| rfc9266.original.xml | rfc9266.xml | |||
|---|---|---|---|---|
| <?xml version='1.0' encoding='utf-8'?> | <?xml version="1.0" encoding="UTF-8"?> | |||
| <!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent" [ | ||||
| <!ENTITY docName "draft-ietf-kitten-tls-channel-bindings-for-tls13-16"> | <!DOCTYPE rfc [ | |||
| ]> | <!ENTITY nbsp " "> | |||
| <!ENTITY zwsp "​"> | ||||
| <!ENTITY nbhy "‑"> | ||||
| <!ENTITY wj "⁠"> | ||||
| ]> | ||||
| <rfc xmlns:xi="http://www.w3.org/2001/XInclude" | <rfc xmlns:xi="http://www.w3.org/2001/XInclude" | |||
| ipr="trust200902" | ipr="trust200902" | |||
| docName="&docName;" | docName="draft-ietf-kitten-tls-channel-bindings-for-tls13" | |||
| number="9266" | ||||
| obsoletes="" | obsoletes="" | |||
| updates="5801, 5802, 5929, 7677" | updates="5801, 5802, 5929, 7677" | |||
| submissionType="IETF" | submissionType="IETF" | |||
| category="std" | category="std" | |||
| consensus="true" | consensus="true" | |||
| xml:lang="en" | xml:lang="en" | |||
| tocInclude="true" | tocInclude="true" | |||
| symRefs="true" | symRefs="true" | |||
| sortRefs="true" | sortRefs="true" | |||
| version="3"> | version="3"> | |||
| skipping to change at line 18 ¶ | skipping to change at line 24 ¶ | |||
| obsoletes="" | obsoletes="" | |||
| updates="5801, 5802, 5929, 7677" | updates="5801, 5802, 5929, 7677" | |||
| submissionType="IETF" | submissionType="IETF" | |||
| category="std" | category="std" | |||
| consensus="true" | consensus="true" | |||
| xml:lang="en" | xml:lang="en" | |||
| tocInclude="true" | tocInclude="true" | |||
| symRefs="true" | symRefs="true" | |||
| sortRefs="true" | sortRefs="true" | |||
| version="3"> | version="3"> | |||
| <front> | <front> | |||
| <title abbrev="">Channel Bindings for TLS 1.3</title> | <title abbrev="">Channel Bindings for TLS 1.3</title> | |||
| <seriesInfo name="Internet-Draft" value="&docName;"/> | <seriesInfo name="RFC" value="9266"/> | |||
| <author initials="S" surname="Whited" fullname="Sam Whited"> | <author initials="S" surname="Whited" fullname="Sam Whited"> | |||
| <organization/> | <organization/> | |||
| <address> | <address> | |||
| <postal> | <postal> | |||
| <street/> | <street/> | |||
| <city>Atlanta</city> | <city>Atlanta</city> | |||
| <code>GA</code> | <region>GA</region> | |||
| <country>USA</country> | <country>United States of America</country> | |||
| <region/> | <region/> | |||
| </postal> | </postal> | |||
| <phone/> | <phone/> | |||
| <email>sam@samwhited.com</email> | <email>sam@samwhited.com</email> | |||
| <uri>https://blog.samwhited.com/</uri> | <uri>https://blog.samwhited.com/</uri> | |||
| </address> | </address> | |||
| </author> | </author> | |||
| <date year="2022" month="May" day="04"/> | <date year="2022" month="July"/> | |||
| <area>Internet</area> | ||||
| <workgroup>Transport Layer Security</workgroup> | <area>sec</area> | |||
| <workgroup>kitten</workgroup> | ||||
| <abstract> | <abstract> | |||
| <t> | <t> | |||
| This document defines a channel binding type, tls-exporter, that is | This document defines a channel binding type, tls-exporter, that is | |||
| compatible with TLS 1.3 in accordance with RFC 5056, On Channel Binding. | compatible with TLS 1.3 in accordance with RFC 5056, "On the Use of | |||
| Furthermore, it updates the default channel binding to the new binding | Channel Bindings to Secure Channels". Furthermore, it updates the | |||
| for versions of TLS greater than 1.2. | default channel binding to the new binding for versions of TLS greater | |||
| This document updates RFC5801, RFC5802, RFC5929, and RFC7677. | than 1.2. This document updates RFCs 5801, 5802, 5929, and 7677. | |||
| </t> | </t> | |||
| </abstract> | </abstract> | |||
| </front> | </front> | |||
| <middle> | <middle> | |||
| <section anchor="introduction" numbered="true" toc="default"> | <section anchor="introduction" numbered="true" toc="default"> | |||
| <name>Introduction</name> | <name>Introduction</name> | |||
| <t> | <t> | |||
| The "tls-unique" channel binding type defined in | The "tls-unique" channel binding type defined in | |||
| <xref target="RFC5929"/> was found to be vulnerable to the "triple | <xref target="RFC5929"/> was found to be susceptible to the "triple | |||
| handshake vulnerability" <xref target="TRIPLE-HANDSHAKE"/> without the | handshake vulnerability" <xref target="TRIPLE-HANDSHAKE"/> without the | |||
| extended master secret extension defined in <xref target="RFC7627"/>. | extended master secret extension defined in <xref target="RFC7627"/>. | |||
| While TLS 1.3 uses a complete transcript hash akin to the extended | While TLS 1.3 uses a complete transcript hash akin to the extended | |||
| master secret procedures, the safety of channel bindings with TLS 1.3 | master secret procedures, the safety of channel bindings with TLS 1.3 | |||
| was not analyzed as part of the core protocol work, and so the | was not analyzed as part of the core protocol work, so the | |||
| specification of channel bindings for TLS 1.3 was deferred. | specification of channel bindings for TLS 1.3 was deferred. | |||
| <xref target="RFC8446"/> section C.5 notes the lack of channel bindings | <xref target="RFC8446" sectionFormat="of" section="C.5"/> notes the lack | |||
| for TLS 1.3; this document defines such channel bindings, and fills that | of channel bindings | |||
| for TLS 1.3; this document defines such channel bindings and fills that | ||||
| gap. | gap. | |||
| Furthermore, this document updates <xref target="RFC5929"/> by adding an | Furthermore, this document updates <xref target="RFC5929"/> by adding an | |||
| additional unique channel binding type, "tls-exporter", that replaces | additional unique channel binding type, "tls-exporter", that replaces | |||
| some usage of "tls-unique". | some usage of "tls-unique". | |||
| </t> | </t> | |||
| <section anchor="conventions-and-terminology" numbered="true" toc="default "> | <section anchor="conventions-and-terminology" numbered="true" toc="default "> | |||
| <name>Conventions and Terminology</name> | <name>Conventions and Terminology</name> | |||
| <t> | <t> | |||
| Throughout this document the acronym "EKM" is used to refer to | Throughout this document, the acronym "EKM" is used to refer to | |||
| Exported Keying Material as defined in <xref target="RFC5705"/>. | "Exported Keying Material" as defined in <xref target="RFC5705"/>. | |||
| </t> | </t> | |||
| <t> | <t> | |||
| The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQU | |||
| "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and | IRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL | |||
| "OPTIONAL" in this document are to be interpreted as described in BCP | NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14> | |||
| 14 <xref target="RFC2119" format="default"/> <xref target="RFC8174" | RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>", | |||
| format="default"/> when, and only when, they appear in all capitals, | "<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to | |||
| as shown here. | be interpreted as | |||
| described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> | ||||
| when, and only when, they appear in all capitals, as shown here. | ||||
| </t> | </t> | |||
| </section> | </section> | |||
| </section> | </section> | |||
| <section anchor="tls-exporter" numbered="true" toc="default"> | <section anchor="tls-exporter" numbered="true" toc="default"> | |||
| <name>The 'tls-exporter' Channel Binding Type</name> | <name>The 'tls-exporter' Channel Binding Type</name> | |||
| <t> | <t> | |||
| Channel binding mechanisms are not useful until TLS implementations | Channel binding mechanisms are not useful until TLS implementations | |||
| expose the required data. | expose the required data. To facilitate this, "tls-exporter" uses | |||
| To facilitate this, "tls-exporter" uses exported keying material (EKM) | Exported Keying Material (EKM), which is already widely exposed by TLS | |||
| which is already widely exposed by TLS implementations. | implementations. The EKM is obtained using the keying material | |||
| The EKM is obtained using the keying material exporters for TLS as | exporters for TLS, as defined in <xref target="RFC5705"/> and <xref | |||
| defined in <xref target="RFC5705"/> and <xref target="RFC8446"/> section | target="RFC8446" sectionFormat="of" section="7.5"/>, by supplying the | |||
| 7.5 by supplying the following inputs: | following inputs: | |||
| </t> | </t> | |||
| <dl> | <dl> | |||
| <dt>Label:</dt> | <dt>Label:</dt> | |||
| <dd> | <dd> | |||
| The ASCII string "EXPORTER-Channel-Binding" with no terminating NUL. | The ASCII string "EXPORTER-Channel-Binding" with no terminating NUL. | |||
| </dd> | </dd> | |||
| <dt>Context value:</dt> | <dt>Context value:</dt> | |||
| <dd> | <dd> | |||
| Zero-length string. | Zero-length string. | |||
| </dd> | </dd> | |||
| <dt>Length:</dt> | <dt>Length:</dt> | |||
| <dd> | <dd> | |||
| 32 bytes. | 32 bytes. | |||
| </dd> | </dd> | |||
| </dl> | </dl> | |||
| <t> | <t> | |||
| This channel binding mechanism is defined only when the TLS handshake | This channel binding mechanism is defined only when the TLS handshake | |||
| results in unique master secrets. This is true of TLS versions prior to | results in unique master secrets. This is true of TLS versions prior to | |||
| 1.3 when the extended master secret extension of | 1.3 when the extended master secret extension of | |||
| <xref target="RFC7627"/> is in use, and is always true for TLS 1.3 | <xref target="RFC7627"/> is in use, and it is always true for TLS 1.3 | |||
| (see <xref target="RFC8446"/> appendix D). | (see <xref target="RFC8446" sectionFormat="of" section="D"/>). | |||
| </t> | </t> | |||
| </section> | </section> | |||
| <section anchor="scram" numbered="true" toc="default"> | <section anchor="scram" numbered="true" toc="default"> | |||
| <name>TLS 1.3 with SCRAM or GSS-API over SASL</name> | <name>TLS 1.3 with SCRAM or GSS-API over SASL</name> | |||
| <t> | <t> | |||
| SCRAM | The specifications for Salted Challenge Response Authentication Mechanis | |||
| (<xref target="RFC5802"/>, and <xref target="RFC7677"/>) | m (SCRAM) <xref | |||
| and GSS-API over SASL <xref target="RFC5801"/> | target="RFC5802"/> <xref target="RFC7677"/> and Generic Security | |||
| Service Application Program Interface (GSS-API) over Simple | ||||
| Authentication and Security Layer (SASL) <xref target="RFC5801"/> | ||||
| define "tls-unique" as the default channel binding to use over TLS. | define "tls-unique" as the default channel binding to use over TLS. | |||
| As "tls-unique" is not defined for TLS 1.3 (and greater), this document | As "tls-unique" is not defined for TLS 1.3 (and greater), this | |||
| updates <xref target="RFC5801"/>, <xref target="RFC5802"/>, and | document updates <xref target="RFC5801"/>, <xref target="RFC5802"/>, | |||
| <xref target="RFC7677"/> to use "tls-exporter" as the default channel | and <xref target="RFC7677"/> to use "tls-exporter" as the default | |||
| binding over TLS 1.3 (and greater). | channel binding over TLS 1.3 (and greater). | |||
| Note that this document does not change the default channel binding | Note that this document does not change the default channel | |||
| for SCRAM mechanisms over TLS 1.2 <xref target="RFC5246"/>, which is | binding for SCRAM mechanisms over TLS 1.2 <xref target="RFC5246"/>, | |||
| still "tls-unique". | which is still "tls-unique" (also note that RFC 5246 has been obsoleted | |||
| by RFC 8446). | ||||
| </t> | </t> | |||
| <t> | <t> | |||
| Additionally, this document updates the aforementioned documents to make | Additionally, this document updates the aforementioned documents to make | |||
| "tls-exporter" the mandatory to implement channel binding if any channel | "tls-exporter" the mandatory-to-implement channel binding if any channel | |||
| bindings are implemented for TLS 1.3. | bindings are implemented for TLS 1.3. | |||
| Implementations that support channel binding over TLS 1.3 | Implementations that support channel binding over TLS 1.3 | |||
| <bcp14>MUST</bcp14> implement "tls-exporter". | <bcp14>MUST</bcp14> implement "tls-exporter". | |||
| </t> | </t> | |||
| </section> | </section> | |||
| <section anchor="security-considerations" numbered="true" toc="default"> | <section anchor="security-considerations" numbered="true" toc="default"> | |||
| <name>Security Considerations</name> | <name>Security Considerations</name> | |||
| <t> | <t> | |||
| The channel binding type defined in this document is constructed so that | The channel binding type defined in this document is constructed so that | |||
| disclosure of the channel binding data does not leak secret information | disclosure of the channel binding data does not leak secret information | |||
| about the TLS channel and does not affect the security of the TLS | about the TLS channel and does not affect the security of the TLS | |||
| channel. | channel. | |||
| </t> | </t> | |||
| <t> | <t> | |||
| The derived data <bcp14>MUST NOT</bcp14> be used for any purpose other | The derived data <bcp14>MUST NOT</bcp14> be used for any purpose other | |||
| than channel bindings as described in <xref target="RFC5056"/>. | than channel bindings as described in <xref target="RFC5056"/>. | |||
| In particular, implementations MUST NOT use channel binding as a | In particular, implementations <bcp14>MUST NOT</bcp14> use channel bindi ng as a | |||
| secret key to protect privileged information. | secret key to protect privileged information. | |||
| </t> | </t> | |||
| <t> | <t> | |||
| The Security Considerations sections of <xref target="RFC5056"/>, <xref | The Security Considerations sections of <xref target="RFC5056"/>, <xref | |||
| target="RFC5705"/>, and <xref target="RFC8446"/> apply to this document. | target="RFC5705"/>, and <xref target="RFC8446"/> apply to this document. | |||
| </t> | </t> | |||
| <section anchor="unique-bindings" numbered="true" toc="default"> | <section anchor="unique-bindings" numbered="true" toc="default"> | |||
| <name>Uniqueness of Channel Bindings</name> | <name>Uniqueness of Channel Bindings</name> | |||
| <t> | <t> | |||
| The definition of channel bindings in <xref target="RFC5056"/> | The definition of channel bindings in <xref target="RFC5056"/> | |||
| defines the concept of a "unique" channel binding as being one that | defines the concept of a "unique" channel binding as being one that | |||
| is unique to the channel endpoints and unique over time, that is, | is unique to the channel endpoints and unique over time, that is, | |||
| a value that is unique to a specific instance of the lower layer | a value that is unique to a specific instance of the lower-layer | |||
| security protocol. | security protocol. | |||
| When TLS is the lower layer security protocol, as for the channel | When TLS is the lower-layer security protocol, as for the channel bind | |||
| binding type defined in this document, this concept of uniqueness | ing | |||
| type defined in this document, this concept of uniqueness | ||||
| corresponds to uniquely identifying the specific TLS connection. | corresponds to uniquely identifying the specific TLS connection. | |||
| </t> | </t> | |||
| <t> | <t> | |||
| However, a stronger form of uniqueness is possible, which would entail | However, a stronger form of uniqueness is possible, which would entail | |||
| uniquely identifying not just the lower layer protocol but also the | uniquely identifying not just the lower-layer protocol but also the | |||
| upper layer application or authentication protocol that is consuming | upper-layer application or authentication protocol that is consuming | |||
| the channel binding. | the channel binding. | |||
| The distinction is relevant only when there are multiple instances of | The distinction is relevant only when there are multiple instances of | |||
| an authentication protocol, or multiple distinct authentication | an authentication protocol, or multiple distinct authentication | |||
| protocols, that run atop the same lower layer protocol. | protocols, that run atop the same lower-layer protocol. | |||
| Such a situation is rare -- most consumers of channel bindings | Such a situation is rare; most consumers of channel bindings | |||
| establish an instance of the lower layer secure protocol, run a single | establish an instance of the lower-layer secure protocol, run a single | |||
| application or authentication protocol as the upper layer protocol, | application or authentication protocol as the upper-layer protocol, | |||
| then terminate both upper and lower layer protocols. | then terminate both upper and lower-layer protocols. | |||
| In this situation the stronger form of uniqueness is trivially | In this situation, the stronger form of uniqueness is trivially | |||
| achieved, given that the channel binding value is unique in the sense | achieved, given that the channel binding value is unique in the sense | |||
| of <xref target="RFC5056"/>. | of <xref target="RFC5056"/>. | |||
| </t> | </t> | |||
| <t> | <t> | |||
| The channel binding type defined by this document provides only the | The channel binding type defined by this document provides only the | |||
| weaker type of uniqueness, as per <xref target="RFC5056"/>; it does | weaker type of uniqueness, as per <xref target="RFC5056"/>; it does | |||
| not achieve the stronger uniqueness per upper layer protocol instance | not achieve the stronger uniqueness per the upper-layer protocol | |||
| described above. | instance described above. This stronger form of uniqueness would be | |||
| This stronger form of uniqueness would be useful in that it provides | useful in that it provides protection against cross-protocol attacks | |||
| protection against cross-protocol attacks for the multiple | for the multiple authentication protocols running over the same | |||
| authentication protocols running over the same instance of the lower | instance of the lower-layer protocol, and it provides protection | |||
| layer protocol, and it provides protection against replay attacks that | against replay attacks that seek to replay a message from one | |||
| seek to replay a message from one instance of an authentication | instance of an authentication protocol in a different instance of | |||
| protocol in a different instance of the same authentication protocol, | the same authentication protocol, again running over the same | |||
| again running over the same instance of the lower layer protocol. | instance of the lower-layer protocol. Both of these properties are | |||
| Both of these properties are highly desirable when performing formal | highly desirable when performing formal analysis of upper-layer | |||
| analysis of upper layer protocols; if these properties are not | protocols; if these properties are not provided, such formal | |||
| provided, such formal analysis is essentially impossible. | analysis is essentially impossible. In some cases, one or both of | |||
| In some cases one or both of these properties may already be provided | these properties may already be provided by specific upper-layer | |||
| by specific upper layer protocols, but that is dependent on the | protocols, but that is dependent on the mechanism(s) in question, | |||
| mechanism(s) in question, and formal analysis requires that the | and formal analysis requires that the property is provided in a | |||
| property is provided in a generic manner, across all potential upper | generic manner across all potential upper-layer protocols that | |||
| layer protocols that exist or might exist in the future. | exist or might exist in the future. | |||
| </t> | </t> | |||
| <t> | <t> | |||
| Accordingly, applications that make use of the channel binding type | Accordingly, applications that make use of the channel binding type | |||
| defined in this document <bcp14>MUST NOT</bcp14> use the channel | defined in this document <bcp14>MUST NOT</bcp14> use the channel | |||
| binding for more than one authentication mechanism instance on a given | binding for more than one authentication mechanism instance on a given | |||
| TLS connection. | TLS connection. | |||
| Such applications <bcp14>MUST</bcp14> immediately close the TLS | Such applications <bcp14>MUST</bcp14> immediately close the TLS | |||
| connection after the conclusion of the upper layer protocol. | connection after the conclusion of the upper-layer protocol. | |||
| </t> | </t> | |||
| </section> | </section> | |||
| <section anchor="legacy-tls" numbered="true" toc="default"> | <section anchor="legacy-tls" numbered="true" toc="default"> | |||
| <name>Use with Legacy TLS</name> | <name>Use with Legacy TLS</name> | |||
| <t> | <t> | |||
| While it is possible to use this channel binding mechanism with TLS | While it is possible to use this channel binding mechanism with TLS | |||
| versions below 1.3, extra precaution must be taken to ensure that the | versions below 1.3, extra precaution must be taken to ensure that | |||
| chosen cipher suites always result in unique master secrets. | the chosen cipher suites always result in unique master secrets. | |||
| For more information see <xref target="RFC7627"/> and the Security | For more information, see <xref target="RFC7627"/> and the Security | |||
| Considerations section of <xref target="RFC5705"/> (TLS 1.3 always | Considerations section of <xref target="RFC5705"/> (TLS 1.3 always | |||
| provides unique master secrets, as discussed in Appendix D of | provides unique master secrets, as discussed in <xref | |||
| <xref target="RFC8446"/>.) | target="RFC8446" sectionFormat="of" section="D"/>). | |||
| </t> | </t> | |||
| <t> | <t> | |||
| When TLS renegotiation is enabled on a connection the "tls-exporter" | When TLS renegotiation is enabled on a connection, the "tls-exporter" | |||
| channel binding type is not defined for that connection and | channel binding type is not defined for that connection, and | |||
| implementations <bcp14>MUST NOT</bcp14> support it. | implementations <bcp14>MUST NOT</bcp14> support it. | |||
| </t> | </t> | |||
| <t> | <t> | |||
| In general, users wishing to take advantage of channel binding should | In general, users wishing to take advantage of channel binding should | |||
| upgrade to TLS 1.3 or later. | upgrade to TLS 1.3 or later. | |||
| </t> | </t> | |||
| </section> | </section> | |||
| </section> | </section> | |||
| <section anchor="iana-considerations" numbered="true" toc="default"> | <section anchor="iana-considerations" numbered="true" toc="default"> | |||
| <name>IANA Considerations</name> | <name>IANA Considerations</name> | |||
| <section anchor="cb-type-registration" numbered="true" toc="default"> | <section anchor="cb-type-registration" numbered="true" toc="default"> | |||
| <name>Registration of Channel Binding Type</name> | <name>Registration of Channel Binding Type</name> | |||
| <t> | <t> | |||
| This document adds the following registration in the "Channel-Binding | IANA has registered tls-exporter in the "Channel-Binding | |||
| Types" registry: | Types" registry: | |||
| </t> | </t> | |||
| <dl> | <dl> | |||
| <dt>Subject:</dt> | <dt>Channel-binding unique prefix:</dt> | |||
| <dd>Registration of channel binding tls-exporter</dd> | ||||
| <dt>Channel binding unique prefix:</dt> | ||||
| <dd>tls-exporter</dd> | <dd>tls-exporter</dd> | |||
| <dt>Channel binding type:</dt> | <dt>Channel-binding type:</dt> | |||
| <dd>unique</dd> | <dd>unique</dd> | |||
| <dt>Channel type:</dt> | <dt>Channel type:</dt> | |||
| <dd><xref target="RFC8446">TLS</xref></dd> | <dd>TLS <xref target="RFC8446"/></dd> | |||
| <dt>Published specification:</dt> | <dt>Published specification:</dt> | |||
| <dd>&docName;</dd> | <dd>RFC 9266</dd> | |||
| <dt>Channel binding is secret:</dt> | <dt>Channel-binding is secret:</dt> | |||
| <dd>no</dd> | <dd>no</dd> | |||
| <dt>Description:</dt> | <dt>Description:</dt> | |||
| <dd>The EKM value obtained from the current TLS connection.</dd> | <dd>The EKM value obtained from the current TLS connection.</dd> | |||
| <dt>Intended usage:</dt> | <dt>Intended usage:</dt> | |||
| <dd>COMMON</dd> | <dd>COMMON</dd> | |||
| <dt> | <dt> | |||
| Person and email address to contact for further information: | Person and email address to contact for further information: | |||
| </dt> | </dt> | |||
| <dd>Sam Whited <sam@samwhited.com>.</dd> | <dd>Sam Whited <sam@samwhited.com></dd> | |||
| <dt>Owner/Change controller name and email address:</dt> | <dt>Owner/Change controller name and email address:</dt> | |||
| <dd>IESG.</dd> | <dd>IESG</dd> | |||
| <dt>Expert reviewer name and contact information:</dt> | <dt>Expert reviewer name and contact information:</dt> | |||
| <dd> | <dd> | |||
| IETF KITTEN or TLS WG (kitten@ietf.org or tls@ietf.org, failing | IETF KITTEN WG <kitten@ietf.org> or IETF TLS WG <tls@ietf.o | |||
| that, ietf@ietf.org). | rg> | |||
| </dd> | </dd> | |||
| <dt>Note:</dt> | <dt>Note:</dt> | |||
| <dd> | <dd> | |||
| See the published specification for advice on the applicability of | See the published specification for advice on the applicability of | |||
| this channel binding type. | this channel binding type. | |||
| </dd> | </dd> | |||
| </dl> | </dl> | |||
| </section> | </section> | |||
| <section anchor="exporter-registration" numbered="true" toc="default"> | <section anchor="exporter-registration" numbered="true" toc="default"> | |||
| <name>Registration of Channel Binding TLS Exporter Label</name> | <name>Registration of Channel Binding TLS Exporter Label</name> | |||
| <t> | <t> | |||
| This document adds the following registration in the "TLS Exporter | IANA has added the following registration in the "TLS Exporter | |||
| Labels" registry, which is part of the "Transport Layer Security (TLS) | Labels" registry under the "Transport Layer Security (TLS) | |||
| Parameters" group: | Parameters" registry: | |||
| </t> | </t> | |||
| <dl> | <dl> | |||
| <dt>Value:</dt> | <dt>Value:</dt> | |||
| <dd>EXPORTER-Channel-Binding</dd> | <dd>EXPORTER-Channel-Binding</dd> | |||
| <dt>DTLS-OK:</dt> | <dt>DTLS-OK:</dt> | |||
| <dd>Y</dd> | <dd>Y</dd> | |||
| <dt>Recommended:</dt> | <dt>Recommended:</dt> | |||
| <dd>Y</dd> | <dd>Y</dd> | |||
| <dt>Reference:</dt> | <dt>Reference:</dt> | |||
| <dd>This document</dd> | <dd>RFC 9266</dd> | |||
| </dl> | </dl> | |||
| </section> | </section> | |||
| </section> | </section> | |||
| </middle> | </middle> | |||
| <back> | <back> | |||
| <references> | <references> | |||
| <name>References</name> | <name>References</name> | |||
| <references> | <references> | |||
| <name>Normative References</name> | <name>Normative References</name> | |||
| <xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.2 119.xml"/> | <xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.2 119.xml"/> | |||
| skipping to change at line 320 ¶ | skipping to change at line 329 ¶ | |||
| <xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.5 802.xml"/> | <xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.5 802.xml"/> | |||
| <xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.5 929.xml"/> | <xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.5 929.xml"/> | |||
| <xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.7 677.xml"/> | <xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.7 677.xml"/> | |||
| <xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.8 174.xml"/> | <xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.8 174.xml"/> | |||
| <xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.8 446.xml"/> | <xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.8 446.xml"/> | |||
| </references> | </references> | |||
| <references> | <references> | |||
| <name>Informative References</name> | <name>Informative References</name> | |||
| <xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.5 246.xml"/> | <xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.5 246.xml"/> | |||
| <xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.7 627.xml"/> | <xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.7 627.xml"/> | |||
| <reference anchor="TRIPLE-HANDSHAKE" target="https://www.mitls.org/pages | ||||
| /attacks/3SHAKE"> | <reference anchor="TRIPLE-HANDSHAKE" target="https://www.mitls.org/pages/attacks | |||
| /3SHAKE"> | ||||
| <front> | <front> | |||
| <title>Password Storage</title> | <title>Triple Handshakes Considered Harmful: Breaking and Fixing Aut hentication over TLS</title> | |||
| <author initials="K." surname="Bhargavan"/> | <author initials="K." surname="Bhargavan"/> | |||
| <author initials="A." surname="Delignat-Lavaud"/> | <author initials="A." surname="Delignat-Lavaud"/> | |||
| <author initials="C." surname="Fournet"/> | <author initials="C." surname="Fournet"/> | |||
| <author initials="A." surname="Pironti"/> | <author initials="A." surname="Pironti"/> | |||
| <author initials="P." surname="Strub"/> | <author initials="P." surname="Strub"/> | |||
| <date year="2014" month="March"/> | <date year="2014" month="March"/> | |||
| </front> | </front> | |||
| </reference> | </reference> | |||
| </references> | </references> | |||
| </references> | </references> | |||
| End of changes. 42 change blocks. | ||||
| 103 lines changed or deleted | 120 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||