<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 3.0.2) -->
<?rfc strict="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<?rfc iprnotified="no"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-mattsson-tls-psk-ke-dont-dont-dont-04" category="std" consensus="true" submissionType="IETF" tocDepth="3" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.15.3 -->
  <front>
    <title abbrev="psk_ke and NULL don't don't don't">NULL Encryption and Key Exchange Without Forward Secrecy are Dicouraged</title>
    <seriesInfo name="Internet-Draft" value="draft-mattsson-tls-psk-ke-dont-dont-dont-04"/>
    <author initials="J." surname="Preuß Mattsson" fullname="John Preuß Mattsson">
      <organization abbrev="Ericsson">Ericsson AB</organization>
      <address>
        <postal>
          <street>SE-164 80 Stockholm</street>
          <country>Sweden</country>
        </postal>
        <email>john.mattsson@ericsson.com</email>
      </address>
    </author>
    <date year="2023" month="January" day="11"/>
    <area/>
    <workgroup/>
    <keyword/>
    <abstract>
      <t>Massive pervasive monitoring attacks using key exfiltration and made possible by key exchange without forward secrecy have been reported. If key exchange without Diffie-Hellman is used, static exfiltration of the long-term authentication keys enables passive attackers to compromise all past and future connections. Malicious actors can get access to long-term keys in different ways: physical attacks, hacking, social engineering attacks, espionage, or by simply demanding access to keying material with or without a court order. Exfiltration attacks are a major cybersecurity threat.  If NULL encryption is used an on-path attacker can read all application data. The use of psk_ke and NULL encryption are not following zero trust principles of minimizing the impact of breach and governments have already made deadlines for their deprecation. This document sets the Recommended values of psk_ke, TLS_SHA256_SHA256, TLS_SHA384_SHA384, ffdhe2048 to "D" and the Recommended values of rsa_pkcs1_sha256, rsa_pkcs1_sha384, and rsa_pkcs1_sha512 to "N".</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-mattsson-tls-psk-ke-dont-dont-dont/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Transport Layer Security (tls) Working Group mailing list (<eref target="mailto:tls@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tls/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tls/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/emanjon/draft-mattsson-tls-psk-ke-dont-dont-dont"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t><xref target="RFC8447"/> added a Recommended column to many of the TLS registries. The Recommended column did originally non-normatively indicate parameters that are generally recommended for implementations to support. The meaning of the column was changed by <xref target="I-D.ietf-tls-rfc8447bis"/> to indicate that the IETF has consensus that the item is RECOMMENDED, i.e., using normative <xref target="RFC2119"/> language. <xref target="I-D.ietf-tls-rfc8447bis"/> also introduced a third value "D" indicating that an item is discouraged and SHOULD NOT or MUST NOT be used. This means that all current values need to be reevaluated. The current values also need to be reevaluated as attacks, government requirements, and best practices have changed in the more than 4 years since <xref target="RFC8446"/> and <xref target="RFC8447"/> were published.</t>
      <t>This document evaluates TLS 1.3 pre-shared key exchange modes, (EC)DHE groups, signature algorithms, and cipher suites and changes the values in the Recommended column for psk_ke, TLS_SHA256_SHA256, TLS_SHA384_SHA384, ffdhe2048, rsa_pkcs1_sha256, rsa_pkcs1_sha384, and rsa_pkcs1_sha512. The document does not evaluate TLS 1.2 parameters. TLS 1.2 is obsolete <xref target="RFC8446"/> and NIST requires support for TLS 1.3 by January 1, 2024 <xref target="NIST-TLS"/>. This means that two NIST compatible implementations will never negotiate TLS 1.2 at the time this document would be published.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      </section>
    </section>
    <section anchor="key-exchange-without-forward-secrecy">
      <name>Key Exchange Without Forward Secrecy</name>
      <t>Key exchange without forward secrecy enables passive monitoring <xref target="RFC7258"/>. Massive pervasive monitoring attacks using key exfiltration and made possible by key exchange without forward secrecy have been reported <xref target="Heist"/>, and many more have likely happened without ever being reported.  If key exchange without Diffie-Hellman is used, access to the long-term authentication keys enables passive attackers to compromise all past and future connections. Malicious actors can get access to long-term keys in different ways: physical attacks, hacking, social engineering attacks, espionage, or by simply demanding access to keying material with or without a court order. Exfiltration attacks are a major cybersecurity threat <xref target="Exfiltration"/>.</t>
      <t>All cipher suites without forward secrecy have been marked as NOT RECOMMENDED in TLS 1.2 <xref target="I-D.ietf-tls-rfc8447bis"/>, and static RSA and DH are forbidden in TLS 1.3 <xref target="RFC8446"/>. A large number of TLS profiles and implementations forbid the use of key exchange without Diffie-Hellman.</t>
      <ul spacing="normal">
        <li>ANSSI states that for all versions of TLS: "The perfect forward secrecy property must be ensured" <xref target="ANSSI-TLS"/>.</li>
        <li>The general 3GPP TLS 1.2 profile follows <xref target="RFC9113"/> and states: "Only cipher suites with AEAD (e.g., GCM) and PFS (e.g.  ECDHE, DHE) shall be supported" <xref target="T3GPP.33.210"/>.</li>
        <li>BoringSSL has chosen to not implement psk_ke, so that TLS 1.3 resumption always incorporates fresh key material <xref target="BoringSSL"/>.</li>
      </ul>
      <t>Unfortunately, TLS 1.3 allows key exchange without forward secrecy in both full handshakes and resumption handshakes with the psk_ke. As stated in <xref target="RFC8446"/>, psk_ke does not fulfill one of the fundamental TLS 1.3 security properties, namely "Forward secret with respect to long-term keys".  When the PSK is a group key, which is now formally allowed in TLS 1.3 <xref target="RFC9257"/>, psk_ke fails yet another one of the fundamental TLS 1.3 security properties, namely "Secrecy of the session keys" <xref target="Akhmetzyanova"/> <xref target="RFC9257"/>. PSK authentication has yet another big inherent weakness as it often does not provide "Protection of endpoint identities".  It could be argued that PSK authentication should be not recommended solely based on this significant privacy weakness. The 3GPP radio access network that to a large degree relies on PSK are fixing the vulnerabilities by augmenting PSK with ECIES and ECDHE, see Annex C of <xref target="T3GPP.33.501"/> and <xref target="I-D.ietf-emu-aka-pfs"/>.</t>
      <t>Together with ffdhe2048 and rsa_pkcs1, psk_ke is one of the bad apples in the standards track TLS 1.3 fruit basket.  Organizations like BSI <xref target="BSI"/> has already produced recommendations regarding its deprecation.</t>
      <ul spacing="normal">
        <li>BSI states regarding psk_ke that "This mode should only be used in special applications after consultation of an expert." and has set a deadline that use is only allowed until 2026.</li>
      </ul>
      <t>Two essential zero trust principles are to assume that breach is inevitable or has likely already occurred <xref target="NSA-ZT"/>, and to minimize impact when breach occur <xref target="NIST-ZT"/>. One type of breach is key compromise or key exfiltration. Different types of exfiltration are defined and discussed in <xref target="RFC7624"/>. Static exfiltration where the keys are transferred once has a lower risk profile than dynamic exfiltration where keying material or content is transferred to the attacker frequently. Forcing an attacker to do dynamic exfiltration minimizes the impact of breach and should be considered best practice. This significantly increases the risk of discovery for the attacker.</t>
      <t>One way to force an attacker to do dynamic exfiltration is to frequently rerun ephemeral Diffie-Hellman. For IPsec, ANSSI <xref target="ANSSI-PFS"/> recommends enforcing periodic rekeying with ephemeral Diffie-Hellman, e.g., every hour and every 100 GB of data, in order to limit the impact of a key compromise. This should be considered best practice for all protocols and systems. The Double Ratchet Algorithm in the Signal protocol <xref target="Signal"/> enables very frequent use of ephemeral Diffie-Hellman. The practice of frequently rerunning ephemeral Diffie-Hellman follows directly from the two zero trust principles mentioned above.</t>
      <t>In TLS 1.3, the application_traffic_secret can be rekeyed using key_update, a resumption handshake, or a full handshake. The term forward secrecy is not very specific, and it is often better to talk about the property that compromise of key A does not lead to compromise of key B. <xref target="fig-impact"/> illustrates the impact of some examples of static key exfiltration when psk_ke, key_update, and (ec)dhe are used for rekeying.  Each time period T<contact fullname="ᵢ"/> uses a single application_traffic_secret. <contact fullname="✘"/> means that the attacker has access to the application_traffic_secret in that time period and can passively eavesdrop on the communication. <contact fullname="✔"/> means that the attacker does not have access to the application_traffic_secret. Exfiltration and frequently rerunning EC(DHE) is discussed in Appendix F of <xref target="I-D.ietf-tls-rfc8446bis"/>.</t>
      <figure anchor="fig-impact">
        <name>Impact of static key exfiltration in time period T3 when psk_ke, key_update, and (ec)dhe are used.</name>
        <artset>
          <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="400" width="544" viewBox="0 0 544 400" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px">
              <path d="M 8,64 L 8,96" fill="none" stroke="black"/>
              <path d="M 8,192 L 8,224" fill="none" stroke="black"/>
              <path d="M 8,320 L 8,352" fill="none" stroke="black"/>
              <path d="M 56,64 L 56,96" fill="none" stroke="black"/>
              <path d="M 56,192 L 56,224" fill="none" stroke="black"/>
              <path d="M 56,320 L 56,352" fill="none" stroke="black"/>
              <path d="M 104,64 L 104,96" fill="none" stroke="black"/>
              <path d="M 104,192 L 104,224" fill="none" stroke="black"/>
              <path d="M 104,320 L 104,352" fill="none" stroke="black"/>
              <path d="M 152,64 L 152,96" fill="none" stroke="black"/>
              <path d="M 152,192 L 152,224" fill="none" stroke="black"/>
              <path d="M 152,320 L 152,352" fill="none" stroke="black"/>
              <path d="M 200,64 L 200,96" fill="none" stroke="black"/>
              <path d="M 200,192 L 200,224" fill="none" stroke="black"/>
              <path d="M 200,320 L 200,352" fill="none" stroke="black"/>
              <path d="M 248,64 L 248,96" fill="none" stroke="black"/>
              <path d="M 248,192 L 248,224" fill="none" stroke="black"/>
              <path d="M 248,320 L 248,352" fill="none" stroke="black"/>
              <path d="M 296,64 L 296,96" fill="none" stroke="black"/>
              <path d="M 296,192 L 296,224" fill="none" stroke="black"/>
              <path d="M 296,320 L 296,352" fill="none" stroke="black"/>
              <path d="M 344,64 L 344,96" fill="none" stroke="black"/>
              <path d="M 344,192 L 344,224" fill="none" stroke="black"/>
              <path d="M 344,320 L 344,352" fill="none" stroke="black"/>
              <path d="M 392,64 L 392,96" fill="none" stroke="black"/>
              <path d="M 392,192 L 392,224" fill="none" stroke="black"/>
              <path d="M 392,320 L 392,352" fill="none" stroke="black"/>
              <path d="M 440,64 L 440,96" fill="none" stroke="black"/>
              <path d="M 440,192 L 440,224" fill="none" stroke="black"/>
              <path d="M 440,320 L 440,352" fill="none" stroke="black"/>
              <path d="M 488,64 L 488,96" fill="none" stroke="black"/>
              <path d="M 488,192 L 488,224" fill="none" stroke="black"/>
              <path d="M 488,320 L 488,352" fill="none" stroke="black"/>
              <path d="M 536,64 L 536,96" fill="none" stroke="black"/>
              <path d="M 536,192 L 536,224" fill="none" stroke="black"/>
              <path d="M 536,320 L 536,352" fill="none" stroke="black"/>
              <path d="M 8,64 L 392,64" fill="none" stroke="black"/>
              <path d="M 440,64 L 536,64" fill="none" stroke="black"/>
              <path d="M 8,96 L 392,96" fill="none" stroke="black"/>
              <path d="M 440,96 L 536,96" fill="none" stroke="black"/>
              <path d="M 16,128 L 528,128" fill="none" stroke="black"/>
              <path d="M 8,192 L 392,192" fill="none" stroke="black"/>
              <path d="M 440,192 L 536,192" fill="none" stroke="black"/>
              <path d="M 8,224 L 392,224" fill="none" stroke="black"/>
              <path d="M 440,224 L 536,224" fill="none" stroke="black"/>
              <path d="M 160,256 L 528,256" fill="none" stroke="black"/>
              <path d="M 8,320 L 392,320" fill="none" stroke="black"/>
              <path d="M 440,320 L 536,320" fill="none" stroke="black"/>
              <path d="M 8,352 L 392,352" fill="none" stroke="black"/>
              <path d="M 440,352 L 536,352" fill="none" stroke="black"/>
              <path d="M 160,384 L 192,384" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="536,256 524,250.4 524,261.6" fill="black" transform="rotate(0,528,256)"/>
              <polygon class="arrowhead" points="536,128 524,122.4 524,133.6" fill="black" transform="rotate(0,528,128)"/>
              <polygon class="arrowhead" points="200,384 188,378.4 188,389.6" fill="black" transform="rotate(0,192,384)"/>
              <polygon class="arrowhead" points="168,384 156,378.4 156,389.6" fill="black" transform="rotate(180,160,384)"/>
              <polygon class="arrowhead" points="168,256 156,250.4 156,261.6" fill="black" transform="rotate(180,160,256)"/>
              <polygon class="arrowhead" points="24,128 12,122.4 12,133.6" fill="black" transform="rotate(180,16,128)"/>
              <g class="text">
                <text x="44" y="36">rekeying</text>
                <text x="100" y="36">with</text>
                <text x="148" y="36">psk_ke</text>
                <text x="36" y="52">static</text>
                <text x="116" y="52">exfiltration</text>
                <text x="180" y="52">of</text>
                <text x="208" y="52">psk</text>
                <text x="236" y="52">in</text>
                <text x="264" y="52">T₃:</text>
                <text x="32" y="84">✘</text>
                <text x="80" y="84">✘</text>
                <text x="128" y="84">✘</text>
                <text x="176" y="84">✘</text>
                <text x="224" y="84">✘</text>
                <text x="272" y="84">✘</text>
                <text x="320" y="84">✘</text>
                <text x="368" y="84">✘</text>
                <text x="416" y="84">...</text>
                <text x="464" y="84">✘</text>
                <text x="512" y="84">✘</text>
                <text x="36" y="116">T₀</text>
                <text x="84" y="116">T₁</text>
                <text x="132" y="116">T₂</text>
                <text x="180" y="116">T₃</text>
                <text x="228" y="116">T₄</text>
                <text x="276" y="116">T₅</text>
                <text x="324" y="116">T₆</text>
                <text x="372" y="116">T₇</text>
                <text x="416" y="116">...</text>
                <text x="468" y="116">Tₙ₋₁</text>
                <text x="516" y="116">Tₙ</text>
                <text x="44" y="164">rekeying</text>
                <text x="100" y="164">with</text>
                <text x="164" y="164">key_update</text>
                <text x="36" y="180">static</text>
                <text x="116" y="180">exfiltration</text>
                <text x="180" y="180">of</text>
                <text x="300" y="180">application_traffic_secret</text>
                <text x="420" y="180">in</text>
                <text x="448" y="180">T₃:</text>
                <text x="32" y="212">✔</text>
                <text x="80" y="212">✔</text>
                <text x="128" y="212">✔</text>
                <text x="176" y="212">✘</text>
                <text x="224" y="212">✘</text>
                <text x="272" y="212">✘</text>
                <text x="320" y="212">✘</text>
                <text x="368" y="212">✘</text>
                <text x="416" y="212">...</text>
                <text x="464" y="212">✘</text>
                <text x="512" y="212">✘</text>
                <text x="36" y="244">T₀</text>
                <text x="84" y="244">T₁</text>
                <text x="132" y="244">T₂</text>
                <text x="180" y="244">T₃</text>
                <text x="228" y="244">T₄</text>
                <text x="276" y="244">T₅</text>
                <text x="324" y="244">T₆</text>
                <text x="372" y="244">T₇</text>
                <text x="416" y="244">...</text>
                <text x="468" y="244">Tₙ₋₁</text>
                <text x="516" y="244">Tₙ</text>
                <text x="44" y="292">rekeying</text>
                <text x="100" y="292">with</text>
                <text x="152" y="292">(ec)dhe</text>
                <text x="36" y="308">static</text>
                <text x="116" y="308">exfiltration</text>
                <text x="180" y="308">of</text>
                <text x="208" y="308">all</text>
                <text x="244" y="308">keys</text>
                <text x="276" y="308">in</text>
                <text x="304" y="308">T₃:</text>
                <text x="32" y="340">✔</text>
                <text x="80" y="340">✔</text>
                <text x="128" y="340">✔</text>
                <text x="176" y="340">✘</text>
                <text x="224" y="340">✔</text>
                <text x="272" y="340">✔</text>
                <text x="320" y="340">✔</text>
                <text x="368" y="340">✔</text>
                <text x="416" y="340">...</text>
                <text x="464" y="340">✔</text>
                <text x="512" y="340">✔</text>
                <text x="36" y="372">T₀</text>
                <text x="84" y="372">T₁</text>
                <text x="132" y="372">T₂</text>
                <text x="180" y="372">T₃</text>
                <text x="228" y="372">T₄</text>
                <text x="276" y="372">T₅</text>
                <text x="324" y="372">T₆</text>
                <text x="372" y="372">T₇</text>
                <text x="416" y="372">...</text>
                <text x="468" y="372">Tₙ₋₁</text>
                <text x="516" y="372">Tₙ</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art" align="center"><![CDATA[
 rekeying with psk_ke
 static exfiltration of psk in T₃:
+-----+-----+-----+-----+-----+-----+-----+-----+     +-----+-----+
|  ✘  |  ✘  |  ✘  |  ✘  |  ✘  |  ✘  |  ✘  |  ✘  | ... |  ✘  |  ✘  |
+-----+-----+-----+-----+-----+-----+-----+-----+     +-----+-----+
   T₀    T₁    T₂    T₃    T₄    T₅    T₆    T₇   ...   Tₙ₋₁   Tₙ
 <--------------------------------------------------------------->

 rekeying with key_update
 static exfiltration of application_traffic_secret in T₃:
+-----+-----+-----+-----+-----+-----+-----+-----+     +-----+-----+
|  ✔  |  ✔  |  ✔  |  ✘  |  ✘  |  ✘  |  ✘  |  ✘  | ... |  ✘  |  ✘  |
+-----+-----+-----+-----+-----+-----+-----+-----+     +-----+-----+
   T₀    T₁    T₂    T₃    T₄    T₅    T₆    T₇   ...   Tₙ₋₁   Tₙ
                   <--------------------------------------------->

 rekeying with (ec)dhe
 static exfiltration of all keys in T₃:
+-----+-----+-----+-----+-----+-----+-----+-----+     +-----+-----+
|  ✔  |  ✔  |  ✔  |  ✘  |  ✔  |  ✔  |  ✔  |  ✔  | ... |  ✔  |  ✔  |
+-----+-----+-----+-----+-----+-----+-----+-----+     +-----+-----+
   T₀    T₁    T₂    T₃    T₄    T₅    T₆    T₇   ...   Tₙ₋₁   Tₙ
                   <--->
]]></artwork>
        </artset>
      </figure>
      <t>Modern ephemeral key exchange algorithms like x25519 <xref target="RFC7748"/> are very fast and have small message overhead. The public keys are 32 bytes long and the cryptographic operations take 53 microseconds per endpoint on a single core AMD Ryzen 5 5560U <xref target="eBACS-DH"/>. Ephemeral key exchange with the quantum-resistant algorithm Kyber that NIST will standardize is even faster. For the current non-standardized version of Kyber512 the cryptographic operations take 12 microseconds for the client and 8 microseconds for the server <xref target="eBACS-KEM"/>.</t>
      <!--(102661 + 110972) / 4.062 / 10^3 -->
<!--(21880 + 26067) / 4.062 / 10^3 -->
<!--(32241) / 4.062 / 10^3 -->

<t>Unfortunately, psk_ke is marked as "Recommended" in the IANA PskKeyExchangeMode registry. This may severely weaken security in deployments following the "Recommended" column.  Introducing TLS 1.3 in 3GPP had the unfortunate and surprising effect of drastically lowering the minimum security when TLS is used with PSK authentication.  Some companies in 3GPP have been unwilling to mark psk_ke as not recommended as it is so clearly marked as "Recommended" by the IETF. By labeling psk_ke as "Recommended", IETF is legitimizing and implicitly promoting bad security practice.</t>
      <t>This document sets the Recommended value of psk_ke to "D" indicating discouraged.</t>
    </section>
    <section anchor="cipher-suites-with-null-encryption">
      <name>Cipher Suites with NULL Encryption</name>
      <t>Cipher suites with NULL encryption enables passive monitoring <xref target="RFC7258"/> and were completely removed from TLS 1.3 <xref target="RFC8446"/>. Unfortunately, the independent stream document <xref target="RFC9150"/> reintroduced cipher suites with NULL Encryption in TLS 1.3 even though NULL encryption violates several of the fundamental TLS 1.3 security properties, namely "Protection of endpoint identities", "Confidentiality", and "Length concealment". Some companies in 3GPP have already suggested to use <xref target="RFC9150"/> in QUIC but luckily this is forbidden by <xref target="RFC9001"/> and hopefully it will stay like that.</t>
      <t>Modern encryption algorithms like AES-GCM <xref target="RFC5288"/> are very fast and have small message overhead. Upcoming algorithms like AEGIS <xref target="I-D.irtf-cfrg-aegis-aead"/> is much faster than AES-GCM <xref target="AEGIS-PERF"/>. NULL encryption has no raison d'<contact fullname="ê"/>tre in two-party protocols.</t>
      <t>Two essential zero trust principles are to assume that breach is inevitable or has likely already occurred <xref target="NSA-ZT"/>, and to minimize impact when breach occur <xref target="NIST-ZT"/>. One type of breach is an on-path attacker present on the enterprise network. In <xref target="NIST-ZT2"/>, NIST states as the first basic assumption for network connectivity for any organization that utilizes Zero trust is that:</t>
      <ul spacing="normal">
        <li>"The entire enterprise private network is not considered an implicit trust zone. Assets should always act as if an attacker is present on the enterprise network, and communication should be done in the most secure manner available. This entails actions such as authenticating all connections and encrypting all traffic."</li>
      </ul>
      <t>This document sets the Recommended value of TLS_SHA256_SHA256 and TLS_SHA384_SHA384 to "D" indicating discouraged.</t>
    </section>
    <section anchor="bit-finite-field-diffie-hellman">
      <name>2048-bit Finite Field Diffie-Hellman</name>
      <t>Government organizations like NIST, ANSSI, BSI, and NSA have already produced recommendations regarding the deprecation of ffdhe2048. NIST <xref target="NIST-Lifetime"/> and ANSSI <xref target="ANSSI-TLS"/> only allow 2048-bit Finite Field Diffie-Hellman if the application data does not have to be protected after 2030. If the application data had a security life of ten years, NIST and ANSSI allowed use of ffdhe2048 until December 31, 2020. BSI <xref target="BSI"/> allowed use of ffdhe2048 up to the year 2022. The Commercial National Security Algorithm Suite (CNSA) <xref target="RFC9151"/> forbids the use of ffdhe2048. This document sets the Recommended value of ffdhe2048 to "D" indicating discouraged.</t>
    </section>
    <section anchor="signature-algorithms-with-pkcs-1-v15-padding">
      <name>Signature Algorithms with PKCS #1 v1.5 Padding</name>
      <t>Recommendations regarding RSASSA-PKCS1-v1_5 varies. The RSA Cryptography Specifications <xref target="RFC8017"/> specifies that "RSASSA-PSS is REQUIRED in new applications. RSASSA-PKCS1-v1_5 is included only for compatibility with existing applications.". BSI <xref target="BSI"/> allows use of the PKCS #1 v1.5 padding scheme in TLS certificates up to the year 2025. The Commercial National Security Algorithm (CNSA) <xref target="RFC9151"/> requires offer of rsa_pkcs1_sha384 . This document sets the Recommended value of rsa_pkcs1_sha256, rsa_pkcs1_sha384, and rsa_pkcs1_sha512 to "N".</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to update the TLS PskKeyExchangeMode registry under the Transport Layer Security (TLS) Parameters heading.  For psk_ke the "Recommended" value has been set to "D" indicating that the item is "Discouraged".</t>
      <t>IANA is requested to update the TLS Cipher Suites registry under the Transport Layer Security (TLS) Parameters heading. For TLS_SHA256_SHA256 and TLS_SHA384_SHA384 the "Recommended" value has been set to "D" indicating that the items are "Discouraged".</t>
      <t>IANA is requested to update the TLS Supported Groups registry under the Transport Layer Security (TLS) Parameters heading. For ffdhe2048 the "Recommended" value has been set to "D" indicating that the item is "Discouraged".</t>
      <t>IANA is requested to update the TLS SignatureScheme registry under the Transport Layer Security (TLS) Parameters heading. For rsa_pkcs1_sha256, rsa_pkcs1_sha384, and rsa_pkcs1_sha512 the "Recommended" value has been set to "N".</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8446" target="https://www.rfc-editor.org/info/rfc8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="I-D.ietf-tls-rfc8447bis" target="https://www.ietf.org/archive/id/draft-ietf-tls-rfc8447bis-02.txt">
          <front>
            <title>IANA Registry Updates for TLS and DTLS</title>
            <author fullname="Joseph A. Salowey" initials="J. A." surname="Salowey">
              <organization>Venafi</organization>
            </author>
            <author fullname="Sean Turner" initials="S." surname="Turner">
              <organization>sn3rd</organization>
            </author>
            <date day="24" month="October" year="2022"/>
            <abstract>
              <t>   This document describes a number of changes to TLS and DTLS IANA
   registries that range from adding notes to the registry all the way
   to changing the registration policy.  These changes were mostly
   motivated by WG review of the TLS- and DTLS-related registries
   undertaken as part of the TLS 1.3 development process.

   This document obsoletes RFC 8447 and updates the following RFCs:
   3749, 5077, 4680, 5246, 5705, 5878, 6520, and 7301.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8447bis-02"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC5288" target="https://www.rfc-editor.org/info/rfc5288">
          <front>
            <title>AES Galois Counter Mode (GCM) Cipher Suites for TLS</title>
            <author fullname="J. Salowey" initials="J." surname="Salowey">
              <organization/>
            </author>
            <author fullname="A. Choudhury" initials="A." surname="Choudhury">
              <organization/>
            </author>
            <author fullname="D. McGrew" initials="D." surname="McGrew">
              <organization/>
            </author>
            <date month="August" year="2008"/>
            <abstract>
              <t>This memo describes the use of the Advanced Encryption Standard (AES) in Galois/Counter Mode (GCM) as a Transport Layer Security (TLS) authenticated encryption operation.  GCM provides both confidentiality and data origin authentication, can be efficiently implemented in hardware for speeds of 10 gigabits per second and above, and is also well-suited to software implementations.  This memo defines TLS cipher suites that use AES-GCM with RSA, DSA, and Diffie-Hellman-based key exchange mechanisms.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5288"/>
          <seriesInfo name="DOI" value="10.17487/RFC5288"/>
        </reference>
        <reference anchor="RFC7258" target="https://www.rfc-editor.org/info/rfc7258">
          <front>
            <title>Pervasive Monitoring Is an Attack</title>
            <author fullname="S. Farrell" initials="S." surname="Farrell">
              <organization/>
            </author>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig">
              <organization/>
            </author>
            <date month="May" year="2014"/>
            <abstract>
              <t>Pervasive monitoring is a technical attack that should be mitigated in the design of IETF protocols, where possible.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="188"/>
          <seriesInfo name="RFC" value="7258"/>
          <seriesInfo name="DOI" value="10.17487/RFC7258"/>
        </reference>
        <reference anchor="RFC7624" target="https://www.rfc-editor.org/info/rfc7624">
          <front>
            <title>Confidentiality in the Face of Pervasive Surveillance: A Threat Model and Problem Statement</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes">
              <organization/>
            </author>
            <author fullname="B. Schneier" initials="B." surname="Schneier">
              <organization/>
            </author>
            <author fullname="C. Jennings" initials="C." surname="Jennings">
              <organization/>
            </author>
            <author fullname="T. Hardie" initials="T." surname="Hardie">
              <organization/>
            </author>
            <author fullname="B. Trammell" initials="B." surname="Trammell">
              <organization/>
            </author>
            <author fullname="C. Huitema" initials="C." surname="Huitema">
              <organization/>
            </author>
            <author fullname="D. Borkmann" initials="D." surname="Borkmann">
              <organization/>
            </author>
            <date month="August" year="2015"/>
            <abstract>
              <t>Since the initial revelations of pervasive surveillance in 2013, several classes of attacks on Internet communications have been discovered.  In this document, we develop a threat model that describes these attacks on Internet confidentiality.  We assume an attacker that is interested in undetected, indiscriminate eavesdropping.  The threat model is based on published, verified attacks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7624"/>
          <seriesInfo name="DOI" value="10.17487/RFC7624"/>
        </reference>
        <reference anchor="RFC7748" target="https://www.rfc-editor.org/info/rfc7748">
          <front>
            <title>Elliptic Curves for Security</title>
            <author fullname="A. Langley" initials="A." surname="Langley">
              <organization/>
            </author>
            <author fullname="M. Hamburg" initials="M." surname="Hamburg">
              <organization/>
            </author>
            <author fullname="S. Turner" initials="S." surname="Turner">
              <organization/>
            </author>
            <date month="January" year="2016"/>
            <abstract>
              <t>This memo specifies two elliptic curves over prime fields that offer a high level of practical security in cryptographic applications, including Transport Layer Security (TLS).  These curves are intended to operate at the ~128-bit and ~224-bit security level, respectively, and are generated deterministically based on a list of required properties.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7748"/>
          <seriesInfo name="DOI" value="10.17487/RFC7748"/>
        </reference>
        <reference anchor="RFC8017" target="https://www.rfc-editor.org/info/rfc8017">
          <front>
            <title>PKCS #1: RSA Cryptography Specifications Version 2.2</title>
            <author fullname="K. Moriarty" initials="K." role="editor" surname="Moriarty">
              <organization/>
            </author>
            <author fullname="B. Kaliski" initials="B." surname="Kaliski">
              <organization/>
            </author>
            <author fullname="J. Jonsson" initials="J." surname="Jonsson">
              <organization/>
            </author>
            <author fullname="A. Rusch" initials="A." surname="Rusch">
              <organization/>
            </author>
            <date month="November" year="2016"/>
            <abstract>
              <t>This document provides recommendations for the implementation of public-key cryptography based on the RSA algorithm, covering cryptographic primitives, encryption schemes, signature schemes with appendix, and ASN.1 syntax for representing keys and for identifying the schemes.</t>
              <t>This document represents a republication of PKCS #1 v2.2 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series.  By publishing this RFC, change control is transferred to the IETF.</t>
              <t>This document also obsoletes RFC 3447.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8017"/>
          <seriesInfo name="DOI" value="10.17487/RFC8017"/>
        </reference>
        <reference anchor="RFC8447" target="https://www.rfc-editor.org/info/rfc8447">
          <front>
            <title>IANA Registry Updates for TLS and DTLS</title>
            <author fullname="J. Salowey" initials="J." surname="Salowey">
              <organization/>
            </author>
            <author fullname="S. Turner" initials="S." surname="Turner">
              <organization/>
            </author>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document describes a number of changes to TLS and DTLS IANA registries that range from adding notes to the registry all the way to changing the registration policy.  These changes were mostly motivated by WG review of the TLS- and DTLS-related registries undertaken as part of the TLS 1.3 development process.</t>
              <t>This document updates the following RFCs: 3749, 5077, 4680, 5246, 5705, 5878, 6520, and 7301.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8447"/>
          <seriesInfo name="DOI" value="10.17487/RFC8447"/>
        </reference>
        <reference anchor="RFC9001" target="https://www.rfc-editor.org/info/rfc9001">
          <front>
            <title>Using TLS to Secure QUIC</title>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson">
              <organization/>
            </author>
            <author fullname="S. Turner" initials="S." role="editor" surname="Turner">
              <organization/>
            </author>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document describes how Transport Layer Security (TLS) is used to secure QUIC.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9001"/>
          <seriesInfo name="DOI" value="10.17487/RFC9001"/>
        </reference>
        <reference anchor="RFC9113" target="https://www.rfc-editor.org/info/rfc9113">
          <front>
            <title>HTTP/2</title>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson">
              <organization/>
            </author>
            <author fullname="C. Benfield" initials="C." role="editor" surname="Benfield">
              <organization/>
            </author>
            <date month="June" year="2022"/>
            <abstract>
              <t>This specification describes an optimized expression of the semantics of the Hypertext Transfer Protocol (HTTP), referred to as HTTP version 2 (HTTP/2). HTTP/2 enables a more efficient use of network resources and a reduced latency by introducing field compression and allowing multiple concurrent exchanges on the same connection.</t>
              <t>This document obsoletes RFCs 7540 and 8740.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9113"/>
          <seriesInfo name="DOI" value="10.17487/RFC9113"/>
        </reference>
        <reference anchor="RFC9150" target="https://www.rfc-editor.org/info/rfc9150">
          <front>
            <title>TLS 1.3 Authentication and Integrity-Only Cipher Suites</title>
            <author fullname="N. Cam-Winget" initials="N." surname="Cam-Winget">
              <organization/>
            </author>
            <author fullname="J. Visoky" initials="J." surname="Visoky">
              <organization/>
            </author>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document defines the use of cipher suites for TLS 1.3 based on Hashed  Message Authentication Code (HMAC). Using these cipher suites provides server and, optionally, mutual authentication and data authenticity, but not data confidentiality. Cipher suites with these properties are not of general applicability, but there are use cases, specifically in Internet of Things (IoT) and constrained environments, that do not require confidentiality of exchanged messages while still requiring integrity protection, server authentication, and optional client authentication. This document gives examples of such use cases, with the caveat that prior to using these integrity-only cipher suites, a threat model for the situation at hand is needed, and a threat analysis must be performed within that model to determine whether the use of integrity-only cipher suites is appropriate. The approach described in this document is not endorsed by the IETF and does not have IETF consensus, but it is presented here to enable interoperable implementation of a reduced-security mechanism that provides authentication and message integrity without supporting confidentiality.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9150"/>
          <seriesInfo name="DOI" value="10.17487/RFC9150"/>
        </reference>
        <reference anchor="RFC9151" target="https://www.rfc-editor.org/info/rfc9151">
          <front>
            <title>Commercial National Security Algorithm (CNSA) Suite Profile for TLS and DTLS 1.2 and 1.3</title>
            <author fullname="D. Cooley" initials="D." surname="Cooley">
              <organization/>
            </author>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document defines a base profile for TLS protocol versions 1.2 and 1.3 as well as DTLS protocol versions 1.2 and 1.3 for use with the US Commercial National Security Algorithm (CNSA) Suite. </t>
              <t>The profile applies to the capabilities, configuration, and operation of all components of US National Security Systems that use TLS or DTLS. It is also appropriate for all other US Government systems that process high-value information. </t>
              <t>The profile is made publicly available here for use by developers and operators of these and any other system deployments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9151"/>
          <seriesInfo name="DOI" value="10.17487/RFC9151"/>
        </reference>
        <reference anchor="RFC9257" target="https://www.rfc-editor.org/info/rfc9257">
          <front>
            <title>Guidance for External Pre-Shared Key (PSK) Usage in TLS</title>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <author fullname="J. Hoyland" initials="J." surname="Hoyland">
              <organization/>
            </author>
            <author fullname="M. Sethi" initials="M." surname="Sethi">
              <organization/>
            </author>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood">
              <organization/>
            </author>
            <date month="July" year="2022"/>
            <abstract>
              <t>This document provides usage guidance for external Pre-Shared Keys (PSKs) in Transport Layer Security (TLS) 1.3 as defined in RFC 8446. It lists TLS security properties provided by PSKs under certain assumptions, then it demonstrates how violations of these assumptions lead to attacks. Advice for applications to help meet these assumptions is provided. This document also discusses PSK use cases and provisioning processes. Finally, it lists the privacy and security properties that are not provided by TLS 1.3 when external PSKs are used.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9257"/>
          <seriesInfo name="DOI" value="10.17487/RFC9257"/>
        </reference>
        <reference anchor="I-D.ietf-emu-aka-pfs" target="https://www.ietf.org/archive/id/draft-ietf-emu-aka-pfs-08.txt">
          <front>
            <title>Forward Secrecy for the Extensible Authentication Protocol Method for Authentication and Key Agreement (EAP-AKA' FS)</title>
            <author fullname="Jari Arkko" initials="J." surname="Arkko">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Karl Norrman" initials="K." surname="Norrman">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Vesa Torvinen" initials="V." surname="Torvinen">
              <organization>Ericsson</organization>
            </author>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson</organization>
            </author>
            <date day="23" month="October" year="2022"/>
            <abstract>
              <t>   Many different attacks have been reported as part of revelations
   associated with pervasive surveillance.  Some of the reported attacks
   involved compromising the smart card supply chain, such as attacking
   SIM card manufacturers and operators in an effort to compromise
   shared secrets stored on these cards.  Since the publication of those
   reports, manufacturing and provisioning processes have gained much
   scrutiny and have improved.  However, the danger of resourceful
   attackers for these systems is still a concern.  Always assuming
   breach such as key compromise and minimizing the impact of breach are
   essential zero-trust principles.

   This specification updates RFC 9048, the EAP-AKA' authentication
   method, with an optional extension.  Similarly, this specification
   also updates the earlier version of the EAP-AKA' specification in RFC
   5448.  The extension, when negotiated, provides Forward Secrecy for
   the session key generated as a part of the authentication run in EAP-
   AKA'.  This prevents an attacker who has gained access to the long-
   term pre-shared secret in a SIM card from being able to decrypt any
   past communications.  In addition, if the attacker stays merely a
   passive eavesdropper, the extension prevents attacks against future
   sessions.  This forces attackers to use active attacks instead.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-emu-aka-pfs-08"/>
        </reference>
        <reference anchor="I-D.ietf-tls-rfc8446bis" target="https://www.ietf.org/archive/id/draft-ietf-tls-rfc8446bis-05.txt">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Mozilla</organization>
            </author>
            <date day="24" month="October" year="2022"/>
            <abstract>
              <t>   This document specifies version 1.3 of the Transport Layer Security
   (TLS) protocol.  TLS allows client/server applications to communicate
   over the Internet in a way that is designed to prevent eavesdropping,
   tampering, and message forgery.

   This document updates RFCs 5705, 6066, 7627, and 8422 and obsoletes
   RFCs 5077, 5246, 6961, and 8446.  This document also specifies new
   requirements for TLS 1.2 implementations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8446bis-05"/>
        </reference>
        <reference anchor="I-D.irtf-cfrg-aegis-aead" target="https://www.ietf.org/archive/id/draft-irtf-cfrg-aegis-aead-00.txt">
          <front>
            <title>The AEGIS family of authenticated encryption algorithms</title>
            <author fullname="Frank Denis" initials="F." surname="Denis">
              <organization>Fastly Inc.</organization>
            </author>
            <author fullname="Fabio Enrico Renzo Scotoni" initials="F. E. R." surname="Scotoni">
              <organization>Individual Contributor</organization>
            </author>
            <author fullname="Samuel Lucas" initials="S." surname="Lucas">
              <organization>Individual Contributor</organization>
            </author>
            <date day="5" month="August" year="2022"/>
            <abstract>
              <t>   This document describes AEGIS-128L and AEGIS-256, two AES-based
   authenticated encryption algorithms designed for high-performance
   applications.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/jedisct1/draft-aegis-aead.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-cfrg-aegis-aead-00"/>
        </reference>
        <reference anchor="Akhmetzyanova" target="https://eprint.iacr.org/2019/421.pdf">
          <front>
            <title>Continuing to reflect on TLS 1.3 with external PSK</title>
            <author initials="L." surname="Akhmetzyanova">
              <organization/>
            </author>
            <author initials="E." surname="Alekseev">
              <organization/>
            </author>
            <author initials="E." surname="Smyshlyaeva">
              <organization/>
            </author>
            <author initials="A." surname="Sokolov">
              <organization/>
            </author>
            <date year="2019" month="April"/>
          </front>
        </reference>
        <reference anchor="AEGIS-PERF" target="https://github.com/jedisct1/openssl-family-bench/blob/master/img/boring-aeads.png">
          <front>
            <title>BoringSSL AEADs comparison</title>
            <author initials="" surname="Frank Denis">
              <organization/>
            </author>
            <date year="2022" month="October"/>
          </front>
        </reference>
        <reference anchor="ANSSI-PFS" target="https://www.ssi.gouv.fr/uploads/2015/09/NT_IPsec_EN.pdf">
          <front>
            <title>Recommendations for securing networks with IPsec</title>
            <author initials="" surname="Agence nationale de la sécurité des systèmes d'information">
              <organization/>
            </author>
            <date year="2015" month="August"/>
          </front>
        </reference>
        <reference anchor="ANSSI-TLS" target="https://www.ssi.gouv.fr/uploads/2017/02/security-recommendations-for-tls_v1.1.pdf">
          <front>
            <title>Security Recommendations for TLS</title>
            <author initials="" surname="Agence nationale de la sécurité des systèmes d'information">
              <organization/>
            </author>
            <date year="2017" month="January"/>
          </front>
        </reference>
        <reference anchor="BoringSSL" target="https://boringssl.googlesource.com/boringssl/">
          <front>
            <title>BoringSSL</title>
            <author initials="" surname="Google">
              <organization/>
            </author>
            <date year="2023" month="January"/>
          </front>
        </reference>
        <reference anchor="BSI" target="https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/TechGuidelines/TG02102/BSI-TR-02102-2.pdf">
          <front>
            <title>Technical Guideline TR-02102-2 Cryptographic Mechanisms: Recommendations and Key Lengths Part 2 – Use of Transport Layer Security (TLS)</title>
            <author initials="" surname="Bundesamt für Sicherheit in der Informationstechnik">
              <organization/>
            </author>
            <date year="2022" month="February"/>
          </front>
        </reference>
        <reference anchor="eBACS-DH" target="https://bench.cr.yp.to/results-dh.html">
          <front>
            <title>Measurements of public-key Diffie–Hellman secret-sharing systems, indexed by machine</title>
            <author initials="" surname="eBACS: ECRYPT Benchmarking of Cryptographic Systems">
              <organization/>
            </author>
            <date year="2023" month="January"/>
          </front>
        </reference>
        <reference anchor="eBACS-KEM" target="https://bench.cr.yp.to/results-kem.html">
          <front>
            <title>Measurements of key-encapsulation mechanisms, indexed by machine</title>
            <author initials="" surname="eBACS: ECRYPT Benchmarking of Cryptographic Systems">
              <organization/>
            </author>
            <date year="2023" month="January"/>
          </front>
        </reference>
        <reference anchor="Exfiltration" target="https://blog.apnic.net/2022/03/31/how-to-detect-and-prevent-common-data-exfiltration-attacks/">
          <front>
            <title>How to: Detect and prevent common data exfiltration attacks</title>
            <author initials="" surname="APNIC">
              <organization/>
            </author>
            <date year="2022" month="March"/>
          </front>
        </reference>
        <reference anchor="Heist" target="https://theintercept.com/2015/02/19/great-sim-heist/">
          <front>
            <title>How Spies Stole the Keys to the Encryption Castle</title>
            <author initials="" surname="The Intercept">
              <organization/>
            </author>
            <date year="2015" month="February"/>
          </front>
        </reference>
        <reference anchor="NIST-Lifetime" target="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r5.pdf">
          <front>
            <title>Recommendation for Key Management: Part 1 – General</title>
            <author initials="" surname="National Institute of Standards and Technology">
              <organization/>
            </author>
            <date year="2020" month="May"/>
          </front>
        </reference>
        <reference anchor="NIST-TLS" target="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-52r2.pdf">
          <front>
            <title>Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations</title>
            <author initials="" surname="National Institute of Standards and Technology">
              <organization/>
            </author>
            <date year="2019" month="August"/>
          </front>
        </reference>
        <reference anchor="NIST-ZT" target="https://www.nccoe.nist.gov/sites/default/files/2022-12/zta-nist-sp-1800-35b-preliminary-draft-2.pdf">
          <front>
            <title>Implementing a Zero Trust Architecture</title>
            <author initials="" surname="National Institute of Standards and Technology">
              <organization/>
            </author>
            <date year="2022" month="December"/>
          </front>
        </reference>
        <reference anchor="NIST-ZT2" target="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-207.pdf">
          <front>
            <title>Zero Trust Architecture</title>
            <author initials="" surname="National Institute of Standards and Technology">
              <organization/>
            </author>
            <date year="2020" month="August"/>
          </front>
        </reference>
        <reference anchor="NSA-ZT" target="https://media.defense.gov/2021/Feb/25/2002588479/-1/-1/0/CSI_EMBRACING_ZT_SECURITY_MODEL_UOO115131-21.PDF">
          <front>
            <title>Embracing a Zero Trust Security Model</title>
            <author initials="" surname="National Security Agency">
              <organization/>
            </author>
            <date year="2021" month="February"/>
          </front>
        </reference>
        <reference anchor="Signal" target="https://signal.org/docs/specifications/doubleratchet/">
          <front>
            <title>The Double Ratchet Algorithm</title>
            <author initials="" surname="Signal">
              <organization/>
            </author>
            <date year="2016" month="November"/>
          </front>
        </reference>
        <reference anchor="T3GPP.33.210" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=2279">
          <front>
            <title>TS 33.210 Network Domain Security (NDS); IP network layer security</title>
            <author initials="" surname="3GPP">
              <organization/>
            </author>
            <date year="2022" month="September"/>
          </front>
        </reference>
        <reference anchor="T3GPP.33.501" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3169">
          <front>
            <title>TS 33.501 Security architecture and procedures for 5G System</title>
            <author initials="" surname="3GPP">
              <organization/>
            </author>
            <date year="2022" month="September"/>
          </front>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>The authors want to thank <contact fullname="Ari Keränen"/>, <contact fullname="Eric Rescorla"/>, and <contact fullname="Paul Wouters"/> for their valuable comments and feedback.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
