<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.17 (Ruby 3.3.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-westerlund-tsvwg-sctp-dtls-handshake-02" category="std" consensus="true" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.22.0 -->
  <front>
    <title abbrev="DTLS in SCTP">Datagram Transport Layer Security (DTLS) in the Stream Control Transmission Protocol (SCTP) DTLS Chunk</title>
    <seriesInfo name="Internet-Draft" value="draft-westerlund-tsvwg-sctp-dtls-handshake-02"/>
    <author initials="M." surname="Westerlund" fullname="Magnus Westerlund">
      <organization>Ericsson</organization>
      <address>
        <email>magnus.westerlund@ericsson.com</email>
      </address>
    </author>
    <author initials="J." surname="Preuß Mattsson" fullname="John Preuß Mattsson">
      <organization>Ericsson</organization>
      <address>
        <email>john.mattsson@ericsson.com</email>
      </address>
    </author>
    <author initials="C." surname="Porfiri" fullname="Claudio Porfiri">
      <organization>Ericsson</organization>
      <address>
        <email>claudio.porfiri@ericsson.com</email>
      </address>
    </author>
    <date year="2024" month="July" day="08"/>
    <area>Transport</area>
    <workgroup>TSVWG</workgroup>
    <abstract>
      <?line 85?>

<t>This document defines a usage of Datagram Transport Layer Security
(DTLS) 1.3 to protect the content of Stream Control Transmission
Protocol (SCTP) packets using the framework provided by the SCTP DTLS
chunk which we name DTLS in SCTP. DTLS in SCTP provides encryption,
source authentication, integrity and replay protection for the SCTP
association with in-band DTLS based key-management and mutual
authentication of the peers. The specification is enabling very
long-lived sessions of weeks and months and supports mutual
re-authentication and rekeying with ephemeral key exchange. This is
intended as an alternative to using DTLS/SCTP (RFC6083) and
SCTP-AUTH (RFC4895).</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-westerlund-tsvwg-sctp-dtls-handshake/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Transport Area Working Group (tsvwg) Working Group mailing list (<eref target="mailto:tsvwg@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tsvwg/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tsvwg/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/gloinul/draft-westerlund-tsvwg-sctp-dtls-handshake"/>.</t>
    </note>
  </front>
  <middle>
    <?line 99?>

<section anchor="introduction">
      <name>Introduction</name>
      <section anchor="overview">
        <name>Overview</name>
        <t>This document describes the usage of the Datagram Transport Layer
   Security (DTLS) protocol, as defined in
   DTLS 1.3 <xref target="RFC9147"/>, in the Stream Control
   Transmission Protocol (SCTP), as defined in <xref target="RFC9260"/> with SCTP
   DTLS chunk <xref target="I-D.westerlund-tsvwg-sctp-dtls-chunk"/>.  This
   specification is intended as an alternative to DTLS/SCTP <xref target="RFC6083"/>
   and usage of SCTP-AUTH <xref target="RFC4895"/>.</t>
        <t>This specification provides mutual authentication of endpoints,
   data confidentiality, data origin authentication, data integrity
   protection, and data replay protection of SCTP packets. Ensuring
   these security services to the application and its upper layer
   protocol over SCTP.  Thus, it allows client/server applications to
   communicate in a way that is designed with communications
   privacy and preventing eavesdropping and detect tampering or
   message forgery.</t>
        <t>Applications using DTLS in SCTP can use all currently existing
   transport features provided by SCTP and its extensions, in some
   cases with some limitations, as specified in
   <xref target="I-D.westerlund-tsvwg-sctp-dtls-chunk"/>. DTLS in SCTP supports:</t>
        <ul spacing="normal">
          <li>
            <t>preservation of message boundaries.</t>
          </li>
          <li>
            <t>no limitation on number of unidirectional and bidirectional streams.</t>
          </li>
          <li>
            <t>ordered and unordered delivery of SCTP user messages.</t>
          </li>
          <li>
            <t>the partial reliability extension as defined in <xref target="RFC3758"/>.</t>
          </li>
          <li>
            <t>multi-homing of the SCTP association per <xref target="RFC9260"/>.</t>
          </li>
          <li>
            <t>the dynamic address reconfiguration extension as defined in
 <xref target="RFC5061"/>.</t>
          </li>
          <li>
            <t>User messages of any size.</t>
          </li>
          <li>
            <t>SCTP Packets with a protected set of chunks up to a size of
2<sup>14</sup> (16384) bytes.</t>
          </li>
        </ul>
      </section>
      <section anchor="protocol_overview">
        <name>Protocol Overview</name>
        <t>DTLS in SCTP is a key management specification for the SCTP DTLS
   1.3 chunk <xref target="I-D.westerlund-tsvwg-sctp-dtls-chunk"/> that together
   utilizes all parts of DTLS 1.3 for the security functions like key
   exchange, authentication, encryption, integrity protection, and
   replay protection. All key management message exchange happens
   inband over the SCTP assocation. The basic functionalities and how
   things are related are described below.</t>
        <t>In a SCTP association where DTLS 1.3 Chunk usage has been
   negotiated in the SCTP INIT and INIT-ACK, to initilize and
   authenticate the peer the DTLS handshake is exchanged as SCTP user
   messages with a DTLS-SCTP PPID (see section 10.6 of
   <xref target="I-D.westerlund-tsvwg-sctp-dtls-chunk"/>) until an initial DTLS
   connection has been established.  If the DTLS handshake fails, the
   SCTP association is aborted. With succesful handshake and
   authentication of the peer the key material is configured for the
   DTLS 1.3 chunk. From that point until re-authenticaiton or rekeying
   needs to occurr the DTLS chunk will protect the SCTP packets. When
   the DTLS connection has been established and the DTLS Chunk
   configured with keys the PVALID chunk is exchanged to verify that
   no downgrade attack between any offered protection solutions has
   occurred. To prevent manipulation, the PVALID chunks are sent
   encapsulated in DTLS chunks.</t>
        <t>Assuming that the PVALID validation is successful the SCTP
   association is established and the Upper Layer Protocol (ULP) can
   start sending data over the SCTP association. From this point all
   chunks will be protected by encapsulating them in
   DTLS chunks as defined in <xref target="I-D.westerlund-tsvwg-sctp-dtls-chunk"/>.
   The DTLS chunk protects all of the SCTP Chunks to be sent in a SCTP
   packet. Using the selected key-material the DTLS Protection
   operator protects the plain text producing a DTLS Record that is
   encapsualted in the DTLS chunk and the transmitted as a SCTP packet
   with a common header.</t>
        <t>In the receiving SCTP endpoint each incoming SCTP packet on any of
   its interfaces and ports are matched to the SCTP association based
   on ports and VTAG in the common header. In that association context
   for the DTLS chunk the DTLS Connection Index (DCI) is used to look
   up the key-material from the one DTLS connection used to
   authenticate the peer and establish this key-material. Using the
   identified key-material and context the content of the DTLS chunk
   is attempted to be processed, including replay protection,
   decryption, and integrity checking. And if decryption and integrity
   verification was successful the produced plain text of one or more
   SCTP chunks are provided for normal SCTP processing in the
   identified SCTP association along with associated per-packet meta
   data such as path received on, original packet size, and ECN bits.</t>
        <t>When mutual re-authentication or rekeying with ephemeral key
   exchange is needed or desired by either endpoint a new DTLS
   connection handshake is performed between the SCTP endpoints. A
   different DCI than currently used in the DTLS chunk are used to
   indicate that this is a new handshake. The DCI is sent as pre-amble
   to any DTLS message sent as SCTP user message. When the handshake
   has completed the DTLS in SCTP implementation can simply switch to
   use this DTLS connection's key-material in the DTLS chunk.  After a
   short while (no longer than 2 min) to enable any outstanding
   packets to drain from the network path between the endpoints the
   old DTLS connection can be terminated and the key-material deleted
   from the DTLS chunk's key store.</t>
        <t>The DTLS connection is free to send any alert, handshake message, or
   other non-application data to its peer at any point in time. Thus,
   enabling DTLS 1.3 Key Updates for example.
   All DTLS message will be sent by means of SCTP user messages
   with DTLS-SCTP PPID as specified in
   <xref target="I-D.westerlund-tsvwg-sctp-dtls-chunk"/>.</t>
        <figure anchor="overview-layering">
          <name>DTLS in SCTP layer in regard to SCTP and upper layer protocol</name>
          <artset>
            <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="352" width="496" viewBox="0 0 496 352" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,336" fill="none" stroke="black"/>
                <path d="M 136,32 L 136,96" fill="none" stroke="black"/>
                <path d="M 152,32 L 152,96" fill="none" stroke="black"/>
                <path d="M 184,96 L 184,336" fill="none" stroke="black"/>
                <path d="M 224,208 L 224,272" fill="none" stroke="black"/>
                <path d="M 320,32 L 320,96" fill="none" stroke="black"/>
                <path d="M 400,208 L 400,272" fill="none" stroke="black"/>
                <path d="M 440,80 L 440,224" fill="none" stroke="black"/>
                <path d="M 8,32 L 136,32" fill="none" stroke="black"/>
                <path d="M 152,32 L 320,32" fill="none" stroke="black"/>
                <path d="M 320,64 L 424,64" fill="none" stroke="black"/>
                <path d="M 8,96 L 320,96" fill="none" stroke="black"/>
                <path d="M 424,96 L 456,96" fill="none" stroke="black"/>
                <path d="M 336,128 L 352,128" fill="none" stroke="black"/>
                <path d="M 200,176 L 216,176" fill="none" stroke="black"/>
                <path d="M 8,208 L 184,208" fill="none" stroke="black"/>
                <path d="M 224,208 L 400,208" fill="none" stroke="black"/>
                <path d="M 192,240 L 216,240" fill="none" stroke="black"/>
                <path d="M 408,240 L 424,240" fill="none" stroke="black"/>
                <path d="M 8,272 L 184,272" fill="none" stroke="black"/>
                <path d="M 224,272 L 400,272" fill="none" stroke="black"/>
                <path d="M 200,304 L 216,304" fill="none" stroke="black"/>
                <path d="M 8,336 L 184,336" fill="none" stroke="black"/>
                <path d="M 184,272 L 200,304" fill="none" stroke="black"/>
                <path d="M 320,96 L 336,128" fill="none" stroke="black"/>
                <path d="M 184,208 L 200,176" fill="none" stroke="black"/>
                <path d="M 424,64 C 432.83064,64 440,71.16936 440,80" fill="none" stroke="black"/>
                <path d="M 424,240 C 432.83064,240 440,232.83064 440,224" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="416,240 404,234.4 404,245.6" fill="black" transform="rotate(180,408,240)"/>
                <polygon class="arrowhead" points="224,240 212,234.4 212,245.6" fill="black" transform="rotate(0,216,240)"/>
                <polygon class="arrowhead" points="200,240 188,234.4 188,245.6" fill="black" transform="rotate(180,192,240)"/>
                <g class="text">
                  <text x="228" y="52">DTLS</text>
                  <text x="264" y="52">1.3</text>
                  <text x="356" y="52">Keys</text>
                  <text x="72" y="68">ULP</text>
                  <text x="192" y="84">Key</text>
                  <text x="252" y="84">Management</text>
                  <text x="480" y="100">API</text>
                  <text x="380" y="116">User</text>
                  <text x="384" y="132">Level</text>
                  <text x="36" y="148">SCTP</text>
                  <text x="84" y="148">Chunks</text>
                  <text x="144" y="148">Handler</text>
                  <text x="396" y="148">Messages</text>
                  <text x="244" y="180">SCTP</text>
                  <text x="312" y="180">Unprotected</text>
                  <text x="392" y="180">Payload</text>
                  <text x="92" y="228">DTLS</text>
                  <text x="300" y="228">DTLS</text>
                  <text x="336" y="228">1.3</text>
                  <text x="96" y="244">Chunk</text>
                  <text x="96" y="260">Handler</text>
                  <text x="276" y="260">Protection</text>
                  <text x="356" y="260">Operator</text>
                  <text x="36" y="308">SCTP</text>
                  <text x="84" y="308">Header</text>
                  <text x="144" y="308">Handler</text>
                  <text x="244" y="308">SCTP</text>
                  <text x="304" y="308">Protected</text>
                  <text x="376" y="308">Payload</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art"><![CDATA[
+---------------+ +--------------------+
|               | |       DTLS 1.3     |  Keys
|      ULP      | |                    +-------------.
|               | |   Key Management   |              |
+---------------+-+---+----------------+            --+-- API
|                     |                 \    User     |
|                     |                  +-- Level    |
| SCTP Chunks Handler |                      Messages |
|                     |                               |
|                     | +-- SCTP Unprotected Payload  |
|                     |/                              |
+---------------------+    +---------------------+    |
|        DTLS         |    |       DTLS 1.3      |    |
|        Chunk        |<-->|                     |<--'
|       Handler       |    | Protection Operator |
+---------------------+    +---------------------+
|                     |\
| SCTP Header Handler | +-- SCTP Protected Payload
|                     |
+---------------------+
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="properties-of-dtls-in-sctp">
        <name>Properties of DTLS in SCTP</name>
        <t>DTLS in SCTP (as the combination of the DTLS chunk and the in-band
   authentication and key-management using DTLS handshakes defined in
   this document) has a number of properties that are attractive.</t>
        <ul spacing="normal">
          <li>
            <t>Provides confidentiality, integrity protection, and source
authentication for each SCTP packet.</t>
          </li>
          <li>
            <t>Provides replay protection on SCTP packet level preventing
malicious replay attacks on SCTP, both protecting the data as well
as the SCTP functions themselves.</t>
          </li>
          <li>
            <t>Provides mutual authentication of the endpoints based on any
authentication mechanism supported by DTLS.</t>
          </li>
          <li>
            <t>Uses parallel DTLS connections to enable mutual re-authentication
and rekeying with ephemeral key-exchange. Thus, enabling SCTP
association lifetimes without known limitations and without
needing to drain the SCTP association.</t>
          </li>
          <li>
            <t>Uses core of DTLS as it is and updates and fixes to DTLS security
properties can be implemented without further changes to this
specification.</t>
          </li>
          <li>
            <t>Secures all SCTP packets exchanged after SCTP association has
reached the established state and the initial key-exchange has
completed. Making targeted attacks against the SCTP protocol and
implementation much harder.</t>
          </li>
          <li>
            <t>DTLS in SCTP results in no limitations on user message
transmission or message sizes, those properties are the same as
for an unprotected SCTP association.</t>
          </li>
          <li>
            <t>Limited overhead on a per packet basis, with 4 bytes for the
DTLS chunk plus the DTLS record overhead. The DTLS
overhead is dependent on the DTLS version and cipher suit.</t>
          </li>
          <li>
            <t>Support of SCTP packet plain text payload sizes up to
2<sup>14</sup> bytes.</t>
          </li>
        </ul>
        <section anchor="benefits-compared-to-dtlssctp">
          <name>Benefits Compared to DTLS/SCTP</name>
          <t>DTLS/SCTP as defined by <xref target="I-D.ietf-tsvwg-dtls-over-sctp-bis"/>
   has several important differences most to the benefit of DTLS in
   SCTP. This section reviews these differences.</t>
          <ul spacing="normal">
            <li>
              <t>Replay Protection in DTLS/SCTP has some limitations due to
SCTP-AUTH <xref target="RFC4895"/> and its interaction with the SCTP implementation and
dependencies on the actual SCTP-AUTH rekeying frequency. DTLS
in SCTP relies on DTLS mechanism for replay protection that can
prevent both duplicates from being delivered as well as
preventing packets from outside the current window to be
delivered. Thus, a stronger protection especially for non-DATA
chunk is provided and protects the SCTP stack from replayed or
duplicated packets.</t>
            </li>
            <li>
              <t>Encryption in DTLS/SCTP is only applied to ULP data. For DTLS in
SCTP all chunk types after the association has reached
established state and the initial DTLS handshake has compeleted
will be encrypted. This, makes protocol attacks harder as a
third-party attacker will have less insight into SCTP protocol
state. Also, protocol header information likes PPIDs will also be
encrypted, which makes targeted attacks harder but may also make
management and debugging harder.</t>
            </li>
            <li>
              <t>DTLS/SCTP Rekeying is complicated and require advanced API or
user message tracking to determine when a key is no longer needed
so that it can be discarded. A DTLS/SCTP key that is prematurely
discarded can result in loss of parts of a user message and
failure of the assumptions on the transport where the sender
believes it delivered and the receiver never gets it. This
usually will result in the need to terminate the SCTP association
to restart the ULP session to avoid any issues due to
inconsistencies. DTLS in SCTP is robustly handling of any early
discard of the DTLS key-material after having switched to a new
established DTLS connection and its key-material. Any outstanding
packet that has not been decoded yet will simply be treated as
lost between the SCTP endpoints, and SCTP's retransmission will
retransmit any user message data that requires it. Also, the
algorithm for when to discard a DTLS connection can be much
simpler.</t>
            </li>
            <li>
              <t>DTLS/SCTP rekeying can put restrictions on user message sizes
unless the right APIs exist to the SCTP implementation to
determine the state of user messages. No such restriction exists
in DTLS in SCTP.</t>
            </li>
            <li>
              <t>By using the DTLS chunk that is acting on SCTP packet level
instead of user messages the consideration for extensions are
quite different. Only extensions that would affect the common
header or how packets are formed would interact with this
mechanism, any extension that just defines new chunks or
parameters for existing chunks is expected to just work and be
secured by the mechanism. DTLS/SCTP instead interact with
extensions that affects how user messages are handled.</t>
            </li>
            <li>
              <t>A known limitation is that DTLS in SCTP does not support more
than 2<sup>14</sup> bytes of chunks per SCTP packet. If the DTLS
implementation does not support the full DTLS record size the
maximum supported packet size might be even lower. However, this
value needs to be compared to the supported MTU of IP, and are
thus in reality often not an actual limitation. Only for some
special deployments or over loopback may this limitation be
visible. Also if the proposed extension to (D)TLS record sizes
<xref target="I-D.mattsson-tls-super-jumbo-record-limit"/> are published and
implemented this extension could be used to achieve full IP MTU
(64k).</t>
            </li>
          </ul>
          <t>There are several significant differences in regard to
   implementation between the two realizations.</t>
          <ul spacing="normal">
            <li>
              <t>DTLS in SCTP do requires the DTLS chunk to be implemented in the
SCTP stack implementation, and not as an adaptation layer above
the SCTP stack which DTLS/SCTP instead requires. This has some
extra challenges for operating system level
implementations. However, as some updates anyway will be required
to support the updated SCTP-AUTH specficiation the implementation
burden is likely similar in this regard.</t>
            </li>
            <li>
              <t>DTLS in SCTP implemented in operating system kernels will require
that the DTLS implementation is split. Where the protection
operations performed to create DTLS records needs to be
implemented in the kernel and have an appropriate API for setting
keying materia and managed the functions of the protection
operation. While the DTLS handshake is residing as an application
on top of SCTP interface.</t>
            </li>
            <li>
              <t>DTLS in SCTP can use a DTLS implementation that does not rely on
features from outside of the core protocol, where DTLS/SCTP
required a number of features as listed below:  </t>
              <ul spacing="normal">
                <li>
                  <t>DTLS Connection Index to identify which DTLS connection that
should process the DTLS record.</t>
                </li>
                <li>
                  <t>Support for DTLS records of the maximum size of 16 KB.</t>
                </li>
                <li>
                  <t>Optional to support negotiation of maximum DTLS record size
unless not supporting 16 KB records when it is
required. Even if implementing the negotiation,
interoperability failure may occur. DTLS in SCTP will only
require supporting DTLS record sizes that matches the
largest IP packet size that endpoint support or the SCTP
implementation.</t>
                </li>
                <li>
                  <t>Implementation is required to support turning off the DTLS
replay protection.</t>
                </li>
                <li>
                  <t>Implementation is required to not use DTLS Key-update
functionality. Where DTLS in SCTP is agnostic to its usage,
and it provides a useful tool to ensure that the key lifetime
is not an issue.</t>
                </li>
              </ul>
            </li>
          </ul>
          <t>The conclusion of these implementation details is that DTLS
   in SCTP can use existing DTLS implementations, at least for user
   land SCTP implementation. It is not known if any DTLS 1.3 stack
   exist that fully support the requirements of DTLS/SCTP. It is
   expected that a DTLS/SCTP implementation will have to also extend
   some DTLS implementation.</t>
        </section>
      </section>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>This document uses the following terms:</t>
        <dl>
          <dt>Association:</dt>
          <dd>
            <t>An SCTP association.</t>
          </dd>
          <dt>Connection:</dt>
          <dd>
            <t>A DTLS connection. It is uniquely identified by a
   connection index.</t>
          </dd>
          <dt>Restart DCI:</dt>
          <dd>
            <t>A DTLS connection index indicating a DTLS connection to be
used for an SCTP Association Restart</t>
          </dd>
          <dt>Stream:</dt>
          <dd>
            <t>A unidirectional stream of an SCTP association.  It is
   uniquely identified by a stream identifier.</t>
          </dd>
          <dt>Traffic DCI:</dt>
          <dd>
            <t>A DTLS Connection index indicating a DTLS connection used to
protect the regular SCTP traffic, i.e. not a restart DCI.</t>
          </dd>
        </dl>
      </section>
      <section anchor="abbreviations">
        <name>Abbreviations</name>
        <dl>
          <dt>AEAD:</dt>
          <dd>
            <t>Authenticated Encryption with Associated Data</t>
          </dd>
          <dt>DCI:</dt>
          <dd>
            <t>DTLS Connection Index</t>
          </dd>
          <dt>DTLS:</dt>
          <dd>
            <t>Datagram Transport Layer Security</t>
          </dd>
          <dt>MTU:</dt>
          <dd>
            <t>Maximum Transmission Unit</t>
          </dd>
          <dt>PPID:</dt>
          <dd>
            <t>Payload Protocol Identifier</t>
          </dd>
          <dt>SCTP:</dt>
          <dd>
            <t>Stream Control Transmission Protocol</t>
          </dd>
          <dt>SCTP-AUTH:</dt>
          <dd>
            <t>Authenticated Chunks for SCTP <xref target="RFC4895"/></t>
          </dd>
          <dt>ULP:</dt>
          <dd>
            <t>Upper Layer Protocol</t>
          </dd>
        </dl>
      </section>
      <section anchor="conventions">
        <name>Conventions</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
<?line -6?>
        </t>
      </section>
    </section>
    <section anchor="dtls-usage-of-dtls-chunk">
      <name>DTLS usage of DTLS Chunk</name>
      <t>DTLS in SCTP uses the DTLS chunk as specified in
   <xref target="I-D.westerlund-tsvwg-sctp-dtls-chunk"/>. The chunk if just
   repeated here for the reader's convience.</t>
      <figure anchor="sctp-dtls-chunk-structure">
        <name>DTLS Chunk Structure</name>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="208" width="528" viewBox="0 0 528 208" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,64 L 8,192" fill="none" stroke="black"/>
              <path d="M 136,64 L 136,96" fill="none" stroke="black"/>
              <path d="M 216,64 L 216,96" fill="none" stroke="black"/>
              <path d="M 232,64 L 232,96" fill="none" stroke="black"/>
              <path d="M 264,64 L 264,96" fill="none" stroke="black"/>
              <path d="M 264,160 L 264,192" fill="none" stroke="black"/>
              <path d="M 520,64 L 520,192" fill="none" stroke="black"/>
              <path d="M 8,64 L 520,64" fill="none" stroke="black"/>
              <path d="M 8,96 L 520,96" fill="none" stroke="black"/>
              <path d="M 264,160 L 520,160" fill="none" stroke="black"/>
              <path d="M 8,192 L 520,192" fill="none" stroke="black"/>
              <g class="text">
                <text x="16" y="36">0</text>
                <text x="176" y="36">1</text>
                <text x="336" y="36">2</text>
                <text x="496" y="36">3</text>
                <text x="16" y="52">0</text>
                <text x="32" y="52">1</text>
                <text x="48" y="52">2</text>
                <text x="64" y="52">3</text>
                <text x="80" y="52">4</text>
                <text x="96" y="52">5</text>
                <text x="112" y="52">6</text>
                <text x="128" y="52">7</text>
                <text x="144" y="52">8</text>
                <text x="160" y="52">9</text>
                <text x="176" y="52">0</text>
                <text x="192" y="52">1</text>
                <text x="208" y="52">2</text>
                <text x="224" y="52">3</text>
                <text x="240" y="52">4</text>
                <text x="256" y="52">5</text>
                <text x="272" y="52">6</text>
                <text x="288" y="52">7</text>
                <text x="304" y="52">8</text>
                <text x="320" y="52">9</text>
                <text x="336" y="52">0</text>
                <text x="352" y="52">1</text>
                <text x="368" y="52">2</text>
                <text x="384" y="52">3</text>
                <text x="400" y="52">4</text>
                <text x="416" y="52">5</text>
                <text x="432" y="52">6</text>
                <text x="448" y="52">7</text>
                <text x="464" y="52">8</text>
                <text x="480" y="52">9</text>
                <text x="496" y="52">0</text>
                <text x="512" y="52">1</text>
                <text x="36" y="84">Type</text>
                <text x="64" y="84">=</text>
                <text x="92" y="84">0x4x</text>
                <text x="172" y="84">reserved</text>
                <text x="224" y="84">R</text>
                <text x="248" y="84">DCI</text>
                <text x="360" y="84">Chunk</text>
                <text x="412" y="84">Length</text>
                <text x="264" y="132">Payload</text>
                <text x="384" y="180">Padding</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type = 0x4x   |reserved |R|DCI|         Chunk Length          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
|                            Payload                            |
|                                                               |
|                               +-------------------------------+
|                               |           Padding             |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </artset>
      </figure>
      <dl>
        <dt>reserved: 5 bits</dt>
        <dd>
          <t>Reserved bits for future use.</t>
        </dd>
        <dt>R: 1 bit (boolean)</dt>
        <dd>
          <t>Restart indicator. If this bit is set this DTLS chunk is protected
with an restart DTLS Connection with the index indicated by the
DCI. If not set, then a traffic DCI is indicated.</t>
        </dd>
        <dt>DCI: 2 bits (unsigned integer)</dt>
        <dd>
          <t>DTLS Connection Index is the lower two bits of an DTLS Connection
 Index counter for the traffic or restart DTLS connection index.
 This is a counter implemented in DTLS in
 SCTP that is used to identify which DTLS connection instance that
 is capable of processing any received packet or DTLS message over
 an user message. This counter is recommended to be the lower part
 of a larger variable.
 DCI is unrelated to the DTLS Connection ID (CID) <xref target="RFC9147"/>.</t>
        </dd>
        <dt>Payload: variable length</dt>
        <dd>
          <t>One DTLS record.</t>
        </dd>
      </dl>
    </section>
    <section anchor="dtls-user-message">
      <name>DTLS messages over SCTP User Messages</name>
      <t>DTLS messages that are not DTLS records containing protected SCTP
chunk payloads will be sent as SCTP user messages using the format
defined below. A DTLS handshake message may be fragmented by DTLS to a
set of DTLS records of a maximum configured fragment size. Each DTLS
message fragment is sent as a SCTP user message on the same stream
where each message is configured for reliable and in-order delivery
with the PPID set to DTLS-SCTP
<xref target="I-D.westerlund-tsvwg-sctp-dtls-chunk"/>. The SCTP user message is
created by having each DTLS message prepended with a single byte
containing the Restar flag and DTLS connection index value. These user
messages MAY contain one or more DTLS records. The SCTP stream ID used
MAY be any stream ID that the ULP alreay uses, and if not know Stream
0. Note that all fragments of a handshake message MUST be sent with
the same stream ID to ensure the in-order delivery.</t>
      <figure anchor="sctp-dtls-user-message">
        <name>DTLS User Message Structure</name>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="208" width="528" viewBox="0 0 528 208" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,64 L 8,192" fill="none" stroke="black"/>
              <path d="M 88,64 L 88,96" fill="none" stroke="black"/>
              <path d="M 104,64 L 104,96" fill="none" stroke="black"/>
              <path d="M 136,64 L 136,96" fill="none" stroke="black"/>
              <path d="M 264,160 L 264,192" fill="none" stroke="black"/>
              <path d="M 520,64 L 520,160" fill="none" stroke="black"/>
              <path d="M 8,64 L 520,64" fill="none" stroke="black"/>
              <path d="M 8,96 L 136,96" fill="none" stroke="black"/>
              <path d="M 264,160 L 520,160" fill="none" stroke="black"/>
              <path d="M 8,192 L 264,192" fill="none" stroke="black"/>
              <g class="text">
                <text x="16" y="36">0</text>
                <text x="176" y="36">1</text>
                <text x="336" y="36">2</text>
                <text x="496" y="36">3</text>
                <text x="16" y="52">0</text>
                <text x="32" y="52">1</text>
                <text x="48" y="52">2</text>
                <text x="64" y="52">3</text>
                <text x="80" y="52">4</text>
                <text x="96" y="52">5</text>
                <text x="112" y="52">6</text>
                <text x="128" y="52">7</text>
                <text x="144" y="52">8</text>
                <text x="160" y="52">9</text>
                <text x="176" y="52">0</text>
                <text x="192" y="52">1</text>
                <text x="208" y="52">2</text>
                <text x="224" y="52">3</text>
                <text x="240" y="52">4</text>
                <text x="256" y="52">5</text>
                <text x="272" y="52">6</text>
                <text x="288" y="52">7</text>
                <text x="304" y="52">8</text>
                <text x="320" y="52">9</text>
                <text x="336" y="52">0</text>
                <text x="352" y="52">1</text>
                <text x="368" y="52">2</text>
                <text x="384" y="52">3</text>
                <text x="400" y="52">4</text>
                <text x="416" y="52">5</text>
                <text x="432" y="52">6</text>
                <text x="448" y="52">7</text>
                <text x="464" y="52">8</text>
                <text x="480" y="52">9</text>
                <text x="496" y="52">0</text>
                <text x="512" y="52">1</text>
                <text x="44" y="84">reserved</text>
                <text x="96" y="84">R</text>
                <text x="120" y="84">DCI</text>
                <text x="252" y="132">DTLS</text>
                <text x="304" y="132">Message</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|reserved |R|DCI|                                               |
+-+-+-+-+-+-+-+-+                                               |
|                                                               |
|                            DTLS Message                       |
|                                                               |
|                               +-------------------------------+
|                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </artset>
      </figure>
      <dl>
        <dt>reserved: 5 bits</dt>
        <dd>
          <t>Reserved bits for future use. Sender MUST set these bits to 0 and
MUST be ignored on reception.</t>
        </dd>
        <dt>R: 1 bit (boolean)</dt>
        <dd>
          <t>Restart indicator. If this bit is set this DTLS message is for the
restart DTLS Connection with the index indicated by the
DCI field. If not set, then a traffic DCI is indicated.</t>
        </dd>
        <dt>DCI: 2 bits (unsigned integer)</dt>
        <dd>
          <t>DTLS Connection Index is the lower two bits of an DTLS Connection
 Index counter for the traffic or restart DTLS connection index.
 This is a counter implemented in DTLS in
 SCTP that is used to identify which DTLS connection instance that
 is capable of processing any received packet or DTLS message over
 an user message. This counter is recommended to be the lower part
 of a larger variable.
 DCI is unrelated to the DTLS Connection ID <xref target="RFC9147"/>.</t>
        </dd>
        <dt>DTLS Message: variable length</dt>
        <dd>
          <t>One or more DTLS records. In cases more
 than one DTLS record is included all DTLS records except the last
 MUST include a length field. Note that this matches what is
 specified in DTLS 1.3 <xref target="RFC9147"/> will always include the length
 field in each record.</t>
        </dd>
      </dl>
    </section>
    <section anchor="dtls-chunk-integration">
      <name>DTLS Chunk Integration</name>
      <t>The <xref target="I-D.westerlund-tsvwg-sctp-dtls-chunk"/> contains a high-level
description of the basic DTLS in SCTP architecture, this section deals
with details related to the DTLS 1.3 integration with SCTP.</t>
      <section anchor="state-machine">
        <name>State Machine</name>
        <t>DTLS in SCTP uses inband key-establishment, thus the DTLS handshake
establishes shared keys with the remote peer. As soon as the SCTP
State Machine enters PROTECTION INITILIZATION state, DTLS in SCTP is
responsible for progressing to the PROTECTED state when DTLS handshake
has completed. The DCI counter is initialized to the value zero that
is used for the initial DTLS handshake.</t>
        <section anchor="protection-initilization-state">
          <name>PROTECTION INITILIZATION state</name>
          <t>When entering PROTECTION INITILIZATION state, DTLS will start the handshake
according to <xref target="dtls-handshake"/>.</t>
          <t>DTLS being initialized for a new SCTP association will set the Traffic
DCI counter = 0, which implies a DCI field value of 0, for the initial
DTLS connection. The DTLS handshake messages are transmitted from this
endpoint to the peer using SCTP User message <xref target="dtls-user-message"/>
with the PPID value set to DTLS-SCTP
<xref target="I-D.westerlund-tsvwg-sctp-dtls-chunk"/>. Note that in case of SCTP
association restart, the negotiation of the new Traffic DTLS
connection SHALL still use a new Traffic DCI counter = 0 as the restarting
SCTP endpoint may not know the old traffic DCI counter value for the
last active DTLS connection.</t>
          <t>When in PROTECTION INITILIZATION state, DTLS in SCTP MAY create a DTLS
connection for Restart purposes. Such Restart connection is identified
by a Restart DCI, that is based on a DCI counter independent from the
traffic DCI. Whilst the first Restart DCI has value = 0, further
Restart DCI will be increased using the same procedure than Traffic
DCI and implementing the same parallel connection mechanism (see
<xref target="add-dtls-connection"/> and <xref target="remove-dtls-connection"/>).</t>
          <t>When a successful handshake for the traffic DCI = 0 has been completed
and the keying material is established for DTLS connection and set for
the DCI the DTLS chunk Handler will perform validation and then move
SCTP State Machine into PROTECTED state.</t>
        </section>
        <section anchor="protected-state">
          <name>PROTECTED state</name>
          <t>In the PROTECTED state the currently active DTLS connection is used
for protection operation of the payload of SCTP chunks in each packet
per below specification.  When necessary to meet requirements on
periodic re-authentication of the peer and establishment of new
forward secrecy keys, the existing DTLS 1.3 connection is being
replaced with a new one by first opening a new parallel DTLS
connection as further specified in <xref target="parallel-dtls"/> and then close
the old DTLS connection.</t>
          <t>When in PROTECTED state, DTLS in SCTP if it has not yet been done,
SHALL create a DTLS connection for Restart purposes.</t>
        </section>
        <section anchor="shutdown-states">
          <name>SHUTDOWN states</name>
          <t>When the SCTP association leaves the ESTABLISHED state per <xref target="RFC9260"/>
to be shutdown the DTLS connection is kept and continues to protect
the SCTP packet payloads through the shutdown process.</t>
          <t>When the association reaches the CLOSED state as part of the SCTP
association closing process all DTLS connections existing (traffic and
restart) for this association are terminated without further
transmissions, i.e. DTLS close_notify is not transmitted.</t>
        </section>
      </section>
      <section anchor="dtls-connection-handling">
        <name>DTLS Connection Handling</name>
        <t>It's up to DTLS key-establishment function to manage the DTLS
connections and their related DCI state in the DTLS chunk.</t>
        <section anchor="add-dtls-connection">
          <name>Add a New DTLS Connection</name>
          <t>Either peer can add a new DTLS connection to the SCTP association at
any time, but no more than 2 DTLS connections can exist at the same
time per DTLS connection type (Traffic or Restart).  The new DCI
value shall be the last active Traffic or Restart DCI increased by one.
What is encoded in the DTLS chunk and DTLS user messages are the
DCI value modulo 4. This makes the attempt to create a new DTLS
connection to use the same, known, value of DCI from either peer.  A
new handshake will be initiated by DTLS using the new DCI.  Details of
the handshake are described in <xref target="dtls-handshake"/>.</t>
          <t>As either endpoint can initiate a DTLS handshake at the same time,
either endpoint may receive a DTLS ClientHello message when it has
sent its own ClientHello. In this case the ClientHello from the
endpoint that had the DTLS Client role in the establishment of the
previous DTLS connection shall be continued to be processed and the
other dropped.</t>
          <t>When the handshake has been completed successfully, the new DTLS
connection will be possible to use, if the handshake is
not completed successfully, the new DCI value will not be considered
used and a next DTLS handshake attempt will reuse that DCI.</t>
        </section>
        <section anchor="remove-dtls-connection">
          <name>Remove an existing DTLS Connection</name>
          <t>A DTLS connection is removed when a
newer DTLS connection is in use. It is RECOMMENDED to not initiate
removal until at least one SCTP packet protected by the new DTLS
connection has been received, and any transmitted packets protected
using the new DTLS connection has been acknowledge, alternatively one
Maximum Segment Lifetime (120 seconds) has passed since the last SCTP
packet protected by the old DTLS connection was transmitted.</t>
          <t>Either peers can initialize the removal of a DTLS connection from the
current SCTP association when needed when a new have been established.
The closing of the DTLS connection when the SCTP association is in
PROTECTED and ESTABLISHED state is done by having the DTLS connection
send a DTLS close_notify. When DTLS closure for a DTLS connection is
completed, the related DCI information in the DTLS chunk is released.</t>
        </section>
      </section>
      <section anchor="dtls-key-update">
        <name>DTLS Key Update</name>
        <t>To perform a DTLS Key Update when using the DTLS chunk for protection
the following process is performed. Either endpoint can trigger a DTLS
key update when needed to update the key used. The DTLS key-update
process is detailed in Section 8 of <xref target="RFC9147"/> including a example of
the DTLS key update procedure. Note that in line with DTLS, and in
contrast to TLS, DTLS in SCTP endpoints MUST NOT start using new epoch
keys until the DTLS ACK has been recived. This to avoid being unable
to process any DTLS chunk due to the key-update in case of network
packet reordering or usage of multiple paths.</t>
        <t>Note: The below role describes the keys in realtion to the endpoint
and traffic it will receive or send. This will have to be translated
into client or server key depending on the role the endpoint has in
the DTLS connection the KeyUpdate happens in.</t>
        <section anchor="initiator">
          <name>Initiator</name>
          <t>The below assumes that the Intitiator (I) are currentnly using key
epoch N.</t>
          <ol spacing="normal" type="1"><li>
              <t>The endpoint Initiates the key update and generates the new key
  for Epoch N+1. Epoch N+1 transmission key-materaial is set for the
  current DCI and epoch N+1 but not yet enabled for use. DTLS
  generates DTLS records containing the KeyUpdate DTLS message and
  update_requested, which is then sent using SCTP user message
  (<xref target="dtls-user-message"/>) to the responder.</t>
            </li>
            <li>
              <t>Initiator receives a DTLS user message containing the DTLS ACK
  message acknowledging the reception of the KeyUpdate message sent in
  step 1. The Initiator actives the new Epoch N+1 key in the DTLS
  chunk for protection of future transmissions of SCTP packets. The
  epoch N send direction key can be removed from the DTLS chunk key
  store.</t>
            </li>
            <li>
              <t>Initiator receives a DTLS user message with the Responder's
  KeyUpdate message. The initator generates the recevie keys for epoch
  N+1 using the received message and installs them in the DTLS chunks
  key store. Then it generates a DTLS ACK for the KeyUpdate and sends
  it to the responder as a SCTP user message.</t>
            </li>
            <li>
              <t>When the first SCTP packet protected by epoch N+1 has been
  received and succesfully decrypted by DTLS chunk the epoch N reception
  keys can be removed. Although to deal with network reordering, a
  delay is RECOMMENDED.</t>
            </li>
          </ol>
          <t>This completes the key-update procedure.</t>
          <t>Note that even if both endpoints runs the Initiator process the
KeyUpdate will complete. The main difference is that step 3 may occur
before step 2 has happened.</t>
        </section>
        <section anchor="responder">
          <name>Responder</name>
          <t>The process for a responder to a peer initiating KeyUpdate.</t>
          <ol spacing="normal" type="1"><li>
              <t>The responder receives an SCTP DTLS user message containing a
  KeyUpdate message. The epoch N+1 keys reception keys are generated
  and installed into the DTLS chunk key store. A DTLS ACK message is
  generated and transmitted to the peer using a SCTP user message.</t>
            </li>
            <li>
              <t>The responder initiates its own Key Update by generating keys and
  creating the KeyUpdate message. The send direction keys for epoch
  N+1 is installed but not enabled for use. The KeyUpdate message is
  transmitted to the peer using a SCTP user message.</t>
            </li>
            <li>
              <t>The responder receives a DTLS user message containing the DTLS
  ACK message acknowledging the reception of the KeyUpdate message
  sent in step 2. The responder actives the new Epoch N+1 key in the
  DTLS chunk for protection of future transmissions of SCTP
  packets. The epoch N send direction key can be removed from the DTLS
  chunk key store.</t>
            </li>
            <li>
              <t>When the first SCTP packet protected by epoch N+1 has been
  received and succesfully decrypted by DTLS chunk the epoch N reception
  keys can be removed. Although to deal with network reordering, a
  delay is RECOMMENDED.</t>
            </li>
          </ol>
        </section>
      </section>
      <section anchor="error-cases">
        <name>Error Cases</name>
        <t>As DTLS has its own error reporting mechanism by exchanging DTLS alert
messages no new DTLS related cause codes are defined to use the error
handling defined in <xref target="I-D.westerlund-tsvwg-sctp-dtls-chunk"/>.</t>
        <t>When DTLS encounters an error it may report that issue using DTLS
alert message to its peer by putting the created DTLS record in a SCTP
user message (<xref target="dtls-user-message"/>).  This is independent of what to do
in relation to the SCTP association.  Depending on the severance of
the error different paths can be the result:</t>
        <dl>
          <dt>Non-critical:</dt>
          <dd>
            <t>the DTLS connection can continue to protect
   the SCTP association. In this case the issue may be worth reporting
   to the peer using a DTLS alert message, but otherwise continue
   without further action.</t>
          </dd>
          <dt>Critical, but not immediately fatal:</dt>
          <dd>
            <t>If the DTLS connection has a
   critical issue, but can still protect packets then a the endpoint
   SHOULD attempt to establish a new DTLS connection. If that succeeds
   then the SCTP association switches over to the new DTLS connection
   and can terminate the old one including reporting the error. In
   case the establishment fails, then this critical issue MUST be reported
   to the SCTP association so that it can send an ABORT chunk with the
   Error in Protection cause code. This will terminate the SCTP
   association immediately, provide ULP with notification of the
   failure and speeding up any higher layer management of the failure.</t>
          </dd>
          <dt>Critical, and immediately fatal:</dt>
          <dd>
            <t>If the DTLS connection fails so
   that no further data can be protected (i.e. either sent or
   received) with maintained security then it is not possible to
   establish a new DTLS connection and DTLS will
   have to indicate this to the SCTP implementation so it can perform
   a one sides SCTP association termination. This will lead to an
   eventual SCTP association timeout in the peer.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="dtls-considerations">
      <name>DTLS Considerations</name>
      <section anchor="version-of-dtls">
        <name>Version of DTLS</name>
        <t>This document defines the usage of DTLS 1.3 <xref target="RFC9147"/>.
   Earlier versions of DTLS MUST NOT be used
   (see <xref target="RFC8996"/>). It is expected that DTLS in SCTP as described in
   this document will work with future versions of DTLS.</t>
        <t>Only one version of DTLS MUST be used during the lifetime of an
   SCTP Association, meaning that the procedure for replacing the DTLS
   version in use requires the existing SCTP Association to be
   terminated and a new SCTP Association with the desired DTLS version
   to be instantiated.</t>
      </section>
      <section anchor="configuration-of-dtls">
        <name>Configuration of DTLS</name>
        <section anchor="general">
          <name>General</name>
          <t>The DTLS Connection ID SHOULD NOT be included in the DTLS records as
   it is not needed, the DTLS chunk indicates which DTLS connection
   the DTLS records are intended for using the DCI bits. Avoiding
   overhead and addition implementation requirements on DTLS
   implementation.</t>
          <t>The DTLS record length field is normally not needed as the DTLS
   Chunk provides a length field unless multiple records are put in
   same DTLS chunk payload or user message. If multiple DTLS records
   are included in one DTLS chunk payload or user message the DTLS
   record length field MUST be present in all but the last.</t>
          <t>DTLS record replay detection MUST be used.</t>
          <t>Sequence number size can be adapted based on how quickly it wraps.</t>
          <t>Many of the TLS registries have a "Recommended" column. Parameters
   not marked as "Y" are NOT RECOMMENDED to support in DTLS in
   SCTP. Non-AEAD cipher suites or cipher suites without
   confidentiality MUST NOT be supported. Cipher suites and parameters
   that do not provide ephemeral key-exchange MUST NOT be supported.</t>
        </section>
        <section anchor="authentication-and-policy-decisions">
          <name>Authentication and Policy Decisions</name>
          <t>DTLS in SCTP MUST be mutually authenticated. Authentication is the
process of establishing the identity of a user or system and verifying
that the identity is valid. DTLS only provides proof of possession of
a key. DTLS in SCTP MUST perform identity authentication. It is
RECOMMENDED that DTLS in SCTP is used with certificate-based
authentication. When certificates are used the application using DTLS
in SCTP is responsible for certificate policies, certificate chain
validation, and identity authentication (HTTPS does for example match
the hostname with a subjectAltName of type dNSName). The application
using DTLS in SCTP defines what the identity is and how it is encoded
and the client and server MUST use the same identity format. Guidance
on server certificate validation can be found in
<xref target="I-D.ietf-uta-rfc6125bis"/>. DTLS in SCTP enables periodic transfer of
mutual revocation information (OSCP stapling) every time a new
parallel connection is set up. All security decisions MUST be based on
the peer's authenticated identity, not on its transport layer
identity.</t>
          <t>It is possible to authenticate DTLS endpoints based on IP addresses in
certificates. SCTP associations can use multiple IP addresses per SCTP
endpoint. Therefore, it is possible that DTLS records will be sent
from a different source IP address or to a different destination IP
address than that originally authenticated. This is not a problem
provided that no security decisions are made based on the source or
destination IP addresses.</t>
        </section>
        <section anchor="new-connections">
          <name>New Connections</name>
          <t>Implementations MUST set up new DTLS connections before any of the
certificates expire. It is RECOMMENDED that all negotiated and
exchanged parameters are the same except for the timestamps in the
certificates. Clients and servers MUST NOT accept a change of identity
during the setup of a new connections, but MAY accept negotiation of
stronger algorithms and security parameters, which might be motivated
by new attacks.</t>
          <t>Allowing new connections can enable denial-of-service attacks. The
endpoints MUST limit the number of simultaneous connections to two.</t>
          <t>To force attackers to do dynamic key exfiltration and limit the
amount of compromised data due to key compromise, implementations MUST
have policies for how often to set up new connections with ephemeral
key exchange such as ECDHE. Implementations SHOULD set up new
connections frequently to force attackers to dynamic key
extraction. E.g., at least every hour and every 100 GB of data which
is a common policy for IPsec <xref target="ANSSI-DAT-NT-003"/>. See
<xref target="I-D.ietf-tls-rfc8446bis"/> for a more detailed discussion on key
compromise and key exfiltration in (D)TLS.</t>
          <t>For many DTLS in SCTP deployments the SCTP association is expected to
have a very long lifetime of months or even years. For associations
with such long lifetimes there is a need to frequently re-authenticate
both client and server by setting up new connections. TLS Certificate
lifetimes significantly shorter than a year are common which is
shorter than many expected SCTP associations protected by DTLS in
SCTP.</t>
        </section>
        <section anchor="padding-of-dtls-records">
          <name>Padding of DTLS Records</name>
          <t>Both SCTP and DTLS contains mechanisms to padd SCTP payloads, and DTLS
records respectively. If padding of SCTP packets are desired to hide
actual message sizes it RECOMMEDED to use the SCTP Padding Chunck
<xref target="RFC4820"/> to generate a consistent SCTP payload size. Support of this
chunk is only required on the sender side. However, if the PAD chunk
is not supported DTLS padding MAY be used.</t>
          <t>It needs to be noted that independent if SCTP padding or DTLS padding
is used the padding is not taken into account by the SCTP congestion
control. Extensive use of padding has potential for worsen congestion
situations as the SCTP association will consume more bandwidth than
its derived share by the congestion control.</t>
          <t>The use of SCTP PAD chunk is recommened as it at least can enable
future extension or SCTP implementation that account also for the
padding. Use of DTLS padding hides this packet expansion from SCTP.</t>
        </section>
        <section anchor="dtls-13">
          <name>DTLS 1.3</name>
          <t>DTLS 1.3 is used instead of DTLS 1.2 being a newer protocol that
addresses known vulnerabilities and only defines strong algorithms
without known major weaknesses at the time of publication.</t>
          <t>DTLS 1.3 requires rekeying before algorithm specific AEAD limits have
been reached. Implementations MAY setup a new DTLS connection instead
of using key-update.</t>
          <t>In DTLS 1.3 any number of tickets can be issued in a connection and
the tickets can be used for resumption as long as they are valid,
which is up to seven days. The nodes in a resumed connection have the
same roles (client or server) as in the connection where the ticket
was issued. Resumption can have significant latency benefits for
quickly restarting a broken DTLS/SCTP association. If tickets and
resumption are used it is enough to issue a single ticket per
connection.</t>
          <t>The PSK key exchange mode psk_ke MUST NOT be used as it does not
provide ephemeral key exchange.</t>
        </section>
      </section>
    </section>
    <section anchor="establishing-dtls-in-sctp">
      <name>Establishing DTLS in SCTP</name>
      <t>This section specifies how DTLS in SCTP is established
   <xref target="I-D.westerlund-tsvwg-sctp-dtls-chunk"/>.</t>
      <t>A DTLS in SCTP Association is built up with traffic
   DTLS connection and Restart DTLS connection.</t>
      <t>Traffic DTLS connection is established as part of extra procedures
   for the DTLS chunk initial handshake (see
   <xref target="initial_dtls_connection"/>) whilst Restart DTLS connection may be
   established when Association is in PROTECTION INITILIZATION state
   or later, and follows the procedure described in
   <xref target="further_dtls_connection"/>.</t>
      <section anchor="dtls-handshake">
        <name>DTLS Handshake</name>
        <section anchor="initial_dtls_connection">
          <name>Handshake of initial DTLS connection</name>
          <t>The handshake of the initial DTLS connection is part of the
   DTLS in SCTP Association initialization.
   The initialization is split in three distinct phases:</t>
          <ul spacing="normal">
            <li>
              <t>SCTP Handshake</t>
            </li>
            <li>
              <t>DTLS Handshake</t>
            </li>
            <li>
              <t>Validation</t>
            </li>
          </ul>
          <t>Moving towards next phase is possible only when the previous
   phase handshake is completed.</t>
          <t>SCTP Handshake is strictly compliant to <xref target="RFC9260"/>.</t>
          <t>As soon the SCTP Association has entered the SCTP state PROTECTION
   INITILIZATION as defined by <xref target="I-D.westerlund-tsvwg-sctp-dtls-chunk"/> the
   DTLS handshake procedure is initiated by the endpoint that has
   initiated the SCTP association. The initial DTLS handshake or as a
   result of a SCTP association restart SHALL use DCI = 0;</t>
          <t>The DTLS endpoint will send the DTLS message in one or more SCTP
   user message depending if the DTLS endpoint fragments the message
   or not <xref target="dtls-user-message"/>.  The DTLS instance SHOULD NOT
   use DTLS retransmission to repair any packet losses of handshake
   message fragment. Note: If the DTLS implementation support
   configuring a MTU larger than the actual IP MTU it MAY be used as
   SCTP provides reliability and fragmentation.</t>
          <t>If the DTLS handshake is successful in establishing a security
   context to protect further communication and the peer identity is
   accepted the keying material is installed for the DTLS chunk. This
   then triggers validated of the association establishment (see
   <xref target="protocol_overview"/>) by handshaking PVALID chunks inside DTLS
   CHUNK payload.</t>
          <t>Once the Association has been validated, then the SCTP association
   is informed that it can move to the PROTECTED state.</t>
          <t>If the DTLS handshake failed the SCTP association SHALL be aborted
   and an ERROR chunk with the Error in Protection error cause, with
   the appropriate extra error causes is generated, the right
   selection of "Error During Protection Handshake" or "Timeout During
   Protection Handshake or Validation".</t>
          <figure anchor="sctp-DTLS-initial-dtls-connection">
            <name>Handshake of initial DTLS connection</name>
            <artset>
              <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="400" width="536" viewBox="0 0 536 400" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                  <path d="M 40,48 L 40,368" fill="none" stroke="black"/>
                  <path d="M 408,48 L 408,368" fill="none" stroke="black"/>
                  <path d="M 440,64 L 440,112" fill="none" stroke="black"/>
                  <path d="M 440,160 L 440,208" fill="none" stroke="black"/>
                  <path d="M 440,256 L 440,272" fill="none" stroke="black"/>
                  <path d="M 440,320 L 440,368" fill="none" stroke="black"/>
                  <path d="M 40,64 L 200,64" fill="none" stroke="black"/>
                  <path d="M 256,64 L 400,64" fill="none" stroke="black"/>
                  <path d="M 48,80 L 184,80" fill="none" stroke="black"/>
                  <path d="M 272,80 L 408,80" fill="none" stroke="black"/>
                  <path d="M 40,96 L 168,96" fill="none" stroke="black"/>
                  <path d="M 280,96 L 400,96" fill="none" stroke="black"/>
                  <path d="M 440,96 L 480,96" fill="none" stroke="black"/>
                  <path d="M 48,112 L 176,112" fill="none" stroke="black"/>
                  <path d="M 280,112 L 408,112" fill="none" stroke="black"/>
                  <path d="M 40,160 L 120,160" fill="none" stroke="black"/>
                  <path d="M 328,160 L 400,160" fill="none" stroke="black"/>
                  <path d="M 48,176 L 64,176" fill="none" stroke="black"/>
                  <path d="M 376,176 L 408,176" fill="none" stroke="black"/>
                  <path d="M 40,192 L 64,192" fill="none" stroke="black"/>
                  <path d="M 368,192 L 400,192" fill="none" stroke="black"/>
                  <path d="M 440,192 L 480,192" fill="none" stroke="black"/>
                  <path d="M 48,208 L 152,208" fill="none" stroke="black"/>
                  <path d="M 288,208 L 408,208" fill="none" stroke="black"/>
                  <path d="M 48,256 L 136,256" fill="none" stroke="black"/>
                  <path d="M 304,256 L 408,256" fill="none" stroke="black"/>
                  <path d="M 40,272 L 136,272" fill="none" stroke="black"/>
                  <path d="M 304,272 L 400,272" fill="none" stroke="black"/>
                  <path d="M 440,272 L 528,272" fill="none" stroke="black"/>
                  <path d="M 40,320 L 96,320" fill="none" stroke="black"/>
                  <path d="M 328,320 L 400,320" fill="none" stroke="black"/>
                  <path d="M 48,336 L 104,336" fill="none" stroke="black"/>
                  <path d="M 336,336 L 408,336" fill="none" stroke="black"/>
                  <path d="M 440,336 L 512,336" fill="none" stroke="black"/>
                  <path d="M 424,48 C 432.83064,48 440,55.16936 440,64" fill="none" stroke="black"/>
                  <path d="M 424,128 C 432.83064,128 440,120.83064 440,112" fill="none" stroke="black"/>
                  <path d="M 424,144 C 432.83064,144 440,151.16936 440,160" fill="none" stroke="black"/>
                  <path d="M 424,224 C 432.83064,224 440,216.83064 440,208" fill="none" stroke="black"/>
                  <path d="M 424,240 C 432.83064,240 440,247.16936 440,256" fill="none" stroke="black"/>
                  <path d="M 424,288 C 432.83064,288 440,280.83064 440,272" fill="none" stroke="black"/>
                  <path d="M 424,304 C 432.83064,304 440,311.16936 440,320" fill="none" stroke="black"/>
                  <polygon class="arrowhead" points="408,320 396,314.4 396,325.6" fill="black" transform="rotate(0,400,320)"/>
                  <polygon class="arrowhead" points="408,272 396,266.4 396,277.6" fill="black" transform="rotate(0,400,272)"/>
                  <polygon class="arrowhead" points="408,192 396,186.4 396,197.6" fill="black" transform="rotate(0,400,192)"/>
                  <polygon class="arrowhead" points="408,160 396,154.4 396,165.6" fill="black" transform="rotate(0,400,160)"/>
                  <polygon class="arrowhead" points="408,96 396,90.4 396,101.6" fill="black" transform="rotate(0,400,96)"/>
                  <polygon class="arrowhead" points="408,64 396,58.4 396,69.6" fill="black" transform="rotate(0,400,64)"/>
                  <polygon class="arrowhead" points="56,336 44,330.4 44,341.6" fill="black" transform="rotate(180,48,336)"/>
                  <polygon class="arrowhead" points="56,256 44,250.4 44,261.6" fill="black" transform="rotate(180,48,256)"/>
                  <polygon class="arrowhead" points="56,208 44,202.4 44,213.6" fill="black" transform="rotate(180,48,208)"/>
                  <polygon class="arrowhead" points="56,176 44,170.4 44,181.6" fill="black" transform="rotate(180,48,176)"/>
                  <polygon class="arrowhead" points="56,112 44,106.4 44,117.6" fill="black" transform="rotate(180,48,112)"/>
                  <polygon class="arrowhead" points="56,80 44,74.4 44,85.6" fill="black" transform="rotate(180,48,80)"/>
                  <g class="text">
                    <text x="40" y="36">Initiator</text>
                    <text x="408" y="36">Responder</text>
                    <text x="228" y="68">[INIT]</text>
                    <text x="228" y="84">[INIT-ACK]</text>
                    <text x="468" y="84">SCTP</text>
                    <text x="200" y="100">[COOKIE</text>
                    <text x="256" y="100">ECHO]</text>
                    <text x="208" y="116">[COOKIE</text>
                    <text x="260" y="116">ACK]</text>
                    <text x="164" y="164">[DATA(DTLS</text>
                    <text x="236" y="164">Client</text>
                    <text x="296" y="164">Hello)]</text>
                    <text x="108" y="180">[DATA(DTLS</text>
                    <text x="180" y="180">Server</text>
                    <text x="232" y="180">Hello</text>
                    <text x="272" y="180">...</text>
                    <text x="332" y="180">Finished)]</text>
                    <text x="468" y="180">DTLS</text>
                    <text x="108" y="196">[DATA(DTLS</text>
                    <text x="200" y="196">Certificate</text>
                    <text x="264" y="196">...</text>
                    <text x="324" y="196">Finished)]</text>
                    <text x="196" y="212">[DATA(DTLS</text>
                    <text x="264" y="212">ACK)]</text>
                    <text x="160" y="260">[DTLS</text>
                    <text x="244" y="260">CHUNK(PVALID)]</text>
                    <text x="492" y="260">VALIDATION</text>
                    <text x="160" y="276">[DTLS</text>
                    <text x="244" y="276">CHUNK(PVALID)]</text>
                    <text x="120" y="324">[DTLS</text>
                    <text x="204" y="324">CHUNK(DATA(APP</text>
                    <text x="296" y="324">DATA))]</text>
                    <text x="464" y="324">APP</text>
                    <text x="500" y="324">DATA</text>
                    <text x="128" y="340">[DTLS</text>
                    <text x="212" y="340">CHUNK(DATA(APP</text>
                    <text x="304" y="340">DATA))]</text>
                    <text x="216" y="356">...</text>
                    <text x="216" y="372">...</text>
                  </g>
                </svg>
              </artwork>
              <artwork type="ascii-art" align="center"><![CDATA[
Initiator                                     Responder
    |                                             | -.
    +--------------------[INIT]------------------>|   |
    |<-----------------[INIT-ACK]-----------------+   | SCTP
    +----------------[COOKIE ECHO]--------------->|   +-----
    |<----------------[COOKIE ACK]----------------+   |
    |                                             | -'
    |                                             | -.
    +----------[DATA(DTLS Client Hello)]--------->|   |
    |<--[DATA(DTLS Server Hello ... Finished)]----+   | DTLS
    +---[DATA(DTLS Certificate ... Finished)]---->|   +-----
    |<-------------[DATA(DTLS ACK)]---------------+   |
    |                                             | -'
    |                                             | -.
    |<-----------[DTLS CHUNK(PVALID)]-------------+   | VALIDATION
    +------------[DTLS CHUNK(PVALID)]------------>|   +-----------
    |                                             | -'
    |                                             | -.
    +-------[DTLS CHUNK(DATA(APP DATA))]--------->|   | APP DATA
    +<-------[DTLS CHUNK(DATA(APP DATA))]---------+   +---------
    |                    ...                      |   |
    |                    ...                      |   |

]]></artwork>
            </artset>
          </figure>
          <t>The <xref target="sctp-DTLS-initial-dtls-connection"/> shows a successfull
handshake and highlits the different parts of the setup. DTLS
handshake messages are transported by means of DATA Chunks
with SCTP-DTLS PPID.</t>
        </section>
        <section anchor="further_dtls_connection">
          <name>Handshake of further DTLS connections</name>
          <t>When the SCTP Association has entered the PROTECTED state, each of
   the endpoint can initiate a DTLS handshake for rekeying when
   necessary of the traffic or restart DTLS connections.</t>
          <t>The DTLS endpoint will if necessary fragment the handshake into
   multiple records. Each DTLS handshake message fragment
   is sent as a SCTP user message <xref target="dtls-user-message"/>.
   The DTLS instance SHOULD NOT use DTLS retransmission to repair any
   packet losses of handshake message fragment. Note: If the DTLS
   implementation support configuring a MTU larger than the actual IP
   MTU it could be used as SCTP provides reliability and
   fragmentation.</t>
          <t>If the DTLS handshake failed the SCTP association SHALL generate
   an ERROR chunk with the Error in Protection error cause, with
   extra error causes "Error During Protection Handshake".</t>
          <t>The DCI to be used for the handshake depends on the purpose
   of the DTLS connection. If this DTLS connection is being used
   for traffic purpose, DCI value is computed as the last active
   Traffic DCI increased by one modulo 4.
   If this DTLS connection is being used for Restart purpose
   DCI value is computed as the last active Restart DCI increased
   by one modulo 4 and setting R bit to 1.</t>
          <figure anchor="sctp-DTLS-further-dtls-connection">
            <name>Handshake of further DTLS connection</name>
            <artset>
              <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="160" width="448" viewBox="0 0 448 160" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                  <path d="M 40,48 L 40,128" fill="none" stroke="black"/>
                  <path d="M 408,48 L 408,128" fill="none" stroke="black"/>
                  <path d="M 40,64 L 120,64" fill="none" stroke="black"/>
                  <path d="M 328,64 L 400,64" fill="none" stroke="black"/>
                  <path d="M 48,80 L 64,80" fill="none" stroke="black"/>
                  <path d="M 376,80 L 408,80" fill="none" stroke="black"/>
                  <path d="M 40,96 L 64,96" fill="none" stroke="black"/>
                  <path d="M 368,96 L 400,96" fill="none" stroke="black"/>
                  <path d="M 48,112 L 152,112" fill="none" stroke="black"/>
                  <path d="M 288,112 L 408,112" fill="none" stroke="black"/>
                  <polygon class="arrowhead" points="408,96 396,90.4 396,101.6" fill="black" transform="rotate(0,400,96)"/>
                  <polygon class="arrowhead" points="408,64 396,58.4 396,69.6" fill="black" transform="rotate(0,400,64)"/>
                  <polygon class="arrowhead" points="56,112 44,106.4 44,117.6" fill="black" transform="rotate(180,48,112)"/>
                  <polygon class="arrowhead" points="56,80 44,74.4 44,85.6" fill="black" transform="rotate(180,48,80)"/>
                  <g class="text">
                    <text x="40" y="36">Initiator</text>
                    <text x="408" y="36">Responder</text>
                    <text x="164" y="68">[DATA(DTLS</text>
                    <text x="236" y="68">Client</text>
                    <text x="296" y="68">Hello)]</text>
                    <text x="108" y="84">[DATA(DTLS</text>
                    <text x="180" y="84">Server</text>
                    <text x="232" y="84">Hello</text>
                    <text x="272" y="84">...</text>
                    <text x="332" y="84">Finished)]</text>
                    <text x="108" y="100">[DATA(DTLS</text>
                    <text x="200" y="100">Certificate</text>
                    <text x="264" y="100">...</text>
                    <text x="324" y="100">Finished)]</text>
                    <text x="196" y="116">[DATA(DTLS</text>
                    <text x="264" y="116">ACK)]</text>
                  </g>
                </svg>
              </artwork>
              <artwork type="ascii-art" align="center"><![CDATA[
Initiator                                     Responder
    |                                             |
    +----------[DATA(DTLS Client Hello)]--------->|
    |<--[DATA(DTLS Server Hello ... Finished)]----+
    +---[DATA(DTLS Certificate ... Finished)]---->|
    |<-------------[DATA(DTLS ACK)]---------------+
    |                                             |

]]></artwork>
            </artset>
          </figure>
          <t>The <xref target="sctp-DTLS-further-dtls-connection"/> shows a successfull
handshake of a further DTLS connection. Such connections can
be initiated by any of the peers. Same as during the initial
handshake, DTLS handshake messages are transported by means
of DATA chunks with SCTP-DTLS PPID.</t>
        </section>
      </section>
      <section anchor="sctp-restart">
        <name>SCTP Association Restart</name>
        <t>In order to achieve an Association Restart as described in
<xref target="I-D.westerlund-tsvwg-sctp-dtls-chunk"/>, a safe connection
dedicated to Restart SHALL exist and be available.  Furthermore, both
peers SHALL have safely stored both the current Restart DCI value and the
related keying material.  Here we assume that Restart DCI and keying
material are maintained across the events leading to SCTP Restart
request.</t>
        <section anchor="init-dtls-restart-connection">
          <name>Handshake of initial DTLS Restart connection</name>
          <t>As soon as the Association has reached the PROTECTED INITILIZATION state, a
DTLS Restart connection MAY be instantiated.  The instantiation of
the initial DTLS Restart connection follows the rules given in
<xref target="further_dtls_connection"/> where the DCI = 0 (that is initial DCI
= 0) and R bit = 1. Unless a SCTP association restart has happened and
the restart DCI has been used. In this case a new restart DTLS
connection SHALL be established using a restart DCI counter of the current + 1.</t>
          <t>It MAY exist a time gap where the Association is in PROTECTED state
but no DTLS Restart connection exists yet. If a SCTP Restart procedure
will be initiated during that time, it will fail and the Association
will also fail.</t>
          <t>Once initiated, no traffic will be sent over the Restart DTLS
connection so that both endpoints will have a known DTLS record state.</t>
        </section>
        <section anchor="further-dtls-restart-connection">
          <name>Handshake of further DTLS Restart connection</name>
          <t>After the initial DTLS Restart connection has been established, at
least an active DTLS Restart connection shall exist in a known state.
It is recommended that updating of DTLS Restart connection follows the
same times and rules as the traffic DTLS connections and is
implemented by following the rules described in <xref target="parallel-dtls"/>.</t>
          <t>The next DTLS Restart DCI is computed as described in
<xref target="add-dtls-connection"/>.</t>
          <t>The handshake of further DTLS Restart Connection is sequenced as follows:</t>
          <ul spacing="normal">
            <li>
              <t>Perform the DTLS Handshake as described in <xref target="further_dtls_connection"/> on the next Restart DCI</t>
            </li>
            <li>
              <t>The Responder will store the new key before sending DTLS ACK</t>
            </li>
            <li>
              <t>The Initiator at reception of DTLS ACK will initiate closing the current Restart DCI</t>
            </li>
            <li>
              <t>The Responder will reply to the DTLS Close and remove the old key</t>
            </li>
            <li>
              <t>The Initiator receives the answer and remove the old key</t>
            </li>
          </ul>
        </section>
        <section anchor="sctp-assoc-restart-procedure">
          <name>SCTP Association Restart Procedure</name>
          <t>The DTLS in SCTP Association Restart is meant to preserve the security
characteristics.</t>
          <t>In order the Association Restart to proceed both Initiator and Responder
SHALL use the same Restart DCI for COOKIE-ECHO/COOKIE-ACK handshake, that implies
that the Initiator must preserve the Key for that DCI and that the Responder
SHALL NOT change the Key for the Restart DCI during the Restart procedure.</t>
          <figure anchor="sctp-assoc-restart-sequence">
            <name>SCTP Restart sequence for DTLS in SCTP</name>
            <artset>
              <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="464" width="576" viewBox="0 0 576 464" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                  <path d="M 40,48 L 40,432" fill="none" stroke="black"/>
                  <path d="M 408,48 L 408,432" fill="none" stroke="black"/>
                  <path d="M 440,64 L 440,80" fill="none" stroke="black"/>
                  <path d="M 440,128 L 440,144" fill="none" stroke="black"/>
                  <path d="M 440,192 L 440,240" fill="none" stroke="black"/>
                  <path d="M 440,288 L 440,336" fill="none" stroke="black"/>
                  <path d="M 440,384 L 440,432" fill="none" stroke="black"/>
                  <path d="M 40,64 L 200,64" fill="none" stroke="black"/>
                  <path d="M 256,64 L 400,64" fill="none" stroke="black"/>
                  <path d="M 48,80 L 184,80" fill="none" stroke="black"/>
                  <path d="M 272,80 L 408,80" fill="none" stroke="black"/>
                  <path d="M 440,80 L 528,80" fill="none" stroke="black"/>
                  <path d="M 40,128 L 112,128" fill="none" stroke="black"/>
                  <path d="M 320,128 L 400,128" fill="none" stroke="black"/>
                  <path d="M 48,144 L 112,144" fill="none" stroke="black"/>
                  <path d="M 312,144 L 408,144" fill="none" stroke="black"/>
                  <path d="M 440,144 L 520,144" fill="none" stroke="black"/>
                  <path d="M 40,192 L 120,192" fill="none" stroke="black"/>
                  <path d="M 328,192 L 400,192" fill="none" stroke="black"/>
                  <path d="M 48,208 L 64,208" fill="none" stroke="black"/>
                  <path d="M 376,208 L 408,208" fill="none" stroke="black"/>
                  <path d="M 40,224 L 64,224" fill="none" stroke="black"/>
                  <path d="M 368,224 L 400,224" fill="none" stroke="black"/>
                  <path d="M 440,224 L 568,224" fill="none" stroke="black"/>
                  <path d="M 48,240 L 152,240" fill="none" stroke="black"/>
                  <path d="M 288,240 L 408,240" fill="none" stroke="black"/>
                  <path d="M 40,288 L 120,288" fill="none" stroke="black"/>
                  <path d="M 328,288 L 400,288" fill="none" stroke="black"/>
                  <path d="M 48,304 L 64,304" fill="none" stroke="black"/>
                  <path d="M 376,304 L 408,304" fill="none" stroke="black"/>
                  <path d="M 40,320 L 64,320" fill="none" stroke="black"/>
                  <path d="M 368,320 L 400,320" fill="none" stroke="black"/>
                  <path d="M 440,320 L 568,320" fill="none" stroke="black"/>
                  <path d="M 48,336 L 152,336" fill="none" stroke="black"/>
                  <path d="M 288,336 L 408,336" fill="none" stroke="black"/>
                  <path d="M 40,384 L 96,384" fill="none" stroke="black"/>
                  <path d="M 328,384 L 400,384" fill="none" stroke="black"/>
                  <path d="M 48,400 L 104,400" fill="none" stroke="black"/>
                  <path d="M 336,400 L 408,400" fill="none" stroke="black"/>
                  <path d="M 440,400 L 512,400" fill="none" stroke="black"/>
                  <path d="M 424,48 C 432.83064,48 440,55.16936 440,64" fill="none" stroke="black"/>
                  <path d="M 424,96 C 432.83064,96 440,88.83064 440,80" fill="none" stroke="black"/>
                  <path d="M 424,112 C 432.83064,112 440,119.16936 440,128" fill="none" stroke="black"/>
                  <path d="M 424,160 C 432.83064,160 440,152.83064 440,144" fill="none" stroke="black"/>
                  <path d="M 424,176 C 432.83064,176 440,183.16936 440,192" fill="none" stroke="black"/>
                  <path d="M 424,256 C 432.83064,256 440,248.83064 440,240" fill="none" stroke="black"/>
                  <path d="M 424,272 C 432.83064,272 440,279.16936 440,288" fill="none" stroke="black"/>
                  <path d="M 424,352 C 432.83064,352 440,344.83064 440,336" fill="none" stroke="black"/>
                  <path d="M 424,368 C 432.83064,368 440,375.16936 440,384" fill="none" stroke="black"/>
                  <polygon class="arrowhead" points="408,384 396,378.4 396,389.6" fill="black" transform="rotate(0,400,384)"/>
                  <polygon class="arrowhead" points="408,320 396,314.4 396,325.6" fill="black" transform="rotate(0,400,320)"/>
                  <polygon class="arrowhead" points="408,288 396,282.4 396,293.6" fill="black" transform="rotate(0,400,288)"/>
                  <polygon class="arrowhead" points="408,224 396,218.4 396,229.6" fill="black" transform="rotate(0,400,224)"/>
                  <polygon class="arrowhead" points="408,192 396,186.4 396,197.6" fill="black" transform="rotate(0,400,192)"/>
                  <polygon class="arrowhead" points="408,128 396,122.4 396,133.6" fill="black" transform="rotate(0,400,128)"/>
                  <polygon class="arrowhead" points="408,64 396,58.4 396,69.6" fill="black" transform="rotate(0,400,64)"/>
                  <polygon class="arrowhead" points="56,400 44,394.4 44,405.6" fill="black" transform="rotate(180,48,400)"/>
                  <polygon class="arrowhead" points="56,336 44,330.4 44,341.6" fill="black" transform="rotate(180,48,336)"/>
                  <polygon class="arrowhead" points="56,304 44,298.4 44,309.6" fill="black" transform="rotate(180,48,304)"/>
                  <polygon class="arrowhead" points="56,240 44,234.4 44,245.6" fill="black" transform="rotate(180,48,240)"/>
                  <polygon class="arrowhead" points="56,208 44,202.4 44,213.6" fill="black" transform="rotate(180,48,208)"/>
                  <polygon class="arrowhead" points="56,144 44,138.4 44,149.6" fill="black" transform="rotate(180,48,144)"/>
                  <polygon class="arrowhead" points="56,80 44,74.4 44,85.6" fill="black" transform="rotate(180,48,80)"/>
                  <g class="text">
                    <text x="40" y="36">Initiator</text>
                    <text x="408" y="36">Responder</text>
                    <text x="228" y="68">[INIT]</text>
                    <text x="472" y="68">Plain</text>
                    <text x="516" y="68">SCTP</text>
                    <text x="228" y="84">[INIT-ACK]</text>
                    <text x="136" y="132">[DTLS</text>
                    <text x="212" y="132">CHUNK(COOKIE</text>
                    <text x="292" y="132">ECHO)]</text>
                    <text x="488" y="132">Encrypted</text>
                    <text x="136" y="148">[DTLS</text>
                    <text x="212" y="148">CHUNK(COOKIE</text>
                    <text x="288" y="148">ACK)]</text>
                    <text x="164" y="196">[DATA(DTLS</text>
                    <text x="236" y="196">Client</text>
                    <text x="296" y="196">Hello)]</text>
                    <text x="108" y="212">[DATA(DTLS</text>
                    <text x="180" y="212">Server</text>
                    <text x="232" y="212">Hello</text>
                    <text x="272" y="212">...</text>
                    <text x="332" y="212">Finished)]</text>
                    <text x="464" y="212">New</text>
                    <text x="512" y="212">Traffic</text>
                    <text x="560" y="212">DCI</text>
                    <text x="108" y="228">[DATA(DTLS</text>
                    <text x="200" y="228">Certificate</text>
                    <text x="264" y="228">...</text>
                    <text x="324" y="228">Finished)]</text>
                    <text x="196" y="244">[DATA(DTLS</text>
                    <text x="264" y="244">ACK)]</text>
                    <text x="164" y="292">[DATA(DTLS</text>
                    <text x="236" y="292">Client</text>
                    <text x="296" y="292">Hello)]</text>
                    <text x="108" y="308">[DATA(DTLS</text>
                    <text x="180" y="308">Server</text>
                    <text x="232" y="308">Hello</text>
                    <text x="272" y="308">...</text>
                    <text x="332" y="308">Finished)]</text>
                    <text x="464" y="308">New</text>
                    <text x="512" y="308">Restart</text>
                    <text x="560" y="308">DCI</text>
                    <text x="108" y="324">[DATA(DTLS</text>
                    <text x="200" y="324">Certificate</text>
                    <text x="264" y="324">...</text>
                    <text x="324" y="324">Finished)]</text>
                    <text x="196" y="340">[DATA(DTLS</text>
                    <text x="264" y="340">ACK)]</text>
                    <text x="120" y="388">[DTLS</text>
                    <text x="204" y="388">CHUNK(DATA(APP</text>
                    <text x="296" y="388">DATA))]</text>
                    <text x="464" y="388">APP</text>
                    <text x="500" y="388">DATA</text>
                    <text x="128" y="404">[DTLS</text>
                    <text x="212" y="404">CHUNK(DATA(APP</text>
                    <text x="304" y="404">DATA))]</text>
                    <text x="216" y="420">...</text>
                    <text x="216" y="436">...</text>
                  </g>
                </svg>
              </artwork>
              <artwork type="ascii-art" align="center"><![CDATA[
Initiator                                     Responder
    |                                             | -.
    +--------------------[INIT]------------------>|   | Plain SCTP
    |<-----------------[INIT-ACK]-----------------+   +-----------
    |                                             | -'
    |                                             | -.
    +---------[DTLS CHUNK(COOKIE ECHO)]---------->|   | Encrypted
    |<--------[DTLS CHUNK(COOKIE ACK)]------------+   +----------
    |                                             | -'
    |                                             | -.
    +----------[DATA(DTLS Client Hello)]--------->|   |
    |<--[DATA(DTLS Server Hello ... Finished)]----+   | New Traffic DCI
    +---[DATA(DTLS Certificate ... Finished)]---->|   +----------------
    |<-------------[DATA(DTLS ACK)]---------------+   |
    |                                             | -'
    |                                             | -.
    +----------[DATA(DTLS Client Hello)]--------->|   |
    |<--[DATA(DTLS Server Hello ... Finished)]----+   | New Restart DCI
    +---[DATA(DTLS Certificate ... Finished)]---->|   +----------------
    |<-------------[DATA(DTLS ACK)]---------------+   |
    |                                             | -'
    |                                             | -.
    +-------[DTLS CHUNK(DATA(APP DATA))]--------->|   | APP DATA
    +<-------[DTLS CHUNK(DATA(APP DATA))]---------+   +---------
    |                    ...                      |   |
    |                    ...                      |   |

]]></artwork>
            </artset>
          </figure>
          <t>The <xref target="sctp-assoc-restart-sequence"/> shows a successfull
SCTP Association Restart.</t>
          <t>From procedure viewpoint the sequence is the following:</t>
          <ul spacing="normal">
            <li>
              <t>Initiator sends plain INIT (VTag=0), Responder replies INIT-ACK</t>
            </li>
            <li>
              <t>Initiator sends COOKIE-ECHO using DTLS CHUNK encrypted with the Key
tied to the Restart DCI</t>
            </li>
            <li>
              <t>Responder replies with COOKIE-ACK using DTLS CHUNK encrypted with
the Key tied to the Restart DCI</t>
            </li>
            <li>
              <t>Initiator sends handshakes for new Traffic DTLS connnection as well
as new Restart DTLS connection.</t>
            </li>
            <li>
              <t>When the handshake for the a new traffic DTLS connection has been
completed, the DCI used to protect
any SCTP chunks is switched from the restart DCI to the new traffic
DCI enabling the Validation and transit to PROTECTED state.</t>
            </li>
          </ul>
          <t>User Data for any ULP traffic MAY be initiated immediately after
COOKIE-ECHO/COOKIE-ACK handshake using the current Restart DCI, that
is even before a new Traffic DCI or a Restart DCI have been
handshaked.  If a problem occurs before the new Restart DCI has been
handshaked, the Association cannot be Restarted, thus it's RECOMMENDED
the new Restart DCI to be handshaked as early as possible.</t>
        </section>
      </section>
    </section>
    <section anchor="parallel-dtls">
      <name>Parallel DTLS Rekeying</name>
      <t>Rekeying in this specification is implemented by replacing the DTLS
connection getting old with a new one by first creating the new DTLS
connection, start using it, then closing the old one.</t>
      <section anchor="criteria-for-rekeying">
        <name>Criteria for Rekeying</name>
        <t>The criteria for rekeying may vary depending on the ULP requirement on
security properties, chosen cipher suits etc. Therefore it is assumed
that the implementation will be configurable by the ULP to meet its demand.</t>
        <t>Likely criteria to impact the need for rekeying through the usage of
new DTLS connection are:</t>
        <ul spacing="normal">
          <li>
            <t>Maximum time since last authentication of the peer</t>
          </li>
          <li>
            <t>Amount of data transferred since last forward secrecy preserving
rekeying</t>
          </li>
          <li>
            <t>The cipher suit's maximum key usage being reached. Although for
DTLS 1.3 usage of the Key Update mechanism can generate new keys
not having the same security properties as opening a new DTLS
connection.</t>
          </li>
        </ul>
      </section>
      <section anchor="procedure-for-rekeying">
        <name>Procedure for Rekeying</name>
        <t>This specification allows up to 2 DTLS connection to be active at the same
time for the current SCTP Association.
The following state machine applies.</t>
        <figure anchor="dtls-rekeying-state-diagram">
          <name>State Diagram for Rekeying</name>
          <artset>
            <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="592" width="472" viewBox="0 0 472 592" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,48 L 8,560" fill="none" stroke="black"/>
                <path d="M 96,32 L 96,64" fill="none" stroke="black"/>
                <path d="M 96,144 L 96,176" fill="none" stroke="black"/>
                <path d="M 96,272 L 96,304" fill="none" stroke="black"/>
                <path d="M 96,368 L 96,400" fill="none" stroke="black"/>
                <path d="M 96,480 L 96,512" fill="none" stroke="black"/>
                <path d="M 136,64 L 136,136" fill="none" stroke="black"/>
                <path d="M 136,176 L 136,264" fill="none" stroke="black"/>
                <path d="M 136,304 L 136,360" fill="none" stroke="black"/>
                <path d="M 136,400 L 136,472" fill="none" stroke="black"/>
                <path d="M 136,512 L 136,560" fill="none" stroke="black"/>
                <path d="M 176,32 L 176,64" fill="none" stroke="black"/>
                <path d="M 176,144 L 176,176" fill="none" stroke="black"/>
                <path d="M 176,272 L 176,304" fill="none" stroke="black"/>
                <path d="M 176,368 L 176,400" fill="none" stroke="black"/>
                <path d="M 176,480 L 176,512" fill="none" stroke="black"/>
                <path d="M 96,32 L 176,32" fill="none" stroke="black"/>
                <path d="M 8,48 L 88,48" fill="none" stroke="black"/>
                <path d="M 96,64 L 176,64" fill="none" stroke="black"/>
                <path d="M 96,144 L 176,144" fill="none" stroke="black"/>
                <path d="M 96,176 L 176,176" fill="none" stroke="black"/>
                <path d="M 96,272 L 176,272" fill="none" stroke="black"/>
                <path d="M 96,304 L 176,304" fill="none" stroke="black"/>
                <path d="M 96,368 L 176,368" fill="none" stroke="black"/>
                <path d="M 96,400 L 176,400" fill="none" stroke="black"/>
                <path d="M 96,480 L 176,480" fill="none" stroke="black"/>
                <path d="M 96,512 L 176,512" fill="none" stroke="black"/>
                <path d="M 8,560 L 136,560" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="144,472 132,466.4 132,477.6" fill="black" transform="rotate(90,136,472)"/>
                <polygon class="arrowhead" points="144,360 132,354.4 132,365.6" fill="black" transform="rotate(90,136,360)"/>
                <polygon class="arrowhead" points="144,264 132,258.4 132,269.6" fill="black" transform="rotate(90,136,264)"/>
                <polygon class="arrowhead" points="144,136 132,130.4 132,141.6" fill="black" transform="rotate(90,136,136)"/>
                <polygon class="arrowhead" points="96,48 84,42.4 84,53.6" fill="black" transform="rotate(0,88,48)"/>
                <g class="text">
                  <text x="136" y="52">YOUNG</text>
                  <text x="224" y="52">There's</text>
                  <text x="276" y="52">only</text>
                  <text x="312" y="52">one</text>
                  <text x="212" y="68">DTLS</text>
                  <text x="276" y="68">connection</text>
                  <text x="344" y="68">until</text>
                  <text x="216" y="84">aging</text>
                  <text x="276" y="84">criteria</text>
                  <text x="328" y="84">are</text>
                  <text x="360" y="84">met</text>
                  <text x="96" y="116">AGING</text>
                  <text x="180" y="116">REMOTE</text>
                  <text x="232" y="116">AGING</text>
                  <text x="132" y="164">AGED</text>
                  <text x="212" y="164">When</text>
                  <text x="244" y="164">in</text>
                  <text x="276" y="164">AGED</text>
                  <text x="320" y="164">state</text>
                  <text x="352" y="164">a</text>
                  <text x="208" y="180">new</text>
                  <text x="244" y="180">DTLS</text>
                  <text x="308" y="180">connection</text>
                  <text x="204" y="196">is</text>
                  <text x="240" y="196">added</text>
                  <text x="284" y="196">with</text>
                  <text x="312" y="196">a</text>
                  <text x="336" y="196">new</text>
                  <text x="384" y="196">Traffic</text>
                  <text x="432" y="196">DCI</text>
                  <text x="72" y="212">NEW</text>
                  <text x="108" y="212">DTLS</text>
                  <text x="212" y="212">Also</text>
                  <text x="240" y="212">a</text>
                  <text x="264" y="212">new</text>
                  <text x="324" y="212">connection</text>
                  <text x="384" y="212">for</text>
                  <text x="432" y="212">Restart</text>
                  <text x="220" y="228">SHOULD</text>
                  <text x="260" y="228">be</text>
                  <text x="296" y="228">added</text>
                  <text x="340" y="228">with</text>
                  <text x="368" y="228">a</text>
                  <text x="208" y="244">new</text>
                  <text x="256" y="244">Restart</text>
                  <text x="304" y="244">DCI</text>
                  <text x="136" y="292">OLD</text>
                  <text x="204" y="292">In</text>
                  <text x="232" y="292">OLD</text>
                  <text x="272" y="292">state</text>
                  <text x="320" y="292">there</text>
                  <text x="208" y="308">are</text>
                  <text x="232" y="308">2</text>
                  <text x="268" y="308">active</text>
                  <text x="316" y="308">DTLS</text>
                  <text x="384" y="308">connections</text>
                  <text x="224" y="324">Traffic</text>
                  <text x="268" y="324">is</text>
                  <text x="316" y="324">switched</text>
                  <text x="364" y="324">to</text>
                  <text x="392" y="324">the</text>
                  <text x="424" y="324">new</text>
                  <text x="456" y="324">one</text>
                  <text x="84" y="340">SWITCH</text>
                  <text x="136" y="388">DRAIN</text>
                  <text x="208" y="388">The</text>
                  <text x="244" y="388">aged</text>
                  <text x="284" y="388">DTLS</text>
                  <text x="348" y="388">connection</text>
                  <text x="204" y="404">is</text>
                  <text x="248" y="404">drained</text>
                  <text x="308" y="404">before</text>
                  <text x="360" y="404">being</text>
                  <text x="408" y="404">ready</text>
                  <text x="204" y="420">to</text>
                  <text x="228" y="420">be</text>
                  <text x="268" y="420">closed</text>
                  <text x="96" y="452">DRAINED</text>
                  <text x="164" y="452">DTLS</text>
                  <text x="236" y="452">close_notify</text>
                  <text x="132" y="500">DEAD</text>
                  <text x="204" y="500">In</text>
                  <text x="236" y="500">DEAD</text>
                  <text x="280" y="500">state</text>
                  <text x="320" y="500">the</text>
                  <text x="356" y="500">aged</text>
                  <text x="236" y="516">connection</text>
                  <text x="292" y="516">is</text>
                  <text x="332" y="516">closed</text>
                  <text x="88" y="548">REMOVED</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art"><![CDATA[
           +---------+
+--------->|  YOUNG  |  There's only one
|          +----+----+  DTLS connection until
|               |       aging criteria are met
|               |
|        AGING  |  REMOTE AGING
|               V
|          +---------+
|          |  AGED   |  When in AGED state a
|          +----+----+  new DTLS connection
|               |       is added with a new Traffic DCI
|      NEW DTLS |       Also a new connection for Restart
|               |       SHOULD be added with a
|               |       new Restart DCI
|               V
|          +---------+
|          |   OLD   |  In OLD state there
|          +----+----+  are 2 active DTLS connections
|               |       Traffic is switched to the new one
|      SWITCH   |
|               V
|          +---------+
|          |  DRAIN  |  The aged DTLS connection
|          +----+----+  is drained before being ready
|               |       to be closed
|               |
|       DRAINED | DTLS close_notify
|               V
|          +---------+
|          |  DEAD   |  In DEAD state the aged
|          +----+----+  connection is closed
|               |
|      REMOVED  |
+---------------+

]]></artwork>
          </artset>
        </figure>
        <t>Trigger for rekeying can either be a local AGING event, triggered by
the DTLS connection meeting the criteria for rekeying, or a REMOTE AGING
event, triggered by receiving a DTLS record on the Traffic DCI that would be
used for new DTLS connection. In such case a new DTLS connection
shall be added according to <xref target="add-dtls-connection"/> with a new Traffic DCI.</t>
        <t>As soon as the new DTLS connection completes handshaking, the traffic
is moved from the old one, then the procedure for closing the old DTLS
connection is initiated, see <xref target="remove-dtls-connection"/>.</t>
        <t>On Restart connection, trigger for rekeying can either be a local
AGING event, triggered by the DTLS connection meeting the criteria for
rekeying, or a REMOTE AGING event, triggered by receiving a DTLS
record on the Restart DCI that would be used for new DTLS
connection. In such case a new DTLS connection shall be added
according to <xref target="add-dtls-connection"/> with a new Restart DCI.</t>
      </section>
      <section anchor="race-condition-in-rekeying">
        <name>Race Condition in Rekeying</name>
        <t>A race condition may happen when both peer experience local AGING event at
the same time and start creation of a new DTLS connection.</t>
        <t>Since the criteria for calculating a new DCI is known and specified in
<xref target="add-dtls-connection"/>, the peers will use the same DCI for
identifying the new DTLS connection. And the race condition is solved
as specified in <xref target="add-dtls-connection"/>.</t>
      </section>
    </section>
    <section anchor="pmtu-discovery-considerations">
      <name>PMTU Discovery Considerations</name>
      <t>Due to the DTLS record limitation for application data SCTP MUST use
2<sup>14</sup> as input to determine absolute maximum MTU when running
PMTUD and using DTLS in SCTP.</t>
      <t>The implementor needs to handle the DTLS 1.3 record overhead. SCTP
PMTUD needs to include both the DTLS record as well as the DTLS chunk
overhead in this consideration and ensure that produced packets,
especially those that are not PMTUD probes do not become oversized.
The DTLS record size may change during the SCTP associations lifetime
due to future handshakes affecting cipher suit in use, or changes to
record layer configurations.</t>
      <t>Note that this implies that DTLS 1.3 is expected to
accept application data payloads of potentially larger sizes than what
it configured to use for messages the DTLS implementation generates
itself for signaling.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <section anchor="general-1">
        <name>General</name>
        <t>The security considerations given in <xref target="RFC9147"/>, <xref target="RFC6347"/>, and
<xref target="RFC9260"/> also apply to this document. BCP 195 <xref target="RFC9325"/>
          <xref target="RFC8996"/> provides recommendations and requirements for improving
the security of deployed services that use DTLS. BCP 195 MUST be
followed which implies that DTLS 1.0 SHALL NOT be supported and are
therefore not defined.</t>
      </section>
      <section anchor="privacy-considerations">
        <name>Privacy Considerations</name>
        <t>Although DTLS in SCTP provides privacy for the actual user message as
well as almost all chunks, some fields are not confidentiality
protected.  In addition to the DTLS record header, the SCTP common
header and the DTLS chunk header are not confidentiality
protected. An attacker can correlate DTLS connections over the same
SCTP association using the SCTP common header.</t>
        <t>To provide identity protection it is RECOMMENDED that DTLS in SCTP is
used with certificate-based authentication in DTLS 1.3 <xref target="RFC9147"/> and
to not reuse tickets.  DTLS 1.3 with external PSK
authentication does not provide identity protection.</t>
        <t>By mandating ephemeral key exchange and cipher suites with
confidentiality DTLS in SCTP effectively mitigate many forms of
passive pervasive monitoring.  By recommending implementations to
frequently set up new DTLS connections with (EC)DHE force attackers to
do dynamic key exfiltration and limits the amount of compromised data
due to key compromise.</t>
      </section>
    </section>
    <section anchor="iana-consideration">
      <name>IANA Consideration</name>
      <t>This document has no IANA considerations currently.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC4820" target="https://www.rfc-editor.org/info/rfc4820" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4820.xml">
          <front>
            <title>Padding Chunk and Parameter for the Stream Control Transmission Protocol (SCTP)</title>
            <author fullname="M. Tuexen" initials="M." surname="Tuexen"/>
            <author fullname="R. Stewart" initials="R." surname="Stewart"/>
            <author fullname="P. Lei" initials="P." surname="Lei"/>
            <date month="March" year="2007"/>
            <abstract>
              <t>This document defines a padding chunk and a padding parameter and describes the required receiver side procedures. The padding chunk is used to pad a Stream Control Transmission Protocol (SCTP) packet to an arbitrary size. The padding parameter is used to pad an SCTP INIT chunk to an arbitrary size. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4820"/>
          <seriesInfo name="DOI" value="10.17487/RFC4820"/>
        </reference>
        <reference anchor="RFC6347" target="https://www.rfc-editor.org/info/rfc6347" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6347.xml">
          <front>
            <title>Datagram Transport Layer Security Version 1.2</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="January" year="2012"/>
            <abstract>
              <t>This document specifies version 1.2 of the Datagram Transport Layer Security (DTLS) protocol. The DTLS protocol provides communications privacy for datagram protocols. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. The DTLS protocol is based on the Transport Layer Security (TLS) protocol and provides equivalent security guarantees. Datagram semantics of the underlying transport are preserved by the DTLS protocol. This document updates DTLS 1.0 to work with TLS version 1.2. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6347"/>
          <seriesInfo name="DOI" value="10.17487/RFC6347"/>
        </reference>
        <reference anchor="RFC8996" target="https://www.rfc-editor.org/info/rfc8996" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8996.xml">
          <front>
            <title>Deprecating TLS 1.0 and TLS 1.1</title>
            <author fullname="K. Moriarty" initials="K." surname="Moriarty"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <date month="March" year="2021"/>
            <abstract>
              <t>This document formally deprecates Transport Layer Security (TLS) versions 1.0 (RFC 2246) and 1.1 (RFC 4346). Accordingly, those documents have been moved to Historic status. These versions lack support for current and recommended cryptographic algorithms and mechanisms, and various government and industry profiles of applications using TLS now mandate avoiding these old TLS versions. TLS version 1.2 became the recommended version for IETF protocols in 2008 (subsequently being obsoleted by TLS version 1.3 in 2018), providing sufficient time to transition away from older versions. Removing support for older versions from implementations reduces the attack surface, reduces opportunity for misconfiguration, and streamlines library and product maintenance.</t>
              <t>This document also deprecates Datagram TLS (DTLS) version 1.0 (RFC 4347) but not DTLS version 1.2, and there is no DTLS version 1.1.</t>
              <t>This document updates many RFCs that normatively refer to TLS version 1.0 or TLS version 1.1, as described herein. This document also updates the best practices for TLS usage in RFC 7525; hence, it is part of BCP 195.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="195"/>
          <seriesInfo name="RFC" value="8996"/>
          <seriesInfo name="DOI" value="10.17487/RFC8996"/>
        </reference>
        <reference anchor="RFC9147" target="https://www.rfc-editor.org/info/rfc9147" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9147.xml">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="RFC9325" target="https://www.rfc-editor.org/info/rfc9325" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9325.xml">
          <front>
            <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="November" year="2022"/>
            <abstract>
              <t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are used to protect data exchanged over a wide range of application protocols and can also form the basis for secure transport protocols. Over the years, the industry has witnessed several serious attacks on TLS and DTLS, including attacks on the most commonly used cipher suites and their modes of operation. This document provides the latest recommendations for ensuring the security of deployed services that use TLS and DTLS. These recommendations are applicable to the majority of use cases.</t>
              <t>RFC 7525, an earlier version of the TLS recommendations, was published when the industry was transitioning to TLS 1.2. Years later, this transition is largely complete, and TLS 1.3 is widely available. This document updates the guidance given the new environment and obsoletes RFC 7525. In addition, this document updates RFCs 5288 and 6066 in view of recent attacks.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="195"/>
          <seriesInfo name="RFC" value="9325"/>
          <seriesInfo name="DOI" value="10.17487/RFC9325"/>
        </reference>
        <reference anchor="RFC9260" target="https://www.rfc-editor.org/info/rfc9260" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9260.xml">
          <front>
            <title>Stream Control Transmission Protocol</title>
            <author fullname="R. Stewart" initials="R." surname="Stewart"/>
            <author fullname="M. Tüxen" initials="M." surname="Tüxen"/>
            <author fullname="K. Nielsen" initials="K." surname="Nielsen"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>This document describes the Stream Control Transmission Protocol (SCTP) and obsoletes RFC 4960. It incorporates the specification of the chunk flags registry from RFC 6096 and the specification of the I bit of DATA chunks from RFC 7053. Therefore, RFCs 6096 and 7053 are also obsoleted by this document. In addition, RFCs 4460 and 8540, which describe errata for SCTP, are obsoleted by this document.</t>
              <t>SCTP was originally designed to transport Public Switched Telephone Network (PSTN) signaling messages over IP networks. It is also suited to be used for other applications, for example, WebRTC.</t>
              <t>SCTP is a reliable transport protocol operating on top of a connectionless packet network, such as IP. It offers the following services to its users:</t>
              <t>The design of SCTP includes appropriate congestion avoidance behavior and resistance to flooding and masquerade attacks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9260"/>
          <seriesInfo name="DOI" value="10.17487/RFC9260"/>
        </reference>
        <reference anchor="I-D.westerlund-tsvwg-sctp-dtls-chunk" target="https://datatracker.ietf.orghttps://datatracker.ietf.org/doc/draft-westerlund-tsvwg-sctp-dtls-chunk/">
          <front>
            <title>Stream Control Transmission Protocol (SCTP) DTLS chunk</title>
            <author initials="M." surname="Westerlund" fullname="Magnus Westerlund">
              <organization>Ericsson</organization>
            </author>
            <author initials="J." surname="Preuß Mattsson" fullname="John Preuß Mattsson">
              <organization>Ericsson</organization>
            </author>
            <author initials="C." surname="Porfiri" fullname="Claudio Porfiri">
              <organization>Ericsson</organization>
            </author>
            <date year="2024" month="July"/>
          </front>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC3758" target="https://www.rfc-editor.org/info/rfc3758" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3758.xml">
          <front>
            <title>Stream Control Transmission Protocol (SCTP) Partial Reliability Extension</title>
            <author fullname="R. Stewart" initials="R." surname="Stewart"/>
            <author fullname="M. Ramalho" initials="M." surname="Ramalho"/>
            <author fullname="Q. Xie" initials="Q." surname="Xie"/>
            <author fullname="M. Tuexen" initials="M." surname="Tuexen"/>
            <author fullname="P. Conrad" initials="P." surname="Conrad"/>
            <date month="May" year="2004"/>
            <abstract>
              <t>This memo describes an extension to the Stream Control Transmission Protocol (SCTP) that allows an SCTP endpoint to signal to its peer that it should move the cumulative ack point forward. When both sides of an SCTP association support this extension, it can be used by an SCTP implementation to provide partially reliable data transmission service to an upper layer protocol. This memo describes the protocol extensions, which consist of a new parameter for INIT and INIT ACK, and a new FORWARD TSN chunk type, and provides one example of a partially reliable service that can be provided to the upper layer via this mechanism. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3758"/>
          <seriesInfo name="DOI" value="10.17487/RFC3758"/>
        </reference>
        <reference anchor="RFC4895" target="https://www.rfc-editor.org/info/rfc4895" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4895.xml">
          <front>
            <title>Authenticated Chunks for the Stream Control Transmission Protocol (SCTP)</title>
            <author fullname="M. Tuexen" initials="M." surname="Tuexen"/>
            <author fullname="R. Stewart" initials="R." surname="Stewart"/>
            <author fullname="P. Lei" initials="P." surname="Lei"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2007"/>
            <abstract>
              <t>This document describes a new chunk type, several parameters, and procedures for the Stream Control Transmission Protocol (SCTP). This new chunk type can be used to authenticate SCTP chunks by using shared keys between the sender and receiver. The new parameters are used to establish the shared keys. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4895"/>
          <seriesInfo name="DOI" value="10.17487/RFC4895"/>
        </reference>
        <reference anchor="RFC5061" target="https://www.rfc-editor.org/info/rfc5061" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5061.xml">
          <front>
            <title>Stream Control Transmission Protocol (SCTP) Dynamic Address Reconfiguration</title>
            <author fullname="R. Stewart" initials="R." surname="Stewart"/>
            <author fullname="Q. Xie" initials="Q." surname="Xie"/>
            <author fullname="M. Tuexen" initials="M." surname="Tuexen"/>
            <author fullname="S. Maruyama" initials="S." surname="Maruyama"/>
            <author fullname="M. Kozuka" initials="M." surname="Kozuka"/>
            <date month="September" year="2007"/>
            <abstract>
              <t>A local host may have multiple points of attachment to the Internet, giving it a degree of fault tolerance from hardware failures. Stream Control Transmission Protocol (SCTP) (RFC 4960) was developed to take full advantage of such a multi-homed host to provide a fast failover and association survivability in the face of such hardware failures. This document describes an extension to SCTP that will allow an SCTP stack to dynamically add an IP address to an SCTP association, dynamically delete an IP address from an SCTP association, and to request to set the primary address the peer will use when sending to an endpoint. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5061"/>
          <seriesInfo name="DOI" value="10.17487/RFC5061"/>
        </reference>
        <reference anchor="RFC6083" target="https://www.rfc-editor.org/info/rfc6083" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6083.xml">
          <front>
            <title>Datagram Transport Layer Security (DTLS) for Stream Control Transmission Protocol (SCTP)</title>
            <author fullname="M. Tuexen" initials="M." surname="Tuexen"/>
            <author fullname="R. Seggelmann" initials="R." surname="Seggelmann"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="January" year="2011"/>
            <abstract>
              <t>This document describes the usage of the Datagram Transport Layer Security (DTLS) protocol over the Stream Control Transmission Protocol (SCTP).</t>
              <t>DTLS over SCTP provides communications privacy for applications that use SCTP as their transport protocol and allows client/server applications to communicate in a way that is designed to prevent eavesdropping and detect tampering or message forgery.</t>
              <t>Applications using DTLS over SCTP can use almost all transport features provided by SCTP and its extensions. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6083"/>
          <seriesInfo name="DOI" value="10.17487/RFC6083"/>
        </reference>
        <reference anchor="I-D.ietf-tls-rfc8446bis" target="https://datatracker.ietf.org/doc/html/draft-ietf-tls-rfc8446bis-10" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-tls-rfc8446bis.xml">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Windy Hill Systems, LLC</organization>
            </author>
            <date day="3" month="March" year="2024"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery. This document updates RFCs 5705, 6066, 7627, and 8422 and obsoletes RFCs 5077, 5246, 6961, and 8446. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8446bis-10"/>
        </reference>
        <reference anchor="I-D.ietf-tsvwg-dtls-over-sctp-bis" target="https://datatracker.ietf.org/doc/html/draft-ietf-tsvwg-dtls-over-sctp-bis-08" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-tsvwg-dtls-over-sctp-bis.xml">
          <front>
            <title>Datagram Transport Layer Security (DTLS) over Stream Control Transmission Protocol (SCTP)</title>
            <author fullname="Magnus Westerlund" initials="M." surname="Westerlund">
              <organization>Ericsson</organization>
            </author>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Claudio Porfiri" initials="C." surname="Porfiri">
              <organization>Ericsson</organization>
            </author>
            <date day="3" month="May" year="2024"/>
            <abstract>
              <t>This document describes the usage of the Datagram Transport Layer Security (DTLS) protocol to protect user messages sent over the Stream Control Transmission Protocol (SCTP). It is an improved alternative to the existing RFC 6083. DTLS over SCTP provides mutual authentication, confidentiality, integrity protection, and partial replay protection for applications that use SCTP as their transport protocol and allows client/server applications to communicate in a way that is designed to give communications privacy and to prevent eavesdropping and detect tampering or message forgery. Applications using DTLS over SCTP can use almost all transport features provided by SCTP and its extensions. This document is an improved alternative to RFC 6083 and removes the 16 kbytes limitation on protected user message size by defining a secure user message fragmentation so that multiple DTLS records can be used to protect a single user message. It further contains a large number of security fixes and improvements. It updates the DTLS versions and SCTP-AUTH HMAC algorithms to use. It mitigates reflection attacks of data and control chunks and replay attacks of data chunks. It simplifies secure implementation by some stricter requirements on the establishment procedures as well as rekeying to align with zero trust principles.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tsvwg-dtls-over-sctp-bis-08"/>
        </reference>
        <reference anchor="I-D.ietf-uta-rfc6125bis" target="https://datatracker.ietf.org/doc/html/draft-ietf-uta-rfc6125bis-15" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-uta-rfc6125bis.xml">
          <front>
            <title>Service Identity in TLS</title>
            <author fullname="Peter Saint-Andre" initials="P." surname="Saint-Andre">
              <organization>independent</organization>
            </author>
            <author fullname="Rich Salz" initials="R." surname="Salz">
              <organization>Akamai Technologies</organization>
            </author>
            <date day="10" month="August" year="2023"/>
            <abstract>
              <t>Many application technologies enable secure communication between two entities by means of Transport Layer Security (TLS) with Internet Public Key Infrastructure Using X.509 (PKIX) certificates. This document specifies procedures for representing and verifying the identity of application services in such interactions. This document obsoletes RFC 6125.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-uta-rfc6125bis-15"/>
        </reference>
        <reference anchor="I-D.mattsson-tls-super-jumbo-record-limit" target="https://datatracker.ietf.org/doc/html/draft-mattsson-tls-super-jumbo-record-limit-02" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.mattsson-tls-super-jumbo-record-limit.xml">
          <front>
            <title>Large Record Sizes for TLS and DTLS</title>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>Siemens</organization>
            </author>
            <author fullname="Michael Tüxen" initials="M." surname="Tüxen">
              <organization>Münster Univ. of Applied Sciences</organization>
            </author>
            <date day="4" month="March" year="2024"/>
            <abstract>
              <t>RFC 8449 defines a record size limit extension for TLS and DTLS allowing endpoints to negotiate a record size limit smaller than the protocol-defined maximum record size, which is around 2^14 bytes. This document specifies a TLS flag extension to be used in combination with the record size limit extension allowing endpoints to use a record size limit larger than the protocol-defined maximum record size, but not more than about 2^16 bytes.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-mattsson-tls-super-jumbo-record-limit-02"/>
        </reference>
        <reference anchor="ANSSI-DAT-NT-003" target="&lt;https://www.ssi.gouv.fr/uploads/2015/09/NT_IPsec_EN.pdf&gt;">
          <front>
            <title>Recommendations for securing networks with IPsec</title>
            <author initials="" surname="Agence nationale de la sécurité des systèmes d'information">
              <organization/>
            </author>
            <date year="2015" month="August"/>
          </front>
          <seriesInfo name="ANSSI Technical Report DAT-NT-003" value=""/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
