<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.21 (Ruby 3.2.2) -->
<?rfc rfcedstyle="yes"?>
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc text-list-symbols="o-*+"?>
<?rfc compact="yes"?>
<?rfc subcompact="yes"?>
<?rfc consensus="no"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-uta-tls13-iot-profile-20" category="std" consensus="true" submissionType="IETF" updates="7925" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.25.0 -->
  <front>
    <title abbrev="TLS/DTLS 1.3 IoT Profiles">TLS/DTLS 1.3 Profiles for the Internet of Things</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-uta-tls13-iot-profile-20"/>
    <author initials="H." surname="Tschofenig" fullname="Hannes Tschofenig">
      <organization abbrev="UniBw M.">University of the Bundeswehr Munich</organization>
      <address>
        <postal>
          <city>Neubiberg</city>
          <region>Bavaria</region>
          <code>85577</code>
          <country>Germany</country>
        </postal>
        <email>hannes.tschofenig@gmx.net</email>
      </address>
    </author>
    <author initials="T." surname="Fossati" fullname="Thomas Fossati">
      <organization>Linaro</organization>
      <address>
        <email>Thomas.Fossati@linaro.org</email>
      </address>
    </author>
    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <author initials="D." surname="Migault" fullname="Daniel Migault">
      <organization>Ericsson</organization>
      <address>
        <postal>
          <country>Canada</country>
        </postal>
        <email>daniel.migault@ericsson.com</email>
      </address>
    </author>
    <date year="2026" month="May" day="18"/>
    <area>Security</area>
    <workgroup>UTA</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 124?>

<t>RFC 7925 offers guidance to developers on using TLS/DTLS 1.2 for Internet of
Things (IoT) devices with resource constraints. This document is a
companion to RFC 7925, defining TLS/DTLS 1.3 profiles for IoT devices.
Additionally, it updates RFC 7925 with respect to the X.509 certificate
profile and ciphersuite requirements.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Source for this draft and an issue tracker can be found at
  <eref target="https://github.com/thomas-fossati/draft-tls13-iot"/>.</t>
    </note>
  </front>
  <middle>
    <?line 132?>

<section anchor="introduction">
      <name>Introduction</name>
      <aside>
        <t>Note to RFC Editor: Once RFC 9846 (RFC 8446bis) is published, all references to RFC 8446 must be updated to refer to RFC 9846.
All section references must also be updated accordingly.</t>
      </aside>
      <t>In the rapidly evolving Internet of Things (IoT) ecosystem, communication security
is a critical requirement. The Transport Layer Security (TLS) and Datagram Transport
Layer Security (DTLS) protocols have been foundational for ensuring encryption,
integrity, and authenticity in communications. However, the constraints of a certain
class of IoT devices render conventional, off-the-shelf TLS/DTLS implementations
suboptimal for many IoT use cases. This document addresses these limitations by specifying TLS 1.3 and DTLS 1.3 profiles that are optimized for resource-constrained IoT devices.</t>
      <t>Note that IoT devices vary widely in terms of capabilities. While some are highly
resource-constrained, others offer performance comparable to regular desktop computers
but operate without end-user interfaces. For a detailed description of the different
classes of IoT devices, please refer to <xref target="RFC7228"/> and <xref target="I-D.ietf-iotops-7228bis"/>.
It is crucial for developers to thoroughly assess the limitations of their IoT devices
and communication technologies to implement the most suitable optimizations.
The profiles in this document aim to balance strong security with the hardware and
software limitations of IoT devices.</t>
      <t>TLS 1.3 has been re-designed and several previously defined extensions are not
applicable to the new version of TLS/DTLS anymore. The following features changed
with the transition from TLS 1.2 to 1.3:</t>
      <ul spacing="compact">
        <li>
          <t>TLS 1.3 introduced the concept of post-handshake authentication messages, which
partially replaced the need for the re-negotiation feature <xref target="RFC5746"/> available
in earlier TLS versions. However, the rekeying mechanism defined in <xref section="4.6.3" sectionFormat="of" target="RFC8446"/>
does not provide post-compromise security (see <xref section="E.1.5" sectionFormat="of" target="RFC8446"/>).
Furthermore, post-handshake authentication defined in
<xref section="4.6.2" sectionFormat="of" target="RFC8446"/> only offers client authentication (client-to-server).
The "Exported Authenticator" specification, see <xref target="RFC9261"/>, added support
for mutual post-handshake authentication, but this requires the Certificate,
CertificateVerify and the Finished messages to be conveyed by the application
layer protocol, as it is exercised for HTTP/2 and HTTP/3 in <xref target="I-D.ietf-httpbis-secondary-server-certs"/>.
Therefore, the application layer protocol must be enhanced whenever this feature is required.</t>
        </li>
        <li>
          <t>Rekeying of the application traffic secret does not lead to an update of the
exporter secret (see <xref section="7.5" sectionFormat="of" target="RFC8446"/>) since the derived export secret is
based on the exporter_master_secret and not on the application traffic secret.</t>
        </li>
        <li>
          <t>Flight #4, which was used by EAP-TLS 1.2 <xref target="RFC5216"/>, does not exist in TLS 1.3.
As a consequence, EAP-TLS 1.3 <xref target="RFC9190"/> introduced a placeholder message.</t>
        </li>
        <li>
          <t><xref target="RFC4279"/> introduced PSK-based authentication to TLS, a feature re-designed
in TLS 1.3. The "PSK identity hint" defined in <xref target="RFC4279"/>, which is used by the
server to help the client in selecting which PSK identity to use, is, however, not
available anymore in TLS 1.3.</t>
        </li>
        <li>
          <t>Finally, ciphersuites were deprecated and the RSA-based key transport is not
supported in TLS 1.3. As a consequence, only a Diffie-Hellman-based key exchange
is available for non-PSK-based (i.e., certificate-based) authentication. (For PSK-based authentication the
use of Diffie-Hellman is optional.)</t>
        </li>
      </ul>
      <t>The profiles in this specification are designed to be adaptable to the broad spectrum
of IoT applications, from low-power consumer devices to large-scale industrial
deployments. It provides guidelines for implementing TLS/DTLS 1.3 in diverse
networking contexts, including reliable, connection-oriented transport via TCP
for TLS, and lightweight, connectionless communication via UDP for DTLS. In
particular, DTLS is emphasized for scenarios where low-latency communication is
paramount, such as multi-hop mesh networks and low-power wide-area networks,
where the amount of data exchanged needs to be minimized.</t>
      <t>This document offers comprehensive guidance for deploying secure
communication in resource-constrained IoT environments. It outlines best practices
for configuring TLS/DTLS 1.3 to meet the unique needs of IoT devices, ensuring
robust security without overwhelming their limited processing, memory, and power
resources. The document aims to facilitate the development of secure and efficient IoT
deployments and promote the broad adoption of secure communication standards.</t>
      <t>This document updates <xref target="RFC7925"/> with respect to the X.509 certificate profile (<xref target="certificate_profile"/>) and ciphersuite requirements (<xref target="ciphersuites"/>).</t>
    </section>
    <section anchor="conventions-and-terminology">
      <name>Conventions and Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
<?line -6?>
      </t>
      <t>This document reuses the terms "SHOULD+", "SHOULD-" and "MUST-" from <xref target="RFC8221"/>.</t>
    </section>
    <section anchor="credential-types">
      <name>Credential Types</name>
      <t>TLS/DTLS allow different credential types to be used. These include X.509
certificates and raw public keys, pre-shared keys (PSKs), and passwords.
The extensions used in TLS/DTLS differ depending on the credential types
supported.
Self-signed X.509 certificates are still X.509, not raw public keys; raw
public keys are conveyed via the raw_public_key extension.</t>
      <t>This profile considers three authentication modes for IoT devices:
(1) certificate-based, (2) raw public key-based and (3) external PSK-based.
PSK with (EC)DHE is optional and not assumed by default.</t>
      <t>TLS/DTLS 1.3 supports PSK-based authentication,
wherein PSKs can be established via session tickets from prior
connections or via some external, out-of-band mechanism. To distinguish
the two modes, the former is called resumption PSK and the latter
external PSK. For performance reasons the support for resumption PSKs
is often found in implementations that use X.509 certificates for
authentication.
Implementations that only support external PSKs are common in constrained
devices; implementations using certificates often also support resumption
PSKs for performance.</t>
      <t>A "plain" PSK-based TLS/DTLS client or server, which only implements support
for external PSKs as its long-term credential, MUST implement the following extensions:</t>
      <ul spacing="compact">
        <li>
          <t>Supported Versions,</t>
        </li>
        <li>
          <t>Cookie,</t>
        </li>
        <li>
          <t>Server Name Indication (SNI),</t>
        </li>
        <li>
          <t>Pre-Shared Key,</t>
        </li>
        <li>
          <t>PSK Key Exchange Modes, and</t>
        </li>
        <li>
          <t>Application-Layer Protocol Negotiation (ALPN).</t>
        </li>
      </ul>
      <t>Note that these extensions may also appear in ECDHE or resumption handshakes;
the requirement here is that external PSK-only endpoints MUST support them.</t>
      <t>For external pre-shared keys, <xref target="RFC9258"/> recommends that applications
SHOULD provision separate PSKs for (D)TLS 1.3 and prior versions.</t>
      <t>Where possible, the importer interface defined in <xref target="RFC9258"/> MUST be used
for external PSKs. This ensures
that external PSKs used in (D)TLS 1.3
are bound to a specific key derivation function (KDF) and hash function.</t>
      <t>SNI is discussed in <xref target="sni"/>; the justification for implementing and using
the ALPN extension can be found in <xref target="RFC9325"/>.</t>
      <t>An implementation supporting authentication based on certificates and
raw public keys MUST support digital signatures with ecdsa_secp256r1_sha256. A
compliant implementation MUST support the key exchange with secp256r1 (NIST
P-256) and SHOULD support key exchange with X25519.</t>
      <t>For TLS/DTLS clients and servers implementing raw public keys and/or
certificates the guidance for mandatory-to-implement extensions described in
<xref section="9.2" sectionFormat="of" target="RFC8446"/> MUST be followed.
In addition, compliant implementations MUST implement the Record Size Limit
(RSL) extension; see <xref target="record_size_limit"/>.</t>
      <t>Entities deploying IoT devices may select credential types based on security
characteristics, operational requirements, cost, and other factors.
Consequently, this specification does not prescribe a single credential type
but provides guidance on considerations relevant to the use of particular types.</t>
    </section>
    <section anchor="error-handling">
      <name>Error Handling</name>
      <t>TLS 1.3 simplified the Alert protocol but the underlying challenge in an
embedded context remains unchanged, namely what should an IoT device do when it
encounters an error situation. The classical approach used in a desktop
environment where the user is prompted is often not applicable with unattended
devices. Hence, it is more important for a developer to find out from which
error cases a device can recover from.</t>
    </section>
    <section anchor="session-resumption">
      <name>Session Resumption</name>
      <t>TLS 1.3 has built-in support for session resumption by utilizing PSK-based
credentials established in an earlier exchange.</t>
    </section>
    <section anchor="compression">
      <name> Compression</name>
      <t>TLS 1.3 does not define compression of application data traffic, as offered by
previous versions of TLS. Applications are therefore responsible for transmitting
payloads that are either compressed or use a more efficient encoding otherwise.</t>
      <t>With regards to the handshake itself, various strategies have
been applied to reduce the size of the exchanged payloads. TLS and DTLS 1.3 use less
overhead, depending on the type of key confirmations, when compared to previous versions of the
protocol.</t>
    </section>
    <section anchor="forward-secrecy">
      <name> Forward Secrecy</name>
      <t>RFC 8446 has removed Static RSA and Static Diffie-Hellman cipher suites, therefore all public-key-based key exchange mechanisms available in TLS 1.3 provide forward secrecy.</t>
      <t>Pre-shared keys (PSKs) can be used with (EC)DHE key exchange to provide forward secrecy or can be used alone, at the cost of losing forward secrecy for the application data.
For PSK use, endpoints SHOULD use (EC)DHE to achieve forward secrecy; PSK-only
SHOULD be avoided unless the application can tolerate the loss of forward secrecy.</t>
    </section>
    <section anchor="authentication-and-integrity-only-cipher-suites">
      <name>Authentication and Integrity-only Cipher Suites</name>
      <t>For a few, very specific Industrial IoT use cases <xref target="RFC9150"/> defines two cipher
suites that provide data authenticity, but not data confidentiality. For details
and use constraints, defer to <xref target="RFC9150"/> (especially <xref section="9" sectionFormat="of" target="RFC9150"/>).
Implementations may not support these suites; deployments should not assume
availability. This document does not add new guidance beyond <xref target="RFC9150"/>.
Profiling the use of authentication- and integrity-only cipher suites is out of
scope for this specification.</t>
    </section>
    <section anchor="keep-alive">
      <name>Keep-Alive</name>
      <t>The discussion in <xref section="10" sectionFormat="of" target="RFC7925"/> is applicable.</t>
    </section>
    <section anchor="timers-and-acks">
      <name>Timers and ACKs</name>
      <t>Compared to DTLS 1.2 timeout-based whole flight retransmission, DTLS 1.3 ACKs sensibly decrease the risk of congestion collapse which was the basis for the very conservative recommendations given in <xref section="11" sectionFormat="of" target="RFC7925"/>.</t>
      <t>The recommendations in <xref section="7.3" sectionFormat="of" target="RFC9147"/> regarding ACKs apply.
In particular,</t>
      <blockquote>
        <t>When DTLS 1.3 is used in deployments with lossy networks, such as low-power, long-range radio networks as well as low-power mesh networks, the use of ACKs is recommended.</t>
      </blockquote>
      <t>ACKs provide explicit feedback on which handshake messages have been received.
This enables endpoints to detect a lack of progress more quickly and to trigger selective or early retransmission, leading to more efficient use of bandwidth and memory.</t>
      <t>Due to the vast range of network technologies used in IoT deployments, from wired LAN to GSM-SMS, it's not possible to provide a universal recommendation for an initial timeout.
Therefore, it is RECOMMENDED that DTLS 1.3 implementations allow developers to explicitly set the initial timer value.
Developers SHOULD set the initial timeout to be twice the expected round-trip time (RTT),
but no less than 1000ms, which is a conservative default aligned with the guidance in
<xref section="11" sectionFormat="of" target="RFC7925"/>.
For specific application/network combinations, a sub-second initial timeout MAY be set.
In cases where no RTT estimates are available, a 1000ms initial timeout is suitable for the general Internet.</t>
      <t>Regarding the timers used by the Return Routability Check (RRC) functionality, the recommendations in <xref section="5.5" sectionFormat="of" target="I-D.ietf-tls-dtls-rrc"/> apply.
Just like the handshake initial timers, it is RECOMMENDED that DTLS 1.2 and 1.3 implementations offer an option for their developers to explicitly set the RRC timer.</t>
    </section>
    <section anchor="random-number-generation">
      <name> Random Number Generation</name>
      <t>The discussion in <xref section="12" sectionFormat="of" target="RFC7925"/> is applicable with one exception:
the ClientHello and the ServerHello messages in TLS 1.3 do not contain
gmt_unix_time component anymore.
For entropy generation and randomness considerations, implementers should also
consult <xref target="RFC8937"/>.</t>
    </section>
    <section anchor="sni">
      <name>Server Name Indication</name>
      <t>This specification mandates the implementation of the Server Name Indication (SNI)
extension. Where privacy requirements require it, the ECH (Encrypted Client Hello)
extension <xref target="I-D.ietf-tls-esni"/> prevents an on-path attacker to determine the domain
name the client is trying to connect to.</t>
      <t>Since the Encrypted Client Hello extension requires use of Hybrid Public Key
Encryption (HPKE) <xref target="RFC9180"/> and additional protocols require
further protocol exchanges and cryptographic operations, there is a certain
overhead associated with this privacy feature.</t>
      <t>Note that in industrial IoT deployments the use of ECH may be disabled because
network administrators inspect the SNI to detect malicious behaviour.</t>
      <t>Besides, to avoid leaking DNS lookups from network inspection altogether further
protocols are needed, including DNS-over-HTTPS (DoH) <xref target="RFC8484"/>,
DNS-over-TLS (DoT) <xref target="RFC7858"/> and DNS-over-QUIC (DoQ) <xref target="RFC9250"/>.</t>
      <t>Where IoT devices are accepting (D)TLS connections, i.e., they are acting as a
server, it is unlikely that there will be a useful name that can go into the
SNI. In general, the use of SNI for the purpose of virtual hosting on
constrained IoT devices is rare. The IoT device cannot depend on a client
providing a correct SNI, and so it MAY ignore the extension when SNI is not
used for virtual hosting. This implies that IoT devices cannot do name-based
virtual hosting of TLS connections. In the unlikely event that an IoT device
has multiple servers responding with different server certificates, the server
SHOULD use different IP addresses or port numbers.</t>
    </section>
    <section anchor="record_size_limit">
      <name> Maximum Fragment Length Negotiation</name>
      <t>The Maximum Fragment Length Negotiation (MFL) extension has been superseded by
the Record Size Limit (RSL) extension <xref target="RFC8449"/>. Implementations in
compliance with this specification MUST implement the RSL extension and SHOULD
use it to indicate their RAM limitations.</t>
    </section>
    <section anchor="crypto-agility">
      <name>Crypto Agility</name>
      <t>The recommendations in <xref section="19" sectionFormat="of" target="RFC7925"/> are applicable.</t>
    </section>
    <section anchor="key-length-recommendations">
      <name>Key Length Recommendations</name>
      <t>The recommendations in <xref section="20" sectionFormat="of" target="RFC7925"/> are applicable.</t>
    </section>
    <section anchor="rtt-data">
      <name>0-RTT Data</name>
      <t><xref section="E.5" sectionFormat="of" target="RFC8446"/> establishes that:</t>
      <blockquote>
        <t>Application protocols MUST NOT use 0-RTT data without a profile that
defines its use.  That profile needs to identify which messages or
interactions are safe to use with 0-RTT and how to handle the
situation when the server rejects 0-RTT and falls back to 1-RTT.</t>
      </blockquote>
      <t>For any application protocol, 0-RTT MUST NOT be used unless a protocol-specific
profile exists. At the time of writing, no such profile has been defined for
CoAP <xref target="CoAP"/>. Therefore, 0-RTT MUST NOT be used by CoAP applications.</t>
    </section>
    <section anchor="certificate_profile">
      <name>Certificate Profile</name>
      <t>This section contains updates and clarifications to the certificate profile
defined in <xref target="RFC7925"/>. The content of Table 1 of <xref target="RFC7925"/> has been
split by certificate "type" in order to clarify exactly what requirements and
recommendations apply to which entity in the PKI hierarchy.</t>
      <t>This profile does not define a specific certificate policy OID; deployments
MAY define one if needed for local policy enforcement.</t>
      <t>The terminology used in this section is not intended to restrict the scope of this profile to IEEE 802.1AR deployments.
It is used because it conveniently distinguishes between manufacturer-provisioned and operational credentials, which is important in many IoT deployments.</t>
      <t>A Device Identifier (DevID) consists of:</t>
      <ul spacing="compact">
        <li>
          <t>a private key,</t>
        </li>
        <li>
          <t>a certificate containing the public key and the identifier certified by the
certificate issuer, and</t>
        </li>
        <li>
          <t>a certificate chain leading up to a trust anchor (typically the root certificate).</t>
        </li>
      </ul>
      <t>The IEEE 802.1AR specification <xref target="IEEE-802.1AR"/> introduces the concept of DevIDs and
defines two specialized versions:</t>
      <ul spacing="compact">
        <li>
          <t>Initial Device Identifiers (IDevIDs): Provisioned during manufacturing to
provide a unique, stable identity for the lifetime of the device.</t>
        </li>
        <li>
          <t>Locally Significant Device Identifiers (LDevIDs): Provisioned after deployment
and typically used for operational purposes within a specific domain.</t>
        </li>
      </ul>
      <t>The IDevID is typically provisioned by a manufacturer and signed by the
manufacturer CA. It is then used to obtain operational certificates,
the LDevIDs, from the operator or owner of the device. Some protocols
also introduce an additional hierarchy with application instance
certificates, which are obtained for use with specific applications.</t>
      <t>IDevIDs are intended for device identity and initial onboarding or bootstrapping
protocols, such as the Bootstrapping Remote Secure Key Infrastructure (BRSKI)
protocol <xref target="RFC8995"/> or LwM2M Bootstrap <xref target="LwM2M-T"/> <xref target="LwM2M-C"/>. The use of
IDevIDs is intentionally limited to such onboarding scenarios even though they
often have a long lifetime, or do not expire at all.</t>
      <t>There are, however, multiple onboarding and bootstrapping approaches in use.
Some of them use TLS and therefore use the IDevID for client authentication,
while others, such as FIDO Device Onboarding (FDO) <xref target="FDO"/>, do not use TLS/DTLS
for client authentication. In many cases, the IDevID profile and content are
defined by those specifications. For these reasons, this specification focuses
on the description of operational certificates such as LDevIDs.</t>
      <t>This document uses the terminology and some of the rules for populating certificate
content defined in IEEE 802.1AR. However, this specification does not claim
conformance to IEEE 802.1AR, which is broader and mandates hardware, security,
and process requirements outside the constraints of many IoT deployments. This
profile borrows terminology and selected certificate fields from IEEE 802.1AR
but intentionally omits those broader requirements.</t>
      <section anchor="all-certificates">
        <name>All Certificates</name>
        <t>This section outlines the requirements for X.509 certificates that apply to all PKI entities.
These requirements apply to certificates issued within the IoT device PKI (i.e., root, subordinate and end entity certificates used to authenticate IoT devices), rather than to public WebPKI server certificates.
The section focuses on X.509 v3 certificates.</t>
        <section anchor="version">
          <name>Version</name>
          <t>Certificates MUST be of type X.509 v3.</t>
        </section>
        <section anchor="serial-number">
          <name>Serial Number</name>
          <t>The serial number MUST be unique
for each certificate issued by a given CA (i.e., the issuer name
and the serial number uniquely identify a certificate).
<xref target="RFC5280"/> limits this field to a maximum of 20 octets.
To reduce the risk of predictable serial numbers, CAs SHOULD generate
serial numbers of at least eight (8) octets using a
cryptographically secure pseudo-random number generator.</t>
        </section>
        <section anchor="signature">
          <name>Signature</name>
          <t>The signature MUST be ecdsa-with-SHA256 or stronger <xref target="RFC5758"/>.</t>
          <t>Note: In contrast to IEEE 802.1AR this specification does not require
end entity certificates, subordinate CA certificates, and CA
certificates to use the same signature algorithm. Furthermore,
this specification does not utilize RSA for use with constrained IoT
devices and networks.
For certificates expected to be validated by constrained IoT devices, CAs
SHOULD select signature algorithms supported by those devices to ensure
successful validation (e.g., ECDSA P-256). Different certificates in the same
chain MAY use different signature algorithms when the relying devices support
validation of the resulting chain.</t>
        </section>
        <section anchor="issuer">
          <name>Issuer</name>
          <t>The issuer field MUST contain a non-empty distinguished name (DN)
of the entity that has signed and issued the certificate in accordance
with <xref target="RFC5280"/>.</t>
        </section>
        <section anchor="validity">
          <name> Validity</name>
          <t>Vendors must determine the expected lifespan of their IoT devices. This
decision directly affects how long firmware and software updates are
provided for, as well as the level of maintenance that customers can expect.
It also affects the maximum validity period of certificates.
Constrained devices often lack precise UTC time; implementations SHOULD treat
time checks with coarse granularity (e.g., day- or hour-level) and ignore leap seconds
when validating notAfter.</t>
          <t>In many IoT deployments, IDevIDs are provisioned with an unlimited lifetime, as
described in <xref target="IEEE-802.1AR"/>. For this purpose, the special GeneralizedTime
value 99991231235959Z is used in the notAfter field, as described in
<xref section="4.1.2.5" sectionFormat="of" target="RFC5280"/>. However, the CA certificate and subordinate CA
certificates in the certification path may still have finite validity periods.
Careful consideration is therefore required before issuing IDevID certificates
with no maximum validity period, since an effectively unlimited certificate
lifetime is only useful if the relevant certification path remains usable for
the intended lifetime of the device.</t>
          <t>LDevID certificates are, however, issued by the operator or owner,
and may be renewed at a regular interval using protocols, such
as Enrollment over Secure Transport (EST) <xref target="RFC7030"/> or
Certificate Management Protocol (CMP) <xref target="RFC9810"/> <xref target="RFC9483"/>.
It is therefore RECOMMENDED to limit the lifetime of these LDevID certificates
using the notBefore and notAfter fields, as described in <xref section="4.1.2.5" sectionFormat="of" target="RFC5280"/>. Values MUST be expressed in Greenwich Mean Time (Zulu) and
MUST include seconds even where the number of seconds is zero.</t>
          <t>Note that the validity period is defined as the period of time from notBefore
through notAfter, inclusive. This means that a hypothetical certificate with a
notBefore date of 9 June 2021 at 03:42:01 and a notAfter date of 7 September
2021 at 03:42:01 becomes valid at the beginning of the :01 second, and only
becomes invalid at the :02 second, a period that is 90 days plus 1 second. So
for a 90-day, notAfter must actually be 03:42:00.</t>
          <t>For devices without a reliable source of time we advise the use of a device
management solution, which typically includes a certificate management protocol,
to manage the lifetime of all the certificates used by the device. While this
approach does not utilize certificates to its widest extent, it is a solution
that extends the capabilities offered by a raw public key approach.</t>
        </section>
        <section anchor="subject-public-key-info">
          <name> Subject Public Key Info</name>
          <t>The subjectPublicKeyInfo field indicates the algorithm and any associated
parameters for the ECC public key. This profile uses the id-ecPublicKey
algorithm identifier for ECDSA signature keys, as defined and specified in
<xref target="RFC5480"/>. This specification assumes that devices support one of the
following algorithms:</t>
          <ul spacing="compact">
            <li>
              <t>id-ecPublicKey with secp256r1,</t>
            </li>
            <li>
              <t>id-ecPublicKey with secp384r1, and</t>
            </li>
            <li>
              <t>id-ecPublicKey with secp521r1.</t>
            </li>
          </ul>
          <t>There is no requirement to use CA certificates and certificates of
subordinate CAs to use the same algorithm as the end entity certificate.
Certificates with longer lifetime may well use a cryptographically stronger
algorithm. However, CAs (or their administrators) that issue certificates
intended to be validated by constrained IoT devices SHOULD select algorithms
supported by those devices to ensure successful validation. Longer-lived CA
certificates MAY intentionally use stronger or different algorithms if the
target devices are expected to validate such chains successfully.</t>
        </section>
        <section anchor="certificate-revocation-checks">
          <name>Certificate Revocation Checks</name>
          <t>Constrained IoT devices often cannot perform OCSP or CRL checks themselves.
Instead, deployments typically rely on short-lived certificates, certificate management protocols and operator intervention to manage certificate replacement and revocation-related events.</t>
          <t>The Certificate Revocation Lists (CRLs) distribution points extension has
been defined in RFC 5280 to identify how CRL information is obtained. The
Authority Information Access (AIA) extension indicates where to find additional
information about the CA, such as how to access information
like the online certificate status service (OCSP) or a CA issuer
certificate. Therefore, CRL distribution points and AIA
for OCSP SHOULD NOT be set in IoT device certificates; if set, they MUST NOT
be marked critical. AIA MAY be used solely for caIssuer to enable chain
fetching by peers that have sufficient resources.</t>
          <t>Instead of using CRLs or OCSP this document follows the guidance in
<xref section="4.4.3" sectionFormat="of" target="RFC7925"/>: for certificate revocation, neither
OCSP nor CRL are used by constrained IoT devices.
This text refers to OCSP/CRL checks during the handshake; continuous
certificate validity checks are out of scope and left to application policy.</t>
          <t>Device management protocols often include onboarding or bootstrapping support
and allow certificates to be distributed and updated on demand. An example is
the Lightweight Machine-to-Machine (LwM2M) <xref target="LwM2M-T"/> <xref target="LwM2M-C"/> protocol.
These protocols enable deployment models that use shorter-lived end entity
certificates, making OCSP and CRLs less relevant.</t>
          <t>Certificate updates do not affect existing TLS sessions; re-authentication or
session re-establishment is an application policy decision. This is
particularly important for long-lived TLS connections. TLS 1.3 provides
client-to-server post-handshake authentication only. Mutual authentication via
post-handshake messages is available by use of the "Exported Authenticator"
<xref target="RFC9261"/> but requires the application layer protocol to carry the
payloads.
If continuous validation is required, the application must trigger
re-authentication or re-establish a new TLS session; TLS alone does not
mandate continuous checks.</t>
          <t>Hence, instead of performing certificate revocation checks on the IoT device
itself this it is RECOMMENDED to delegate this task to the IoT device
operator and to take the necessary action to allow IoT devices to remain
operational.</t>
        </section>
      </section>
      <section anchor="root-ca-certificate">
        <name>Root CA Certificate</name>
        <t>This section outlines the requirements for root CA certificates.</t>
        <section anchor="subject">
          <name>Subject</name>
          <t><xref target="RFC5280"/> mandates that Root CA certificates MUST have a non-empty subject field. The subject field MUST contain the commonName, the organizationName, and the countryName attribute and MAY contain an organizationalUnitName attribute.
If a subjectAltName extension is present, it SHOULD be set to a value
consistent with the subject and SHOULD NOT be marked critical.</t>
        </section>
        <section anchor="authority-key-identifier">
          <name>Authority Key Identifier</name>
          <t><xref section="4.2.1.1" sectionFormat="of" target="RFC5280"/> defines the Authority Key Identifier as follows:
"The authority key identifier extension provides a means of identifying the
public key corresponding to the private key used to sign a certificate. This
extension is used where an issuer has multiple signing keys."</t>
          <t>The Authority Key Identifier extension SHOULD be set to aid path construction.
If it is set, it MUST NOT be marked critical, and MUST contain the
subjectKeyIdentifier of this certificate.</t>
        </section>
        <section anchor="subject-key-identifier">
          <name>Subject Key Identifier</name>
          <t><xref section="4.2.1.2" sectionFormat="of" target="RFC5280"/> defines the SubjectKeyIdentifier as follows:
"The subject key identifier extension provides a means of identifying
certificates that contain a particular public key."</t>
          <t>The Subject Key Identifier extension MUST be set, MUST NOT be marked critical,
and MUST contain the key identifier of the public key contained in the subject
public key info field.</t>
          <t>The subjectKeyIdentifier is used by path construction algorithms to identify which CA has signed a subordinate certificate.</t>
        </section>
        <section anchor="key-usage">
          <name>Key Usage</name>
          <t><xref target="RFC5280"/> defines the key usage field as follows: "The key usage extension defines
the purpose (e.g., encipherment, signature, certificate signing) of the key contained
in the certificate."</t>
          <t>The Key Usage extension SHOULD be set; if it is set, it MUST be marked
critical, and the keyCertSign purpose MUST be set. If the Root CA issues CRLs,
the cRLSign purpose MUST also be set. Additional key usages MAY be set
depending on the intended usage of the public key. The digitalSignature purpose
is not required for a Root CA certificate.</t>
          <t><xref target="RFC5280"/> defines the extended key usage as follows: "This extension indicates
one or more purposes for which the certified public key may be used, in addition to
or in place of the basic purposes indicated in the key usage extension."</t>
          <t>This extendedKeyUsage extension MUST NOT be set in CA certificates.</t>
        </section>
        <section anchor="basic-constraints">
          <name>Basic Constraints</name>
          <t><xref target="RFC5280"/> states that "The Basic Constraints extension identifies whether the subject
of the certificate is a CA and the maximum depth of valid certification paths that include
this certificate. The cA boolean indicates whether the certified public key may be used to
verify certificate signatures."</t>
          <t>For the pathLenConstraint RFC 5280 makes further statements:</t>
          <ul spacing="compact">
            <li>
              <t>"The pathLenConstraint field is meaningful only if the cA boolean is asserted and the
key usage extension, if present, asserts the keyCertSign bit. In this case, it gives the
maximum number of non-self-issued intermediate certificates that may follow this
certificate in a valid certification path."</t>
            </li>
            <li>
              <t>"A pathLenConstraint of zero indicates that no non-self-issued intermediate CA
certificates may follow in a valid certification path."</t>
            </li>
            <li>
              <t>"Where pathLenConstraint does not appear, no limit is imposed."</t>
            </li>
            <li>
              <t>"Conforming CAs MUST include this extension in all CA certificates that contain public
keys used to validate digital signatures on certificates and MUST mark the extension as
critical in such certificates."</t>
            </li>
          </ul>
          <t>The Basic Constraints extension MUST be set, MUST be marked critical, the cA flag MUST
be set to true and the pathLenConstraint MUST be omitted.</t>
          <t>Omitting pathLenConstraint follows common root CA practice but is not meant to
encourage arbitrarily deep certification hierarchies in IoT deployments.
Shallow hierarchies remain preferable for constrained devices.</t>
        </section>
      </section>
      <section anchor="subordinate-ca-certificate">
        <name>Subordinate CA Certificate</name>
        <t>This section outlines the requirements for subordinate CA certificates.</t>
        <section anchor="subject-1">
          <name>Subject</name>
          <t>The subject field MUST be set and MUST contain the commonName, the organizationName,
and the countryName attribute and MAY contain an organizationalUnitName attribute.</t>
        </section>
        <section anchor="authority-key-identifier-1">
          <name>Authority Key Identifier</name>
          <t>The Authority Key Identifier extension MUST be set, MUST NOT be marked critical, and
MUST contain the subjectKeyIdentifier of the CA that issued this certificate.</t>
        </section>
        <section anchor="subject-key-identifier-1">
          <name>Subject Key Identifier</name>
          <t>The Subject Key Identifier extension MUST be set, MUST NOT be marked critical, and MUST
contain the key identifier of the public key contained in the subject public key info
field.</t>
        </section>
        <section anchor="key-usage-1">
          <name>Key Usage</name>
          <t>The Key Usage extension MUST be set, MUST be marked critical, the keyCertSign or
cRLSign purposes MUST be set, and the digitalSignature purpose SHOULD be set.</t>
          <t>Subordinate certification authorities SHOULD NOT have any extendedKeyUsage.
<xref target="RFC5280"/> reserves EKUs to be meaningful only in end entity certificates.</t>
        </section>
        <section anchor="basic-constraints-1">
          <name>Basic Constraints</name>
          <t>The Basic Constraints extension MUST be set, MUST be marked critical, the cA flag
MUST be set to true and the pathLenConstraint SHOULD be omitted.</t>
        </section>
        <section anchor="crl-distribution-point">
          <name>CRL Distribution Point</name>
          <t>The CRL Distribution Point extension SHOULD NOT be set. If it is set, it MUST NOT
be marked critical and MUST identify the CRL relevant for this certificate.</t>
        </section>
        <section anchor="authority-information-access">
          <name>Authority Information Access</name>
          <t>The Authority Information Access (AIA) extension SHOULD NOT be set. If it is set, it MUST
NOT be marked critical and MUST identify the location of the certificate of the CA
that issued this certificate and the location it provides an online certificate
status service (OCSP).</t>
        </section>
      </section>
      <section anchor="end-entity-certificate">
        <name>End Entity Certificate</name>
        <t>This section outlines the requirements for end entity certificates.</t>
        <section anchor="subject-2">
          <name>Subject</name>
          <t>This section describes the use of end entity certificate primarily for (D)TLS
clients running on IoT devices. Operating (D)TLS servers on IoT devices is
possible but less common.</t>
          <t><xref section="2" sectionFormat="comma" target="RFC9525"/> mandates that the subject field not be used to identify a service.
However, certain IoT applications (for example, <xref target="I-D.ietf-anima-constrained-voucher"/>,
<xref target="IEEE-802.1AR"/>) use the subject field to encode the device serial number.</t>
          <t>The requirement in <xref section="4.4.2" sectionFormat="of" target="RFC7925"/> to only use EUI-64 for end
entity certificates as a subject field is lifted.</t>
          <t>Two fields are typically used to encode a device identifier, namely the
Subject and the subjectAltName fields. Protocol specifications tend to offer
recommendations about what identifiers to use and the deployment situation is
fragmented.</t>
          <t>The subject field MAY include a unique device serial number. If a serial
number is included in the Subject DN, it MUST be encoded in the
X520SerialNumber attribute. If the serial number is used as an identifier,
it SHOULD also be placed in the subjectAltName (e.g., as a URI).
e.g., <xref target="RFC8995"/> use requires a serial number in IDevID certificates.</t>
          <t><xref target="RFC5280"/> defines: "The subject alternative name extension allows identities
to be bound to the subject of the certificate. These identities may be included
in addition to or in place of the identity in the subject field of the certificate."</t>
          <t>The subject alternative name extension MAY be set. If it is set, it MUST NOT be
marked critical, except when the subject DN contains an empty sequence.</t>
          <t>If the EUI-64 format is used to identify the subject of an end entity
certificate, it MUST be encoded as a Subject DN using the X520SerialNumber
attribute.  The contents of the field is a string of the form <tt>HH-HH-HH-HH-HH-HH-HH-HH</tt>
where 'H' is one of the symbols '0'-'9' or 'A'-'F'.</t>
          <t>Per <xref target="RFC9525"/> domain names MUST NOT be encoded in the subject commonName. Instead they
MUST be encoded in a subjectAltName of type DNS-ID. Domain names MUST NOT
contain wildcard (<tt>*</tt>) characters. The subjectAltName MUST NOT contain multiple
names.</t>
          <t>Note: The IEEE 802.1AR recommends to encode information about a Trusted
Platform Module (TPM), if present, in the HardwareModuleName (<xref section="5" sectionFormat="of" target="RFC4108"/>). This
specification does not follow this recommendation.</t>
        </section>
        <section anchor="authority-key-identifier-2">
          <name>Authority Key Identifier</name>
          <t>The Authority Key Identifier extension MUST be set, MUST NOT be marked critical,
and MUST contain the subjectKeyIdentifier of the CA that issued this certificate.</t>
        </section>
        <section anchor="subject-key-identifier-2">
          <name>Subject Key Identifier</name>
          <t>The Subject Key Identifier MUST NOT be included in end entity certificates, as it can be calculated from the public key, so it just takes up space.
End entity certificates are not used in path construction, so there is no ambiguity regarding which certificate chain to use, as there can be with subordinate CAs.</t>
        </section>
        <section anchor="key-usage-2">
          <name>Key Usage</name>
          <t>The key usage extension MUST be set and MUST be marked as critical. For
signature verification keys the digitialSignature key usage purpose MUST
be specified. Other key usages are set according to the intended usage
of the key.</t>
          <t>As specified in <xref target="IEEE-802.1AR"/>, the extendedKeyUsage SHOULD NOT be present in
IDevID certificates, as it reduces the utility of the IDevID.
For locally assigned LDevID certificates to be usable with TLS,
the extendedKeyUsage MUST contain at least one of the following:
id-kp-serverAuth or id-kp-clientAuth. The selected EKUs MUST match the
intended TLS role of the device or service using the certificate.</t>
        </section>
      </section>
    </section>
    <section anchor="update-of-trust-anchors">
      <name>Update of Trust Anchors</name>
      <t>Since the publication of RFC 7925 the need for firmware update mechanisms
has been reinforced and the work on standardizing a secure and
interoperable firmware update mechanism has made substantial progress,
see <xref target="RFC9019"/>. RFC 7925 recommends to use a software / firmware update
mechanism to provision devices with new trust anchors. This approach only
addresses the distribution of trust anchors and not end entity certificates
or certificates of subordinate CAs.</t>
      <t>As an alternative, certificate management protocols like CMP and EST
have also offered ways to update trust anchors. See, for example,
<xref section="2.1" sectionFormat="of" target="RFC7030"/> for an approach to obtaining CA certificates
via EST.</t>
    </section>
    <section anchor="certificate-overhead">
      <name>Certificate Overhead</name>
      <t>In a public key-based key exchange, certificates and public keys are a major
contributor to the size of the overall handshake. For example, in a regular TLS
1.3 handshake with minimal ECC certificates and no subordinate CA utilizing
the secp256r1 curve with mutual authentication, around 40% of the entire
handshake payload is consumed by the two exchanged certificates.</t>
      <t>Hence, it is not surprising that there is a strong desire to reduce the size of
certificates and certificate chains. This has led to various standardization
efforts. Below is a brief summary of what options an implementer has to reduce
the bandwidth requirements of a public key-based key exchange. Note that many
of the standardized extensions are not readily available in TLS/DTLS stacks since
optimizations typically get implemented last.</t>
      <ul spacing="compact">
        <li>
          <t>Use elliptic curve cryptography (ECC) instead of RSA-based certificate due to
the smaller certificate size. This document recommends the use of elliptic
curve cryptography only.</t>
        </li>
        <li>
          <t>Avoid deep and complex CA hierarchies to reduce the number of subordinate CA
certificates that need to be transmitted and processed. See
<xref target="I-D.irtf-t2trg-taxonomy-manufacturer-anchors"/> for a discussion about CA
hierarchies.
Most security requirements can be satisfied with a PKI depth of 3 (root CA, one subordinate CA, and end entity certificates).</t>
        </li>
        <li>
          <t>Pay attention to the amount of information conveyed inside certificates.</t>
        </li>
        <li>
          <t>Use session resumption to reduce the number of times a full handshake is
needed.  Use Connection IDs <xref target="RFC9146"/>, when possible, to enable
long-lasting connections.</t>
        </li>
        <li>
          <t>Use the TLS cached info <xref target="RFC7924"/> extension to avoid sending certificates
with every full handshake.</t>
        </li>
        <li>
          <t>Use client certificate URLs <xref section="5" sectionFormat="of" target="RFC6066"/> instead of full certificates for
clients. When applications perform TLS client authentication via
DNS-Based Authentication of Named Entities (DANE) TLSA records then the
<xref target="I-D.ietf-dance-tls-clientid"/> specification may be used to reduce the
packets on the wire. Note: The term "TLSA" does not stand for anything;
it is just the name of the RRtype, as explained in <xref target="RFC6698"/>.</t>
        </li>
        <li>
          <t>Use certificate compression as defined in
<xref target="RFC8879"/>.</t>
        </li>
        <li>
          <t>Use alternative certificate formats, where possible, such as raw public keys
<xref target="RFC7250"/> or CBOR-encoded certificates
<xref target="I-D.ietf-cose-cbor-encoded-cert"/>.</t>
        </li>
      </ul>
      <t>The use of certificate handles is a form of caching or compressing
certificates as well.</t>
      <t>Although the TLS specification does not explicitly prohibit a server from
including trust anchors in the Certificate message - and some implementations
do - trust anchors SHOULD NOT be transmitted in this way. Trust anchors are
intended to be provisioned through out-of-band mechanisms, and any trust anchor
included in the TLS Certificate message cannot be assumed trustworthy by the client.
Including them therefore serves no functional purpose and unnecessarily consumes
bandwidth.</t>
      <t>However, due to limited or asymmetric knowledge between client and server, omitting
trust anchors entirely is not always straightforward. Several scenarios highlight
this challenge:</t>
      <ul spacing="compact">
        <li>
          <t>Pinned Server Certificates: In many device-to-cloud deployments (see <xref section="2.2" sectionFormat="of" target="RFC7452"/>),
clients pin a specific server certificate. If the client has pinned the server
certificate, retransmitting it is unnecessary - but the server cannot reliably
determine this.</t>
        </li>
        <li>
          <t>Root Key Transitions: During root key rollover events (see <xref section="4.4" sectionFormat="of" target="RFC9810"/>),
new trust anchors may not yet be fully distributed across all devices. This is especially
relevant in device-to-device communication <xref section="2.1" sectionFormat="of" target="RFC7452"/>), where server roles
are determined dynamically and trust anchor distribution may be inconsistent.</t>
        </li>
        <li>
          <t>Non-Root Trust Anchors: In some deployments, the client's trust anchor may be an
intermediate CA rather than a root certificate. The server, lacking knowledge of the
client's trust store, cannot always select a certificate chain that aligns with the
client's trust anchor. To mitigate this, the client MAY include the Trusted CA Indication
extension (see <xref section="6" sectionFormat="of" target="RFC6066"/>) in its ClientHello to signal the set of trust
anchors it supports.</t>
        </li>
      </ul>
      <t><xref target="RFC9810"/> assumes the presence of a shared directory service for certificate retrieval.
In constrained or isolated IoT environments, this assumption does not hold. Trust anchors
are often distributed via firmware updates or fetched periodically using certificate
management protocols, such as EST (e.g., the /cacerts endpoint).</t>
      <t>To support transitional trust states during trust anchor updates, devices MUST handle both:</t>
      <ul spacing="compact">
        <li>
          <t>newWithOld: a certificate where the new trust anchor is signed by the old one, enabling
communication with peers that have not yet received the update.</t>
        </li>
        <li>
          <t>oldWithNew: a certificate where the old trust anchor is signed by the new one, enabling
verification of peers that still rely on the older anchor.</t>
        </li>
      </ul>
      <t>These certificates may be presented as an unordered set, and devices may not be able to
distinguish their roles without additional metadata.</t>
      <t>A complication arises when the client's trust anchor is not a widely trusted root
CA. In that case, the server cannot determine in advance which trust anchors the
client has. To address this, the client MAY include the Trusted CA Indication
extension <xref target="RFC6066"/> in its ClientHello to signal the set of trust anchors it
supports, allowing the server to select an appropriate certificate chain.</t>
      <t>Whether to utilize any of the above extensions or a combination of them depends
on the anticipated deployment environment, the availability of code, and the
constraints imposed by already deployed infrastructure (e.g., CA
infrastructure, tool support).</t>
    </section>
    <section anchor="ciphersuites">
      <name>Ciphersuites</name>
      <t>According to <xref section="4.5.3" sectionFormat="of" target="RFC9147"/>, the use of AES-CCM with 8-octet
authentication tags (CCM_8) is considered unsuitable for general use with DTLS.
This is because it has low integrity limits (i.e., high sensitivity to
forgeries) which makes endpoints that negotiate ciphersuites based on such AEAD
vulnerable to a trivial DoS attack. See also Sections <xref target="I-D.irtf-cfrg-aead-limits" section="5.3" sectionFormat="bare"/> and <xref target="I-D.irtf-cfrg-aead-limits" section="5.4" sectionFormat="bare"/> of <xref target="I-D.irtf-cfrg-aead-limits"/> for further discussion on this topic, as well as
references to the analysis supporting these conclusions.</t>
      <t>Specifically, <xref target="RFC9147"/> warns that:</t>
      <blockquote>
        <t>TLS_AES_128_CCM_8_SHA256 MUST NOT be used in DTLS without additional
safeguards against forgery. Implementations MUST set usage limits for
AEAD_AES_128_CCM_8 based on an understanding of any additional forgery
protections that are used.</t>
      </blockquote>
      <t>Since all the ciphersuites required by <xref target="RFC7925"/> and <xref target="CoAP"/> rely on CCM_8,
there is no alternate ciphersuite available for applications that aim to
eliminate the security and availability threats related to CCM_8 while retaining
interoperability with the larger ecosystem.</t>
      <t>In order to ameliorate the situation, it is RECOMMENDED that
implementations support the following two ciphersuites for TLS 1.3:</t>
      <ul spacing="compact">
        <li>
          <t><tt>TLS_AES_128_GCM_SHA256</tt></t>
        </li>
        <li>
          <t><tt>TLS_AES_128_CCM</tt></t>
        </li>
      </ul>
      <t>and offer them as their first choice.  These ciphersuites provide
confidentiality and integrity limits that are considered acceptable in the most
general settings.  For the details on the exact bounds of both ciphersuites see
<xref section="4.5.3" sectionFormat="of" target="RFC9147"/>.  Note that the GCM-based ciphersuite offers
superior interoperability with cloud services at the cost of a slight increase
in the wire and peak RAM footprints.</t>
      <t>TLS 1.3 enforces deterministic nonce generation for all AEAD cipher suites.
However, this is not the case for TLS 1.2.
Therefore, when using the GCM-based cipher suite with TLS 1.2, the recommendations in <xref section="7.2.1" sectionFormat="of" target="RFC9325"/> relating to deterministic nonce generation apply.
In addition, the integrity limits on key usage detailed in <xref section="4.4" sectionFormat="of" target="RFC9325"/> also apply.</t>
      <t><xref target="tab-cipher-reqs"/> summarizes the recommendations regarding ciphersuites:</t>
      <table align="left" anchor="tab-cipher-reqs">
        <name>TLS 1.3 Ciphersuite Requirements</name>
        <thead>
          <tr>
            <th align="left">Ciphersuite</th>
            <th align="left">MTI Requirement</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">
              <tt>TLS_AES_128_CCM_8_SHA256</tt></td>
            <td align="left">MUST-</td>
          </tr>
          <tr>
            <td align="left">
              <tt>TLS_AES_128_CCM</tt></td>
            <td align="left">SHOULD+</td>
          </tr>
          <tr>
            <td align="left">
              <tt>TLS_AES_128_GCM_SHA256</tt></td>
            <td align="left">SHOULD+</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="fault-attacks-on-deterministic-signature-schemes">
      <name>Fault Attacks on Deterministic Signature Schemes</name>
      <t>A number of passive side-channel attacks as well as active fault-injection
attacks (e.g., <xref target="Ambrose2017"/>) have been demonstrated to be successful in allowing a malicious
third party to gain information about the signing key if a fully deterministic
signature scheme (e.g., ECDSA <xref target="RFC6979"/> or EdDSA <xref target="RFC8032"/>) is used.</t>
      <t>Most of these attacks assume physical access to the device and are therefore
especially relevant to smart cards as well as IoT deployments with poor or
non-existent physical security.</t>
      <t>In this security model, it is recommended to combine both randomness and
determinism, for example, as described in
<xref target="I-D.irtf-cfrg-det-sigs-with-noise"/>.</t>
    </section>
    <section anchor="post-quantum-cryptography-pqc-considerations">
      <name>Post-Quantum Cryptography (PQC) Considerations</name>
      <t>This section is informational and provides deployment guidance only; it does
not add normative requirements to this profile.</t>
      <t>The recommendations and ciphersuites in this profile are based on classical
cryptography and are not quantum-resistant.</t>
      <t>As detailed in <xref target="I-D.ietf-pquip-pqc-engineers"/>, the IETF is actively working to address the challenges of adopting PQC in various protocols, including TLS. The document highlights key aspects engineers must consider, such as algorithm selection, performance impacts, and deployment strategies. It emphasizes the importance of gradual integration of PQC to ensure secure communication while accounting for the increased computational, memory, and bandwidth requirements of PQC algorithms. These challenges are especially relevant in the context of IoT, where device constraints limit the adoption of larger key sizes and more complex cryptographic operations <xref target="PQC-PERF"/>. Besides, any choice need to careful evaluate the associated energy requirements <xref target="PQC-ENERGY"/>.</t>
      <t>The work of incorporating PQC into TLS <xref target="I-D.ietf-uta-pqc-app"/> <xref target="I-D.ietf-pquip-pqc-hsm-constrained"/> is still ongoing, with key exchange message sizes increasing due to larger public keys. These larger keys demand more flash storage and higher RAM usage, presenting significant obstacles for resource-constrained IoT devices. The transition from classical cryptographic algorithms to PQC will be a significant challenge for constrained IoT devices, requiring careful planning to select hardware suitable for the task considering the lifetime of an IoT product.</t>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>The privacy considerations in <xref section="22" sectionFormat="of" target="RFC7925"/> largely continue to
apply. However, compared to TLS 1.2 and DTLS 1.2, TLS 1.3 and DTLS 1.3 encrypt
a larger portion of the handshake, which reduces the amount of identity and
credential metadata observable on the wire by passive attackers. Extensions,
such as the encrypted ClientHello, further increase privacy protection.</t>
      <t>Certificate fields can expose stable device identifiers and other metadata.
In particular, IDevIDs and LDevIDs may reveal manufacturer identity, device
serial numbers, or other information to peers. Protection against passive
observers is, however, substantially improved since certificates are not
transmitted in the clear in TLS 1.3 and DTLS 1.3.</t>
      <t>Some deployments use the mechanisms discussed in the Certificate Overhead section,
such as certificate URLs or external certificate retrieval, instead of always
transmitting full certificates in the handshake. In these cases, the privacy
properties differ because stable identifiers may be exposed to retrieval
services, directories, or to observers of those retrieval transactions.</t>
      <t>Where privacy is a deployment requirement, implementations and PKI profiles
should include only the minimum identity information needed for authorization
and interoperability.</t>
      <t>When Connection IDs are used with DTLS 1.3, CID negotiation in post-handshake
messages is encrypted and integrity protected. In addition, record sequence
numbers are encrypted. Compared to DTLS 1.2 CID, this makes tracking by on-path
adversaries more difficult and improves privacy in multi-home and mobile
deployments (<xref section="11" sectionFormat="of" target="RFC9147"/>).</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This entire document is about security.
One specific trade-off concerns root certificates that are either very long-lived or never expire.
While they can reduce maintenance pressure in long-lived IoT deployments, they also increase the consequences of key compromise, policy errors and inadequate rollover planning.
Furthermore, they can make cryptographic transitions more operationally expensive.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document makes no requests to IANA.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9147">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8221">
          <front>
            <title>Cryptographic Algorithm Implementation Requirements and Usage Guidance for Encapsulating Security Payload (ESP) and Authentication Header (AH)</title>
            <author fullname="P. Wouters" initials="P." surname="Wouters"/>
            <author fullname="D. Migault" initials="D." surname="Migault"/>
            <author fullname="J. Mattsson" initials="J." surname="Mattsson"/>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <date month="October" year="2017"/>
            <abstract>
              <t>This document replaces RFC 7321, "Cryptographic Algorithm Implementation Requirements and Usage Guidance for Encapsulating Security Payload (ESP) and Authentication Header (AH)". The goal of this document is to enable ESP and AH to benefit from cryptography that is up to date while making IPsec interoperable.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8221"/>
          <seriesInfo name="DOI" value="10.17487/RFC8221"/>
        </reference>
        <reference anchor="RFC9258">
          <front>
            <title>Importing External Pre-Shared Keys (PSKs) for TLS 1.3</title>
            <author fullname="D. Benjamin" initials="D." surname="Benjamin"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <date month="July" year="2022"/>
            <abstract>
              <t>This document describes an interface for importing external Pre-Shared Keys (PSKs) into TLS 1.3.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9258"/>
          <seriesInfo name="DOI" value="10.17487/RFC9258"/>
        </reference>
        <reference anchor="RFC9325">
          <front>
            <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="November" year="2022"/>
            <abstract>
              <t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are used to protect data exchanged over a wide range of application protocols and can also form the basis for secure transport protocols. Over the years, the industry has witnessed several serious attacks on TLS and DTLS, including attacks on the most commonly used cipher suites and their modes of operation. This document provides the latest recommendations for ensuring the security of deployed services that use TLS and DTLS. These recommendations are applicable to the majority of use cases.</t>
              <t>RFC 7525, an earlier version of the TLS recommendations, was published when the industry was transitioning to TLS 1.2. Years later, this transition is largely complete, and TLS 1.3 is widely available. This document updates the guidance given the new environment and obsoletes RFC 7525. In addition, this document updates RFCs 5288 and 6066 in view of recent attacks.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="195"/>
          <seriesInfo name="RFC" value="9325"/>
          <seriesInfo name="DOI" value="10.17487/RFC9325"/>
        </reference>
        <reference anchor="RFC7925">
          <front>
            <title>Transport Layer Security (TLS) / Datagram Transport Layer Security (DTLS) Profiles for the Internet of Things</title>
            <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>A common design pattern in Internet of Things (IoT) deployments is the use of a constrained device that collects data via sensors or controls actuators for use in home automation, industrial control systems, smart cities, and other IoT deployments.</t>
              <t>This document defines a Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) 1.2 profile that offers communications security for this data exchange thereby preventing eavesdropping, tampering, and message forgery. The lack of communication security is a common vulnerability in IoT products that can easily be solved by using these well-researched and widely deployed Internet security protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7925"/>
          <seriesInfo name="DOI" value="10.17487/RFC7925"/>
        </reference>
        <reference anchor="I-D.ietf-tls-dtls-rrc">
          <front>
            <title>Return Routability Check for DTLS 1.2 and DTLS 1.3</title>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
            </author>
            <author fullname="Achim Kraus" initials="A." surname="Kraus">
         </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <date day="14" month="July" year="2025"/>
            <abstract>
              <t>   This document specifies a return routability check for use in context
   of the Connection ID (CID) construct for the Datagram Transport Layer
   Security (DTLS) protocol versions 1.2 and 1.3.

   Implementations offering the CID functionality described in RFC 9146
   and RFC 9147 are encouraged to also provide the return routability
   check functionality described in this document.  For this reason,
   this document updates RFC 9146 and RFC 9147.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-dtls-rrc-20"/>
        </reference>
        <reference anchor="RFC8449">
          <front>
            <title>Record Size Limit Extension for TLS</title>
            <author fullname="M. Thomson" initials="M." surname="Thomson"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>An extension to Transport Layer Security (TLS) is defined that allows endpoints to negotiate the maximum size of protected records that each will send the other.</t>
              <t>This replaces the maximum fragment length extension defined in RFC 6066.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8449"/>
          <seriesInfo name="DOI" value="10.17487/RFC8449"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC5758">
          <front>
            <title>Internet X.509 Public Key Infrastructure: Additional Algorithms and Identifiers for DSA and ECDSA</title>
            <author fullname="Q. Dang" initials="Q." surname="Dang"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="K. Moriarty" initials="K." surname="Moriarty"/>
            <author fullname="D. Brown" initials="D." surname="Brown"/>
            <author fullname="T. Polk" initials="T." surname="Polk"/>
            <date month="January" year="2010"/>
            <abstract>
              <t>This document updates RFC 3279 to specify algorithm identifiers and ASN.1 encoding rules for the Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA) digital signatures when using SHA-224, SHA-256, SHA-384, or SHA-512 as the hashing algorithm. This specification applies to the Internet X.509 Public Key infrastructure (PKI) when digital signatures are used to sign certificates and certificate revocation lists (CRLs). This document also identifies all four SHA2 hash algorithms for use in the Internet X.509 PKI. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5758"/>
          <seriesInfo name="DOI" value="10.17487/RFC5758"/>
        </reference>
        <reference anchor="RFC5480">
          <front>
            <title>Elliptic Curve Cryptography Subject Public Key Information</title>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <author fullname="D. Brown" initials="D." surname="Brown"/>
            <author fullname="K. Yiu" initials="K." surname="Yiu"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="T. Polk" initials="T." surname="Polk"/>
            <date month="March" year="2009"/>
            <abstract>
              <t>This document specifies the syntax and semantics for the Subject Public Key Information field in certificates that support Elliptic Curve Cryptography. This document updates Sections 2.3.5 and 5, and the ASN.1 module of "Algorithms and Identifiers for the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile", RFC 3279. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5480"/>
          <seriesInfo name="DOI" value="10.17487/RFC5480"/>
        </reference>
        <reference anchor="RFC9525">
          <front>
            <title>Service Identity in TLS</title>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <author fullname="R. Salz" initials="R." surname="Salz"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>Many application technologies enable secure communication between two entities by means of Transport Layer Security (TLS) with Internet Public Key Infrastructure using X.509 (PKIX) certificates. This document specifies procedures for representing and verifying the identity of application services in such interactions.</t>
              <t>This document obsoletes RFC 6125.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9525"/>
          <seriesInfo name="DOI" value="10.17487/RFC9525"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9146">
          <front>
            <title>Connection Identifier for DTLS 1.2</title>
            <author fullname="E. Rescorla" initials="E." role="editor" surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <author fullname="A. Kraus" initials="A." surname="Kraus"/>
            <date month="March" year="2022"/>
            <abstract>
              <t>This document specifies the Connection ID (CID) construct for the Datagram Transport Layer Security (DTLS) protocol version 1.2.</t>
              <t>A CID is an identifier carried in the record layer header that gives the recipient additional information for selecting the appropriate security association. In "classical" DTLS, selecting a security association of an incoming DTLS record is accomplished with the help of the 5-tuple. If the source IP address and/or source port changes during the lifetime of an ongoing DTLS session, then the receiver will be unable to locate the correct security context.</t>
              <t>The new ciphertext record format with the CID also provides content type encryption and record layer padding.</t>
              <t>This document updates RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9146"/>
          <seriesInfo name="DOI" value="10.17487/RFC9146"/>
        </reference>
        <reference anchor="RFC7228">
          <front>
            <title>Terminology for Constrained-Node Networks</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="M. Ersue" initials="M." surname="Ersue"/>
            <author fullname="A. Keranen" initials="A." surname="Keranen"/>
            <date month="May" year="2014"/>
            <abstract>
              <t>The Internet Protocol Suite is increasingly used on small devices with severe constraints on power, memory, and processing resources, creating constrained-node networks. This document provides a number of basic terms that have been useful in the standardization work for constrained-node networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7228"/>
          <seriesInfo name="DOI" value="10.17487/RFC7228"/>
        </reference>
        <reference anchor="RFC9810">
          <front>
            <title>Internet X.509 Public Key Infrastructure -- Certificate Management Protocol (CMP)</title>
            <author fullname="H. Brockhaus" initials="H." surname="Brockhaus"/>
            <author fullname="D. von Oheimb" initials="D." surname="von Oheimb"/>
            <author fullname="M. Ounsworth" initials="M." surname="Ounsworth"/>
            <author fullname="J. Gray" initials="J." surname="Gray"/>
            <date month="July" year="2025"/>
            <abstract>
              <t>This document describes the Internet X.509 Public Key Infrastructure (PKI) Certificate Management Protocol (CMP). Protocol messages are defined for X.509v3 certificate creation and management. CMP provides interactions between client systems and PKI components such as a Registration Authority (RA) and a Certification Authority (CA).</t>
              <t>This document adds support for management of certificates containing a Key Encapsulation Mechanism (KEM) public key and uses EnvelopedData instead of EncryptedValue. This document also includes the updates specified in Section 2 and Appendix A.2 of RFC 9480.</t>
              <t>This document obsoletes RFC 4210, and together with RFC 9811, it also obsoletes RFC 9480. Appendix F of this document updates Section 9 of RFC 5912.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9810"/>
          <seriesInfo name="DOI" value="10.17487/RFC9810"/>
        </reference>
        <reference anchor="RFC8937">
          <front>
            <title>Randomness Improvements for Security Protocols</title>
            <author fullname="C. Cremers" initials="C." surname="Cremers"/>
            <author fullname="L. Garratt" initials="L." surname="Garratt"/>
            <author fullname="S. Smyshlyaev" initials="S." surname="Smyshlyaev"/>
            <author fullname="N. Sullivan" initials="N." surname="Sullivan"/>
            <author fullname="C. Wood" initials="C." surname="Wood"/>
            <date month="October" year="2020"/>
            <abstract>
              <t>Randomness is a crucial ingredient for Transport Layer Security (TLS) and related security protocols. Weak or predictable "cryptographically secure" pseudorandom number generators (CSPRNGs) can be abused or exploited for malicious purposes. An initial entropy source that seeds a CSPRNG might be weak or broken as well, which can also lead to critical and systemic security problems. This document describes a way for security protocol implementations to augment their CSPRNGs using long-term private keys. This improves randomness from broken or otherwise subverted CSPRNGs.</t>
              <t>This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8937"/>
          <seriesInfo name="DOI" value="10.17487/RFC8937"/>
        </reference>
        <reference anchor="RFC9483">
          <front>
            <title>Lightweight Certificate Management Protocol (CMP) Profile</title>
            <author fullname="H. Brockhaus" initials="H." surname="Brockhaus"/>
            <author fullname="D. von Oheimb" initials="D." surname="von Oheimb"/>
            <author fullname="S. Fries" initials="S." surname="Fries"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document aims at simple, interoperable, and automated PKI management operations covering typical use cases of industrial and Internet of Things (IoT) scenarios. This is achieved by profiling the Certificate Management Protocol (CMP), the related Certificate Request Message Format (CRMF), and transfer based on HTTP or Constrained Application Protocol (CoAP) in a succinct but sufficiently detailed and self-contained way. To make secure certificate management for simple scenarios and constrained devices as lightweight as possible, only the most crucial types of operations and options are specified as mandatory. More specialized or complex use cases are supported with optional features.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9483"/>
          <seriesInfo name="DOI" value="10.17487/RFC9483"/>
        </reference>
        <reference anchor="RFC7452">
          <front>
            <title>Architectural Considerations in Smart Object Networking</title>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="J. Arkko" initials="J." surname="Arkko"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <date month="March" year="2015"/>
            <abstract>
              <t>The term "Internet of Things" (IoT) denotes a trend where a large number of embedded devices employ communication services offered by Internet protocols. Many of these devices, often called "smart objects", are not directly operated by humans but exist as components in buildings or vehicles, or are spread out in the environment. Following the theme "Everything that can be connected will be connected", engineers and researchers designing smart object networks need to decide how to achieve this in practice.</t>
              <t>This document offers guidance to engineers designing Internet- connected smart objects.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7452"/>
          <seriesInfo name="DOI" value="10.17487/RFC7452"/>
        </reference>
        <reference anchor="RFC6066">
          <front>
            <title>Transport Layer Security (TLS) Extensions: Extension Definitions</title>
            <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
            <date month="January" year="2011"/>
            <abstract>
              <t>This document provides specifications for existing TLS extensions. It is a companion document for RFC 5246, "The Transport Layer Security (TLS) Protocol Version 1.2". The extensions specified are server_name, max_fragment_length, client_certificate_url, trusted_ca_keys, truncated_hmac, and status_request. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6066"/>
          <seriesInfo name="DOI" value="10.17487/RFC6066"/>
        </reference>
        <reference anchor="I-D.ietf-iotops-7228bis">
          <front>
            <title>Terminology for Constrained-Node Networks</title>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <author fullname="Mehmet Ersue" initials="M." surname="Ersue">
         </author>
            <author fullname="Ari Keränen" initials="A." surname="Keränen">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Carles Gomez" initials="C." surname="Gomez">
              <organization>Universitat Politecnica de Catalunya</organization>
            </author>
            <date day="15" month="May" year="2026"/>
            <abstract>
              <t>   The Internet Protocol Suite is increasingly used on small devices
   with severe constraints on power, memory, and processing resources,
   creating constrained-node networks.  This document provides a number
   of basic terms that have been useful in research and standardization
   work for constrained-node networks.

   This document obsoletes RFC 7228.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-iotops-7228bis-08"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqc-engineers">
          <front>
            <title>Post-Quantum Cryptography for Engineers</title>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dimitrios Schoinianakis" initials="D." surname="Schoinianakis">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <date day="25" month="August" year="2025"/>
            <abstract>
              <t>   The advent of a cryptographically relevant quantum computer (CRQC)
   would render state-of-the-art, traditional public key algorithms
   deployed today obsolete, as the mathematical assumptions underpinning
   their security would no longer hold.  To address this, protocols and
   infrastructure must transition to post-quantum algorithms, which are
   designed to resist both traditional and quantum attacks.  This
   document explains why engineers need to be aware of and understand
   post-quantum cryptography (PQC), detailing the impact of CRQCs on
   existing systems and the challenges involved in transitioning to
   post-quantum algorithms.  Unlike previous cryptographic updates, this
   shift may require significant protocol redesign due to the unique
   properties of post-quantum algorithms.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqc-engineers-14"/>
        </reference>
        <reference anchor="PQC-ENERGY">
          <front>
            <title>Energy Consumption Evaluation of Post-Quantum TLS 1.3 for Resource-Constrained Embedded Devices</title>
            <author fullname="George Tasopoulos" initials="G." surname="Tasopoulos">
              <organization>Industrial Systems Institute, R.C. ATHENA, Patras, Greece</organization>
            </author>
            <author fullname="Charis Dimopoulos" initials="C." surname="Dimopoulos">
              <organization>Industrial Systems Institute, R.C. ATHENA &amp;amp; Electrical and Computer Engineering, Dpt, University of Patras, Patras, Greece</organization>
            </author>
            <author fullname="Apostolos P. Fournaris" initials="A." surname="Fournaris">
              <organization>Industrial Systems Institute, R.C. ATHENA, Patras, Greece</organization>
            </author>
            <author fullname="Raymond K. Zhao" initials="R." surname="Zhao">
              <organization>CSIRO's Data61 Sydney, Australia</organization>
            </author>
            <author fullname="Amin Sakzad" initials="A." surname="Sakzad">
              <organization>Monash University, Melbourne, Australia</organization>
            </author>
            <author fullname="Ron Steinfeld" initials="R." surname="Steinfeld">
              <organization>Monash University, Melbourne, Australia</organization>
            </author>
            <date month="May" year="2023"/>
          </front>
          <seriesInfo name="Proceedings of the 20th ACM International Conference on Computing Frontiers" value="pp. 366-374"/>
          <seriesInfo name="DOI" value="10.1145/3587135.3592821"/>
          <refcontent>ACM</refcontent>
        </reference>
        <reference anchor="PQC-PERF">
          <front>
            <title>Performance Evaluation of Post-Quantum TLS 1.3 on Resource-Constrained Embedded Systems</title>
            <author fullname="George Tasopoulos" initials="G." surname="Tasopoulos">
              <organization/>
            </author>
            <author fullname="Jinhui Li" initials="J." surname="Li">
              <organization/>
            </author>
            <author fullname="Apostolos P. Fournaris" initials="A." surname="Fournaris">
              <organization/>
            </author>
            <author fullname="Raymond K. Zhao" initials="R." surname="Zhao">
              <organization/>
            </author>
            <author fullname="Amin Sakzad" initials="A." surname="Sakzad">
              <organization/>
            </author>
            <author fullname="Ron Steinfeld" initials="R." surname="Steinfeld">
              <organization/>
            </author>
            <date year="2022"/>
          </front>
          <seriesInfo name="Lecture Notes in Computer Science" value="pp. 432-451"/>
          <seriesInfo name="DOI" value="10.1007/978-3-031-21280-2_24"/>
          <seriesInfo name="ISBN" value="[&quot;9783031212796&quot;, &quot;9783031212802&quot;]"/>
          <refcontent>Springer International Publishing</refcontent>
        </reference>
        <reference anchor="CoAP">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="IEEE-802.1AR">
          <front>
            <title>ISO/IEC/IEEE International Standard for Telecommunications and exchange between information technology systems--Requirements for local and metropolitan area networks--Part 1AR:Secure device identity</title>
            <author>
              <organization/>
            </author>
            <date month="March" year="2020"/>
          </front>
          <seriesInfo name="DOI" value="10.1109/ieeestd.2020.9052099"/>
          <seriesInfo name="ISBN" value="[&quot;9781504465885&quot;]"/>
          <refcontent>IEEE</refcontent>
        </reference>
        <reference anchor="FDO" target="https://fidoalliance.org/specifications/download-iot-specifications/">
          <front>
            <title>FIDO Device Onboard Specification 1.1</title>
            <author>
              <organization>FIDO Alliance</organization>
            </author>
            <date year="2022" month="April"/>
          </front>
        </reference>
        <reference anchor="LwM2M-T" target="https://www.openmobilealliance.org/release/LightweightM2M/V1_2_2-20240613-A/">
          <front>
            <title>Lightweight Machine to Machine (LwM2M) V.1.2.2 Technical Specification: Transport Bindings</title>
            <author>
              <organization>OMA SpecWorks</organization>
            </author>
            <date year="2024" month="June"/>
          </front>
        </reference>
        <reference anchor="LwM2M-C" target="https://www.openmobilealliance.org/release/LightweightM2M/V1_2_2-20240613-A/">
          <front>
            <title>Lightweight Machine to Machine (LwM2M) V.1.2.2 Technical Specification: Core</title>
            <author>
              <organization>OMA SpecWorks</organization>
            </author>
            <date year="2024" month="June"/>
          </front>
        </reference>
        <reference anchor="Ambrose2017" target="https://eprint.iacr.org/2017/975.pdf">
          <front>
            <title>Differential Attacks on Deterministic Signatures</title>
            <author initials="C." surname="Ambrose" fullname="Christopher Ambrose">
              <organization/>
            </author>
            <author initials="J. W." surname="Bos" fullname="Joppe W. Bos">
              <organization/>
            </author>
            <author initials="B." surname="Fay" fullname="Björn Fay">
              <organization/>
            </author>
            <author initials="M." surname="Joye" fullname="Marc Joye">
              <organization/>
            </author>
            <author initials="M." surname="Lochter" fullname="Manfred Lochter">
              <organization/>
            </author>
            <author initials="B." surname="Murray" fullname="Bruce Murray">
              <organization/>
            </author>
            <date year="2017"/>
          </front>
        </reference>
        <reference anchor="RFC5746">
          <front>
            <title>Transport Layer Security (TLS) Renegotiation Indication Extension</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="M. Ray" initials="M." surname="Ray"/>
            <author fullname="S. Dispensa" initials="S." surname="Dispensa"/>
            <author fullname="N. Oskov" initials="N." surname="Oskov"/>
            <date month="February" year="2010"/>
            <abstract>
              <t>Secure Socket Layer (SSL) and Transport Layer Security (TLS) renegotiation are vulnerable to an attack in which the attacker forms a TLS connection with the target server, injects content of his choice, and then splices in a new TLS connection from a client. The server treats the client's initial TLS handshake as a renegotiation and thus believes that the initial data transmitted by the attacker is from the same entity as the subsequent client data. This specification defines a TLS extension to cryptographically tie renegotiations to the TLS connections they are being performed over, thus preventing this attack. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5746"/>
          <seriesInfo name="DOI" value="10.17487/RFC5746"/>
        </reference>
        <reference anchor="RFC9261">
          <front>
            <title>Exported Authenticators in TLS</title>
            <author fullname="N. Sullivan" initials="N." surname="Sullivan"/>
            <date month="July" year="2022"/>
            <abstract>
              <t>This document describes a mechanism that builds on Transport Layer Security (TLS) or Datagram Transport Layer Security (DTLS) and enables peers to provide proof of ownership of an identity, such as an X.509 certificate. This proof can be exported by one peer, transmitted out of band to the other peer, and verified by the receiving peer.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9261"/>
          <seriesInfo name="DOI" value="10.17487/RFC9261"/>
        </reference>
        <reference anchor="I-D.ietf-httpbis-secondary-server-certs">
          <front>
            <title>Secondary Certificate Authentication of HTTP Servers</title>
            <author fullname="Eric Gorbaty" initials="E." surname="Gorbaty">
              <organization>Apple</organization>
            </author>
            <author fullname="Mike Bishop" initials="M." surname="Bishop">
              <organization>Akamai</organization>
            </author>
            <date day="12" month="October" year="2024"/>
            <abstract>
              <t>   This document defines a way for HTTP/2 and HTTP/3 servers to send
   additional certificate-based credentials after a TLS connection is
   established, based on TLS Exported Authenticators.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-httpbis-secondary-server-certs-01"/>
        </reference>
        <reference anchor="RFC5216">
          <front>
            <title>The EAP-TLS Authentication Protocol</title>
            <author fullname="D. Simon" initials="D." surname="Simon"/>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="R. Hurst" initials="R." surname="Hurst"/>
            <date month="March" year="2008"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides support for multiple authentication methods. Transport Layer Security (TLS) provides for mutual authentication, integrity-protected ciphersuite negotiation, and key exchange between two endpoints. This document defines EAP-TLS, which includes support for certificate-based mutual authentication and key derivation.</t>
              <t>This document obsoletes RFC 2716. A summary of the changes between this document and RFC 2716 is available in Appendix A. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5216"/>
          <seriesInfo name="DOI" value="10.17487/RFC5216"/>
        </reference>
        <reference anchor="RFC9190">
          <front>
            <title>EAP-TLS 1.3: Using the Extensible Authentication Protocol with TLS 1.3</title>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="M. Sethi" initials="M." surname="Sethi"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides a standard mechanism for support of multiple authentication methods. This document specifies the use of EAP-TLS with TLS 1.3 while remaining backwards compatible with existing implementations of EAP-TLS. TLS 1.3 provides significantly improved security and privacy, and reduced latency when compared to earlier versions of TLS. EAP-TLS with TLS 1.3 (EAP-TLS 1.3) further improves security and privacy by always providing forward secrecy, never disclosing the peer identity, and by mandating use of revocation checking when compared to EAP-TLS with earlier versions of TLS. This document also provides guidance on authentication, authorization, and resumption for EAP-TLS in general (regardless of the underlying TLS version used). This document updates RFC 5216.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9190"/>
          <seriesInfo name="DOI" value="10.17487/RFC9190"/>
        </reference>
        <reference anchor="RFC4279">
          <front>
            <title>Pre-Shared Key Ciphersuites for Transport Layer Security (TLS)</title>
            <author fullname="P. Eronen" initials="P." role="editor" surname="Eronen"/>
            <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document specifies three sets of new ciphersuites for the Transport Layer Security (TLS) protocol to support authentication based on pre-shared keys (PSKs). These pre-shared keys are symmetric keys, shared in advance among the communicating parties. The first set of ciphersuites uses only symmetric key operations for authentication. The second set uses a Diffie-Hellman exchange authenticated with a pre-shared key, and the third set combines public key authentication of the server with pre-shared key authentication of the client. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4279"/>
          <seriesInfo name="DOI" value="10.17487/RFC4279"/>
        </reference>
        <reference anchor="RFC9150">
          <front>
            <title>TLS 1.3 Authentication and Integrity-Only Cipher Suites</title>
            <author fullname="N. Cam-Winget" initials="N." surname="Cam-Winget"/>
            <author fullname="J. Visoky" initials="J." surname="Visoky"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document defines the use of cipher suites for TLS 1.3 based on Hashed Message Authentication Code (HMAC). Using these cipher suites provides server and, optionally, mutual authentication and data authenticity, but not data confidentiality. Cipher suites with these properties are not of general applicability, but there are use cases, specifically in Internet of Things (IoT) and constrained environments, that do not require confidentiality of exchanged messages while still requiring integrity protection, server authentication, and optional client authentication. This document gives examples of such use cases, with the caveat that prior to using these integrity-only cipher suites, a threat model for the situation at hand is needed, and a threat analysis must be performed within that model to determine whether the use of integrity-only cipher suites is appropriate. The approach described in this document is not endorsed by the IETF and does not have IETF consensus, but it is presented here to enable interoperable implementation of a reduced-security mechanism that provides authentication and message integrity without supporting confidentiality.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9150"/>
          <seriesInfo name="DOI" value="10.17487/RFC9150"/>
        </reference>
        <reference anchor="I-D.ietf-tls-esni">
          <front>
            <title>TLS Encrypted Client Hello</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Independent</organization>
            </author>
            <author fullname="Kazuho Oku" initials="K." surname="Oku">
              <organization>Fastly</organization>
            </author>
            <author fullname="Nick Sullivan" initials="N." surname="Sullivan">
              <organization>Cryptography Consulting LLC</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="14" month="June" year="2025"/>
            <abstract>
              <t>   This document describes a mechanism in Transport Layer Security (TLS)
   for encrypting a ClientHello message under a server public key.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/tlswg/draft-ietf-tls-esni
   (https://github.com/tlswg/draft-ietf-tls-esni).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-esni-25"/>
        </reference>
        <reference anchor="RFC9180">
          <front>
            <title>Hybrid Public Key Encryption</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="K. Bhargavan" initials="K." surname="Bhargavan"/>
            <author fullname="B. Lipp" initials="B." surname="Lipp"/>
            <author fullname="C. Wood" initials="C." surname="Wood"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>This document describes a scheme for hybrid public key encryption (HPKE). This scheme provides a variant of public key encryption of arbitrary-sized plaintexts for a recipient public key. It also includes three authenticated variants, including one that authenticates possession of a pre-shared key and two optional ones that authenticate possession of a key encapsulation mechanism (KEM) private key. HPKE works for any combination of an asymmetric KEM, key derivation function (KDF), and authenticated encryption with additional data (AEAD) encryption function. Some authenticated variants may not be supported by all KEMs. We provide instantiations of the scheme using widely used and efficient primitives, such as Elliptic Curve Diffie-Hellman (ECDH) key agreement, HMAC-based key derivation function (HKDF), and SHA2.</t>
              <t>This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9180"/>
          <seriesInfo name="DOI" value="10.17487/RFC9180"/>
        </reference>
        <reference anchor="RFC8484">
          <front>
            <title>DNS Queries over HTTPS (DoH)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS. Each DNS query-response pair is mapped into an HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8484"/>
          <seriesInfo name="DOI" value="10.17487/RFC8484"/>
        </reference>
        <reference anchor="RFC7858" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7858.xml">
          <front>
            <title>Specification for DNS over Transport Layer Security (TLS)</title>
            <author fullname="Z. Hu" initials="Z." surname="Hu"/>
            <author fullname="L. Zhu" initials="L." surname="Zhu"/>
            <author fullname="J. Heidemann" initials="J." surname="Heidemann"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <author fullname="D. Wessels" initials="D." surname="Wessels"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS. Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626. In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
              <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group. It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7858"/>
          <seriesInfo name="DOI" value="10.17487/RFC7858"/>
        </reference>
        <reference anchor="RFC9250" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9250.xml">
          <front>
            <title>DNS over Dedicated QUIC Connections</title>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <date month="May" year="2022"/>
            <abstract>
              <t>This document describes the use of QUIC to provide transport confidentiality for DNS. The encryption provided by QUIC has similar properties to those provided by TLS, while QUIC transport eliminates the head-of-line blocking issues inherent with TCP and provides more efficient packet-loss recovery than UDP. DNS over QUIC (DoQ) has privacy properties similar to DNS over TLS (DoT) specified in RFC 7858, and latency characteristics similar to classic DNS over UDP. This specification describes the use of DoQ as a general-purpose transport for DNS and includes the use of DoQ for stub to recursive, recursive to authoritative, and zone transfer scenarios.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9250"/>
          <seriesInfo name="DOI" value="10.17487/RFC9250"/>
        </reference>
        <reference anchor="RFC8995">
          <front>
            <title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="T. Eckert" initials="T." surname="Eckert"/>
            <author fullname="M. Behringer" initials="M." surname="Behringer"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document specifies automated bootstrapping of an Autonomic Control Plane. To do this, a Secure Key Infrastructure is bootstrapped. This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline. We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device. The established secure connection can be used to deploy a locally issued certificate to the device as well.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8995"/>
          <seriesInfo name="DOI" value="10.17487/RFC8995"/>
        </reference>
        <reference anchor="RFC7030">
          <front>
            <title>Enrollment over Secure Transport</title>
            <author fullname="M. Pritikin" initials="M." role="editor" surname="Pritikin"/>
            <author fullname="P. Yee" initials="P." role="editor" surname="Yee"/>
            <author fullname="D. Harkins" initials="D." role="editor" surname="Harkins"/>
            <date month="October" year="2013"/>
            <abstract>
              <t>This document profiles certificate enrollment for clients using Certificate Management over CMS (CMC) messages over a secure transport. This profile, called Enrollment over Secure Transport (EST), describes a simple, yet functional, certificate management protocol targeting Public Key Infrastructure (PKI) clients that need to acquire client certificates and associated Certification Authority (CA) certificates. It also supports client-generated public/private key pairs as well as key pairs generated by the CA.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7030"/>
          <seriesInfo name="DOI" value="10.17487/RFC7030"/>
        </reference>
        <reference anchor="I-D.ietf-anima-constrained-voucher">
          <front>
            <title>Constrained Bootstrapping Remote Secure Key Infrastructure (cBRSKI)</title>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <author fullname="Peter Van der Stok" initials="P." surname="Van der Stok">
              <organization>vanderstok consultancy</organization>
            </author>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Esko Dijk" initials="E." surname="Dijk">
              <organization>IoTconsultancy.nl</organization>
            </author>
            <date day="27" month="February" year="2026"/>
            <abstract>
              <t>   This document defines the Constrained Bootstrapping Remote Secure Key
   Infrastructure (cBRSKI) protocol, which provides a solution for
   secure zero-touch onboarding of resource-constrained (IoT) devices
   into the network of a domain owner.  This protocol is designed for
   constrained networks, which may have limited data throughput or may
   experience frequent packet loss. cBRSKI is a variant of the BRSKI
   protocol, which uses an artifact signed by the device manufacturer
   called the "voucher" which enables a new device and the owner's
   network to mutually authenticate.  While the BRSKI voucher data is
   encoded in JSON, cBRSKI uses a compact CBOR-encoded voucher.  The
   BRSKI voucher data definition is extended with new data types that
   allow for smaller voucher sizes.  The Enrollment over Secure
   Transport (EST) protocol, used in BRSKI, is replaced with EST-over-
   CoAPS; and HTTPS used in BRSKI is replaced with DTLS-secured CoAP
   (CoAPS).  This document Updates RFC 8995 and RFC 9148.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-anima-constrained-voucher-30"/>
        </reference>
        <reference anchor="RFC4108">
          <front>
            <title>Using Cryptographic Message Syntax (CMS) to Protect Firmware Packages</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="August" year="2005"/>
            <abstract>
              <t>This document describes the use of the Cryptographic Message Syntax (CMS) to protect firmware packages, which provide object code for one or more hardware module components. CMS is specified in RFC 3852. A digital signature is used to protect the firmware package from undetected modification and to provide data origin authentication. Encryption is optionally used to protect the firmware package from disclosure, and compression is optionally used to reduce the size of the protected firmware package. A firmware package loading receipt can optionally be generated to acknowledge the successful loading of a firmware package. Similarly, a firmware package load error report can optionally be generated to convey the failure to load a firmware package. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4108"/>
          <seriesInfo name="DOI" value="10.17487/RFC4108"/>
        </reference>
        <reference anchor="RFC9019">
          <front>
            <title>A Firmware Update Architecture for Internet of Things</title>
            <author fullname="B. Moran" initials="B." surname="Moran"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="D. Brown" initials="D." surname="Brown"/>
            <author fullname="M. Meriac" initials="M." surname="Meriac"/>
            <date month="April" year="2021"/>
            <abstract>
              <t>Vulnerabilities in Internet of Things (IoT) devices have raised the need for a reliable and secure firmware update mechanism suitable for devices with resource constraints. Incorporating such an update mechanism is a fundamental requirement for fixing vulnerabilities, but it also enables other important capabilities such as updating configuration settings and adding new functionality.</t>
              <t>In addition to the definition of terminology and an architecture, this document provides the motivation for the standardization of a manifest format as a transport-agnostic means for describing and protecting firmware updates.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9019"/>
          <seriesInfo name="DOI" value="10.17487/RFC9019"/>
        </reference>
        <reference anchor="I-D.irtf-t2trg-taxonomy-manufacturer-anchors">
          <front>
            <title>A Taxonomy of operational security considerations for manufacturer installed keys and Trust Anchors</title>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <date day="22" month="April" year="2026"/>
            <abstract>
              <t>   This document provides a taxonomy of methods used by manufacturers of
   silicon and devices to secure private keys and public trust anchors.
   This deals with two related activities: how trust anchors and private
   keys are installed into devices during manufacturing, and how the
   related manufacturer held private keys are secured against
   disclosure.

   This document does not evaluate the different mechanisms, but rather
   just serves to name them in a consistent manner in order to aid in
   communication.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-t2trg-taxonomy-manufacturer-anchors-16"/>
        </reference>
        <reference anchor="RFC7924">
          <front>
            <title>Transport Layer Security (TLS) Cached Information Extension</title>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>Transport Layer Security (TLS) handshakes often include fairly static information, such as the server certificate and a list of trusted certification authorities (CAs). This information can be of considerable size, particularly if the server certificate is bundled with a complete certificate chain (i.e., the certificates of intermediate CAs up to the root CA).</t>
              <t>This document defines an extension that allows a TLS client to inform a server of cached information, thereby enabling the server to omit already available information.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7924"/>
          <seriesInfo name="DOI" value="10.17487/RFC7924"/>
        </reference>
        <reference anchor="I-D.ietf-dance-tls-clientid">
          <front>
            <title>TLS Extension for DANE Client Identity</title>
            <author fullname="Shumon Huque" initials="S." surname="Huque">
              <organization>Salesforce</organization>
            </author>
            <author fullname="Viktor Dukhovni" initials="V." surname="Dukhovni">
              <organization>OpenSSL Corporation</organization>
            </author>
            <date day="17" month="September" year="2025"/>
            <abstract>
              <t>   This document specifies a TLS and DTLS extension to convey a DNS-
   Based Authentication of Named Entities (DANE) Client Identity to a
   TLS or DTLS server.  This is useful for applications that perform TLS
   client authentication via DANE TLSA records.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-dance-tls-clientid-07"/>
        </reference>
        <reference anchor="RFC6698">
          <front>
            <title>The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="J. Schlyter" initials="J." surname="Schlyter"/>
            <date month="August" year="2012"/>
            <abstract>
              <t>Encrypted communication on the Internet often uses Transport Layer Security (TLS), which depends on third parties to certify the keys used. This document improves on that situation by enabling the administrators of domain names to specify the keys used in that domain's TLS servers. This requires matching improvements in TLS client software, but no change in TLS server software. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6698"/>
          <seriesInfo name="DOI" value="10.17487/RFC6698"/>
        </reference>
        <reference anchor="RFC8879">
          <front>
            <title>TLS Certificate Compression</title>
            <author fullname="A. Ghedini" initials="A." surname="Ghedini"/>
            <author fullname="V. Vasiliev" initials="V." surname="Vasiliev"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>In TLS handshakes, certificate chains often take up the majority of the bytes transmitted.</t>
              <t>This document describes how certificate chains can be compressed to reduce the amount of data transmitted and avoid some round trips.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8879"/>
          <seriesInfo name="DOI" value="10.17487/RFC8879"/>
        </reference>
        <reference anchor="RFC7250">
          <front>
            <title>Using Raw Public Keys in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="P. Wouters" initials="P." role="editor" surname="Wouters"/>
            <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig"/>
            <author fullname="J. Gilmore" initials="J." surname="Gilmore"/>
            <author fullname="S. Weiler" initials="S." surname="Weiler"/>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>This document specifies a new certificate type and two TLS extensions for exchanging raw public keys in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS). The new certificate type allows raw public keys to be used for authentication.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7250"/>
          <seriesInfo name="DOI" value="10.17487/RFC7250"/>
        </reference>
        <reference anchor="I-D.ietf-cose-cbor-encoded-cert">
          <front>
            <title>CBOR Encoded X.509 Certificates (C509 Certificates)</title>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Shahid Raza" initials="S." surname="Raza">
              <organization>University of Glasgow</organization>
            </author>
            <author fullname="Joel Höglund" initials="J." surname="Höglund">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Martin Furuhed" initials="M." surname="Furuhed">
              <organization>IN Groupe</organization>
            </author>
            <author fullname="Lijun Liao" initials="L." surname="Liao">
              <organization>NIO</organization>
            </author>
            <date day="11" month="May" year="2026"/>
            <abstract>
              <t>   This document specifies a CBOR encoding of X.509 certificates.  The
   resulting certificates are called C509 certificates.  The CBOR
   encoding supports a large subset of RFC 5280 and common certificate
   profiles, and it is extensible.

   Two types of C509 certificates are defined.  One type is an
   invertible CBOR re-encoding of DER-encoded X.509 certificates with
   the signature field copied from the DER encoding.  The other type is
   identical except that the signature is computed over the CBOR
   encoding instead of the DER encoding, thereby avoiding the use of
   ASN.1.  Both types of certificates have the same semantics as X.509
   while providing comparable size reduction.

   This document also specifies CBOR-encoded data structures for
   certification requests and certification request templates, new COSE
   headers, as well as a TLS certificate type and a file format for
   C509.  This document updates RFC 6698 by extending the TLSA selectors
   registry to include C509 certificates.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-cbor-encoded-cert-19"/>
        </reference>
        <reference anchor="I-D.irtf-cfrg-aead-limits">
          <front>
            <title>Usage Limits on AEAD Algorithms</title>
            <author fullname="Felix Günther" initials="F." surname="Günther">
              <organization>IBM Research Europe - Zurich</organization>
            </author>
            <author fullname="Martin Thomson" initials="M." surname="Thomson">
              <organization>Mozilla</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="4" month="December" year="2025"/>
            <abstract>
              <t>   An Authenticated Encryption with Associated Data (AEAD) algorithm
   provides confidentiality and integrity.  Excessive use of the same
   key can give an attacker advantages in breaking these properties.
   This document provides simple guidance for users of common AEAD
   functions about how to limit the use of keys in order to bound the
   advantage given to an attacker.  It considers limits in both single-
   and multi-key settings.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-cfrg-aead-limits-11"/>
        </reference>
        <reference anchor="RFC6979">
          <front>
            <title>Deterministic Usage of the Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA)</title>
            <author fullname="T. Pornin" initials="T." surname="Pornin"/>
            <date month="August" year="2013"/>
            <abstract>
              <t>This document defines a deterministic digital signature generation procedure. Such signatures are compatible with standard Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA) digital signatures and can be processed with unmodified verifiers, which need not be aware of the procedure described therein. Deterministic signatures retain the cryptographic security features associated with digital signatures but can be more easily implemented in various environments, since they do not need access to a source of high-quality randomness.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6979"/>
          <seriesInfo name="DOI" value="10.17487/RFC6979"/>
        </reference>
        <reference anchor="RFC8032">
          <front>
            <title>Edwards-Curve Digital Signature Algorithm (EdDSA)</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <author fullname="I. Liusvaara" initials="I." surname="Liusvaara"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes elliptic curve signature scheme Edwards-curve Digital Signature Algorithm (EdDSA). The algorithm is instantiated with recommended parameters for the edwards25519 and edwards448 curves. An example implementation and test vectors are provided.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8032"/>
          <seriesInfo name="DOI" value="10.17487/RFC8032"/>
        </reference>
        <reference anchor="I-D.irtf-cfrg-det-sigs-with-noise">
          <front>
            <title>Hedged ECDSA and EdDSA Signatures</title>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Erik Thormarker" initials="E." surname="Thormarker">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Sini Ruohomaa" initials="S." surname="Ruohomaa">
              <organization>Ericsson</organization>
            </author>
            <date day="3" month="March" year="2025"/>
            <abstract>
              <t>   Deterministic elliptic-curve signatures such as deterministic ECDSA
   and EdDSA have gained popularity over randomized ECDSA as their
   security does not depend on a source of high-quality randomness.
   Recent research, however, has found that implementations of these
   signature algorithms may be vulnerable to certain side-channel and
   fault injection attacks due to their deterministic nature.  One
   countermeasure to such attacks is hedged signatures where the
   calculation of the per-message secret number includes both fresh
   randomness and the message.  This document updates RFC 6979 and RFC
   8032 to recommend hedged constructions in deployments where side-
   channel attacks and fault injection attacks are a concern.  The
   updates are invisible to the validator of the signature and
   compatible with existing ECDSA and EdDSA validators.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-cfrg-det-sigs-with-noise-05"/>
        </reference>
        <reference anchor="I-D.ietf-uta-pqc-app">
          <front>
            <title>Post-Quantum Cryptography Recommendations for TLS-based Applications</title>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
            </author>
            <date day="24" month="February" year="2026"/>
            <abstract>
              <t>   Post-quantum cryptography presents new challenges for device
   manufacturers, application developers, and service providers.  This
   document highlights the unique characteristics of applications and
   offers best practices for implementing quantum ready usage profiles
   in applications that use TLS and key supporting protocols such as
   DNS.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-uta-pqc-app-01"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqc-hsm-constrained">
          <front>
            <title>Adapting Constrained Devices for Post-Quantum Cryptography</title>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dan Wing" initials="D." surname="Wing">
              <organization>Citrix</organization>
            </author>
            <author fullname="Ben S" initials="B." surname="S">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Kris Kwiatkowski" initials="K." surname="Kwiatkowski">
              <organization>PQShield</organization>
            </author>
            <date day="1" month="April" year="2026"/>
            <abstract>
              <t>   This document provides guidance on integrating Post-Quantum
   Cryptography (PQC) into resource-constrained devices, such as IoT
   nodes and lightweight Hardware Security Modules (HSMs).  These
   systems often operate with strict limitations on processing power,
   RAM, and flash memory, and may even be battery-powered.  The document
   emphasizes the role of hardware security as the basis for secure
   operations, supporting features such as seed-based key generation to
   minimize persistent storage, efficient handling of ephemeral keys,
   and the offloading of cryptographic tasks in low-resource
   environments.  It also explores the implications of PQC on firmware
   update mechanisms in such constrained systems.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqc-hsm-constrained-05"/>
        </reference>
      </references>
    </references>
    <?line 1053?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We would like to thank
Henk Birkholz,
Hendrik Brockhaus,
Ben Kaduk,
John Mattsson,
Daniel Migault,
Tiru Reddy,
Rich Salz, and
Marco Tiloca.</t>
      <t>Furthermore, we would like to thank our security area director Deb Cooley for her detailed review comments.</t>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="J." surname="Sosinowicz" fullname="Juliusz Sosinowicz">
        <organization/>
        <address>
      </address>
      </contact>
      <contact initials="A." surname="Kraus" fullname="Achim Kraus">
        <organization/>
        <address>
      </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
