<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.26 (Ruby 3.3.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-uta-require-tls13-07" category="bcp" consensus="true" submissionType="IETF" updates="9325" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.0 -->
  <front>
    <title abbrev="require-tls1.3">New Protocols Must Require TLS 1.3</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-uta-require-tls13-07"/>
    <author fullname="Rich Salz">
      <organization>Akamai Technologies</organization>
      <address>
        <email>rsalz@akamai.com</email>
      </address>
    </author>
    <author fullname="Nimrod Aviram">
      <organization/>
      <address>
        <email>nimrod.aviram@gmail.com</email>
      </address>
    </author>
    <date year="2025" month="March" day="24"/>
    <area>Security</area>
    <workgroup>Using TLS in Applications</workgroup>
    <keyword>TLS</keyword>
    <keyword>features</keyword>
    <abstract>
      <?line 120?>

<t>TLS 1.2 is in use and can be configured such that it provides good security
properties. TLS 1.3 use is increasing, and fixes some known deficiencies
with TLS
1.2, such as removing error-prone cryptographic primitives and encrypting
more of the traffic so that it is not readable by outsiders.
For these reasons, new protocols must require and
assume the existence of TLS 1.3.
As DTLS 1.3 is not widely available or deployed,
this prescription does not pertain to DTLS (in any DTLS version); it pertains to
TLS only.</t>
      <t>This document updates RFC9325 and discusses post-quantum cryptography
and fixed weaknesses in TLS 1.2 as a rationale for that update.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-uta-require-tls13/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Using TLS in Applications Working Group mailing list (<eref target="mailto:uta@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/uta/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/uta/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/richsalz/draft-use-tls13"/>.</t>
    </note>
  </front>
  <middle>
    <?line 136?>

<section anchor="sec-reasons">
      <name>Introduction</name>
      <t>TLS 1.2 <xref target="TLS12"/> is in use and can be configured such that
it provides good security properties.
However, this protocol version suffers from several
deficiencies, as described in <xref target="sec-considerations"/>.
Note that addressing them usually requires bespoke configuration.</t>
      <t>TLS 1.3 <xref target="TLS13"/> is also in
widespread use and fixes most known deficiencies with TLS 1.2, such as
encrypting more of the traffic so that it is not readable by outsiders and
removing most cryptographic primitives considered dangerous. Importantly, TLS
1.3 enjoys robust security proofs and provides excellent security without
any additional configuration.</t>
      <t>This document specifies that, since TLS 1.3 use is widespread, new protocols
must require and assume its existence.
It updates <xref target="RFC9325"/> as described in <xref target="rfc9325-updates"/>.
As DTLS 1.3 is not widely available or deployed,
this prescription does not pertain to DTLS (in any DTLS version); it pertains to
TLS only.</t>
      <t>This document updates RFC9325 and discusses post-quantum cryptography
and fixed weaknesses in TLS 1.2 as a rationale for that update.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="implications-for-post-quantum-cryptography">
      <name>Implications for post-quantum cryptography</name>
      <t>Cryptographically-relevant quantum computers (CRQC), once available, will
have a huge impact on TLS traffic. To mitigate this, TLS applications
will need to migrate to post-quantum cryptography (PQC) <xref target="PQC"/>.
Detailed consideration of when any application requires PQC, or when
a CRQC is a threat they need to protect against, is beyond the
scope of this document.</t>
      <t>For TLS it is important to note that the focus of these efforts within
the TLS WG is TLS 1.3
or later, and that TLS 1.2 will not be supported (see <xref target="TLS12FROZEN"/>).
This is one more reason for new protocols to default to TLS 1.3, where
PQC is actively being standardized, as this gives new applications
the option to use PQC.</t>
    </section>
    <section anchor="tls-use-by-other-protocols-and-applications">
      <name>TLS Use by Other Protocols and Applications</name>
      <t>Any new protocol that uses TLS <bcp14>MUST</bcp14> specify as its default TLS 1.3.
For example, QUIC <xref target="QUICTLS"/> requires TLS 1.3 and specifies that endpoints
<bcp14>MUST</bcp14> terminate the connection if an older version is used.</t>
      <t>If deployment considerations are a concern, the protocol <bcp14>MAY</bcp14> specify TLS 1.2 as
an additional, non-default option.
As a counter example, the Usage Profile for DNS over TLS <xref target="DNSTLS"/> specifies
TLS 1.2 as the default, while also allowing TLS 1.3.
For newer specifications that choose to support TLS 1.2, those preferences are
to be reversed.</t>
      <t>The initial TLS handshake allows a client to specify which versions of the
TLS protocol it supports and the server is intended to pick the highest
version that it also supports.  This is known as the "TLS version
negotiation," and protocol and negotiation details are discussed in <xref section="4.2.1" sectionFormat="comma" target="TLS13"/> and <xref section="E" sectionFormat="comma" target="TLS12"/>.  Many TLS libraries provide a way
for applications to specify the range of versions they want, including an
open interval where only the lowest or highest version is specified.</t>
      <t>If the application is using a TLS implementation that supports this,
and if it knows that the TLS implementation will use the highest version
supported, then
clients <bcp14>SHOULD</bcp14> specify just the minimum version they want.
This <bcp14>MUST</bcp14> be TLS 1.3 or TLS 1.2, depending on the circumstances described
in the above paragraphs.</t>
    </section>
    <section anchor="rfc9325-updates">
      <name>Changes to RFC 9325</name>
      <t>RFC 9325 provides recommendations for ensuring the security of deployed
services that use TLS and, unlike this document, DTLS as well.
At the time it was published, it described availability of TLS 1.3
as "widely available." The transition and adoption mentioned in that
documnent has grown, and this document now makes two small changes
to the recommendations in <xref section="3.1.1" sectionFormat="comma" target="RFC9325"/>:</t>
      <ul spacing="normal">
        <li>
          <t>That section says that TLS 1.3 <bcp14>SHOULD</bcp14> be supported; this document says
that for new protocols it <bcp14>MUST</bcp14> be supported.</t>
        </li>
        <li>
          <t>That section says that TLS 1.2 <bcp14>MUST</bcp14> be supported; this document says that
it <bcp14>MAY</bcp14> be supported as described above.</t>
        </li>
      </ul>
      <t>Again, these changes only apply to TLS, and not DTLS.</t>
    </section>
    <section anchor="sec-considerations">
      <name>Security Considerations</name>
      <t>TLS 1.2 was specified with several cryptographic primitives and design choices
that have, over time, weakened its security. The purpose of this section is to
briefly survey several such prominent problems that have affected the protocol.
It should be noted, however, that TLS 1.2 can be configured securely; it is
merely much more difficult to configure it securely as opposed to using its
modern successor, TLS 1.3. See <xref target="RFC9325"/> for a more thorough guide on the
secure deployment of TLS 1.2.</t>
      <t>Firstly, the TLS 1.2 protocol, without any extension points, is vulnerable to
renegotiation attacks (see <xref target="RENEG1"/> and <xref target="RENEG2"/>)  and the
Triple Handshake attack (see <xref target="TRIPLESHAKE"/>).
Broadly, these attacks
exploit the protocol's support for renegotiation in order to inject a prefix
chosen by the attacker into the plaintext stream. This is usually a devastating
threat in practice, that allows e.g. obtaining secret cookies in a web setting.
In light of
the above problems, <xref target="RFC5746"/> specifies an extension that prevents this
category of attacks. To securely deploy TLS 1.2, either renegotiation must be
disabled entirely, or this extension must be used. Additionally, clients must
not allow servers to renegotiate the certificate during a connection.</t>
      <t>Secondly, the original key exchange methods specified for the protocol, namely
RSA key exchange and finite field Diffie-Hellman, suffer from several
weaknesses. Similarly, to securely deploy the protocol, these key exchange
methods must be disabled.
See <xref target="I-D.draft-ietf-tls-deprecate-obsolete-kex"/> for details.</t>
      <t>Thirdly, symmetric ciphers which were widely-used in the protocol, namely RC4
and CBC cipher suites, suffer from several weaknesses. RC4 suffers from
exploitable biases in its key stream; see <xref target="RFC7465"/>. CBC cipher suites have
been a source of vulnerabilities throughout the years. A straightforward
implementation of these cipher suites inherently suffers from the Lucky13 timing
attack <xref target="LUCKY13"/>. The first attempt to implement the cipher suites in
constant time introduced an even more severe vulnerability <xref target="LUCKY13FIX"/>.
There have been further similar vulnerabilities throughout the
years exploiting CBC cipher suites; refer to e.g. <xref target="CBCSCANNING"/>
for an example and a survey of similar works.</t>
      <t>In addition, TLS 1.2 was affected by several other attacks that
TLS 1.3 is immune to:
BEAST <xref target="BEAST"/>, Logjam <xref target="WEAKDH"/>, FREAK <xref target="FREAK"/>, and SLOTH <xref target="SLOTH"/>.</t>
      <t>And finally, while
application layer traffic is always encrypted, most of the handshake
messages are not. Therefore, the privacy provided is suboptimal.
This is a protocol issue that cannot be addressed by configuration.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>This document makes no requests to IANA.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="TLS12">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="TLS13">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Independent</organization>
            </author>
            <date day="17" month="February" year="2025"/>
            <abstract>
              <t>   This document specifies version 1.3 of the Transport Layer Security
   (TLS) protocol.  TLS allows client/server applications to communicate
   over the Internet in a way that is designed to prevent eavesdropping,
   tampering, and message forgery.

   This document updates RFCs 5705, 6066, 7627, and 8422 and obsoletes
   RFCs 5077, 5246, 6961, 8422, and 8446.  This document also specifies
   new requirements for TLS 1.2 implementations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8446bis-12"/>
        </reference>
        <reference anchor="TLS12FROZEN">
          <front>
            <title>TLS 1.2 is in Feature Freeze</title>
            <author fullname="Rich Salz" initials="R." surname="Salz">
              <organization>Akamai Technologies</organization>
            </author>
            <author fullname="Nimrod Aviram" initials="N." surname="Aviram">
         </author>
            <date day="29" month="January" year="2025"/>
            <abstract>
              <t>   Use of TLS 1.3 is growing and fixes some known deficiencies in TLS
   1.2.  This document specifies that outside of urgent security fixes,
   new TLS Exporter Labels, or new Application-Layer Protocol
   Negotiation (ALPN) Protocol IDs, no changes will be approved for TLS
   1.2.  This prescription does not pertain to DTLS (in any DTLS
   version); it pertains to TLS only.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-tls12-frozen-06"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC9325">
          <front>
            <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="November" year="2022"/>
            <abstract>
              <t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are used to protect data exchanged over a wide range of application protocols and can also form the basis for secure transport protocols. Over the years, the industry has witnessed several serious attacks on TLS and DTLS, including attacks on the most commonly used cipher suites and their modes of operation. This document provides the latest recommendations for ensuring the security of deployed services that use TLS and DTLS. These recommendations are applicable to the majority of use cases.</t>
              <t>RFC 7525, an earlier version of the TLS recommendations, was published when the industry was transitioning to TLS 1.2. Years later, this transition is largely complete, and TLS 1.3 is widely available. This document updates the guidance given the new environment and obsoletes RFC 7525. In addition, this document updates RFCs 5288 and 6066 in view of recent attacks.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="195"/>
          <seriesInfo name="RFC" value="9325"/>
          <seriesInfo name="DOI" value="10.17487/RFC9325"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="QUICTLS">
          <front>
            <title>Using TLS to Secure QUIC</title>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <author fullname="S. Turner" initials="S." role="editor" surname="Turner"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document describes how Transport Layer Security (TLS) is used to secure QUIC.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9001"/>
          <seriesInfo name="DOI" value="10.17487/RFC9001"/>
        </reference>
        <reference anchor="DNSTLS">
          <front>
            <title>Usage Profiles for DNS over TLS and DNS over DTLS</title>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
            <author fullname="D. Gillmor" initials="D." surname="Gillmor"/>
            <author fullname="T. Reddy" initials="T." surname="Reddy"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document discusses usage profiles, based on one or more authentication mechanisms, which can be used for DNS over Transport Layer Security (TLS) or Datagram TLS (DTLS). These profiles can increase the privacy of DNS transactions compared to using only cleartext DNS. This document also specifies new authentication mechanisms -- it describes several ways that a DNS client can use an authentication domain name to authenticate a (D)TLS connection to a DNS server. Additionally, it defines (D)TLS protocol profiles for DNS clients and servers implementing DNS over (D)TLS. This document updates RFC 7858.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8310"/>
          <seriesInfo name="DOI" value="10.17487/RFC8310"/>
        </reference>
        <reference anchor="PQC" target="https://www.nist.gov/cybersecurity/what-post-quantum-cryptography">
          <front>
            <title>What Is Post-Quantum Cryptography?</title>
            <author>
              <organization/>
            </author>
            <date year="2024" month="August"/>
          </front>
        </reference>
        <reference anchor="TRIPLESHAKE" target="https://mitls.org/pages/attacks/3SHAKE">
          <front>
            <title>Triple Handshakes Considered Harmful Breaking and Fixing Authentication over TLS</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RENEG1" target="https://web.archive.org/web/20091231034700/http://www.educatedguesswork.org/2009/11/understanding_the_tls_renegoti.html">
          <front>
            <title>Understanding the TLS Renegotiation Attack</title>
            <author initials="E." surname="Rescorla" fullname="Eric Rescorla">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RENEG2" target="https://web.archive.org/web/20091228061844/http://extendedsubset.com/?p=8">
          <front>
            <title>Authentication Gap in TLS Renegotiation</title>
            <author initials="M." surname="Ray" fullname="Marsh Ray">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="LUCKY13" target="http://www.isg.rhul.ac.uk/tls/TLStiming.pdf">
          <front>
            <title>Lucky Thirteen: Breaking the TLS and DTLS record protocols</title>
            <author initials="N. J." surname="Al Fardan">
              <organization/>
            </author>
            <author initials="K. G." surname="Paterson">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="LUCKY13FIX" target="https://nds.rub.de/media/nds/veroeffentlichungen/2016/10/19/tls-attacker-ccs16.pdf">
          <front>
            <title>Systematic fuzzing and testing of TLS libraries</title>
            <author initials="J." surname="Somorovsky" fullname="Juraj Somorovsky">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="CBCSCANNING" target="https://www.usenix.org/system/files/sec19-merget.pdf">
          <front>
            <title>Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities</title>
            <author initials="R." surname="Merget" fullname="Robert Merget">
              <organization/>
            </author>
            <author initials="J." surname="Somorovsky" fullname="Juraj Somorovsky">
              <organization/>
            </author>
            <author initials="N." surname="Aviram" fullname="Nimrod Aviram">
              <organization/>
            </author>
            <author initials="C." surname="Young" fullname="Craig Young">
              <organization/>
            </author>
            <author initials="J." surname="Fliegenschmidt" fullname="Janis Fliegenschmidt">
              <organization/>
            </author>
            <author initials="J." surname="Schwenk" fullname="JÃ¶rg Schwenk">
              <organization/>
            </author>
            <author initials="Y." surname="Shavitt" fullname="Yuval Shavitt">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="BEAST" target="http://www.hpcc.ecs.soton.ac.uk/dan/talks/bullrun/Beast.pdf">
          <front>
            <title>Here come the xor ninjas</title>
            <author initials="T." surname="Duong" fullname="Thai Duong">
              <organization/>
            </author>
            <author initials="J." surname="Rizzo" fullname="Juliano Rizzo">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="WEAKDH" target="https://dl.acm.org/doi/pdf/10.1145/2810103.2813707">
          <front>
            <title>Imperfect forward secrecy: How Diffie-Hellman fails in practice</title>
            <author initials="D." surname="Adrian">
              <organization/>
            </author>
            <author initials="K." surname="Bhargavan">
              <organization/>
            </author>
            <author initials="Z." surname="Durumeric">
              <organization/>
            </author>
            <author initials="P." surname="Gaudry">
              <organization/>
            </author>
            <author initials="M." surname="Green">
              <organization/>
            </author>
            <author initials="J. A." surname="Halderman">
              <organization/>
            </author>
            <author initials="N." surname="Heninger">
              <organization/>
            </author>
            <author initials="D." surname="Springall">
              <organization/>
            </author>
            <author initials="E." surname="ThomÃ©">
              <organization/>
            </author>
            <author initials="L." surname="Valenta">
              <organization/>
            </author>
            <author initials="B." surname="VanderSloot">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="FREAK" target="https://inria.hal.science/hal-01114250/file/messy-state-of-the-union-oakland15.pdf">
          <front>
            <title>A messy state of the union: Taming the composite state machines of TLS</title>
            <author initials="B." surname="Beurdouche" fullname="Benjamin Beurdouche">
              <organization/>
            </author>
            <author initials="K." surname="Bhargavan" fullname="Karthikeyan Bhargavan">
              <organization/>
            </author>
            <author initials="A." surname="Delignat-Lavaud" fullname="Antoine Delignat-Lavaud">
              <organization/>
            </author>
            <author initials="C." surname="Fournet" fullname="CÃ©dric Fournet">
              <organization/>
            </author>
            <author initials="M." surname="Kohlweiss" fullname="Markulf Kohlweiss">
              <organization/>
            </author>
            <author initials="A." surname="Pironti" fullname="Alfredo Pironti">
              <organization/>
            </author>
            <author initials="P.-Y." surname="Strub" fullname="Pierre-Yves Strub">
              <organization/>
            </author>
            <author initials="J. K." surname="Zinzindohoue" fullname="Jean Karim Zinzindohoue">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="SLOTH" target="https://inria.hal.science/hal-01244855/file/SLOTH_NDSS16.pdf">
          <front>
            <title>Transcript collision attacks: Breaking authentication in TLS, IKE, and SSH</title>
            <author initials="K." surname="Bhargavan" fullname="Karthikeyan Bhargavan">
              <organization/>
            </author>
            <author initials="G." surname="Leurent" fullname="GaÃ«tan Leurent">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC5746">
          <front>
            <title>Transport Layer Security (TLS) Renegotiation Indication Extension</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="M. Ray" initials="M." surname="Ray"/>
            <author fullname="S. Dispensa" initials="S." surname="Dispensa"/>
            <author fullname="N. Oskov" initials="N." surname="Oskov"/>
            <date month="February" year="2010"/>
            <abstract>
              <t>Secure Socket Layer (SSL) and Transport Layer Security (TLS) renegotiation are vulnerable to an attack in which the attacker forms a TLS connection with the target server, injects content of his choice, and then splices in a new TLS connection from a client. The server treats the client's initial TLS handshake as a renegotiation and thus believes that the initial data transmitted by the attacker is from the same entity as the subsequent client data. This specification defines a TLS extension to cryptographically tie renegotiations to the TLS connections they are being performed over, thus preventing this attack. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5746"/>
          <seriesInfo name="DOI" value="10.17487/RFC5746"/>
        </reference>
        <reference anchor="I-D.draft-ietf-tls-deprecate-obsolete-kex">
          <front>
            <title>Deprecating Obsolete Key Exchange Methods in TLS 1.2</title>
            <author fullname="Carrick Bartle" initials="C." surname="Bartle">
              <organization>Roblox</organization>
            </author>
            <author fullname="Nimrod Aviram" initials="N." surname="Aviram">
         </author>
            <date day="3" month="September" year="2024"/>
            <abstract>
              <t>   This document deprecates the use of RSA key exchange and Diffie
   Hellman over a finite field in TLS 1.2, and discourages the use of
   static elliptic curve Diffie Hellman cipher suites.

   Note that these prescriptions apply only to TLS 1.2 since TLS 1.0 and
   1.1 are deprecated by RFC 8996 and TLS 1.3 either does not use the
   affected algorithm or does not share the relevant configuration
   options.

   This document updates RFCs 9325, 4346, 5246, 4162, 6347, 5932, 5288,
   6209, 6367, 8422, 5289, 5469, 4785, 4279, 5487, 6655, and 7905.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-deprecate-obsolete-kex-05"/>
        </reference>
        <reference anchor="RFC7465">
          <front>
            <title>Prohibiting RC4 Cipher Suites</title>
            <author fullname="A. Popov" initials="A." surname="Popov"/>
            <date month="February" year="2015"/>
            <abstract>
              <t>This document requires that Transport Layer Security (TLS) clients and servers never negotiate the use of RC4 cipher suites when they establish connections. This applies to all TLS versions. This document updates RFCs 5246, 4346, and 2246.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7465"/>
          <seriesInfo name="DOI" value="10.17487/RFC7465"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
