<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.31 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-tsvwg-dtls-over-sctp-bis-06" category="std" consensus="true" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.17.1 -->
  <front>
    <title abbrev="DTLS over SCTP">Datagram Transport Layer Security (DTLS) over Stream Control Transmission Protocol (SCTP)</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-tsvwg-dtls-over-sctp-bis-06"/>
    <author initials="M." surname="Westerlund" fullname="Magnus Westerlund">
      <organization>Ericsson</organization>
      <address>
        <email>magnus.westerlund@ericsson.com</email>
      </address>
    </author>
    <author initials="J." surname="Preuß Mattsson" fullname="John Preuß Mattsson">
      <organization>Ericsson</organization>
      <address>
        <email>john.mattsson@ericsson.com</email>
      </address>
    </author>
    <author initials="C." surname="Porfiri" fullname="Claudio Porfiri">
      <organization>Ericsson</organization>
      <address>
        <email>claudio.porfiri@ericsson.com</email>
      </address>
    </author>
    <date year="2023" month="April" day="24"/>
    <area>Transport</area>
    <workgroup>TSVWG</workgroup>
    <abstract>
      <t>This document describes the usage of the Datagram Transport Layer
   Security (DTLS) protocol to protect user messages sent over the
   Stream Control Transmission Protocol (SCTP). It is an improved
   alternative to the existing RFC 6083.</t>
      <t>DTLS over SCTP provides mutual authentication, confidentiality,
   integrity protection, and replay protection for applications that
   use SCTP as their transport protocol and allows client/server
   applications to communicate in a way that is designed to give
   communications privacy and to prevent eavesdropping and detect
   tampering or message forgery.</t>
      <t>Applications using DTLS over SCTP can use almost all transport
   features provided by SCTP and its extensions. This document is an
   improved alternative to RFC 6083 and removes the 16 kB limitation
   on protected user message size by defining a secure user message
   fragmentation so that multiple DTLS records can be used to protect
   a single user message. It further contains a large number of
   security fixes and improvements. It updates the DTLS versions and
   SCTP-AUTH HMAC algorithms to use. It mitigates reflection attacks
   of data and control chunks and replay attacks of data chunks.  It
   simplifies secure implementation by some stricter requirements on
   the establishment procedures as well as rekeying to align with zero
   trust principles.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <section anchor="overview">
        <name>Overview</name>
        <t>This document describes the usage of the Datagram Transport Layer
   Security (DTLS) protocol, as defined in DTLS 1.2 <xref target="RFC6347"/>, and
   DTLS 1.3 <xref target="RFC9147"/>, over the Stream Control
   Transmission Protocol (SCTP), as defined in <xref target="RFC9260"/> with
   Authenticated Chunks for SCTP (SCTP-AUTH) <xref target="RFC4895"/>.</t>
        <t>This specification provides mutual authentication of endpoints,
   data confidentiality, data origin authentication, data integrity
   protection, and data replay protection of user messages for
   applications that use SCTP as their transport protocol.  Thus, it
   allows client/server applications to communicate in a way that is
   designed to give communications privacy and to prevent
   eavesdropping and detect tampering or message forgery. DTLS/SCTP
   uses DTLS for mutual authentication, key exchange with forward
   secrecy for SCTP-AUTH, and confidentiality of user
   messages. DTLS/SCTP use SCTP and SCTP-AUTH for integrity protection
   and replay protection of all SCTP Chunks that can be authenticated,
   including user messages.</t>
        <t>Applications using DTLS over SCTP can use almost all transport
   features provided by SCTP and its extensions. DTLS/SCTP supports:</t>
        <ul spacing="normal">
          <li>preservation of message boundaries.</li>
          <li>a large number of unidirectional and bidirectional streams.</li>
          <li>ordered and unordered delivery of SCTP user messages.</li>
          <li>the partial reliability extension as defined in <xref target="RFC3758"/>.</li>
          <li>the dynamic address reconfiguration extension as defined in
 <xref target="RFC5061"/>.</li>
          <li>User messages of any size.</li>
        </ul>
        <t>The method described in this document requires that the SCTP
   implementation supports the optional feature of fragmentation of
   SCTP user messages as defined in <xref target="RFC9260"/>. The implementation is
   required to have an SCTP API (for example the one described in
   <xref target="RFC6458"/>) that supports partial user message delivery and also
   recommended that I-DATA chunks as defined in <xref target="RFC8260"/> is used to
   efficiently implement and support larger user messages.</t>
        <t>To simplify implementation and reduce the risk for security holes,
   limitations have been defined such that STARTTLS as specified in
   <xref target="RFC3788"/> is no longer supported.</t>
      </section>
      <section anchor="protocol-overview">
        <name>Protocol Overview</name>
        <t>The DTLS/SCTP protection is defined as an SCTP adaptation layer
<xref target="RFC5061"/> that is implemented on top of an SCTP API for an SCTP
implementation with SCTP-AUTH <xref target="RFC4895"/> support. DTLS/SCTP is
expected to provide an SCTP like API towards the upper layer protocol
with some additions for controlling the DTLS/SCTP security parameters
and policies. This minimizes the impact on the SCTP implementation and
wire image.</t>
        <figure anchor="dtls-sctp-layering">
          <name>DTLS/SCTP layering in regard to SCTP and upper layer protocol</name>
          <artset>
            <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="288" width="464" viewBox="0 0 464 288" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px">
                <path d="M 8,32 L 8,256" fill="none" stroke="black"/>
                <path d="M 184,32 L 184,256" fill="none" stroke="black"/>
                <path d="M 272,128 L 272,160" fill="none" stroke="black"/>
                <path d="M 328,128 L 328,160" fill="none" stroke="black"/>
                <path d="M 8,32 L 184,32" fill="none" stroke="black"/>
                <path d="M 8,96 L 184,96" fill="none" stroke="black"/>
                <path d="M 272,128 L 328,128" fill="none" stroke="black"/>
                <path d="M 184,144 L 264,144" fill="none" stroke="black"/>
                <path d="M 272,160 L 328,160" fill="none" stroke="black"/>
                <path d="M 8,192 L 184,192" fill="none" stroke="black"/>
                <path d="M 8,256 L 184,256" fill="none" stroke="black"/>
                <g class="text">
                  <text x="96" y="68">ULP</text>
                  <text x="204" y="100">&lt;-</text>
                  <text x="236" y="100">SCTP</text>
                  <text x="272" y="100">API</text>
                  <text x="296" y="100">+</text>
                  <text x="340" y="100">Security</text>
                  <text x="420" y="100">Parameters</text>
                  <text x="56" y="132">DTLS/SCTP</text>
                  <text x="60" y="148">Adaptation</text>
                  <text x="300" y="148">DTLS</text>
                  <text x="40" y="164">Layer</text>
                  <text x="204" y="196">&lt;-</text>
                  <text x="236" y="196">SCTP</text>
                  <text x="272" y="196">API</text>
                  <text x="296" y="196">+</text>
                  <text x="344" y="196">SCTP-AUTH</text>
                  <text x="400" y="196">API</text>
                  <text x="44" y="228">SCTP</text>
                  <text x="72" y="228">+</text>
                  <text x="120" y="228">SCTP-AUTH</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art"><![CDATA[
+---------------------+
|                     |
|         ULP         |
|                     |
+---------------------+ <- SCTP API + Security Parameters
|                     |
| DTLS/SCTP           |          +------+
| Adaptation          +----------| DTLS |
| Layer               |          +------+
|                     |
+---------------------+ <- SCTP API + SCTP-AUTH API
|                     |
|  SCTP + SCTP-AUTH   |
|                     |
+---------------------+

]]></artwork>
          </artset>
        </figure>
        <t>DTLS/SCTP performs protection operations on ULP data as it is provided
to DTLS/SCTP, as whole or a part of a SCTP user messages to be
transported to the peer. DTLS/SCTP uses the regular SCTP multiplexing
mechanisms for data using streams and individual user messages. The
protection operation for a ULP user message larger than the maximum
DTLS record size is performed by first splitting the user message into
suitable fragments that fit into individual DTLS records. Each
fragment is encrypted and provided with authentication tag by DTLS.</t>
        <artwork><![CDATA[
   m0 | m1 | m2 | ... = user_message

  user_message' = DTLS( m0 ) | DTLS( m1 ) | DTLS( m2 ) ...
]]></artwork>
        <t>The sequence of protected user message fragments (user_message') are
then transmitted as a SCTP user message. SCTP-AUTH provides
authentication of the SCTP packets and prevents injection of data or
reordering of DTLS fragments thus ensuring that each protected user
message can be de-protected in the receiver in order and
reassembled. Partial transmission and delivery of user messages are
supported on a per fragment basis.</t>
        <t>SCTP's capability for multi-stream concurrent transmission of
different SCTP user messages, where each SCTP user message can
potentially be very large, results in some challenges for any change
of the keys used to protect the ULP data. SCTP-AUTH API, defined in
<xref target="RFC6458"/>, provides additional limitations that needs to be
considered when supported. These issues and the related limitations
will be discussed more in details below.</t>
        <t>RFC6083 dealt with the above limitations by requiring that the peers
drained all outstanding data before updating the key to prevent
issues. This can have significant impact on a ULP that requires timely
and frequent exchange of user messages. This specification uses
another solution to these problems assuming a sufficient capable SCTP
and SCTP-AUTH implementations and with rich enough APIs.</t>
        <t>The solution that ensures the current keying material will not be
prematurely discarded on renegotiation or key update, is based on not
using these mechanisms and instead establishing a second DTLS
connection over the SCTP association. This creates a parallel DTLS
connections, where the DTLS connection ID feature is used to identify
the originating DTLS connection for each DTLS record or message. When
a new DTLS connection has been established and its keying material is
made available, the sender starts using it to protect the ULP
data. When all protected user message fragments protected by the old
key have been delivered in a non-renegable way then the old DTLS
connection can be terminated and the associated keying material
discarded.</t>
      </section>
      <section anchor="buffering">
        <name>DTLS/SCTP Buffering and Flow Control</name>
        <t>With DTLS/SCTP as a layer above SCTP stacks on both sender and
   receiver side some consideration is needed for buffering and
   resource contention, and how back pressure is applied in cases the
   receiving application is not keeping up with the sender. The ULP
   may use multiple user messages simultaneous, and the progress and
   delivery of these messages are progressing independently, thus the
   receiving DTLS/SCTP implementation may not receive DTLS records in
   order in case of packet loss.</t>
        <t>On the sender side the DTLS/SCTP layer will need to accept data
   from the ULP of at least one maximum DTLS record size. The maximum
   DTLS record size is 2<sup>14</sup> bytes per default or a lower
   negotiated value using the DTLS extension defined in
   <xref target="RFC8449"/>. The user message fragment is then protected by DTLS
   and assumed to immediately after be dispatched for transmission by
   SCTP.</t>
        <t>As SCTP schedules the DTLS record for transmission as SCTP packets
   it will become part of the data tracked by the send/receive buffer
   in the SCTP stacks. The maximum receiver buffer size is negotiated
   and provides an upper limit of how much outstanding data can exist
   on the SCTP layer. For example, if an DTLS record part of user
   message N experience repeated packet losses, it may not be
   delivered, despite several later user messages fragments has been
   delivered.</t>
        <t>Next, we assume that the receiver side DTLS/SCTP will read partial
   user messages from the SCTP receiver stack as they become available
   unless it can't keep up or has run out of intermediate buffer space
   for reassembly of the DTLS records in each user message. Thus, in
   case the receiver falls behind it will eventually block the
   receiver buffer by not consuming data from it and thus creating
   back pressure towards the sender. But, at any time it is assumed
   that the receiver side DTLS/SCTP layer will not buffer multiple
   DTLS records, and instead process each as soon as
   possible. Buffering multiple DTLS records prior to DTLS decryption
   would increase the total number of DTLS records in flight, counted
   between DTLS encryption and decryption, and thus risk overlapping
   DTLS sequence numbers.</t>
        <t>To avoid overlapping sequence number the DTLS sender should first
   of all use 16-bit sequence number to enable a larger
   space. Secondly, it should track which DTLS records has been
   non-renegable ACKed by the receiver and always maintain a certain
   safety buffer in number of DTLS records. Thirdly, the
   implementation needs to attempt to minimize usage of buffers that
   exist after the DTLS encryption until the DTLS Decryption in its
   sender and receiver implementation.</t>
      </section>
      <section anchor="comparison-with-tls-over-sctp">
        <name>Comparison with TLS over SCTP</name>
        <t>TLS, from which DTLS was derived, is designed to run on top of a
   byte-stream-oriented transport protocol providing a reliable, in-
   sequence delivery. TLS over SCTP as described in <xref target="RFC3436"/> has
   some serious limitations:</t>
        <ul spacing="normal">
          <li>It does not support the unordered delivery of SCTP user messages.</li>
          <li>It does not support partial reliability as defined in
<xref target="RFC3758"/>.</li>
          <li>It only supports the usage of the same number of streams in both
 directions.</li>
          <li>It uses a TLS connection for every bidirectional stream, which
 requires a substantial amount of resources and message exchanges
 if a large number of streams is used.</li>
        </ul>
      </section>
      <section anchor="changes-from-rfc-6083">
        <name>Changes from RFC 6083</name>
        <t>The DTLS over SCTP solution defined in RFC 6083 had the following
   limitations:</t>
        <ul spacing="normal">
          <li>The maximum user message size is 2<sup>14</sup> (16384) bytes,
 which is a single DTLS record limit.</li>
          <li>DTLS 1.0 has been deprecated for RFC 6083 requiring at least DTLS
1.2 <xref target="RFC8996"/>. This creates additional limitations as discussed
in <xref target="DTLS-version"/>.</li>
          <li>DTLS messages that don't contain protected user message data
where limited to only be sent on Stream 0, which could
potentially impact applications.</li>
          <li>An on-path attacker can reflect the authenticated part of a SCTP
packet back to the sender as well as replaying data and control
chunks.</li>
        </ul>
        <t>This specification defines the following changes compared with RFC
   6083:</t>
        <ul spacing="normal">
          <li>Removes the limitations on user messages sizes by defining a secure
fragmentation mechanism. It is optional to support message sizes
over 2<sup>64</sup>-1 bytes.</li>
          <li>Update DTLS key material without requiring draining all in-flight
user message from SCTP.</li>
          <li>Mandates that more modern DTLS version are used (DTLS 1.2 or
1.3)</li>
          <li>Mandates support of modern HMAC algorithm (SHA-256) in the SCTP
authentication extension <xref target="RFC4895"/>.</li>
          <li>Recommends support of <xref target="RFC8260"/> to enable interleaving of large
SCTP user messages to avoid scheduling issues.</li>
          <li>Applies stricter requirements on always using DTLS for all user
messages in the SCTP association.</li>
          <li>Requires that SCTP-AUTH is applied to all SCTP Chunks that can be
authenticated.</li>
          <li>Requires support of partial delivery of user messages.</li>
          <li>Derives direction specific SCTP-AUTH keys to mitigate reflection
attacks.</li>
          <li>Mandates SCTP-AUTH rekeying before the TSN cycles back to the
Initial TSN to mitigate replay of data chunks.</li>
        </ul>
      </section>
      <section anchor="DTLS-version">
        <name>DTLS Version</name>
        <t>Using DTLS 1.2 instead of using DTLS 1.0 limits the lifetime of a
   DTLS connection and the data volume which can be transferred over a
   DTLS connection.  This is caused by:</t>
        <ul spacing="normal">
          <li>The number of renegotiations in DTLS 1.2 is limited to 65534
compared to unlimited in DTLS 1.0.</li>
          <li>While the AEAD limits in DTLS 1.3 does not formally apply to DTLS
1.2 the mathematical limits apply equally well to DTLS 1.2.</li>
        </ul>
        <t>DTLS 1.3 comes with a large number of significant changes.</t>
        <ul spacing="normal">
          <li>Renegotiations are not supported and instead partly replaced by
 key updates. The number of key updates is limited to
 2<sup>48</sup>.</li>
          <li>Strict AEAD significantly limits on how much many packets can be
sent before rekeying.</li>
        </ul>
        <t>Many applications using DTLS/SCTP are of semi-permanent nature.
   Semi-permanent term comes from telecom and referres to connections
   that start at a certain time and are rarely closed.
   Semi-permanent connections use SCTP associations with expected
   lifetimes of months or even years where there is a significant
   cost for bringing them down in order to restart it.
   Such DTLS/SCTP usages that need:</t>
        <ul spacing="normal">
          <li>Periodic re-authentication and transfer of revocation information
of both endpoints (not only the DTLS client).</li>
          <li>Periodic rerunning of Diffie-Hellman Key Exchange to provide
forward secrecy and mitigate static key exfiltration attacks.</li>
          <li>Perform SCTP-AUTH rekeying.</li>
        </ul>
        <t>At the time of publication, DTLS 1.3 does not support any of these,
   where DTLS 1.2 renegotiation functionality can provide these
   functionality in the context of DTLS/SCTP. To address these
   requirements from semi-permanent applications, this document uses
   several overlapping DTLS connections with either DTLS 1.2 or
   1.3. Having uniform procedures reduces the impact when upgrading
   from DTLS 1.2 to DTLS 1.3 and avoids using the renegotiation
   mechanism which is disabled by default in many DTLS
   implementations.</t>
        <t>To address known vulnerabilities in DTLS 1.2 this document
   describes and mandates implementation constraints on ciphers and
   protocol options. The DTLS 1.2 renegotiation mechanism is forbidden
   to be used as it creates the need for additional mechanism to handle
   race conditions and interactions between using DTLS connections in
   parallel.</t>
        <t>Secure negotiation of the DTLS version is handled by the DTLS
   handshake. If the endpoints do not support a common DTLS version
   the DTLS handshake will be aborted.</t>
        <t>In the rest of the document, unless the version of DTLS is
   specifically called out, the text applies to both versions of DTLS.</t>
        <t>DTLS/SCTP requires the maximum DTLS record size to be known, and
   not being changed during the lifetime of the Association.</t>
      </section>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>This document uses the following terms:</t>
        <dl>
          <dt>Association:</dt>
          <dd>
            <t>An SCTP association.</t>
          </dd>
          <dt>Connection:</dt>
          <dd>
            <t>A DTLS connection. It is uniquely identified by a
   connection identifier.</t>
          </dd>
          <dt>Stream:</dt>
          <dd>
            <t>A unidirectional stream of an SCTP association.  It is
   uniquely identified by a stream identifier.</t>
          </dd>
        </dl>
      </section>
      <section anchor="abbreviations">
        <name>Abbreviations</name>
        <dl>
          <dt>AEAD:</dt>
          <dd>
            <t>Authenticated Encryption with Associated Data</t>
          </dd>
          <dt>DTLS:</dt>
          <dd>
            <t>Datagram Transport Layer Security</t>
          </dd>
          <dt>HMAC:</dt>
          <dd>
            <t>Keyed-Hash Message Authentication Code</t>
          </dd>
          <dt>MTU:</dt>
          <dd>
            <t>Maximum Transmission Unit</t>
          </dd>
          <dt>PPID:</dt>
          <dd>
            <t>Payload Protocol Identifier</t>
          </dd>
          <dt>SCTP:</dt>
          <dd>
            <t>Stream Control Transmission Protocol</t>
          </dd>
          <dt>SCTP-AUTH:</dt>
          <dd>
            <t>Authenticated Chunks for SCTP <xref target="RFC4895"/></t>
          </dd>
          <dt>TCP:</dt>
          <dd>
            <t>Transmission Control Protocol</t>
          </dd>
          <dt>TLS:</dt>
          <dd>
            <t>Transport Layer Security</t>
          </dd>
          <dt>ULP:</dt>
          <dd>
            <t>Upper Layer Protocol</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="conventions">
      <name>Conventions</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
   "OPTIONAL" in this document are to be interpreted as described in
   BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all
   capitals, as shown here.</t>
    </section>
    <section anchor="dtls-considerations">
      <name>DTLS Considerations</name>
      <section anchor="version-of-dtls">
        <name>Version of DTLS</name>
        <t>This document defines the usage of either DTLS 1.3 <xref target="RFC9147"/>, or
   DTLS 1.2 <xref target="RFC6347"/>.  Earlier versions of DTLS MUST NOT be used
   (see <xref target="RFC8996"/>).  DTLS 1.3 is RECOMMENDED for security and
   performance reasons.  It is expected that DTLS/SCTP as described in
   this document will work with future versions of DTLS.</t>
        <t>Only one version of DTLS MUST be used during the lifetime of an
   SCTP Association, meaning that the procedure for replacing the DTLS
   version in use requires the existing SCTP Association to be
   terminated and a new SCTP Association with the desired DTLS version
   to be instantiated.</t>
      </section>
      <section anchor="cipher-suites-and-cryptographic-parameters">
        <name>Cipher Suites and Cryptographic Parameters</name>
        <t>For DTLS 1.2, the cipher suites forbidden by <xref target="RFC9113"/> MUST NOT
   be used. For all versions of DTLS, cryptographic parameters giving
   confidentiality and forward secrecy MUST be used.</t>
        <t>There are potential for aligning used hash algorithms between
   SCTP-AUTH and the DTLS cipher suit. If the otherwise considered to
   be used SCTP-AUTH hash algorithms and DTLS Cipher suits have
   matching hashing algorithms it is RECOMMENDED to indicate a
   preference for such algorithms. Note, however as the SCTP-AUTH
   hashing algorithm is chosen during SCTP association handshake it
   can't be changed once it is known what is supported in DTLS by the
   peer endpoint.</t>
      </section>
      <section anchor="authentication">
        <name>Authentication</name>
        <t>The DTLS handshakes MUST use mutual authentication.</t>
      </section>
      <section anchor="renegotiation-and-key-update">
        <name>Renegotiation and Key Update</name>
        <t>DTLS 1.2 renegotiation enables rekeying (with ephemeral Diffie-
   Hellman) of DTLS as well as mutual reauthentication and transfer of
   revocation information inside an DTLS 1.2 connection. Renegotiation
   has been removed from DTLS 1.3 and partly replaced with
   post-handshake mechanism for key update. The parallel DTLS
   connection solution was specified due to lack of necessary features
   with DTLS 1.3 considered needed for long lived SCTP associations,
   such as rekeying (with ephemeral Diffie-Hellman) as well as mutual
   reauthentication.</t>
        <t>This specification does not allow usage of DTLS 1.2 renegotiation to
   avoid race conditions and corner cases in the interaction between
   the parallel DTLS connection mechanism and the keying of
   SCTP-AUTH. In addition, renegotiation is also disabled in some
   implementations, as well as dealing with the epoch change reliable
   have similar or worse application impact.</t>
        <t>This specification also forbids against using DTLS 1.3 key update
   and instead rely on parallel DTLS connections. For DTLS 1.3 there
   isn’t feature parity. It also has the issue that a DTLS
   implementation following the RFC may assume a too limited window
   for SCTP where the previous epoch’s security context is maintained
   and thus, changes to epoch handling would be necessary.</t>
        <t>A DTLS 1.2 endpoint MUST NOT use renegotiation and a DTLS 1.3
   endpoint MUST NOT send any KeyUpdate message. The endpoint MUST
   instead initiate a new DTLS connection before the old one reaches
   the used cipher suit's key lifetime. The AEAD limits given in
   section 4.5.3 of <xref target="RFC9147"/> SHOULD be followed.</t>
      </section>
      <section anchor="dtls-connection-identifier">
        <name>DTLS Connection Identifier</name>
        <t>The DTLS Connection ID MUST be negotiated, according to <xref target="RFC9146"/>
   for DTLS 1.2, and Section 9 of <xref target="RFC9147"/> for DTLS 1.3.</t>
        <t>Section 4 of <xref target="RFC9146"/> states “If, however, an implementation
   chooses to receive different lengths of CID, the assigned CID
   values must be self-delineating since there is no other mechanism
   available to determine what connection (and thus, what CID length)
   is in use.”. As this solution requires multiple connection IDs,
   using a zero-length CID will be highly problematic as it could
   result in that any DTLS records with a zero length CID ends up in
   another DTLS connection context, and there fail the decryption and
   integrity verification. And in that case to avoid losing the DTLS
   record, it would have to be forwarded to another zero-length CID
   using DTLS Connection, where decryption and validation must be
   tried, resulting in higher resource utilization. Thus, it is
   REQUIRED to use non-zero length CID values, and RECOMMENDED to use
   a single common length for the CID values. A single byte should be
   sufficient, as reuse of old CIDs is possible as long as the
   implementation ensures that they are not used in near time to the
   previous usage.</t>
      </section>
      <section anchor="dtls-sequence-number-size">
        <name>DTLS Sequence number size</name>
        <t>16-bit sequence number SHOULD be used rather than 8-bit to avoid
   limitations in number of inflight DTLS records. Overlapping
   sequence number due to wrapping of the sequence number MUST be
   prevented as it otherwise can lead to decryption failure that
   result in failure of the transport service. See
   <xref target="Prevent-DTLS-Seq-wraps"/> for how to prevent sequence number
   wraps.</t>
      </section>
      <section anchor="Msg-size">
        <name>Message Sizes</name>
        <t>If DTLS 1.3 is used, the length field in the record layer MUST
   be included in all records.</t>
        <t>DTLS/SCTP, automatically fragments and reassembles user
   messages. This specification defines how to fragment the user
   messages into DTLS records, where each DTLS record allows a maximum
   of 2<sup>14</sup> protected bytes. It is mandated that DTLS
   supports the maximum record size of 2<sup>14</sup> bytes.
   DTLS/SCTP MAY exploit maximum DTLS record size less than
   2<sup>14</sup> bytes due to implementation choice, in such case
   maximum record size MUST be negotiated according to
   <xref target="RFC8449"/>. The negotiated value MUST be known to DTLS/SCTP and
   SHALL NOT be changed during the SCTP Association lifetime.</t>
        <t>The sequence of DTLS records is then fragmented into DATA or I-DATA
   Chunks to fit the path MTU by SCTP. These changes ensure that
   DTLS/SCTP has the same capability as SCTP to support user messages
   of any size. However, to simplify implementations it is OPTIONAL to
   support user messages larger than 2<sup>64</sup>-1 bytes. This is
   to allow implementation to assume that 64-bit length fields and
   offset pointers will be sufficient.</t>
        <t>The security operations and reassembly process requires that the
   protected user message, i.e., with DTLS record overhead, is stored
   in the receiver's buffer. This buffer space will thus put a limit
   on the largest size of plain text user message that can be
   transferred securely. However, by mandating the use of the partial
   delivery of user messages from SCTP and assuming that no two
   messages received on the same stream are interleaved (as it is the
   case when using the API defined in <xref target="RFC6458"/>) the minimally
   required buffering prior to DTLS processing is a single DTLS record
   per used incoming stream. This enables the DTLS/SCTP implementation
   to provide the Upper Layer Protocol (ULP) with each DTLS record's
   content, when it has been decrypted and its integrity been
   verified, enabling partial user message delivery to the ULP.
   However, for efficient operation and avoiding flow control stalls
   if user message fragments are not frequently and expediently moved
   to upper layer memory buffers, the receiver buffer needs to be
   larger.</t>
        <t>Implementations can trade-off buffer memory requirements in the
   DTLS layer with transport overhead by using smaller DTLS records,
   in this case the record size limit extension for DTLS according to
   <xref target="RFC8449"/> MUST be used and the negotiated record size SHALL be
   communicated to DTLS/SCTP.  The maximum record size SHALL be the
   same during the lifetime of the Association, i.e., renegotiated to
   the same value in all subsequent DTLS connections.</t>
        <t>The DTLS/SCTP implementation is expected to behave very similar to
   just SCTP when it comes to handling of user messages and dealing
   with large user messages and their reassembly and
   processing. Making it the ULP responsible for handling any resource
   contention related to large user messages.</t>
      </section>
      <section anchor="replay-protection">
        <name>Replay Protection</name>
        <t>SCTP-AUTH <xref target="RFC4895"/> does not have explicit replay
   protection. However, the combination of SCTP-AUTH's protection of
   DATA or I-DATA chunks and SCTP user message handling will prevent
   third party attempts to inject or replay SCTP data chunks as long as
   the Transmission Sequence Numbers (TSNs) are unique. In fact, this
   document's solution is dependent on SCTP-AUTH and SCTP to prevent
   reordering, duplication, and removal of the DTLS records within
   each protected user message.  This includes detection of changes to
   what DTLS records start and end the SCTP user message, and removal of
   DTLS records before an increment to the epoch.  Without SCTP-AUTH,
   these would all have required explicit handling.</t>
        <t>To prevent replay of DATA or I-DATA chunks resulting in impact on
   the received protected user message, the SCTP-AUTH key MUST be
   retired before it has been used with more than 2<sup>32</sup> TSNs.
   Implementations MUST therefore setup a new parallel DTLS connection
   to rekey well before 2<sup>32</sup> TSNs have been used with a
   SCTP-AUTH key.</t>
        <t>DTLS/SCTP does not provide replay protection for authenticated
   control chunks such as ERROR, RE-CONFIG <xref target="RFC6525"/>, or SACK. An
   on-path attacker can replay control chunks as long as the receiving
   endpoint still has the endpoint pair shared secret. Such replay
   could disrupt the SCTP association and could therefore be a
   denial-of-service attack.</t>
        <t>DTLS optionally supports record replay detection. Such replay
   detection could result in the DTLS layer dropping valid messages
   received outside of the DTLS replay window. As DTLS/SCTP provides
   replay protection even without DTLS replay protection, the replay
   detection of DTLS MUST NOT be used.</t>
      </section>
      <section anchor="path-mtu-discovery">
        <name>Path MTU Discovery</name>
        <t>DTLS Path MTU Discovery MUST NOT be used.  Since SCTP provides Path
   MTU discovery and fragmentation/reassembly for user messages as
   specified in <xref target="Msg-size"/>, DTLS can send maximum sized DTLS
   Records.</t>
      </section>
      <section anchor="retransmission-of-messages">
        <name>Retransmission of Messages</name>
        <t>SCTP provides a reliable and in-sequence transport service for DTLS
   messages that require it.  See <xref target="Stream-Usage"/>.  Therefore, DTLS
   procedures for retransmissions MUST NOT be used.</t>
      </section>
    </section>
    <section anchor="sctp-considerations">
      <name>SCTP Considerations</name>
      <section anchor="Mapping-DTLS">
        <name>Mapping of DTLS Records</name>
        <t>The SCTP implementation MUST support fragmentation of user messages
   using DATA <xref target="RFC9260"/>, and optionally I-DATA <xref target="RFC8260"/> chunks.</t>
        <t>DTLS/SCTP as an SCTP adaptation layer exist between the ULP user
   message API and SCTP. On the sender side a user message is split
   into fragments m0, m1, m2, each no larger than 2<sup>14</sup> =
   16384 bytes or the negotiated maximum DTLS record size
   (<xref target="Msg-size"/>).</t>
        <artwork><![CDATA[
   m0 | m1 | m2 | ... = user_message
]]></artwork>
        <t>The resulting fragments are protected with DTLS and the records are
   concatenated</t>
        <artwork><![CDATA[
   user_message' = DTLS( m0 ) | DTLS( m1 ) | DTLS( m2 ) ...
]]></artwork>
        <t>The new user_message', i.e., the protected user message, is the input
   to SCTP.</t>
        <t>On the receiving side, the length field in each DTLS record can be
   used to determine the boundaries between DTLS records. DTLS/SCTP
   SHOULD request decryption of each individual records as soon as
   possible.  The last DTLS record can be found by subtracting the
   length of individual records from the length of user_message’.  The
   output from the DTLS decryption(s) is the fragments m0, m1, m2 ...
   The user_message is reassembled from decrypted DTLS records as
   user_message = m0 | m1 | m2 ...</t>
        <t>There are four failure cases an DTLS/SCTP implementation needs to
   detect and then act on:</t>
        <ol spacing="normal" type="1"><li>Failure in decryption and integrity verification process of any
   DTLS record. Due to SCTP-AUTH preventing delivery of injected or
   corrupt fragments of the protected user message this should only
   occur in case of implementation errors or internal hardware
   failures or the necessary security context has been prematurely
   discarded.</li>
          <li>In case the SCTP layer indicates an end to a user message,
   e.g., when receiving a MSG_EOR in a recvmsg() call when using the
   API described in <xref target="RFC6458"/>, and the last buffered DTLS record
   length field does not match, i.e., the DTLS record is incomplete.</li>
          <li>Unable to perform the decryption processes due to lack of
   resources, such as memory, and have to abandon the user message
   fragment. This specification is defined such that the needed
   resources for the DTLS/SCTP operations are bounded for a given
   number of concurrent transmitted SCTP streams or unordered user
   messages.</li>
          <li>DTLS Replay protection. This specification mandates that replay
   protection shall not be used, otherwise the sequence number in a
   delayed DTLS record might be beyond what the replay window accepts
   and thus be dropped. If such a discard would happen the user
   message would be compromised as the data has been lost.</li>
        </ol>
        <t>The above failure cases all result in the receiver failing to
   recreate the full user message. This is a failure of the transport
   service that is not possible to recover from the DTLS/SCTP layer
   and the sender could believe the complete message have been
   delivered. This error MUST NOT be ignored, as SCTP lacks any
   facility to declare a failure on a specific stream or user message,
   the DTLS connection and the SCTP association SHOULD be
   terminated. A valid exception to the termination of the SCTP
   association is if the receiver is capable of notifying the ULP
   about the failure in delivery and the ULP is capable of recovering
   from this failure.</t>
        <t>Note that if the SCTP extension for Partial Reliability (PR-SCTP)
   <xref target="RFC3758"/> is used for a user message, user message may be
   partially delivered or abandoned. These failures are not a reason
   for terminating the DTLS connection and SCTP association.</t>
      </section>
      <section anchor="dtls-connection-handling">
        <name>DTLS Connection Handling</name>
        <t>DTLS/SCTP is negotiated on SCTP level as an adaptation layer
   (<xref target="Negotiation"/>). After a successful negotiation of the DTLS/SCTP
   adaptation layer during SCTP association establishment, a DTLS
   connection MUST be established prior the transmission of any ULP
   user messages. All DTLS connections are terminated when the SCTP
   association is terminated. A DTLS connection MUST NOT span multiple
   SCTP associations.</t>
        <t>As it is required to establish the DTLS connection at the beginning
   of the SCTP association, either of the peers should never send any
   SCTP user message that is not protected by DTLS. So, the case
   that an endpoint receives data that is neither DTLS messages nor
   protected user messages in the form of a sequence of DTLS Records
   on any stream is a protocol violation. The receiver MAY terminate
   the SCTP association due to this protocol
   violation. Implementations that do not have a DTLS endpoint
   in a state where application_data record can be accepted
   on SCTP handshake completion, will have to ensure
   correct caching of the messages until the DTLS endpoint is ready.</t>
        <t>Whenever a mutual authentication, updated security parameters,
   rerun of Diffie-Hellman Key Exchange, or SCTP-AUTH rekeying is
   needed, a new DTLS connection is instead setup in parallel with the
   old connection (i.e., there may be up to two simultaneous DTLS
   connections within one association).</t>
      </section>
      <section anchor="payload-protocol-identifier-usage">
        <name>Payload Protocol Identifier Usage</name>
        <t>SCTP Payload Protocol Identifiers are assigned by IANA.
   Application protocols using DTLS over SCTP SHOULD register and use
   a separate Payload Protocol Identifier (PPID) and SHOULD NOT reuse
   the PPID that they registered for running directly over SCTP.</t>
        <t>Using the same PPID does no harm as DTLS/SCTP requires all user
   messages being DTLS protected and knows that DTLS is used.  However,
   for protocol analyzers, for example, it is much easier if a
   separate PPID is used and avoids different behavior from
   <xref target="RFC6083"/>.</t>
        <t>Messages that are exchanged between DTLS/SCTP peers not containing
   ULP user messages shall use PPID = 0 according to section 3.3.1 of
   <xref target="RFC9260"/> as no application identifier can be specified by the
   upper layer for this payload data. With the exception for the
   DTLS/SCTP Control Messages (<xref target="Control-Message"/>) that uses its own
   PPID.</t>
      </section>
      <section anchor="Stream-Usage">
        <name>Stream Usage</name>
        <t>DTLS 1.3 protects the actual content type of the DTLS record and
   have therefore omitted the non-protected content type field. Thus,
   it is not possible to determine which content type the DTLS record
   has on SCTP level. For DTLS 1.2 ULP user messages will be carried
   in DTLS records with content type "application_data".</t>
        <t>DTLS Records carrying protected user message fragments MUST be sent
   in by the ULP indicated SCTP stream and user message and additional
   properties, such as PPID. The ULP has no limitations in using SCTP
   facilities for stream and user messages. DTLS records of other
   types MAY be sent on any SCTP stream. It MAY also be sent in its
   own SCTP user message as well as interleaved with other DTLS
   records carrying protected user message fragments. Thus, it is
   allowed to insert between protected user message fragments DTLS
   records of other types as the DTLS receiver will process these and
   not result in any user message data being inserted into the ULP's
   user message. However, DTLS messages of other types than protected
   user message MUST be sent reliable, so the DTLS record can only be
   interleaved in case the ULP user message is sent as reliable.</t>
        <t>DTLS is capable of handling reordering of the DTLS
   records. However, depending on stream properties and which user
   message DTLS records of other types are sent in may impact in which
   order and how quickly they are possible to process. Using the same
   stream with in-order delivery for the different messages will
   ensure that the DTLS Records are delivered in the order they are
   sent in user messages. Thus, ensuring that if there are DTLS
   records that need to be delivered in particular order it can be
   ensured. Alternatively, if it is desired that a DTLS record is
   delivered as early as possible, avoiding in-order streams with
   queued messages and considering stream priorities can result in
   faster delivery.</t>
        <t>A simple solution avoiding any protocol issue with sending DTLS
   messages, that are not protected user message fragments, is to pick
   a stream not used by the ULP, and send the DTLS messages in their
   own SCTP user messages with in order delivery. That mimics the RFC
   6083 behavior without impacting the ULP. However, it assumes that
   there are available streams to be used based on the SCTP
   association handshake allowed streams (Section 5.1.1 of
   <xref target="RFC9260"/>).</t>
      </section>
      <section anchor="chunk-handling">
        <name>Chunk Handling</name>
        <t>All chunks types that can be listed in the Chunk List Parameter
   <xref target="RFC4895"/>, i.e., all chunks types except INIT, INIT ACK, and
   SHUTDOWN-COMPLETE, MUST be sent in an authenticated way as
   described in <xref target="RFC4895"/>. This makes sure that an attacker cannot
   modify the stream in which a message is sent or affect the
   ordered/unordered delivery of the message. Note that COOKIE ECHO
   and COOKIE ACK are protected with an empty key. This is not a
   problem as everything in these chunks are determined by earlier
   chunks or ignored on receipt.</t>
        <t>If PR-SCTP as defined in <xref target="RFC3758"/> is used, the FORWARD-TSN
   chunks are sent in an authenticated way which makes sure that it is
   not possible for an attacker to drop messages and use forged
   FORWARD-TSN, SACK, and/or SHUTDOWN chunks to hide this dropping.</t>
        <t>I-DATA chunk type as defined in <xref target="RFC8260"/> is RECOMMENDED to be
   supported to avoid some of the down sides that large user messages
   have on blocking transmission of later arriving high priority user
   messages. However, the support is not mandated and negotiated
   independently from DTLS/SCTP.</t>
      </section>
      <section anchor="sctp-auth-hash-function">
        <name>SCTP-AUTH Hash Function</name>
        <t>When using DTLS/SCTP, the SHA-256 Message Digest Algorithm MUST be
   supported in the SCTP-AUTH <xref target="RFC4895"/> implementation. SHA-1 MUST
   NOT be used when using DTLS/SCTP. <xref target="RFC4895"/> requires support and
   inclusion of SHA-1 in the HMAC-ALGO parameter, thus, to meet
   both requirements the HMAC-ALGO parameter will include both SHA-256
   and SHA-1 with SHA-256 listed prior to SHA-1 to indicate the
   preference.</t>
        <t>When using DTLS/SCTP, each endpoint MUST use a single SCTP-AUTH
   Message Digest Algorithm during the whole SCTP association. This
   guarantees that an association shared key is only used with a single
   algorithm.</t>
      </section>
      <section anchor="Parallel-Dtls">
        <name>Parallel DTLS connections</name>
        <t>To enable SCTP-AUTH rekeying, periodic authentication of both
   endpoints, and force attackers to dynamic key extraction
   <xref target="RFC7624"/>, DTLS/SCTP per this specification defines the usage of
   parallel DTLS connections over the same SCTP association. This
   solution ensures that there are no limitations to the lifetime of
   the SCTP association due to DTLS, it also avoids dependency on
   version specific DTLS mechanisms such as renegotiation in DTLS 1.2,
   which is disabled by default in many DTLS implementations, or
   post-handshake messages in DTLS 1.3, which does not allow periodic
   mutual endpoint re-authentication or re-keying of
   SCTP-AUTH.</t>
        <t>Parallel DTLS connections enable opening a new DTLS
   connection performing an handshake, while the existing DTLS
   connection is kept in place.  In DTLS 1.3 the handshake MAY be a
   full handshake or a resumption handshake, and resumption can be done
   while the original connection is still open. In DTLS 1.2 the
   handshake MUST be a full handshake. The new parallel connection MUST
   use the same DTLS version as the existing connection.</t>
        <t>On DTLS handshake completion, DTLS/SCTP starts using
   the security context of the new DTLS connection for protection
   of ULP user messages and then ensure delivery of all the SCTP chunks
   using the old DTLS connections security context. When that has been
   achieved DTLS/SCTP shall close the old DTLS connection and discard
   the related security context.</t>
        <t>As specified in <xref target="Mapping-DTLS"/> the usage of DTLS connection ID is
   required to ensure that the receiver can correctly identify the
   DTLS connection and its security context when performing its
   de-protection operations. There is also only a single SCTP-AUTH key
   exported per DTLS connection ensuring that there is clear mapping
   between the DTLS connection ID and the SCTP-AUTH security context for
   each Key Identifier.</t>
        <t>Application writers should be aware that establishing a new DTLS
   connection may result in changes of security parameters.  See
   <xref target="sec-Consideration"/> for security considerations regarding rekeying.</t>
        <t>A DTLS/SCTP Endpoint MUST NOT have more than two DTLS connections
   open at the same time. Either of the endpoints MAY initiate a new
   DTLS connection by performing a DTLS handshake. To support this
   implementations and certificates need to support both DTLS client
   and server roles. Note that resumption is not possible between DTLS
   connections unless the endpoints have the same roles. As either
   endpoint can initiate a DTLS handshake on either side at the same
   time, either endpoint may receive a DTLS ClientHello message when
   it has sent its own ClientHello. In this case the ClientHello from
   the endpoint that had the DTLS Client role in the establishment of
   the existing DTLS connection shall be continued to be processed and
   the other dropped.</t>
        <t>When performing the DTLS handshake the endpoint MUST verify that
   the peer identifies using the same identity as in the previous DTLS
   connection.</t>
        <t>When the DTLS handshake has been completed, the new DTLS connection
   MUST be used for the DTLS protection of any new ULP user message,
   and SHOULD be switched to for protection of not yet protected user
   message fragments of partially transmitted user messages.  Also,
   after the completion of the DTLS handshake, a new SCTP-AUTH key will
   be exported per <xref target="handling-endpoint-secret"/>. To enable the sender
   and receiver to correctly identify when the old DTLS connection is
   no longer in use, the SCTP-AUTH key used to protect a SCTP packet
   MUST NOT be from a newer DTLS connection than produced any included
   DTLS record fragment.</t>
        <t>The SCTP API defined in <xref target="RFC6458"/> has limitation in changing the
   SCTP-AUTH key until the whole SCTP user message has been
   delivered. However, the DTLS/SCTP implementation can switch the
   DTLS connection used to protect the user message fragments to a
   newer, even if the older DTLS connections exported key is used
   for the SCTP-AUTH. And for SCTP implementations where the SCTP-AUTH
   key can be switched in the middle of a user message the SCTP-AUTH
   key should be changed as soon as all DTLS record fragments included
   in an SCTP packet have been protected by the newer DTLS connection.
   Any SCTP-AUTH receiver implementation is expected to be able to
   select key on per SCTP packet basis.</t>
        <t>The DTLS/SCTP endpoint timely indicates to its peer when the
   previous DTLS connection and its context are no longer needed for
   receiving any more data from this endpoint. This is done by sending
   a DTLS/SCTP Control Message <xref target="Control-Message"/> of type
   "Ready_To_Close" <xref target="Ready_To_Close"/> to its peer. The endpoint MUST
   NOT send the Ready_To_Close until the following two conditions are
   fulfilled:</t>
        <ol spacing="normal" type="1"><li>All SCTP packets containing part of any DTLS record or message
protected using the security context of this DTLS connection
have been acknowledged in a non-renegable way.</li>
          <li>All SCTP packets using the SCTP-AUTH key associated with the
security context of this DTLS connection have been acknowledged
in a non-renegable way.</li>
        </ol>
        <t>A DTLS/SCTP endpoint that fulfills the above conditions for the
   SCTP packets it sends, and have received a Ready_To_Close message,
   SHALL immediately initiate closing of this DTLS connection by
   sending a DTLS close_notify. Then when it has received the peer's
   close_notify terminate the DTLS connection and expunges the
   associated security context and SCTP-AUTH key. Note that it is not
   required for a DTLS/SCTP implementation that has received a
   Ready_To_Close message to send that message itself when it
   fulfills the conditions. However, in some situations both endpoints
   will fulfill the conditions close enough in time that both
   endpoints will send their Ready_To_Close prior to receiving the
   indication from the peer, that works as both endpoints will then
   initiate DTLS close_notify and terminate the DTLS connections upon
   the reception of the peers close_notify.</t>
        <t>SCTP implementations exposing APIs like <xref target="RFC6458"/> fulfilling
   these conditions require draining the SCTP association of all
   outstanding data after having completed all the user messages using
   the previous SCTP-AUTH key identifier, relying on the
   SCTP_SENDER_DRY_EVENT to know when delivery has been accomplished.
   A richer API could also be used that allows user message level
   tracking of delivery, see <xref target="api-considerations"/> for API
   considerations.</t>
        <t>For SCTP implementations exposing APIs like <xref target="RFC6458"/> where it is
   not possible to change the SCTP-AUTH key for a partial SCTP message
   initiated before the change of security context, it will be forced to
   track the SCTP messages and determine when all using the old
   security context has been transmitted. This maybe be impossible to
   do as completely reliable without tighter integration between the
   DTLS/SCTP layer and the SCTP implementation. This type of
   implementations also has an implicit limitation in how large SCTP
   messages it can support. Each SCTP message needs to have completed
   delivery and enabling closing of the previous DTLS connection prior
   to the need to create yet another DTLS connection. Thus, SCTP
   messages can’t be larger than that the transmission completes in
   less than the duration between the rekeying or re-authentications
   needed for this SCTP association.</t>
        <t>The consequences of sending a DTLS close_notify alert in the old
   DTLS connection prior to the receiver having received the data can
   result in failure case 1 described in <xref target="Mapping-DTLS"/>, which likely
   result in SCTP association termination.</t>
      </section>
      <section anchor="handling-endpoint-secret">
        <name>Handling of Endpoint Pair Shared Secrets</name>
        <t>SCTP-AUTH <xref target="RFC4895"/> is keyed using endpoint pair shared
   secrets. In DTLS/SCTP, DTLS is used to establish these secrets.
   The endpoint pair shared secrets MUST be provided to the SCTP stack
   as soon as the computation is possible. The endpoints MUST NOT use
   another mechanism for establishing endpoint pair shared secrets for
   SCTP-AUTH.  The endpoint pair shared secret for Shared Key
   Identifier zero (0) is empty, it is used by both endpoints
   when establishing the first DTLS connection and MUST NOT be
   used to protect ULP data.</t>
        <t>The initial DTLS connection will be used to establish two new
   endpoint pair shared secrets which MUST use shared key identifier 2
   and 3. The endpoint pair shared secrets are derived using the TLS
   exporter interface using the ASCII strings
   "EXPORTER-DTLS-OVER-SCTP-CLIENT-WRITE" and
   "EXPORTER-DTLS-OVER-SCTP-SERVER-WRITE" with no terminating NUL, no
   context, and length 64.</t>
        <t>~~~~~~~~~~~
   TLS-Exporter("EXPORTER-DTLS-OVER-SCTP-CLIENT-WRITE", , 64)
   TLS-Exporter("EXPORTER-DTLS-OVER-SCTP-SERVER-WRITE", , 64)
   ~~~~~~~~~~~</t>
        <t>Keys derived with the label "EXPORTER-DTLS-OVER-SCTP-CLIENT-WRITE"
   always have an even Shared Key Identifier.  They are used by the
   TLS client for sending AUTH chunks and MUST NOT be used by the TLS
   client for receiving AUTH chunks.  Keys derived with the label
   "EXPORTER-DTLS-OVER-SCTP-SERVER-WRITE" always have an odd Shared
   Key Identifier.  They are used by the TLS server for sending AUTH
   chunks and MUST NOT be used by the TLS server for receiving AUTH
   chunks.  These directional keys change the behavior of SCTP-AUTH
   <xref target="RFC4895"/> and requires extensions to the SCTP API defined in
   <xref target="RFC6458"/>.</t>
        <t>When a subsequent DTLS connection is setup, two new 64-byte
   endpoint pair shared secrets are derived using the TLS-Exporter as
   defined above. The Shared Key Identifiers form a sequence. If the
   previous endpoint pair shared secrets used Shared Key Identifiers
   2n and 2n+1, the new ones MUST use Shared Key Identifier 2n+2 and
   2n+3, unless 2n = 65534, in which case the new Shared Key
   Identifiers are 2 and 3.</t>
        <t>A DTLS connection MUST NOT be used be used for protection of ULP
   data before the two SCTP-AUTH endpoint pair shared secrets has been
   exported and the other endpoint has been authenticated.</t>
        <section anchor="dtls-12-considerations">
          <name>DTLS 1.2 Considerations</name>
          <t>Whenever a new DTLS connection is established, two 64-byte endpoint
   pair shared secrets are derived using the TLS-Exporter described in
   <xref target="RFC5705"/>.</t>
          <t>After sending or receiving the DTLS client Finished message for the
   initial DTLS connection, the active SCTP-AUTH key MUST be switched
   from key identifier zero (0) to key identifiers 2 and 3 and the
   SCTP-AUTH Shared Key Identifier zero MUST NOT be used.</t>
          <t>When the endpoint has sent or received a close_notify on the old DTLS
   connection then the endpoint SHALL remove the two SCTP-AUTH endpoint
   pair shared secrets derived from the old DTLS connection.</t>
        </section>
        <section anchor="dtls-13-considerations">
          <name>DTLS 1.3 Considerations</name>
          <t>Whenever a new exporter_secret can be computed, two 64-byte
   endpoint pair shared secrets are derived using the TLS-Exporter
   described in Section 7.5 of <xref target="RFC8446"/>.</t>
          <t>After sending or receiving the DTLS server Finished message for the
   initial DTLS connection, the active SCTP-AUTH key MUST be switched
   from key identifier zero (0) to key identifiers 2 and 3 and the
   SCTP-AUTH Shared Key Identifier zero MUST NOT be used.</t>
          <t>When the endpoint has sent or received a close_notify in one
   direction on the old DTLS connection then the endpoint SHALL remove
   the SCTP-AUTH endpoint pair shared secret associated with that
   direction in the old DTLS connection.</t>
        </section>
      </section>
      <section anchor="sec-shutdown">
        <name>Shutdown</name>
        <t>To prevent DTLS from discarding DTLS user messages while it is
   shutting down, the below procedure has been defined. Its goal is to
   avoid the need for APIs requiring per user message data level
   acknowledgments and utilizes existing SCTP protocol behavior to
   ensure delivery of the protected user messages data.</t>
        <t>To support DTLS 1.2 close_notify behavior and avoid any uncertainty
   related to rekeying, a DTLS/SCTP protocol message
   (<xref target="Control-Message"/>) sent as protected SCTP user message is
   defined, with its own PPID, to inform the DTLS/SCTP layer that
   it is targeting the remote DTLS/SCTP function and act on the
   request to close in a controlled fashion.</t>
        <t>The shutdown procedure is initiated by any of the two peers,
   targeting the closure of the SCTP Association and the DTLS
   connections.  In order to ensure that shutdown is completed without
   data lost, DTLS/SCTP must control that both SCTP Tx buffers are
   empty first, then it must ensure that all data in SCTP Rx buffer
   has been fetched and delivered to ULP and finally it shall shutdown
   the DTLS connections and the SCTP Association.</t>
        <t>The interaction between peers (local and remote) and protocol
   stacks is as follows:</t>
        <ol spacing="normal" type="1"><li>Local instance of ULP asks for terminating the DTLS/SCTP
   Association.</li>
          <li>Local DTLS/SCTP acknowledges the request, from this time on no
   new data from local instance of ULP will be accepted.</li>
          <li>Local DTLS/SCTP finishes any protection operation on buffered
   user messages and ensures that all protected user message data has
   been successfully transferred to the remote peer.</li>
          <li>Local DTLS/SCTP sends a DTLS/SCTP Control Message
   (<xref target="Control-Message"/>) of type "SHUTDOWN_Request"
   (<xref target="SHUTDOWN-Request"/>) to its peer.</li>
          <li>The remote DTLS/SCTP, when receiving the SHUTDOWN-Request,
   informs its ULP that shutdown has been initiated. No more ULP user
   message data to be sent to the peer can be accepted by DTLS/SCTP.</li>
          <li>Remote DTLS/SCTP finishes any protection operation on buffered
   user messages and ensures that all protected user message data has
   been successfully transferred to the remote ULP.</li>
          <li>Remote DTLS/SCTP sends DTLS close_notify to Local DTLS/SCTP
   for each and all DTLS connections. Then it initiates the
   SCTP shutdown procedure (section 9.2 of <xref target="RFC9260"/>).</li>
          <li>When the local DTLS/SCTP receives a close_notify on a DTLS
   connection, in case it is DTLS 1.3 it SHALL send its corresponding
   DTLS close_notify on each open DTLS connection. When the last open
   DTLS connection has received close_notify and any if needed
   corresponding close_notify have been sent, the local DTLS/SCTP
   initiates the SCTP shutdown procedure (section 9.2 of <xref target="RFC9260"/>).</li>
          <li>Upon receiving the information that SCTP has closed the
   Association, independently the local and remote DTLS/SCTP entities
   destroy the DTLS connection completing the shutdown.</li>
        </ol>
        <t>The verification in step 3 and 6 that all user data message has been
   successfully delivered to the remote ULP can be provided by the
   SCTP stack that implements <xref target="RFC6458"/> by means of SCTP_SENDER_DRY
   event (section 6.1.9 of <xref target="RFC6458"/>).</t>
        <t>A successful SCTP shutdown will indicate successful delivery of all
   data. However, in cases of communication failures and extensive
   packet loss the SCTP shutdown procedure can time out and result in
   SCTP association termination where its unknown if all data has been
   delivered. The DTLS/SCTP should indicate to ULP successful
   completion or failure to shutdown gracefully.</t>
      </section>
      <section anchor="transmission-limitations">
        <name>Transmission Limitations</name>
        <section anchor="Prevent-DTLS-Seq-wraps">
          <name>Preventing DTLS sequence number wraps</name>
          <t>To avoid failures in DTLS record decryption it is necessary to
   ensure that the sequence number space never wraps for the DTLS
   records that are outstanding between the DTLS encryption and
   decryption. As discussed in <xref target="buffering"/> the amount of packets
   this include is a combination of any buffering in the endpoint and
   the amount of data in the SCTP sender/receiver buffer for the
   transmission.</t>
          <t>To avoid overlapping sequence number the DTLS sender should first
   of all use 16-bit sequence number to enable a larger
   space. Secondly, it should track which DTLS records has been
   non-renegable ACKed by the receiver and always maintain a certain
   safety buffer in number of DTLS records. Thirdly, the
   implementation needs to attempt to minimize usage of buffers that
   exist after the DTLS encryption until the DTLS Decryption in its
   sender and receiver implementation.</t>
          <t>If the receiver implementation keeps with the assumption to timely
   decrypt DTLS records after it has been completely received, the
   tracking of when a records has been fully received can maintain a
   good view of the total number of outstanding records in regard to
   the DTLS sequence number space and prevent wrapping of the sequence
   number space by not protecting additional user message fragments
   until further DTLS records has been acknowledged.</t>
          <t>Assuming a that a quarter of the sequence number space is used as
   safety margin it will limit the number of simultaneous in-flight
   DTLS records to 49152, and thus also the number of simultaneous user
   messages. Technically, if the DTLS implementation supports trial
   decoding, overlap of the sequence number but that results in both
   implementation requirements, need to signal the window it supports,
   and additional decryption overhead due to trial decoding and will
   be left for future extension.</t>
          <t>So, what size of SCTP receiver window this limitation corresponds to
   is highly dependent on the SCTP user message size. If all SCTP user
   messages are large, e.g., 1 MB, then most DTLS Records will be close
   to maximum DTLS record size. Thus, the SCTP receiver window size
   required before this becomes an issue becomes fairly close to 49152
   times 16384, i.e., approximately 800 MB. While SCTP user messages of
   100 bytes would only need a receiver window of approximately 5 MB.</t>
        </section>
        <section anchor="sctp-api-limitations">
          <name>SCTP API Limitations</name>
          <t>The SCTP-API defined in <xref target="RFC6458"/> results in an implementation
   limitation when it comes to support transmission of user messages
   of arbitrary sizes. That API does not allow changing the SCTP-AUTH
   key used for protecting the sending of a particular user
   message. Thus, user messages that will be transmitted over periods
   of time on the order or longer than the interval between rekeying
   can't be supported. Beyond delaying the completion of a rekeying
   until the message has been transmitted, the session can deadlock if
   the DTLS connection used to protect this long user message reaches
   the limit of number of bytes transmitted with a particular
   key. However, this is not an interoperability issue as it is the
   sender side's API that limits what can be sent and thus the sender
   implementation will have to address this issue.</t>
        </section>
      </section>
    </section>
    <section anchor="Control-Message">
      <name>DTLS/SCTP Control Message</name>
      <t>The DTLS/SCTP Control Message is defined as its own upper layer
   protocol for DTLS/SCTP identified by its own PPID. The control
   message is sent in network byte order.</t>
      <t>The first 32 bits are split in two 16-bit integers where the first
   contains the Control Message Number and the next 16-bit integer
   contains the length of the optional Variable Parameter.
   Granularity of Variable Parameter is 32-bit with trailing zeroes.</t>
      <artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|       Control Message No      |      Parameter Length         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
\                                                               \
/                      Variable Parameter                       /
\                                                               \
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
      <t>Each message is sent as its own SCTP user message after
   having been protected by an open DTLS connection on any SCTP stream
   and MUST be marked with SCTP Payload Protocol Identifier (PPID)
   value TBD1 (<xref target="sec-IANA-PPID"/>).</t>
      <t>The DTLS/SCTP implementation MUST consume all SCTP messages
   received with the PPID value of TBD1. If the message is not 32-bit
   long the message MUST be discarded and the error SHOULD be logged.
   In case the message has an unknown value the message is
   discarded and the event SHOULD be logged.</t>
      <t>Two control messages are defined in this specification.</t>
      <section anchor="SHUTDOWN-Request">
        <name>SHUTDOWN-Request</name>
        <t>The value "1" is defined as a request to the peer to initiate
   controlled shutdown. This is used per step 4 and 5 in
   <xref target="sec-shutdown"/>.  Control Message 1 "Shutdown request" has
   Parameter Length = 0.</t>
      </section>
      <section anchor="Ready_To_Close">
        <name>Ready To Close Indication</name>
        <t>The value "2" is defined as an indication to the peer that from its
   perspective all SCTP packets with user message or using the
   SCTP-AUTH key associated with the indicated DTLS connection have been
   sent and acknowledged as received in a non-renegable way. This is
   used per <xref target="Parallel-Dtls"/> to initiate the closing of the DTLS
   connections during rekeying.  Control Message 2 "Ready To Close"
   has Parameter Length equal to the size of the DTLS Connection ID
   parameter in bytes.  The Variable Parameter contains the DTLS
   Connection ID that is to be closed.</t>
      </section>
    </section>
    <section anchor="Negotiation">
      <name>DTLS over SCTP Service</name>
      <t>The adoption of DTLS over SCTP according to the current
   specification is meant to add to SCTP the option for transferring
   encrypted data.  When DTLS over SCTP is used, all data being
   transferred MUST be protected by chunk authentication and DTLS
   encrypted.  Chunks that need to be received in an authenticated way
   will be specified in the CHUNK list parameter according to
   <xref target="RFC4895"/>.  Error handling for authenticated chunks is according
   to <xref target="RFC4895"/>.</t>
      <section anchor="adaptation-layer-indication-in-initinit-ack">
        <name>Adaptation Layer Indication in INIT/INIT ACK</name>
        <t>At the initialization of the association, a sender of the INIT or
   INIT ACK chunk that intends to use DTLS/SCTP as specified in this
   specification MUST include an Adaptation Layer Indication Parameter
   <xref target="RFC5061"/> with the IANA assigned value TBD
   (<xref target="sec-IANA-ACP"/>) to inform its peer that it is able to support
   DTLS over SCTP per this specification.</t>
      </section>
      <section anchor="DTLS-init">
        <name>DTLS over SCTP Initialization</name>
        <t>Initialization of DTLS/SCTP requires all the following options to
   be part of the INIT/INIT ACK handshake:</t>
        <t>RANDOM: defined in <xref target="RFC4895"/></t>
        <t>CHUNKS: defined in <xref target="RFC4895"/></t>
        <t>HMAC-ALGO: defined in <xref target="RFC4895"/></t>
        <t>ADAPTATION-LAYER-INDICATION: defined in <xref target="RFC5061"/></t>
        <t>When all the above options are present and having acceptable
   parameters, the Association will start with support of DTLS/SCTP.
   The set of options indicated are the DTLS/SCTP Mandatory Options.
   No data transfer is permitted before DTLS handshake is
   completed. Chunk bundling is permitted according to
   <xref target="RFC9260"/>. The DTLS handshake will enable authentication of both
   the peers.</t>
        <t>The extension described in this document is given by the following
   message exchange.</t>
        <artwork><![CDATA[
   --- INIT[RANDOM; CHUNKS; HMAC-ALGO; ADAPTATION-LAYER-IND] --->
   <- INIT ACK[RANDOM; CHUNKS; HMAC-ALGO; ADAPTATION-LAYER-IND] -
   --------------------- AUTH; COOKIE ECHO --------------------->
   <-------------------- AUTH; COOKIE ACK -----------------------
   ---------------- AUTH; DATA[DTLS Handshake] ----------------->
                               ...
                               ...
   <--------------- AUTH; DATA[DTLS Handshake] ------------------
]]></artwork>
      </section>
      <section anchor="client-use-case">
        <name>Client Use Case</name>
        <t>When a client initiates an SCTP Association with DTLS protection,
   i.e., the SCTP INIT containing DTLS/SCTP Mandatory Options, it can
   receive an INIT ACK also containing DTLS/SCTP Mandatory Options, in
   that case the Association will proceed as specified in the previous
   <xref target="DTLS-init"/> section.  If the peer replies with an INIT ACK not
   containing all DTLS/SCTP Mandatory Options, the client SHOULD reply
   with an SCTP ABORT.</t>
      </section>
      <section anchor="server-use-case">
        <name>Server Use Case</name>
        <t>If a SCTP Server supports DTLS/SCTP, i.e., per this specification,
   when receiving an INIT chunk with all DTLS/SCTP Mandatory Options
   it will reply with an INIT ACK also containing all the DTLS/SCTP
   Mandatory Options, following the sequence for DTLS initialization
   <xref target="DTLS-init"/> and the related traffic case.  If a SCTP Server that
   supports DTLS and configured to use it, receives an INIT chunk
   without all DTLS/SCTP Mandatory Options, it SHOULD reply with an
   SCTP ABORT.</t>
      </section>
      <section anchor="Fallback">
        <name>RFC 6083 Fallback</name>
        <t>This section discusses how an endpoint supporting this
   specification can fallback to follow the DTLS/SCTP behavior in
   RFC6083.  It is recommended to define a setting that represents the
   policy to allow fallback or not. However, the possibility to use
   fallback is based on the ULP can operate using user messages that
   are no longer than 16384 bytes and where the security issues can be
   mitigated or considered acceptable. If fallback is enabled,
   implementations MUST use the dtls_sctp_ext extension
   (<xref target="auth_fallback"/>) to authenticate the fallback. This mitigates
   on-path attacker to trigger fallback to RFC 6083. Fallback is NOT
   RECOMMENDED to be enabled as it permits weaker algorithms and
   versions of DTLS.</t>
        <t>An SCTP endpoint that receives an INIT chunk or an INIT ACK chunk
   that does not contain the SCTP-Adaptation-Indication parameter with
   the DTLS/SCTP adaptation layer codepoint, see <xref target="sec-IANA-ACP"/>, may
   in certain cases potentially perform a fallback to RFC 6083
   behavior.  However, the fallback attempt should only be performed
   if policy says that is acceptable.</t>
        <t>If fallback is allowed, it is possible that the client will send
   plain text user messages prior to DTLS handshake as it is allowed
   per RFC 6083.  So that needs to be part of the consideration for a
   policy allowing fallback.</t>
        <section anchor="client-fallback">
          <name>Client Fallback</name>
          <t>A DTLS/SCTP client supporting this specification encountering a
   server not compatible with this specification MAY attempt RFC 6083
   fallback per this procedure.</t>
          <ol spacing="normal" type="1"><li>Fallback procedure, if enabled, is initiated when receiving an
SCTP INIT ACK that does not contain the DTLS/SCTP Adaptation
Layer indication. If fallback is not enabled the SCTP handshake
is aborted.</li>
            <li>The client checks that the SCTP INIT ACK contained the necessary
chunks and parameters to establish SCTP-AUTH per RFC 6083 with
this endpoint. If not all necessary parameters or support
algorithms don't match the client MUST abort the
handshake. Otherwise it completes the SCTP handshake.</li>
            <li>Client performs DTLS connection handshake per RFC 6083 over
established SCTP association. If successful authenticating the
targeted server the client has successful fallen back to use
RFC 6083. If not terminate the SCTP association.</li>
          </ol>
        </section>
        <section anchor="server-fallback">
          <name>Server Fallback</name>
          <t>A DTLS/SCTP Server that supports both this specification and RFC
   6083 and where fallback has been enabled for the ULP can follow
   this procedure.</t>
          <ol spacing="normal" type="1"><li>When receiving an SCTP INIT message without the DTLS/SCTP
adaptation layer indication fallback procedure is initiated.</li>
            <li>Verify that the SCTP INIT contains SCTP-AUTH parameters required
by RFC 6083 and compatible with this server. If that is not the
case abort the SCTP handshake.</li>
            <li>Send an SCTP INIT ACK with the required SCTP-AUTH chunks and
parameters to the client.</li>
            <li>Complete the SCTP Handshake. Await DTLS handshake per RFC 6083.
Plain text SCTP messages MAY be received.</li>
            <li>Upon successful completion of DTLS handshake successful fallback
to RFC 6083 have been accomplished.</li>
          </ol>
        </section>
        <section anchor="auth_fallback">
          <name>Authenticated Fallback</name>
          <t>A DTLS/SCTP implementation supporting this document MUST include the
dtls_sctp_ext extension in all DTLS Client Hello used in DTLS/SCTP
according to RFC 6083. A DTLS/SCTP implementation supporting this
document MUST abort the SCTP association if the dtls_sctp_ext
extension is received when DTLS/SCTP according to RFC 6083 is
used. This mechanism provides authenticated fallback to RFC 6083.</t>
          <t>The dtls_sctp_ext extention is defined as follows:</t>
          <artwork><![CDATA[
enum {
    dtls_sctp_ext(TBD2), (65535)
} ExtensionType;
]]></artwork>
          <t>Clients MAY send this extention in ClientHello. It contains the
following structure:</t>
          <artwork><![CDATA[
struct {
    Empty;
} DTLSOverSCTPExt;
]]></artwork>
        </section>
      </section>
    </section>
    <section anchor="api-considerations">
      <name>SCTP API Consideration</name>
      <t>DTLS/SCTP needs certain functionality on the API that the SCTP
   implementation provides to the ULP to function optimally. A
   DTLS/SCTP implementation will need to provide its own API to the
   ULP, while itself using the SCTP API. This discussion is focused on
   the needed functionality on the SCTP API.</t>
      <t>The following functionality is needed:</t>
      <ul spacing="normal">
        <li>Controlling SCTP-AUTH negotiation so that SHA-256 algorithm is
included, and determine that SHA-1 is not selected when the
association is established.</li>
        <li>Determining when all SCTP packets that uses an SCTP-AUTH key or
contains DTLS records associated to a particular DTLS connection
has been acknowledged non-renegable.</li>
        <li>Install SCTP-AUTH keys with directionality</li>
        <li>Determining when all SCTP packets have been acknowledged
non-renegable.</li>
        <li>Negotiating the adaptation layer indication that indicates
DTLS/SCTP and determine if it was agreed or not.</li>
        <li>Partial user messages transmission and reception.</li>
      </ul>
    </section>
    <section anchor="IANA-Consideration">
      <name>IANA Considerations</name>
      <t>This document registers a number of protocol values per the
below. RFC-Editor Note: Please replace [RFC-TBD] with the RFC number
given to this specification.</t>
      <section anchor="transport-layer-security-tls-extensions">
        <name>Transport Layer Security (TLS) Extensions</name>
        <t>IANA is requested to add a value to the Transport Layer Security
   (TLS) Extensions' "TLS ExtensionType Values" registry defined by
   <xref target="RFC8447"/>.  At time of writing located at:
   <eref target="https://www.iana.org/assignments/tls-extensiontype-values/tls-extensiontype-values.xhtml#tls-extensiontype-values-1">TLS ExtensionType Values Registry</eref></t>
        <table anchor="iana-TLS-extension">
          <name>TLS Extension</name>
          <thead>
            <tr>
              <th align="left">Value</th>
              <th align="left">Extension Name</th>
              <th align="left">TLS 1.3</th>
              <th align="left">DTLS-OK</th>
              <th align="left">Recommended</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">TBD2</td>
              <td align="left">dtls_sctp_ext</td>
              <td align="left">CH</td>
              <td align="left">Y</td>
              <td align="left">Y</td>
              <td align="left">[RFC-TBD]</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="tls-exporter-labels">
        <name>TLS Exporter Labels</name>
        <t>IANA is requested to add two values to the TLS Exporter Label
   registry as defined by <xref target="RFC5705"/>, and <xref target="RFC8447"/>. At time of
   writing located at: <eref target="https://www.iana.org/assignments/tls-parameters/tls-parameters.xhtml#exporter-labels">TLS Exporter Label
   registry</eref></t>
        <table anchor="iana-TLS">
          <name>TLS Exporter Label</name>
          <thead>
            <tr>
              <th align="left">Value</th>
              <th align="left">DTLS-OK</th>
              <th align="left">Recommended</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">EXPORTER-DTLS-OVER-SCTP-CLIENT-WRITE</td>
              <td align="left">Y</td>
              <td align="left">Y</td>
              <td align="left">[RFC-TBD]</td>
            </tr>
            <tr>
              <td align="left">EXPORTER-DTLS-OVER-SCTP-SERVER-WRITE</td>
              <td align="left">Y</td>
              <td align="left">Y</td>
              <td align="left">[RFC-TBD]</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="sec-IANA-ACP">
        <name>SCTP Adaptation Layer Indication Code Point</name>
        <t>IANA is requested to assign an Adaptation Code Point to DTLS/SCTP
   for usage in the Adaptation Layer Indication Parameter. The
   Adaptation Code Point is registered in the SCTP Adaptation Code
   Points registry defined by <xref target="RFC5061"/>. The registry was at time of
   writing located: <eref target="https://www.iana.org/assignments/sctp-parameters/sctp-parameters.xhtml#sctp-parameters-27">Adaptation Code Point
   registry</eref></t>
        <table anchor="iana-ACP">
          <name>Adaptation Code Point</name>
          <thead>
            <tr>
              <th align="left">Code Point (32-bit number)</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">TBD</td>
              <td align="left">DTLS/SCTP</td>
              <td align="left">[RFC-TBD]</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="sec-IANA-PPID">
        <name>SCTP Payload Protocol Identifiers</name>
        <t>IANA is requested to assign one SCTP Payload Protocol Identifier
   (PPID) to be used to identify the DTLS/SCTP control messages
   (<xref target="Control-Message"/>). This PPID is registered in the SCTP Payload
   Protocol Identifiers registry defined by <xref target="RFC9260"/>.  The registry
   was at time of writing located: <eref target="https://www.iana.org/assignments/sctp-parameters/sctp-parameters.xhtml#sctp-parameters-25">SCTP Payload Protocol
   Identifiers</eref></t>
        <table anchor="iana-PPID">
          <name>SCTP Payload Protocol Identifier</name>
          <thead>
            <tr>
              <th align="left">Value</th>
              <th align="left">SCTP PPID</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">TBD1</td>
              <td align="left">DTLS/SCTP Control Message</td>
              <td align="left">[RFC-TBD]</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
    <section anchor="sec-Consideration">
      <name>Security Considerations</name>
      <t>The security considerations given in <xref target="RFC9147"/>,
   <xref target="RFC4895"/>, and <xref target="RFC9260"/> also apply to this document.</t>
      <section anchor="cryptographic-considerations">
        <name>Cryptographic Considerations</name>
        <t>Over the years, there have been several serious attacks on earlier
   versions of Transport Layer Security (TLS), including attacks on
   its most commonly used ciphers and modes of operation.  <xref target="RFC7457"/>
   summarizes the attacks that were known at the time of publishing
   and BCP 195 <xref target="RFC7525"/> <xref target="RFC8996"/> provide recommendations for
   improving the security of deployed services that use TLS.</t>
        <t>When DTLS/SCTP is used with DTLS 1.2 <xref target="RFC6347"/>, DTLS 1.2 MUST be
   configured to disable options known to provide insufficient
   security. HTTP/2 <xref target="RFC9113"/> gives good minimum requirements based
   on the attacks that where publicly known in 2022. DTLS 1.3
   <xref target="RFC9147"/> only defines strong algorithms without major
   weaknesses at the time of publication. Many of the TLS registries
   have a "Recommended" column. Parameters not marked as "Y" are NOT
   RECOMMENDED to support. DTLS 1.3 is preferred over DTLS 1.2 being a
   newer protocol that addresses known vulnerabilities and only
   defines strong algorithms without known major weaknesses at the
   time of publication.</t>
        <t>DTLS 1.3 requires rekeying before algorithm specific AEAD limits
   have been reached. The AEAD limits equations are equally valid for
   DTLS 1.2 and SHOULD be followed for DTLS/SCTP, but are not mandated
   by the DTLS 1.2 specification.</t>
        <t>HMAC-SHA-256 as used in SCTP-AUTH has a very large tag length and
   very good integrity properties.  The SCTP-AUTH key can be used
   longer than the current algorithms in the TLS record layer. The
   SCTP-AUTH key is rekeyed when a new DTLS connection is set up at
   which point a new SCTP-AUTH key is derived using the TLS-Exporter.</t>
        <t>(D)TLS 1.3 <xref target="RFC8446"/> discusses forward secrecy from (EC)DHE,
   Key Update, and tickets/resumption. Forward secrecy limits the
   effect of key leakage in one direction (compromise of a key at
   time T2 does not compromise some key at time T1 where T1 &lt; T2).
   Protection in the other direction (compromise at time T1 does not
   compromise keys at time T2) can be achieved by rerunning (EC)DHE.
   If a long-term authentication key has been compromised, a full
   handshake with (EC)DHE gives protection against passive
   attackers. If the resumption_master_secret has been compromised,
   a resumption handshake with (EC)DHE gives protection against passive
   attackers and a full handshake with (EC)DHE gives protection against
   active attackers. If a traffic secret has been compromised, any
   handshake with (EC)DHE gives protection against active attackers.</t>
        <t>The document “Confidentiality in the Face of Pervasive Surveillance:
   A Threat Model and Problem Statement” <xref target="RFC7624"/> defines key
   exfiltration as the transmission of cryptographic keying material
   for an encrypted communication from a collaborator, deliberately or
   unwittingly, to an attacker. Using the terms in RFC 7624, forward
   secrecy without rerunning (EC)DHE still allows an attacker to do
   static key exfiltration. Rerunning (EC)DHE forces and attacker to
   dynamic key exfiltration (or content exfiltration).</t>
        <t>When using DTLS 1.3 <xref target="RFC9147"/>, AEAD limits and
   forward secrecy can be achieved by sending post-handshake KeyUpdate
   messages, which triggers rekeying of DTLS. Such symmetric rekeying
   gives significantly less protection against key leakage than
   re-running Diffie-Hellman as explained above.  After leakage of
   application_traffic_secret_N, an attacker can passively eavesdrop
   on all future data sent on the connection including data encrypted
   with application_traffic_secret_N+1,
   application_traffic_secret_N+2, etc. Note that Key Update does not
   update the exporter_secret.</t>
        <t>DTLS/SCTP is in many deployments replacing IPsec. For IPsec, NIST
   (US), BSI (Germany), and ANSSI (France) recommends very frequent
   re-run of Diffie-Hellman to provide forward secrecy and
   force attackers to dynamic key extraction <xref target="RFC7624"/>. ANSSI writes
   "It is recommended to force the periodic renewal of the keys, e.g.,
   every hour and every 100 GB of data, in order to limit the impact
   of a key compromise." <xref target="ANSSI-DAT-NT-003"/>.</t>
        <t>For many DTLS/SCTP deployments the SCTP association is expected to
   have a very long lifetime of months or even years. For associations
   with such long lifetimes there is a need to frequently
   re-authenticate both client and server. TLS Certificate lifetimes
   significantly shorter than a year are common which is shorter than
   many expected DTLS/SCTP associations.</t>
        <t>SCTP-AUTH re-rekeying, periodic authentication of both endpoints,
   and frequent re-run of Diffie-Hellman to force attackers to dynamic
   key extraction is in DTLS/SCTP per this specification achieved by
   setting up new DTLS connections over the same SCTP
   association. Implementations SHOULD set up new connections
   frequently to force attackers to dynamic key
   extraction. Implementations MUST set up new connections before any
   of the certificates expire. It is RECOMMENDED that all negotiated
   and exchanged parameters are the same except for the timestamps in
   the certificates. Clients and servers MUST NOT accept a change of
   identity during the setup of a new connections, but MAY accept
   negotiation of stronger algorithms and security parameters, which
   might be motivated by new attacks.</t>
        <t>Allowing new connections can enable denial-of-service attacks.  The
   endpoints MUST limit the number of simultaneous connections to two.
   The implementor shall take into account that an existing DTLS
   connection can only be closed after "Ready_To_Close"
   <xref target="Ready_To_Close"/> indication.</t>
        <t>When DTLS/SCTP is used with DTLS 1.2 <xref target="RFC6347"/>, the TLS Session
   Hash and Extended Master Secret Extension <xref target="RFC7627"/> MUST be used
   to prevent unknown key-share attacks where an attacker establishes
   the same key on several connections. DTLS 1.3 always prevents these
   kinds of attacks. The use of SCTP-AUTH then cryptographically binds
   new connections to the old connections. This together with
   mandatory mutual authentication (on the DTLS layer) and a
   requirement to not accept new identities mitigates MITM attacks
   that have plagued renegotiation <xref target="TRISHAKE"/>.</t>
      </section>
      <section anchor="downgrade-attacks">
        <name>Downgrade Attacks</name>
        <t>A peer supporting DTLS/SCTP according to this specification,
   DTLS/SCTP according to <xref target="RFC6083"/> and/or SCTP without DTLS may be
   vulnerable to downgrade attacks where on on-path attacker
   interferes with the protocol setup to lower or disable security. If
   possible, it is RECOMMENDED that the peers have a policy only
   allowing DTLS/SCTP according to this specification.</t>
      </section>
      <section anchor="targeting-dtls-messages">
        <name>Targeting DTLS Messages</name>
        <t>The DTLS handshake messages and other control messages, i.e., not
   application data can easily be identified when using DTLS 1.2 as
   their content type is not encrypted. With DTLS 1.3 there is no
   unprotected content type. However, they will be sent with an PPID
   of 0 if sent in their own SCTP user messages. <xref target="Stream-Usage"/>
   proposes a basic behavior that will still make it easily for anyone
   to detect the DTLS messages that are not protected user messages.</t>
      </section>
      <section anchor="authentication-and-policy-decisions">
        <name>Authentication and Policy Decisions</name>
        <t>DTLS/SCTP MUST be mutually authenticated. Authentication is the
   process of establishing the identity of a user or system and
   verifying that the identity is valid. DTLS only provides proof of
   possession of a key.  DTLS/SCTP MUST perform identity
   authentication. It is RECOMMENDED that DTLS/SCTP is used with
   certificate-based authentication. When certificates are used the
   application using DTLS/SCTP is responsible for certificate
   policies, certificate chain validation, and identity authentication
   (HTTPS does for example match the hostname with a subjectAltName of
   type dNSName). The application using DTLS/SCTP MUST define what the
   identity is and how it is encoded and the client and server MUST
   use the same identity format.  Guidance on server certificate
   validation can be found in <xref target="RFC6125"/>.  DTLS/SCTP enables periodic
   transfer of mutual revocation information (OSCP stapling) every
   time a new parallel connection is set up.  All security decisions
   MUST be based on the peer's authenticated identity, not on its
   transport layer identity.</t>
        <t>It is possible to authenticate DTLS endpoints based on IP addresses
   in certificates. SCTP associations can use multiple IP addresses
   per SCTP endpoint. Therefore, it is possible that DTLS records will
   be sent from a different source IP address or to a different
   destination IP address than that originally authenticated. This is
   not a problem provided that no security decisions are made based on
   the source or destination IP addresses.</t>
      </section>
      <section anchor="resumption-and-tickets">
        <name>Resumption and Tickets</name>
        <t>In DTLS 1.3 any number of tickets can be issued in a connection and
   the tickets can be used for resumption as long as they are valid,
   which is up to seven days. The nodes in a resumed connection have
   the same roles (client or server) as in the connection where the
   ticket was issued. Resumption can have significant latency benefits
   for quickly restarting a broken DTLS/SCTP association. If tickets
   and resumption are used it is enough to issue a single ticket per
   connection.</t>
      </section>
      <section anchor="privacy-considerations">
        <name>Privacy Considerations</name>
        <t><xref target="RFC6973"/> suggests that the privacy considerations of IETF
   protocols be documented.</t>
        <t>For each SCTP user message, the user also provides a stream
   identifier, a flag to indicate whether the message is sent ordered
   or unordered, and a payload protocol identifier.  Although
   DTLS/SCTP provides privacy for the actual user message, the other
   three information fields are not confidentiality protected.  They
   are sent as clear text because they are part of the SCTP DATA chunk
   header.</t>
        <t>It is RECOMMENDED that DTLS/SCTP is used with certificate-based
   authentication in DTLS 1.3 <xref target="RFC9147"/> to provide identity
   protection. DTLS/SCTP MUST be used with a key exchange method
   providing forward secrecy.</t>
      </section>
      <section anchor="pervasive-monitoring">
        <name>Pervasive Monitoring</name>
        <t>As required by <xref target="RFC7258"/>, work on IETF protocols needs to
   consider the effects of pervasive monitoring and mitigate them when
   possible.</t>
        <t>Pervasive Monitoring is widespread surveillance of users.  By
   encrypting more information including user identities, DTLS 1.3
   offers much better protection against pervasive monitoring.</t>
        <t>Massive pervasive monitoring attacks relying on key exchange
   without forward secrecy has been reported. By mandating forward
   secrecy, DTLS/SCTP effectively mitigate many forms of passive
   pervasive monitoring and limits the amount of compromised data due
   to key compromise.</t>
        <t>An important mitigation of pervasive monitoring is to force
   attackers to do dynamic key exfiltration instead of static key
   exfiltration. Dynamic key exfiltration increases the risk of
   discovery for the attacker <xref target="RFC7624"/>. DTLS/SCTP per this
   specification encourages implementations to frequently set up new
   DTLS connections with (EC)DHE over the same SCTP association to
   force attackers to do dynamic key exfiltration.</t>
        <t>In addition to the privacy attacks discussed above, surveillance on
   a large scale may enable tracking of a user over a wider
   geographical area and across different access networks.  Using
   information from DTLS/SCTP together with information gathered from
   other protocols increase the risk of identifying individual users.</t>
      </section>
    </section>
    <section anchor="contributors">
      <name>Contributors</name>
      <t>Michael Tüxen contributed as co-author to the initial versions
   this draft. Michael's contributions include:</t>
      <ul spacing="normal">
        <li>The use of the Adaptation Layer Indication.</li>
        <li>Many editorial improvements.</li>
      </ul>
    </section>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors of RFC 6083 which this document is based on are
   Michael Tüxen, Eric Rescorla, and Robin Seggelmann.</t>
      <t>The RFC 6083 authors thanked Anna Brunstrom, Lars Eggert, Gorry
   Fairhurst, Ian Goldberg, Alfred Hoenes, Carsten Hohendorf, Stefan
   Lindskog, Daniel Mentz, and Sean Turner for their invaluable comments.</t>
      <t>The authors of this document want to thank Daria Ivanova, Li Yan,
   and GitHub user vanrein for their contribution.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://www.rfc-editor.org/refs/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author initials="S." surname="Bradner" fullname="S. Bradner">
              <organization/>
            </author>
            <date year="1997" month="March"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC3758" target="https://www.rfc-editor.org/info/rfc3758" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3758.xml">
          <front>
            <title>Stream Control Transmission Protocol (SCTP) Partial Reliability Extension</title>
            <author fullname="R. Stewart" initials="R." surname="Stewart"/>
            <author fullname="M. Ramalho" initials="M." surname="Ramalho"/>
            <author fullname="Q. Xie" initials="Q." surname="Xie"/>
            <author fullname="M. Tuexen" initials="M." surname="Tuexen"/>
            <author fullname="P. Conrad" initials="P." surname="Conrad"/>
            <date month="May" year="2004"/>
            <abstract>
              <t>This memo describes an extension to the Stream Control Transmission Protocol (SCTP) that allows an SCTP endpoint to signal to its peer that it should move the cumulative ack point forward.  When both sides of an SCTP association support this extension, it can be used by an SCTP implementation to provide partially reliable data transmission service to an upper layer protocol.  This memo describes the protocol extensions, which consist of a new parameter for INIT and INIT ACK, and a new FORWARD TSN chunk type, and provides one example of a partially reliable service that can be provided to the upper layer via this mechanism. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3758"/>
          <seriesInfo name="DOI" value="10.17487/RFC3758"/>
        </reference>
        <reference anchor="RFC4895" target="https://www.rfc-editor.org/info/rfc4895" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4895.xml">
          <front>
            <title>Authenticated Chunks for the Stream Control Transmission Protocol (SCTP)</title>
            <author fullname="M. Tuexen" initials="M." surname="Tuexen"/>
            <author fullname="R. Stewart" initials="R." surname="Stewart"/>
            <author fullname="P. Lei" initials="P." surname="Lei"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2007"/>
            <abstract>
              <t>This document describes a new chunk type, several parameters, and procedures for the Stream Control Transmission Protocol (SCTP).  This new chunk type can be used to authenticate SCTP chunks by using shared keys between the sender and receiver.  The new parameters are used to establish the shared keys. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4895"/>
          <seriesInfo name="DOI" value="10.17487/RFC4895"/>
        </reference>
        <reference anchor="RFC5061" target="https://www.rfc-editor.org/info/rfc5061" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5061.xml">
          <front>
            <title>Stream Control Transmission Protocol (SCTP) Dynamic Address Reconfiguration</title>
            <author fullname="R. Stewart" initials="R." surname="Stewart"/>
            <author fullname="Q. Xie" initials="Q." surname="Xie"/>
            <author fullname="M. Tuexen" initials="M." surname="Tuexen"/>
            <author fullname="S. Maruyama" initials="S." surname="Maruyama"/>
            <author fullname="M. Kozuka" initials="M." surname="Kozuka"/>
            <date month="September" year="2007"/>
            <abstract>
              <t>A local host may have multiple points of attachment to the Internet, giving it a degree of fault tolerance from hardware failures.  Stream Control Transmission Protocol (SCTP) (RFC 4960) was developed to take full advantage of such a multi-homed host to provide a fast failover and association survivability in the face of such hardware failures.  This document describes an extension to SCTP that will allow an SCTP stack to dynamically add an IP address to an SCTP association, dynamically delete an IP address from an SCTP association, and to request to set the primary address the peer will use when sending to an endpoint. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5061"/>
          <seriesInfo name="DOI" value="10.17487/RFC5061"/>
        </reference>
        <reference anchor="RFC5705" target="https://www.rfc-editor.org/info/rfc5705" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5705.xml">
          <front>
            <title>Keying Material Exporters for Transport Layer Security (TLS)</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="March" year="2010"/>
            <abstract>
              <t>A number of protocols wish to leverage Transport Layer Security (TLS) to perform key establishment but then use some of the keying material for their own purposes.  This document describes a general mechanism for allowing that. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5705"/>
          <seriesInfo name="DOI" value="10.17487/RFC5705"/>
        </reference>
        <reference anchor="RFC6347" target="https://www.rfc-editor.org/info/rfc6347" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6347.xml">
          <front>
            <title>Datagram Transport Layer Security Version 1.2</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="January" year="2012"/>
            <abstract>
              <t>This document specifies version 1.2 of the Datagram Transport Layer Security (DTLS) protocol.  The DTLS protocol provides communications privacy for datagram protocols.  The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.  The DTLS protocol is based on the Transport Layer Security (TLS) protocol and provides equivalent security guarantees.  Datagram semantics of the underlying transport are preserved by the DTLS protocol.  This document updates DTLS 1.0 to work with TLS version 1.2. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6347"/>
          <seriesInfo name="DOI" value="10.17487/RFC6347"/>
        </reference>
        <reference anchor="RFC7627" target="https://www.rfc-editor.org/info/rfc7627" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7627.xml">
          <front>
            <title>Transport Layer Security (TLS) Session Hash and Extended Master Secret Extension</title>
            <author fullname="K. Bhargavan" initials="K." role="editor" surname="Bhargavan"/>
            <author fullname="A. Delignat-Lavaud" initials="A." surname="Delignat-Lavaud"/>
            <author fullname="A. Pironti" initials="A." surname="Pironti"/>
            <author fullname="A. Langley" initials="A." surname="Langley"/>
            <author fullname="M. Ray" initials="M." surname="Ray"/>
            <date month="September" year="2015"/>
            <abstract>
              <t>The Transport Layer Security (TLS) master secret is not cryptographically bound to important session parameters such as the server certificate.  Consequently, it is possible for an active attacker to set up two sessions, one with a client and another with a server, such that the master secrets on the two sessions are the same.  Thereafter, any mechanism that relies on the master secret for authentication, including session resumption, becomes vulnerable to a man-in-the-middle attack, where the attacker can simply forward messages back and forth between the client and server.  This specification defines a TLS extension that contextually binds the master secret to a log of the full handshake that computes it, thus preventing such attacks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7627"/>
          <seriesInfo name="DOI" value="10.17487/RFC7627"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://www.rfc-editor.org/refs/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author initials="B." surname="Leiba" fullname="B. Leiba">
              <organization/>
            </author>
            <date year="2017" month="May"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8260" target="https://www.rfc-editor.org/info/rfc8260" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8260.xml">
          <front>
            <title>Stream Schedulers and User Message Interleaving for the Stream Control Transmission Protocol</title>
            <author fullname="R. Stewart" initials="R." surname="Stewart"/>
            <author fullname="M. Tuexen" initials="M." surname="Tuexen"/>
            <author fullname="S. Loreto" initials="S." surname="Loreto"/>
            <author fullname="R. Seggelmann" initials="R." surname="Seggelmann"/>
            <date month="November" year="2017"/>
            <abstract>
              <t>The Stream Control Transmission Protocol (SCTP) is a message-oriented transport protocol supporting arbitrarily large user messages. This document adds a new chunk to SCTP for carrying payload data. This allows a sender to interleave different user messages that would otherwise result in head-of-line blocking at the sender. The interleaving of user messages is required for WebRTC data channels.</t>
              <t>Whenever an SCTP sender is allowed to send user data, it may choose from multiple outgoing SCTP streams. Multiple ways for performing this selection, called stream schedulers, are defined in this document. A stream scheduler can choose to either implement, or not implement, user message interleaving.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8260"/>
          <seriesInfo name="DOI" value="10.17487/RFC8260"/>
        </reference>
        <reference anchor="RFC8446" target="https://www.rfc-editor.org/info/rfc8446" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8446.xml">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8447" target="https://www.rfc-editor.org/info/rfc8447" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8447.xml">
          <front>
            <title>IANA Registry Updates for TLS and DTLS</title>
            <author fullname="J. Salowey" initials="J." surname="Salowey"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document describes a number of changes to TLS and DTLS IANA registries that range from adding notes to the registry all the way to changing the registration policy. These changes were mostly motivated by WG review of the TLS- and DTLS-related registries undertaken as part of the TLS 1.3 development process.</t>
              <t>This document updates the following RFCs: 3749, 5077, 4680, 5246, 5705, 5878, 6520, and 7301.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8447"/>
          <seriesInfo name="DOI" value="10.17487/RFC8447"/>
        </reference>
        <reference anchor="RFC8449" target="https://www.rfc-editor.org/info/rfc8449" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8449.xml">
          <front>
            <title>Record Size Limit Extension for TLS</title>
            <author fullname="M. Thomson" initials="M." surname="Thomson"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>An extension to Transport Layer Security (TLS) is defined that allows endpoints to negotiate the maximum size of protected records that each will send the other.</t>
              <t>This replaces the maximum fragment length extension defined in RFC 6066.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8449"/>
          <seriesInfo name="DOI" value="10.17487/RFC8449"/>
        </reference>
        <reference anchor="RFC8996" target="https://www.rfc-editor.org/info/rfc8996" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8996.xml">
          <front>
            <title>Deprecating TLS 1.0 and TLS 1.1</title>
            <author fullname="K. Moriarty" initials="K." surname="Moriarty"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <date month="March" year="2021"/>
            <abstract>
              <t>This document formally deprecates Transport Layer Security (TLS) versions 1.0 (RFC 2246) and 1.1 (RFC 4346). Accordingly, those documents have been moved to Historic status. These versions lack support for current and recommended cryptographic algorithms and mechanisms, and various government and industry profiles of applications using TLS now mandate avoiding these old TLS versions. TLS version 1.2 became the recommended version for IETF protocols in 2008 (subsequently being obsoleted by TLS version 1.3 in 2018), providing sufficient time to transition away from older versions. Removing support for older versions from implementations reduces the attack surface, reduces opportunity for misconfiguration, and streamlines library and product maintenance.</t>
              <t>This document also deprecates Datagram TLS (DTLS) version 1.0 (RFC 4347) but not DTLS version 1.2, and there is no DTLS version 1.1.</t>
              <t>This document updates many RFCs that normatively refer to TLS version 1.0 or TLS version 1.1, as described herein. This document also updates the best practices for TLS usage in RFC 7525; hence, it is part of BCP 195.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="195"/>
          <seriesInfo name="RFC" value="8996"/>
          <seriesInfo name="DOI" value="10.17487/RFC8996"/>
        </reference>
        <reference anchor="RFC9113" target="https://www.rfc-editor.org/info/rfc9113" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9113.xml">
          <front>
            <title>HTTP/2</title>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <author fullname="C. Benfield" initials="C." role="editor" surname="Benfield"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>This specification describes an optimized expression of the semantics of the Hypertext Transfer Protocol (HTTP), referred to as HTTP version 2 (HTTP/2). HTTP/2 enables a more efficient use of network resources and a reduced latency by introducing field compression and allowing multiple concurrent exchanges on the same connection.</t>
              <t>This document obsoletes RFCs 7540 and 8740.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9113"/>
          <seriesInfo name="DOI" value="10.17487/RFC9113"/>
        </reference>
        <reference anchor="RFC9146" target="https://www.rfc-editor.org/info/rfc9146" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9146.xml">
          <front>
            <title>Connection Identifier for DTLS 1.2</title>
            <author fullname="E. Rescorla" initials="E." role="editor" surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <author fullname="A. Kraus" initials="A." surname="Kraus"/>
            <date month="March" year="2022"/>
            <abstract>
              <t>This document specifies the Connection ID (CID) construct for the Datagram Transport Layer Security (DTLS) protocol version 1.2.</t>
              <t>A CID is an identifier carried in the record layer header that gives the recipient additional information for selecting the appropriate security association. In "classical" DTLS, selecting a security association of an incoming DTLS record is accomplished with the help of the 5-tuple. If the source IP address and/or source port changes during the lifetime of an ongoing DTLS session, then the receiver will be unable to locate the correct security context.</t>
              <t>The new ciphertext record format with the CID also provides content type encryption and record layer padding.</t>
              <t>This document updates RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9146"/>
          <seriesInfo name="DOI" value="10.17487/RFC9146"/>
        </reference>
        <reference anchor="RFC9147" target="https://www.rfc-editor.org/info/rfc9147" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9147.xml">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="RFC9260" target="https://www.rfc-editor.org/info/rfc9260" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9260.xml">
          <front>
            <title>Stream Control Transmission Protocol</title>
            <author fullname="R. Stewart" initials="R." surname="Stewart"/>
            <author fullname="M. Tüxen" initials="M." surname="Tüxen"/>
            <author fullname="K. Nielsen" initials="K." surname="Nielsen"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>This document describes the Stream Control Transmission Protocol (SCTP) and obsoletes RFC 4960. It incorporates the specification of the chunk flags registry from RFC 6096 and the specification of the I bit of DATA chunks from RFC 7053. Therefore, RFCs 6096 and 7053 are also obsoleted by this document. In addition, RFCs 4460 and 8540, which describe errata for SCTP, are obsoleted by this document.</t>
              <t>SCTP was originally designed to transport Public Switched Telephone Network (PSTN) signaling messages over IP networks. It is also suited to be used for other applications, for example, WebRTC.</t>
              <t>SCTP is a reliable transport protocol operating on top of a connectionless packet network, such as IP. It offers the following services to its users:</t>
              <t>The design of SCTP includes appropriate congestion avoidance behavior and resistance to flooding and masquerade attacks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9260"/>
          <seriesInfo name="DOI" value="10.17487/RFC9260"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC3436" target="https://www.rfc-editor.org/info/rfc3436" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3436.xml">
          <front>
            <title>Transport Layer Security over Stream Control Transmission Protocol</title>
            <author fullname="A. Jungmaier" initials="A." surname="Jungmaier"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="M. Tuexen" initials="M." surname="Tuexen"/>
            <date month="December" year="2002"/>
            <abstract>
              <t>This document describes the usage of the Transport Layer Security (TLS) protocol, as defined in RFC 2246, over the Stream Control Transmission Protocol (SCTP), as defined in RFC 2960 and RFC 3309.  The user of TLS can take advantage of the features provided by SCTP, namely the support of multiple streams to avoid head of line blocking and the support of multi-homing to provide network level fault tolerance.  Additionally, discussions of extensions of SCTP are also supported, meaning especially the support of dynamic reconfiguration of IP- addresses. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3436"/>
          <seriesInfo name="DOI" value="10.17487/RFC3436"/>
        </reference>
        <reference anchor="RFC3788" target="https://www.rfc-editor.org/info/rfc3788" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3788.xml">
          <front>
            <title>Security Considerations for Signaling Transport (SIGTRAN) Protocols</title>
            <author fullname="J. Loughney" initials="J." surname="Loughney"/>
            <author fullname="M. Tuexen" initials="M." role="editor" surname="Tuexen"/>
            <author fullname="J. Pastor-Balbas" initials="J." surname="Pastor-Balbas"/>
            <date month="June" year="2004"/>
            <abstract>
              <t>This document discusses how Transport Layer Security (TLS) and IPsec can be used to secure communication for SIGTRAN protocols.  The main goal is to recommend the minimum security means that a SIGTRAN node must implement in order to attain secured communication.  The support of IPsec is mandatory for all nodes running SIGTRAN protocols.  TLS support is optional. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3788"/>
          <seriesInfo name="DOI" value="10.17487/RFC3788"/>
        </reference>
        <reference anchor="RFC6083" target="https://www.rfc-editor.org/info/rfc6083" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6083.xml">
          <front>
            <title>Datagram Transport Layer Security (DTLS) for Stream Control Transmission Protocol (SCTP)</title>
            <author fullname="M. Tuexen" initials="M." surname="Tuexen"/>
            <author fullname="R. Seggelmann" initials="R." surname="Seggelmann"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="January" year="2011"/>
            <abstract>
              <t>This document describes the usage of the Datagram Transport Layer Security (DTLS) protocol over the Stream Control Transmission Protocol (SCTP).</t>
              <t>DTLS over SCTP provides communications privacy for applications that use SCTP as their transport protocol and allows client/server applications to communicate in a way that is designed to prevent eavesdropping and detect tampering or message forgery.</t>
              <t>Applications using DTLS over SCTP can use almost all transport features provided by SCTP and its extensions. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6083"/>
          <seriesInfo name="DOI" value="10.17487/RFC6083"/>
        </reference>
        <reference anchor="RFC6125" target="https://www.rfc-editor.org/info/rfc6125" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6125.xml">
          <front>
            <title>Representation and Verification of Domain-Based Application Service Identity within Internet Public Key Infrastructure Using X.509 (PKIX) Certificates in the Context of Transport Layer Security (TLS)</title>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <author fullname="J. Hodges" initials="J." surname="Hodges"/>
            <date month="March" year="2011"/>
            <abstract>
              <t>Many application technologies enable secure communication between two entities by means of Internet Public Key Infrastructure Using X.509 (PKIX) certificates in the context of Transport Layer Security (TLS).  This document specifies procedures for representing and verifying the identity of application services in such interactions. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6125"/>
          <seriesInfo name="DOI" value="10.17487/RFC6125"/>
        </reference>
        <reference anchor="RFC6458" target="https://www.rfc-editor.org/info/rfc6458" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6458.xml">
          <front>
            <title>Sockets API Extensions for the Stream Control Transmission Protocol (SCTP)</title>
            <author fullname="R. Stewart" initials="R." surname="Stewart"/>
            <author fullname="M. Tuexen" initials="M." surname="Tuexen"/>
            <author fullname="K. Poon" initials="K." surname="Poon"/>
            <author fullname="P. Lei" initials="P." surname="Lei"/>
            <author fullname="V. Yasevich" initials="V." surname="Yasevich"/>
            <date month="December" year="2011"/>
            <abstract>
              <t>This document describes a mapping of the Stream Control Transmission Protocol (SCTP) into a sockets API.  The benefits of this mapping include compatibility for TCP applications, access to new SCTP features, and a consolidated error and event notification scheme.  This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6458"/>
          <seriesInfo name="DOI" value="10.17487/RFC6458"/>
        </reference>
        <reference anchor="RFC6525" target="https://www.rfc-editor.org/info/rfc6525" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6525.xml">
          <front>
            <title>Stream Control Transmission Protocol (SCTP) Stream Reconfiguration</title>
            <author fullname="R. Stewart" initials="R." surname="Stewart"/>
            <author fullname="M. Tuexen" initials="M." surname="Tuexen"/>
            <author fullname="P. Lei" initials="P." surname="Lei"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>Many applications that use the Stream Control Transmission Protocol (SCTP) want the ability to "reset" a stream.  The intention of resetting a stream is to set the numbering sequence of the stream back to 'zero' with a corresponding notification to the application layer that the reset has been performed.  Applications requiring this feature want it so that they can "reuse" streams for different purposes but still utilize the stream sequence number so that the application can track the message flows.  Thus, without this feature, a new use of an old stream would result in message numbers greater than expected, unless there is a protocol mechanism to "reset the streams back to zero".  This document also includes methods for resetting the transmission sequence numbers, adding additional streams, and resetting all stream sequence numbers. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6525"/>
          <seriesInfo name="DOI" value="10.17487/RFC6525"/>
        </reference>
        <reference anchor="RFC6973" target="https://www.rfc-editor.org/info/rfc6973" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6973.xml">
          <front>
            <title>Privacy Considerations for Internet Protocols</title>
            <author fullname="A. Cooper" initials="A." surname="Cooper"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="J. Peterson" initials="J." surname="Peterson"/>
            <author fullname="J. Morris" initials="J." surname="Morris"/>
            <author fullname="M. Hansen" initials="M." surname="Hansen"/>
            <author fullname="R. Smith" initials="R." surname="Smith"/>
            <date month="July" year="2013"/>
            <abstract>
              <t>This document offers guidance for developing privacy considerations for inclusion in protocol specifications.  It aims to make designers, implementers, and users of Internet protocols aware of privacy-related design choices.  It suggests that whether any individual RFC warrants a specific privacy considerations section will depend on the document's content.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6973"/>
          <seriesInfo name="DOI" value="10.17487/RFC6973"/>
        </reference>
        <reference anchor="RFC7258" target="https://www.rfc-editor.org/info/rfc7258" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7258.xml">
          <front>
            <title>Pervasive Monitoring Is an Attack</title>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2014"/>
            <abstract>
              <t>Pervasive monitoring is a technical attack that should be mitigated in the design of IETF protocols, where possible.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="188"/>
          <seriesInfo name="RFC" value="7258"/>
          <seriesInfo name="DOI" value="10.17487/RFC7258"/>
        </reference>
        <reference anchor="RFC7457" target="https://www.rfc-editor.org/info/rfc7457" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7457.xml">
          <front>
            <title>Summarizing Known Attacks on Transport Layer Security (TLS) and Datagram TLS (DTLS)</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="R. Holz" initials="R." surname="Holz"/>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <date month="February" year="2015"/>
            <abstract>
              <t>Over the last few years, there have been several serious attacks on Transport Layer Security (TLS), including attacks on its most commonly used ciphers and modes of operation.  This document summarizes these attacks, with the goal of motivating generic and protocol-specific recommendations on the usage of TLS and Datagram TLS (DTLS).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7457"/>
          <seriesInfo name="DOI" value="10.17487/RFC7457"/>
        </reference>
        <reference anchor="RFC7525" target="https://www.rfc-editor.org/info/rfc7525" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7525.xml">
          <front>
            <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="R. Holz" initials="R." surname="Holz"/>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are widely used to protect data exchanged over application protocols such as HTTP, SMTP, IMAP, POP, SIP, and XMPP.  Over the last few years, several serious attacks on TLS have emerged, including attacks on its most commonly used cipher suites and their modes of operation.  This document provides recommendations for improving the security of deployed services that use TLS and DTLS.  The recommendations are applicable to the majority of use cases.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7525"/>
          <seriesInfo name="DOI" value="10.17487/RFC7525"/>
        </reference>
        <reference anchor="RFC7624" target="https://www.rfc-editor.org/info/rfc7624" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7624.xml">
          <front>
            <title>Confidentiality in the Face of Pervasive Surveillance: A Threat Model and Problem Statement</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="B. Schneier" initials="B." surname="Schneier"/>
            <author fullname="C. Jennings" initials="C." surname="Jennings"/>
            <author fullname="T. Hardie" initials="T." surname="Hardie"/>
            <author fullname="B. Trammell" initials="B." surname="Trammell"/>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <author fullname="D. Borkmann" initials="D." surname="Borkmann"/>
            <date month="August" year="2015"/>
            <abstract>
              <t>Since the initial revelations of pervasive surveillance in 2013, several classes of attacks on Internet communications have been discovered.  In this document, we develop a threat model that describes these attacks on Internet confidentiality.  We assume an attacker that is interested in undetected, indiscriminate eavesdropping.  The threat model is based on published, verified attacks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7624"/>
          <seriesInfo name="DOI" value="10.17487/RFC7624"/>
        </reference>
        <reference anchor="ANSSI-DAT-NT-003" target="&lt;https://www.ssi.gouv.fr/uploads/2015/09/NT_IPsec_EN.pdf&gt;">
          <front>
            <title>Recommendations for securing networks with IPsec</title>
            <author initials="" surname="Agence nationale de la sécurité des systèmes d'information">
              <organization/>
            </author>
            <date year="2015" month="August"/>
          </front>
          <seriesInfo name="ANSSI Technical Report DAT-NT-003" value=""/>
        </reference>
        <reference anchor="TRISHAKE" target="https://hal.inria.fr/hal-01102259/file/triple-handshakes-and-cookie-cutters-oakland14.pdf">
          <front>
            <title>Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS</title>
            <author initials="K." surname="Bhargavan" fullname="Karthikeyan Bhargavan">
              <organization/>
            </author>
            <author initials="A." surname="Delignat-Lavaud" fullname="Antoine Delignat-Lavaud">
              <organization/>
            </author>
            <author initials="C." surname="Fournet" fullname="Cédric Fournet">
              <organization/>
            </author>
            <author initials="A." surname="Pironti" fullname="Alfredo Pironti">
              <organization/>
            </author>
            <author initials="P." surname="Strub" fullname="Pierre-Yves Strub">
              <organization/>
            </author>
            <date year="2016" month="April"/>
          </front>
          <seriesInfo name="IEEE Symposium on Security &amp; Privacy" value=""/>
        </reference>
      </references>
    </references>
    <section anchor="motivation-for-changes">
      <name>Motivation for Changes</name>
      <t>This document proposes a number of changes to RFC 6083 that have
various different motivations:</t>
      <t>Supporting Large User Messages: RFC 6083 allowed only user messages
   that could fit within a single DTLS record. 3GPP has run into this
   limitation where they have at least four SCTP using protocols (F1,
   E1, Xn, NG-C) that can potentially generate messages over the size
   of 16384 bytes.</t>
      <t>New Versions: 10 years has passed since RFC 6083 was written, and
   significant evolution has happened in the area of DTLS and security
   algorithms. Thus, DTLS 1.3 is the newest version of DTLS and also
   the SHA-1 HMAC algorithm of RFC 4895 is getting towards the end of
   usefulness. Use of DTLS 1.3 with long lived associations require a
   solution to enable mutual re-authentication and (EC)DHE based
   rekeying to ensure forward secrecy. Thus, this document mandates
   usage of relevant versions and algorithms as well as defining the
   parallel DTLS connection solution.</t>
      <t>Allowing DTLS Messages on any stream: RFC6083 requires DTLS messages
   that are not user message data to be sent on stream 0 and that this
   stream is used with in-order delivery. That can actually limit the
   applications that can use DTLS/SCTP. In addition, with DTLS 1.3
   encrypting the actual message type it is anyway not available.
   Therefore, a more flexible rule set is used that relies on DTLS
   handling reordering.</t>
      <t>Clarifications: Some implementation experiences have been gained that
   motivates additional clarifications on the specification.</t>
      <ul spacing="normal">
        <li>Avoid unsecured messages prior to DTLS handshake have completed.</li>
        <li>Make clear that all messages are encrypted after DTLS handshake.</li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
