement</title>
            <author initials="R." surname="Barnes" fullname="R. Barnes">
              <organization/>
            </author>
            <author initials="B." surname="Schneier" fullname="B. Schneier">
              <organization/>
            </author>
            <author initials="C." surname="Jennings" fullname="C. Jennings">
              <organization/>
            </author>
            <author initials="T." surname="Hardie" fullname="T. Hardie">
              <organization/>
            </author>
            <author initials="B." surname="Trammell" fullname="B. Trammell">
              <organization/>
            </author>
            <author initials="C." surname="Huitema" fullname="C. Huitema">
              <organization/>
            </author>
            <author initials="D." surname="Borkmann" fullname="D. Borkmann">
              <organization/>
            </author>
            <date year="2015" month="August"/>
            <abstract>
              <t>Since the initial revelations of pervasive surveillance in 2013, several classes of attacks on Internet communications have been discovered.  In this document, we develop a threat model that describes these attacks on Internet confidentiality.  We assume an attacker that is interested in undetected, indiscriminate eavesdropping.  The threat model is based on published, verified attacks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7624"/>
          <seriesInfo name="DOI" value="10.17487/RFC7624"/>
        </reference>
        <reference anchor="ANSSI-DAT-NT-003" target="&lt;https://www.ssi.gouv.fr/uploads/2015/09/NT_IPsec_EN.pdf&gt;">
          <front>
            <title>Recommendations for securing networks with IPsec</title>
            <author initials="" surname="Agence nationale de la sécurité des systèmes d'information">
              <organization/>
            </author>
            <date year="2015" month="August"/>
          </front>
          <seriesInfo name="ANSSI Technical Report DAT-NT-003" value=""/>
        </reference>
        <reference anchor="TRISHAKE" target="https://hal.inria.fr/hal-01102259/file/triple-handshakes-and-cookie-cutters-oakland14.pdf">
          <front>
            <title>Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS</title>
            <author initials="K." surname="Bhargavan" fullname="Karthikeyan Bhargavan">
              <organization/>
            </author>
            <author initials="A." surname="Delignat-Lavaud" fullname="Antoine Delignat-Lavaud">
              <organization/>
            </author>
            <author initials="C." surname="Fournet" fullname="Cédric Fournet">
              <organization/>
            </author>
            <author initials="A." surname="Pironti" fullname="Alfredo Pironti">
              <organization/>
            </author>
            <author initials="P." surname="Strub" fullname="Pierre-Yves Strub">
              <organization/>
            </author>
            <date year="2016" month="April"/>
          </front>
          <seriesInfo name="IEEE Symposium on Security &amp; Privacy" value=""/>
        </reference>
      </references>
    </references>
    <section anchor="motivation-for-changes">
      <name>Motivation for Changes</name>
      <t>This document proposes a number of changes to RFC 6083 that have
various different motivations:</t>
      <t>Supporting Large User Messages: RFC 6083 allowed only user messages
   that could fit within a single DTLS record. 3GPP has run into this
   limitation where they have at least four SCTP using protocols (F1,
   E1, Xn, NG-C) that can potentially generate messages over the size
   of 16384 bytes.</t>
      <t>New Versions: Almost 10 years has passed since RFC 6083 was written,
   and significant evolution has happened in the area of DTLS and
   security algorithms. Thus DTLS 1.3 is the newest version of DTLS
   and also the SHA-1 HMAC algorithm of RFC 4895 is getting towards
   the end of usefulness. Use of DTLS 1.3 with long lived associations
   require parallel DTLS connections. Thus, this document mandates usage of
   relevant versions and algorithms.</t>
      <t>Allowing DTLS Messages on any stream: RFC6083 requires DTLS messages
   that are not user message data to sent on stream 0 and that this
   stream is used with in-order delivery. That can actually limit the
   applications that can use DTLS/SCTP. In addition with DTLS 1.3
   encrypting the actual message type it is anyway not available.
   Therefore a more flexible rule set is used that relies on DTLS
   handling reordering.</t>
      <t>Clarifications: Some implementation experiences have been gained that
   motivates additional clarifications on the specification.</t>
      <ul spacing="normal">
        <li>Avoid unsecured messages prior to DTLS handshake have completed.</li>
        <li>Make clear that all messages are encrypted after DTLS handshake.</li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
