<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 3.1.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-tsvwg-dtls-over-sctp-bis-05" category="std" consensus="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.15.1 -->
  <front>
    <title abbrev="DTLS over SCTP">Datagram Transport Layer Security (DTLS) over Stream Control Transmission Protocol (SCTP)</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-tsvwg-dtls-over-sctp-bis-05"/>
    <author initials="M." surname="Westerlund" fullname="Magnus Westerlund">
      <organization>Ericsson</organization>
      <address>
        <email>magnus.westerlund@ericsson.com</email>
      </address>
    </author>
    <author initials="J." surname="Preuß Mattsson" fullname="John Preuß Mattsson">
      <organization>Ericsson</organization>
      <address>
        <email>john.mattsson@ericsson.com</email>
      </address>
    </author>
    <author initials="C." surname="Porfiri" fullname="Claudio Porfiri">
      <organization>Ericsson</organization>
      <address>
        <email>claudio.porfiri@ericsson.com</email>
      </address>
    </author>
    <date year="2022" month="October" day="24"/>
    <area>Transport</area>
    <workgroup>TSVWG</workgroup>
    <abstract>
      <t>This document describes the usage of the Datagram Transport Layer
   Security (DTLS) protocol to protect user messages sent over the
   Stream Control Transmission Protocol (SCTP). It is an improved
   alternative to the existing RFC 6083.</t>
      <t>DTLS over SCTP provides mutual authentication, confidentiality,
   integrity protection, and replay protection for applications that
   use SCTP as their transport protocol and allows client/server
   applications to communicate in a way that is designed to give
   communications privacy and to prevent eavesdropping and detect
   tampering or message forgery.</t>
      <t>Applications using DTLS over SCTP can use almost all transport
   features provided by SCTP and its extensions. This document is an
   improved alternative to RFC 6083 and removes the 16 kB limitation
   on protected user message size by defining a secure user message
   fragmentation so that multiple DTLS records can be used to protect
   a single user message. It further contains a large number of
   security fixes and improvements. It updates the DTLS versions and
   SCTP-AUTH HMAC algorithms to use. It mitigates reflection attacks
   of data and control chunks and replay attacks of data chunks.  It
   simplifies secure implementation by some stricter requirements on
   the establishment procedures as well as rekeying to align with zero
   trust principles.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/gloinul/draft-westerlund-tsvwg-dtls-over-sctp-bis"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <section anchor="overview">
        <name>Overview</name>
        <t>This document describes the usage of the Datagram Transport Layer
   Security (DTLS) protocol, as defined in DTLS 1.2 <xref target="RFC6347"/>, and
   DTLS 1.3 <xref target="RFC9147"/>, over the Stream Control
   Transmission Protocol (SCTP), as defined in <xref target="RFC9260"/> with
   Authenticated Chunks for SCTP (SCTP-AUTH) <xref target="RFC4895"/>.</t>
        <t>This specification provides mutual authentication of endpoints,
   data confidentiality, data origin authentication, data integrity
   protection, and data replay protection of user messages for
   applications that use SCTP as their transport protocol.  Thus, it
   allows client/server applications to communicate in a way that is
   designed to give communications privacy and to prevent
   eavesdropping and detect tampering or message forgery. DTLS/SCTP
   uses DTLS for mutual authentication, key exchange with forward
   secrecy for SCTP-AUTH, and confidentiality of user
   messages. DTLS/SCTP use SCTP and SCTP-AUTH for integrity protection
   and replay protection of all SCTP Chunks that can be authenticated,
   including user messages.</t>
        <t>Applications using DTLS over SCTP can use almost all transport
   features provided by SCTP and its extensions. DTLS/SCTP supports:</t>
        <ul spacing="normal">
          <li>preservation of message boundaries.</li>
          <li>a large number of unidirectional and bidirectional streams.</li>
          <li>ordered and unordered delivery of SCTP user messages.</li>
          <li>the partial reliability extension as defined in <xref target="RFC3758"/>.</li>
          <li>the dynamic address reconfiguration extension as defined in
 <xref target="RFC5061"/>.</li>
          <li>User messages of any size.</li>
        </ul>
        <t>The method described in this document requires that the SCTP
   implementation supports the optional feature of fragmentation of
   SCTP user messages as defined in <xref target="RFC9260"/>. The implementation is
   required to have an SCTP API (for example the one described in
   <xref target="RFC6458"/>) that supports partial user message delivery and also
   recommended that I-DATA chunks as defined in <xref target="RFC8260"/> is used to
   efficiently implement and support larger user messages.</t>
        <t>To simplify implementation and reduce the risk for security holes,
   limitations have been defined such that STARTTLS as specified in
   <xref target="RFC3788"/> is no longer supported.</t>
      </section>
      <section anchor="protocol-overview">
        <name>Protocol Overview</name>
        <t>The DTLS/SCTP protection is defined as an SCTP adaptation layer
<xref target="RFC5061"/> that is implemented on top of an SCTP API for an SCTP
implementation with SCTP-AUTH <xref target="RFC4895"/> support. DTLS/SCTP is
expected to provide an SCTP like API towards the upper layer protocol
with some additions for controlling the DTLS/SCTP security parameters
and policies. This minimizes the impact on the SCTP implementation and
wire image.</t>
        <figure anchor="dtls-sctp-layering">
          <name>DTLS/SCTP layering in regard to SCTP and upper layer protocol</name>
          <artset>
            <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="288" width="464" viewBox="0 0 464 288" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px">
                <path d="M 8,32 L 8,256" fill="none" stroke="black"/>
                <path d="M 184,32 L 184,256" fill="none" stroke="black"/>
                <path d="M 272,128 L 272,160" fill="none" stroke="black"/>
                <path d="M 328,128 L 328,160" fill="none" stroke="black"/>
                <path d="M 8,32 L 184,32" fill="none" stroke="black"/>
                <path d="M 8,96 L 184,96" fill="none" stroke="black"/>
                <path d="M 272,128 L 328,128" fill="none" stroke="black"/>
                <path d="M 184,144 L 264,144" fill="none" stroke="black"/>
                <path d="M 272,160 L 328,160" fill="none" stroke="black"/>
                <path d="M 8,192 L 184,192" fill="none" stroke="black"/>
                <path d="M 8,256 L 184,256" fill="none" stroke="black"/>
                <g class="text">
                  <text x="96" y="68">ULP</text>
                  <text x="204" y="100">&lt;-</text>
                  <text x="236" y="100">SCTP</text>
                  <text x="272" y="100">API</text>
                  <text x="296" y="100">+</text>
                  <text x="340" y="100">Security</text>
                  <text x="420" y="100">Parameters</text>
                  <text x="56" y="132">DTLS/SCTP</text>
                  <text x="60" y="148">Adaptation</text>
                  <text x="300" y="148">DTLS</text>
                  <text x="40" y="164">Layer</text>
                  <text x="204" y="196">&lt;-</text>
                  <text x="236" y="196">SCTP</text>
                  <text x="272" y="196">API</text>
                  <text x="296" y="196">+</text>
                  <text x="344" y="196">SCTP-AUTH</text>
                  <text x="400" y="196">API</text>
                  <text x="44" y="228">SCTP</text>
                  <text x="72" y="228">+</text>
                  <text x="120" y="228">SCTP-AUTH</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art"><![CDATA[
+---------------------+
|                     |
|         ULP         |
|                     |
+---------------------+ <- SCTP API + Security Parameters
|                     |
| DTLS/SCTP           |          +------+
| Adaptation          +----------| DTLS |
| Layer               |          +------+
|                     |
+---------------------+ <- SCTP API + SCTP-AUTH API
|                     |
|  SCTP + SCTP-AUTH   |
|                     |
+---------------------+

]]></artwork>
          </artset>
        </figure>
        <t>DTLS/SCTP performs protection operations on ULP data as it is provided
to DTLS/SCTP, as whole or a part of a SCTP user messages to be
transported to the peer. DTLS/SCTP uses the regular SCTP multiplexing
mechanisms for data using streams and individual user messages. The
protection operation for a ULP user message larger than the maximum
DTLS record size is performed by first splitting the user message into
suitable fragments that fit into individual DTLS records. Each
fragment is encrypted and provided with authentication tag by DTLS.</t>
        <artwork><![CDATA[
   m0 | m1 | m2 | ... = user_message

  user_message' = DTLS( m0 ) | DTLS( m1 ) | DTLS( m2 ) ...
]]></artwork>
        <t>The sequence of protected user message fragments (user_message') are
then transmitted as a SCTP user message. SCTP-AUTH provides
authentication of the SCTP packets and prevents injection of data or
reordering of DTLS fragments thus ensuring that each protected user
message can be de-protected in the receiver in order and
reassembled. Partial transmission and delivery of user messages are
supported on a per fragment basis.</t>
        <t>SCTP's capability for multi-stream concurrent transmission of
different SCTP user messages, where each SCTP user message can
potentially be very large, results in some challenges for any change
of the keys used to protect the ULP data. SCTP-AUTH API, defined in
<xref target="RFC6458"/>, provides additional limitations that needs to be
considered when supported. These issues and the related limitations
will be discussed more in details below.</t>
        <t>RFC6083 dealt with the above limitations by requiring that the peers
drained all outstanding data before updating the key to prevent
issues. This can have significant impact on a ULP that requires timely
and frequent exchange of user messages. This specification uses
another solution to these problems assuming a sufficient capable SCTP
and SCTP-AUTH implementations and with rich enough APIs.</t>
        <t>The solution that ensures the current keying material will not be
prematurely discarded on renegotiation or key update, is based on not
using these mechanisms and instead establishing a second DTLS
connection over the SCTP association. This creates a parallel DTLS
connections, where the DTLS connection ID feature is used to identify
the originating DTLS connection for each DTLS record or message. When
a new DTLS connection has been established and its keying material is
made available, the sender starts using it to protect the ULP
data. When all protected user message fragments protected by the old
key have been delivered in a non-renegable way then the old DTLS
connection can be terminated and the associated keying material
discarded.</t>
      </section>
      <section anchor="buffering">
        <name>DTLS/SCTP Buffering and Flow Control</name>
        <t>With DTLS/SCTP as a layer above SCTP stacks on both sender and
   receiver side some consideration is needed for buffering and
   resource contention, and how back pressure is applied in cases the
   receiving application is not keeping up with the sender. The ULP
   may use multiple user messages simultaneous, and the progress and
   delivery of these messages are progressing independently, thus the
   receiving DTLS/SCTP implementation may not receive DTLS records in
   order in case of packet loss.</t>
        <t>On the sender side the DTLS/SCTP layer will need to accept data
   from the ULP of at least one maximum DTLS record size. The maximum
   DTLS record size is 2<sup>14</sup> bytes per default or a lower
   negotiated value using the DTLS extension defined in
   <xref target="RFC8449"/>. The user message fragment is then protected by DTLS
   and assumed to immediately after be dispatched for transmission by
   SCTP.</t>
        <t>As SCTP schedules the DTLS record for transmission as SCTP packets
   it will become part of the data tracked by the send/receive buffer
   in the SCTP stacks. The maximum receiver buffer size is negotiated
   and provides an upper limit of how much outstanding data can exist
   on the SCTP layer. For example, if an DTLS record part of user
   message N experience repeated packet losses, it may not be
   delivered, despite several later user messages fragments has been
   delivered.</t>
        <t>Next, we assume that the receiver side DTLS/SCTP will read partial
   user messages from the SCTP receiver stack as they become available
   unless it can't keep up or has run out of intermediate buffer space
   for reassembly of the DTLS records in each user message. Thus, in
   case the receiver falls behind it will eventually block the
   receiver buffer by not consuming data from it and thus creating
   back pressure towards the sender. But, at any time it is assumed
   that the receiver side DTLS/SCTP layer will not buffer multiple
   DTLS records, and instead process each as soon as
   possible. Buffering multiple DTLS records prior to DTLS decryption
   would increase the total number of DTLS records in flight, counted
   between DTLS encryption and decryption, and thus risk overlapping
   DTLS sequence numbers.</t>
        <t>To avoid overlapping sequence number the DTLS sender should first
   of all use 16-bit sequence number to enable a larger
   space. Secondly, it should track which DTLS records has been
   non-renegable ACKed by the receiver and always maintain a certain
   safety buffer in number of DTLS records. Thirdly, the
   implementation needs to attempt to minimize usage of buffers that
   exist after the DTLS encryption until the DTLS Decryption in its
   sender and receiver implementation.</t>
      </section>
      <section anchor="comparison-with-tls-over-sctp">
        <name>Comparison with TLS over SCTP</name>
        <t>TLS, from which DTLS was derived, is designed to run on top of a
   byte-stream-oriented transport protocol providing a reliable, in-
   sequence delivery. TLS over SCTP as described in <xref target="RFC3436"/> has
   some serious limitations:</t>
        <ul spacing="normal">
          <li>It does not support the unordered delivery of SCTP user messages.</li>
          <li>It does not support partial reliability as defined in
<xref target="RFC3758"/>.</li>
          <li>It only supports the usage of the same number of streams in both
 directions.</li>
          <li>It uses a TLS connection for every bidirectional stream, which
 requires a substantial amount of resources and message exchanges
 if a large number of streams is used.</li>
        </ul>
      </section>
      <section anchor="changes-from-rfc-6083">
        <name>Changes from RFC 6083</name>
        <t>The DTLS over SCTP solution defined in RFC 6083 had the following
   limitations:</t>
        <ul spacing="normal">
          <li>The maximum user message size is 2<sup>14</sup> (16384) bytes,
 which is a single DTLS record limit.</li>
          <li>DTLS 1.0 has been deprecated for RFC 6083 requiring at least DTLS
1.2 <xref target="RFC8996"/>. This creates additional limitations as discussed
in <xref target="DTLS-version"/>.</li>
          <li>DTLS messages that don't contain protected user message data
where limited to only be sent on Stream 0, which could
potentially impact applications.</li>
          <li>An on-path attacker can reflect the authenticated part of a SCTP
packet back to the sender as well as replaying data and control
chunks.</li>
        </ul>
        <t>This specification defines the following changes compared with RFC
   6083:</t>
        <ul spacing="normal">
          <li>Removes the limitations on user messages sizes by defining a secure
fragmentation mechanism. It is optional to support message sizes
over 2<sup>64</sup>-1 bytes.</li>
          <li>Update DTLS key material without requiring draining all in-flight
user message from SCTP.</li>
          <li>Mandates that more modern DTLS version are used (DTLS 1.2 or
1.3)</li>
          <li>Mandates support of modern HMAC algorithm (SHA-256) in the SCTP
authentication extension <xref target="RFC4895"/>.</li>
          <li>Recommends support of <xref target="RFC8260"/> to enable interleaving of large
SCTP user messages to avoid scheduling issues.</li>
          <li>Applies stricter requirements on always using DTLS for all user
messages in the SCTP association.</li>
          <li>Requires that SCTP-AUTH is applied to all SCTP Chunks that can be
authenticated.</li>
          <li>Requires support of partial delivery of user messages.</li>
          <li>Derives direction specific SCTP-AUTH keys to mitigate reflection
attacks.</li>
          <li>Mandates SCTP-AUTH rekeying before the TSN cycles back to the
Initial TSN to mitigate replay of data chunks.</li>
        </ul>
      </section>
      <section anchor="DTLS-version">
        <name>DTLS Version</name>
        <t>Using DTLS 1.2 instead of using DTLS 1.0 limits the lifetime of a
   DTLS connection and the data volume which can be transferred over a
   DTLS connection.  This is caused by:</t>
        <ul spacing="normal">
          <li>The number of renegotiations in DTLS 1.2 is limited to 65534
compared to unlimited in DTLS 1.0.</li>
          <li>While the AEAD limits in DTLS 1.3 does not formally apply to DTLS
1.2 the mathematical limits apply equally well to DTLS 1.2.</li>
        </ul>
        <t>DTLS 1.3 comes with a large number of significant changes.</t>
        <ul spacing="normal">
          <li>Renegotiations are not supported and instead partly replaced by
 key updates. The number of key updates is limited to
 2<sup>48</sup>.</li>
          <li>Strict AEAD significantly limits on how much many packets can be
sent before rekeying.</li>
        </ul>
        <t>Many applications using DTLS/SCTP are of semi-permanent nature.
   Semi-permanent term comes from telecom and referres to connections
   that start at a certain time and are rarely closed.
   Semi-permanent connections use SCTP associations with expected
   lifetimes of months or even years where there is a significant
   cost for bringing them down in order to restart it.
   Such DTLS/SCTP usages that need:</t>
        <ul spacing="normal">
          <li>Periodic re-authentication and transfer of revocation information
of both endpoints (not only the DTLS client).</li>
          <li>Periodic rerunning of Diffie-Hellman Key Exchange to provide
forward secrecy and mitigate static key exfiltration attacks.</li>
          <li>Perform SCTP-AUTH rekeying.</li>
        </ul>
        <t>At the time of publication, DTLS 1.3 does not support any of these,
   where DTLS 1.2 renegotiation functionality can provide these
   functionality in the context of DTLS/SCTP. To address these
   requirements from semi-permanent applications, this document uses
   several overlapping DTLS connections with either DTLS 1.2 or
   1.3. Having uniform procedures reduces the impact when upgrading
   from DTLS 1.2 to DTLS 1.3 and avoids using the renegotiation
   mechanism which is disabled by default in many DTLS
   implementations.</t>
        <t>To address known vulnerabilities in DTLS 1.2 this document
   describes and mandates implementation constraints on ciphers and
   protocol options. The DTLS 1.2 renegotiation mechanism is forbidden
   to be used as it creates the need for additional mechanism to handle
   race conditions and interactions between using DTLS connections in
   parallel.</t>
        <t>Secure negotiation of the DTLS version is handled by the DTLS
   handshake. If the endpoints do not support a common DTLS version
   the DTLS handshake will be aborted.</t>
        <t>In the rest of the document, unless the version of DTLS is
   specifically called out, the text applies to both versions of DTLS.</t>
        <t>DTLS/SCTP requires the maximum DTLS record size to be known, and
   not being changed during the lifetime of the Association.</t>
      </section>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>This document uses the following terms:</t>
        <dl>
          <dt>Association:</dt>
          <dd>
            <t>An SCTP association.</t>
          </dd>
          <dt>Connection:</dt>
          <dd>
            <t>A DTLS connection. It is uniquely identified by a
   connection identifier.</t>
          </dd>
          <dt>Stream:</dt>
          <dd>
            <t>A unidirectional stream of an SCTP association.  It is
   uniquely identified by a stream identifier.</t>
          </dd>
        </dl>
      </section>
      <section anchor="abbreviations">
        <name>Abbreviations</name>
        <dl>
          <dt>AEAD:</dt>
          <dd>
            <t>Authenticated Encryption with Associated Data</t>
          </dd>
          <dt>DTLS:</dt>
          <dd>
            <t>Datagram Transport Layer Security</t>
          </dd>
          <dt>HMAC:</dt>
          <dd>
            <t>Keyed-Hash Message Authentication Code</t>
          </dd>
          <dt>MTU:</dt>
          <dd>
            <t>Maximum Transmission Unit</t>
          </dd>
          <dt>PPID:</dt>
          <dd>
            <t>Payload Protocol Identifier</t>
          </dd>
          <dt>SCTP:</dt>
          <dd>
            <t>Stream Control Transmission Protocol</t>
          </dd>
          <dt>SCTP-AUTH:</dt>
          <dd>
            <t>Authenticated Chunks for SCTP <xref target="RFC4895"/></t>
          </dd>
          <dt>TCP:</dt>
          <dd>
            <t>Transmission Control Protocol</t>
          </dd>
          <dt>TLS:</dt>
          <dd>
            <t>Transport Layer Security</t>
          </dd>
          <dt>ULP:</dt>
          <dd>
            <t>Upper Layer Protocol</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="conventions">
      <name>Conventions</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
   "OPTIONAL" in this document are to be interpreted as described in
   BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all
   capitals, as shown here.</t>
    </section>
    <section anchor="dtls-considerations">
      <name>DTLS Considerations</name>
      <section anchor="version-of-dtls">
        <name>Version of DTLS</name>
        <t>This document defines the usage of either DTLS 1.3 <xref target="RFC9147"/>, or
   DTLS 1.2 <xref target="RFC6347"/>.  Earlier versions of DTLS MUST NOT be used
   (see <xref target="RFC8996"/>).  DTLS 1.3 is RECOMMENDED for security and
   performance reasons.  It is expected that DTLS/SCTP as described in
   this document will work with future versions of DTLS.</t>
        <t>Only one version of DTLS MUST be used during the lifetime of an
   SCTP Association, meaning that the procedure for replacing the DTLS
   version in use requires the existing SCTP Association to be
   terminated and a new SCTP Association with the desired DTLS version
   to be instantiated.</t>
      </section>
      <section anchor="cipher-suites-and-cryptographic-parameters">
        <name>Cipher Suites and Cryptographic Parameters</name>
        <t>For DTLS 1.2, the cipher suites forbidden by <xref target="RFC9113"/> MUST NOT
   be used. For all versions of DTLS, cryptographic parameters giving
   confidentiality and forward secrecy MUST be used.</t>
        <t>There are potential for aligning used hash algorithms between
   SCTP-AUTH and the DTLS cipher suit. If the otherwise considered to
   be used SCTP-AUTH hash algorithms and DTLS Cipher suits have
   matching hashing algorithms it is RECOMMENDED to indicate a
   preference for such algorithms. Note, however as the SCTP-AUTH
   hashing algorithm is chosen during SCTP association handshake it
   can't be changed once it is known what is supported in DTLS by the
   peer endpoint.</t>
      </section>
      <section anchor="authentication">
        <name>Authentication</name>
        <t>The DTLS handshakes MUST use mutual authentication.</t>
      </section>
      <section anchor="renegotiation-and-key-update">
        <name>Renegotiation and Key Update</name>
        <t>DTLS 1.2 renegotiation enables rekeying (with ephemeral Diffie-
   Hellman) of DTLS as well as mutual reauthentication and transfer of
   revocation information inside an DTLS 1.2 connection. Renegotiation
   has been removed from DTLS 1.3 and partly replaced with
   post-handshake mechanism for key update. The parallel DTLS
   connection solution was specified due to lack of necessary features
   with DTLS 1.3 considered needed for long lived SCTP associations,
   such as rekeying (with ephemeral Diffie-Hellman) as well as mutual
   reauthentication.</t>
        <t>This specification does not allow usage of DTLS 1.2 renegotiation to
   avoid race conditions and corner cases in the interaction between
   the parallel DTLS connection mechanism and the keying of
   SCTP-AUTH. In addition, renegotiation is also disabled in some
   implementations, as well as dealing with the epoch change reliable
   have similar or worse application impact.</t>
        <t>This specification also forbids against using DTLS 1.3 key update
   and instead rely on parallel DTLS connections. For DTLS 1.3 there
   isn't feature parity. It also has the issue that a DTLS
   implementation following the RFC may assume a too limited window
   for SCTP where the previous epoch's security context is maintained
   and thus, changes to epoch handling would be necessary.</t>
        <t>A DTLS 1.2 endpoint MUST NOT use renegotiation and a DTLS 1.3
   endpoint MUST NOT send any KeyUpdate message. The endpoint MUST
   instead initiate a new DTLS connection before the old one reaches
   the used cipher suit's key lifetime. The AEAD limits given in
   section 4.5.3 of <xref target="RFC9147"/> SHOULD be followed.</t>
      </section>
      <section anchor="dtls-connection-identifier">
        <name>DTLS Connection Identifier</name>
        <t>The DTLS Connection ID MUST be negotiated, according to <xref target="RFC9146"/>
   for DTLS 1.2, and Section 9 of <xref target="RFC9147"/> for DTLS 1.3.</t>
        <t>Section 4 of <xref target="RFC9146"/> states "If, however, an implementation
   chooses to receive different lengths of CID, the assigned CID
   values must be self-delineating since there is no other mechanism
   available to determine what connection (and thus, what CID length)
   is in use.". As this solution requires multiple connection IDs,
   using a zero-length CID will be highly problematic as it could
   result in that any DTLS records with a zero length CID ends up in
   another DTLS connection context, and there fail the decryption and
   integrity verification. And in that case to avoid losing the DTLS
   record, it would have to be forwarded to another zero-length CID
   using DTLS Connection, where decryption and validation must be
   tried, resulting in higher resource utilization. Thus, it is
   REQUIRED to use non-zero length CID values, and RECOMMENDED to use
   a single common length for the CID values. A single byte should be
   sufficient, as reuse of old CIDs is possible as long as the
   implementation ensures that they are not used in near time to the
   previous usage.</t>
      </section>
      <section anchor="dtls-sequence-number-size">
        <name>DTLS Sequence number size</name>
        <t>16-bit sequence number SHOULD be used rather than 8-bit to avoid
   limitations in number of inflight DTLS records. Overlapping
   sequence number due to wrapping of the sequence number MUST be
   prevented as it otherwise can lead to decryption failure that
   result in failure of the transport service. See
   <xref target="Prevent-DTLS-Seq-wraps"/> for how to prevent sequence number
   wraps.</t>
      </section>
      <section anchor="Msg-size">
        <name>Message Sizes</name>
        <t>If DTLS 1.3 is used, the length field in the record layer MUST
   be included in all records.</t>
        <t>DTLS/SCTP, automatically fragments and reassembles user
   messages. This specification defines how to fragment the user
   messages into DTLS records, where each DTLS record allows a maximum
   of 2<sup>14</sup> protected bytes. It is mandated that DTLS
   supports the maximum record size of 2<sup>14</sup> bytes.
   DTLS/SCTP MAY exploit maximum DTLS record size less than
   2<sup>14</sup> bytes due to implementation choice, in such case
   maximum record size MUST be negotiated according to
   <xref target="RFC8449"/>. The negotiated value MUST be known to DTLS/SCTP and
   SHALL NOT be changed during the SCTP Association lifetime.</t>
        <t>The sequence of DTLS records is then fragmented into DATA or I-DATA
   Chunks to fit the path MTU by SCTP. These changes ensure that
   DTLS/SCTP has the same capability as SCTP to support user messages
   of any size. However, to simplify implementations it is OPTIONAL to
   support user messages larger than 2<sup>64</sup>-1 bytes. This is
   to allow implementation to assume that 64-bit length fields and
   offset pointers will be sufficient.</t>
        <t>The security operations and reassembly process requires that the
   protected user message, i.e., with DTLS record overhead, is stored
   in the receiver's buffer. This buffer space will thus put a limit
   on the largest size of plain text user message that can be
   transferred securely. However, by mandating the use of the partial
   delivery of user messages from SCTP and assuming that no two
   messages received on the same stream are interleaved (as it is the
   case when using the API defined in <xref target="RFC6458"/>) the minimally
   required buffering prior to DTLS processing is a single DTLS record
   per used incoming stream. This enables the DTLS/SCTP implementation
   to provide the Upper Layer Protocol (ULP) with each DTLS record's
   content, when it has been decrypted and its integrity been
   verified, enabling partial user message delivery to the ULP.
   However, for efficient operation and avoiding flow control stalls
   if user message fragments are not frequently and expediently moved
   to upper layer memory buffers, the receiver buffer needs to be
   larger.</t>
        <t>Implementations can trade-off buffer memory requirements in the
   DTLS layer with transport overhead by using smaller DTLS records,
   in this case the record size limit extension for DTLS according to
   <xref target="RFC8449"/> MUST be used and the negotiated record size SHALL be
   communicated to DTLS/SCTP.  The maximum record size SHALL be the
   same during the lifetime of the Association, i.e., renegotiated to
   the same value in all subsequent DTLS connections.</t>
        <t>The DTLS/SCTP implementation is expected to behave very similar to
   just SCTP when it comes to handling of user messages and dealing
   with large user messages and their reassembly and
   processing. Making it the ULP responsible for handling any resource
   contention related to large user messages.</t>
      </section>
      <section anchor="replay-protection">
        <name>Replay Protection</name>
        <t>SCTP-AUTH <xref target="RFC4895"/> does not have explicit replay
   protection. However, the combination of SCTP-AUTH's protection of
   DATA or I-DATA chunks and SCTP user message handling will prevent
   third party attempts to inject or replay SCTP data chunks as long as
   the Transmission Sequence Numbers (TSNs) are unique. In fact, this
   document's solution is dependent on SCTP-AUTH and SCTP to prevent
   reordering, duplication, and removal of the DTLS records within
   each protected user message.  This includes detection of changes to
   what DTLS records start and end the SCTP user message, and removal of
   DTLS records before an increment to the epoch.  Without SCTP-AUTH,
   these would all have required explicit handling.</t>
        <t>To prevent replay of DATA or I-DATA chunks resulting in impact on
   the received protected user message, the SCTP-AUTH key MUST be
   retired before it has been used with more than 2<sup>32</sup> TSNs.
   Implementations MUST therefore setup a new parallel DTLS connection
   to rekey well before 2<sup>32</sup> TSNs have been used with a
   SCTP-AUTH key.</t>
        <t>DTLS/SCTP does not provide replay protection for authenticated
   control chunks such as ERROR, RE-CONFIG <xref target="RFC6525"/>, or SACK. An
   on-path attacker can replay control chunks as long as the receiving
   endpoint still has the endpoint pair shared secret. Such replay
   could disrupt the SCTP association and could therefore be a
   denial-of-service attack.</t>
        <t>DTLS optionally supports record replay detection. Such replay
   detection could result in the DTLS layer dropping valid messages
   received outside of the DTLS replay window. As DTLS/SCTP provides
   replay protection even without DTLS replay protection, the replay
   detection of DTLS MUST NOT be used.</t>
      </section>
      <section anchor="path-mtu-discovery">
        <name>Path MTU Discovery</name>
        <t>DTLS Path MTU Discovery MUST NOT be used.  Since SCTP provides Path
   MTU discovery and fragmentation/reassembly for user messages as
   specified in <xref target="Msg-size"/>, DTLS can send maximum sized DTLS
   Records.</t>
      </section>
      <section anchor="retransmission-of-messages">
        <name>Retransmission of Messages</name>
        <t>SCTP provides a reliable and in-sequence transport service for DTLS
   messages that require it.  See <xref target="Stream-Usage"/>.  Therefore, DTLS
   procedures for retransmissions MUST NOT be used.</t>
      </section>
    </section>
    <section anchor="sctp-considerations">
      <name>SCTP Considerations</name>
      <section anchor="Mapping-DTLS">
        <name>Mapping of DTLS Records</name>
        <t>The SCTP implementation MUST support fragmentation of user messages
   using DATA <xref target="RFC9260"/>, and optionally I-DATA <xref target="RFC8260"/> chunks.</t>
        <t>DTLS/SCTP as an SCTP adaptation layer exist between the ULP user
   message API and SCTP. On the sender side a user message is split
   into fragments m0, m1, m2, each no larger than 2<sup>14</sup> =
   16384 bytes or the negotiated maximum DTLS record size
   (<xref target="Msg-size"/>).</t>
        <artwork><![CDATA[
   m0 | m1 | m2 | ... = user_message
]]></artwork>
        <t>The resulting fragments are protected with DTLS and the records are
   concatenated</t>
        <artwork><![CDATA[
   user_message' = DTLS( m0 ) | DTLS( m1 ) | DTLS( m2 ) ...
]]></artwork>
        <t>The new user_message', i.e., the protected user message, is the input
   to SCTP.</t>
        <t>On the receiving side, the length field in each DTLS record can be
   used to determine the boundaries between DTLS records. DTLS/SCTP
   SHOULD request decryption of each individual records as soon as
   possible.  The last DTLS record can be found by subtracting the
   length of individual records from the length of user_message'.  The
   output from the DTLS decryption(s) is the fragments m0, m1, m2 ...
   The user_message is reassembled from decrypted DTLS records as
   user_message = m0 | m1 | m2 ...</t>
        <t>There are four failure cases an DTLS/SCTP implementation needs to
   detect and then act on:</t>
        <ol spacing="normal" type="1"><li>Failure in decryption and integrity verification process of any
   DTLS record. Due to SCTP-AUTH preventing delivery of injected or
   corrupt fragments of the protected user message this should only
   occur in case of implementation errors or internal hardware
   failures or the necessary security context has been prematurely
   discarded.</li>
          <li>In case the SCTP layer indicates an end to a user message,
   e.g., when receiving a MSG_EOR in a recvmsg() call when using the
   API described in <xref target="RFC6458"/>, and the last buffered DTLS record
   length field does not match, i.e., the DTLS record is incomplete.</li>
          <li>Unable to perform the decryption processes due to lack of
   resources, such as memory, and have to abandon the user message
   fragment. This specification is defined such that the needed
   resources for the DTLS/SCTP operations are bounded for a given
   number of concurrent transmitted SCTP streams or unordered user
   messages.</li>
          <li>DTLS Replay protection. This specification mandates that replay
   protection shall not be used, otherwise the sequence number in a
   delayed DTLS record might be beyond what the replay window accepts
   and thus be dropped. If such a discard would happen the user
   message would be compromised as the data has been lost.</li>
        </ol>
        <t>The above failure cases all result in the receiver failing to
   recreate the full user message. This is a failure of the transport
   service that is not possible to recover from the DTLS/SCTP layer
   and the sender could believe the complete message have been
   delivered. This error MUST NOT be ignored, as SCTP lacks any
   facility to declare a failure on a specific stream or user message,
   the DTLS connection and the SCTP association SHOULD be
   terminated. A valid exception to the termination of the SCTP
   association is if the receiver is capable of notifying the ULP
   about the failure in delivery and the ULP is capable of recovering
   from this failure.</t>
        <t>Note that if the SCTP extension for Partial Reliability (PR-SCTP)
   <xref target="RFC3758"/> is used for a user message, user message may be
   partially delivered or abandoned. These failures are not a reason
   for terminating the DTLS connection and SCTP association.</t>
      </section>
      <section anchor="dtls-connection-handling">
        <name>DTLS Connection Handling</name>
        <t>DTLS/SCTP is negotiated on SCTP level as an adaptation layer
   (<xref target="Negotiation"/>). After a successful negotiation of the DTLS/SCTP
   adaptation layer during SCTP association establishment, a DTLS
   connection MUST be established prior the transmission of any ULP
   user messages. All DTLS connections are terminated when the SCTP
   association is terminated. A DTLS connection MUST NOT span multiple
   SCTP associations.</t>
        <t>As it is required to establish the DTLS connection at the beginning
   of the SCTP association, either of the peers should never send any
   SCTP user message that is not protected by DTLS. So, the case
   that an endpoint receives data that is neither DTLS messages nor
   protected user messages in the form of a sequence of DTLS Records
   on any stream is a protocol violation. The receiver MAY terminate
   the SCTP association due to this protocol
   violation. Implementations that do not have a DTLS endpoint
   in a state where application_data record can be accepted
   on SCTP handshake completion, will have to ensure
   correct caching of the messages until the DTLS endpoint is ready.</t>
        <t>Whenever a mutual authentication, updated security parameters,
   rerun of Diffie-Hellman Key Exchange, or SCTP-AUTH rekeying is
   needed, a new DTLS connection is instead setup in parallel with the
   old connection (i.e., there may be up to two simultaneous DTLS
   connections within one association).</t>
      </section>
      <section anchor="payload-protocol-identifier-usage">
        <name>Payload Protocol Identifier Usage</name>
        <t>SCTP Payload Protocol Identifiers are assigned by IANA.
   Application protocols using DTLS over SCTP SHOULD register and use
   a separate Payload Protocol Identifier (PPID) and SHOULD NOT reuse
   the PPID that they registered for running directly over SCTP.</t>
        <t>Using the same PPID does no harm as DTLS/SCTP requires all user
   messages being DTLS protected and knows that DTLS is used.  However,
   for protocol analyzers, for example, it is much easier if a
   separate PPID is used and avoids different behavior from
   <xref target="RFC6083"/>.</t>
        <t>Messages that are exchanged between DTLS/SCTP peers not containing
   ULP user messages shall use PPID = 0 according to section 3.3.1 of
   <xref target="RFC9260"/> as no application identifier can be specified by the
   upper layer for this payload data. With the exception for the
   DTLS/SCTP Control Messages (<xref target="Control-Message"/>) that uses its own
   PPID.</t>
      </section>
      <section anchor="Stream-Usage">
        <name>Stream Usage</name>
        <t>DTLS 1.3 protects the actual content type of the DTLS record and
   have therefore omitted the non-protected content type field. Thus,
   it is not possible to determine which content type the DTLS record
   has on SCTP level. For DTLS 1.2 ULP user messages will be carried
   in DTLS records with content type "application_data".</t>
        <t>DTLS Records carrying protected user message fragments MUST be sent
   in by the ULP indicated SCTP stream and user message and additional
   properties, such as PPID. The ULP has no limitations in using SCTP
   facilities for stream and user messages. DTLS records of other
   types MAY be sent on any SCTP stream. It MAY also be sent in its
   own SCTP user message as well as interleaved with other DTLS
   records carrying protected user message fragments. Thus, it is
   allowed to insert between protected user message fragments DTLS
   records of other types as the DTLS receiver will process these and
   not result in any user message data being inserted into the ULP's
   user message. However, DTLS messages of other types than protected
   user message MUST be sent reliable, so the DTLS record can only be
   interleaved in case the ULP user message is sent as reliable.</t>
        <t>DTLS is capable of handling reordering of the DTLS
   records. However, depending on stream properties and which user
   message DTLS records of other types are sent in may impact in which
   order and how quickly they are possible to process. Using the same
   stream with in-order delivery for the different messages will
   ensure that the DTLS Records are delivered in the order they are
   sent in user messages. Thus, ensuring that if there are DTLS
   records that need to be delivered in particular order it can be
   ensured. Alternatively, if it is desired that a DTLS record is
   delivered as early as possible, avoiding in-order streams with
   queued messages and considering stream priorities can result in
   faster delivery.</t>
        <t>A simple solution avoiding any protocol issue with sending DTLS
   messages, that are not protected user message fragments, is to pick
   a stream not used by the ULP, and send the DTLS messages in their
   own SCTP user messages with in order delivery. That mimics the RFC
   6083 behavior without impacting the ULP. However, it assumes that
   there are available streams to be used based on the SCTP
   association handshake allowed streams (Section 5.1.1 of
   <xref target="RFC9260"/>).</t>
      </section>
      <section anchor="chunk-handling">
        <name>Chunk Handling</name>
        <t>All chunks types that can be listed in the Chunk List Parameter
   <xref target="RFC4895"/>, i.e., all chunks types except INIT, INIT ACK, and
   SHUTDOWN-COMPLETE, MUST be sent in an authenticated way as
   described in <xref target="RFC4895"/>. This makes sure that an attacker cannot
   modify the stream in which a message is sent or affect the
   ordered/unordered delivery of the message. Note that COOKIE ECHO
   and COOKIE ACK are protected with an empty key. This is not a
   problem as everything in these chunks are determined by earlier
   chunks or ignored on receipt.</t>
        <t>If PR-SCTP as defined in <xref target="RFC3758"/> is used, the FORWARD-TSN
   chunks are sent in an authenticated way which makes sure that it is
   not possible for an attacker to drop messages and use forged
   FORWARD-TSN, SACK, and/or SHUTDOWN chunks to hide this dropping.</t>
        <t>I-DATA chunk type as defined in <xref target="RFC8260"/> is RECOMMENDED to be
   supported to avoid some of the down sides that large user messages
   have on blocking transmission of later arriving high priority user
   messages. However, the support is not mandated and negotiated
   independently from DTLS/SCTP.</t>
      </section>
      <section anchor="sctp-auth-hash-function">
        <name>SCTP-AUTH Hash Function</name>
        <t>When using DTLS/SCTP, the SHA-256 Message Digest Algorithm MUST be
   supported in the SCTP-AUTH <xref target="RFC4895"/> implementation. SHA-1 MUST
   NOT be used when using DTLS/SCTP. <xref target="RFC4895"/> requires support and
   inclusion of SHA-1 in the HMAC-ALGO parameter, thus, to meet
   both requirements the HMAC-ALGO parameter will include both SHA-256
   and SHA-1 with SHA-256 listed prior to SHA-1 to indicate the
   preference.</t>
        <t>When using DTLS/SCTP, each endpoint MUST use a single SCTP-AUTH
   Message Digest Algorithm during the whole SCTP association. This
   guarantees that an association shared key is only used with a single
   algorithm.</t>
      </section>
      <section anchor="Parallel-Dtls">
        <name>Parallel DTLS connections</name>
        <t>To enable SCTP-AUTH rekeying, periodic authentication of both
   endpoints, and force attackers to dynamic key extraction
   <xref target="RFC7624"/>, DTLS/SCTP per this specification defines the usage of
   parallel DTLS connections over the same SCTP association. This
   solution ensures that there are no limitations to the lifetime of
   the SCTP association due to DTLS, it also avoids dependency on
   version specific DTLS mechanisms such as renegotiation in DTLS 1.2,
   which is disabled by default in many DTLS implementations, or
   post-handshake messages in DTLS 1.3, which does not allow periodic
   mutual endpoint re-authentication or re-keying of
   SCTP-AUTH.</t>
        <t>Parallel DTLS connections enable opening a new DTLS
   connection performing an handshake, while the existing DTLS
   connection is kept in place.  In DTLS 1.3 the handshake MAY be a
   full handshake or a resumption handshake, and resumption can be done
   while the original connection is still open. In DTLS 1.2 the
   handshake MUST be a full handshake. The new parallel connection MUST
   use the same DTLS version as the existing connection.</t>
        <t>On DTLS handshake completion, DTLS/SCTP starts using
   the security context of the new DTLS connection for protection
   of ULP user messages and then ensure delivery of all the SCTP chunks
   using the old DTLS connections security context. When that has been
   achieved DTLS/SCTP shall close the old DTLS connection and discard
   the related security context.</t>
        <t>As specified in <xref target="Mapping-DTLS"/> the usage of DTLS connection ID is
   required to ensure that the receiver can correctly identify the
   DTLS connection and its security context when performing its
   de-protection operations. There is also only a single SCTP-AUTH key
   exported per DTLS connection ensuring that there is clear mapping
   between the DTLS connection ID and the SCTP-AUTH security context for
   each Key Identifier.</t>
        <t>Application writers should be aware that establishing a new DTLS
   connection may result in changes of security parameters.  See
   <xref target="sec-Consideration"/> for security considerations regarding rekeying.</t>
        <t>A DTLS/SCTP Endpoint MUST NOT have more than two DTLS connections
   open at the same time. Either of the endpoints MAY initiate a new
   DTLS connection by performing a DTLS handshake. To support this
   implementations and certificates need to support both DTLS client
   and server roles. Note that resumption is not possible between DTLS
   connections unless the endpoints have the same roles. As either
   endpoint can initiate a DTLS handshake on either side at the same
   time, either endpoint may receive a DTLS ClientHello message when
   it has sent its own ClientHello. In this case the ClientHello from
   the endpoint that had the DTLS Client role in the establishment of
   the existing DTLS connection shall be continued to be processed and
   the other dropped.</t>
        <t>When performing the DTLS handshake the endpoint MUST verify that
   the peer identifies using the same identity as in the previous DTLS
   connection.</t>
        <t>When the DTLS handshake has been completed, the new DTLS connection
   MUST be used for the DTLS protection of any new ULP user message,
   and SHOULD be switched to for protection of not yet protected user
   message fragments of partially transmitted user messages.  Also,
   after the completion of the DTLS handshake, a new SCTP-AUTH key will
   be exported per <xref target="handling-endpoint-secret"/>. To enable the sender
   and receiver to correctly identify when the old DTLS connection is
   no longer in use, the SCTP-AUTH key used to protect a SCTP packet
   MUST NOT be from a newer DTLS connection than produced any included
   DTLS record fragment.</t>
        <t>The SCTP API defined in <xref target="RFC6458"/> has limitation in changing the
   SCTP-AUTH key until the whole SCTP user message has been
   delivered. However, the DTLS/SCTP implementation can switch the
   DTLS connection used to protect the user message fragments to a
   newer, even if the older DTLS connections exported key is used
   for the SCTP-AUTH. And for SCTP implementations where the SCTP-AUTH
   key can be switched in the middle of a user message the SCTP-AUTH
   key should be changed as soon as all DTLS record fragments included
   in an SCTP packet have been protected by the newer DTLS connection.
   Any SCTP-AUTH receiver implementation is expected to be able to
   select key on per SCTP packet basis.</t>
        <t>The DTLS/SCTP endpoint timely indicates to its peer when the
   previous DTLS connection and its context are no longer needed for
   receiving any more data from this endpoint. This is done by sending
   a DTLS/SCTP Control Message <xref target="Control-Message"/> of type
   "Ready_To_Close" <xref target="Ready_To_Close"/> to its peer. The endpoint MUST
   NOT send the Ready_To_Close until the following two conditions are
   fulfilled:</t>
        <ol spacing="normal" type="1"><li>All SCTP packets containing part of any DTLS record or message
protected using the security context of this DTLS connection
have been acknowledged in a non-renegable way.</li>
          <li>All SCTP packets using the SCTP-AUTH key associated with the
security context of this DTLS connection have been acknowledged
in a non-renegable way.</li>
        </ol>
        <t>A DTLS/SCTP endpoint that fulfills the above conditions for the
   SCTP packets it sends, and have received a Ready_To_Close message,
   SHALL immediately initiate closing of this DTLS connection by
   sending a DTLS close_notify. Then when it has received the peer's
   close_notify terminate the DTLS connection and expunges the
   associated security context and SCTP-AUTH key. Note that it is not
   required for a DTLS/SCTP implementation that has received a
   Ready_To_Close message to send that message itself when it
   fulfills the conditions. However, in some situations both endpoints
   will fulfill the conditions close enough in time that both
   endpoints will send their Ready_To_Close prior to receiving the
   indication from the peer, that works as both endpoints will then
   initiate DTLS close_notify and terminate the DTLS connections upon
   the reception of the peers close_notify.</t>
        <t>SCTP implementations exposing APIs like <xref target="RFC6458"/> fulfilling
   these conditions require draining the SCTP association of all
   outstanding data after having completed all the user messages using
   the previous SCTP-AUTH key identifier, relying on the
   SCTP_SENDER_DRY_EVENT to know when delivery has been accomplished.
   A richer API could also be used that allows user message level
   tracking of delivery, see <xref target="api-considerations"/> for API
   considerations.</t>
        <t>For SCTP implementations exposing APIs like <xref target="RFC6458"/> where it is
   not possible to change the SCTP-AUTH key for a partial SCTP message
   initiated before the change of security context, it will be forced to
   track the SCTP messages and determine when all using the old
   security context has been transmitted. This maybe be impossible to
   do as completely reliable without tighter integration between the
   DTLS/SCTP layer and the SCTP implementation. This type of
   implementations also has an implicit limitation in how large SCTP
   messages it can support. Each SCTP message needs to have completed
   delivery and enabling closing of the previous DTLS connection prior
   to the need to create yet another DTLS connection. Thus, SCTP
   messages can't be larger than that the transmission completes in
   less than the duration between the rekeying or re-authentications
   needed for this SCTP association.</t>
        <t>The consequences of sending a DTLS close_notify alert in the old
   DTLS connection prior to the receiver having received the data can
   result in failure case 1 described in <xref target="Mapping-DTLS"/>, which likely
   result in SCTP association termination.</t>
      </section>
      <section anchor="handling-endpoint-secret">
        <name>Handling of Endpoint Pair Shared Secrets</name>
        <t>SCTP-AUTH <xref target="RFC4895"/> is keyed using endpoint pair shared
   secrets. In DTLS/SCTP, DTLS is used to establish these secrets.
   The endpoint pair shared secrets MUST be provided to the SCTP stack
   as soon as the computation is possible. The endpoints MUST NOT use
   another mechanism for establishing endpoint pair shared secrets for
   SCTP-AUTH.  The endpoint pair shared secret for Shared Key
   Identifier zero (0) is empty, it is used by both endpoints
   when establishing the first DTLS connection and MUST NOT be
   used to protect ULP data.</t>
        <t>The initial DTLS connection will be used to establish two new
   endpoint pair shared secrets which MUST use shared key identifier 2
   and 3. The endpoint pair shared secrets are derived using the TLS
   exporter interface using the ASCII strings
   "EXPORTER-DTLS-OVER-SCTP-CLIENT-WRITE" and
   "EXPORTER-DTLS-OVER-SCTP-SERVER-WRITE" with no terminating NUL, no
   context, and length 64.</t>
        <t>~~~~~~~~~~~
   TLS-Exporter("EXPORTER-DTLS-OVER-SCTP-CLIENT-WRITE", , 64)
   TLS-Exporter("EXPORTER-DTLS-OVER-SCTP-SERVER-WRITE", , 64)
   ~~~~~~~~~~~</t>
        <t>Keys derived with the label "EXPORTER-DTLS-OVER-SCTP-CLIENT-WRITE"
   always have an even Shared Key Identifier.  They are used by the
   TLS client for sending AUTH chunks and MUST NOT be used by the TLS
   client for receiving AUTH chunks.  Keys derived with the label
   "EXPORTER-DTLS-OVER-SCTP-SERVER-WRITE" always have an odd Shared
   Key Identifier.  They are used by the TLS server for sending AUTH
   chunks and MUST NOT be used by the TLS server for receiving AUTH
   chunks.  These directional keys change the behavior of SCTP-AUTH
   <xref target="RFC4895"/> and requires extensions to the SCTP API defined in
   <xref target="RFC6458"/>.</t>
        <t>When a subsequent DTLS connection is setup, two new 64-byte
   endpoint pair shared secrets are derived using the TLS-Exporter as
   defined above. The Shared Key Identifiers form a sequence. If the
   previous endpoint pair shared secrets used Shared Key Identifiers
   2n and 2n+1, the new ones MUST use Shared Key Identifier 2n+2 and
   2n+3, unless 2n = 65534, in which case the new Shared Key
   Identifiers are 2 and 3.</t>
        <t>A DTLS connection MUST NOT be used be used for protection of ULP
   data before the two SCTP-AUTH endpoint pair shared secrets has been
   exported and the other endpoint has been authenticated.</t>
        <section anchor="dtls-12-considerations">
          <name>DTLS 1.2 Considerations</name>
          <t>Whenever a new DTLS connection is established, two 64-byte endpoint
   pair shared secrets are derived using the TLS-Exporter described in
   <xref target="RFC5705"/>.</t>
          <t>After sending or receiving the DTLS client Finished message for the
   initial DTLS connection, the active SCTP-AUTH key MUST be switched
   from key identifier zero (0) to key identifiers 2 and 3 and the
   SCTP-AUTH Shared Key Identifier zero MUST NOT be used.</t>
          <t>When the endpoint has sent or received a close_notify on the old DTLS
   connection then the endpoint SHALL remove the two SCTP-AUTH endpoint
   pair shared secrets derived from the old DTLS connection.</t>
        </section>
        <section anchor="dtls-13-considerations">
          <name>DTLS 1.3 Considerations</name>
          <t>Whenever a new exporter_secret can be computed, two 64-byte
   endpoint pair shared secrets are derived using the TLS-Exporter
   described in Section 7.5 of <xref target="RFC8446"/>.</t>
          <t>After sending or receiving the DTLS server Finished message for the
   initial DTLS connection, the active SCTP-AUTH key MUST be switched
   from key identifier zero (0) to key identifiers 2 and 3 and the
   SCTP-AUTH Shared Key Identifier zero MUST NOT be used.</t>
          <t>When the endpoint has sent or received a close_notify in one
   direction on the old DTLS connection then the endpoint SHALL remove
   the SCTP-AUTH endpoint pair shared secret associated with that
   direction in the old DTLS connection.</t>
        </section>
      </section>
      <section anchor="sec-shutdown">
        <name>Shutdown</name>
        <t>To prevent DTLS from discarding DTLS user messages while it is
   shutting down, the below procedure has been defined. Its goal is to
   avoid the need for APIs requiring per user message data level
   acknowledgments and utilizes existing SCTP protocol behavior to
   ensure delivery of the protected user messages data.</t>
        <t>To support DTLS 1.2 close_notify behavior and avoid any uncertainty
   related to rekeying, a DTLS/SCTP protocol message
   (<xref target="Control-Message"/>) sent as protected SCTP user message is
   defined, with its own PPID, to inform the DTLS/SCTP layer that
   it is targeting the remote DTLS/SCTP function and act on the
   request to close in a controlled fashion.</t>
        <t>The shutdown procedure is initiated by any of the two peers,
   targeting the closure of the SCTP Association and the DTLS
   connections.  In order to ensure that shutdown is completed without
   data lost, DTLS/SCTP must control that both SCTP Tx buffers are
   empty first, then it must ensure that all data in SCTP Rx buffer
   has been fetched and delivered to ULP and finally it shall shutdown
   the DTLS connections and the SCTP Association.</t>
        <t>The interaction between peers (local and remote) and protocol
   stacks is as follows:</t>
        <ol spacing="normal" type="1"><li>Local instance of ULP asks for terminating the DTLS/SCTP
   Association.</li>
          <li>Local DTLS/SCTP acknowledges the request, from this time on no
   new data from local instance of ULP will be accepted.</li>
          <li>Local DTLS/SCTP finishes any protection operation on buffered
   user messages and ensures that all protected user message data has
   been successfully transferred to the remote peer.</li>
          <li>Local DTLS/SCTP sends a DTLS/SCTP Control Message
   (<xref target="Control-Message"/>) of type "SHUTDOWN_Request"
   (<xref target="SHUTDOWN-Request"/>) to its peer.</li>
          <li>The remote DTLS/SCTP, when receiving the SHUTDOWN-Request,
   informs its ULP that shutdown has been initiated. No more ULP user
   message data to be sent to the peer can be accepted by DTLS/SCTP.</li>
          <li>Remote DTLS/SCTP finishes any protection operation on buffered
   user messages and ensures that all protected user message data has
   been successfully transferred to the remote ULP.</li>
          <li>Remote DTLS/SCTP sends DTLS close_notify to Local DTLS/SCTP
   for each and all DTLS connections. Then it initiates the
   SCTP shutdown procedure (section 9.2 of <xref target="RFC9260"/>).</li>
          <li>When the local DTLS/SCTP receives a close_notify on a DTLS
   connection, in case it is DTLS 1.3 it SHALL send its corresponding
   DTLS close_notify on each open DTLS connection. When the last open
   DTLS connection has received close_notify and any if needed
   corresponding close_notify have been sent, the local DTLS/SCTP
   initiates the SCTP shutdown procedure (section 9.2 of <xref target="RFC9260"/>).</li>
          <li>Upon receiving the information that SCTP has closed the
   Association, independently the local and remote DTLS/SCTP entities
   destroy the DTLS connection completing the shutdown.</li>
        </ol>
        <t>The verification in step 3 and 6 that all user data message has been
   successfully delivered to the remote ULP can be provided by the
   SCTP stack that implements <xref target="RFC6458"/> by means of SCTP_SENDER_DRY
   event (section 6.1.9 of <xref target="RFC6458"/>).</t>
        <t>A successful SCTP shutdown will indicate successful delivery of all
   data. However, in cases of communication failures and extensive
   packet loss the SCTP shutdown procedure can time out and result in
   SCTP association termination where its unknown if all data has been
   delivered. The DTLS/SCTP should indicate to ULP successful
   completion or failure to shutdown gracefully.</t>
      </section>
      <section anchor="transmission-limitations">
        <name>Transmission Limitations</name>
        <section anchor="Prevent-DTLS-Seq-wraps">
          <name>Preventing DTLS sequence number wraps</name>
          <t>To avoid failures in DTLS record decryption it is necessary to
   ensure that the sequence number space never wraps for the DTLS
   records that are outstanding between the DTLS encryption and
   decryption. As discussed in <xref target="buffering"/> the amount of packets
   this include is a combination of any buffering in the endpoint and
   the amount of data in the SCTP sender/receiver buffer for the
   transmission.</t>
          <t>To avoid overlapping sequence number the DTLS sender should first
   of all use 16-bit sequence number to enable a larger
   space. Secondly, it should track which DTLS records has been
   non-renegable ACKed by the receiver and always maintain a certain
   safety buffer in number of DTLS records. Thirdly, the
   implementation needs to attempt to minimize usage of buffers that
   exist after the DTLS encryption until the DTLS Decryption in its
   sender and receiver implementation.</t>
          <t>If the receiver implementation keeps with the assumption to timely
   decrypt DTLS records after it has been completely received, the
   tracking of when a records has been fully received can maintain a
   good view of the total number of outstanding records in regard to
   the DTLS sequence number space and prevent wrapping of the sequence
   number space by not protecting additional user message fragments
   until further DTLS records has been acknowledged.</t>
          <t>Assuming a that a quarter of the sequence number space is used as
   safety margin it will limit the number of simultaneous in-flight
   DTLS records to 49152, and thus also the number of simultaneous user
   messages. Technically, if the DTLS implementation supports trial
   decoding, overlap of the sequence number but that results in both
   implementation requirements, need to signal the window it supports,
   and additional decryption overhead due to trial decoding and will
   be left for future extension.</t>
          <t>So, what size of SCTP receiver window this limitation corresponds to
   is highly dependent on the SCTP user message size. If all SCTP user
   messages are large, e.g., 1 MB, then most DTLS Records will be close
   to maximum DTLS record size. Thus, the SCTP receiver window size
   required before this becomes an issue becomes fairly close to 49152
   times 16384, i.e., approximately 800 MB. While SCTP user messages of
   100 bytes would only need a receiver window of approximately 5 MB.</t>
        </section>
        <section anchor="sctp-api-limitations">
          <name>SCTP API Limitations</name>
          <t>The SCTP-API defined in <xref target="RFC6458"/> results in an implementation
   limitation when it comes to support transmission of user messages
   of arbitrary sizes. That API does not allow changing the SCTP-AUTH
   key used for protecting the sending of a particular user
   message. Thus, user messages that will be transmitted over periods
   of time on the order or longer than the interval between rekeying
   can't be supported. Beyond delaying the completion of a rekeying
   until the message has been transmitted, the session can deadlock if
   the DTLS connection used to protect this long user message reaches
   the limit of number of bytes transmitted with a particular
   key. However, this is not an interoperability issue as it is the
   sender side's API that limits what can be sent and thus the sender
   implementation will have to address this issue.</t>
        </section>
      </section>
    </section>
    <section anchor="Control-Message">
      <name>DTLS/SCTP Control Message</name>
      <t>The DTLS/SCTP Control Message is defined as its own upper layer
   protocol for DTLS/SCTP identified by its own PPID. The control
   message is sent in network byte order.</t>
      <t>The first 32 bits are split in two 16-bit integers where the first
   contains the Control Message Number and the next 16-bit integer
   contains the length of the optional Variable Parameter.
   Granularity of Variable Parameter is 32-bit with trailing zeroes.</t>
      <artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|       Control Message No      |      Parameter Length         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
\                                                               \
/                      Variable Parameter                       /
\                                                               \
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
      <t>Each message is sent as its own SCTP user message after
   having been protected by an open DTLS connection on any SCTP stream
   and MUST be marked with SCTP Payload Protocol Identifier (PPID)
   value TBD1 (<xref target="sec-IANA-PPID"/>).</t>
      <t>The DTLS/SCTP implementation MUST consume all SCTP messages
   received with the PPID value of TBD1. If the message is not 32-bit
   long the message MUST be discarded and the error SHOULD be logged.
   In case the message has an unknown value the message is
   discarded and the event SHOULD be logged.</t>
      <t>Two control messages are defined in this specification.</t>
      <section anchor="SHUTDOWN-Request">
        <name>SHUTDOWN-Request</name>
        <t>The value "1" is defined as a request to the peer to initiate
   controlled shutdown. This is used per step 4 and 5 in
   <xref target="sec-shutdown"/>.  Control Message 1 "Shutdown request" has
   Parameter Length = 0.</t>
      </section>
      <section anchor="Ready_To_Close">
        <name>Ready To Close Indication</name>
        <t>The value "2" is defined as an indication to the peer that from its
   perspective all SCTP packets with user message or using the
   SCTP-AUTH key associated with the indicated DTLS connection have been
   sent and acknowledged as received in a non-renegable way. This is
   used per <xref target="Parallel-Dtls"/> to initiate the closing of the DTLS
   connections during rekeying.  Control Message 2 "Ready To Close"
   has Parameter Length equal to the size of the DTLS Connection ID
   parameter in bytes.  The Variable Parameter contains the DTLS
   Connection ID that is to be closed.</t>
      </section>
    </section>
    <section anchor="Negotiation">
      <name>DTLS over SCTP Service</name>
      <t>The adoption of DTLS over SCTP according to the current
   specification is meant to add to SCTP the option for transferring
   encrypted data.  When DTLS over SCTP is used, all data being
   transferred MUST be protected by chunk authentication and DTLS
   encrypted.  Chunks that need to be received in an authenticated way
   will be specified in the CHUNK list parameter according to
   <xref target="RFC4895"/>.  Error handling for authenticated chunks is according
   to <xref target="RFC4895"/>.</t>
      <section anchor="adaptation-layer-indication-in-initinit-ack">
        <name>Adaptation Layer Indication in INIT/INIT ACK</name>
        <t>At the initialization of the association, a sender of the INIT or
   INIT ACK chunk that intends to use DTLS/SCTP as specified in this
   specification MUST include an Adaptation Layer Indication Parameter
   <xref target="RFC5061"/> with the IANA assigned value TBD
   (<xref target="sec-IANA-ACP"/>) to inform its peer that it is able to support
   DTLS over SCTP per this specification.</t>
      </section>
      <section anchor="DTLS-init">
        <name>DTLS over SCTP Initialization</name>
        <t>Initialization of DTLS/SCTP requires all the following options to
   be part of the INIT/INIT ACK handshake:</t>
        <t>RANDOM: defined in <xref target="RFC4895"/></t>
        <t>CHUNKS: defined in <xref target="RFC4895"/></t>
        <t>HMAC-ALGO: defined in <xref target="RFC4895"/></t>
        <t>ADAPTATION-LAYER-INDICATION: defined in <xref target="RFC5061"/></t>
        <t>When all the above options are present and having acceptable
   parameters, the Association will start with support of DTLS/SCTP.
   The set of options indicated are the DTLS/SCTP Mandatory Options.
   No data transfer is permitted before DTLS handshake is
   completed. Chunk bundling is permitted according to
   <xref target="RFC9260"/>. The DTLS handshake will enable authentication of both
   the peers.</t>
        <t>The extension described in this document is given by the following
   message exchange.</t>
        <artwork><![CDATA[
   --- INIT[RANDOM; CHUNKS; HMAC-ALGO; ADAPTATION-LAYER-IND] --->
   <- INIT ACK[RANDOM; CHUNKS; HMAC-ALGO; ADAPTATION-LAYER-IND] -
   --------------------- AUTH; COOKIE ECHO --------------------->
   <-------------------- AUTH; COOKIE ACK -----------------------
   ---------------- AUTH; DATA[DTLS Handshake] ----------------->
                               ...
                               ...
   <--------------- AUTH; DATA[DTLS Handshake] ------------------
]]></artwork>
      </section>
      <section anchor="client-use-case">
        <name>Client Use Case</name>
        <t>When a client initiates an SCTP Association with DTLS protection,
   i.e., the SCTP INIT containing DTLS/SCTP Mandatory Options, it can
   receive an INIT ACK also containing DTLS/SCTP Mandatory Options, in
   that case the Association will proceed as specified in the previous
   <xref target="DTLS-init"/> section.  If the peer replies with an INIT ACK not
   containing all DTLS/SCTP Mandatory Options, the client SHOULD reply
   with an SCTP ABORT.</t>
      </section>
      <section anchor="server-use-case">
        <name>Server Use Case</name>
        <t>If a SCTP Server supports DTLS/SCTP, i.e., per this specification,
   when receiving an INIT chunk with all DTLS/SCTP Mandatory Options
   it will reply with an INIT ACK also containing all the DTLS/SCTP
   Mandatory Options, following the sequence for DTLS initialization
   <xref target="DTLS-init"/> and the related traffic case.  If a SCTP Server that
   supports DTLS and configured to use it, receives an INIT chunk
   without all DTLS/SCTP Mandatory Options, it SHOULD reply with an
   SCTP ABORT.</t>
      </section>
      <section anchor="Fallback">
        <name>RFC 6083 Fallback</name>
        <t>This section discusses how an endpoint supporting this
   specification can fallback to follow the DTLS/SCTP behavior in
   RFC6083.  It is recommended to define a setting that represents the
   policy to allow fallback or not. However, the possibility to use
   fallback is based on the ULP can operate using user messages that
   are no longer than 16384 bytes and where the security issues can be
   mitigated or considered acceptable. If fallback is enabled,
   implementations MUST use the dtls_sctp_ext extension
   (<xref target="auth_fallback"/>) to authenticate the fallback. This mitigates
   on-path attacker to trigger fallback to RFC 6083. Fallback is NOT
   RECOMMENDED to be enabled as it permits weaker algorithms and
   versions of DTLS.</t>
        <t>An SCTP endpoint that receives an INIT chunk or an INIT ACK chunk
   that does not contain the SCTP-Adaptation-Indication parameter with
   the DTLS/SCTP adaptation layer codepoint, see <xref target="sec-IANA-ACP"/>, may
   in certain cases potentially perform a fallback to RFC 6083
   behavior.  However, the fallback attempt should only be performed
   if policy says that is acceptable.</t>
        <t>If fallback is allowed, it is possible that the client will send
   plain text user messages prior to DTLS handshake as it is allowed
   per RFC 6083.  So that needs to be part of the consideration for a
   policy allowing fallback.</t>
        <section anchor="client-fallback">
          <name>Client Fallback</name>
          <t>A DTLS/SCTP client supporting this specification encountering a
   server not compatible with this specification MAY attempt RFC 6083
   fallback per this procedure.</t>
          <ol spacing="normal" type="1"><li>Fallback procedure, if enabled, is initiated when receiving an
SCTP INIT ACK that does not contain the DTLS/SCTP Adaptation
Layer indication. If fallback is not enabled the SCTP handshake
is aborted.</li>
            <li>The client checks that the SCTP INIT ACK contained the necessary
chunks and parameters to establish SCTP-AUTH per RFC 6083 with
this endpoint. If not all necessary parameters or support
algorithms don't match the client MUST abort the
handshake. Otherwise it completes the SCTP handshake.</li>
            <li>Client performs DTLS connection handshake per RFC 6083 over
established SCTP association. If successful authenticating the
targeted server the client has successful fallen back to use
RFC 6083. If not terminate the SCTP association.</li>
          </ol>
        </section>
        <section anchor="server-fallback">
          <name>Server Fallback</name>
          <t>A DTLS/SCTP Server that supports both this specification and RFC
   6083 and where fallback has been enabled for the ULP can follow
   this procedure.</t>
          <ol spacing="normal" type="1"><li>When receiving an SCTP INIT message without the DTLS/SCTP
adaptation layer indication fallback procedure is initiated.</li>
            <li>Verify that the SCTP INIT contains SCTP-AUTH parameters required
by RFC 6083 and compatible with this server. If that is not the
case abort the SCTP handshake.</li>
            <li>Send an SCTP INIT ACK with the required SCTP-AUTH chunks and
parameters to the client.</li>
            <li>Complete the SCTP Handshake. Await DTLS handshake per RFC 6083.
Plain text SCTP messages MAY be received.</li>
            <li>Upon successful completion of DTLS handshake successful fallback
to RFC 6083 have been accomplished.</li>
          </ol>
        </section>
        <section anchor="auth_fallback">
          <name>Authenticated Fallback</name>
          <t>A DTLS/SCTP implementation supporting this document MUST include the
dtls_sctp_ext extension in all DTLS Client Hello used in DTLS/SCTP
according to RFC 6083. A DTLS/SCTP implementation supporting this
document MUST abort the SCTP association if the dtls_sctp_ext
extension is received when DTLS/SCTP according to RFC 6083 is
used. This mechanism provides authenticated fallback to RFC 6083.</t>
          <t>The dtls_sctp_ext extention is defined as follows:</t>
          <artwork><![CDATA[
enum {
    dtls_sctp_ext(TBD2), (65535)
} ExtensionType;
]]></artwork>
          <t>Clients MAY send this extention in ClientHello. It contains the
following structure:</t>
          <artwork><![CDATA[
struct {
    Empty;
} DTLSOverSCTPExt;
]]></artwork>
        </section>
      </section>
    </section>
    <section anchor="api-considerations">
      <name>SCTP API Consideration</name>
      <t>DTLS/SCTP needs certain functionality on the API that the SCTP
   implementation provides to the ULP to function optimally. A
   DTLS/SCTP implementation will need to provide its own API to the
   ULP, while itself using the SCTP API. This discussion is focused on
   the needed functionality on the SCTP API.</t>
      <t>The following functionality is needed:</t>
      <ul spacing="normal">
        <li>Controlling SCTP-AUTH negotiation so that SHA-256 algorithm is
included, and determine that SHA-1 is not selected when the
association is established.</li>
        <li>Determining when all SCTP packets that uses an SCTP-AUTH key or
contains DTLS records associated to a particular DTLS connection
has been acknowledged non-renegable.</li>
        <li>Install SCTP-AUTH keys with directionality</li>
        <li>Determining when all SCTP packets have been acknowledged
non-renegable.</li>
        <li>Negotiating the adaptation layer indication that indicates
DTLS/SCTP and determine if it was agreed or not.</li>
        <li>Partial user messages transmission and reception.</li>
      </ul>
    </section>
    <section anchor="IANA-Consideration">
      <name>IANA Considerations</name>
      <t>This document registers a number of protocol values per the
below. RFC-Editor Note: Please replace [RFC-TBD] with the RFC number
given to this specification.</t>
      <section anchor="transport-layer-security-tls-extensions">
        <name>Transport Layer Security (TLS) Extensions</name>
        <t>IANA is requested to add a value to the Transport Layer Security
   (TLS) Extensions' "TLS ExtensionType Values" registry defined by
   <xref target="RFC8447"/>.  At time of writing located at:
   <eref target="https://www.iana.org/assignments/tls-extensiontype-values/tls-extensiontype-values.xhtml#tls-extensiontype-values-1">TLS ExtensionType Values Registry</eref></t>
        <table anchor="iana-TLS-extension">
          <name>TLS Extension</name>
          <thead>
            <tr>
              <th align="left">Value</th>
              <th align="left">Extension Name</th>
              <th align="left">TLS 1.3</th>
              <th align="left">DTLS-OK</th>
              <th align="left">Recommended</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">TBD2</td>
              <td align="left">dtls_sctp_ext</td>
              <td align="left">CH</td>
              <td align="left">Y</td>
              <td align="left">Y</td>
              <td align="left">[RFC-TBD]</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="tls-exporter-labels">
        <name>TLS Exporter Labels</name>
        <t>IANA is requested to add two values to the TLS Exporter Label
   registry as defined by <xref target="RFC5705"/>, and <xref target="RFC8447"/>. At time of
   writing located at: <eref target="https://www.iana.org/assignments/tls-parameters/tls-parameters.xhtml#exporter-labels">TLS Exporter Label
   registry</eref></t>
        <table anchor="iana-TLS">
          <name>TLS Exporter Label</name>
          <thead>
            <tr>
              <th align="left">Value</th>
              <th align="left">DTLS-OK</th>
              <th align="left">Recommended</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">EXPORTER-DTLS-OVER-SCTP-CLIENT-WRITE</td>
              <td align="left">Y</td>
              <td align="left">Y</td>
              <td align="left">[RFC-TBD]</td>
            </tr>
            <tr>
              <td align="left">EXPORTER-DTLS-OVER-SCTP-SERVER-WRITE</td>
              <td align="left">Y</td>
              <td align="left">Y</td>
              <td align="left">[RFC-TBD]</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="sec-IANA-ACP">
        <name>SCTP Adaptation Layer Indication Code Point</name>
        <t>IANA is requested to assign an Adaptation Code Point to DTLS/SCTP
   for usage in the Adaptation Layer Indication Parameter. The
   Adaptation Code Point is registered in the SCTP Adaptation Code
   Points registry defined by <xref target="RFC5061"/>. The registry was at time of
   writing located: <eref target="https://www.iana.org/assignments/sctp-parameters/sctp-parameters.xhtml#sctp-parameters-27">Adaptation Code Point
   registry</eref></t>
        <table anchor="iana-ACP">
          <name>Adaptation Code Point</name>
          <thead>
            <tr>
              <th align="left">Code Point (32-bit number)</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">TBD</td>
              <td align="left">DTLS/SCTP</td>
              <td align="left">[RFC-TBD]</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="sec-IANA-PPID">
        <name>SCTP Payload Protocol Identifiers</name>
        <t>IANA is requested to assign one SCTP Payload Protocol Identifier
   (PPID) to be used to identify the DTLS/SCTP control messages
   (<xref target="Control-Message"/>). This PPID is registered in the SCTP Payload
   Protocol Identifiers registry defined by <xref target="RFC9260"/>.  The registry
   was at time of writing located: <eref target="https://www.iana.org/assignments/sctp-parameters/sctp-parameters.xhtml#sctp-parameters-25">SCTP Payload Protocol
   Identifiers</eref></t>
        <table anchor="iana-PPID">
          <name>SCTP Payload Protocol Identifier</name>
          <thead>
            <tr>
              <th align="left">Value</th>
              <th align="left">SCTP PPID</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">TBD1</td>
              <td align="left">DTLS/SCTP Control Message</td>
              <td align="left">[RFC-TBD]</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
    <section anchor="sec-Consideration">
      <name>Security Considerations</name>
      <t>The security considerations given in <xref target="RFC9147"/>,
   <xref target="RFC4895"/>, and <xref target="RFC9260"/> also apply to this document.</t>
      <section anchor="cryptographic-considerations">
        <name>Cryptographic Considerations</name>
        <t>Over the years, there have been several serious attacks on earlier
   versions of Transport Layer Security (TLS), including attacks on
   its most commonly used ciphers and modes of operation.  <xref target="RFC7457"/>
   summarizes the attacks that were known at the time of publishing
   and BCP 195 <xref target="RFC7525"/> <xref target="RFC8996"/> provide recommendations for
   improving the security of deployed services that use TLS.</t>
        <t>When DTLS/SCTP is used with DTLS 1.2 <xref target="RFC6347"/>, DTLS 1.2 MUST be
   configured to disable options known to provide insufficient
   security. HTTP/2 <xref target="RFC9113"/> gives good minimum requirements based
   on the attacks that where publicly known in 2022. DTLS 1.3
   <xref target="RFC9147"/> only defines strong algorithms without major
   weaknesses at the time of publication. Many of the TLS registries
   have a "Recommended" column. Parameters not marked as "Y" are NOT
   RECOMMENDED to support. DTLS 1.3 is preferred over DTLS 1.2 being a
   newer protocol that addresses known vulnerabilities and only
   defines strong algorithms without known major weaknesses at the
   time of publication.</t>
        <t>DTLS 1.3 requires rekeying before algorithm specific AEAD limits
   have been reached. The AEAD limits equations are equally valid for
   DTLS 1.2 and SHOULD be followed for DTLS/SCTP, but are not mandated
   by the DTLS 1.2 specification.</t>
        <t>HMAC-SHA-256 as used in SCTP-AUTH has a very large tag length and
   very good integrity properties.  The SCTP-AUTH key can be used
   longer than the current algorithms in the TLS record layer. The
   SCTP-AUTH key is rekeyed when a new DTLS connection is set up at
   which point a new SCTP-AUTH key is derived using the TLS-Exporter.</t>
        <t>(D)TLS 1.3 <xref target="RFC8446"/> discusses forward secrecy from (EC)DHE,
   Key Update, and tickets/resumption. Forward secrecy limits the
   effect of key leakage in one direction (compromise of a key at
   time T2 does not compromise some key at time T1 where T1 &lt; T2).
   Protection in the other direction (compromise at time T1 does not
   compromise keys at time T2) can be achieved by rerunning (EC)DHE.
   If a long-term authentication key has been compromised, a full
   handshake with (EC)DHE gives protection against passive
   attackers. If the resumption_master_secret has been compromised,
   a resumption handshake with (EC)DHE gives protection against passive
   attackers and a full handshake with (EC)DHE gives protection against
   active attackers. If a traffic secret has been compromised, any
   handshake with (EC)DHE gives protection against active attackers.</t>
        <t>The document "Confidentiality in the Face of Pervasive Surveillance:
   A Threat Model and Problem Statement" <xref target="RFC7624"/> defines key
   exfiltration as the transmission of cryptographic keying material
   for an encrypted communication from a collaborator, deliberately or
   unwittingly, to an attacker. Using the terms in RFC 7624, forward
   secrecy without rerunning (EC)DHE still allows an attacker to do
   static key exfiltration. Rerunning (EC)DHE forces and attacker to
   dynamic key exfiltration (or content exfiltration).</t>
        <t>When using DTLS 1.3 <xref target="RFC9147"/>, AEAD limits and
   forward secrecy can be achieved by sending post-handshake KeyUpdate
   messages, which triggers rekeying of DTLS. Such symmetric rekeying
   gives significantly less protection against key leakage than
   re-running Diffie-Hellman as explained above.  After leakage of
   application_traffic_secret_N, an attacker can passively eavesdrop
   on all future data sent on the connection including data encrypted
   with application_traffic_secret_N+1,
   application_traffic_secret_N+2, etc. Note that Key Update does not
   update the exporter_secret.</t>
        <t>DTLS/SCTP is in many deployments replacing IPsec. For IPsec, NIST
   (US), BSI (Germany), and ANSSI (France) recommends very frequent
   re-run of Diffie-Hellman to provide forward secrecy and
   force attackers to dynamic key extraction <xref target="RFC7624"/>. ANSSI writes
   "It is recommended to force the periodic renewal of the keys, e.g.,
   every hour and every 100 GB of data, in order to limit the impact
   of a key compromise." <xref target="ANSSI-DAT-NT-003"/>.</t>
        <t>For many DTLS/SCTP deployments the SCTP association is expected to
   have a very long lifetime of months or even years. For associations
   with such long lifetimes there is a need to frequently
   re-authenticate both client and server. TLS Certificate lifetimes
   significantly shorter than a year are common which is shorter than
   many expected DTLS/SCTP associations.</t>
        <t>SCTP-AUTH re-rekeying, periodic authentication of both endpoints,
   and frequent re-run of Diffie-Hellman to force attackers to dynamic
   key extraction is in DTLS/SCTP per this specification achieved by
   setting up new DTLS connections over the same SCTP
   association. Implementations SHOULD set up new connections
   frequently to force attackers to dynamic key
   extraction. Implementations MUST set up new connections before any
   of the certificates expire. It is RECOMMENDED that all negotiated
   and exchanged parameters are the same except for the timestamps in
   the certificates. Clients and servers MUST NOT accept a change of
   identity during the setup of a new connections, but MAY accept
   negotiation of stronger algorithms and security parameters, which
   might be motivated by new attacks.</t>
        <t>Allowing new connections can enable denial-of-service attacks.  The
   endpoints MUST limit the number of simultaneous connections to two.
   The implementor shall take into account that an existing DTLS
   connection can only be closed after "Ready_To_Close"
   <xref target="Ready_To_Close"/> indication.</t>
        <t>When DTLS/SCTP is used with DTLS 1.2 <xref target="RFC6347"/>, the TLS Session
   Hash and Extended Master Secret Extension <xref target="RFC7627"/> MUST be used
   to prevent unknown key-share attacks where an attacker establishes
   the same key on several connections. DTLS 1.3 always prevents these
   kinds of attacks. The use of SCTP-AUTH then cryptographically binds
   new connections to the old connections. This together with
   mandatory mutual authentication (on the DTLS layer) and a
   requirement to not accept new identities mitigates MITM attacks
   that have plagued renegotiation <xref target="TRISHAKE"/>.</t>
      </section>
      <section anchor="downgrade-attacks">
        <name>Downgrade Attacks</name>
        <t>A peer supporting DTLS/SCTP according to this specification,
   DTLS/SCTP according to <xref target="RFC6083"/> and/or SCTP without DTLS may be
   vulnerable to downgrade attacks where on on-path attacker
   interferes with the protocol setup to lower or disable security. If
   possible, it is RECOMMENDED that the peers have a policy only
   allowing DTLS/SCTP according to this specification.</t>
      </section>
      <section anchor="targeting-dtls-messages">
        <name>Targeting DTLS Messages</name>
        <t>The DTLS handshake messages and other control messages, i.e., not
   application data can easily be identified when using DTLS 1.2 as
   their content type is not encrypted. With DTLS 1.3 there is no
   unprotected content type. However, they will be sent with an PPID
   of 0 if sent in their own SCTP user messages. <xref target="Stream-Usage"/>
   proposes a basic behavior that will still make it easily for anyone
   to detect the DTLS messages that are not protected user messages.</t>
      </section>
      <section anchor="authentication-and-policy-decisions">
        <name>Authentication and Policy Decisions</name>
        <t>DTLS/SCTP MUST be mutually authenticated. Authentication is the
   process of establishing the identity of a user or system and
   verifying that the identity is valid. DTLS only provides proof of
   possession of a key.  DTLS/SCTP MUST perform identity
   authentication. It is RECOMMENDED that DTLS/SCTP is used with
   certificate-based authentication. When certificates are used the
   application using DTLS/SCTP is responsible for certificate
   policies, certificate chain validation, and identity authentication
   (HTTPS does for example match the hostname with a subjectAltName of
   type dNSName). The application using DTLS/SCTP MUST define what the
   identity is and how it is encoded and the client and server MUST
   use the same identity format.  Guidance on server certificate
   validation can be found in <xref target="RFC6125"/>.  DTLS/SCTP enables periodic
   transfer of mutual revocation information (OSCP stapling) every
   time a new parallel connection is set up.  All security decisions
   MUST be based on the peer's authenticated identity, not on its
   transport layer identity.</t>
        <t>It is possible to authenticate DTLS endpoints based on IP addresses
   in certificates. SCTP associations can use multiple IP addresses
   per SCTP endpoint. Therefore, it is possible that DTLS records will
   be sent from a different source IP address or to a different
   destination IP address than that originally authenticated. This is
   not a problem provided that no security decisions are made based on
   the source or destination IP addresses.</t>
      </section>
      <section anchor="resumption-and-tickets">
        <name>Resumption and Tickets</name>
        <t>In DTLS 1.3 any number of tickets can be issued in a connection and
   the tickets can be used for resumption as long as they are valid,
   which is up to seven days. The nodes in a resumed connection have
   the same roles (client or server) as in the connection where the
   ticket was issued. Resumption can have significant latency benefits
   for quickly restarting a broken DTLS/SCTP association. If tickets
   and resumption are used it is enough to issue a single ticket per
   connection.</t>
      </section>
      <section anchor="privacy-considerations">
        <name>Privacy Considerations</name>
        <t><xref target="RFC6973"/> suggests that the privacy considerations of IETF
   protocols be documented.</t>
        <t>For each SCTP user message, the user also provides a stream
   identifier, a flag to indicate whether the message is sent ordered
   or unordered, and a payload protocol identifier.  Although
   DTLS/SCTP provides privacy for the actual user message, the other
   three information fields are not confidentiality protected.  They
   are sent as clear text because they are part of the SCTP DATA chunk
   header.</t>
        <t>It is RECOMMENDED that DTLS/SCTP is used with certificate-based
   authentication in DTLS 1.3 <xref target="RFC9147"/> to provide identity
   protection. DTLS/SCTP MUST be used with a key exchange method
   providing forward secrecy.</t>
      </section>
      <section anchor="pervasive-monitoring">
        <name>Pervasive Monitoring</name>
        <t>As required by <xref target="RFC7258"/>, work on IETF protocols needs to
   consider the effects of pervasive monitoring and mitigate them when
   possible.</t>
        <t>Pervasive Monitoring is widespread surveillance of users.  By
   encrypting more information including user identities, DTLS 1.3
   offers much better protection against pervasive monitoring.</t>
        <t>Massive pervasive monitoring attacks relying on key exchange
   without forward secrecy has been reported. By mandating forward
   secrecy, DTLS/SCTP effectively mitigate many forms of passive
   pervasive monitoring and limits the amount of compromised data due
   to key compromise.</t>
        <t>An important mitigation of pervasive monitoring is to force
   attackers to do dynamic key exfiltration instead of static key
   exfiltration. Dynamic key exfiltration increases the risk of
   discovery for the attacker <xref target="RFC7624"/>. DTLS/SCTP per this
   specification encourages implementations to frequently set up new
   DTLS connections with (EC)DHE over the same SCTP association to
   force attackers to do dynamic key exfiltration.</t>
        <t>In addition to the privacy attacks discussed above, surveillance on
   a large scale may enable tracking of a user over a wider
   geographical area and across different access networks.  Using
   information from DTLS/SCTP together with information gathered from
   other protocols increase the risk of identifying individual users.</t>
      </section>
    </section>
    <section anchor="contributors">
      <name>Contributors</name>
      <t>Michael Tuexen contributed as co-author to the initial versions
   this draft. Michael's contributions include:</t>
      <ul spacing="normal">
        <li>The use of the Adaptation Layer Indication.</li>
        <li>Many editorial improvements.</li>
      </ul>
    </section>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors of RFC 6083 which this document is based on are
   Michael Tuexen, Eric Rescorla, and Robin Seggelmann.</t>
      <t>The RFC 6083 authors thanked Anna Brunstrom, Lars Eggert, Gorry
   Fairhurst, Ian Goldberg, Alfred Hoenes, Carsten Hohendorf, Stefan
   Lindskog, Daniel Mentz, and Sean Turner for their invaluable comments.</t>
      <t>The authors of this document want to thank Daria Ivanova, Li Yan,
   and GitHub user vanrein for their contribution.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized.  This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC3758" target="https://www.rfc-editor.org/info/rfc3758" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3758.xml">
          <front>
            <title>Stream Control Transmission Protocol (SCTP) Partial Reliability Extension</title>
            <author fullname="R. Stewart" initials="R." surname="Stewart"/>
            <author fullname="M. Ramalho" initials="M." surname="Ramalho"/>
            <author fullname="Q. Xie" initials="Q." surname="Xie"/>
            <author fullname="M. Tuexen" initials="M." surname="Tuexen"/>
            <author fullname="P. Conrad" initials="P." surname="Conrad"/>
            <date month="May" year="2004"/>
            <abstract>
              <t>This memo describes an extension to the Stream Control Transmission Protocol (SCTP) that allows an SCTP endpoint to signal to its peer that it should move the cumulative ack point forward.  When both sides of an SCTP association support this extension, it can be used by an SCTP implementation to provide partially reliable data transmission service to an upper layer protocol.  This memo describes the protocol extensions, which consist of a new parameter for INIT and INIT ACK, and a new FORWARD TSN chunk type, and provides one example of a partially reliable service that can be provided to the upper layer via this mechanism. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3758"/>
          <seriesInfo name="DOI" value="10.17487/RFC3758"/>
        </reference>
        <reference anchor="RFC4895" target="https://www.rfc-editor.org/info/rfc4895" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4895.xml">
          <front>
            <title>Authenticated Chunks for the Stream Control Transmission Protocol (SCTP)</title>
            <author fullname="M. Tuexen" initials="M." surname="Tuexen"/>
            <author fullname="R. Stewart" initials="R." surname="Stewart"/>
            <author fullname="P. Lei" initials="P." surname="Lei"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2007"/>
            <abstract>
              <t>This document describes a new chunk type, several parameters, and procedures for the Stream Control Transmission Protocol (SCTP).  This new chunk type can be used to authenticate SCTP chunks by using shared keys between the sender and receiver.  The new parameters are used to establish the shared keys. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4895"/>
          <seriesInfo name="DOI" value="10.17487/RFC4895"/>
        </reference>
        <reference anchor="RFC5061" target="https://www.rfc-editor.org/info/rfc5061" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5061.xml">
          <front>
            <title>Stream Control Transmission Protocol (SCTP) Dynamic Address Reconfiguration</title>
            <author fullname="R. Stewart" initials="R." surname="Stewart"/>
            <author fullname="Q. Xie" initials="Q." surname="Xie"/>
            <author fullname="M. Tuexen" initials="M." surname="Tuexen"/>
            <author fullname="S. Maruyama" initials="S." surname="Maruyama"/>
            <author fullname="M. Kozuka" initials="M." surname="Kozuka"/>
            <date month="September" year="2007"/>
            <abstract>
              <t>A local host may have multiple points of attachment to the Internet, giving it a degree of fault tolerance from hardware failures.  Stream Control Transmission Protocol (SCTP) (RFC 4960) was developed to take full advantage of such a multi-homed host to provide a fast failover and association survivability in the face of such hardware failures.  This document describes an extension to SCTP that will allow an SCTP stack to dynamically add an IP address to an SCTP association, dynamically delete an IP address from an SCTP association, and to request to set the primary address the peer will use when sending to an endpoint. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5061"/>
          <seriesInfo name="DOI" value="10.17487/RFC5061"/>
        </reference>
        <reference anchor="RFC5705" target="https://www.rfc-editor.org/info/rfc5705" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5705.xml">
          <front>
            <title>Keying Material Exporters for Transport Layer Security (TLS)</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="March" year="2010"/>
            <abstract>
              <t>A number of protocols wish to leverage Transport Layer Security (TLS) to perform key establishment but then use some of the keying material for their own purposes.  This document describes a general mechanism for allowing that. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5705"/>
          <seriesInfo name="DOI" value="10.17487/RFC5705"/>
        </reference>
        <reference anchor="RFC6347" target="https://www.rfc-editor.org/info/rfc6347" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6347.xml">
          <front>
            <title>Datagram Transport Layer Security Version 1.2</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="January" year="2012"/>
            <abstract>
              <t>This document specifies version 1.2 of the Datagram Transport Layer Security (DTLS) protocol.  The DTLS protocol provides communications privacy for datagram protocols.  The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.  The DTLS protocol is based on the Transport Layer Security (TLS) protocol and provides equivalent security guarantees.  Datagram semantics of the underlying transport are preserved by the DTLS protocol.  This document updates DTLS 1.0 to work with TLS version 1.2. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6347"/>
          <seriesInfo name="DOI" value="10.17487/RFC6347"/>
        </reference>
        <reference anchor="RFC7627" target="https://www.rfc-editor.org/info/rfc7627" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7627.xml">
          <front>
            <title>Transport Layer Security (TLS) Session Hash and Extended Master Secret Extension</title>
            <author fullname="K. Bhargavan" initials="K." role="editor" surname="Bhargavan"/>
            <author fullname="A. Delignat-Lavaud" initials="A." surname="Delignat-Lavaud"/>
            <author fullname="A. Pironti" initials="A." surname="Pironti"/>
            <author fullname="A. Langley" initials="A." surname="Langley"/>
            <author fullname="M. Ray" initials="M." surname="Ray"/>
            <date month="September" year="2015"/>
            <abstract>
              <t>The Transport Layer Security (TLS) master secret is not cryptographically bound to important session parameters such as the server certificate.  Consequently, it is possible for an active attacker to set up two sessions, one with a client and another with a server, such that the master secrets on the two sessions are the same.  Thereafter, any mechanism that relies on the master secret for authentication, including session resumption, becomes vulnerable to a man-in-the-middle attack, where the attacker can simply forward messages back and forth between the client and server.  This specification defines a TLS extension that contextually binds the master secret to a log of the full handshake that computes it, thus preventing such attacks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7627"/>
          <seriesInfo name="DOI" value="10.17487/RFC7627"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8260" target="https://www.rfc-editor.org/info/rfc8260" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8260.xml">
          <front>
            <title>Stream Schedulers and User Message Interleaving for the Stream Control Transmission Protocol</title>
            <author fullname="R. Stewart" initials="R." surname="Stewart"/>
            <author fullname="M. Tuexen" initials="M." surname="Tuexen"/>
            <author fullname="S. Loreto" initials="S." surname="Loreto"/>
            <author fullname="R. Seggelmann" initials="R." surname="Seggelmann"/>
            <date month="November" year="2017"/>
            <abstract>
              <t>The Stream Control Transmission Protocol (SCTP) is a message-oriented transport protocol supporting arbitrarily large user messages. This document adds a new chunk to SCTP for carrying payload data. This allows a sender to interleave different user messages that would otherwise result in head-of-line blocking at the sender. The interleaving of user messages is required for WebRTC data channels.</t>
              <t>Whenever an SCTP sender is allowed to send user data, it may choose from multiple outgoing SCTP streams. Multiple ways for performing this selection, called stream schedulers, are defined in this document. A stream scheduler can choose to either implement, or not implement, user message interleaving.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8260"/>
          <seriesInfo name="DOI" value="10.17487/RFC8260"/>
        </reference>
        <reference anchor="RFC8446" target="https://www.rfc-editor.org/info/rfc8446" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8446.xml">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8447" target="https://www.rfc-editor.org/info/rfc8447" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8447.xml">
          <front>
            <title>IANA Registry Updates for TLS and DTLS</title>
            <author fullname="J. Salowey" initials="J." surname="Salowey"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document describes a number of changes to TLS and DTLS IANA registries that range from adding notes to the registry all the way to changing the registration policy. These changes were mostly motivated by WG review of the TLS- and DTLS-related registries undertaken as part of the TLS 1.3 development process.</t>
              <t>This document updates the following RFCs: 3749, 5077, 4680, 5246, 5705, 5878, 6520, and 7301.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8447"/>
          <seriesInfo name="DOI" value="10.17487/RFC8447"/>
        </reference>
        <reference anchor="RFC8449" target="https://www.rfc-editor.org/info/rfc8449" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8449.xml">
          <front>
            <title>Record Size Limit Extension for TLS</title>
            <author fullname="M. Thomson" initials="M." surname="Thomson"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>An extension to Transport Layer Security (TLS) is defined that allows endpoints to negotiate the maximum size of protected records that each will send the other.</t>
              <t>This replaces the maximum fragment length extension defined in RFC 6066.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8449"/>
          <seriesInfo name="DOI" value="10.17487/RFC8449"/>
        </reference>
        <reference anchor="RFC8996" target="https://www.rfc-editor.org/info/rfc8996" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8996.xml">
          <front>
            <title>Deprecating TLS 1.0 and TLS 1.1</title>
            <author fullname="K. Moriarty" initials="K." surname="Moriarty"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <date month="March" year="2021"/>
            <abstract>
              <t>This document formally deprecates Transport Layer Security (TLS) versions 1.0 (RFC 2246) and 1.1 (RFC 4346). Accordingly, those documents have been moved to Historic status. These versions lack support for current and recommended cryptographic algorithms and mechanisms, and various government and industry profiles of applications using TLS now mandate avoiding these old TLS versions. TLS version 1.2 became the recommended version for IETF protocols in 2008 (subsequently being obsoleted by TLS version 1.3 in 2018), providing sufficient time to transition away from older versions. Removing support for older versions from implementations reduces the attack surface, reduces opportunity for misconfiguration, and streamlines library and product maintenance.</t>
              <t>This document also deprecates Datagram TLS (DTLS) version 1.0 (RFC 4347) but not DTLS version 1.2, and there is no DTLS version 1.1.</t>
              <t>This document updates many RFCs that normatively refer to TLS version 1.0 or TLS version 1.1, as described herein. This document also updates the best practices for TLS usage in RFC 7525; hence, it is part of BCP 195.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="195"/>
          <seriesInfo name="RFC" value="8996"/>
          <seriesInfo name="DOI" value="10.17487/RFC8996"/>
        </reference>
        <reference anchor="RFC9113" target="https://www.rfc-editor.org/info/rfc9113" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9113.xml">
          <front>
            <title>HTTP/2</title>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <author fullname="C. Benfield" initials="C." role="editor" surname="Benfield"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>This specification describes an optimized expression of the semantics of the Hypertext Transfer Protocol (HTTP), referred to as HTTP version 2 (HTTP/2). HTTP/2 enables a more efficient use of network resources and a reduced latency by introducing field compression and allowing multiple concurrent exchanges on the same connection.</t>
              <t>This document obsoletes RFCs 7540 and 8740.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9113"/>
          <seriesInfo name="DOI" value="10.17487/RFC9113"/>
        </reference>
        <reference anchor="RFC9146" target="https://www.rfc-editor.org/info/rfc9146" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9146.xml">
          <front>
            <title>Connection Identifier for DTLS 1.2</title>
            <author fullname="E. Rescorla" initials="E." role="editor" surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <author fullname="A. Kraus" initials="A." surname="Kraus"/>
            <date month="March" year="2022"/>
            <abstract>
              <t>This document specifies the Connection ID (CID) construct for the Datagram Transport Layer Security (DTLS) protocol version 1.2.</t>
              <t>A CID is an identifier carried in the record layer header that gives the recipient additional information for selecting the appropriate security association. In "classical" DTLS, selecting a security association of an incoming DTLS record is accomplished with the help of the 5-tuple. If the source IP address and/or source port changes during the lifetime of an ongoing DTLS session, then the receiver will be unable to locate the correct security context.</t>
              <t>The new ciphertext record format with the CID also provides content type encryption and record layer padding.</t>
              <t>This document updates RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9146"/>
          <seriesInfo name="DOI" value="10.17487/RFC9146"/>
        </reference>
        <reference anchor="RFC9147" target="https://www.rfc-editor.org/info/rfc9147" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9147.xml">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="RFC9260" target="https://www.rfc-editor.org/info/rfc9260" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9260.xml">
          <front>
            <title>Stream Control Transmission Protocol</title>
            <author fullname="R. Stewart" initials="R." surname="Stewart"/>
            <author fullname="M. Tüxen" initials="M." surname="Tüxen"/>
            <author fullname="K. Nielsen" initials="K." surname="Nielsen"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>This document describes the Stream Control Transmission Protocol (SCTP) and obsoletes RFC 4960. It incorporates the specification of the chunk flags registry from RFC 6096 and the specification of the I bit of DATA chunks from RFC 7053. Therefore, RFCs 6096 and 7053 are also obsoleted by this document. In addition, RFCs 4460 and 8540, which describe errata for SCTP, are obsoleted by this document.</t>
              <t>SCTP was originally designed to transport Public Switched Telephone Network (PSTN) signaling messages over IP networks. It is also suited to be used for other applications, for example, WebRTC.</t>
              <t>SCTP is a reliable transport protocol operating on top of a connectionless packet network, such as IP. It offers the following services to its users:</t>
              <t>The design of SCTP includes appropriate congestion avoidance behavior and resistance to flooding and masquerade attacks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9260"/>
          <seriesInfo name="DOI" value="10.17487/RFC9260"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC3436" target="https://www.rfc-editor.org/info/rfc3436" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3436.xml">
          <front>
            <title>Transport Layer Security over Stream Control Transmission Protocol</title>
            <author fullname="A. Jungmaier" initials="A." surname="Jungmaier"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="M. Tuexen" initials="M." surname="Tuexen"/>
            <date month="December" year="2002"/>
            <abstract>
              <t>This document describes the usage of the Transport Layer Security (TLS) protocol, as defined in RFC 2246, over the Stream Control Transmission Protocol (SCTP), as defined in RFC 2960 and RFC 3309.  The user of TLS can take advantage of the features provided by SCTP, namely the support of multiple streams to avoid head of line blocking and the support of multi-homing to provide network level fault tolerance.  Additionally, discussions of extensions of SCTP are also supported, meaning especially the support of dynamic reconfiguration of IP- addresses. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3436"/>
          <seriesInfo name="DOI" value="10.17487/RFC3436"/>
        </reference>
        <reference anchor="RFC3788" target="https://www.rfc-editor.org/info/rfc3788" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3788.xml">
          <front>
            <title>Security Considerations for Signaling Transport (SIGTRAN) Protocols</title>
            <author fullname="J. Loughney" initials="J." surname="Loughney"/>
            <author fullname="M. Tuexen" initials="M." role="editor" surname="Tuexen"/>
            <author fullname="J. Pastor-Balbas" initials="J." surname="Pastor-Balbas"/>
            <date month="June" year="2004"/>
            <abstract>
              <t>This document discusses how Transport Layer Security (TLS) and IPsec can be used to secure communication for SIGTRAN protocols.  The main goal is to recommend the minimum security means that a SIGTRAN node must implement in order to attain secured communication.  The support of IPsec is mandatory for all nodes running SIGTRAN protocols.  TLS support is optional. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3788"/>
          <seriesInfo name="DOI" value="10.17487/RFC3788"/>
        </reference>
        <reference anchor="RFC6083" target="https://www.rfc-editor.org/info/rfc6083" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6083.xml">
          <front>
            <title>Datagram Transport Layer Security (DTLS) for Stream Control Transmission Protocol (SCTP)</title>
            <author fullname="M. Tuexen" initials="M." surname="Tuexen"/>
            <author fullname="R. Seggelmann" initials="R." surname="Seggelmann"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="January" year="2011"/>
            <abstract>
              <t>This document describes the usage of the Datagram Transport Layer Security (DTLS) protocol over the Stream Control Transmission Protocol (SCTP).</t>
              <t>DTLS over SCTP provides communications privacy for applications that use SCTP as their transport protocol and allows client/server applications to communicate in a way that is designed to prevent eavesdropping and detect tampering or message forgery.</t>
              <t>Applications using DTLS over SCTP can use almost all transport features provided by SCTP and its extensions. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6083"/>
          <seriesInfo name="DOI" value="10.17487/RFC6083"/>
        </reference>
        <reference anchor="RFC6125" target="https://www.rfc-editor.org/info/rfc6125" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6125.xml">
          <front>
            <title>Representation and Verification of Domain-Based Application Service Identity within Internet Public Key Infrastructure Using X.509 (PKIX) Certificates in the Context of Transport Layer Security (TLS)</title>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <author fullname="J. Hodges" initials="J." surname="Hodges"/>
            <date month="March" year="2011"/>
            <abstract>
              <t>Many application technologies enable secure communication between two entities by means of Internet Public Key Infrastructure Using X.509 (PKIX) certificates in the context of Transport Layer Security (TLS).  This document specifies procedures for representing and verifying the identity of application services in such interactions. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6125"/>
          <seriesInfo name="DOI" value="10.17487/RFC6125"/>
        </reference>
        <reference anchor="RFC6458" target="https://www.rfc-editor.org/info/rfc6458" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6458.xml">
          <front>
            <title>Sockets API Extensions for the Stream Control Transmission Protocol (SCTP)</title>
            <author fullname="R. Stewart" initials="R." surname="Stewart"/>
            <author fullname="M. Tuexen" initials="M." surname="Tuexen"/>
            <author fullname="K. Poon" initials="K." surname="Poon"/>
            <author fullname="P. Lei" initials="P." surname="Lei"/>
            <author fullname="V. Yasevich" initials="V." surname="Yasevich"/>
            <date month="December" year="2011"/>
            <abstract>
              <t>This document describes a mapping of the Stream Control Transmission Protocol (SCTP) into a sockets API.  The benefits of this mapping include compatibility for TCP applications, access to new SCTP features, and a consolidated error and event notification scheme.  This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6458"/>
          <seriesInfo name="DOI" value="10.17487/RFC6458"/>
        </reference>
        <reference anchor="RFC6525" target="https://www.rfc-editor.org/info/rfc6525" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6525.xml">
          <front>
            <title>Stream Control Transmission Protocol (SCTP) Stream Reconfiguration</title>
            <author fullname="R. Stewart" initials="R." surname="Stewart"/>
            <author fullname="M. Tuexen" initials="M." surname="Tuexen"/>
            <author fullname="P. Lei" initials="P." surname="Lei"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>Many applications that use the Stream Control Transmission Protocol (SCTP) want the ability to "reset" a stream.  The intention of resetting a stream is to set the numbering sequence of the stream back to 'zero' with a corresponding notification to the application layer that the reset has been performed.  Applications requiring this feature want it so that they can "reuse" streams for different purposes but still utilize the stream sequence number so that the application can track the message flows.  Thus, without this feature, a new use of an old stream would result in message numbers greater than expected, unless there is a protocol mechanism to "reset the streams back to zero".  This document also includes methods for resetting the transmission sequence numbers, adding additional streams, and resetting all stream sequence numbers. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6525"/>
          <seriesInfo name="DOI" value="10.17487/RFC6525"/>
        </reference>
        <reference anchor="RFC6973" target="https://www.rfc-editor.org/info/rfc6973" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6973.xml">
          <front>
            <title>Privacy Considerations for Internet Protocols</title>
            <author fullname="A. Cooper" initials="A." surname="Cooper"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="J. Peterson" initials="J." surname="Peterson"/>
            <author fullname="J. Morris" initials="J." surname="Morris"/>
            <author fullname="M. Hansen" initials="M." surname="Hansen"/>
            <author fullname="R. Smith" initials="R." surname="Smith"/>
            <date month="July" year="2013"/>
            <abstract>
              <t>This document offers guidance for developing privacy considerations for inclusion in protocol specifications.  It aims to make designers, implementers, and users of Internet protocols aware of privacy-related design choices.  It suggests that whether any individual RFC warrants a specific privacy considerations section will depend on the document's content.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6973"/>
          <seriesInfo name="DOI" value="10.17487/RFC6973"/>
        </reference>
        <reference anchor="RFC7258" target="https://www.rfc-editor.org/info/rfc7258" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7258.xml">
          <front>
            <title>Pervasive Monitoring Is an Attack</title>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2014"/>
            <abstract>
              <t>Pervasive monitoring is a technical attack that should be mitigated in the design of IETF protocols, where possible.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="188"/>
          <seriesInfo name="RFC" value="7258"/>
          <seriesInfo name="DOI" value="10.17487/RFC7258"/>
        </reference>
        <reference anchor="RFC7457" target="https://www.rfc-editor.org/info/rfc7457" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7457.xml">
          <front>
            <title>Summarizing Known Attacks on Transport Layer Security (TLS) and Datagram TLS (DTLS)</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="R. Holz" initials="R." surname="Holz"/>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <date month="February" year="2015"/>
            <abstract>
              <t>Over the last few years, there have been several serious attacks on Transport Layer Security (TLS), including attacks on its most commonly used ciphers and modes of operation.  This document summarizes these attacks, with the goal of motivating generic and protocol-specific recommendations on the usage of TLS and Datagram TLS (DTLS).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7457"/>
          <seriesInfo name="DOI" value="10.17487/RFC7457"/>
        </reference>
        <reference anchor="RFC7525" target="https://www.rfc-editor.org/info/rfc7525" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7525.xml">
          <front>
            <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="R. Holz" initials="R." surname="Holz"/>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are widely used to protect data exchanged over application protocols such as HTTP, SMTP, IMAP, POP, SIP, and XMPP.  Over the last few years, several serious attacks on TLS have emerged, including attacks on its most commonly used cipher suites and their modes of operation.  This document provides recommendations for improving the security of deployed services that use TLS and DTLS.  The recommendations are applicable to the majority of use cases.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="195"/>
          <seriesInfo name="RFC" value="7525"/>
          <seriesInfo name="DOI" value="10.17487/RFC7525"/>
        </reference>
        <reference anchor="RFC7624" target="https://www.rfc-editor.org/info/rfc7624" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7624.xml">
          <front>
            <title>Confidentiality in the Face of Pervasive Surveillance: A Threat Model and Problem Statement</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="B. Schneier" initials="B." surname="Schneier"/>
            <author fullname="C. Jennings" initials="C." surname="Jennings"/>
            <author fullname="T. Hardie" initials="T." surname="Hardie"/>
            <author fullname="B. Trammell" initials="B." surname="Trammell"/>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <author fullname="D. Borkmann" initials="D." surname="Borkmann"/>
            <date month="August" year="2015"/>
            <abstract>
              <t>Since the initial revelations of pervasive surveillance in 2013, several classes of attacks on Internet communications have been discovered.  In this document, we develop a threat model that describes these attacks on Internet confidentiality.  We assume an attacker that is interested in undetected, indiscriminate eavesdropping.  The threat model is based on published, verified attacks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7624"/>
          <seriesInfo name="DOI" value="10.17487/RFC7624"/>
        </reference>
        <reference anchor="ANSSI-DAT-NT-003" target="&lt;https://www.ssi.gouv.fr/uploads/2015/09/NT_IPsec_EN.pdf&gt;">
          <front>
            <title>Recommendations for securing networks with IPsec</title>
            <author initials="" surname="Agence nationale de la sécurité des systèmes d'information">
              <organization/>
            </author>
            <date year="2015" month="August"/>
          </front>
          <seriesInfo name="ANSSI Technical Report DAT-NT-003" value=""/>
        </reference>
        <reference anchor="TRISHAKE" target="https://hal.inria.fr/hal-01102259/file/triple-handshakes-and-cookie-cutters-oakland14.pdf">
          <front>
            <title>Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS</title>
            <author initials="K." surname="Bhargavan" fullname="Karthikeyan Bhargavan">
              <organization/>
            </author>
            <author initials="A." surname="Delignat-Lavaud" fullname="Antoine Delignat-Lavaud">
              <organization/>
            </author>
            <author initials="C." surname="Fournet" fullname="Cédric Fournet">
              <organization/>
            </author>
            <author initials="A." surname="Pironti" fullname="Alfredo Pironti">
              <organization/>
            </author>
            <author initials="P." surname="Strub" fullname="Pierre-Yves Strub">
              <organization/>
            </author>
            <date year="2016" month="April"/>
          </front>
          <seriesInfo name="IEEE Symposium on Security &amp; Privacy" value=""/>
        </reference>
      </references>
    </references>
    <section anchor="motivation-for-changes">
      <name>Motivation for Changes</name>
      <t>This document proposes a number of changes to RFC 6083 that have
various different motivations:</t>
      <t>Supporting Large User Messages: RFC 6083 allowed only user messages
   that could fit within a single DTLS record. 3GPP has run into this
   limitation where they have at least four SCTP using protocols (F1,
   E1, Xn, NG-C) that can potentially generate messages over the size
   of 16384 bytes.</t>
      <t>New Versions: 10 years has passed since RFC 6083 was written, and
   significant evolution has happened in the area of DTLS and security
   algorithms. Thus, DTLS 1.3 is the newest version of DTLS and also
   the SHA-1 HMAC algorithm of RFC 4895 is getting towards the end of
   usefulness. Use of DTLS 1.3 with long lived associations require a
   solution to enable mutual re-authentication and (EC)DHE based
   rekeying to ensure forward secrecy. Thus, this document mandates
   usage of relevant versions and algorithms as well as defining the
   parallel DTLS connection solution.</t>
      <t>Allowing DTLS Messages on any stream: RFC6083 requires DTLS messages
   that are not user message data to be sent on stream 0 and that this
   stream is used with in-order delivery. That can actually limit the
   applications that can use DTLS/SCTP. In addition, with DTLS 1.3
   encrypting the actual message type it is anyway not available.
   Therefore, a more flexible rule set is used that relies on DTLS
   handling reordering.</t>
      <t>Clarifications: Some implementation experiences have been gained that
   motivates additional clarifications on the specification.</t>
      <ul spacing="normal">
        <li>Avoid unsecured messages prior to DTLS handshake have completed.</li>
        <li>Make clear that all messages are encrypted after DTLS handshake.</li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
