<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.21 (Ruby 3.3.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-uta-require-tls13-03" category="bcp" consensus="true" submissionType="IETF" updates="9325" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.25.0 -->
  <front>
    <title abbrev="require-tls1.3">New Protocols Must Require TLS 1.3</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-uta-require-tls13-03"/>
    <author fullname="Rich Salz">
      <organization>Akamai Technologies</organization>
      <address>
        <email>rsalz@akamai.com</email>
      </address>
    </author>
    <author fullname="Nimrod Aviram">
      <organization/>
      <address>
        <email>nimrod.aviram@gmail.com</email>
      </address>
    </author>
    <date year="2024" month="December" day="09"/>
    <area>Security</area>
    <workgroup>Using TLS in Applications</workgroup>
    <keyword>TLS</keyword>
    <keyword>features</keyword>
    <abstract>
      <?line 146?>

<t>TLS 1.2 is in use and can be configured such that it provides good security
properties. TLS 1.3 use is increasing, and fixes some known deficiencies
with TLS
1.2, such as removing error-prone cryptographic primitives and encrypting
more of the traffic so that it is not readable by outsiders.
For these reasons, new protocols must require and
assume the existence of TLS 1.3  existence.
This prescription does not pertain to DTLS (in any DTLS version); it pertains to
TLS only.</t>
      <t>This document updates <xref target="RFC9325"/>.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-uta-require-tls13/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Using TLS in Applications Working Group mailing list (<eref target="mailto:uta@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/uta/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/uta/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/richsalz/draft-use-tls13"/>.</t>
    </note>
  </front>
  <middle>
    <?line 160?>

<section anchor="sec-reasons">
      <name>Introduction</name>
      <t>TLS 1.2 <xref target="TLS12"/> is in use and can be configured such that
it provides good
security properties. However, this protocol version suffers from several
deficiencies:</t>
      <ol spacing="normal" type="1"><li>
          <t>While application layer traffic is always encrypted, most of the handshake
messages are not. Therefore, the privacy provided is suboptimal.
This is a protocol issue that cannot be addressed by configuration.</t>
        </li>
        <li>
          <t>The list of cryptographic primitives specified for the protocol, both in-use
primitives and deprecated ones, includes several primitives that have
been a source for
vulnerabilities throughout the years, such as RSA key exchange, CBC cipher suites,
and problematic finite-field Diffie-Hellman group negotiation.
These issues could be addressed through proper configuration; however,
experience shows that configuration mistakes are common, especially when
deploying cryptography.
See <xref target="sec-considerations"/> for elaboration.</t>
        </li>
        <li>
          <t>The base protocol does not provide security against some
types of attacks (see <xref target="sec-considerations"/>);
extensions are required to provide
security.</t>
        </li>
      </ol>
      <t>TLS 1.3 <xref target="TLS13"/> is also in
widespread use and fixes most known deficiencies with TLS 1.2, such as
encrypting more of the traffic so that it is not readable by outsiders and
removing most cryptographic primitives considered dangerous. Importantly, TLS
1.3 enjoys robust security proofs and provides excellent security without
any additional configuration.</t>
      <t>This document specifies that, since TLS 1.3 use is widespread, new protocols
must require and assume its existence.
This prescription does not pertain to DTLS (in any DTLS version); it pertains to
TLS only.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="implications-for-post-quantum-cryptography">
      <name>Implications for post-quantum cryptography</name>
      <t>Cryptographically-relevant
quantum computers, once available, will have a huge impact on TLS traffic.
In 2016, the US National Institute of Standards and Technology (NIST) started a
multi-year effort to standardize algorithms that will be "safe"
once quantum computers are feasible <xref target="PQC"/>. The first IETF discussions happened
around the same time <xref target="CFRGSLIDES"/>.</t>
      <t>In 2024 NIST released standards for <xref target="ML-KEM"/>, <xref target="ML-DSA"/>, and <xref target="SLH-DSA"/>.
While industry was waiting for NIST to finish standardization, the
IETF has had several efforts underway.
A working group was formed in early 2023 to work on operational and
transitional uses of PQC in IETF protocols,
<xref target="PQUIPWG"/>.
Several other working groups, notably LAMPS <xref target="LAMPSWG"/> and TLS <xref target="TLSWG"/>,
are working on
drafts to support hybrid algorithms and identifiers, for use during a
transition from classic to a post-quantum world.</t>
      <t>For TLS it is important to note that the focus of these efforts is TLS 1.3
or later:
TLS 1.2 WILL NOT be supported (see <xref target="iana"/>).
This is one more reason for new protocols to default to TLS 1.3, where
post-quantum cryptography is expected to be supported.</t>
    </section>
    <section anchor="tls-use-by-other-protocols-and-applications">
      <name>TLS Use by Other Protocols and Applications</name>
      <t>Any new protocol that uses TLS <bcp14>MUST</bcp14> specify as its default TLS 1.3.
For example, QUIC <xref target="QUICTLS"/> requires TLS 1.3 and specifies that endpoints
<bcp14>MUST</bcp14> terminate the connection if an older version is used.</t>
      <t>If deployment considerations are a concern, the protocol <bcp14>MAY</bcp14> specify TLS 1.2 as
an additional, non-default option.
As a counter example, the Usage Profile for DNS over TLS <xref target="DNSTLS"/> specifies
TLS 1.2 as the default, while also allowing TLS 1.3.
For newer specifications that choose to support TLS 1.2, those preferences are
to be reversed.</t>
      <t>The initial TLS handshake allows a client to specify which versions of
the TLS protocol it supports and the server is intended to pick the highest
version that it also supports.
This is known as the "TLS version negotiation," and
many TLS libraries provide a way for applications to specify the range
of versions.
When the API allows it, clients <bcp14>SHOULD</bcp14> specify just the minimum version they
want.
This <bcp14>MUST</bcp14> be TLS 1.3 or TLS 1.2, depending on the circumstances described
in the above paragraphs.</t>
    </section>
    <section anchor="changes-to-rfc-9325">
      <name>Changes to RFC 9325</name>
      <t>This document makes two changes to the recommendations in
<xref section="3.1.1" sectionFormat="comma" target="RFC9325"/>:</t>
      <ul spacing="normal">
        <li>
          <t>That section says that TLS 1.3 <bcp14>SHOULD</bcp14> be supported; this document says
that for new protocols it <bcp14>MUST</bcp14> be supported.</t>
        </li>
        <li>
          <t>That section says that TLS 1.2 <bcp14>MUST</bcp14> be supported; this document says that
it <bcp14>MAY</bcp14> be supported as described above.</t>
        </li>
      </ul>
      <t>Again, these changes only apply to TLS, and not DTLS.</t>
    </section>
    <section anchor="sec-considerations">
      <name>Security Considerations</name>
      <t>TLS 1.2 was specified with several cryptographic primitives and design choices
that have, over time, weakened its security. The purpose of this section is to
briefly survey several such prominent problems that have affected the protocol.
It should be noted, however, that TLS 1.2 can be configured securely; it is
merely much more difficult to configure it securely as opposed to using its
modern successor, TLS 1.3. See <xref target="RFC9325"/> for a more thorough guide on the
secure deployment of TLS 1.2.</t>
      <t>Firstly, the TLS 1.2 protocol, without any extension points, is vulnerable to
renegotiation attacks (see <xref target="RENEG1"/> and <xref target="RENEG2"/>)  and the
Triple Handshake attack (see <xref target="TRIPLESHAKE"/>).
Broadly, these attacks
exploit the protocol's support for renegotiation in order to inject a prefix
chosen by the attacker into the plaintext stream. This is usually a devastating
threat in practice, that allows e.g. obtaining secret cookies in a web setting.
In light of
the above problems, <xref target="RFC5746"/> specifies an extension that prevents this
category of attacks. To securely deploy TLS 1.2, either renegotiation must be
disabled entirely, or this extension must be used. Additionally, clients must
not allow servers to renegotiate the certificate during a connection.</t>
      <t>Secondly, the original key exchange methods specified for the protocol, namely
RSA key exchange and finite field Diffie-Hellman, suffer from several
weaknesses. Similarly, to securely deploy the protocol, these key exchange
methods must be disabled.
See <xref target="I-D.draft-ietf-tls-deprecate-obsolete-kex"/> for details.</t>
      <t>Thirdly, symmetric ciphers which were widely-used in the protocol, namely RC4
and CBC cipher suites, suffer from several weaknesses. RC4 suffers from
exploitable biases in its key stream; see <xref target="RFC7465"/>. CBC cipher suites have
been a source of vulnerabilities throughout the years. A straightforward
implementation of these cipher suites inherently suffers from the Lucky13 timing
attack <xref target="LUCKY13"/>. The first attempt to implement the cipher suites in
constant time introduced an even more severe vulnerability <xref target="LUCKY13FIX"/>.
There have been further similar vulnerabilities throughout the
years exploiting CBC cipher suites; refer to e.g. <xref target="CBCSCANNING"/>
for an example and a survey of similar works.</t>
      <t>And lastly, historically the protocol was affected by several other attacks that
TLS 1.3 is immune to:
BEAST <xref target="BEAST"/>, Logjam <xref target="WEAKDH"/>, FREAK <xref target="FREAK"/>, and SLOTH <xref target="SLOTH"/>.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>This document makes no requests to IANA.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="TLS12">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="TLS13">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC9325">
          <front>
            <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="November" year="2022"/>
            <abstract>
              <t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are used to protect data exchanged over a wide range of application protocols and can also form the basis for secure transport protocols. Over the years, the industry has witnessed several serious attacks on TLS and DTLS, including attacks on the most commonly used cipher suites and their modes of operation. This document provides the latest recommendations for ensuring the security of deployed services that use TLS and DTLS. These recommendations are applicable to the majority of use cases.</t>
              <t>RFC 7525, an earlier version of the TLS recommendations, was published when the industry was transitioning to TLS 1.2. Years later, this transition is largely complete, and TLS 1.3 is widely available. This document updates the guidance given the new environment and obsoletes RFC 7525. In addition, this document updates RFCs 5288 and 6066 in view of recent attacks.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="195"/>
          <seriesInfo name="RFC" value="9325"/>
          <seriesInfo name="DOI" value="10.17487/RFC9325"/>
        </reference>
        <reference anchor="RFC5746">
          <front>
            <title>Transport Layer Security (TLS) Renegotiation Indication Extension</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="M. Ray" initials="M." surname="Ray"/>
            <author fullname="S. Dispensa" initials="S." surname="Dispensa"/>
            <author fullname="N. Oskov" initials="N." surname="Oskov"/>
            <date month="February" year="2010"/>
            <abstract>
              <t>Secure Socket Layer (SSL) and Transport Layer Security (TLS) renegotiation are vulnerable to an attack in which the attacker forms a TLS connection with the target server, injects content of his choice, and then splices in a new TLS connection from a client. The server treats the client's initial TLS handshake as a renegotiation and thus believes that the initial data transmitted by the attacker is from the same entity as the subsequent client data. This specification defines a TLS extension to cryptographically tie renegotiations to the TLS connections they are being performed over, thus preventing this attack. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5746"/>
          <seriesInfo name="DOI" value="10.17487/RFC5746"/>
        </reference>
        <reference anchor="I-D.draft-ietf-tls-deprecate-obsolete-kex">
          <front>
            <title>Deprecating Obsolete Key Exchange Methods in TLS 1.2</title>
            <author fullname="Carrick Bartle" initials="C." surname="Bartle">
              <organization>Roblox</organization>
            </author>
            <author fullname="Nimrod Aviram" initials="N." surname="Aviram">
         </author>
            <date day="3" month="September" year="2024"/>
            <abstract>
              <t>   This document deprecates the use of RSA key exchange and Diffie
   Hellman over a finite field in TLS 1.2, and discourages the use of
   static elliptic curve Diffie Hellman cipher suites.

   Note that these prescriptions apply only to TLS 1.2 since TLS 1.0 and
   1.1 are deprecated by RFC 8996 and TLS 1.3 either does not use the
   affected algorithm or does not share the relevant configuration
   options.

   This document updates RFCs 9325, 4346, 5246, 4162, 6347, 5932, 5288,
   6209, 6367, 8422, 5289, 5469, 4785, 4279, 5487, 6655, and 7905.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-deprecate-obsolete-kex-05"/>
        </reference>
        <reference anchor="RFC7465">
          <front>
            <title>Prohibiting RC4 Cipher Suites</title>
            <author fullname="A. Popov" initials="A." surname="Popov"/>
            <date month="February" year="2015"/>
            <abstract>
              <t>This document requires that Transport Layer Security (TLS) clients and servers never negotiate the use of RC4 cipher suites when they establish connections. This applies to all TLS versions. This document updates RFCs 5246, 4346, and 2246.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7465"/>
          <seriesInfo name="DOI" value="10.17487/RFC7465"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="ML-KEM" target="https://csrc.nist.gov/pubs/fips/203/final">
          <front>
            <title>Module-Lattice-Based Key-Encapsulation Mechanism Standard</title>
            <author>
              <organization/>
            </author>
            <date year="2024" month="August"/>
          </front>
        </reference>
        <reference anchor="ML-DSA" target="https://csrc.nist.gov/pubs/fips/204/final">
          <front>
            <title>Module-Lattice-Based Key Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date year="2024" month="August"/>
          </front>
        </reference>
        <reference anchor="SLH-DSA" target="https://csrc.nist.gov/pubs/fips/205/final">
          <front>
            <title>Stateless Hash-Based Key-Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date year="2024" month="August"/>
          </front>
        </reference>
        <reference anchor="QUICTLS">
          <front>
            <title>Using TLS to Secure QUIC</title>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <author fullname="S. Turner" initials="S." role="editor" surname="Turner"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document describes how Transport Layer Security (TLS) is used to secure QUIC.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9001"/>
          <seriesInfo name="DOI" value="10.17487/RFC9001"/>
        </reference>
        <reference anchor="DNSTLS">
          <front>
            <title>Usage Profiles for DNS over TLS and DNS over DTLS</title>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
            <author fullname="D. Gillmor" initials="D." surname="Gillmor"/>
            <author fullname="T. Reddy" initials="T." surname="Reddy"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document discusses usage profiles, based on one or more authentication mechanisms, which can be used for DNS over Transport Layer Security (TLS) or Datagram TLS (DTLS). These profiles can increase the privacy of DNS transactions compared to using only cleartext DNS. This document also specifies new authentication mechanisms -- it describes several ways that a DNS client can use an authentication domain name to authenticate a (D)TLS connection to a DNS server. Additionally, it defines (D)TLS protocol profiles for DNS clients and servers implementing DNS over (D)TLS. This document updates RFC 7858.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8310"/>
          <seriesInfo name="DOI" value="10.17487/RFC8310"/>
        </reference>
        <reference anchor="PQC" target="https://csrc.nist.gov/projects/post-quantum-cryptography">
          <front>
            <title>Post=Quantum Cryptography</title>
            <author>
              <organization/>
            </author>
            <date year="2017" month="January"/>
          </front>
        </reference>
        <reference anchor="CFRGSLIDES" target="https://www.ietf.org/proceedings/95/slides/slides-95-cfrg-4.pdf">
          <front>
            <title>Post Quantum Secure Cryptography Discussion</title>
            <author initials="D." surname="McGrew" fullname="David McGrew">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="PQUIPWG" target="https://datatracker.ietf.org/wg/pquip/about/">
          <front>
            <title>Post-Quantum Use in Protocols</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="LAMPSWG" target="https://datatracker.ietf.org/wg/lamps/about/">
          <front>
            <title>Limited Additional Mechanisms for PXIK and SMIME</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="TLSWG" target="https://datatracker.ietf.org/wg/tls/about/">
          <front>
            <title>Transport Layer Security</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="TRIPLESHAKE" target="https://mitls.org/pages/attacks/3SHAKE">
          <front>
            <title>Triple Handshakes Considered Harmful Breaking and Fixing Authentication over TLS</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RENEG1" target="https://web.archive.org/web/20091231034700/http://www.educatedguesswork.org/2009/11/understanding_the_tls_renegoti.html">
          <front>
            <title>Understanding the TLS Renegotiation Attack</title>
            <author initials="E." surname="Rescorla" fullname="Eric Rescorla">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RENEG2" target="https://web.archive.org/web/20091228061844/http://extendedsubset.com/?p=8">
          <front>
            <title>Authentication Gap in TLS Renegotiation</title>
            <author initials="M." surname="Ray" fullname="Marsh Ray">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="LUCKY13" target="http://www.isg.rhul.ac.uk/tls/TLStiming.pdf">
          <front>
            <title>Lucky Thirteen: Breaking the TLS and DTLS record protocols</title>
            <author initials="N. J." surname="Al Fardan">
              <organization/>
            </author>
            <author initials="K. G." surname="Paterson">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="LUCKY13FIX" target="https://nds.rub.de/media/nds/veroeffentlichungen/2016/10/19/tls-attacker-ccs16.pdf">
          <front>
            <title>Systematic fuzzing and testing of TLS libraries</title>
            <author initials="J." surname="Somorovsky" fullname="Juraj Somorovsky">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="CBCSCANNING" target="https://www.usenix.org/system/files/sec19-merget.pdf">
          <front>
            <title>Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities</title>
            <author initials="R." surname="Merget" fullname="Robert Merget">
              <organization/>
            </author>
            <author initials="J." surname="Somorovsky" fullname="Juraj Somorovsky">
              <organization/>
            </author>
            <author initials="N." surname="Aviram" fullname="Nimrod Aviram">
              <organization/>
            </author>
            <author initials="C." surname="Young" fullname="Craig Young">
              <organization/>
            </author>
            <author initials="J." surname="Fliegenschmidt" fullname="Janis Fliegenschmidt">
              <organization/>
            </author>
            <author initials="J." surname="Schwenk" fullname="JÃ¶rg Schwenk">
              <organization/>
            </author>
            <author initials="Y." surname="Shavitt" fullname="Yuval Shavitt">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="BEAST" target="http://www.hpcc.ecs.soton.ac.uk/dan/talks/bullrun/Beast.pdf">
          <front>
            <title>Here come the xor ninjas</title>
            <author initials="T." surname="Duong" fullname="Thai Duong">
              <organization/>
            </author>
            <author initials="J." surname="Rizzo" fullname="Juliano Rizzo">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="WEAKDH" target="https://dl.acm.org/doi/pdf/10.1145/2810103.2813707">
          <front>
            <title>Imperfect forward secrecy: How Diffie-Hellman fails in practice</title>
            <author initials="D." surname="Adrian">
              <organization/>
            </author>
            <author initials="K." surname="Bhargavan">
              <organization/>
            </author>
            <author initials="Z." surname="Durumeric">
              <organization/>
            </author>
            <author initials="P." surname="Gaudry">
              <organization/>
            </author>
            <author initials="M." surname="Green">
              <organization/>
            </author>
            <author initials="J. A." surname="Halderman">
              <organization/>
            </author>
            <author initials="N." surname="Heninger">
              <organization/>
            </author>
            <author initials="D." surname="Springall">
              <organization/>
            </author>
            <author initials="E." surname="ThomÃ©">
              <organization/>
            </author>
            <author initials="L." surname="Valenta">
              <organization/>
            </author>
            <author initials="B." surname="VanderSloot">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="FREAK" target="https://inria.hal.science/hal-01114250/file/messy-state-of-the-union-oakland15.pdf">
          <front>
            <title>A messy state of the union: Taming the composite state machines of TLS</title>
            <author initials="B." surname="Beurdouche" fullname="Benjamin Beurdouche">
              <organization/>
            </author>
            <author initials="K." surname="Bhargavan" fullname="Karthikeyan Bhargavan">
              <organization/>
            </author>
            <author initials="A." surname="Delignat-Lavaud" fullname="Antoine Delignat-Lavaud">
              <organization/>
            </author>
            <author initials="C." surname="Fournet" fullname="CÃ©dric Fournet">
              <organization/>
            </author>
            <author initials="M." surname="Kohlweiss" fullname="Markulf Kohlweiss">
              <organization/>
            </author>
            <author initials="A." surname="Pironti" fullname="Alfredo Pironti">
              <organization/>
            </author>
            <author initials="P.-Y." surname="Strub" fullname="Pierre-Yves Strub">
              <organization/>
            </author>
            <author initials="J. K." surname="Zinzindohoue" fullname="Jean Karim Zinzindohoue">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="SLOTH" target="https://inria.hal.science/hal-01244855/file/SLOTH_NDSS16.pdf">
          <front>
            <title>Transcript collision attacks: Breaking authentication in TLS, IKE, and SSH</title>
            <author initials="K." surname="Bhargavan" fullname="Karthikeyan Bhargavan">
              <organization/>
            </author>
            <author initials="G." surname="Leurent" fullname="GaÃ«tan Leurent">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
