<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 3.0.2) -->
<?rfc strict="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<?rfc iprnotified="no"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-mattsson-tls-psk-ke-dont-dont-dont-03" category="info" submissionType="IETF" tocDepth="3" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.15.3 -->
  <front>
    <title abbrev="psk_ke don't don't don't">Key Exchange Without Forward Secrecy is NOT RECOMMENDED</title>
    <seriesInfo name="Internet-Draft" value="draft-mattsson-tls-psk-ke-dont-dont-dont-03"/>
    <author initials="J." surname="Preuß Mattsson" fullname="John Preuß Mattsson">
      <organization abbrev="Ericsson">Ericsson AB</organization>
      <address>
        <postal>
          <street>SE-164 80 Stockholm</street>
          <country>Sweden</country>
        </postal>
        <email>john.mattsson@ericsson.com</email>
      </address>
    </author>
    <date year="2023" month="January" day="09"/>
    <area/>
    <workgroup/>
    <keyword/>
    <abstract>
      <t>Massive pervasive monitoring attacks using key exfiltration and made possible by key exchange without forward secrecy have been reported. If key exchange without Diffie-Hellman is used, static exfiltration of the long-term authentication keys enables passive attackers to compromise all past and future connections. Malicious actors can get access to long-term keys in different ways: physical attacks, hacking, social engineering attacks, espionage, or by simply demanding access to keying material with or without a court order. Exfiltration attacks are a major cybersecurity threat. The use of psk_ke is not following zero trust principles of minimizing the impact of breach and governments have already made deadlines for its deprecation. This document updates the IANA PskKeyExchangeMode registry by setting the "Recommended" value for psk_ke to "N".</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-mattsson-tls-psk-ke-dont-dont-dont/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Transport Layer Security (tls) Working Group mailing list (<eref target="mailto:tls@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tls/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tls/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/emanjon/draft-mattsson-tls-psk-ke-dont-dont-dont"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>Key exchange without forward secrecy enables passive monitoring <xref target="RFC7258"/>. Massive pervasive monitoring attacks using key exfiltration and made possible by key exchange without forward secrecy have been reported <xref target="Heist"/>, and many more have likely happened without ever being reported.  If key exchange without Diffie-Hellman is used, access to the long-term authentication keys enables passive attackers to compromise all past and future connections. Malicious actors can get access to long-term keys in different ways: physical attacks, hacking, social engineering attacks, espionage, or by simply demanding access to keying material with or without a court order. Exfiltration attacks are a major cybersecurity threat <xref target="Exfiltration"/>.</t>
      <t>All cipher suites without forward secrecy have been marked as NOT RECOMMENDED in TLS 1.2 <xref target="RFC8447"/>, and static RSA and DH are forbidden in TLS 1.3 <xref target="RFC8446"/>. A large number of TLS profiles and implementations forbid the use of key exchange without Diffie-Hellman.</t>
      <ul spacing="normal">
        <li>ANSSI states that for all versions of TLS: "The perfect forward secrecy property must be ensured" <xref target="ANSSI-TLS"/>.</li>
        <li>The general 3GPP TLS 1.2 profile follows <xref target="RFC9113"/> and states: "Only cipher suites with AEAD (e.g., GCM) and PFS (e.g.  ECDHE, DHE) shall be supported" <xref target="T3GPP.33.210"/>.</li>
        <li>BoringSSL does not implement psk_ke, so TLS 1.3 resumption always incorporates fresh key material <xref target="BoringSSL"/>.</li>
      </ul>
      <t>Unfortunately, TLS 1.3 allows key exchange without forward secrecy in both full handshakes and resumption handshakes with the psk_ke. As stated in <xref target="RFC8446"/>, psk_ke does not fulfill one of the fundamental TLS 1.3 security properties, namely "Forward secret with respect to long-term keys".  When the PSK is a group key, which is now formally allowed in TLS 1.3 <xref target="RFC9257"/>, psk_ke fails yet another one of the fundamental TLS 1.3 security properties, namely "Secrecy of the session keys" <xref target="Akhmetzyanova"/> <xref target="RFC9257"/>. PSK authentication has yet another big inherent weakness as it often does not provide "Protection of endpoint identities".  It could be argued that PSK authentication should be not recommended solely based on this significant privacy weakness. The 3GPP radio access network that to a large degree relies on PSK are fixing the vulnerabilities by augmenting PSK with ECIES and ECDHE, see Annex C of <xref target="T3GPP.33.501"/> and <xref target="I-D.ietf-emu-aka-pfs"/>.</t>
      <t>Together with rsa_pkcs1, psk_ke is one of the bad apples in the TLS 1.3 fruit basket.  Organizations like BSI <xref target="BSI"/> has already produced recommendations regarding its deprecation.</t>
      <ul spacing="normal">
        <li>BSI states regarding psk_ke that "This mode should only be used in special applications after consultation of an expert." and has set a deadline that use is only allowed until 2026.</li>
      </ul>
      <t>Two essential zero trust principles are to assume that breach is inevitable or has likely already occurred <xref target="NSA-ZT"/>, and to minimize impact when breach occur <xref target="NIST-ZT"/>. One type of breach is key compromise or key exfiltration. Different types of exfiltration are defined and discussed in <xref target="RFC7624"/>. Static exfiltration where the keys are transferred once has a lower risk profile than dynamic exfiltration where keying material or content is transferred to the attacker frequently. Forcing an attacker to do dynamic exfiltration should be considered best practice. This significantly increases the risk of discovery for the attacker.</t>
      <t>One way to force an attacker to do dynamic exfiltration is to frequently rerun ephemeral Diffie-Hellman. For IPsec, ANSSI <xref target="ANSSI-PFS"/> recommends enforcing periodic rekeying with ephemeral Diffie-Hellman, e.g., every hour and every 100 GB of data, in order to limit the impact of a key compromise. This should be considered best practice for all protocols and systems. The Double Ratchet Algorithm in the Signal protocol <xref target="Signal"/> enables very frequent use of ephemeral Diffie-Hellman. The practice of frequently rerunning ephemeral Diffie-Hellman follows directly from the two zero trust principles mentioned above.</t>
      <t>In TLS 1.3, the application_traffic_secret can be rekeyed using key_update, a resumption handshake, or a full handshake. The term forward secrecy is not very specific, and it is often better to talk about the property that compromise of key A does not lead to compromise of key B. <xref target="fig-impact"/> illustrates the impact of some examples of static key exfiltration when psk_ke, key_update, and (ec)dhe are used for rekeying.  Each time period T<contact fullname="ᵢ"/> uses a single application_traffic_secret. <contact fullname="✘"/> means that the attacker has access to the application_traffic_secret in that time period and can passively eavesdrop on the communication. <contact fullname="✔"/> means that the attacker does not have access to the application_traffic_secret. Exfiltration and frequently rerunning EC(DHE) is discussed in Appendix F of <xref target="I-D.ietf-tls-rfc8446bis"/>.</t>
      <figure anchor="fig-impact">
        <name>Impact of static key exfiltration in time period T3 when psk_ke, key_update, and (ec)dhe are used.</name>
        <artset>
          <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="400" width="544" viewBox="0 0 544 400" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px">
              <path d="M 8,64 L 8,96" fill="none" stroke="black"/>
              <path d="M 8,192 L 8,224" fill="none" stroke="black"/>
              <path d="M 8,320 L 8,352" fill="none" stroke="black"/>
              <path d="M 56,64 L 56,96" fill="none" stroke="black"/>
              <path d="M 56,192 L 56,224" fill="none" stroke="black"/>
              <path d="M 56,320 L 56,352" fill="none" stroke="black"/>
              <path d="M 104,64 L 104,96" fill="none" stroke="black"/>
              <path d="M 104,192 L 104,224" fill="none" stroke="black"/>
              <path d="M 104,320 L 104,352" fill="none" stroke="black"/>
              <path d="M 152,64 L 152,96" fill="none" stroke="black"/>
              <path d="M 152,192 L 152,224" fill="none" stroke="black"/>
              <path d="M 152,320 L 152,352" fill="none" stroke="black"/>
              <path d="M 200,64 L 200,96" fill="none" stroke="black"/>
              <path d="M 200,192 L 200,224" fill="none" stroke="black"/>
              <path d="M 200,320 L 200,352" fill="none" stroke="black"/>
              <path d="M 248,64 L 248,96" fill="none" stroke="black"/>
              <path d="M 248,192 L 248,224" fill="none" stroke="black"/>
              <path d="M 248,320 L 248,352" fill="none" stroke="black"/>
              <path d="M 296,64 L 296,96" fill="none" stroke="black"/>
              <path d="M 296,192 L 296,224" fill="none" stroke="black"/>
              <path d="M 296,320 L 296,352" fill="none" stroke="black"/>
              <path d="M 344,64 L 344,96" fill="none" stroke="black"/>
              <path d="M 344,192 L 344,224" fill="none" stroke="black"/>
              <path d="M 344,320 L 344,352" fill="none" stroke="black"/>
              <path d="M 392,64 L 392,96" fill="none" stroke="black"/>
              <path d="M 392,192 L 392,224" fill="none" stroke="black"/>
              <path d="M 392,320 L 392,352" fill="none" stroke="black"/>
              <path d="M 440,64 L 440,96" fill="none" stroke="black"/>
              <path d="M 440,192 L 440,224" fill="none" stroke="black"/>
              <path d="M 440,320 L 440,352" fill="none" stroke="black"/>
              <path d="M 488,64 L 488,96" fill="none" stroke="black"/>
              <path d="M 488,192 L 488,224" fill="none" stroke="black"/>
              <path d="M 488,320 L 488,352" fill="none" stroke="black"/>
              <path d="M 536,64 L 536,96" fill="none" stroke="black"/>
              <path d="M 536,192 L 536,224" fill="none" stroke="black"/>
              <path d="M 536,320 L 536,352" fill="none" stroke="black"/>
              <path d="M 8,64 L 392,64" fill="none" stroke="black"/>
              <path d="M 440,64 L 536,64" fill="none" stroke="black"/>
              <path d="M 8,96 L 392,96" fill="none" stroke="black"/>
              <path d="M 440,96 L 536,96" fill="none" stroke="black"/>
              <path d="M 16,128 L 528,128" fill="none" stroke="black"/>
              <path d="M 8,192 L 392,192" fill="none" stroke="black"/>
              <path d="M 440,192 L 536,192" fill="none" stroke="black"/>
              <path d="M 8,224 L 392,224" fill="none" stroke="black"/>
              <path d="M 440,224 L 536,224" fill="none" stroke="black"/>
              <path d="M 160,256 L 528,256" fill="none" stroke="black"/>
              <path d="M 8,320 L 392,320" fill="none" stroke="black"/>
              <path d="M 440,320 L 536,320" fill="none" stroke="black"/>
              <path d="M 8,352 L 392,352" fill="none" stroke="black"/>
              <path d="M 440,352 L 536,352" fill="none" stroke="black"/>
              <path d="M 160,384 L 192,384" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="536,256 524,250.4 524,261.6" fill="black" transform="rotate(0,528,256)"/>
              <polygon class="arrowhead" points="536,128 524,122.4 524,133.6" fill="black" transform="rotate(0,528,128)"/>
              <polygon class="arrowhead" points="200,384 188,378.4 188,389.6" fill="black" transform="rotate(0,192,384)"/>
              <polygon class="arrowhead" points="168,384 156,378.4 156,389.6" fill="black" transform="rotate(180,160,384)"/>
              <polygon class="arrowhead" points="168,256 156,250.4 156,261.6" fill="black" transform="rotate(180,160,256)"/>
              <polygon class="arrowhead" points="24,128 12,122.4 12,133.6" fill="black" transform="rotate(180,16,128)"/>
              <g class="text">
                <text x="44" y="36">rekeying</text>
                <text x="100" y="36">with</text>
                <text x="148" y="36">psk_ke</text>
                <text x="36" y="52">static</text>
                <text x="116" y="52">exfiltration</text>
                <text x="180" y="52">of</text>
                <text x="208" y="52">psk</text>
                <text x="236" y="52">in</text>
                <text x="264" y="52">T₃:</text>
                <text x="32" y="84">✘</text>
                <text x="80" y="84">✘</text>
                <text x="128" y="84">✘</text>
                <text x="176" y="84">✘</text>
                <text x="224" y="84">✘</text>
                <text x="272" y="84">✘</text>
                <text x="320" y="84">✘</text>
                <text x="368" y="84">✘</text>
                <text x="416" y="84">...</text>
                <text x="464" y="84">✘</text>
                <text x="512" y="84">✘</text>
                <text x="36" y="116">T₀</text>
                <text x="84" y="116">T₁</text>
                <text x="132" y="116">T₂</text>
                <text x="180" y="116">T₃</text>
                <text x="228" y="116">T₄</text>
                <text x="276" y="116">T₅</text>
                <text x="324" y="116">T₆</text>
                <text x="372" y="116">T₇</text>
                <text x="416" y="116">...</text>
                <text x="468" y="116">Tₙ₋₁</text>
                <text x="516" y="116">Tₙ</text>
                <text x="44" y="164">rekeying</text>
                <text x="100" y="164">with</text>
                <text x="164" y="164">key_update</text>
                <text x="36" y="180">static</text>
                <text x="116" y="180">exfiltration</text>
                <text x="180" y="180">of</text>
                <text x="300" y="180">application_traffic_secret</text>
                <text x="420" y="180">in</text>
                <text x="448" y="180">T₃:</text>
                <text x="32" y="212">✔</text>
                <text x="80" y="212">✔</text>
                <text x="128" y="212">✔</text>
                <text x="176" y="212">✘</text>
                <text x="224" y="212">✘</text>
                <text x="272" y="212">✘</text>
                <text x="320" y="212">✘</text>
                <text x="368" y="212">✘</text>
                <text x="416" y="212">...</text>
                <text x="464" y="212">✘</text>
                <text x="512" y="212">✘</text>
                <text x="36" y="244">T₀</text>
                <text x="84" y="244">T₁</text>
                <text x="132" y="244">T₂</text>
                <text x="180" y="244">T₃</text>
                <text x="228" y="244">T₄</text>
                <text x="276" y="244">T₅</text>
                <text x="324" y="244">T₆</text>
                <text x="372" y="244">T₇</text>
                <text x="416" y="244">...</text>
                <text x="468" y="244">Tₙ₋₁</text>
                <text x="516" y="244">Tₙ</text>
                <text x="44" y="292">rekeying</text>
                <text x="100" y="292">with</text>
                <text x="152" y="292">(ec)dhe</text>
                <text x="36" y="308">static</text>
                <text x="116" y="308">exfiltration</text>
                <text x="180" y="308">of</text>
                <text x="208" y="308">all</text>
                <text x="244" y="308">keys</text>
                <text x="276" y="308">in</text>
                <text x="304" y="308">T₃:</text>
                <text x="32" y="340">✔</text>
                <text x="80" y="340">✔</text>
                <text x="128" y="340">✔</text>
                <text x="176" y="340">✘</text>
                <text x="224" y="340">✔</text>
                <text x="272" y="340">✔</text>
                <text x="320" y="340">✔</text>
                <text x="368" y="340">✔</text>
                <text x="416" y="340">...</text>
                <text x="464" y="340">✔</text>
                <text x="512" y="340">✔</text>
                <text x="36" y="372">T₀</text>
                <text x="84" y="372">T₁</text>
                <text x="132" y="372">T₂</text>
                <text x="180" y="372">T₃</text>
                <text x="228" y="372">T₄</text>
                <text x="276" y="372">T₅</text>
                <text x="324" y="372">T₆</text>
                <text x="372" y="372">T₇</text>
                <text x="416" y="372">...</text>
                <text x="468" y="372">Tₙ₋₁</text>
                <text x="516" y="372">Tₙ</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art" align="center"><![CDATA[
 rekeying with psk_ke
 static exfiltration of psk in T₃:
+-----+-----+-----+-----+-----+-----+-----+-----+     +-----+-----+
|  ✘  |  ✘  |  ✘  |  ✘  |  ✘  |  ✘  |  ✘  |  ✘  | ... |  ✘  |  ✘  |
+-----+-----+-----+-----+-----+-----+-----+-----+     +-----+-----+
   T₀    T₁    T₂    T₃    T₄    T₅    T₆    T₇   ...   Tₙ₋₁   Tₙ
 <--------------------------------------------------------------->

 rekeying with key_update
 static exfiltration of application_traffic_secret in T₃:
+-----+-----+-----+-----+-----+-----+-----+-----+     +-----+-----+
|  ✔  |  ✔  |  ✔  |  ✘  |  ✘  |  ✘  |  ✘  |  ✘  | ... |  ✘  |  ✘  |
+-----+-----+-----+-----+-----+-----+-----+-----+     +-----+-----+
   T₀    T₁    T₂    T₃    T₄    T₅    T₆    T₇   ...   Tₙ₋₁   Tₙ
                   <--------------------------------------------->

 rekeying with (ec)dhe
 static exfiltration of all keys in T₃:
+-----+-----+-----+-----+-----+-----+-----+-----+     +-----+-----+
|  ✔  |  ✔  |  ✔  |  ✘  |  ✔  |  ✔  |  ✔  |  ✔  | ... |  ✔  |  ✔  |
+-----+-----+-----+-----+-----+-----+-----+-----+     +-----+-----+
   T₀    T₁    T₂    T₃    T₄    T₅    T₆    T₇   ...   Tₙ₋₁   Tₙ
                   <--->
]]></artwork>
        </artset>
      </figure>
      <t>Modern ephemeral key exchange algorithms like x25519 <xref target="RFC7748"/> are very fast and have small message overhead. The public keys are 32 bytes long and the cryptographic operations take 53 microseconds per endpoint on a single core AMD Ryzen 5 5560U <xref target="eBACS-DH"/>. Ephemeral key exchange with the quantum-resistant algorithm Kyber that NIST will standardize is even faster. For the current non-standardized version of Kyber512 the cryptographic operations take 12 microseconds for the client and 8 microseconds for the server <xref target="eBACS-KEM"/>.</t>
      <!--(102661 + 110972) / 4.062 / 10^3 -->
<!--(21880 + 26067) / 4.062 / 10^3 -->
<!--(32241) / 4.062 / 10^3 -->

<t>Unfortunately, psk_ke is marked as "Recommended" in the IANA PskKeyExchangeMode registry. This may severely weaken security in deployments following the "Recommended" column.  Introducing TLS 1.3 in 3GPP had the unfortunate and surprising effect of drastically lowering the minimum security when TLS is used with PSK authentication.  Some companies in 3GPP have been unwilling to mark psk_ke as not recommended as it is so clearly marked as "Recommended" by the IETF. By labeling psk_ke as "Recommended", IETF is legitimizing and implicitly promoting bad security practice.</t>
      <t>This document updates the PskKeyExchangeMode registry under the Transport Layer Security (TLS) Parameters heading.  For psk_ke the "Recommended" value has been set to "N".</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to update the PskKeyExchangeMode registry under the Transport Layer Security (TLS) Parameters heading.  For psk_ke the "Recommended" value has been set to "N".</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8446" target="https://www.rfc-editor.org/info/rfc8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8447" target="https://www.rfc-editor.org/info/rfc8447">
          <front>
            <title>IANA Registry Updates for TLS and DTLS</title>
            <author fullname="J. Salowey" initials="J." surname="Salowey">
              <organization/>
            </author>
            <author fullname="S. Turner" initials="S." surname="Turner">
              <organization/>
            </author>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document describes a number of changes to TLS and DTLS IANA registries that range from adding notes to the registry all the way to changing the registration policy.  These changes were mostly motivated by WG review of the TLS- and DTLS-related registries undertaken as part of the TLS 1.3 development process.</t>
              <t>This document updates the following RFCs: 3749, 5077, 4680, 5246, 5705, 5878, 6520, and 7301.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8447"/>
          <seriesInfo name="DOI" value="10.17487/RFC8447"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC7258" target="https://www.rfc-editor.org/info/rfc7258">
          <front>
            <title>Pervasive Monitoring Is an Attack</title>
            <author fullname="S. Farrell" initials="S." surname="Farrell">
              <organization/>
            </author>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig">
              <organization/>
            </author>
            <date month="May" year="2014"/>
            <abstract>
              <t>Pervasive monitoring is a technical attack that should be mitigated in the design of IETF protocols, where possible.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="188"/>
          <seriesInfo name="RFC" value="7258"/>
          <seriesInfo name="DOI" value="10.17487/RFC7258"/>
        </reference>
        <reference anchor="RFC7624" target="https://www.rfc-editor.org/info/rfc7624">
          <front>
            <title>Confidentiality in the Face of Pervasive Surveillance: A Threat Model and Problem Statement</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes">
              <organization/>
            </author>
            <author fullname="B. Schneier" initials="B." surname="Schneier">
              <organization/>
            </author>
            <author fullname="C. Jennings" initials="C." surname="Jennings">
              <organization/>
            </author>
            <author fullname="T. Hardie" initials="T." surname="Hardie">
              <organization/>
            </author>
            <author fullname="B. Trammell" initials="B." surname="Trammell">
              <organization/>
            </author>
            <author fullname="C. Huitema" initials="C." surname="Huitema">
              <organization/>
            </author>
            <author fullname="D. Borkmann" initials="D." surname="Borkmann">
              <organization/>
            </author>
            <date month="August" year="2015"/>
            <abstract>
              <t>Since the initial revelations of pervasive surveillance in 2013, several classes of attacks on Internet communications have been discovered.  In this document, we develop a threat model that describes these attacks on Internet confidentiality.  We assume an attacker that is interested in undetected, indiscriminate eavesdropping.  The threat model is based on published, verified attacks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7624"/>
          <seriesInfo name="DOI" value="10.17487/RFC7624"/>
        </reference>
        <reference anchor="RFC7748" target="https://www.rfc-editor.org/info/rfc7748">
          <front>
            <title>Elliptic Curves for Security</title>
            <author fullname="A. Langley" initials="A." surname="Langley">
              <organization/>
            </author>
            <author fullname="M. Hamburg" initials="M." surname="Hamburg">
              <organization/>
            </author>
            <author fullname="S. Turner" initials="S." surname="Turner">
              <organization/>
            </author>
            <date month="January" year="2016"/>
            <abstract>
              <t>This memo specifies two elliptic curves over prime fields that offer a high level of practical security in cryptographic applications, including Transport Layer Security (TLS).  These curves are intended to operate at the ~128-bit and ~224-bit security level, respectively, and are generated deterministically based on a list of required properties.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7748"/>
          <seriesInfo name="DOI" value="10.17487/RFC7748"/>
        </reference>
        <reference anchor="RFC9113" target="https://www.rfc-editor.org/info/rfc9113">
          <front>
            <title>HTTP/2</title>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson">
              <organization/>
            </author>
            <author fullname="C. Benfield" initials="C." role="editor" surname="Benfield">
              <organization/>
            </author>
            <date month="June" year="2022"/>
            <abstract>
              <t>This specification describes an optimized expression of the semantics of the Hypertext Transfer Protocol (HTTP), referred to as HTTP version 2 (HTTP/2). HTTP/2 enables a more efficient use of network resources and a reduced latency by introducing field compression and allowing multiple concurrent exchanges on the same connection.</t>
              <t>This document obsoletes RFCs 7540 and 8740.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9113"/>
          <seriesInfo name="DOI" value="10.17487/RFC9113"/>
        </reference>
        <reference anchor="RFC9257" target="https://www.rfc-editor.org/info/rfc9257">
          <front>
            <title>Guidance for External Pre-Shared Key (PSK) Usage in TLS</title>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <author fullname="J. Hoyland" initials="J." surname="Hoyland">
              <organization/>
            </author>
            <author fullname="M. Sethi" initials="M." surname="Sethi">
              <organization/>
            </author>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood">
              <organization/>
            </author>
            <date month="July" year="2022"/>
            <abstract>
              <t>This document provides usage guidance for external Pre-Shared Keys (PSKs) in Transport Layer Security (TLS) 1.3 as defined in RFC 8446. It lists TLS security properties provided by PSKs under certain assumptions, then it demonstrates how violations of these assumptions lead to attacks. Advice for applications to help meet these assumptions is provided. This document also discusses PSK use cases and provisioning processes. Finally, it lists the privacy and security properties that are not provided by TLS 1.3 when external PSKs are used.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9257"/>
          <seriesInfo name="DOI" value="10.17487/RFC9257"/>
        </reference>
        <reference anchor="I-D.ietf-emu-aka-pfs" target="https://www.ietf.org/archive/id/draft-ietf-emu-aka-pfs-08.txt">
          <front>
            <title>Forward Secrecy for the Extensible Authentication Protocol Method for Authentication and Key Agreement (EAP-AKA' FS)</title>
            <author fullname="Jari Arkko" initials="J." surname="Arkko">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Karl Norrman" initials="K." surname="Norrman">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Vesa Torvinen" initials="V." surname="Torvinen">
              <organization>Ericsson</organization>
            </author>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson</organization>
            </author>
            <date day="23" month="October" year="2022"/>
            <abstract>
              <t>   Many different attacks have been reported as part of revelations
   associated with pervasive surveillance.  Some of the reported attacks
   involved compromising the smart card supply chain, such as attacking
   SIM card manufacturers and operators in an effort to compromise
   shared secrets stored on these cards.  Since the publication of those
   reports, manufacturing and provisioning processes have gained much
   scrutiny and have improved.  However, the danger of resourceful
   attackers for these systems is still a concern.  Always assuming
   breach such as key compromise and minimizing the impact of breach are
   essential zero-trust principles.

   This specification updates RFC 9048, the EAP-AKA' authentication
   method, with an optional extension.  Similarly, this specification
   also updates the earlier version of the EAP-AKA' specification in RFC
   5448.  The extension, when negotiated, provides Forward Secrecy for
   the session key generated as a part of the authentication run in EAP-
   AKA'.  This prevents an attacker who has gained access to the long-
   term pre-shared secret in a SIM card from being able to decrypt any
   past communications.  In addition, if the attacker stays merely a
   passive eavesdropper, the extension prevents attacks against future
   sessions.  This forces attackers to use active attacks instead.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-emu-aka-pfs-08"/>
        </reference>
        <reference anchor="I-D.ietf-tls-rfc8446bis" target="https://www.ietf.org/archive/id/draft-ietf-tls-rfc8446bis-05.txt">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Mozilla</organization>
            </author>
            <date day="24" month="October" year="2022"/>
            <abstract>
              <t>   This document specifies version 1.3 of the Transport Layer Security
   (TLS) protocol.  TLS allows client/server applications to communicate
   over the Internet in a way that is designed to prevent eavesdropping,
   tampering, and message forgery.

   This document updates RFCs 5705, 6066, 7627, and 8422 and obsoletes
   RFCs 5077, 5246, 6961, and 8446.  This document also specifies new
   requirements for TLS 1.2 implementations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8446bis-05"/>
        </reference>
        <reference anchor="Akhmetzyanova" target="https://eprint.iacr.org/2019/421.pdf">
          <front>
            <title>Continuing to reflect on TLS 1.3 with external PSK</title>
            <author initials="L." surname="Akhmetzyanova">
              <organization/>
            </author>
            <author initials="E." surname="Alekseev">
              <organization/>
            </author>
            <author initials="E." surname="Smyshlyaeva">
              <organization/>
            </author>
            <author initials="A." surname="Sokolov">
              <organization/>
            </author>
            <date year="2019" month="April"/>
          </front>
        </reference>
        <reference anchor="ANSSI-PFS" target="https://www.ssi.gouv.fr/uploads/2015/09/NT_IPsec_EN.pdf">
          <front>
            <title>Recommendations for securing networks with IPsec</title>
            <author initials="" surname="Agence nationale de la sécurité des systèmes d'information">
              <organization/>
            </author>
            <date year="2015" month="August"/>
          </front>
        </reference>
        <reference anchor="ANSSI-TLS" target="https://www.ssi.gouv.fr/uploads/2017/02/security-recommendations-for-tls_v1.1.pdf">
          <front>
            <title>Security Recommendations for TLS</title>
            <author initials="" surname="Agence nationale de la sécurité des systèmes d'information">
              <organization/>
            </author>
            <date year="2017" month="January"/>
          </front>
        </reference>
        <reference anchor="BoringSSL" target="https://boringssl.googlesource.com/boringssl/">
          <front>
            <title>BoringSSL</title>
            <author initials="" surname="Google">
              <organization/>
            </author>
            <date year="2023" month="January"/>
          </front>
        </reference>
        <reference anchor="BSI" target="https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/TechGuidelines/TG02102/BSI-TR-02102-2.pdf">
          <front>
            <title>Technical Guideline TR-02102-2 Cryptographic Mechanisms: Recommendations and Key Lengths Part 2 – Use of Transport Layer Security (TLS)</title>
            <author initials="" surname="Bundesamt für Sicherheit in der Informationstechnik">
              <organization/>
            </author>
            <date year="2022" month="February"/>
          </front>
        </reference>
        <reference anchor="eBACS-DH" target="https://bench.cr.yp.to/results-dh.html">
          <front>
            <title>Measurements of public-key Diffie–Hellman secret-sharing systems, indexed by machine</title>
            <author initials="" surname="eBACS: ECRYPT Benchmarking of Cryptographic Systems">
              <organization/>
            </author>
            <date year="2023" month="January"/>
          </front>
        </reference>
        <reference anchor="eBACS-KEM" target="https://bench.cr.yp.to/results-kem.html">
          <front>
            <title>Measurements of key-encapsulation mechanisms, indexed by machine</title>
            <author initials="" surname="eBACS: ECRYPT Benchmarking of Cryptographic Systems">
              <organization/>
            </author>
            <date year="2023" month="January"/>
          </front>
        </reference>
        <reference anchor="Exfiltration" target="https://blog.apnic.net/2022/03/31/how-to-detect-and-prevent-common-data-exfiltration-attacks/">
          <front>
            <title>How to: Detect and prevent common data exfiltration attacks</title>
            <author initials="" surname="APNIC">
              <organization/>
            </author>
            <date year="2022" month="March"/>
          </front>
        </reference>
        <reference anchor="Heist" target="https://theintercept.com/2015/02/19/great-sim-heist/">
          <front>
            <title>How Spies Stole the Keys to the Encryption Castle</title>
            <author initials="" surname="The Intercept">
              <organization/>
            </author>
            <date year="2015" month="February"/>
          </front>
        </reference>
        <reference anchor="NIST-ZT" target="https://www.nccoe.nist.gov/sites/default/files/2022-12/zta-nist-sp-1800-35b-preliminary-draft-2.pdf">
          <front>
            <title>Implementing a Zero Trust Architecture</title>
            <author initials="" surname="National Institute of Standards and Technology">
              <organization/>
            </author>
            <date year="2022" month="December"/>
          </front>
        </reference>
        <reference anchor="NSA-ZT" target="https://media.defense.gov/2021/Feb/25/2002588479/-1/-1/0/CSI_EMBRACING_ZT_SECURITY_MODEL_UOO115131-21.PDF">
          <front>
            <title>Embracing a Zero Trust Security Model</title>
            <author initials="" surname="National Security Agency">
              <organization/>
            </author>
            <date year="2021" month="February"/>
          </front>
        </reference>
        <reference anchor="Signal" target="https://signal.org/docs/specifications/doubleratchet/">
          <front>
            <title>The Double Ratchet Algorithm</title>
            <author initials="" surname="Signal">
              <organization/>
            </author>
            <date year="2016" month="November"/>
          </front>
        </reference>
        <reference anchor="T3GPP.33.210" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=2279">
          <front>
            <title>TS 33.210 Network Domain Security (NDS); IP network layer security</title>
            <author initials="" surname="3GPP">
              <organization/>
            </author>
            <date year="2022" month="September"/>
          </front>
        </reference>
        <reference anchor="T3GPP.33.501" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3169">
          <front>
            <title>TS 33.501 Security architecture and procedures for 5G System</title>
            <author initials="" surname="3GPP">
              <organization/>
            </author>
            <date year="2022" month="September"/>
          </front>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>The authors want to thank <contact fullname="Ari Keränen"/>, <contact fullname="Eric Rescorla"/>, and <contact fullname="Paul Wouters"/> for their valuable comments and feedback.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
