<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.0.39 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc docmapping="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-quic-tls-00" category="std">

  <front>
    <title abbrev="QUIC over TLS">Using Transport Layer Security (TLS) to Secure QUIC</title>

    <author initials="M." surname="Thomson" fullname="Martin Thomson" role="editor">
      <organization>Mozilla</organization>
      <address>
        <email>martin.thomson@gmail.com</email>
      </address>
    </author>
    <author initials="S." surname="Turner, Ed" fullname="Sean Turner" role="editor">
      <organization>sn3rd</organization>
      <address>
      </address>
    </author>

    <date year="2016" month="November"/>

    <area>Transport</area>
    <workgroup>QUIC</workgroup>
    

    <abstract>


<t>This document describes how Transport Layer Security (TLS) can be used to secure
QUIC.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>QUIC <xref target="QUIC-TRANSPORT"/> provides a multiplexed transport.  When used for HTTP
<xref target="RFC7230"/> semantics <xref target="QUIC-HTTP"/> it provides several key advantages over
HTTP/1.1 <xref target="RFC7230"/> or HTTP/2 <xref target="RFC7540"/> over TCP <xref target="RFC0793"/>.</t>

<t>This document describes how QUIC can be secured using Transport Layer Security
(TLS) version 1.3 <xref target="I-D.ietf-tls-tls13"/>.  TLS 1.3 provides critical latency
improvements for connection establishment over previous versions.  Absent packet
loss, most new connections can be established and secured within a single round
trip; on subsequent connections between the same client and server, the client
can often send application data immediately, that is, zero round trip setup.</t>

<t>This document describes how the standardized TLS 1.3 can act a security
component of QUIC.  The same design could work for TLS 1.2, though few of the
benefits QUIC provides would be realized due to the handshake latency in
versions of TLS prior to 1.3.</t>

<section anchor="notational-conventions" title="Notational Conventions">

<t>The words “MUST”, “MUST NOT”, “SHOULD”, and “MAY” are used in this document.
It’s not shouting; when they are capitalized, they have the special meaning
defined in <xref target="RFC2119"/>.</t>

</section>
</section>
<section anchor="protocol-overview" title="Protocol Overview">

<t>QUIC <xref target="QUIC-TRANSPORT"/> can be separated into several modules:</t>

<t><list style="numbers">
  <t>The basic frame envelope describes the common packet layout.  This layer
includes connection identification, version negotiation, and includes markers
that allow the framing and public reset to be identified.</t>
  <t>The public reset is an unprotected packet that allows an intermediary (an
entity that is not part of the security context) to request the termination
of a QUIC connection.</t>
  <t>Version negotiation frames are used to agree on a common version of QUIC to
use.</t>
  <t>Framing comprises most of the QUIC protocol.  Framing provides a number of
different types of frame, each with a specific purpose.  Framing supports
frames for both congestion management and stream multiplexing.  Framing
additionally provides a liveness testing capability (the PING frame).</t>
  <t>Encryption provides confidentiality and integrity protection for frames.  All
frames are protected based on keying material derived from the TLS connection
running on stream 1.  Prior to this, data is protected with the 0-RTT keys.</t>
  <t>Multiplexed streams are the primary payload of QUIC.  These provide reliable,
in-order delivery of data and are used to carry the encryption handshake and
transport parameters (stream 1), HTTP header fields (stream 3), and HTTP
requests and responses.  Frames for managing multiplexing include those for
creating and destroying streams as well as flow control and priority frames.</t>
  <t>Congestion management includes packet acknowledgment and other signal
required to ensure effective use of available link capacity.</t>
  <t>A complete TLS connection is run on stream 1.  This includes the entire TLS
record layer.  As the TLS connection reaches certain states, keying material
is provided to the QUIC encryption layer for protecting the remainder of the
QUIC traffic.</t>
  <t>The HTTP mapping <xref target="QUIC-HTTP"/> provides an adaptation to
HTTP semantics that is based on HTTP/2.</t>
</list></t>

<t>The relative relationship of these components are pictorally represented in
<xref target="quic-structure"/>.</t>

<figure title="QUIC Structure" anchor="quic-structure"><artwork><![CDATA[
   +-----+------+
   | TLS | HTTP |
   +-----+------+------------+
   |  Streams   | Congestion |
   +------------+------------+
   |         Frames          +--------+---------+
   +   +---------------------+ Public | Version |
   |   |     Encryption      | Reset  |  Nego.  |
   +---+---------------------+--------+---------+
   |                   Envelope                 |
   +--------------------------------------------+
   |                     UDP                    |
   +--------------------------------------------+
]]></artwork></figure>

<t>This document defines the cryptographic parts of QUIC.  This includes the
handshake messages that are exchanged on stream 1, plus the record protection
that is used to encrypt and authenticate all other frames.</t>

<section anchor="handshake-overview" title="Handshake Overview">

<t>TLS 1.3 provides two basic handshake modes of interest to QUIC:</t>

<t><list style="symbols">
  <t>A full handshake in which the client is able to send application data after
one round trip and the server immediately after receiving the first message
from the client.</t>
  <t>A 0-RTT handshake in which the client uses information about the server to
send immediately.  This data can be replayed by an attacker so it MUST NOT
carry a self-contained trigger for any non-idempotent action.</t>
</list></t>

<t>A simplified TLS 1.3 handshake with 0-RTT application data is shown in
<xref target="tls-full"/>, see <xref target="I-D.ietf-tls-tls13"/> for more options and details.</t>

<figure title="TLS Handshake with 0-RTT" anchor="tls-full"><artwork><![CDATA[
    Client                                             Server

    ClientHello
   (0-RTT Application Data)
   (end_of_early_data)        -------->
                                                  ServerHello
                                         {EncryptedExtensions}
                                         {ServerConfiguration}
                                                 {Certificate}
                                           {CertificateVerify}
                                                    {Finished}
                             <--------      [Application Data]
   {Finished}                -------->

   [Application Data]        <------->      [Application Data]
]]></artwork></figure>

<t>Two additional variations on this basic handshake exchange are relevant to this
document:</t>

<t><list style="symbols">
  <t>The server can respond to a ClientHello with a HelloRetryRequest, which adds
an additional round trip prior to the basic exchange.  This is needed if the
server wishes to request a different key exchange key from the client.
HelloRetryRequest is also used to verify that the client is correctly able to
receive packets on the address it claims to have (see <xref target="source-address"/>).</t>
  <t>A pre-shared key mode can be used for subsequent handshakes to avoid public
key operations.  This is the basis for 0-RTT data, even if the remainder of
the connection is protected by a new Diffie-Hellman exchange.</t>
</list></t>

</section>
</section>
<section anchor="tls-in-stream-1" title="TLS in Stream 1">

<t>QUIC completes its cryptographic handshake on stream 1, which means that the
negotiation of keying material happens after the QUIC protocol has started.
This simplifies the use of TLS since QUIC is able to ensure that the TLS
handshake packets are delivered reliably and in order.</t>

<t>QUIC Stream 1 carries a complete TLS connection.  This includes the TLS record
layer in its entirety.  QUIC provides for reliable and in-order delivery of the
TLS handshake messages on this stream.</t>

<t>Prior to the completion of the TLS handshake, QUIC frames can be exchanged.
However, these frames are not authenticated or confidentiality protected.
<xref target="pre-handshake"/> covers some of the implications of this design and limitations
on QUIC operation during this phase.</t>

<t>Once the TLS handshake completes, QUIC frames are protected using QUIC record
protection, see <xref target="packet-protection"/>.  If 0-RTT is possible, QUIC frames sent
by the client can be protected with 0-RTT keys; these packets are subject to
replay.</t>

<section anchor="handshake-and-setup-sequence" title="Handshake and Setup Sequence">

<t>The integration of QUIC with a TLS handshake is shown in more detail in
<xref target="quic-tls-handshake"/>.  QUIC <spanx style="verb">STREAM</spanx> frames on stream 1 carry the TLS
handshake.  QUIC performs loss recovery <xref target="QUIC-RECOVERY"/> for this stream and
ensures that TLS handshake messages are delivered in the correct order.</t>

<figure title="QUIC over TLS Handshake" anchor="quic-tls-handshake"><artwork><![CDATA[
    Client                                             Server

@A QUIC STREAM Frame(s) <1>:
     ClientHello
       + QUIC Setup Parameters
                            -------->
                        0-RTT Key => @B

@B QUIC STREAM Frame(s) <any stream>:
   Replayable QUIC Frames
                            -------->

                                      QUIC STREAM Frame <1>: @A
                                               ServerHello
                                      {Handshake Messages}
                            <--------
                        1-RTT Key => @C

                                           QUIC Frames <any> @C
                            <--------
@A QUIC STREAM Frame(s) <1>:
     (end_of_early_data)
     {Finished}
                            -------->

@C QUIC Frames <any>        <------->      QUIC Frames <any> @C
]]></artwork></figure>

<t>In <xref target="quic-tls-handshake"/>, symbols mean:</t>

<t><list style="symbols">
  <t>”&lt;” and “&gt;” enclose stream numbers.</t>
  <t>”@” indicates the key phase that is currently used for protecting QUIC
packets.</t>
  <t>”(“ and “)” enclose messages that are protected with TLS 0-RTT handshake or
application keys.</t>
  <t>”{“ and “}” enclose messages that are protected by the TLS Handshake keys.</t>
</list></t>

<t>If 0-RTT is not possible, then the client does not send frames protected by the
0-RTT key (@B).  In that case, the only key transition on the client is from
cleartext (@A) to 1-RTT protection (@C).</t>

<t>The server sends TLS handshake messages without protection (@A).  The server
transitions from no protection (@A) to full 1-RTT protection (@C) after it sends
the last of its handshake messages.</t>

<t>Some TLS handshake messages are protected by the TLS handshake record
protection.  However, keys derived at this stage are not exported for use in
QUIC.  QUIC frames from the server are sent in the clear until the final
transition to 1-RTT keys.</t>

<t>The client transitions from @A to @B when sending 0-RTT data, but it transitions
back to @A when sending its second flight of TLS handshake messages.  This
introduces a potential for confusion between packets with 0-RTT protection (@B)
and those with 1-RTT protection (@C) at the server if there is loss or
reordering of the handshake packets.  See <xref target="zero-transition"/> for details on how
this is addressed.</t>

</section>
</section>
<section anchor="packet-protection" title="QUIC Packet Protection">

<t>QUIC provides a packet protection layer that is responsible for authenticated
encryption of packets.  The packet protection layer uses keys provided by the
TLS connection and authenticated encryption to provide confidentiality and
integrity protection for the content of packets (see <xref target="aead"/>).</t>

<t>Different keys are used for QUIC packet protection and TLS record protection.
Having separate QUIC and TLS record protection means that TLS records can be
protected by two different keys.  This redundancy is limited to a only a few TLS
records, and is maintained for the sake of simplicity.</t>

<t>Keying material for new keys is exported from TLS using TLS exporters.  These
exported values are used to produce the keying material used to protect packets
(see <xref target="key-expansion"/>).</t>

<section anchor="key-phases" title="Key Phases">

<t>At several stages during the handshake, new keying material can be exported from
TLS and used for QUIC packet protection.  At each transition during the
handshake a new secret is exported from TLS and keying material is derived from
that secret.</t>

<t>Every time that a new set of keys is used for protecting outbound packets, the
KEY_PHASE bit in the public flags is toggled.  The KEY_PHASE bit starts out with
a value of 0 and is set to 1 when the first encrypted packets are sent.  Once
the connection is fully enabled, the KEY_PHASE bit can toggle between 0 and 1 as
keys are updated (see <xref target="key-update"/>).</t>

<t>The KEY_PHASE bit on the public flags is the most significant bit (0x80).</t>

<t>The KEY_PHASE bit allows a recipient to detect a change in keying material
without necessarily needing to receive the first packet that triggered the
change.  An endpoint that notices a changed KEY_PHASE bit can update keys and
decrypt the packet that contains the changed bit.  This isn’t possible during
the handshake, because the entire first flight of TLS handshake messages is used
as input to key derivation.</t>

<t>The following transitions are possible:</t>

<t><list style="symbols">
  <t>When using 0-RTT, the client transitions to using 0-RTT keys after sending the
ClientHello.  The KEY_PHASE bit on 0-RTT packets sent by the client is set to
1.</t>
  <t>The server sends messages in the clear until the TLS handshake completes.  The
KEY_PHASE bit on packets sent by the server is set to 0 when the handshake is
in progress.  Note that TLS handshake messages will still be protected by TLS
record protection based on the TLS handshake traffic keys.</t>
  <t>The server transitions to using 1-RTT keys after sending its Finished message.
This causes the KEY_PHASE bit on packets sent by the server to be set to 1.</t>
  <t>The client transitions back to cleartext when sending its second flight of TLS
handshake messages.  KEY_PHASE on the client’s second flight of handshake
messages is set back to 0.  This includes a TLS end_of_early_data alert, which
is protected with TLS (not QUIC) 0-RTT keys.</t>
  <t>The client transitions to sending with 1-RTT keys and a KEY_PHASE of 1 after
sending its Finished message.</t>
  <t>Once the handshake is complete and all TLS handshake messages have been sent
and acknowledged, either endpoint can send packets with a new set of keys.
This is signaled by toggling the value of the KEY_PHASE bit, see
<xref target="key-update"/>.</t>
</list></t>

<t>At each transition point, both keying material (see <xref target="key-expansion"/>) and the
AEAD function used by TLS is interchanged with the values that are currently in
use for protecting outbound packets.  Once a change of keys has been made,
packets with higher sequence numbers MUST use the new keying material until a
newer set of keys (and AEAD) are used.  The exception to this is that
retransmissions of TLS handshake packets MUST use the keys that they were
originally protected with (see <xref target="hs-retransmit"/>).</t>

<section anchor="hs-retransmit" title="Retransmission of TLS Handshake Messages">

<t>TLS handshake messages need to be retransmitted with the same level of
cryptographic protection that was originally used to protect them.  Newer keys
cannot be used to protect QUIC packets that carry TLS messages.</t>

<t>A client would be unable to decrypt retransmissions of a server’s handshake
messages that are protected using the 1-RTT keys, since the calculation of the
1-RTT keys depends on the contents of the handshake messages.</t>

<t>This restriction means the creation of an exception to the requirement to always
use new keys for sending once they are available.  A server MUST mark the
retransmitted handshake messages with the same KEY_PHASE as the original
messages to allow a recipient to distinguish retransmitted messages.</t>

<t>This rule also prevents a key update from being initiated while there are any
outstanding handshake messages, see <xref target="key-update"/>.</t>

</section>
<section anchor="zero-transition" title="Distinguishing 0-RTT and 1-RTT Packets">

<t>Loss or reordering of the client’s second flight of TLS handshake messages can
cause 0-RTT packet and 1-RTT packets to become indistinguishable from each other
when they arrive at the server.  Both 0-RTT packets use a KEY_PHASE of 1.</t>

<t>A server does not need to receive the client’s second flight of TLS handshake
messages in order to derive the secrets needed to decrypt 1-RTT messages.  Thus,
a server is able to decrypt 1-RTT messages that arrive prior to receiving the
client’s Finished message.  Of course, any decision that might be made based on
client authentication needs to be delayed until the client’s authentication
messages have been received and validated.</t>

<t>A server can distinguish between 0-RTT and 1-RTT packets by TBDTBDTBD.</t>

</section>
</section>
<section anchor="key-expansion" title="QUIC Key Expansion">

<t>QUIC uses a system of packet protection secrets, keys and IVs that are modelled
on the system used in TLS <xref target="I-D.ietf-tls-tls13"/>.  The secrets that QUIC uses
as the basis of its key schedule are obtained using TLS exporters (see Section
7.3.3 of <xref target="I-D.ietf-tls-tls13"/>).</t>

<t>QUIC uses the Pseudo-Random Function (PRF) hash function negotiated by TLS for
key derivation.  For example, if TLS is using the TLS_AES_128_GCM_SHA256, the
SHA-256 hash function is used.</t>

<section anchor="rtt-secret" title="0-RTT Secret">

<t>0-RTT keys are those keys that are used in resumed connections prior to the
completion of the TLS handshake.  Data sent using 0-RTT keys might be replayed
and so has some restrictions on its use, see <xref target="using-early-data"/>.  0-RTT keys
are used after sending or receiving a ClientHello.</t>

<t>The secret is exported from TLS using the exporter label “EXPORTER-QUIC 0-RTT
Secret” and an empty context.  The size of the secret MUST be the size of the
hash output for the PRF hash function negotiated by TLS.  This uses the TLS
early_exporter_secret.  The QUIC 0-RTT secret is only used for protection of
packets sent by the client.</t>

<figure><artwork><![CDATA[
   client_0rtt_secret
       = TLS-Exporter("EXPORTER-QUIC 0-RTT Secret"
                      "", Hash.length)
]]></artwork></figure>

</section>
<section anchor="rtt-secrets" title="1-RTT Secrets">

<t>1-RTT keys are used by both client and server after the TLS handshake completes.
There are two secrets used at any time: one is used to derive packet protection
keys for packets sent by the client, the other for protecting packets sent by
the server.</t>

<t>The initial client packet protection secret is exported from TLS using the
exporter label “EXPORTER-QUIC client 1-RTT Secret”; the initial server packet
protection secret uses the exporter label “EXPORTER-QUIC server 1-RTT Secret”.
Both exporters use an empty context.  The size of the secret MUST be the size of
the hash output for the PRF hash function negotiated by TLS.</t>

<figure><artwork><![CDATA[
   client_pp_secret_0
       = TLS-Exporter("EXPORTER-QUIC client 1-RTT Secret"
                      "", Hash.length)
   server_pp_secret_0
       = TLS-Exporter("EXPORTER-QUIC server 1-RTT Secret"
                      "", Hash.length)
]]></artwork></figure>

<t>After a key update (see <xref target="key-update"/>), these secrets are updated using the
HKDF-Expand-Label function defined in Section 7.1 of <xref target="I-D.ietf-tls-tls13"/>,
using the PRF hash function negotiated by TLS.  The replacement secret is
derived using the existing Secret, a Label of “QUIC client 1-RTT Secret” for the
client and “QUIC server 1-RTT Secret”, an empty HashValue, and the same output
Length as the hash function selected by TLS for its PRF.</t>

<figure><artwork><![CDATA[
   client_pp_secret_<N+1>
       = HKDF-Expand-Label(client_pp_secret_<N>,
                           "QUIC client 1-RTT Secret",
                           "", Hash.length)
   server_pp_secret_<N+1>
       = HKDF-Expand-Label(server_pp_secret_<N>,
                           "QUIC server 1-RTT Secret",
                           "", Hash.length)
]]></artwork></figure>

<t>For example, the client secret is updated using HKDF-Expand <xref target="RFC5869"/> with an
info parameter that includes the PRF hash length encoded on two octets, the
string “TLS 1.3, QUIC client 1-RTT secret” and a zero octet.  This equates to a
single use of HMAC <xref target="RFC2104"/> with the negotiated PRF hash function:</t>

<figure><artwork><![CDATA[
   info = Hash.length / 256 || Hash.length % 256 ||
          "TLS 1.3, QUIC client 1-RTT secret" || 0x00
   client_pp_secret_<N+1>
       = HMAC-Hash(client_pp_secret_<N>, info || 0x01)
]]></artwork></figure>

</section>
<section anchor="packet-protection-key-and-iv" title="Packet Protection Key and IV">

<t>The complete key expansion uses an identical process for key expansion as
defined in Section 7.3 of <xref target="I-D.ietf-tls-tls13"/>, using different values for
the input secret.  QUIC uses the AEAD function negotiated by TLS.</t>

<t>The key and IV used to protect the 0-RTT packets sent by a client use the QUIC
0-RTT secret.  This uses the HKDF-Expand-Label with the PRF hash function
negotiated by TLS.  The length of the output is determined by the requirements
of the AEAD function selected by TLS.</t>

<figure><artwork><![CDATA[
   client_0rtt_key = HKDF-Expand-Label(client_0rtt_secret,
                                       "key", "", key_length)
   client_0rtt_iv = HKDF-Expand-Label(client_0rtt_secret,
                                      "iv", "", iv_length)
]]></artwork></figure>

<t>Similarly, the key and IV used to protect 1-RTT packets sent by both client and
server use the current packet protection secret.</t>

<figure><artwork><![CDATA[
   client_pp_key_<N> = HKDF-Expand-Label(client_pp_secret_<N>,
                                         "key", "", key_length)
   client_pp_iv_<N> = HKDF-Expand-Label(client_pp_secret_<N>,
                                        "iv", "", iv_length)
   server_pp_key_<N> = HKDF-Expand-Label(server_pp_secret_<N>,
                                         "key", "", key_length)
   server_pp_iv_<N> = HKDF-Expand-Label(server_pp_secret_<N>,
                                        "iv", "", iv_length)
]]></artwork></figure>

<t>The QUIC record protection initially starts without keying material.  When the
TLS state machine reports that the ClientHello has been sent, the 0-RTT keys can
be generated and installed for writing.  When the TLS state machine reports
completion of the handshake, the 1-RTT keys can be generated and installed for
writing.</t>

</section>
</section>
<section anchor="aead" title="QUIC AEAD Usage">

<t>The Authentication Encryption with Associated Data (AEAD) <xref target="RFC5116"/> function
used for QUIC packet protection is AEAD that is negotiated for use with the TLS
connection.  For example, if TLS is using the TLS_AES_128_GCM_SHA256, the
AEAD_AES_128_GCM function is used.</t>

<t>Regular QUIC packets are protected by an AEAD <xref target="RFC5116"/>.  Version negotiation
and public reset packets are not protected.</t>

<t>Once TLS has provided a key, the contents of regular QUIC packets immediately
after any TLS messages have been sent are protected by the AEAD selected by TLS.</t>

<t>The key, K, for the AEAD is either the Client Write Key or the Server Write Key,
derived as defined in <xref target="key-expansion"/>.</t>

<t>The nonce, N, for the AEAD is formed by combining either the Client Write IV or
Server Write IV with packet numbers.  The 64 bits of the reconstructed QUIC
packet number in network byte order is left-padded with
zeros to the N_MAX parameter of the AEAD (see Section 4 of <xref target="RFC5116"/>).  The
exclusive OR of the padded packet number and the IV forms the AEAD nonce.</t>

<t>The associated data, A, for the AEAD is an empty sequence.</t>

<t>The input plaintext, P, for the AEAD is the contents of the QUIC frame following
the packet number, as described in <xref target="QUIC-TRANSPORT"/>.</t>

<t>The output ciphertext, C, of the AEAD is transmitted in place of P.</t>

<t>Prior to TLS providing keys, no record protection is performed and the
plaintext, P, is transmitted unmodified.</t>

</section>
<section anchor="key-update" title="Key Update">

<t>Once the TLS handshake is complete, the KEY_PHASE bit allows for refreshes of
keying material by either peer.  Endpoints start using updated keys immediately
without additional signaling; the change in the KEY_PHASE bit indicates that a
new key is in use.</t>

<t>An endpoint MUST NOT initiate more than one key update at a time.  A new key
cannot be used until the endpoint has received and successfully decrypted a
packet with a matching KEY_PHASE.</t>

<t>A receiving endpoint detects an update when the KEY_PHASE bit doesn’t match what
it is expecting.  It creates a new secret (see <xref target="key-expansion"/>) and the
corresponding read key and IV.  If the packet can be decrypted and authenticated
using these values, then a write keys and IV are generated and the active keys
are replaced.  The next packet sent by the endpoint will then use the new keys.</t>

<t>An endpoint doesn’t need to send packets immediately when it detects that its
peer has updated keys.  The next packets that it sends will simply use the new
keys.  If an endpoint detects a second update before it has sent any packets
with updated keys it indicates that its peer has updated keys twice without
awaiting a reciprocal update.  An endpoint MUST treat consecutive key updates as
a fatal error and abort the connection.</t>

<t>An endpoint SHOULD retain old keys for a short period to allow it to decrypt
packets with smaller packet numbers than the packet that triggered the key
update.  This allows an endpoint to consume packets that are reordered around
the transition between keys.  Packets with higher packet numbers always use the
updated keys and MUST NOT be decrypted with old keys.</t>

<t>Keys and their corresponding secrets SHOULD be discarded when an endpoints has
received all packets with sequence numbers lower than the lowest sequence number
used for the new key, or when it determines that the length of the delay to
affected packets is excessive.</t>

<t>This ensures that once the handshake is complete, there are at most two keys to
distinguish between at any one time, for which the KEY_PHASE bit is sufficient.</t>

<figure title="Key Update" anchor="ex-key-update"><artwork><![CDATA[
   Initiating Peer                    Responding Peer

@M QUIC Frames
                    New Keys -> @N
@N QUIC Frames
                      -------->
                                          QUIC Frames @M
                    New Keys -> @N
                                          QUIC Frames @N
                      <--------
]]></artwork></figure>

<t>As shown in <xref target="quic-tls-handshake"/> and <xref target="ex-key-update"/>, there is never a
situation where there are more than two different sets of keying material that
might be received by a peer.  Once both sending and receiving keys have been
updated,</t>

<t>A server cannot initiate a key update until it has received the client’s
Finished message.  Otherwise, packets protected by the updated keys could be
confused for retransmissions of handshake messages.  A client cannot initiate a
key update until all of its handshake messages have been acknowledged by the
server.</t>

</section>
<section anchor="packet-number" title="Packet Numbers">

<t>QUIC has a single, contiguous packet number space.  In comparison, TLS
restarts its sequence number each time that record protection keys are
changed.  The sequence number restart in TLS ensures that a compromise of the
current traffic keys does not allow an attacker to truncate the data that is
sent after a key update by sending additional packets under the old key
(causing new packets to be discarded).</t>

<t>QUIC does not assume a reliable transport and is therefore required to handle
attacks where packets are dropped in other ways.</t>

<t>The packet number is not reset and it is not permitted to go higher than its
maximum value of 2^64-1.  This establishes a hard limit on the number of packets
that can be sent.  Before this limit is reached, some AEAD functions have limits
for how many packets can be encrypted under the same key and IV (see for example
<xref target="AEBounds"/>).  An endpoint MUST initiate a key update (<xref target="key-update"/>) prior to
exceeding any limit set for the AEAD that is in use.</t>

<t>TLS maintains a separate sequence number that is used for record protection on
the connection that is hosted on stream 1.  This sequence number is reset
according to the rules in the TLS protocol.</t>

</section>
</section>
<section anchor="pre-handshake" title="Pre-handshake QUIC Messages">

<t>Implementations MUST NOT exchange data on any stream other than stream 1 prior
to the completion of the TLS handshake.  However, QUIC requires the use of
several types of frame for managing loss detection and recovery.  In addition,
it might be useful to use the data acquired during the exchange of
unauthenticated messages for congestion management.</t>

<t>This section generally only applies to TLS handshake messages from both peers
and acknowledgments of the packets carrying those messages.  In many cases, the
need for servers to provide acknowledgments is minimal, since the messages that
clients send are small and implicitly acknowledged by the server’s responses.</t>

<t>The actions that a peer takes as a result of receiving an unauthenticated packet
needs to be limited.  In particular, state established by these packets cannot
be retained once record protection commences.</t>

<t>There are several approaches possible for dealing with unauthenticated packets
prior to handshake completion:</t>

<t><list style="symbols">
  <t>discard and ignore them</t>
  <t>use them, but reset any state that is established once the handshake completes</t>
  <t>use them and authenticate them afterwards; failing the handshake if they can’t
be authenticated</t>
  <t>save them and use them when they can be properly authenticated</t>
  <t>treat them as a fatal error</t>
</list></t>

<t>Different strategies are appropriate for different types of data.  This document
proposes that all strategies are possible depending on the type of message.</t>

<t><list style="symbols">
  <t>Transport parameters and options are made usable and authenticated as part of
the TLS handshake (see <xref target="quic_parameters"/>).</t>
  <t>Most unprotected messages are treated as fatal errors when received except for
the small number necessary to permit the handshake to complete (see
<xref target="pre-handshake-unprotected"/>).</t>
  <t>Protected packets can either be discarded or saved and later used (see
<xref target="pre-handshake-protected"/>).</t>
</list></t>

<section anchor="pre-handshake-unprotected" title="Unprotected Frames Prior to Handshake Completion">

<t>This section describes the handling of messages that are sent and received prior
to the completion of the TLS handshake.</t>

<t>Sending and receiving unprotected messages is hazardous.  Unless expressly
permitted, receipt of an unprotected message of any kind MUST be treated as a
fatal error.</t>

<section anchor="stream-frames" title="STREAM Frames">

<t><spanx style="verb">STREAM</spanx> frames for stream 1 are permitted.  These carry the TLS handshake
messages.</t>

<t>Receiving unprotected <spanx style="verb">STREAM</spanx> frames for other streams MUST be treated as a
fatal error.</t>

</section>
<section anchor="ack-frames" title="ACK Frames">

<t><spanx style="verb">ACK</spanx> frames are permitted prior to the handshake being complete.  Information
learned from <spanx style="verb">ACK</spanx> frames cannot be entirely relied upon, since an attacker is
able to inject these packets.  Timing and packet retransmission information from
<spanx style="verb">ACK</spanx> frames is critical to the functioning of the protocol, but these frames
might be spoofed or altered.</t>

<t>Endpoints MUST NOT use an unprotected <spanx style="verb">ACK</spanx> frame to acknowledge data that was
protected by 0-RTT or 1-RTT keys.  An endpoint MUST ignore an unprotected <spanx style="verb">ACK</spanx>
frame if it claims to acknowledge data that was protected data.  Such an
acknowledgement can only serve as a denial of service, since an endpoint that
can read protected data is always permitted to send protected data.</t>

<t>An endpoint SHOULD use data from unprotected or 0-RTT-protected <spanx style="verb">ACK</spanx> frames
only during the initial handshake and while they have insufficient information
from 1-RTT-protected <spanx style="verb">ACK</spanx> frames.  Once sufficient information has been
obtained from protected messages, information obtained from less reliable
sources can be discarded.</t>

</section>
<section anchor="windowupdate-frames" title="WINDOW_UPDATE Frames">

<t><spanx style="verb">WINDOW_UPDATE</spanx> frames MUST NOT be sent unprotected.</t>

<t>Though data is exchanged on stream 1, the initial flow control window is is
sufficiently large to allow the TLS handshake to complete.  This limits the
maximum size of the TLS handshake and would prevent a server or client from
using an abnormally large certificate chain.</t>

<t>Stream 1 is exempt from the connection-level flow control window.</t>

</section>
<section anchor="denial-of-service-with-unprotected-packets" title="Denial of Service with Unprotected Packets">

<t>Accepting unprotected - specifically unauthenticated - packets presents a denial
of service risk to endpoints.  An attacker that is able to inject unprotected
packets can cause a recipient to drop even protected packets with a matching
sequence number.  The spurious packet shadows the genuine packet, causing the
genuine packet to be ignored as redundant.</t>

<t>Once the TLS handshake is complete, both peers MUST ignore unprotected packets.
The handshake is complete when the server receives a client’s Finished message
and when a client receives an acknowledgement that their Finished message was
received.  From that point onward, unprotected messages can be safely dropped.
Note that the client could retransmit its Finished message to the server, so the
server cannot reject such a message.</t>

<t>Since only TLS handshake packets and acknowledgments are sent in the clear, an
attacker is able to force implementations to rely on retransmission for packets
that are lost or shadowed.  Thus, an attacker that intends to deny service to an
endpoint has to drop or shadow protected packets in order to ensure that their
victim continues to accept unprotected packets.  The ability to shadow packets
means that an attacker does not need to be on path.</t>

<t><list style="hanging">
  <t hangText='ISSUE:'>
  This would not be an issue if QUIC had a randomized starting sequence number.
If we choose to randomize, we fix this problem and reduce the denial of
service exposure to on-path attackers.  The only possible problem is in
authenticating the initial value, so that peers can be sure that they haven’t
missed an initial message.</t>
</list></t>

<t>In addition to denying endpoints messages, an attacker to generate packets that
cause no state change in a recipient.  See <xref target="useless"/> for a discussion of these
risks.</t>

<t>To avoid receiving TLS packets that contain no useful data, a TLS implementation
MUST reject empty TLS handshake records and any record that is not permitted by
the TLS state machine.  Any TLS application data or alerts - other than a single
end_of_early_data at the appropriate time - that is received prior to the end of
the handshake MUST be treated as a fatal error.</t>

</section>
</section>
<section anchor="using-early-data" title="Use of 0-RTT Keys">

<t>If 0-RTT keys are available, the lack of replay protection means that
restrictions on their use are necessary to avoid replay attacks on the protocol.</t>

<t>A client MUST only use 0-RTT keys to protect data that is idempotent.  A client
MAY wish to apply additional restrictions on what data it sends prior to the
completion of the TLS handshake.  A client otherwise treats 0-RTT keys as
equivalent to 1-RTT keys.</t>

<t>A client that receives an indication that its 0-RTT data has been accepted by a
server can send 0-RTT data until it receives all of the server’s handshake
messages.  A client SHOULD stop sending 0-RTT data if it receives an indication
that 0-RTT data has been rejected.  In addition to a ServerHello without an
early_data extension, an unprotected handshake message with a KEY_PHASE bit set
to 0 indicates that 0-RTT data has been rejected.</t>

<t>A client SHOULD send its end_of_early_data alert only after it has received all
of the server’s handshake messages.  Alternatively phrased, a client is
encouraged to use 0-RTT keys until 1-RTT keys become available.  This prevents
stalling of the connection and allows the client to send continuously.</t>

<t>A server MUST NOT use 0-RTT keys to protect anything other than TLS handshake
messages.  Servers therefore treat packets protected with 0-RTT keys as
equivalent to unprotected packets in determining what is permissible to send.  A
server protects handshake messages using the 0-RTT key if it decides to accept a
0-RTT key.  A server MUST still include the early_data extension in its
ServerHello message.</t>

<t>This restriction prevents a server from responding to a request using frames
protected by the 0-RTT keys.  This ensures that all application data from the
server are always protected with keys that have forward secrecy.  However, this
results in head-of-line blocking at the client because server responses cannot
be decrypted until all the server’s handshake messages are received by the
client.</t>

</section>
<section anchor="pre-handshake-protected" title="Protected Frames Prior to Handshake Completion">

<t>Due to reordering and loss, protected packets might be received by an endpoint
before the final handshake messages are received.  If these can be decrypted
successfully, such packets MAY be stored and used once the handshake is
complete.</t>

<t>Unless expressly permitted below, encrypted packets MUST NOT be used prior to
completing the TLS handshake, in particular the receipt of a valid Finished
message and any authentication of the peer.  If packets are processed prior to
completion of the handshake, an attacker might use the willingness of an
implementation to use these packets to mount attacks.</t>

<t>TLS handshake messages are covered by record protection during the handshake,
once key agreement has completed.  This means that protected messages need to be
decrypted to determine if they are TLS handshake messages or not.  Similarly,
<spanx style="verb">ACK</spanx> and <spanx style="verb">WINDOW_UPDATE</spanx> frames might be needed to successfully complete the
TLS handshake.</t>

<t>Any timestamps present in <spanx style="verb">ACK</spanx> frames MUST be ignored rather than causing a
fatal error.  Timestamps on protected frames MAY be saved and used once the TLS
handshake completes successfully.</t>

<t>An endpoint MAY save the last protected <spanx style="verb">WINDOW_UPDATE</spanx> frame it receives for
each stream and apply the values once the TLS handshake completes.  Failing
to do this might result in temporary stalling of affected streams.</t>

</section>
</section>
<section anchor="quic-specific-additions-to-the-tls-handshake" title="QUIC-Specific Additions to the TLS Handshake">

<t>QUIC uses the TLS handshake for more than just negotiation of cryptographic
parameters.  The TLS handshake validates protocol version selection, provides
preliminary values for QUIC transport parameters, and allows a server to perform
return routeability checks on clients.</t>

<section anchor="version-negotiation" title="Protocol and Version Negotiation">

<t>The QUIC version negotiation mechanism is used to negotiate the version of QUIC
that is used prior to the completion of the handshake.  However, this packet is
not authenticated, enabling an active attacker to force a version downgrade.</t>

<t>To ensure that a QUIC version downgrade is not forced by an attacker, version
information is copied into the TLS handshake, which provides integrity
protection for the QUIC negotiation.  This does not prevent version downgrade
during the handshake, though it means that such a downgrade causes a handshake
failure.</t>

<t>Protocols that use the QUIC transport MUST use Application Layer Protocol
Negotiation (ALPN) <xref target="RFC7301"/>.  The ALPN identifier for the protocol MUST be
specific to the QUIC version that it operates over.  When constructing a
ClientHello, clients MUST include a list of all the ALPN identifiers that they
support, regardless of whether the QUIC version that they have currently
selected supports that protocol.</t>

<t>Servers SHOULD select an application protocol based solely on the information in
the ClientHello, not using the QUIC version that the client has selected.  If
the protocol that is selected is not supported with the QUIC version that is in
use, the server MAY send a QUIC version negotiation packet to select a
compatible version.</t>

<t>If the server cannot select a combination of ALPN identifier and QUIC version it
MUST abort the connection.  A client MUST abort a connection if the server picks
an incompatible version of QUIC version and ALPN.</t>

</section>
<section anchor="quic_parameters" title="QUIC Extension">

<t>QUIC defines an extension for use with TLS.  That extension defines
transport-related parameters.  This provides integrity protection for these
values.  Including these in the TLS handshake also make the values that a client
sets available to a server one-round trip earlier than parameters that are
carried in QUIC frames.  This document does not define that extension.</t>

</section>
<section anchor="source-address" title="Source Address Validation">

<t>QUIC implementations describe a source address token.  This is an opaque blob
that a server might provide to clients when they first use a given source
address.  The client returns this token in subsequent messages as a return
routeability check.  That is, the client returns this token to prove that it is
able to receive packets at the source address that it claims.  This prevents the
server from being used in packet reflection attacks (see <xref target="reflection"/>).</t>

<t>A source address token is opaque and consumed only by the server.  Therefore it
can be included in the TLS 1.3 pre-shared key identifier for 0-RTT handshakes.
Servers that use 0-RTT are advised to provide new pre-shared key identifiers
after every handshake to avoid linkability of connections by passive observers.
Clients MUST use a new pre-shared key identifier for every connection that they
initiate; if no pre-shared key identifier is available, then resumption is not
possible.</t>

<t>A server that is under load might include a source address token in the cookie
extension of a HelloRetryRequest.</t>

</section>
<section anchor="priming-0-rtt" title="Priming 0-RTT">

<t>QUIC uses TLS without modification.  Therefore, it is possible to use a
pre-shared key that was obtained in a TLS connection over TCP to enable 0-RTT in
QUIC.  Similarly, QUIC can provide a pre-shared key that can be used to enable
0-RTT in TCP.</t>

<t>All the restrictions on the use of 0-RTT apply, with the exception of the ALPN
label, which MUST only change to a label that is explicitly designated as being
compatible.  The client indicates which ALPN label it has chosen by placing that
ALPN label first in the ALPN extension.</t>

<t>The certificate that the server uses MUST be considered valid for both
connections, which will use different protocol stacks and could use different
port numbers.  For instance, HTTP/1.1 and HTTP/2 operate over TLS and TCP,
whereas QUIC operates over UDP.</t>

<t>Source address validation is not completely portable between different protocol
stacks.  Even if the source IP address remains constant, the port number is
likely to be different.  Packet reflection attacks are still possible in this
situation, though the set of hosts that can initiate these attacks is greatly
reduced.  A server might choose to avoid source address validation for such a
connection, or allow an increase to the amount of data that it sends toward the
client without source validation.</t>

</section>
</section>
<section anchor="security-considerations" title="Security Considerations">

<t>There are likely to be some real clangers here eventually, but the current set
of issues is well captured in the relevant sections of the main text.</t>

<t>Never assume that because it isn’t in the security considerations section it
doesn’t affect security.  Most of this document does.</t>

<section anchor="reflection" title="Packet Reflection Attack Mitigation">

<t>A small ClientHello that results in a large block of handshake messages from a
server can be used in packet reflection attacks to amplify the traffic generated
by an attacker.</t>

<t>Certificate caching <xref target="RFC7924"/> can reduce the size of the server’s handshake
messages significantly.</t>

<t>A client SHOULD also pad <xref target="RFC7685"/> its ClientHello to at least 1024 octets.
A server is less likely to generate a packet reflection attack if the data it
sends is a small multiple of the data it receives.  A server SHOULD use a
HelloRetryRequest if the size of the handshake messages it sends is likely to
exceed the size of the ClientHello.</t>

</section>
<section anchor="useless" title="Peer Denial of Service">

<t>QUIC, TLS and HTTP/2 all contain a messages that have legitimate uses in some
contexts, but that can be abused to cause a peer to expend processing resources
without having any observable impact on the state of the connection.  If
processing is disproportionately large in comparison to the observable effects
on bandwidth or state, then this could allow a malicious peer to exhaust
processing capacity without consequence.</t>

<t>QUIC prohibits the sending of empty <spanx style="verb">STREAM</spanx> frames unless they are marked with
the FIN bit.  This prevents <spanx style="verb">STREAM</spanx> frames from being sent that only waste
effort.</t>

<t>TLS records SHOULD always contain at least one octet of a handshake messages or
alert.  Records containing only padding are permitted during the handshake, but
an excessive number might be used to generate unnecessary work.  Once the TLS
handshake is complete, endpoints SHOULD NOT send TLS application data records
unless it is to hide the length of QUIC records.  QUIC packet protection does
not include any allowance for padding; padded TLS application data records can
be used to mask the length of QUIC frames.</t>

<t>While there are legitimate uses for some redundant packets, implementations
SHOULD track redundant packets and treat excessive volumes of any non-productive
packets as indicative of an attack.</t>

</section>
</section>
<section anchor="iana-considerations" title="IANA Considerations">

<t>This document has no IANA actions.  Yet.</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>

<reference anchor="QUIC-RECOVERY" >
  <front>
    <title>QUIC Loss Detection and Congestion Control</title>
    <author initials="J." surname="Iyengar" fullname="Jana Iyengar" role="editor">
      <organization>Google</organization>
    </author>
    <author initials="I." surname="Swett" fullname="Ian Swett" role="editor">
      <organization>Google</organization>
    </author>
    <date year="2016" month="November"/>
  </front>
</reference>
<reference anchor="QUIC-TRANSPORT" >
  <front>
    <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
    <author initials="J." surname="Iyengar" fullname="Jana Iyengar" role="editor">
      <organization>Google</organization>
    </author>
    <author initials="M." surname="Thomson" fullname="Martin Thomson" role="editor">
      <organization>Mozilla</organization>
    </author>
    <date year="2016" month="November"/>
  </front>
</reference>




<reference  anchor='RFC7230' target='http://www.rfc-editor.org/info/rfc7230'>
<front>
<title>Hypertext Transfer Protocol (HTTP/1.1): Message Syntax and Routing</title>
<author initials='R.' surname='Fielding' fullname='R. Fielding' role='editor'><organization /></author>
<author initials='J.' surname='Reschke' fullname='J. Reschke' role='editor'><organization /></author>
<date year='2014' month='June' />
<abstract><t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems.  This document provides an overview of HTTP architecture and its associated terminology, defines the &quot;http&quot; and &quot;https&quot; Uniform Resource Identifier (URI) schemes, defines the HTTP/1.1 message syntax and parsing requirements, and describes related security concerns for implementations.</t></abstract>
</front>
<seriesInfo name='RFC' value='7230'/>
<seriesInfo name='DOI' value='10.17487/RFC7230'/>
</reference>



<reference anchor='I-D.ietf-tls-tls13'>
<front>
<title>The Transport Layer Security (TLS) Protocol Version 1.3</title>

<author initials='E' surname='Rescorla' fullname='Eric Rescorla'>
    <organization />
</author>

<date month='October' day='25' year='2016' />

<abstract><t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-tls-tls13-18' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-tls-tls13-18.txt' />
</reference>



<reference  anchor='RFC2119' target='http://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author initials='S.' surname='Bradner' fullname='S. Bradner'><organization /></author>
<date year='1997' month='March' />
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference  anchor='RFC5869' target='http://www.rfc-editor.org/info/rfc5869'>
<front>
<title>HMAC-based Extract-and-Expand Key Derivation Function (HKDF)</title>
<author initials='H.' surname='Krawczyk' fullname='H. Krawczyk'><organization /></author>
<author initials='P.' surname='Eronen' fullname='P. Eronen'><organization /></author>
<date year='2010' month='May' />
<abstract><t>This document specifies a simple Hashed Message Authentication Code (HMAC)-based key derivation function (HKDF), which can be used as a building block in various protocols and applications.  The key derivation function (KDF) is intended to support a wide range of applications and requirements, and is conservative in its use of cryptographic hash functions.  This document is not an Internet  Standards Track specification; it is published for informational  purposes.</t></abstract>
</front>
<seriesInfo name='RFC' value='5869'/>
<seriesInfo name='DOI' value='10.17487/RFC5869'/>
</reference>



<reference  anchor='RFC2104' target='http://www.rfc-editor.org/info/rfc2104'>
<front>
<title>HMAC: Keyed-Hashing for Message Authentication</title>
<author initials='H.' surname='Krawczyk' fullname='H. Krawczyk'><organization /></author>
<author initials='M.' surname='Bellare' fullname='M. Bellare'><organization /></author>
<author initials='R.' surname='Canetti' fullname='R. Canetti'><organization /></author>
<date year='1997' month='February' />
<abstract><t>This document describes HMAC, a mechanism for message authentication using cryptographic hash functions. HMAC can be used with any iterative cryptographic hash function, e.g., MD5, SHA-1, in combination with a secret shared key.  The cryptographic strength of HMAC depends on the properties of the underlying hash function.  This memo provides information for the Internet community.  This memo does not specify an Internet standard of any kind</t></abstract>
</front>
<seriesInfo name='RFC' value='2104'/>
<seriesInfo name='DOI' value='10.17487/RFC2104'/>
</reference>



<reference  anchor='RFC5116' target='http://www.rfc-editor.org/info/rfc5116'>
<front>
<title>An Interface and Algorithms for Authenticated Encryption</title>
<author initials='D.' surname='McGrew' fullname='D. McGrew'><organization /></author>
<date year='2008' month='January' />
<abstract><t>This document defines algorithms for Authenticated Encryption with Associated Data (AEAD), and defines a uniform interface and a registry for such algorithms.  The interface and registry can be used as an application-independent set of cryptoalgorithm suites.  This approach provides advantages in efficiency and security, and promotes the reuse of crypto implementations.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5116'/>
<seriesInfo name='DOI' value='10.17487/RFC5116'/>
</reference>



<reference  anchor='RFC7301' target='http://www.rfc-editor.org/info/rfc7301'>
<front>
<title>Transport Layer Security (TLS) Application-Layer Protocol Negotiation Extension</title>
<author initials='S.' surname='Friedl' fullname='S. Friedl'><organization /></author>
<author initials='A.' surname='Popov' fullname='A. Popov'><organization /></author>
<author initials='A.' surname='Langley' fullname='A. Langley'><organization /></author>
<author initials='E.' surname='Stephan' fullname='E. Stephan'><organization /></author>
<date year='2014' month='July' />
<abstract><t>This document describes a Transport Layer Security (TLS) extension for application-layer protocol negotiation within the TLS handshake. For instances in which multiple application protocols are supported on the same TCP or UDP port, this extension allows the application layer to negotiate which protocol will be used within the TLS connection.</t></abstract>
</front>
<seriesInfo name='RFC' value='7301'/>
<seriesInfo name='DOI' value='10.17487/RFC7301'/>
</reference>



<reference  anchor='RFC7685' target='http://www.rfc-editor.org/info/rfc7685'>
<front>
<title>A Transport Layer Security (TLS) ClientHello Padding Extension</title>
<author initials='A.' surname='Langley' fullname='A. Langley'><organization /></author>
<date year='2015' month='October' />
<abstract><t>This memo describes a Transport Layer Security (TLS) extension that can be used to pad ClientHello messages to a desired size.</t></abstract>
</front>
<seriesInfo name='RFC' value='7685'/>
<seriesInfo name='DOI' value='10.17487/RFC7685'/>
</reference>




    </references>

    <references title='Informative References'>

<reference anchor="AEBounds" target="http://www.isg.rhul.ac.uk/~kp/TLS-AEbounds.pdf">
  <front>
    <title>Limits on Authenticated Encryption Use in TLS</title>
    <author initials="A." surname="Luykx">
      <organization></organization>
    </author>
    <author initials="K." surname="Paterson">
      <organization></organization>
    </author>
    <date year="2016" month="March" day="08"/>
  </front>
</reference>
<reference anchor="QUIC-HTTP" >
  <front>
    <title>Hypertext Transfer Protocol (HTTP) over QUIC</title>
    <author initials="M." surname="Bishop" fullname="Mike Bishop" role="editor">
      <organization>Microsoft</organization>
    </author>
    <date year="2016" month="November"/>
  </front>
</reference>




<reference  anchor='RFC7540' target='http://www.rfc-editor.org/info/rfc7540'>
<front>
<title>Hypertext Transfer Protocol Version 2 (HTTP/2)</title>
<author initials='M.' surname='Belshe' fullname='M. Belshe'><organization /></author>
<author initials='R.' surname='Peon' fullname='R. Peon'><organization /></author>
<author initials='M.' surname='Thomson' fullname='M. Thomson' role='editor'><organization /></author>
<date year='2015' month='May' />
<abstract><t>This specification describes an optimized expression of the semantics of the Hypertext Transfer Protocol (HTTP), referred to as HTTP version 2 (HTTP/2).  HTTP/2 enables a more efficient use of network resources and a reduced perception of latency by introducing header field compression and allowing multiple concurrent exchanges on the same connection.  It also introduces unsolicited push of representations from servers to clients.</t><t>This specification is an alternative to, but does not obsolete, the HTTP/1.1 message syntax.  HTTP's existing semantics remain unchanged.</t></abstract>
</front>
<seriesInfo name='RFC' value='7540'/>
<seriesInfo name='DOI' value='10.17487/RFC7540'/>
</reference>



<reference  anchor='RFC0793' target='http://www.rfc-editor.org/info/rfc793'>
<front>
<title>Transmission Control Protocol</title>
<author initials='J.' surname='Postel' fullname='J. Postel'><organization /></author>
<date year='1981' month='September' />
</front>
<seriesInfo name='STD' value='7'/>
<seriesInfo name='RFC' value='793'/>
<seriesInfo name='DOI' value='10.17487/RFC0793'/>
</reference>



<reference  anchor='RFC7924' target='http://www.rfc-editor.org/info/rfc7924'>
<front>
<title>Transport Layer Security (TLS) Cached Information Extension</title>
<author initials='S.' surname='Santesson' fullname='S. Santesson'><organization /></author>
<author initials='H.' surname='Tschofenig' fullname='H. Tschofenig'><organization /></author>
<date year='2016' month='July' />
<abstract><t>Transport Layer Security (TLS) handshakes often include fairly static information, such as the server certificate and a list of trusted certification authorities (CAs).  This information can be of considerable size, particularly if the server certificate is bundled with a complete certificate chain (i.e., the certificates of intermediate CAs up to the root CA).</t><t>This document defines an extension that allows a TLS client to inform a server of cached information, thereby enabling the server to omit already available information.</t></abstract>
</front>
<seriesInfo name='RFC' value='7924'/>
<seriesInfo name='DOI' value='10.17487/RFC7924'/>
</reference>




    </references>


<section anchor="contributors" title="Contributors">

<t>Ryan Hamilton was originally an author of this specification.</t>

</section>
<section anchor="acknowledgments" title="Acknowledgments">

<t>This document has benefited from input from Christian Huitema, Jana Iyengar,
Adam Langley, Roberto Peon, Eric Rescorla, Ian Swett, and many others.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

