<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.3.3 -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<?rfc rfcedstyle="yes"?>
<?rfc toc="yes"?>
<?rfc tocindent="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc text-list-symbols="o-*+"?>
<?rfc compact="yes"?>
<?rfc subcompact="yes"?>
<?rfc consensus="no"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-uta-tls13-iot-profile-00" category="std" consensus="true" updates="7925" obsoletes="" submissionType="IETF" xml:lang="en" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 2.40.0 -->
  <front>
    <title abbrev="TLS/DTLS 1.3 IoT Profiles">TLS/DTLS 1.3 Profiles for the Internet of Things</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-uta-tls13-iot-profile-00"/>
    <author initials="H." surname="Tschofenig" fullname="Hannes Tschofenig">
      <organization>Arm Limited</organization>
      <address>
        <email>Hannes.Tschofenig@gmx.net</email>
      </address>
    </author>
    <author initials="T." surname="Fossati" fullname="Thomas Fossati">
      <organization>Arm Limited</organization>
      <address>
        <email>Thomas.Fossati@arm.com</email>
      </address>
    </author>
    <date year="2020" month="June" day="05"/>
    <area>Security</area>
    <workgroup>UTA</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document is a companion to RFC 7925 and defines TLS/DTLS 1.3 profiles for
Internet of Things devices.  It also updates RFC 7925 with regards to the X.509
certificate profile.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Source for this draft and an issue tracker can be found at
  <eref target="https://github.com/thomas-fossati/draft-tls13-iot">https://github.com/thomas-fossati/draft-tls13-iot</eref>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction" numbered="true" toc="default">
      <name>Introduction</name>
      <t>This document defines a profile of DTLS 1.3 <xref target="I-D.ietf-tls-dtls13" format="default"/> and TLS
1.3 <xref target="RFC8446" format="default"/> that offers communication security services for IoT
applications and is reasonably implementable on many constrained devices.
Profile thereby means that available configuration options and protocol
extensions are utilized to best support the IoT environment.</t>
      <t>For IoT profiles using TLS/DTLS 1.2 please consult <xref target="RFC7925" format="default"/>. This document
re-uses the communication pattern defined in <xref target="RFC7925" format="default"/> and makes IoT-domain
specific recommendations for version 1.3 (where necessary).</t>
      <t>TLS 1.3 has been re-designed and several previously defined extensions are not
applicable to the new version of TLS/DTLS anymore. This clean-up also
simplifies this document.  Furthermore, many outdated ciphersuites have been
omitted from the TLS/DTLS 1.3 specification.</t>
      <section anchor="conventions-and-terminology" numbered="true" toc="default">
        <name>Conventions and Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP&nbsp;14 <xref target="RFC2119" format="default"/> <xref target="RFC8174" format="default"/> when, and only when, they
appear in all capitals, as shown here.</t>
      </section>
    </section>
    <section anchor="credential-types" numbered="true" toc="default">
      <name>Credential Types</name>
      <t>In accordance with the recommendations in <xref target="RFC7925" format="default"/>, a compliant
implementation MUST implement TLS_AES_128_CCM_8_SHA256. It SHOULD implement
TLS_CHACHA20_POLY1305_SHA256.</t>
      <t>Pre-shared key based authentication is integrated into the main TLS/DTLS 1.3
specification and has been harmonized with session resumption.</t>
      <t>A compliant implementation supporting authentication based on certificates and
raw public keys MUST support digital signatures with ecdsa_secp256r1_sha256. A
compliant implementation MUST support the key exchange with secp256r1 (NIST
P-256) and SHOULD support key exchange with X25519.</t>
      <t>A plain PSK-based TLS/DTLS client or server MUST implement the following
extensions:</t>
      <ul spacing="compact">
        <li>supported_versions</li>
        <li>cookie</li>
        <li>server_name</li>
        <li>pre_shared_key</li>
        <li>psk_key_exchange_modes</li>
      </ul>
      <t>For TLS/DTLS clients and servers implementing raw public keys and/or
certificates the guidance for mandatory-to-implement extensions described in
Section 9.2 of <xref target="RFC8446" format="default"/> MUST be followed.</t>
    </section>
    <section anchor="error-handling" numbered="true" toc="default">
      <name>Error Handling</name>
      <t>TLS 1.3 simplified the Alert protocol but the underlying challenge in an
embedded context remains unchanged, namely what should an IoT device do when it
encounters an error situation. The classical approach used in a desktop
environment where the user is prompted is often not applicable with unattended
devices. Hence, it is more important for a developer to find out from which
error cases a device can recover from.</t>
    </section>
    <section anchor="session-resumption" numbered="true" toc="default">
      <name>Session Resumption</name>
      <t>TLS 1.3 has built-in support for session resumption by utilizing PSK-based
credentials established in an earlier exchange.</t>
    </section>
    <section anchor="compression" numbered="true" toc="default">
      <name>Compression</name>
      <t>TLS 1.3 does not have support for compression.</t>
    </section>
    <section anchor="perfect-forward-secrecy" numbered="true" toc="default">
      <name>Perfect Forward Secrecy</name>
      <t>TLS 1.3 allows the use of PFS with all ciphersuites since the support for it is
negotiated independently.</t>
    </section>
    <section anchor="keep-alive" numbered="true" toc="default">
      <name>Keep-Alive</name>
      <t>The discussion in Section 10 of <xref target="RFC7925" format="default"/> is applicable.</t>
    </section>
    <section anchor="timeouts" numbered="true" toc="default">
      <name>Timeouts</name>
      <t>The recommendation in Section 11 of <xref target="RFC7925" format="default"/> is applicable. In particular
this document RECOMMENDED to use an initial timer value of 9 seconds with
exponential back off up to no less then 60 seconds.</t>
      <t>Question: DTLS 1.3 now offers per-record retransmission and therefore
introduces much less congestion risk associated with spurious retransmissions.
Hence, should we relax the 9s initial timeout?</t>
    </section>
    <section anchor="random-number-generation" numbered="true" toc="default">
      <name>Random Number Generation</name>
      <t>The discussion in Section 12 of <xref target="RFC7925" format="default"/> is applicable with one exception:
the ClientHello and the ServerHello messages in TLS 1.3 do not contain
gmt_unix_time component anymore.</t>
    </section>
    <section anchor="server-name-indication-sni" numbered="true" toc="default">
      <name>Server Name Indication (SNI)</name>
      <t>This specification mandates the implementation of the SNI extension. Where
privacy requirements require it, the encrypted SNI extension
<xref target="I-D.ietf-tls-esni" format="default"/> prevents an on-path attacker to determine the domain
name the client is trying to connect to. Note, however, that the extension is
still at an experimental state.</t>
    </section>
    <section anchor="maximum-fragment-length-negotiation" numbered="true" toc="default">
      <name>Maximum Fragment Length Negotiation</name>
      <t>The Maximum Fragment Length Negotiation (MFL) extension has been superseded by
the Record Size Limit (RSL) extension <xref target="RFC8449" format="default"/>. Implementations in
compliance with this specification MUST implement the RSL extension and SHOULD
use it to indicate their RAM limitations.</t>
    </section>
    <section anchor="crypto-agility" numbered="true" toc="default">
      <name>Crypto Agility</name>
      <t>The recommendations in Section 19 of <xref target="RFC7925" format="default"/> are applicable.</t>
    </section>
    <section anchor="key-length-recommendations" numbered="true" toc="default">
      <name>Key Length Recommendations</name>
      <t>The recommendations in Section 20 of <xref target="RFC7925" format="default"/> are applicable.</t>
    </section>
    <section anchor="rtt-data" numbered="true" toc="default">
      <name>0-RTT Data</name>
      <t>When clients and servers share a PSK, TLS/DTLS 1.3 allows clients to send data
on the first flight ("early data"). This features reduces communication setup
latency but requires application layer protocols to define its use with the
0-RTT data functionality.</t>
      <t>For HTTP this functionality is described in <xref target="RFC8470" format="default"/>. This document
specifies the application profile for CoAP, which follows the design of
<xref target="RFC8470" format="default"/>.</t>
      <t>For a given request, the level of tolerance to replay risk is specific to the
resource it operates upon (and therefore only known to the origin server).  In
general, if processing a request does not have state-changing side effects, the
consequences of replay are not significant. The server can choose whether it
will process early data before the TLS handshake completes.</t>
      <t>It is RECOMMENDED that origin servers allow resources to explicitly configure
whether early data is appropriate in requests.</t>
      <t>This specification specifies the Early-Data option, which indicates that the
request has been conveyed in early data and that a client understands the 4.25
(Too Early) status code. The semantic follows <xref target="RFC8470" format="default"/>.</t>
      <figure anchor="early-data-figure">
        <name>Early-Data Option</name>
        <artwork name="" type="" align="left" alt=""><![CDATA[
+-----+---+---+---+---+-------------+--------+--------+---------+---+
| No. | C | U | N | R | Name        | Format | Length | Default | E |
+-----+---+---+---+---+-------------+--------+--------+---------+---+
| TBD | x |   |   |   | Early-Data  | empty  | 0      | (none)  | x |
+-----+---+---+---+---+-------------+--------+--------+---------+---+

        C=Critical, U=Unsafe, N=NoCacheKey, R=Repeatable,
        E=Encrypt and Integrity Protect (when using OSCORE)
]]></artwork>
      </figure>
    </section>
    <section anchor="certificate-profile" numbered="true" toc="default">
      <name>Certificate Profile</name>
      <t>This section is intended for discussing updates to the certificate profile
defined in <xref target="RFC7925" format="default"/>.  Initial set of things to consider:</t>
      <ul spacing="compact">
        <li>pathLenConstraint</li>
      </ul>
      <t>Question: should also we move the ASN.1 schema from Appendix B of
<xref target="I-D.raza-ace-cbor-certificates" format="default"/> here and let it have it by reference?</t>
      <section anchor="compression-1" numbered="true" toc="default">
        <name>Compression</name>
        <t>The compression methods defined in <xref target="I-D.ietf-tls-certificate-compression" format="default"/> do
not seem to deal effectively with <xref target="RFC7925" format="default"/> profiled certificates: zlib
compresses the example cert by 9%, but other certificates and compression
algorithms do in many cases increase the overall size.  On the other hand,
<xref target="I-D.raza-ace-cbor-certificates" format="default"/> provides a more efficient scheme, yielding
to compression rates higher than 50% (see Section 3 of
<xref target="I-D.mattsson-cose-cbor-cert-compress" format="default"/>).</t>
        <t>Question: should we RECOMMEND CBOR compression?  How is that negotiated?</t>
      </section>
    </section>
    <section anchor="security-considerations" numbered="true" toc="default">
      <name>Security Considerations</name>
      <t>This entire document is about security.</t>
    </section>
    <section anchor="iana-considerations" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <t>IANA is asked to add the Option defined in <xref target="early-data-option" format="default"/> to the CoAP
Option Numbers registry.</t>
      <figure anchor="early-data-option">
        <name>Early-Data Option</name>
        <artwork name="" type="" align="left" alt=""><![CDATA[
+--------+------------+-----------+
| Number | Name       | Reference |
+--------+------------+-----------+
| TBD    | Early-Data | RFCThis   |
+--------+------------+-----------+
]]></artwork>
      </figure>
      <t>IANA is asked to add the Response Code defined in <xref target="too-early-code" format="default"/> to the
CoAP Response Code registry.</t>
      <figure anchor="too-early-code">
        <name>Too Early Response Code</name>
        <artwork name="" type="" align="left" alt=""><![CDATA[
+--------+-------------+-----------+
| Code   | Description | Reference |
+--------+-------------+-----------+
| 4.25   | Too Early   | RFCThis   |
+--------+-------------+-----------+
]]></artwork>
      </figure>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="I-D.ietf-tls-dtls13" target="http://www.ietf.org/internet-drafts/draft-ietf-tls-dtls13-38.txt">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-tls-dtls13-38"/>
            <author initials="E" surname="Rescorla" fullname="Eric Rescorla">
              <organization/>
            </author>
            <author initials="H" surname="Tschofenig" fullname="Hannes Tschofenig">
              <organization/>
            </author>
            <author initials="N" surname="Modadugu" fullname="Nagendra Modadugu">
              <organization/>
            </author>
            <date month="May" day="29" year="2020"/>
            <abstract>
              <t>This document specifies Version 1.3 of the Datagram Transport Layer Security (DTLS) protocol.  DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.  The DTLS 1.3 protocol is intentionally based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection/non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8446" target="https://www.rfc-editor.org/info/rfc8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <seriesInfo name="DOI" value="10.17487/RFC8446"/>
            <seriesInfo name="RFC" value="8446"/>
            <author initials="E." surname="Rescorla" fullname="E. Rescorla">
              <organization/>
            </author>
            <date year="2018" month="August"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC7925" target="https://www.rfc-editor.org/info/rfc7925">
          <front>
            <title>Transport Layer Security (TLS) / Datagram Transport Layer Security (DTLS) Profiles for the Internet of Things</title>
            <seriesInfo name="DOI" value="10.17487/RFC7925"/>
            <seriesInfo name="RFC" value="7925"/>
            <author initials="H." surname="Tschofenig" fullname="H. Tschofenig" role="editor">
              <organization/>
            </author>
            <author initials="T." surname="Fossati" fullname="T. Fossati">
              <organization/>
            </author>
            <date year="2016" month="July"/>
            <abstract>
              <t>A common design pattern in Internet of Things (IoT) deployments is the use of a constrained device that collects data via sensors or controls actuators for use in home automation, industrial control systems, smart cities, and other IoT deployments.</t>
              <t>This document defines a Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) 1.2 profile that offers communications security for this data exchange thereby preventing eavesdropping, tampering, and message forgery.  The lack of communication security is a common vulnerability in IoT products that can easily be solved by using these well-researched and widely deployed Internet security protocols.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <seriesInfo name="DOI" value="10.17487/RFC2119"/>
            <seriesInfo name="RFC" value="2119"/>
            <seriesInfo name="BCP" value="14"/>
            <author initials="S." surname="Bradner" fullname="S. Bradner">
              <organization/>
            </author>
            <date year="1997" month="March"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <seriesInfo name="DOI" value="10.17487/RFC8174"/>
            <seriesInfo name="RFC" value="8174"/>
            <seriesInfo name="BCP" value="14"/>
            <author initials="B." surname="Leiba" fullname="B. Leiba">
              <organization/>
            </author>
            <date year="2017" month="May"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8449" target="https://www.rfc-editor.org/info/rfc8449">
          <front>
            <title>Record Size Limit Extension for TLS</title>
            <seriesInfo name="DOI" value="10.17487/RFC8449"/>
            <seriesInfo name="RFC" value="8449"/>
            <author initials="M." surname="Thomson" fullname="M. Thomson">
              <organization/>
            </author>
            <date year="2018" month="August"/>
            <abstract>
              <t>An extension to Transport Layer Security (TLS) is defined that allows endpoints to negotiate the maximum size of protected records that each will send the other.</t>
              <t>This replaces the maximum fragment length extension defined in RFC 6066.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8470" target="https://www.rfc-editor.org/info/rfc8470">
          <front>
            <title>Using Early Data in HTTP</title>
            <seriesInfo name="DOI" value="10.17487/RFC8470"/>
            <seriesInfo name="RFC" value="8470"/>
            <author initials="M." surname="Thomson" fullname="M. Thomson">
              <organization/>
            </author>
            <author initials="M." surname="Nottingham" fullname="M. Nottingham">
              <organization/>
            </author>
            <author initials="W." surname="Tarreau" fullname="W. Tarreau">
              <organization/>
            </author>
            <date year="2018" month="September"/>
            <abstract>
              <t>Using TLS early data creates an exposure to the possibility of a replay attack.  This document defines mechanisms that allow clients to communicate with servers about HTTP requests that are sent in early data.  Techniques are described that use these mechanisms to mitigate the risk of replay.</t>
            </abstract>
          </front>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="I-D.ietf-tls-esni" target="http://www.ietf.org/internet-drafts/draft-ietf-tls-esni-07.txt">
          <front>
            <title>TLS Encrypted Client Hello</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-tls-esni-07"/>
            <author initials="E" surname="Rescorla" fullname="Eric Rescorla">
              <organization/>
            </author>
            <author initials="K" surname="Oku" fullname="Kazuho Oku">
              <organization/>
            </author>
            <author initials="N" surname="Sullivan" fullname="Nick Sullivan">
              <organization/>
            </author>
            <author initials="C" surname="Wood" fullname="Christopher Wood">
              <organization/>
            </author>
            <date month="June" day="1" year="2020"/>
            <abstract>
              <t>This document describes a mechanism in Transport Layer Security (TLS) for encrypting a ClientHello message under a server public key.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.raza-ace-cbor-certificates" target="http://www.ietf.org/internet-drafts/draft-raza-ace-cbor-certificates-04.txt">
          <front>
            <title>CBOR Profile of X.509 Certificates</title>
            <seriesInfo name="Internet-Draft" value="draft-raza-ace-cbor-certificates-04"/>
            <author initials="S" surname="Raza" fullname="Shahid Raza">
              <organization/>
            </author>
            <author initials="J" surname="Hoglund" fullname="Joel Hoglund">
              <organization/>
            </author>
            <author initials="G" surname="Selander" fullname="Goeran Selander">
              <organization/>
            </author>
            <author initials="J" surname="Mattsson" fullname="John Mattsson">
              <organization/>
            </author>
            <author initials="M" surname="Furuhed" fullname="Martin Furuhed">
              <organization/>
            </author>
            <date month="March" day="9" year="2020"/>
            <abstract>
              <t>This document specifies a CBOR encoding and profiling of X.509 public key certificate suitable for Internet of Things (IoT) deployments. The full X.509 public key certificate format and commonly used ASN.1 DER encoding is overly verbose for constrained IoT environments. Profiling together with CBOR encoding reduces the certificate size significantly with associated known performance benefits.  The CBOR certificates are compatible with the existing X.509 standard, enabling the use of profiled and compressed X.509 certificates without modifications in the existing X.509 standard.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.ietf-tls-certificate-compression" target="http://www.ietf.org/internet-drafts/draft-ietf-tls-certificate-compression-10.txt">
          <front>
            <title>TLS Certificate Compression</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-tls-certificate-compression-10"/>
            <author initials="A" surname="Ghedini" fullname="Alessandro Ghedini">
              <organization/>
            </author>
            <author initials="V" surname="Vasiliev" fullname="Victor Vasiliev">
              <organization/>
            </author>
            <date month="January" day="6" year="2020"/>
            <abstract>
              <t>In TLS handshakes, certificate chains often take up the majority of the bytes transmitted.  This document describes how certificate chains can be compressed to reduce the amount of data transmitted and avoid some round trips.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.mattsson-cose-cbor-cert-compress" target="http://www.ietf.org/internet-drafts/draft-mattsson-cose-cbor-cert-compress-00.txt">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Headers for Carrying CBOR Compressed Certificates</title>
            <seriesInfo name="Internet-Draft" value="draft-mattsson-cose-cbor-cert-compress-00"/>
            <author initials="J" surname="Mattsson" fullname="John Mattsson">
              <organization/>
            </author>
            <author initials="G" surname="Selander" fullname="Goeran Selander">
              <organization/>
            </author>
            <author initials="S" surname="Raza" fullname="Shahid Raza">
              <organization/>
            </author>
            <author initials="J" surname="Hoglund" fullname="Joel Hoglund">
              <organization/>
            </author>
            <author initials="M" surname="Furuhed" fullname="Martin Furuhed">
              <organization/>
            </author>
            <date month="March" day="9" year="2020"/>
            <abstract>
              <t>Certificate chains often take up the majority of the bytes transmitted in COSE message that carry certificates.  Large messages can cause problems, particularly in constrained IoT environments. RFC 7925 defines a certificate profile for constrained IoT.  General purpose compression algorithms can in many cases not compress RFC 7925 profiled certificates at all.  By using the fact that the certificates are profiled, the CBOR certificate compression algorithms can in many cases compress RFC 7925 profiled certificates with over 50%. This document specifies the CBOR certificate compression algorithm for use with COSE.</t>
            </abstract>
          </front>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
