{"_id":"doc-en-7710bis-48500f403665707bf0adb980d8658e32f600742b5c4ac6402f31f18024247c36","title":"","text":"interacting with the captive portal is out of scope of this document. [ This document is being collaborated on in Github at: https://github.com/wkumari/draft-ekwk-capport-rfc7710bis. The most recent version of the document, open issues, etc should all be available here. The authors (gratefully) accept pull requests. Text in square brackets will be removed before publication. ] https://github.com/capport-wg/7710bis. The most recent version of the document, open issues, etc should all be available here. The authors (gratefully) accept pull requests. Text in square brackets will be removed before publication. ] 1."}
{"_id":"doc-en-7710bis-38a4ba2618e231c1664aebac3d4a8df58075b9ba642db8638ae669c31c2be28c","title":"","text":"If the URIs learned via more than one option described in option are not all identical, this condition should be logged for the device owner or administrator. URI precedence in this situation is not specified by this document. owner or administrator. Implementations can select their own precedence order. 4."}
{"_id":"doc-en-7710bis-580358142a85b72ad3b13b070923f6b2e281661fa7eb12e327e6c2ba728a1020","title":"","text":"credentials, etc. By handing out a URI using which is protected with TLS, the captive portal operator can attempt to reassure the user that the captive portal is not malicious. Operating systems should conduct all interactions with the API in a sand-boxed environment and with a configuration that minimizes tracking risks. "}
{"_id":"doc-en-ace-dtls-profile-70f22237606eea8447c345da2a0805cd555933fd2c1df882c14d50b93a9eaf10","title":"","text":"but not the requested action. The client cannot always know a priori if an Authorized Resource Request will succeed. If the client repeatedly gets error responses containing AS Creation Hints (cf. Section 5.1.2 of I-D.ietf-ace- oauth-authz as response to its requests, it SHOULD request a new access token from the authorization server in order to continue communication with the resource server. Request will succeed. It must check the validity of its keying material before sending a request or processing a response. If the client repeatedly gets error responses containing AS Creation Hints (cf. Section 5.1.2 of I-D.ietf-ace-oauth-authz as response to its requests, it SHOULD request a new access token from the authorization server in order to continue communication with the resource server. Unauthorized requests that have been received over a DTLS session SHOULD be treated as non-fatal by the RS, i.e., the DTLS session"}
{"_id":"doc-en-ace-oauth-08049362d630954d34f7b62c72e45e6d16a1fa7bef068dc18bb5e37d95337963","title":"","text":"if the token is later transferred over an insecure connection (e.g. when it is sent to the authz-info endpoint). Developers MUST ensure that the ephemeral credentials (i.e., the private key or the session key) are not leaked to third parties. An adversary in possession of the ephemeral credentials bound to the access token will be able to impersonate the client. Be aware that this is a real risk with many constrained environments, since adversaries can often easily get physical access to the devices and therefore use phyical extraction techniques to gain access to memory contents. This risk can also be mitigated to some extent by making sure that keys are refreshed more frequently. Care must by taken by developers to prevent leakage of the PoP credentials (i.e., the private key or the symmetric key). An adversary in possession of the PoP credentials bound to the access token will be able to impersonate the client. Be aware that this is a real risk with many constrained environments, since adversaries may get physical access to the devices and can therefore use phyical extraction techniques to gain access to memory contents. This risk can be mitigated to some extent by making sure that keys are refreshed frequently, by using software isolation techniques and by using hardware security. 6.3."}
{"_id":"doc-en-ack-frequency-d59a475af656d784067b1d71c8c945c19be6744e6e1b94a53b08e4119e0c22ef","title":"","text":"9. There are tradeoffs inherent in a sender sending an ACK_FREQUENCY frame to the receiver. As such it is recommended that implementers experiment with different strategies and find those which best suit their applications and congestion controllers. There are, however, noteworthy considerations when devising strategies for sending ACK_FREQUENCY frames. This section provides some guidance on a sender's choice of acknowledgment frequency and discusses some additional considerations. Implementers can select an appropriate strategy to meet the needs of their applications and congestion controllers. 9.1. A sender relies on receipt of acknowledgements to determine the amount of data in flight and to detect losses, e.g. when packets experience reordering, see QUIC-RECOVERY. Consequently, how often a receiver sends acknowledgments determines how long it takes for losses to be detected at the sender. A sender needs to be responsive to notifications of congestion, such as a packet loss or an ECN CE marking. Also, window-based congestion controllers that strictly adhere to packet conservation, such as the one defined in QUIC-RECOVERY, rely on receipt of acknowledgments to send additional data into the network, and will suffer degraded performance if acknowledgments are delayed excessively. To enable a sender to respond to potential network congestion, a sender SHOULD cause a receiver to send an acknowledgement at least once per RTT if there are unacknowledged ack-eliciting packets in flight. A sender can accomplish this by sending an IMMEDIATE_ACK frame once per round-trip time (RTT), or it can set the Ack-Eliciting Threshold and Request Max Ack Delay values to be no more than a congestion window and an estimated RTT, respectively. 9.2. Many congestion control algorithms have a startup mechanism during the beginning phases of a connection. It is typical that in this period the congestion controller will quickly increase the amount of data in the network until it is signalled to stop. While the mechanism used to achieve this increase varies, acknowledgments by the peer are generally critical during this phase to drive the congestion controller's machinery. A sender can send ACK_FREQUENCY frames while its congestion controller is in this state, ensuring that the receiver will send acknowledgments at a rate which is optimal for the the sender's congestion controller. Receiving an acknowledgement can allow a sender to release new packets into the network. If a sender is designed to rely on the timing of peer acknowledgments (\"ACK clock\"), delaying acknowledgments can cause undesirable bursts of data into the network. A sender MUST limit such bursts. In keeping with Section 7.7 of QUIC-RECOVERY, a sender can either employ pacing or cause a receiver to send an acknowledgement for at least each initial congestion window of received data. 9.3. Congestion controllers that are purely window-based and strictly adherent to packet conservation, such as the one defined in QUIC- RECOVERY, rely on receipt of acknowledgments to move the congestion window forward and send additional data into the network. Such controllers will suffer degraded performance if acknowledgments are delayed excessively. Similarly, if these controllers rely on the timing of peer acknowledgments (an \"ACK clock\"), delaying acknowledgments will cause undesirable bursts of data into the network. Acknowledgements are fundamental to reliability in QUIC. Consequently, delaying or reducing the frequency of acknowledgments can cause loss detection at the sender to be delayed. A QUIC sender detects loss using packet thresholds on receiving an acknowledgement (Section 6.1.1 of QUIC-RECOVERY); delaying the acknowledgement therefore delays this method of detecting losses. Reducing acknowledgement frequency reduces the number of RTT samples that a sender receives (Section 5 of QUIC-RECOVERY), making a sender's RTT estimate less responsive to changes in the path's RTT. As a result, any mechanisms that rely on an accurate RTT estimate, such as time-threshold loss detection (Section 6.1.2 of QUIC- RECOVERY) or Probe Timeout (Section 6.2 of QUIC-RECOVERY), will be less responsive to changes in the path's RTT, resulting in either delayed or unnecessary packet transmissions. To limit these consequences of reduced acknowledgement frequency, a sender SHOULD cause a receiver to send an acknowledgement at least once per RTT if there are unacknowledged ack-eliciting packets in flight. A sender can accomplish this by sending an IMMEDIATE_ACK frame once per round-trip time (RTT), or it can set the Ack-Eliciting Threshold and Request Max Ack Delay values to be no more than a congestion window and an estimated RTT, respectively. A sender might use timers to detect loss of PMTUD probe packets. A sender SHOULD bundle an IMMEDIATE_ACK frame with any PTMUD probes to avoid triggering such timers. 9.4."}
{"_id":"doc-en-ack-frequency-43995c256487fd85b8d59b5f799cc5fbf1ae1b059d246f7f041720d8de2baf0b","title":"","text":"connection SHOULD update and send a new ACK_FREQUENCY frame immediately upon confirmation of connection migration. 9.5. A sender might use timers to detect loss of PMTUD probe packets. A sender SHOULD bundle an IMMEDIATE_ACK frame with any PTMUD probes to avoid triggering such timers. 10. TBD."}
{"_id":"doc-en-ack-frequency-9c610b43bf20599e90e1e42adda67c69435ab6dac1ca918af21eadf4b728da83","title":"","text":"6.3. For performance reasons, an endpoint can receive incoming packets from the underlying platform in a batch of multiple packets. This batch can contain enough packets to cause multiple acknowledgements to be sent. To avoid sending multiple acknowledgements in rapid succession, an endpoint can process all packets in a batch before determining whether to send an ACK frame in response, as stated in Section 13.2.2"}
{"_id":"doc-en-ack-frequency-dd8333d43f7f23496e9a7631caf5b2a00dba3ee0aa04ca5d25e3b96781157a16","title":"","text":"number of acknowledgments allows connection throughput to scale much further. Unfortunately, there are undesirable consequences to simply reducing the acknowledgement frequency, especially to an arbitrary fixed value, as follows: A sender relies on receipt of acknowledgements to determine the amount of data in flight and to detect losses, see QUIC-RECOVERY. Consequently, how often a receiver sends acknowledgments dictates how long it takes for losses to be detected at the sender. Starting a connection up quickly without inducing excess queue is important for latency reduction, for both short and long flows. The sender often needs more frequent acknowledgments during this phase. Congestion controllers that are purely window based and strictly adherent to packet conservation, such as the one defined in QUIC- RECOVERY, rely on receipt of acknowledgments to move the congestion window forward and release additional data. Such controllers suffer performance penalties when acknowledgements are not sent frequently enough. On the other hand, for long-running flows, congestion controllers that are not window-based, such as BBR, can perform well with very few acknowledgements per RTT. New sender startup mechanisms will need a way for the sender to increase the frequency of acknowledgements when fine-grained feedback is required. As discussed in implementation, there are undesirable consequences to congestion control and loss recovery if a receiver uniltaerally reduces the acknowledgment frequency. Consequently, a sender needs the ability to express its constraints on the acknowledgement frequency to maximize congestion controller performance. QUIC-TRANSPORT currently specifies a simple delayed acknowledgement mechanism that a receiver can use: send an acknowledgement for every"}
{"_id":"doc-en-ack-frequency-f483dcf8056942dcb2714f09497f2bc4ff719cddae7b49d223674c07cad2fa60","title":"","text":"8. TBD. There are tradeoffs inherent in a sender sending an ACK_FREQUENCY frame to the receiver. As such it is recommended that implementers experiment with different strategies and find those which best suit their applications and congestion controllers. There are, however, noteworthy considerations when devising strategies for sending ACK_FREQUENCY frames. 8.1. A sender relies on receipt of acknowledgements to determine the amount of data in flight and to detect losses, e.g. when packets experience reordering, see QUIC-RECOVERY. Consequently, how often a receiver sends acknowledgments determines how long it takes for losses to be detected at the sender. 8.2. Many congestion control algorithms have a startup mechanism during the beginning phases of a connection. It is typical that in this period the congestion controller will quickly increase the amount of data in the network until it is signalled to stop. While the mechanism used to achieve this increase varies, acknowledgments by the peer are generally critical during this phase to drive the congestion controller's machinery. A sender can send ACK_FREQUENCY frames while its congestion controller is in this state, ensuring that the receiver will send acknowledgments at a rate which is optimal for the the sender's congestion controller. 8.3. Congestion controllers that are purely window-based and strictly adherent to packet conservation, such as the one defined in QUIC- RECOVERY, rely on receipt of acknowledgments to move the congestion window forward and send additional data into the network. Such controllers will suffer degraded performance if acknowledgments are delayed excessively. Similarly, if these controllers rely on the timing of peer acknowledgments (an \"ACK clock\"), delaying acknowledgments will cause undesirable bursts of data into the network. 9. TBD. 10. TBD. "}
{"_id":"doc-en-ack-frequency-3c6426239f5bf093f189c84711b808982e2aafc28c308aee69b7ea8b040e545d","title":"","text":"receivers to ignore obsolete frames, see multiple-frames. A variable-length integer representing the maximum number of ack- eliciting packets after which the receiver sends an acknowledgement. A value of 1 will result in an acknowledgement being sent for every ack-eliciting packet received. A value of 0 is invalid. Receipt of an invalid value MUST be treated as a connection error of type FRAME_ENCODING_ERROR. If an endpoint receives an ACK-eliciting threshold value that is larger than the maximum value it can represent, the endpoint MUST use the largest representable value instead. eliciting packets the recipient of this frame can receive before sending an immediate acknowledgment. A value of 0 will result in an immediate acknowledgement whenever an ack-eliciting packet received. If an endpoint receives an ACK-eliciting threshold value that is larger than the maximum value it can represent, the endpoint MUST use the largest representable value instead. A variable-length integer representing the value to which the endpoint requests the peer update its \"max_ack_delay\""}
{"_id":"doc-en-ack-frequency-16a70dded432bf3c96bb920923dd5961f0de3df50beff8a8c3b89479bd1723ef","title":"","text":"Every time an acknowledgement is sent, bundled or otherwise, all counters and timers related to delaying of acknowledgments are reset. The receiver of an ACK_FREQUENCY frame can continue to process multiple available packets before determining whether to send an ACK frame in response, as stated in Section 13.2.2 of QUIC-TRANSPORT. 6.1. As specified in Section 13.2.1 of QUIC-TRANSPORT, endpoints are"}
{"_id":"doc-en-ack-frequency-20b9d11bbec64a70d6cf29b73c5e9fb1d1e48136aa4e96816db876c7d6ac8061","title":"","text":"6. The IMMEDIATE_ACK Frame is a frame which causes the peer to send a packet containing an ACK frame immediately, similar to the receipt of Initial and Handshake packets during the QUIC handshake. Receivers of the IMMEDIATE_ACK frame MAY choose to delay sending the ACK if the vast majority of received packets contain an IMMEDIATE_ACK or the receiver is under heavy load. Senders MAY include multiple IMMEDIATE_ACK frames in a single QUIC packet, but the behavior is identical to a single IMMEDIATE_ACK frame. 7. Prior to receiving an ACK_FREQUENCY frame, endpoints send acknowledgements as specified in Section 13.2.1 of QUIC-TRANSPORT."}
{"_id":"doc-en-ack-frequency-9f32177466dfc8f117956a1efc826dc9a74282fa7183181014040a42a7a4c3ee","title":"","text":"multiple available packets before determining whether to send an ACK frame in response, as stated in Section 13.2.2 of QUIC-TRANSPORT. 6.1. 7.1. As specified in Section 13.2.1 of QUIC-TRANSPORT, endpoints are expected to send an acknowledgement immediately on receiving a"}
{"_id":"doc-en-ack-frequency-f5f2a6f3af2b315837a3844c6932fc8b6cf3475451c24550f7c4267ab6c67e99","title":"","text":"instead continues to use the peer's \"Ack-Eliciting Threshold\" and \"max_ack_delay\" thresholds for sending acknowledgements. 6.2. 7.2. As specified in Section 13.2.1 of QUIC-TRANSPORT, an endpoint SHOULD immediately acknowledge packets marked with the ECN Congestion Experienced (CE) codepoint in the IP header. Doing so reduces the peer's response time to congestion events. 6.3. 7.3. For performance reasons, an endpoint can receive incoming packets from the underlying platform in a batch of multiple packets. This"}
{"_id":"doc-en-ack-frequency-b80e089a1ba458e0c1d80ed2308afbd5840110a522ee19a5b7d382a6d2f7fac0","title":"","text":"whether a threshold has been met and an acknowledgement is to be sent in response. 7. 8. On sending an update to the peer's \"max_ack_delay\", an endpoint can use this new value in later computations of its Probe Timeout (PTO)"}
{"_id":"doc-en-ack-frequency-6e21552f9409b0de9741eeca14b722bec641eb21531d6ba22447d0f7b9f8d92e","title":"","text":"optimization requires some care in implementation, since it can cause premature PTOs under packet loss when \"ignore_order\" is enabled. 8. 9. There are tradeoffs inherent in a sender sending an ACK_FREQUENCY frame to the receiver. As such it is recommended that implementers"}
{"_id":"doc-en-ack-frequency-488be67ea3201ac4436f15f6dc395421a8a157f26d01598df1ab7fc570148d3a","title":"","text":"noteworthy considerations when devising strategies for sending ACK_FREQUENCY frames. 8.1. 9.1. A sender relies on receipt of acknowledgements to determine the amount of data in flight and to detect losses, e.g. when packets"}
{"_id":"doc-en-ack-frequency-991ea77c531e978e63e652113cbee5c26226886f2ef957a84c5d8aa884df2427","title":"","text":"receiver sends acknowledgments determines how long it takes for losses to be detected at the sender. 8.2. 9.2. Many congestion control algorithms have a startup mechanism during the beginning phases of a connection. It is typical that in this"}
{"_id":"doc-en-ack-frequency-d90bff6bb0bbc54c2e1b74a2772c3551bcecfbd605f99911b54cff2f39805658","title":"","text":"that the receiver will send acknowledgments at a rate which is optimal for the the sender's congestion controller. 8.3. 9.3. Congestion controllers that are purely window-based and strictly adherent to packet conservation, such as the one defined in QUIC-"}
{"_id":"doc-en-ack-frequency-999fc3bec3f73bf7d233cb51998b6a1efc613fd38a51bceee22a54d6d2361fcd","title":"","text":"acknowledgments will cause undesirable bursts of data into the network. 9. 10. TBD. 10. 11. TBD. 11. References 12. References 11.1. URIs 12.1. URIs [1] https://mailarchive.ietf.org/arch/search/?email_list=quic"}
{"_id":"doc-en-ack-frequency-4c01ec374bb6b793625f4e4c27da2bf00b99e32abc18aba6837d4cd20a8cca14","title":"","text":"Discussion of this draft takes place on the QUIC working group mailing list (quic@ietf.org), which is archived at https://mailarchive.ietf.org/arch/search/?email_list=quic [1]. Source code and issues list for this draft can be found at https://github.com/quicwg/ack-frequency [2]. . Source code and issues list for this draft can be found at . Working Group information can be found at https://github.com/quicwg [3]; Working Group information can be found at . 1."}
{"_id":"doc-en-ack-frequency-ae7c342f1f4195110c2d4a45b7d63dc149b13b1b4032961ab1a3aecbd2b9351c","title":"","text":"11. TBD. 12. References 12.1. URIs [1] https://mailarchive.ietf.org/arch/search/?email_list=quic [2] https://github.com/quicwg/ack-frequency [3] https://github.com/quicwg "}
{"_id":"doc-en-ack-frequency-03720f2fba3276d110198ec4ebb10066eec3f5422e9b0a0bc874cf489954163d","title":"","text":"QUIC-TRANSPORT currently specifies a simple delayed acknowledgement mechanism that a receiver can use: send an acknowledgement for every other packet, and for every packet when reordering is observed. This simple mechanism does not allow a sender to signal its constraints. This extension provides a mechanism to solve this problem. other packet, and for every packet that is received out of order (Section 13.2.1 of QUIC-TRANSPORT). This simple mechanism does not allow a sender to signal its constraints. This extension provides a mechanism to solve this problem. 3."}
{"_id":"doc-en-ack-frequency-13a45edb1a7e511cf36b6c7bfdab55d459bbe159c4cab6234ea12135ca668f0c","title":"","text":"A 1-bit field representing a boolean truth value. This field is set to \"true\" by an endpoint that does not wish to receive an immediate acknowledgement when the peer observes reordering (reordering). 0 represents 'false' and 1 represents 'true'. immediate acknowledgement when the peer receives a packet out of order (out-of-order). 0 represents 'false' and 1 represents 'true'. A 1-bit field representing a boolean truth value. This field is set to \"true\" by an endpoint that does not wish to receive an immediate acknowledgement when the peer receives CE-marked packets (reordering). 0 represents 'false' and 1 represents 'true'. (out-of-order). 0 represents 'false' and 1 represents 'true'. ACK_FREQUENCY frames are ack-eliciting. However, their loss does not require retransmission if an ACK_FREQUENCY frame with a larger"}
{"_id":"doc-en-ack-frequency-acbef2829c2175cdf8e86ec0bddba4c96e81e3cfa4a33ebce426055a6822f5ed","title":"","text":"Since the last acknowledgement was sent, \"max_ack_delay\" amount of time has passed. reordering, congestion, and batch describe exceptions to this out-of-order, congestion, and batch describe exceptions to this strategy. An endpoint is expected to bundle acknowledgements when possible."}
{"_id":"doc-en-acme-a35ec6c275346372996be9c72ad58e205b38a94356292e7a7259590c8883fc10","title":"","text":"Different challenges allow the server to obtain proof of different aspects of control over an identifier. In some challenges, like HTTP and TLS SNI, the client directly proves its ability to do certain things related to the identifier. In the Proof of Possession challenge, the client proves historical control of the identifier, by reference to a prior authorization transaction or certificate. The choice of which challenges to offer to a client under which circumstances is a matter of server policy. A CA may choose different sets of challenges depending on whether it has interacted with a domain before, and how. For example: New domain with no known certificates: Domain Validation (HTTP or TLS SNI) Domain for which known certs exist from other CAs: DV + Proof of Possession of previous CA-signed key Domain with a cert from this CA, lost account key: DV + PoP of ACME-certified Subject key Domain with a cert from this CA, all keys and recovery mechanisms lost: Out of band proof of authority for the domain things related to the identifier. The choice of which challenges to offer to a client under which circumstances is a matter of server policy. The identifier validation challenges described in this section all relate to validation of domain names. If ACME is extended in the"}
{"_id":"doc-en-acme-8e0dda770f730c3c7159d31d40e8574d628c9cc720ae57905e939550dcbe2ac1","title":"","text":"7.4. The Proof of Possession challenge verifies that a client possesses a private key corresponding to a server-specified public key, as demonstrated by its ability to sign with that key. This challenge is meant to be used when the server knows of a public key that is already associated with the identifier being claimed, and wishes for new authorizations to be authorized by the holder of the corresponding private key. For DNS identifiers, for example, this can help guard against domain hijacking. This method is useful if a server policy calls for issuing a certificate only to an entity that already possesses the subject private key of a particular prior related certificate (perhaps issued by a different CA). It may also help enable other kinds of server policy that are related to authenticating a client's identity using digital signatures. This challenge proceeds in much the same way as the proof of possession of the authorized key pair in the main ACME flow (challenge + authorizationRequest). The server provides a nonce and the client signs over the nonce. The main difference is that rather than signing with the private key of the key pair being authorized, the client signs with a private key specified by the server. The server can specify which key pair(s) are acceptable directly (by indicating a public key), or by asking for the key corresponding to a certificate. The server provides the following fields as part of the challenge: The string \"proof-of-possession-01\" An array of certificates, in base64url-encoded DER format, that contain acceptable public keys. In response to this challenge, the client uses the private key corresponding to one of the acceptable public keys to sign a JWS object including data related to the challenge. The validation object covered by the signature has the following fields: The string \"proof-of-possession\" A list of identifiers for which the holder of the prior key authorizes the new key The client's account public key This JWS is NOT REQUIRED to have a \"nonce\" header parameter (as with the JWS objects that carry ACME request objects). This allows proof- of-possession response objects to be computed off-line. For example, as part of a domain transfer, the new domain owner might require the old domain owner to sign a proof-of-possession validation object, so that the new domain owner can present that in an ACME transaction later. The validation JWS MUST contain a \"jwk\" header parameter indicating the public key under which the server should verify the JWS. The client's response includes the server-provided nonce, together with a signature over that nonce by one of the private keys requested by the server. The string \"proof-of-possession\" The validation JWS To validate a proof-of-possession challenge, the server performs the following steps: Verify that the public key in the \"jwk\" header of the \"authorization\" JWS corresponds to one of the certificates in the \"certs\" field of the challenge Verify the \"authorization\" JWS using the key indicated in its \"jwk\" header Decode the payload of the JWS as UTF-8 encoded JSON Verify that there are exactly three fields in the decoded object, and that: * The \"type\" field is set to \"proof-of-possession\" * The \"identifier\" field contains the identifier for which authorization is being validated * The \"accountKey\" field matches the account key for which the challenge was issued If all of the above verifications succeed, then the validation is successful. Otherwise, the validation fails. 7.5. When the identifier being validated is a domain name, the client can prove control of that domain by provisioning a resource record under it. The DNS challenge requires the client to provision a TXT record"}
{"_id":"doc-en-acme-ba022a375b42ab4523c78106e7bdc28973a5849a1f1c9215ef92b0dcb70044c6","title":"","text":"DNS: The MAC covers the account key, and the MAC key is derived from an ECDH public key signed with the account private key. Proof of possession of a prior key: The signature by the prior key covers the account public key. The association of challenges to identifiers is typically done by requiring the client to perform some action that only someone who effectively controls the identifier can perform. For the challenges"}
{"_id":"doc-en-acme-9ae3e85dbfc3d4b754f00477f8768ef6135dc7c184f56c7480760e1677bd27ae","title":"","text":"DNS: Provision DNS resource records for the domain Proof of possession of a prior key: Sign using the private key specified by the server There are several ways that these assumptions can be violated, both by misconfiguration and by attack. For example, on a web server that allows non-administrative users to write to .well-known, any user can"}
{"_id":"doc-en-acme-7e30a7b5f4cc5c2a16d8dd437f01c98f5f07dfa5f1bd476dabd489ec2e4d2ac0","title":"","text":"process, by performing normal ACME transactions and providing a validation response for his own account key. The risks due to hosting providers noted above are a particular case. For identifiers where the server already has some credential associated with the domain this attack can be prevented by requiring the client to complete a proof-of-possession challenge. where the server already has some public key associated with the domain this attack can be prevented by requiring the client to prove control of the corresponding private key. 10.3."}
{"_id":"doc-en-acme-cb784711dc387298e4e4505b71083afe6d3eddd86f3ffaf6428e7d6244bc1965","title":"","text":"any web server that is accessible to the ACME server, even if it is not accessible to the ACME client. The risk of SSRF through this channel is limited by the fact that the attacker can only control the domain of the URL, not the path. Nonetheless, in order to further limit the SSRF risk, ACME server operators should ensure that validation queries can only be sent to servers on the public Internet, and not, say, web services within the server operator's internal network. Since the attacker could make requests to these public servers himself, he can't gain anything extra through an SSRF attack on ACME aside from a layer of anonymization. It might seem that the risk of SSRF through this channel is limited by the fact that the attacker can only control the domain of the URL, not the path. However, if the attacker first sets the domain to one they control, then they can send the server an HTTP redirect (e.g., a 302 response) which will cause the server to query an arbitrary URI. In order to further limit the SSRF risk, ACME server operators should ensure that validation queries can only be sent to servers on the public Internet, and not, say, web services within the server operator's internal network. Since the attacker could make requests to these public servers himself, he can't gain anything extra through an SSRF attack on ACME aside from a layer of anonymization. 9.5."}
{"_id":"doc-en-acme-c0e02156da16c2c01c60f70a7105ac6f6fc768e06c3490a80831a69b53ba65a2","title":"","text":"The JWK representation of the new key Both of these thumbprints MUST be computed as specified in RFC7638, using the SHA-256 digest. The values in the \"oldKey\" and \"newKey\" fields MUST be the base64url encodings of the thumbprints. The client then encapsulates the key-change object in a JWS, signed with the client's current account key (i.e., the key matching the \"oldKey\" value)."}
{"_id":"doc-en-acme-d3eca824ea11ac7584059a2818b9a4068c2e551d997f03f79f47d8eebf4b6193","title":"","text":"MUST be the exact string provided in the Location header field in response to the new-registration request that created the account. The JWK representation of the original key (i.e., the client's current account key) The JWK representation of the new key The client then encapsulates the key-change object in a JWS, signed"}
{"_id":"doc-en-acme-3a1f0d0e21efb605faa8f3a8efdb2ed03b86965e6a099bec1a67e8433e3e5e88","title":"","text":"Check that the \"account\" field of the key-change object contains the URL for the registration matching the old key Check that the \"oldKey\" field of the key-change object contains the current account key. Check that the \"newKey\" field of the key-change object contains the key used to sign the inner JWS."}
{"_id":"doc-en-acme-99da82f262c7de9025fba4ff88a974786c8d699ef32217998a1bf6385687ed3f","title":"","text":"6.3.2. The server MAY require a value to be present for the \"external- account-binding\" field. This can be used to an ACME account with an existing account in a non-ACME system, such as a CA customer database. To enable ACME account binding, a CA needs to provision the ACME client with a MAC key and a key identifier. The key identifier MUST be an ASCII string. The MAC key SHOULD be provided in base64url- encoded form, to maximize compatibility between provisioning systems and ACME clients. The ACME client then computes a binding JWS to indicate the external account's approval of the ACME account key. The payload of this JWS is the account key being registered, in JWK form. The protected header of the JWS MUST meet the following criteria: The \"alg\" field MUST indicate a MAC-based algorithm The \"kid\" field MUST contain the key identifier provided by the CA The \"nonce\" field MUST NOT be present The \"url\" field MUST be set to the same value as the outer JWS The \"signature\" field of the JWS will contain the MAC value computed with the MAC key provided by the CA. When a CA receives a new-registration request containing an \"external-account-binding\" field, it must decide whether or not to verify the binding. If the CA does not verify the binding, then it MUST NOT reflect the \"external-account-binding\" field in the resulting account object (if any). To verify the account binding, the CA MUST take the following steps: Verify that the value of the field is a well-formed JWS Verify that the JWS protected meets the above criteria Retrieve the MAC key corresponding to the key identifier in the \"kid\" field Verify that the MAC on the JWS verifies using that MAC key Verify that the payload of the JWS represents the same key as was used to verify the outer JWS (i.e., the \"jwk\" field of the outer JWS) If all of these checks pass and the CA creates a new account, then the CA may consider the new account associated with the external account corresponding to the MAC key, and MUST reflect value of the \"external-account-binding\" field in the resulting account object. If any of these checks fail, then the CA MUST reject the new- registration request. 6.3.3. A client may wish to change the public key that is associated with a account in order to recover from a key compromise or proactively mitigate the impact of an unnoticed key compromise."}
{"_id":"doc-en-acme-6c306207f01dd7c131a267eb6c6f9389b03b44b007108c6465e198c78f1429a0","title":"","text":"responds with an error status code and a problem document describing the error. 6.3.3. 6.3.4. A client may deactivate an account by posting a signed update to the server with a status field of \"deactivated.\" Clients may wish to do"}
{"_id":"doc-en-acme-e5aa6159a406cbacaf582eb6a2101d19fa99fb43b0460664e753a328a92725d0","title":"","text":"attacker from guessing it. It MUST NOT contain any characters outside the URL-safe Base64 alphabet. Number of tls-sni-01 iterations A client responds to this challenge by constructing a key authorization from the \"token\" value provided in the challenge and the client's account key. The client first computes the SHA-256 digest Z0 of the UTF8-encoded key authorization, and encodes Z0 in UTF-8 lower-case hexadecimal form. The client then generates iterated hash values Z1...Z(n-1) as follows: The client generates a self-signed certificate for each iteration of Zi with a single subjectAlternativeName extension dNSName that is \"..acme.invalid\", where \"Zi[0:32]\" and \"Zi[32:64]\" represent the first 32 and last 32 characters of the hex- encoded value, respectively (following the notation used in Python). The client then configures the TLS server at the domain such that when a handshake is initiated with the Server Name Indication extension set to \"..acme.invalid\", the corresponding generated certificate is presented. the client's account key. The client computes the SHA-256 digest Z of the UTF8-encoded key authorization, and encodes Z in UTF-8 lower- case hexadecimal form. The client generates a self-signed certificate for with a single subjectAlternativeName extension dNSName that is \"..acme.invalid\", where \"Z[0:32]\" and \"Z[32:64]\" represent the first 32 and last 32 characters of the hex-encoded value, respectively (following the notation used in Python). The client then configures the TLS server at the domain such that when a handshake is initiated with the Server Name Indication extension set to \"..acme.invalid\", the corresponding generated certificate is presented. The response to the TLS SNI challenge simply acknowledges that the client is ready to fulfill this challenge."}
{"_id":"doc-en-acme-a0b0ab8f5edb857831c87b8164133581bd3c9ea1da5a19571357bf0d76957afe","title":"","text":"Given a Challenge/Response pair, the ACME server verifies the client's control of the domain by verifying that the TLS server was configured appropriately. Choose a subset of the N iterations to check, according to local policy. configured appropriately, using these steps: For each iteration, compute the Zi-value from the key authorization in the same way as the client. Compute the Z-value from the key authorization in the same way as the client. Open a TLS connection to the domain name being validated on the requested port, presenting the value \"..acme.invalid\" in the SNI field (where the \"..acme.invalid\" in the SNI field (where the comparison is case-insensitive). Verify that the certificate contains a subjectAltName extension"}
{"_id":"doc-en-acme-db7c251125fe94388dc314cb12812e0a7b4a8845324940eb0ae247675e210cb1","title":"","text":"no other dNSName entries of the form \"*.acme.invalid\" are present in the subjectAltName extension. It is RECOMMENDED that the ACME server verify a random subset of the N iterations with an appropriate sized to ensure that an attacker who can provision certs for a default virtual host, but not for arbitrary simultaneous virtual hosts, cannot pass the challenge. For instance, testing a subset of 5 of N=25 domains ensures that such an attacker has only a one in 25/5 chance of success if they post certs Zn in random succession. (This probability is enforced by the requirement that each certificate have only one Zi value.) It is RECOMMENDED that the ACME server validation TLS connections from multiple vantage points to reduce the risk of DNS hijacking attacks."}
{"_id":"doc-en-acme-78eb1e6fa4ef64b7fd2a75f55429d411c55aa192f89c2dc0e916353d375e71fe","title":"","text":"This registry lists field names that are defined for use in ACME order objects. Fields marked as \"client configurable\" may be included in a new-account request. included in a new-order request. Template:"}
{"_id":"doc-en-acme-49338d8fd980b5bfe7a93e0b2a237df458748cc18ac97030dd1487ba5325048f","title":"","text":"Each ACME function is accomplished by the client sending a sequence of HTTPS requests to the server, carrying JSON messages RFC7159. Use of HTTPS is REQUIRED. Clients SHOULD support HTTP public key pinning RFC7469, and servers SHOULD emit pinning headers. Each subsection of certificate-management below describes the message formats used by the function and the order in which messages are sent. of HTTPS is REQUIRED. Each subsection of certificate-management below describes the message formats used by the function and the order in which messages are sent. In most HTTPS transactions used by ACME, the ACME client is the HTTPS client and the ACME server is the HTTPS server. The ACME server acts"}
{"_id":"doc-en-acme-0fb797e5692b7a9009d6a2abc5ec384f76cd6be0f2f4cca853bf42417ebecce8","title":"","text":"As noted above, DNS forgery attacks against the ACME server can result in the server making incorrect decisions about domain control and thus mis-issuing certificates. Servers SHOULD verify DNSSEC when it is available for a domain. When DNSSEC is not available, servers SHOULD perform DNS queries over TCP, which provides better resistance to some forgery attacks than DNS over UDP. and thus mis-issuing certificates. Servers SHOULD perform DNS queries over TCP, which provides better resistance to some forgery attacks than DNS over UDP. An ACME-based CA will often need to make DNS queries, e.g., to validate control of DNS names. Because the security of such validations ultimately depends on the authenticity of DNS data, every possible precaution should be taken to secure DNS queries done by the CA. It is therefore RECOMMENDED that ACME-based CAs make all DNS queries via DNSSEC-validating stub or recursive resolvers. This provides additional protection to domains which choose to make use of DNSSEC. An ACME-based CA must use only a resolver if it trusts the resolver and every component of the network route by which it is accessed. It is therefore RECOMMENDED that ACME-based CAs operate their own DNSSEC-validating resolvers within their trusted network and use these resolvers both for both CAA record lookups and all record lookups in furtherance of a challenge scheme (A, AAAA, TXT, etc.). 10.2."}
{"_id":"doc-en-acme-5f9583ec519bdc3afd8a301bb59bff7b040c06cf5c263ab262bfdb71c3f2ad8c","title":"","text":"the namespace used for the TLS-based challenge (the \"acme.invalid\" namespace for \"tls-sni-02\"). 10.3. An ACME-based CA will often need to make DNS queries, e.g., to validate control of DNS names. Because the security of such validations ultimately depends on the authenticity of DNS data, every possible precaution should be taken to secure DNS queries done by the CA. It is therefore RECOMMENDED that ACME-based CAs make all DNS queries via DNSSEC-validating stub or recursive resolvers. This provides additional protection to domains which choose to make use of DNSSEC. An ACME-based CA must use only a resolver if it trusts the resolver and every component of the network route by which it is accessed. It is therefore RECOMMENDED that ACME-based CAs operate their own DNSSEC-validating resolvers within their trusted network and use these resolvers both for both CAA record lookups and all record lookups in furtherance of a challenge scheme (A, AAAA, TXT, etc.). 11. References 11.1. URIs"}
{"_id":"doc-en-acme-aeef520bfea991165843585cbe7993be39711141dc221885c48e930420955826","title":"","text":"other certificate management functions, such as certificate revocation. DISCLAIMER: This is a work in progress draft of ACME and has not yet had a thorough security analysis. RFC EDITOR: PLEASE REMOVE THE FOLLOWING PARAGRAPH: The source for this draft is maintained in GitHub. Suggested changes should be submitted as pull requests at https://github.com/ietf-wg-acme/acme"}
{"_id":"doc-en-acme-8d540229f31d7cc755b5efc88eef65f6987128b1477d3cef263d706d5b1b3a26","title":"","text":"7.3.5. The server MAY require a value to be present for the \"external- account-binding\" field. This can be used to an ACME account with an existing account in a non-ACME system, such as a CA customer database. account-binding\" field. This can be used to associate an ACME account with an existing account in a non-ACME system, such as a CA customer database. To enable ACME account binding, a CA needs to provision the ACME client with a MAC key and a key identifier. The key identifier MUST"}
{"_id":"doc-en-acme-f230d9b3e70fb8ea05ae7a1cb76caf54ee2d18db422fcaf9d435ac4df2e4a616","title":"","text":"In some cases, a CA running an ACME server might have a completely external, non-ACME process for authorizing a client to issue for an identifier. In these case, the CA should provision its ACME server identifier. In these cases, the CA should provision its ACME server with authorization objects corresponding to these authorizations and reflect them as already valid in any orders submitted by the client."}
{"_id":"doc-en-acme-2c48589fe3746fc3a85d7060b7a2ed464d7c410a6f7e8100c8597914c61a3bfb","title":"","text":"the \"challenges\" dictionary. The client sends these updates back to the server in the form of a JSON object with the response fields required by the challenge type, carried in a POST request to the challenge URL (not authorization URL) once it is ready for the server to attempt validation. JSON object with contents as specified by the challenge type, carried in a POST request to the challenge URL (not authorization URL) once it is ready for the server to attempt validation. For example, if the client were to respond to the \"http-01\" challenge in the above authorization, it would send the following request: The server updates the authorization document by updating its representation of the challenge with the response fields provided by representation of the challenge with the response object provided by the client. The server MUST ignore any fields in the response object that are not specified as response fields for this type of challenge. The server provides a 200 (OK) response with the updated challenge"}
{"_id":"doc-en-acme-b5867db7e19f5c8784be7db4265b07200e516ab37bc2760ab804b04931937c4c","title":"","text":"Clients SHOULD NOT respond to challenges until they believe that the server's queries will succeed. If a server's initial validation query fails, the server SHOULD retry the query after some time. While the server is still trying, the status of the challenge remains \"pending\"; it is only marked \"invalid\" once the server has given up. query fails, the server SHOULD retry the query after some time, in order to account for delay in setting up responses such as DNS records or HTTP resources. The precise retry schedule is up to the server, but server operators should keep in mind the operational scenarios that the schedule is trying to accommodate. Given that retries are intended to address things like propagation delays in HTTP or DNS provisioning, there should not usually be any reason to retry more often than every 5 or 10 seconds. While the server is still trying, the status of the challenge remains \"pending\"; it is only marked \"invalid\" once the server has given up. The server MUST provide information about its retry state to the client via the \"errors\" field in the challenge and the Retry-After"}
{"_id":"doc-en-acme-251dd234d8e3b169f04dd9297d976ad2a828a3af9583f0c5485dae4dec01cd50","title":"","text":"for a human user to navigate to. If the user chooses to complete this challenge (by visiting the website and completing its instructions), the client indicates this by sending a simple acknowledgement response to the server. The string \"oob-01\" acknowledgement response to the server. The payload of this response is an empty JSON object (\"{}\", or \"e30\" base64url-encoded). On receiving a response, the server MUST verify that the value of the \"type\" field is \"oob-01\". Otherwise, the steps the server takes to"}
{"_id":"doc-en-acme-94f1851af65b5c77eb0f8e267d48f4f1eedfba08a6efdb78b2d93a3694fb6aa6","title":"","text":"according to this encoding, then the verifier MUST reject the JWS as malformed. 5.6. Certain elements of the protocol will require the establishment of a shared secret between the client and the server, in such a way that an entity observing the ACME protocol cannot derive the secret. In these cases, we use a simple ECDH key exchange, based on the system used by CMS RFC5753: Inputs: Client-generated key pair Server-generated key pair Length of the shared secret to be derived Label Perform the ECDH primitive operation to obtain Z (Section 3.3.1 of SEC1) Select a hash algorithm according to the curve being used: For \"P-256\", use SHA-256 For \"P-384\", use SHA-384 For \"P-521\", use SHA-512 Derive the shared secret value using the KDF in Section 3.6.1 of SEC1 using Z and the selected hash algorithm, and with the UTF-8 encoding of the label as the SharedInfo value In cases where the length of the derived secret is shorter than the output length of the chosen hash algorithm, the KDF referenced above reduces to a single hash invocation. The shared secret is equal to the leftmost octets of the following: 6. In this section, we describe the certificate management functions"}
{"_id":"doc-en-acme-2b7071eb75e2f882d49748697f9cdc004a11ab020d310645713f487c0a070763","title":"","text":"registration, to allow a client to retrieve the \"new-authorization\" and \"terms-of-service\" URI 6.3.1. If the client wishes to establish a secret key with the server that it can use to recover this account later (a \"recovery key\"), then it must perform a simple key agreement protocol as part of the new- registration transaction. The client and server perform an ECDH exchange through the new-registration transaction (using the technique in key-agreement), and the result is the recovery key. To request a recovery key, the client includes a \"recoveryKey\" field in its new-registration request. The value of this field is a JSON object. The client's ECDH public key The length of the derived secret, in octets. In the client's request, this object contains a JWK for a random ECDH public key generated by the client and the client-selected length value. Clients need to choose length values that balance security and usability. On the one hand, a longer secret makes it more difficult for an attacker to recover the secret when it is used for recovery (see mac-based-recovery). On the other hand, clients may wish to make the recovery key short enough for a user to easily write it down. The server MUST validate that the elliptic curve (\"crv\") and length value chosen by the client are acceptable, and that it is otherwise willing to create a recovery key. If not, then it MUST reject the new-registration request. If the server agrees to create a recovery key, then it generates its own random ECDH key pair and combines it with the client's public key as described in key-agreement above, using the label \"recovery\". The derived secret value is the recovery key. The server then returns to the client the ECDH key that it generated. The server MUST generate a fresh key pair for every transaction. The server's ECDH public key On receiving the server's response, the client can compute the recovery key by combining the server's public key together with the private key corresponding to the public key that it sent to the server. Clients may refresh the recovery key associated with a registration by sending a POST request with a new recoveryKey object. If the server agrees to refresh the recovery key, then it responds in the same way as to a new registration request that asks for a recovery key. 6.4. Once a client has created an account with an ACME server, it is"}
{"_id":"doc-en-acme-b1eb65eb878b112d88f54dc7911d49758b2f3fdb4bb1ddd8b49811c9e52d1b1c","title":"","text":"storage provider, and give the encryption key to the user as a recovery value. 6.4.1. With MAC-based recovery, the client proves to the server that it holds a secret value established in the initial registration transaction. The client requests MAC-based recovery by sending a MAC over the new account key, using the recovery key from the initial registration. The string \"mac\" The URI for the registration to be recovered. A JSON-formatted JWS object using an HMAC algorithm, whose payload is the JWK representation of the public key of the new account key pair. On receiving such a request the server MUST verify that: The base registration has a recovery key associated with it The \"alg\" value in the \"mac\" JWS represents a MAC algorithm The \"mac\" JWS is valid according to the validation rules in RFC7515, using the recovery key as the MAC key The JWK in the payload represents the new account key (i.e. the key used to verify the ACME message) If those conditions are met, and the recovery request is otherwise acceptable to the server, then the recovery process has succeeded. The server creates a new registration resource based on the base registration and the new account key, and returns it on a 201 (Created) response, together with a Location header indicating a URI for the new registration. If the recovery request is unsuccessful, the server returns an error response, such as 403 (Forbidden). 6.4.2. In the contact-based recovery process, the client requests that the server send a message to one of the contact URIs registered for the account. That message indicates some action that the server requires the client's user to perform, e.g., clicking a link in an email. If the user successfully completes the server's required actions, then the server will bind the account to the new account key. The client requests recovery by asking that the server send a message to one of the contact URIs registered for the account. That message indicates some action that the server requires the client's user to perform, e.g., clicking a link in an email. If the user successfully completes the server's required actions, then the server will bind the account to the new account key. (Note that this process is almost entirely out of band with respect to ACME. ACME only allows the client to initiate the process, and the server to indicate the result.) To initiate contact-based recovery, the client sends a POST request to the server's recover-registration URI, with a body specifying which registration is to be recovered. The body of the request MUST be signed by the client's new account key pair. To initiate recovery, the client sends a POST request to the server's recover-registration URI, with a body specifying which registration is to be recovered. The body of the request MUST be signed by the client's new account key pair. The string \"contact\" The URI for the registration to be recovered. If the server agrees to attempt contact-based recovery, then it creates a new registration resource containing a stub registration object. The stub registration has the client's new account key and contacts, but no authorizations or certificates associated. The server returns the stub contact in a 201 (Created) response, along with a Location header field indicating the URI for the new registration resource (which will be the registration URI if the recovery succeeds). If the server agrees to attempt recovery, then it creates a new registration resource containing a stub registration object. The stub registration has the client's new account key and contacts, but no authorizations or certificates associated. The server returns the stub contact in a 201 (Created) response, along with a Location header field indicating the URI for the new registration resource (which will be the registration URI if the recovery succeeds). After recovery has been initiated, the server follows its chosen recovery process, out-of-band to ACME. While the recovery process is"}
{"_id":"doc-en-acme-ed145032f033ba84dbf291c1e691e0e2478a548eb8d30caacdc722e79fb226e0","title":"","text":"is the only one that can choose the new account key that receives the capabilities held by the account being recovered. MAC-based recovery can be performed if the attacker knows the account key and registration URI for the account being recovered. Both of these are difficult to obtain for a network attacker, because ACME uses HTTPS, though if the recovery key and registration URI are sufficiently predictable, the attacker might be able to guess them. An ACME MitM can see the registration URI, but still has to guess the recovery key, since neither the ECDH in the provisioning phase nor HMAC in the recovery phase will reveal it to him. ACME clients can thus mitigate problems with MAC-based recovery by using long recovery keys. ACME servers should enforce a minimum recovery key length, and impose rate limits on recovery to limit an attacker's ability to test different guesses about the recovery key. Contact-based recovery uses both the ACME channel and the contact channel. The provisioning process is only visible to an ACME MitM, and even then, the MitM can only observe the contact information provided. If the ACME attacker does not also have access to the contact channel, there is no risk. The security of the contact-based recovery process is entirely dependent on the security of the contact channel. The details of this will depend on the specific out-of-band technique used by the server. For example: Account recovery uses both the ACME channel and the contact channel. The provisioning process is only visible to an ACME MitM, and even then, the MitM can only observe the contact information provided. If the ACME attacker does not also have access to the contact channel, there is no risk. The security of the recovery process is entirely dependent on the security of the contact channel. The details of this will depend on the specific out-of-band technique used by the server. For example: If the server requires a user to click a link in a message sent to a contact address, then the contact channel will need to ensure"}
{"_id":"doc-en-acme-d16daf76744acfb3a960220d1b0485aebd291d75f2373237c16a05abe45df397","title":"","text":"In practice, many contact channels that can be used to reach many clients do not provide strong assurances of the types noted above. In designing and deploying contact-based recovery schemes, ACME servers operators will need to find an appropriate balance between using contact channels that can reach many clients and using contact- based recovery schemes that achieve an appropriate level of risk using those contact channels. In designing and deploying recovery schemes, ACME servers operators will need to find an appropriate balance between using contact channels that can reach many clients and using contact-based recovery schemes that achieve an appropriate level of risk using those contact channels. 9.4."}
{"_id":"doc-en-acme-e09a60fc773d9271db0fbcd392afe981daa3b9b536d9994326fe3c37972ecf89","title":"","text":"certificate. If the revocation succeeds, the server responds with status code 200 (OK). If the revocation fails, the server returns an error. (OK). If the revocation fails, the server returns an error. For example, if the certificate has already been revoked the server returns an error response with status code 400 (Bad Request) and type \"urn:ietf:params:acme:error:alreadyRevoked\". 8."}
{"_id":"doc-en-acme-b9e572c08c1e01cd82a8922730b37022bb171d99fc8998332a24987c4d4c3b20","title":"","text":"configuring their TLS implementations. ACME servers that support TLS 1.3 MAY allow clients to send early data (0-RTT). This is safe because the ACME protocol itself includes anti-replay protections (see replay-protection). (see replay-protection) in all cases where they are required. For this reason, there are no restrictions on what ACME data can be carried in 0-RTT. ACME clients MUST send a User-Agent header field, in accordance with RFC7231. This header field SHOULD include the name and version of"}
{"_id":"doc-en-acme-0eeb625ad5d266d138a9d17d2513e26de51c0c9c008730569c2a00e35e8c547f","title":"","text":"\"status\" field. For pending authorizations, the challenges that the client can fulfill in order to prove possession of the identifier. For final authorizations (in the \"valid\" or \"invalid\" state), the challenges that were used. Each array entry is an object with parameters required to validate the challenge. A client should attempt to fulfill one of these challenges, and a server should consider any one of the challenges sufficient to make the authorization valid. fulfill in order to prove possession of the identifier. For valid authorizations, the challenge that was validated. For invalid authorizations, the challenge that was attempted and failed. Each array entry is an object with parameters required to validate the challenge. A client should attempt to fulfill one of these challenges, and a server should consider any one of the challenges sufficient to make the authorization valid. For authorizations created as a result of a newOrder request containing a DNS identifier with a value that contained a wildcard"}
{"_id":"doc-en-acme-5df19d0ec5056fa9a7b090ec42b1d27bc684694a2cf82fb4db93992190e456f9","title":"","text":"Authorization objects are created in the \"pending\" state. If one of the challenges listed in the authorization transitions to the \"valid\" state, then the authorization also changes to the \"valid\" state. If there is an error while the authorization is still pending, then the the client attempts to fulfill a challenge and fails, or if there is an error while the authorization is still pending, then the authorization transitions to the \"invalid\" state. Once the authorization is in the valid state, it can expire (\"expired\"), be deactivated by the client (\"deactivated\", see deactivating-an-"}
{"_id":"doc-en-acme-7310761fc9b23dd4bc8ec7daee3915fbf787ec9ffc8007a883890f78e4f8ec68","title":"","text":"can't obtain illegitimate authorization by acting as an ACME client (legitimately, in terms of the protocol). ACME does not protect against other types of abuse by a MitM on the ACME channel. For example, such an attacker could send a bogus \"badSignatureAlgorithm\" error response to downgrade a client to the lowest-quality signature algorithm that the server supports. A MitM that is present on all connections (such as a CDN), can cause denial- of-service conditions in a variety of ways. 10.2. ACME allows anyone to request challenges for an identifier by"}
{"_id":"doc-en-acme-97da49208a418828d5c4014a3316a8a36aaa459b8d89b36937a4c73aaf884180","title":"","text":"9.1. A file of this type contains one or more certificates encoded with the PEM textual encoding, according to RFC 7468 RFC7468. In order to provide easy interoperation with TLS, the first certificate MUST be an end-entity certificate. Each following certificate SHOULD directly certify the one preceding it. Because certificate validation requires that trust anchors be distributed independently, a certificate that represents a trust anchor MAY be omitted from the chain, provided that supported peers are known to possess any omitted certificates. the PEM textual encoding, according to RFC 7468 RFC7468. The textual encoding of certificates in this file MUST use the strict encoding and MUST NOT include explanatory text. The ABNF for this format is as follows, where \"stricttextualmsg\" and \"eol\" are as defined in Section 3 of RFC 7468: In order to provide easy interoperation with TLS, the first certificate MUST be an end-entity certificate. Each following certificate SHOULD directly certify the one preceding it. Because certificate validation requires that trust anchors be distributed independently, a certificate that represents a trust anchor MAY be omitted from the chain, provided that supported peers are known to possess any omitted certificates. The \"Media Types\" registry should be updated with the following additional value:"}
{"_id":"doc-en-acme-c009f71feb502fae193843ad22c7d306b9e80e000bda4a692f765ff04a495180","title":"","text":"anchors. Clients can fetch these alternates and use their own heuristics to decide which is optimal. An ACME client MAY attempt to fetch the certificate with a GET request. If the server does not allow GET requests for certificate resources, then it will return an error as described in post-as-get. On receiving such an error, the client SHOULD fall back to a POST-as- GET request. A certificate resource represents a single, immutable certificate. If the client wishes to obtain a renewed certificate, the client initiates a new order process to request one."}
{"_id":"doc-en-acme-e86b9c5866d3824db39b56e46b7bc9710b00ac560e38bf6065ae4f817e3eb271","title":"","text":"with an array of supported \"alg\" values. See errors for more details on the structure of error responses. If the server supports the signature algorithm \"alg\" but either does not support or chooses to reject the public key \"jwk\", then the server MUST return an error with status code 400 (Bad Request) and type \"urn:ietf:params:acme:error:badPublicKey\". The problem document detail SHOULD describe the reason for rejecting the public key; some example reasons are: \"alg\" is \"RS256\" but the modulus \"n\" is too small (e.g., 512-bit) \"alg\" is \"ES256\" but \"jwk\" does not contain a valid P-256 public key \"alg\" is \"EdDSA\" and \"crv\" is \"Ed448\", but the server only supports \"EdDSA\" with \"Ed25519\" the corresponding private key is known to have been compromised Because client requests in ACME carry JWS objects in the Flattened JSON Serialization, they must have the Content-Type header field set to \"application/jose+json\". If a request does not meet this"}
{"_id":"doc-en-acme-c76f8ae3057f6dbcf9db46bbe7091827b1f019b1d817410b481f71409b9dfbf1","title":"","text":"process can be represented and performed by Internet protocols with no out-of-band human intervention. When an operator deploys a current HTTPS server, it generally prompts him to generate a self-signed certificate. When an operator deploys an ACME-compatible web server, the experience would be something like this: When deploying a current HTTPS server, an operator generally gets a prompt to generate a self-signed certificate. When an operator deploys an ACME-compatible web server, the experience would be something like this: The ACME client prompts the operator for the intended domain name(s) that the web server is to stand for."}
{"_id":"doc-en-acme-279d1bab1722b76b72a676cb9310ebb1852db17a569282e5b844f487aadf639c","title":"","text":"certificate was issued, and one with relation \"author\" to indicate the registration under which this certificate was issued. The server MAY include an Expires header as a hint to the client about when to renew the certificate. (Of course, the real expiration of the certificate is controlled by the notAfter time in the certificate itself.) If the CA participates in Certificate Transparency (CT) RFC6962, then they may want to provide the client with a Signed Certificate Timestamp (SCT) that can be used to prove that a certificate was"}
{"_id":"doc-en-acme-26d935bf6839c0c42ff4524ecd7e619e19dc94c39c109c75523a514304025038","title":"","text":"for a certificate using a Link relation header field with relation \"ct-sct\". A certificate resource always represents the most recent certificate issued for the name/key binding expressed in the CSR. If the CA allows a certificate to be renewed, then it publishes renewed versions of the certificate through the same certificate URI. Clients retrieve renewed versions of the certificate using a GET query to the certificate URI, which the server should then return in a 200 (OK) response. The server SHOULD provide a stable URI for each specific certificate in the Content-Location header field, as shown above. Requests to stable certificate URIs MUST always result in the same certificate. To avoid unnecessary renewals, the CA may choose not to issue a renewed certificate until it receives such a request (if it even allows renewal at all). In such cases, if the CA requires some time to generate the new certificate, the CA MUST return a 202 (Accepted) response, with a Retry-After header field that indicates when the new certificate will be available. The CA MAY include the current (non- renewed) certificate as the body of the response. Likewise, in order to prevent unnecessary renewal due to queries by parties other than the account key holder, certificate URIs should be structured as capability URLs W3C.WD-capability-urls-20140218. From the client's perspective, there is no difference between a certificate URI that allows renewal and one that does not. If the client wishes to obtain a renewed certificate, and a GET request to the certificate URI does not yield one, then the client may initiate a new-certificate transaction to request one. A certificate resource represents a single, immutable certificate. If the client wishes to obtain a renewed certificate, the client initiates a new-certificate transaction to request one. Because certificate resources are immutable once issuance is complete, the server MAY enable the caching of the resource by adding Expires and Cache-Control headers specifying a point in time in the distant future. These headers have no relation to the certificate's period of validity. 6.6."}
{"_id":"doc-en-acme-225cb8282585e8fa3c5d8a33bcdaf34c9f29a29a4f9e45944a66fbfae43474a8","title":"","text":"In addition, the client MAY advise the server at which IP the challenge is provisioned: An IPv4 or IPv6 address which, if given, MUST be included in the set of IP addresses to which the domain name resolves. If given, the server will connect to that specific IP address instead of arbitrarily choosing an IP from the set of A and AAAA records to which the domain name resolves. If the field is given but equal to \"\"peer\"\", the server MUST treat the field as if it contained the IP address from which the response was received. An IPv4 or IPv6 address which, in dotted decimal form or RFC4291 form, respectively. If given, this address MUST be included in the set of IP addresses to which the domain name resolves. If given, the server SHOULD connect to that specific IP address instead of arbitrarily choosing an IP from the set of A and AAAA records to which the domain name resolves. On receiving a response, the server MUST verify that the key authorization in the response matches the \"token\" value in the"}
{"_id":"doc-en-anima-bootstrap-55d480d27a86e60b714e45516d5f832f222cb5222338be2ea4f5692634de2e84","title":"","text":"IANA is requested to register the following Service Names: 7.5. The IANA is requested to list the name \"masa\" in the MUD extensions registry defined in I-D.ietf-opsawg-mud. Its use is documented in mud-extension. 8. 8.1."}
{"_id":"doc-en-api-drafts-ba777bd05240b437fb5c9e493a0030593135b23e508687427a5b09071028c1dd","title":"","text":"\"Connection Priority\" on one Connection does not change it on the other Connections in the same Connection Group. The optional \"connectionProperties\" parameter allows passing Transport Properties that control the behavior of the underlying stream or connection to be created, e.g., protocol-specific properties to request specific stream IDs for SCTP or QUIC. Message Properties set on a Connection also apply only to that Connection."}
{"_id":"doc-en-api-drafts-aefa2f373f58b5dded8e1151471e7534390191842160d636a07567c12a6d9854","title":"","text":"Data Unit: Datagram The Transport Services API mappings for UDP-Lite are identical to UDP. Properties that require checksum coverage are not supported by UDP-Lite, such as \"msgChecksumLen\", \"fullChecksumSend\", \"recvChecksumLen\", and \"fullChecksumRecv\". UDP. In addition, UDP-Lite supports the \"msgChecksumLen\" and \"recvChecksumLen\" Properties that allow an application to specify the minimum number of bytes in a message that need to be covered by a checksum. 10.5."}
{"_id":"doc-en-api-drafts-a90111683033af972d5f9c4f64413e5f04da2ce3a0ee45c783c4bb8d0e6adcb6","title":"","text":"of efficiency. This is not a strict requirement. The default is to not have this option. Notification of special errors (excessive retransmissions, ICMP error message arrival): This boolean property specifies whether an application considers it useful to be informed in case sent data was retransmitted more often than a certain threshold, or when an ICMP error message arrives. This property applies to Connections and Connection Groups. This is not a strict requirement. The default is to have this option. Notification of excessive retransmissions: This boolean property specifies whether an application considers it useful to be informed in case sent data was retransmitted more often than a certain threshold. This property applies to Connections and Connection Groups. This is not a strict requirement. The default is to have this option. Notification of ICMP error message arrival: This boolean property specifies whether an application considers it useful to be informed when an ICMP error message arrives. This property applies to Connections and Connection Groups. This is not a strict requirement. The default is to have this option. Control checksum coverage on sending or receiving: This boolean property specifies whether the application considers it useful to"}
{"_id":"doc-en-api-drafts-266cc30aff6a0e3d12e3156f2fbc021b8bc1308c963f24a2b17cee4d94089517","title":"","text":"Remote Endpoint and the Local Endpoint, such as IP addresses resolved from a DNS hostname. 4.2.3. While some transports expose a byte stream abstraction, most higher level protocols impose some structure onto that byte stream. That is, the higher level protocol operates in terms of messages, protocol data units (PDUs), rather than using unstructured sequences of bytes, with each message being processed in turn. Protocols are specified in terms of state machines acting on semantic messages, with parsing the byte stream into messages being a necessary annoyance, rather than a semantic concern. Accordingly, the Transport Services architecture exposes messages as the primary abstraction. Protocols that deal only in byte streams, such as TCP, represent their data in each direction as a single, long message. When framing protocols are placed on top of byte streams, the messages used in the API represent the framed messages within the stream. Providing a message-based abstraction also provides: the ability to associate deadlines with messages, for transports that care about timing; the ability to provide control of reliability, choosing what messages to retransmit in the event of packet loss, and how best to make use of the data that arrived; the ability to manage dependencies between messages, when some messages may not be delivered due to either packet loss or missing a deadline, in particular the ability to avoid (re-)sending data that relies on a previous transmission that was never received. All require explicit message boundaries, and application-level framing of messages, to be effective. Once a message is passed to the transport, it can not be cancelled or paused, but prioritization as well as lifetime and retransmission management will provide the protocol stack with all needed information to send the messages as quickly as possible without blocking transmission unnecessarily. The transport services architecture facilitates this by handling messages, with known identity (sequence numbers, in the simple case), lifetimes, niceness, and antecedents. Transport protocols such as SCTP provide a message-oriented API that has similar features to those we describe. Other transports, such as TCP, do not. To support a message oriented API, while still being compatible with stream-based transport protocols, implementations of the transport services architecture should provide APIs for framing and de-framing messages. That is, we push message framing down into the transport services API, allowing applications to send and receive complete messages. This is backwards compatible with existing protocols and APIs, since the wire format of messages does not change, but gives the protocol stack additional information to allow it to make better use of modern transport services. 5. RFC-EDITOR: Please remove this section before publication."}
{"_id":"doc-en-api-drafts-f75b9605a37717f9c4ed1a964878a9a800597899bc0226403e1d12d1ea083f68","title":"","text":"Boolean If true, it specifies that a Message should be delivered to the other side after the previous Message which was passed to the same Connection via the Send Action. If false, the Message may be delivered out of order. This property is used for protocols that support preservation of data ordering, see prop-ordering, but allow out-of-order delivery for certain messages. If true, it specifies that the receiver-side transport protocol stack only deliver the Message to the receiving application after the previous ordered Message which was passed to the same Connection via the Send Action, when such a Message exists. If false, the Message may be delivered to the receiving application out of order. This property is used for protocols that support preservation of data ordering, see prop-ordering, but allow out-of-order delivery for certain messages. 7.3.4."}
{"_id":"doc-en-api-drafts-c725bc51c5be9460caa48f0721f1eb5e71f852184f655cc9fa9664fee10c7865","title":"","text":"This property specifies that a message should be sent in such a way that the transport protocol ensures all data is received on the other side without corruption. Changing the 'Reliable Data Transfer' property on Messages is only possible if the transport protocol supports partial reliability (see prop-partially-reliable). Therefore, for protocols that always transfer data reliably, this property is always true and for protocols that always transfer data unreliably, this property is always false. Changing it may generate an error. property on Messages is only possible if the Connection supports reliability. When this is not the case, changing it will generate an error. 7.3.8."}
{"_id":"doc-en-api-drafts-6c6b91e1b4c871f439aa62868b5de1dd8705a2d86fe0acde906e1d636784e42e","title":"","text":"Preconnection, Connection (read only) This property specifies whether the application wishes to use a This property specifies whether the application needs to use a transport protocol that ensures that all data is received on the other side without corruption. This also entails being notified when a Connection is closed or aborted. The default is to enable Reliable"}
{"_id":"doc-en-api-drafts-51d445496c0a4f72ebd7e1a8d7765c6a4b4bc9385f0f39d29121e28f46ea9993","title":"","text":"12.3.22. [TODO: Discuss: should we remove this? Whether we need this or the other depends on how we want to implement multi-streaming. We don't need both, so we should make a decision.] Integer Message Property - see msg-niceness. Note that this property is not a per-message override of the connection Niceness - see conn-niceness. Both Niceness properties may interact, but can be used indepentendly and be realized by may interact, but can be used independently and be realized by different mechanisms. 12.3.23."}
{"_id":"doc-en-api-drafts-ac14e7bec2264ef92783ffb1023fda59d4d2c88cd9e4e0f25063f25e634f1b2a","title":"","text":"as an asynchronous interface, they generally use a try-and-fail model. If the application wants to read, but data has not yet been received from the peer, the call to read will fail. The application then waits for a notification to indicate when it can try again. then waits and can try again later. All interaction with a Transport Services system is expected to be asynchronous, and use an event-driven model unlike sockets events."}
{"_id":"doc-en-api-drafts-c21bdbbd40299eab7e6d99543e95adf96074fa8c30c1445339972281cf51cfcc","title":"","text":"5.2.10. This property specifies whether an application considers it useful to transfer data across multiple paths between the same end hosts. Generally, in most cases, this will improve performance (e.g., achieve greater throughput). One possible side-effect is increased jitter, which may be problematic for delay-sensitive applications. The recommended default is to have this option. 5.2.11. This property specifies whether an application wants to use the connection for sending and/or receiving data. Possible values are:"}
{"_id":"doc-en-api-drafts-57b006fd69a35496cb2d69fe89b0ff0bda0910905f7d47066c31f7d8f8e95d04","title":"","text":"connections are not supported by the transport protocol, the system should fall back to bidirectional transport. 5.2.12. This property specifies how long to wait before aborting a Connection during establishment. 5.3. Most security parameters, e.g., TLS ciphersuites, local identity and"}
{"_id":"doc-en-api-drafts-f3ae4d497a5f790934499e66cbe8a40add9279932db5ddbabd9adaa2d3d8fb49","title":"","text":"7.6. For application-layer protocols where the Connection initiator also sends the first message, the InitiateWithIdempotentSend() action combines Connection initiation with a first Message sent, provided that message is idempotent. sends the first message, the InitiateWithSend() action combines Connection initiation with a first Message sent. Without a message context (as in send-basic): With a message context (as in message-props): The message passed to InitiateWithIdempotentSend() is, as suggested by the name, considered to be idempotent (see msg-idempotent) regardless of declared message properties or defaults. If protocol stacks supporting 0-RTT establishment with idempotent data are available on the Preconnection, then 0-RTT establishment may be used with the given message when establishing candidate connections. For a non-idemponent initial message, or when the selected stack(s) do not support 0-RTT establishment, InitiateWithIdempotentSend is identical to Initiate() followed by Send(). Whenever possible, a messageContext should be provided to declare the message passed to InitiateWithSend as idempotent. This allows the transport system to make use of 0-RTT establishment in case this is supported by the available protocol stacks. When the selected stack(s) do not support transmitting data upon connection establishment, InitiateWithSend is identical to Initiate() followed by Send(). Neither partial sends nor send batching are supported by InitiateWithIdempotentSend(). InitiateWithSend(). The Events that may be sent after InitiateWithIdempotentSend() are equivalent to those that would be sent by an invocation of Initate() followed immediately by an invocation of Send(), with the caveat that a send failure that occurs because the Connection could not be established will not result in a SendError separate from the InitiateError signaling the failure of Connection establishment. The Events that may be sent after InitiateWithSend() are equivalent to those that would be sent by an invocation of Initate() followed immediately by an invocation of Send(), with the caveat that a send failure that occurs because the Connection could not be established will not result in a SendError separate from the InitiateError signaling the failure of Connection establishment. 7.7."}
{"_id":"doc-en-api-drafts-a5070953ccc292b00f291527c180b66a607ec5ad1e239fdbca6928e615fda4bc","title":"","text":"9.1.6. Integer This property specifies how long to wait before aborting a Connection during establishment, or before deciding that a Connection has failed after establishment. It is given in seconds. This property specifies how long to wait before deciding that a Connection has failed after establishment. 9.1.7."}
{"_id":"doc-en-api-drafts-02b3e8531eb79684193239294469ef815c2d2bc3538cea67730c5796a8d9b9dc","title":"","text":"Abort terminates a Connection without delivering remaining data: A ConnectionError can inform the application that the other side has aborted the Connection; however, there is no guarantee that an Abort will indeed be signaled. A ConnectionError informs the application that data to could not be delivered after a timeout, or the other side has aborted the Connection; however, there is no guarantee that an Abort will indeed be signaled. 11."}
{"_id":"doc-en-api-drafts-729c6eba37658824bcfab0588d764cda0c3f90dd8ab2d2dec97422c33a08858c","title":"","text":"events: Ready<> occurs when a Connection created with Initiate() or InitiateWithIdempotentData() transitions to Established state. InitiateWithSend() transitions to Established state. ConnectionReceived<> occurs when a Connection created with Listen() transitions to Established state."}
{"_id":"doc-en-api-drafts-c46dfbc2353e45543b4501ea7236c66a63e1baf56171d363ba915527bd676d61","title":"","text":"Selection properties are represented as preferences, which can have one of five preference levels: In addition, the pseudo-level \"Default\" can be used to reset the property to the default level used by the implementation. This level will never show up when queuing the value of a preference - the effective preference must be returned instead. Internally, the transport system will first exclude all protocols and paths that match a Prohibit, then exclude all protocols and paths that do not match a Require, then sort candidates according to"}
{"_id":"doc-en-api-drafts-89988cbabb20c6c064207b0f9dee93452072806ddd89f27fff6b5be00c61281a","title":"","text":"Passive open is the Action of waiting for Connections from remote endpoints, commonly used by servers in client-server interactions. Passive open is supported by this interface through the Listen Action: Passive open is supported by this interface through the Listen Action and returns a Listener object: Before calling Listen, the caller must have initialized the Preconnection during the pre-establishment phase with a Local Endpoint specifier, as well as all properties necessary for Protocol Stack selection. A Remote Endpoint may optionally be specified, to constrain what Connections are accepted. The Listen() Action consumes the Preconnection. Once Listen() has been called, no further properties may be added to the Preconnection, and no subsequent establishment call may be made on the Preconnection. constrain what Connections are accepted. The Listen() Action returns a Listener object. Once Listen() has been called, properties added to the Preconnection have no effect on the Listener and the Preconnection can be disposed of or reused. Listening continues until the global context shuts down, or until the Stop action is performed on the same Preconnection: Stop action is performed on the Listener object: After Stop() is called, the preconnection can be disposed of. After Stop() is called, the Listener can be disposed of. The ConnectionReceived Event occurs when a Remote Endpoint has established a transport-layer connection to this Preconnection (for established a transport-layer connection to this Listener (for Connection-oriented transport protocols), or when the first Message has been received from the Remote Endpoint (for Connectionless protocols), causing a new Connection to be created. The resulting"}
{"_id":"doc-en-api-drafts-1e0f89158676bdbb09ec0c46dd37de81f3fbbf5d581294174dbb0057ae1e67e7","title":"","text":"ready to use as soon as it is passed to the application via the event. A ListenError occurs either when the Preconnection cannot be fulfilled for listening, when the Local Endpoint (or Remote Endpoint, if specified) cannot be resolved, or when the application is prohibited from listening by policy. A ListenError occurs either when the Properties of the Preconnection cannot be fulfilled for listening, when the Local Endpoint (or Remote Endpoint, if specified) cannot be resolved, or when the application is prohibited from listening by policy. A Stopped event occurs after the Preconnection has stopped listening. A Stopped event occurs after the Listener has stopped listening. 6.3."}
{"_id":"doc-en-api-drafts-89d9c866848b8d47db741709d5c41e1dfd28c6a0684aa9075d2d0cd0ba8e4cd2","title":"","text":"6.4. Groups of Connections can be created using the Clone Action: Entangled Connections can be created using the Clone Action: Calling Clone on a Connection yields a group of two Connections: the parent Connection on which Clone was called, and the resulting cloned"}
{"_id":"doc-en-api-drafts-ef006ce908b54e789148e8fb2e5545078f06d7db6ee932d389cda1b4b4f5197b","title":"","text":"on. Connections in a Connection Group share all Protocol Properties that are not applicable to a Message. In addition, incoming entangled Connections can be received by creating a Listener on an existing connection: Changing one of these Protocol Properties on one Connection in the group changes it for all others. Per-Message Protocol Properties, however, are not entangled. For example, changing \"Timeout for"}
{"_id":"doc-en-api-drafts-6440bca84e1f6cb38868ef615c8fa6a55f12c101edd9ed3c5f6a309da0508d57","title":"","text":"9. Each protocol that can run as part of a Transport Services implementation defines both its API mapping as well as implementation details. API mappings for a protocol apply most to Connections in which the given protocol is the \"top\" of the Protocol Stack. For example, the mapping of the \"Send\" function for TCP applies to Connections in which the application directly sends over TCP. If HTTP/2 is used on top of TCP, the HTTP/2 mappings take precendence. Each protocol has a notion of Connectedness. Possible values for Connectedness are: Unconnected. Unconnected protocols do not establish explicit state between endpoints, and do not perform a handshake during Connection establishment. Connected. Connected protocols establish state between endpoints, and perform a handshake during Connection establishment. The handshake may be 0-RTT to send data or resume a session, but bidirectional traffic is required to confirm connectedness. Multiplexing Connected. Multiplexing Connected protocols share properties with Connected protocols, but also explictly support opening multiple application-level flows. This means that they can support cloning new Connection objects without a new explicit handshake. Protocols also define a notion of Data Unit. Possible values for Data Unit are: Byte-stream. Byte-stream protocols do not define any Message boundaries of their own apart from the end of a stream in each direction. Datagram. Datagram protocols define Message boundaries at the same level of transmission, such that only complete (not partial) Messages are supported. Message. Message protocols support Message boundaries that can be sent and received either as complete or partial Messages. Maximum Message lengths can be defined, and Messages can be partially reliable. 9.1. Connection lifetime for TCP translates fairly simply into the the abstraction presented to an application. When the TCP three-way handshake is complete, its layer of the Protocol Stack can be considered Ready (established). This event will cause racing of Protocol Stack options to complete if TCP is the top-level protocol, at which point the application can be notified that the Connection is Ready to send and receive. If the application sends a Close, that can translate to a graceful termination of the TCP connection, which is performed by sending a FIN to the remote endpoint. If the application sends an Abort, then the TCP state can be closed abruptly, leading to a RST being sent to the peer. Without a layer of framing (a top-level protocol in the established Protocol Stack that preserves message boundaries, or an application- supplied deframer) on top of TCP, the receiver side of the transport system implementation can only treat the incoming stream of bytes as a single Message, terminated by a FIN when the Remote Endpoint closes the Connection. Connectedness: Connected Data Unit: Byte-stream API mappings for TCP are as follows: TCP connections between two hosts map directly to Connection objects. Calling \"Initiate\" on a TCP Connection causes it to reserve a local port, and send a SYN to the Remote Endpoint. Early idempotent data is sent on a TCP Connection in the SYN, as TCP Fast Open data. A TCP Connection is ready once the three-way handshake is complete. TCP can throw various errors during connection setup. Specifically, it is important to handle a RST being sent by the peer during the handshake. Once established, TCP throws errors whenever the connection is disconnected, such as due to receive a RST from the peer; or hitting a TCP retransmission timeout. Calling \"Listen\" for TCP binds a local port and prepares it to receive inbound SYN packets from peers. TCP Listeners will deliver new connections once they have replied to an inbound SYN with a SYN-ACK. Calling \"Clone\" on a TCP Connection creates a new Connection with equivalent parameters. The two Connections are otherwise independent. TCP does not on its own preserve Message boundaries. Calling \"Send\" on a TCP connection lays out the bytes on the TCP send stream without any other delineation. Any Message marked as Final will cause TCP to send a FIN once the Message has been completely written. TCP delivers a stream of bytes without any Message delineation. All data delivered in the \"Received\" or \"ReceivedPartial\" event will be part of a single stream-wide Message that is marked Final (unless a MessageFramer is used). EndOfMessage will be delivered when the TCP Connection has received a FIN from the peer. Calling \"Close\" on a TCP Connection indicates that the Connection should be gracefully closed by sending a FIN to the peer and waiting for a FIN-ACK before delivering the \"Closed\" event. Calling \"Abort\" on a TCP Connection indicates that the Connection should be immediately closed by sending a RST to the peer. 9.2. UDP as a direct transport does not provide any handshake or connectivity state, so the notion of the transport protocol becoming Ready or established is degenerate. Once the system has validated that there is a route on which to send and receive UDP datagrams, the protocol is considered Ready. Similarly, a Close or Abort has no meaning to the on-the-wire protocol, but simply leads to the local state being torn down. Connectedness: Unconnected When sending and receiving messages over UDP, each Message should correspond to a single UDP datagram. The Message can contain metadata about the packet, such as the ECN bits applied to the packet. Data Unit: Datagram 9.3. API mappings for UDP are as follows: To support sender-side stream schedulers (which are implemented on the sender side), a receiver-side Transport System should always support message interleaving RFC8260. UDP connections represent a pair of specific IP addresses and ports on two hosts. SCTP messages can be very large. To allow the reception of large messages in pieces, a \"partial flag\" can be used to inform a (native SCTP) receiving application that a message is incomplete. After receiving the \"partial flag\", this application would know that the next receive calls will only deliver remaining parts of the same message (i.e., no messages or partial messages will arrive on other streams until the message is complete) (see Section 8.1.20 in RFC6458). The \"partial flag\" can therefore facilitate the implementation of the receiver buffer in the receiving application, at the cost of limiting multiplexing and temporarily creating head- of-line blocking delay at the receiver. Calling \"Initiate\" on a UDP Connection causes it to reserve a local port, but does not generate any traffic. When a Transport System transfers a Message, it seems natural to map the Message object to SCTP messages in order to support properties such as \"Ordered\" or \"Lifetime\" (which maps onto partially reliable delivery with a SCTP_PR_SCTP_TTL policy RFC6458). However, since multiplexing of Connections onto SCTP streams may happen, and would be hidden from the application, the Transport System requires a per- stream receiver buffer anyway, so this potential benefit is lost and the \"partial flag\" becomes unnecessary for the system. Early data on a UDP Connection does not have any special meaning. The data is sent whenever the Connection is Ready. The problem of long messages either requiring large receiver-side buffers or getting in the way of multiplexing is addressed by message interleaving RFC8260, which is yet another reason why a receivers- side transport system supporting SCTP should implement this mechanism. A UDP Connection is ready once the system has reserved a local port and has a path to send to the Remote Endpoint. 9.4. UDP Connections can only generate errors on initiation due to port conflicts on the local system. Once in use, UDP throws errors upon receiving ICMP notifications indicating failures in the network. Calling \"Listen\" for UDP binds a local port and prepares it to receive inbound UDP datagrams from peers. UDP Listeners will deliver new connections once they have received traffic from a new Remote Endpoint. Calling \"Clone\" on a UDP Connection creates a new Connection with equivalent parameters. The two Connections are otherwise independent. Calling \"Send\" on a UDP connection sends the data as the payload of a complete UDP datagram. Marking Messages as Final does not change anything in the datagram's contents. UDP only delivers complete Messages to \"Received\", each of which represents a single datagram received in a UDP packet. Calling \"Close\" on a UDP Connection releases the local port reservation. Calling \"Abort\" on a UDP Connection is identical to calling \"Close\". 9.3. The mapping of a TLS stream abstraction into the application is equivalent to the contract provided by TCP (see tcp). The Ready state should be determined by the completion of the TLS handshake, which involves potentially several more round trips beyond the TCP handshake. The application should not be notified that the Connection is Ready until TLS is established. equivalent to the contract provided by TCP (see tcp), and builds upon many of the actions of TCP connections. Connectedness: Connected Data Unit: Byte-stream Connection objects represent a single TLS connection running over a TCP connection between two hosts. Calling \"Initiate\" on a TLS Connection causes it to first initiate a TCP connection. Once the TCP protocol is Ready, the TLS handshake will be performed as a client (starting by sending a \"client_hello\", and so on). Early idempotent data is supported by TLS 1.3, and sends encrypted application data in the first TLS message when performing session resumption. For older versions of TLS, or if a session is not being resumed, the initial data will be delayed until the TLS handshake is complete. TCP Fast Option can also be enabled automatically. A TLS Connection is ready once the underlying TCP connection is Ready, and TLS handshake is also complete and keys have been established to encrypt application data. In addition to TCP initiation errors, TLS can generate errors during its handshake. Examples of error include a failure of the peer to successfully authenticate, the peer rejecting the local authentication, or a failure to match versions or algorithms. TLS connections will generate TCP errors, or errors due to failures to rekey or decrypt received messages. Calling \"Listen\" for TLS listens on TCP, and sets up received connections to perform server-side TLS handshakes. TLS Listeners will deliver new connections once they have successfully completed both TCP and TLS handshakes. As with TCP, calling \"Clone\" on a TLS Connection creates a new Connection with equivalent parameters. The two Connections are otherwise independent. Like TCP, TLS does not preserve message boundaries. Although application data is framed natively in TLS, there is not a general guarantee that these TLS messages represent semantically meaningful application stream boundaries. Rather, sending data on a TLS Connection only guarantees that the application data will be transmitted in an encrypted form. Marking Messages as Final causes a \"close_notify\" to be generated once the data has been written. Like TCP, TLS delivers a stream of bytes without any Message delineation. The data is decrypted prior to being delivered to the application. If a \"close_notify\" is received, the stream-wide Message will be delivered with EndOfMessage set. Calling \"Close\" on a TLS Connection indicates that the Connection should be gracefully closed by sending a \"close_notify\" to the peer and waiting for a corresponding \"close_notify\" before delivering the \"Closed\" event. Calling \"Abort\" on a TCP Connection indicates that the Connection should be immediately closed by sending a \"close_notify\", optionally preceded by \"user_canceled\", to the peer. Implementations do not need to wait to receive \"close_notify\" before delivering the \"Closed\" event. 9.4. DTLS follows the same behavior as TLS (tls), with the notable exception of not inheriting behavior directly from TCP. Differences from TLS are detailed below, and all cases not explicitly mentioned should be considered the same as TLS. Connectedness: Connected Data Unit: Datagram Connection objects represent a single DTLS connection running over a set of UDP ports between two hosts. Calling \"Initiate\" on a DTLS Connection causes it reserve a UDP local port, and begin sending handshake messages to the peer over UDP. These messages are reliable, and will be automatically retransmitted. A DTLS Connection is ready once the TLS handshake is complete and keys have been established to encrypt application data. Sending over DTLS does preserve message boundaries in the same way that UDP datagrams do. Marking a Message as Final does send a \"close_notify\" like TLS. Receiving over DTLS delivers one decrypted Message for each received DTLS datagram. If a \"close_notify\" is received, a Message will be delivered that is marked as Final. 9.5."}
{"_id":"doc-en-api-drafts-b71f887e83ee6798d9e7ac1bb3d04e5651586ca8503af22fda24382d17395eca","title":"","text":"Message representing the body, and the Headers being provided in Message metadata. Connectedness: Multiplexing Connected Data Unit: Message Connection objects represent a flow of HTTP messages between a client and a server, which may be an HTTP/1.1 connection over TCP, or a single stream in an HTTP/2 connection. Calling \"Initiate\" on an HTTP connection intiates a TCP or TLS connection as a client. Calling \"Clone\" on an HTTP Connection opens a new stream on an existing HTTP/2 connection when possible. If the underlying version does not support multiplexed streams, calling \"Clone\" simply creates a new parallel connection. When an application sends an HTTP Message, it is expected to provide HTTP header values as a MessageContext in a canonical form, along with any associated HTTP message body as the Message data. The HTTP header values are encoded in the specific version format upon sending. HTTP Connections deliver Messages in which HTTP header values attached to MessageContexts, and HTTP bodies in Message data. Calling \"Close\" on an HTTP Connection will only close the underlying TLS or TCP connection if the HTTP version does not support multiplexing. For HTTP/2, for example, closing the connection only closes a specific stream. 9.6. QUIC provides a multi-streaming interface to an encrypted transport."}
{"_id":"doc-en-api-drafts-dd4bbbb5ae561a25da8594d17839f818ae5e3caeb39cdbaba873849a14b1f492","title":"","text":"Closing a single QUIC stream, presented to the application as a Connection, does not imply closing the underlying QUIC connection itself. Rather, the implementation may choose to close the QUIC connection once all streams have been closed (possibly after some connection once all streams have been closed (often after some timeout), or after an individual stream Connection sends an Abort. Messages over a direct QUIC stream should be represented similarly to the TCP stream (one Message per direction, see tcp), unless a framing mapping is used on top of QUIC. Connectedness: Multiplexing Connected Data Unit: Stream Connection objects represent a single QUIC stream on a QUIC connection. 9.7."}
{"_id":"doc-en-api-drafts-2763017486815d7b2693ece3d4e3a17c8baa9bcf23227bb3b3097f00e31cc658","title":"","text":"over the streams can be represented similarly to the TCP stream (one Message per direction, see tcp). Connectedness: Multiplexing Connected Data Unit: Stream Connection objects represent a single HTTP/2 stream on a HTTP/2 connection. 9.8. To support sender-side stream schedulers (which are implemented on the sender side), a receiver-side Transport System should always support message interleaving RFC8260. SCTP messages can be very large. To allow the reception of large messages in pieces, a \"partial flag\" can be used to inform a (native SCTP) receiving application that a message is incomplete. After receiving the \"partial flag\", this application would know that the next receive calls will only deliver remaining parts of the same message (i.e., no messages or partial messages will arrive on other streams until the message is complete) (see Section 8.1.20 in RFC6458). The \"partial flag\" can therefore facilitate the implementation of the receiver buffer in the receiving application, at the cost of limiting multiplexing and temporarily creating head- of-line blocking delay at the receiver. When a Transport System transfers a Message, it seems natural to map the Message object to SCTP messages in order to support properties such as \"Ordered\" or \"Lifetime\" (which maps onto partially reliable delivery with a SCTP_PR_SCTP_TTL policy RFC6458). However, since multiplexing of Connections onto SCTP streams may happen, and would be hidden from the application, the Transport System requires a per- stream receiver buffer anyway, so this potential benefit is lost and the \"partial flag\" becomes unnecessary for the system. The problem of long messages either requiring large receiver-side buffers or getting in the way of multiplexing is addressed by message interleaving RFC8260, which is yet another reason why a receivers- side transport system supporting SCTP should implement this mechanism. 10. RFC-EDITOR: Please remove this section before publication."}
{"_id":"doc-en-api-drafts-3ca3e8effebcaf905ecbf65e5c005b7499880858f15915a665f2ec13099079e4","title":"","text":"to force early binding when required, for example with some Network Address Translator (NAT) traversal protocols (see rendezvous). Specifying a multicast group address on the Local Endpoint will indicate to the transport system that the resulting connection will be used to receive multicast messages. The Remote Endpoint can be used to filter by specific senders. This will restrict the application to establishing the Preconnection by calling Listen(). The accepted Connections are receive-only. Similarly, specifying a multicast group address on the Remote Endpoint will indicate that the resulting connection will be used to send multicast messages. 5.2. A Preconnection Object holds properties reflecting the application's"}
{"_id":"doc-en-api-drafts-4ff8f068432073a642d828f3d64f9d517e6c006dcf14e69139fccd24692f215a","title":"","text":"Integer (non-negative with -1 as special value) full coverage -1 (full coverage) This property specifies the minimum length of the section of the Message, starting from byte 0, that the application requires to be"}
{"_id":"doc-en-api-drafts-a6f2cde892076b64fdd9ecfaae5cf9e45b12e41c0c6eacae48b95a37723413ac","title":"","text":"to specify options for simple integrity protection via checksums. A value of 0 means that no checksum is required, and -1 means that the entire Message is protected by a checksum. Only full coverage is guaranteed, any other requests are advisory. guaranteed, any other requests are advisory, meaning that full coverage is applied anyway. 7.4.7."}
{"_id":"doc-en-api-drafts-56e0bf27f05101a233e21f7cc4240605c8462441ddd2965e1aff3a690c1011ba","title":"","text":"Specify a Local Endpoint using a local interface name and local port: As an alternative to specifying an interface name for the Local Endpoint, an application can express more fine-grained preferences using the \"Interface Instance or Type\" Selection Property, see prop- interface. However, if the application specifies Selection Properties which are inconsistent with the Local Endpoint, this will result in an error once the application attempts to open a Connection. Specify a Local Endpoint using a STUN server: Specify a Local Endpoint using a Any-Source Multicast group to join"}
{"_id":"doc-en-api-drafts-2c8238105bb3fb1171163a8538545745f7117df07771e6b4b8f68365e9fc8427","title":"","text":"higher value. By default, this value is Infinite. The caller is also able to reset the value to Infinite at any point. A ListenError occurs either when the Properties of the Preconnection cannot be fulfilled for listening, when the Local Endpoint (or Remote Endpoint, if specified) cannot be resolved, or when the application is prohibited from listening by policy. A ListenError occurs either when the Properties and Security Parameters of the Preconnection cannot be fulfilled for listening or cannot be reconciled with the Local Endpoint (and/or Remote Endpoint, if specified), when the Local Endpoint (or Remote Endpoint, if specified) cannot be resolved, or when the application is prohibited from listening by policy. A Stopped Event occurs after the Listener has stopped listening."}
{"_id":"doc-en-api-drafts-25188ff2e7ab0503c23c8da4b3937ab25d08ce0c19a27ef52e997a345b434eef","title":"","text":"contained within the RendezvousDone<> Event, and is ready to use as soon as it is passed to the application via the Event. An RendezvousError occurs either when the Preconnection cannot be fulfilled for listening, when the Local Endpoint or Remote Endpoint cannot be resolved, when no transport-layer connection can be established to the Remote Endpoint, or when the application is prohibited from rendezvous by policy. An RendezvousError occurs either when the Properties and Security Parameters of the Preconnection cannot be fulfilled for rendezvous or cannot be reconciled with the Local and/or Remote Endpoints, when the Local Endpoint or Remote Endpoint cannot be resolved, when no transport-layer connection can be established to the Remote Endpoint, or when the application is prohibited from rendezvous by policy. When using some NAT traversal protocols, e.g., Interactive Connectivity Establishment (ICE) RFC5245, it is expected that the"}
{"_id":"doc-en-api-drafts-6dba7e22770493852a47a5c21b42e9b70a76dcd26fb5c3fcab21cffaa170ef4a","title":"","text":"The Transport Services architecture evolves this general model of interaction, aiming to both modernize the API surface presented to applications by the transport layer and enrich the capabilities of the Transport System implementation. It combines interfaces for the Transport Services implementation. It combines interfaces for multiple interaction patterns into a unified whole. By combining name resolution with connection establishment and data transfer in a single API, it allows for more flexible implementations to provide"}
{"_id":"doc-en-api-drafts-1e971c1bdddaaee2e605588a0dfa83cb67e321e2ebfb3b7d3e7f6725d7ca6d32","title":"","text":"make use of the data that arrived; the ability to manage dependencies between messages, when the Transport System could decide to not deliver a message, either following packet loss or because it has missed a deadline. In particular, this can avoid (re-)sending data that relies on a Transport Services system could decide to not deliver a message, either following packet loss or because it has missed a deadline. In particular, this can avoid (re-)sending data that relies on a previous transmission that was never received. the ability to automatically assign messages and connections to"}
{"_id":"doc-en-api-drafts-922bdbda411d0d724df041574506df97f5283509ed2404ea5115230c99b2d9ea","title":"","text":"Transport Properties: Transport Properties allow the application to express their requirements, prohibitions, and preferences and configure the Transport System. There are three kinds of configure the Transport Services system. There are three kinds of Transport Properties: Selection Properties (preestablishment) that can only be"}
{"_id":"doc-en-api-drafts-bb7ab9e59ebbdc41e8c40d6c67f7413f0ed71da0d59f17bf54d4b440e621deaf","title":"","text":"Connection Properties: The Connection Properties are used to configure protocol-specific options and control per-connection behavior of the Transport System; for example, a protocol-specific Connection Property can express that if UDP is used, the implementation ought to use checksums. Note that the presence of such a property does not require that a specific protocol will be used. In general, these properties do not explicitly determine the selection of paths or protocols, but can be used in this way by an implementation during connection establishment. Connection Properties are specified on a Preconnection prior to Connection establishment, and can be modified on the Connection later. Changes made to Connection Properties after Connection establishment take effect on a best-effort basis. behavior of the Transport Services system; for example, a protocol-specific Connection Property can express that if UDP is used, the implementation ought to use checksums. Note that the presence of such a property does not require that a specific protocol will be used. In general, these properties do not explicitly determine the selection of paths or protocols, but can be used in this way by an implementation during connection establishment. Connection Properties are specified on a Preconnection prior to Connection establishment, and can be modified on the Connection later. Changes made to Connection Properties after Connection establishment take effect on a best- effort basis. 4.1.3."}
{"_id":"doc-en-api-drafts-18f7e86a2d620aa9c9bfb77fad66a81cbd9bc2fbcfa183e8891938c974615eb3","title":"","text":"Properties when sending.) Abort: The action the application takes on a Connection to indicate a Close and also indicate that the Transport System SHOULD NOT attempt to deliver any outstanding data. This is intended for immediate termination of a connection, without indicate a Close and also indicate that the Transport Services system SHOULD NOT attempt to deliver any outstanding data. This is intended for immediate termination of a connection, without cleaning up state. 4.2."}
{"_id":"doc-en-api-drafts-c950d9608f2a44d9e0fda1058adf093d1bd56f3c0b4943bc1d304a6c0e8faf79","title":"","text":"protocols are not incorrectly swapped, Transport Services systems SHOULD only automatically generate equivalent Protocol Stacks when the transport security protocols within the stacks are identical. Specifically, a Transport System would consider protocols Specifically, a Transport Services system would consider protocols identical only if they are of the same type and version. For example, the same version of TLS running over two different transport Protocol Stacks are considered equivalent, whereas TLS"}
{"_id":"doc-en-api-drafts-58413baaf4da4594eade97aa42ad69026a9648dc0ebfc925a121af8f634dd15e","title":"","text":"protocol state, cached path state, and heuristics, may be shared (e.g. across multiple connections in an application). This provides efficiency and convenience for the application, since the Transport System implementation can automatically optimize behavior. Services implementation can automatically optimize behavior. There are several reasons, however, that an application might want to explicitly isolate some Connections. These reasons include:"}
{"_id":"doc-en-api-drafts-7a56457939ff0a3b52dee7e6720cd87ad0c0c0c3303fad6937a0441247604553","title":"","text":"than -1, it sets the minimum protection in protocols that allow limiting the checksum length (e.g. UDP-Lite). Singular Transmission: when this is true, the application requests to avoid transport-layer segmentation or network-layer fragmentation. Some transports implement network-layer fragmentation avoidance (Path MTU Discovery) without exposing this functionality to the application; in this case, only transport- layer segmentation should be avoided, by fitting the message into a single transport-layer segment or otherwise failing. Otherwise, network-layer fragmentation should be avoided--e.g. by requesting the IP Don't Fragment bit to be set in case of UDP(-Lite) and IPv4 (SET_DF in RFC8304). Singular Transmission: When set, this property limits the message size to the Maximum Message Size Before Fragmentation or Segmentation (see Section 10.1.7 of I-D.ietf-taps-interface). Messages larger than this size generate an error. Setting this avoids transport-layer segmentation or network-layer fragmentation. When used with transports running over IP version 4 the Don't Fragment bit will be set to avoid on-path IP fragmentation (RFC8304). 5.1.2."}
{"_id":"doc-en-api-drafts-79e23c81a45640bc59c33acb20e2fbc75336f255b97f27828fc895c17171601c","title":"","text":"actions are alternatives (e.g., whether to initiate a connection or to listen for incoming connections), while others are optional (e.g., setting Connection and Message Properties in Pre-Establishment) or have been omitted for brevity. have been omitted for brevity and simplicity. 4.1.1."}
{"_id":"doc-en-api-drafts-1b98106204e79c41db0e0cd7a7eb628325c333ec8580b393b46d49a481d72d43","title":"","text":"10.2. These properties specifies configurations for the User Timeout Option These properties specify configurations for the User Timeout Option (UTO), in case TCP becomes the chosen transport protocol. Implementation is optional and of course only sensible if TCP is implemented in the transport system. All of the below parameters are optional (e.g., it is possible to These TCP-specific properties are included here because the feature \"Suggest timeout to the peer\" is part of the minimal set of transport services I-D.ietf-taps-minset, where this feature was categorized as \"functional\". This means that when an implementation offers this feature, it has to expose an interface to it to the application. Otherwise, the implementation might violate assumptions by the application, which could cause the application to fail. All of the below properties are optional (e.g., it is possible to specify \"User Timeout Enabled\" as true, but not specify an Advertised User Timeout value; in this case, the TCP default will be used)."}
{"_id":"doc-en-api-drafts-c340127ba5bb1c98c4d89f302d10482bce6db5f6723bec24004a50735b0bc63b","title":"","text":"Integer Default: :the TCP default the TCP default This time value is advertised via the TCP User Timeout Option (UTO) RFC5482 at the remote endpoint to adapt its own \"Timeout for aborting"}
{"_id":"doc-en-api-drafts-e2a92fa41b411c6ce60f8d5935b17cb00768a162073e8bce1403b9b1048e093f","title":"","text":"All data sent with the same MessageContext object will be treated as belonging to the same Message, and will constitute an in-order series until the endOfMessage is marked. Once the end of the Message is marked, the MessageContext object may be re-used as a new Message with identical parameters. until the endOfMessage is marked. 7.7."}
{"_id":"doc-en-api-drafts-10f9a788aa441885f452716274e824d134ac7439e97e0eb9634ea66e44c57735","title":"","text":"Abstract This document describes an abstract programming interface, API, to the transport layer, following the Transport Services Architecture. It supports the asynchronous, atomic transmission of messages over transport protocols and network paths dynamically selected at runtime. It is intended to replace the traditional BSD sockets API as the common interface to the transport layer, in an environment where endpoints could select from multiple interfaces and potential transport protocols. This document describes an abstract application programming interface, API, to the transport layer, following the Transport Services Architecture. It supports the asynchronous, atomic transmission of messages over transport protocols and network paths dynamically selected at runtime. It is intended to replace the traditional BSD sockets API as the common interface to the transport layer, in an environment where endpoints could select from multiple interfaces and potential transport protocols. 1."}
{"_id":"doc-en-api-drafts-3c8dc8cf9e6ea674fac30e7df4097d085ad00e2aee01f2a9203cdc40b8b55921","title":"","text":"5.1.1. Lifetime: this should be implemented by removing the Message from its queue of pending Messages after the Lifetime has expired. A the queue of pending Messages after the Lifetime has expired. A queue of pending Messages within the transport system implementation that have yet to be handed to the Protocol Stack can always support this property, but once a Message has been sent into the send buffer of a protocol, only certain protocols may support de-queueing a message. For example, TCP cannot remove bytes from its send buffer, while in case of SCTP, such control over the SCTP send buffer can be exercised using the partial reliability extension RFC8303. When there is no standing queue of Messages within the system, and the Protocol Stack does not support removing a Message from its buffer, this property may be ignored. support removing a message. For example, an implementation cannot cannot remove bytes from a TCP send buffer, while it can remove data from a SCTP send buffer using the partial reliability extension RFC8303. When there is no standing queue of Messages within the system, and the Protocol Stack does not support the removal of a Message from the stack's send buffer, this property may be ignored. Priority: this represents the ability to prioritize a Message over other Messages. This can be implemented by the system re-ordering"}
{"_id":"doc-en-api-drafts-03111bc857873e44b416686afddaeb381f5084abfeb650fd2040afc40b40f103","title":"","text":"could choose to send Messages of different Priority on streams of different priority. Ordered: when this is false, it disables the requirement of in- Ordered: when this is false, this disables the requirement of in- order-delivery for protocols that support configurable ordering. Safely Replayable: when this is true, it means that the Message Safely Replayable: when this is true, this means that the Message can be used by mechanisms that might transfer it multiple times - e.g., as a result of racing multiple transports or as part of TCP Fast Open. Final: when this is true, it means that a transport connection can be closed immediately after its transmission. Final: when this is true, this means that a transport connection can be closed immediately after transmission of the message. Corruption Protection Length: when this is set to any value other than -1, it sets the minimum protection in protocols that allow"}
{"_id":"doc-en-api-drafts-e3ad804b9aa8d028d36008af98b003129de15cabbbdee1d4d867f9ab1b6ae842","title":"","text":"boundaries to function, each application layer protocol has defined its own framing. To use a Message Framer, the application adds it to its Preconnection object. Then, the Message Framer can intercept all calls to Send() or Receive() on a Connection to add Message semantics, in addition to interacting with the setup and teardown of the Connection. A Framer can start sending data before the application sends data if the framing protocol requires a prefix or handshake (see RFC8229 for an example of such a framing protocol). Note that while Message Framers add the most value when placed above a protocol that otherwise does not preserve message boundaries, they can also be used with datagram- or message-based protocols. In these"}
{"_id":"doc-en-api-drafts-c05dafc65b9014698aac4ae00218ac654ec49526f28d1b3059fd63eff38252fa","title":"","text":"Enumeration: can take one value of a finite set of values, dependent on the property itself. The representation is implementation dependent; however, implementations MUST provide a method for the application to determine the entire set of possible values for each property. implementation dependent. Preference: can take one of five values (Prohibit, Avoid, Ignore, Prefer, Require) for the level of preference of a given property"}
{"_id":"doc-en-api-drafts-3ed64d76ea5d5a888159fb95e2b26518522f837451a30f39f0a826091c579b1e","title":"","text":"7.1.10. isolateSession Boolean false When set to true, this property will initiate new Connections using as little cached information (such as session tickets or cookies) as possible from previous connections that are not entangled with it. Any state generated by this Connection will only be shared with entangled connections. Cloned Connections will use saved state from within the Connection Group. Note that this does not guarantee no leakage of information, as implementations may not be able to fully isolate all caches (e.g. RTT estimates). Note that this property may degrade connection performance. 7.1.11. The following generic Connection Properties are read-only, i.e. they cannot be changed by an application. 7.1.10.1. 7.1.11.1. zeroRttMsgMaxLen"}
{"_id":"doc-en-api-drafts-b8e3e8abe6791d3105819e0f5f2f6f11726f15160c039c47dbbbb324692910f4","title":"","text":"before or during Connection establishment, see also msg- safelyreplayable. It is given in Bytes. 7.1.10.2. 7.1.11.2. singularTransmissionMsgMaxLen"}
{"_id":"doc-en-api-drafts-ab41456456c3d1fc945858c8f6470986b0163783008040860826a641bee5467c","title":"","text":"Packet Size (MPS) as described in Datagram PLPMTUD I-D.ietf-tsvwg- datagram-plpmtud. 7.1.10.3. 7.1.11.3. sendMsgMaxLen"}
{"_id":"doc-en-api-drafts-cd536088ebebaa130e8ac6daa5520571ba0901b69d62c8524dd9de8b4c87a79b","title":"","text":"This property represents the maximum Message size that an application can send. 7.1.10.4. 7.1.11.4. recvMsgMaxLen"}
{"_id":"doc-en-api-drafts-755d83471b8ab7f52826938721dd1e0ae531078abbd37bbb3cef4e10632a52f1","title":"","text":"Handover This property specifies the local policy for transferring data across multiple paths between the same end hosts if Parallel Use of Multiple Paths is not set to Disabled (see multipath-mode). Possible values are: multiple paths between the same end hosts if Multipath Transport is not set to Disabled (see multipath-mode). Possible values are: The connection ought only to attempt to migrate between different paths when the original path is lost or becomes unusable. The"}
{"_id":"doc-en-api-drafts-5f68c79d66bdb959b249f9009c9e489c72b058a1bd4cbe1796e89b3409c5be1f","title":"","text":"When a path change occurs, e.g., when the IP address of an interface changes or a new interface becomes available, the Transport Services implementation is responsible for notifying the application of the change. The path change may interrupt connectivity on a path for an active connection or provide an opportunity for a transport that supports multipath or migration to adapt to the new paths. implementation is responsible for notifying the Protocol Instance of the change. The path change may interrupt connectivity on a path for an active connection or provide an opportunity for a transport that supports multipath or migration to adapt to the new paths. Note that, from the Transport Services API point of view, migration is considered a part of multipath connectivity; it is just a limiting policy on multipath usage. If the \"multipath\" Selection Property is set to \"Disabled\", migration is disallowed. For protocols that do not support multipath or migration, the Protocol Instances should be informed of the path change, but should"}
{"_id":"doc-en-api-drafts-9be85c3afb1334fedd6f6b4fbb10e4d70dfc40ec39f3d5e3663c0472d9a7f96f","title":"","text":"implementation should not aggressively close connections in these scenarios. If the Protocol Stack includes a transport protocol that also supports multipath connectivity with migration support, the Transport Services implementation should also inform the Protocol Instance of potentially new paths that become permissible based on the Selection Properties passed by the application. A protocol can then establish new subflows over new paths while an active path is still available or, if migration is supported, also after a break has been detected, and should attempt to tear down subflows over paths that are no longer used. The Transport Services API provides an interface to set a multipath policy that indicates when and how different paths should If the Protocol Stack includes a transport protocol that supports multipath connectivity, the Transport Services implementation should also inform the Protocol Instance of potentially new paths that become permissible based on the \"multipath\" Selection Property and the \"multipath-policy\" Connection Property choices made by the application. A protocol can then establish new subflows over new paths while an active path is still available or, if migration is supported, also after a break has been detected, and should attempt to tear down subflows over paths that are no longer used. The Transport Services API's Connection Property \"multipath-policy\" allows an application to indicate when and how different paths should be used. However, detailed handling of these policies is still implementation-specific. The decision about when to create a new implementation-specific. For example, if the \"multipath\" Selection Property is set to \"active\", the decision about when to create a new path or to announce a new path or set of paths to the remote endpoint, e.g., in the form of additional IP addresses, is implementation-specific or could be be supported by future API extensions. If the Protocol Stack includes a transport protocol that does not support multipath, but does support migrating between paths, the update to the set of available paths can trigger the connection to be migrated. In case of Pooled Connections pooled-connections, the transport system may add connections over new paths or different protocols to the pool if permissible based on the multipath policy and Selection implementation-specific. If the Protocol Stack includes a transport protocol that does not support multipath, but does support migrating between paths, the update to the set of available paths can trigger the connection to be migrated. In case of Pooled Connections pooled-connections, the Transport Services implementation may add connections over new paths to the pool if permissible based on the multipath policy and Selection Properties. In case a previously used path becomes unavailable, the transport system may disconnect all connections that require this path, but should not disconnect the pooled connection object exposed"}
{"_id":"doc-en-api-drafts-a663e4bc0f0a9c2f34fd383fa3c9294b1b2ad4d96e08ef780856f68cc49ccc16","title":"","text":"(e.g. I-D.ietf-httpbis-priority. A Transport Services system gives no guarantees about how its expression of relative priorities will be realized; for example, if a transport stack that only provides a single in-order reliable stream is selected, prioritization information can only be ignored. However, the Transport Services system will seek to ensure that performance of relatively-prioritized connections and messages is not worse with respect to those connections and messages than an equivalent configuration in which all prioritization properties are left at their defaults. expression of relative priorities will be realized. However, the Transport Services system will seek to ensure that performance of relatively-prioritized connections and messages is not worse with respect to those connections and messages than an equivalent configuration in which all prioritization properties are left at their defaults. The Transport Services interface does order Connection Priority over the Priority Message Property. In the absense of other externalities"}
{"_id":"doc-en-api-drafts-6c587f9c569bd7cde5f59ad13d07ee3c5b08248494bdd5924fe20f497e2834f9","title":"","text":"Preference Prefer Ignore This property specifies whether the application needs or prefers to use a transport protocol that preserves message boundaries."}
{"_id":"doc-en-api-drafts-259e38d267330258269655cf03f2b7053dbefcd0f60ea516d0ee40bbc432bd78","title":"","text":"applications written to a single API to make use of transport protocols in terms of the features they provide. A unified interface to datagram and connection-oriented transports, allowing use of a common API for connection- establishment and closing. A unified interface to datagram and stream-oriented transports, allowing use of a common API for connection establishment and closing. Message-orientation, as opposed to stream-orientation, using application-assisted framing and deframing where the underlying"}
{"_id":"doc-en-api-drafts-92b79c51b3cc1edd655924d9b476e9d754e0a0e293114c9cf0029f75f898b277","title":"","text":"and/or received from a Remote Endpoint (i.e., a logical connection that, depending on the kind of transport, can be bi-directional or unidirectional, and that can use a stream protocol or a datagram protocol). Connections can be created from Preconnections in three ways: by initiating the Preconnection (i.e., actively opening, as in a client; initiate), through listening on the Preconnection (i.e., passively opening, as in a server listen), or rendezvousing on the Preconnection (i.e., peer to peer establishment; rendezvous). protocol). Connections are presented consistently to the application, irrespective of whether the underlying transport is connection-less or connection-oriented. Connections can be created from Preconnections in three ways: by initiating the Preconnection (i.e., actively opening, as in a client; initiate), through listening on the Preconnection (i.e., passively opening, as in a server listen), or rendezvousing on the Preconnection (i.e., peer to peer establishment; rendezvous). Once a Connection is established, data can be sent and received on it in the form of Messages. The interface supports the preservation of"}
{"_id":"doc-en-api-drafts-7ef354d46e58ab81112f531cbfadbe25436515b8e9a1cf770309288618b1428e","title":"","text":"The messageData object provides access to the bytes that were received for this Message, along with the length of the byte array. The messageContext is provided to enable retrieving metadata about the message and referring to the message, e.g., to send replies and map responses to their requests. See msg-ctx for details. the message and referring to the message. The messageContext object ist described in msg-ctx. See framing for handling Message framing in situations where the Protocol Stack only provides a byte-stream transport."}
{"_id":"doc-en-api-drafts-1e8e3b4ee9e682527995e1a44f6dd1732d1cc3c74a90c5330d90cd355a158006","title":"","text":"is Any-source Multicast, and the path selection is based on the outbound route to the group supplied in the Local Endpoint. There are cases where it is required to open multiple connections for the same address(es). For example, one Connection might be opened for a multicast group to for a multicast control bus, and another application later opens a separate Connection to the same group to send signals to and/or receive signals from the common bus. In such cases, the interface needs to explicitly enable re-use of the same set of addresses (equivalent to setting SO_REUSEADDR in the socket API). UDP Multicast Receive Listeners will deliver new connections once they have received traffic from a new Remote Endpoint."}
{"_id":"doc-en-api-drafts-f17e93c23deb2cc26bd47fbb7d318fb358178e088393111dd18c8efc40d1f722","title":"","text":"3. The Transport Services API is the basic common abstract application programming interface to the Transport Services Architecture defined in the TAPS Architecture I-D.ietf-taps-arch. An application primarily interacts with this API through two Objects: Preconnections and Connections. A Preconnection object (pre- establishment) represents a set of properties and constraints on the"}
{"_id":"doc-en-api-drafts-3b495f807488cbe4423ce5b1b12b2e8da139feaceb9c085fd1a5542257dd3553","title":"","text":"Preconnections are reusable after being used to initiate a Connection. Hence, for example, after the Connections were closed, the following would be correct: ~~~ //.. carry out adjustments to the Preconnection, if desire Connection := Preconnection.Initiate() ~~~ the following would be correct: 3.1.3."}
{"_id":"doc-en-api-drafts-e2adab956e54107d83c053ba722b831d7927ff5c4eec852fcb9932ae4894938f","title":"","text":"4. Each application using the Transport Services Interface declares its preferences for how the transport service should operate using properties at each stage of the lifetime of a connection using Transport Properties, as defined in I-D.ietf-taps-arch. preferences for how the transport service should operate. This is done by using Transport Properties, as defined in I-D.ietf-taps-arch, at each stage of the lifetime of a connection. Transport Properties are divided into Selection, Connection, and Message Properties. Selection Properties (see selection-props) can"}
{"_id":"doc-en-api-drafts-8ee97539164d523ce882cd3bba4333b93b6a8cdc619fe563649a05cab35758ce","title":"","text":"Namespaces for each of the keywords provided in the IANA protocol numbers registry (see https://www.iana.org/assignments/protocol- numbers/protocol-numbers.xhtml), reformatted where necessary to conform to an implementation's naming conventions, are reserved for Protocol Specific Properties and MUST NOT be used for vendor or implementation-specific properties. numbers/protocol-numbers.xhtml) are reserved for Protocol Specific Properties and MUST NOT be used for vendor or implementation-specific properties. Avoid using any of the terms listed as keywords in the protocol numbers registry as any part of a vendor- or implementation- specific property name. 4.2."}
{"_id":"doc-en-api-drafts-7afa843b7b92e02674999aad8596e1451b847b7cbb61c3049952e75a42a354e3","title":"","text":"If more than one Remote Endpoint is specified on the Preconnection, then all the Remote Endpoints on the Preconnection SHOULD represent the same host. For example, the Remote Endpoints might represent the same service. For example, the Remote Endpoints might represent various network interfaces of a host, or a server reflexive address that can be used to reach a host, or a set of hosts that provide equivalent local balanced service."}
{"_id":"doc-en-api-drafts-8751a03731e1a1a3062a18895d08447557243e7c102a483d55703ffad024aed7","title":"","text":"Full Coverage This property specifies the minimum number of bytes in a received message that need to be covered by a checksum. A special value of 0 means that a received packet does not need to have a non-zero checksum field. A receiving endpoint will not forward messages that have less coverage to the application. The application is responsible for handling any corruption within the non-protected part of the message RFC8085. message that need to be covered by a checksum. A receiving endpoint will not forward messages that have less coverage to the application. The application is responsible for handling any corruption within the non-protected part of the message RFC8085. A special value of 0 means that a received packet may also have a zero checksum field. 8.1.2."}
{"_id":"doc-en-api-drafts-30b009cf2e6bd0524bbdb078b726859bc9c4afacfc44c6ff0123caf878de0c53","title":"","text":"to a single address over a single interface. They also present a single stream to the application. Software layers built upon sockets often propagate this limitation of a single-address single-stream model. The Transport Services architecture is designed to handle multiple candidate endpoints, protocols, and paths; and support multipath and multistreaming protocols. model. The Transport Services architecture is designed: to handle multiple candidate endpoints, protocols, and paths; to support candidate protocol racing to select the most optimal stack in each situation; to support multipath and multistreaming protocols; to provide state caching and application control over it. Transport Services implementations are meant to be flexible at connection establishment time, considering many different options and trying to select the most optimal combinations (gathering and racing). This requires applications to provide higher-level endpoints than IP addresses, such as hostnames and URLs, which are used by a Transport Services implementation for resolution, path selection, and racing. Transport services implementations can further implement fallback mechanisms if connection establishment of one protocol fails or performance is detected to be unsatisfactory. trying to select the most optimal combinations by racing them and measuring the results (see gathering and racing). This requires applications to provide higher-level endpoints than IP addresses, such as hostnames and URLs, which are used by a Transport Services implementation for resolution, path selection, and racing. Transport Services implementations can further implement fallback mechanisms if connection establishment of one protocol fails or performance is detected to be unsatisfactory. Information used in connection establishment (e.g. cryptographic resumption tokens, information about usability of certain protocols on the path, results of racing in previous connections) are cached in the transport services implementation. Applications have control over whether this information is used for a specific establishment, in order to allow tradeoffs between efficiency and linkability. Flexibility after connection establishment is also important. Transport protocols that can migrate between multiple network-layer"}
{"_id":"doc-en-api-drafts-d656c7416c2bef637e6be76fe1cc110fd4c82f6e13871f5508f476cadb208454","title":"","text":"system can race different security protocols, e.g., if the application explicitly specifies that it considers them equivalent. Whether information from previous racing attempts, or other information cached by the Transport Services implementation about past communications, is used during establishment is under application control. This allows applications to make tradeoffs between efficiency (through racing) and privacy (via information that might leak from the cache toward an on-path observer). Some applications have native concepts (e.g. \"incognito mode\") that align with this functionality. Applications need to ensure that they use security APIs appropriately. In cases where applications use an interface to provide sensitive keying material, e.g., access to private keys or"}
{"_id":"doc-en-api-drafts-27c2c614ba0cac51c146bc1ce59e2bfb46ae821d613d1879e9b6cdd588c711a2","title":"","text":"application. In general, any protocol or path used for a connection must conform to all three sources of constraints. A violation of any of the layers should cause a protocol or path to be considered ineligible for use. For an example of application preferences leading to constraints, an application may prohibit the use of metered network interfaces for a given Connection to avoid user cost. Similarly, the system policy at a given time may prohibit the use of such a metered network interface from the application's process. Lastly, the implementation itself may default to disallowing certain network interfaces unless explicitly requested by the application and allowed by the system. to all three sources of constraints. A violation that occurs at any of the policy layers should cause a protocol or path to be considered ineligible for use. For an example of application preferences leading to constraints, an application may prohibit the use of metered network interfaces for a given Connection to avoid user cost. Similarly, the system policy at a given time may prohibit the use of such a metered network interface from the application's process. Lastly, the implementation itself may default to disallowing certain network interfaces unless explicitly requested by the application and allowed by the system. It is expected that the database of system policies and the method of looking up these policies will vary across various platforms. An"}
{"_id":"doc-en-autonomic-control-plane-04863f9dbc5e0c4b9af281b576d91f95522274ff3e1d9f83fb3479cf70190ff9","title":"","text":"certificate directly instead of relying on a referential mechanism such as communicating only a hash and/or URL for the certificate. Any security association protocol MUST use PFS (such as profiles providing PFS). Any security association protocol MUST provide Forward Secrecy (whether inherently or as part of a profile of the security association protocol). The degree of security required on every hop of an ACP network needs to be consistent across the network so that there is no designated"}
{"_id":"doc-en-autonomic-control-plane-bf8f19c13eec2e7b060f5cdd5c385c6e72cfa4387f3d26ca2cc2013283c94624","title":"","text":"6.7.1. An ACP node announces its ability to support IKEv2 as the ACP secure channel protocol in GRASP as \"IKEv2\". An ACP node announces its ability to support IPsec, negotiated via IKEv2, as the ACP secure channel protocol in GRASP as the \"IKEv2\" method for the \"AN_ACP\" objective. 6.7.1.1. To run ACP via IPsec natively, no further IANA assignments/ definitions are required. An ACP node that is supporting native IPsec MUST use IPsec security setup via IKEv2 for tunnel mode and IPsec/IKE signaling accordingly for IPv6 payload (e.g.: ESP next header of 41). It MUST use local and peer link-local IPv6 addresses for encapsulation. Authentication MUST use the ACP domain certificates. Certificate Encoding MUST support \"PKCS #7 wrapped X.509 certificate\" (0) (see IKEV2IANA for this and other IANA IKEv2 parameter names used in this text). If certificate chains are used, all intermediate certificates up to, but not including the locally provisioned trust anchor certificate must be signaled. The ACP usage of IPsec and IKEv2 mandates a narrow profile of the current standards-track usage guidance for IPsec RFC8221 and IKEv2 RFC8247. This profile provides for stringent security properties and can exclude deprecated/legacy algorithms because there is no need for interoperability with legacy equipment for ACP channels. Any such backward compatibility would lead only to increased attack surface and implementation complexity, for no benefit. An ACP node that is supporting native IPsec MUST use IPsec in tunnel mode, negotiated via IKEv2, and with IPv6 payload (e.g., ESP Next Header of 41). It MUST use local and peer link-local IPv6 addresses for encapsulation. Manual keying MUST NOT be used (independent of the security weaknesses of manual keying, it is incompatible with an autonomic platform). IPsec tunnel mode is required because the ACP will route/forward packets received from any other ACP node across the ACP secure"}
{"_id":"doc-en-autonomic-control-plane-f01fa5ee4879da71ab867734f1997112cee485c47b2a102bc79d5360438ef71c","title":"","text":"transport mode, it would only be possible to send packets originated by the ACP node itself. IKEv2 authentication MUST use authentication method=1 (\"RSA Digital Signature\") for ACP certificates with RSA key and methods 9,10,11 for ACP certificates with ECC key according to the keys size/curve. A certificate payload with the ACP certificate MUST be included during IKEv2 authentication to support the ACP domain membership as described in certcheck, because it is using additional elements of the ACP certificates. ACP peers are expected to have the same set of Trust Anchors (TA), so a certificate path MUST only be included in the signaled payload when the path contains intermediate certificates not in the TA set, such as sub-CAs (see acp-registrars). IPsec MUST support ESP with ENCR_AES_GCM_16 (RFC4106) due to its higher performance over ENCR_AES_CBC. ACP MUST NOT use any NULL encryption option due to the confidentiality of ACP payload that may not be encrypted by itself (when carrying legacy management protocol traffics as well as hop-by-hop GRASP). These requirements are based on RFC8221 but limited to the minimum necessary options because there is no need for interoperability with legacy equipment for ACP channels, instead any such backward compatibility would reduce the minimum security or performance required for ACP channels or increase the implementation complexity of the ACP. ACP IPsec implementations MUST support ESP with ENCR_AES_GCM_16 (RFC4106) due to its higher performance over ENCR_AES_CBC. ACP MUST NOT use any NULL encryption option due to the confidentiality of ACP payload that may not be encrypted by itself (when carrying legacy management protocol traffics as well as hop-by-hop GRASP). When using AES encryption, 256-bit keys MUST be used. AES-GCM is an AEAD cipher mode, so no ESP authentication algorithm requirement is needed. Once there are updates to RFC8221, these should accordingly be reflected in updates to these ACP requirements, for example if"}
{"_id":"doc-en-autonomic-control-plane-b78bff46bbbdbea3e8af1349b8644c91df0555757f998e49cc31b0df2deae729","title":"","text":"long as they do not result in a reduction of security over the above MTI requirements. For example, ESP compression MAY be used. IKEv2 MUST follow RFC8247 as necessary to support the above listed IPsec requirements. As for ESP (above), for IKEv2, the ENCR_AES_GCM_16 encryption algorithm (with 256-bit keys) MUST be supported. The IKEv2 PRF_HMAC_SHA2_512 pseudorandom function MUST be supported. IKEv2 Diffie-Hellman key exchange group 19 (256-bit random ECP) MUST be supported (in addition to 2048-bit MODP). ECC provides a similar security level to finite-field (MODP) key exchange with a shorter key length, so is generally preferred absent other considerations. IKEv2 authentication MUST use the ACP domain certificates. The Certificate Encoding \"PKCS #7 wrapped X.509 certificate\" (1) MUST be supported (see IKEV2IANA for this and other IANA IKEv2 parameter names used in this text). If certificate chains are used, all intermediate certificates up to, but not including the locally provisioned trust anchor certificate must be signaled. A certificate payload with the ACP certificate MUST be included during IKEv2 authentication to support the ACP domain membership check as described in certcheck, because it is using additional elements of the ACP certificates. ACP peers are expected to have the same set of Trust Anchors (TA), so a certificate path MUST only be included in the signaled payload when the path contains intermediate certificates not in the TA set, such as sub-CAs (see acp-registrars). ACP nodes are identified by their ACP address, so the ID_IPv6_ADDR IKEv2 identification payload MUST be used and MUST convey the ACP address. If the peer's ACP domain certificate includes an ACP address in the domain information, the address in the identification payload must match the address in the certificate (allowing for the presence of virtualization bits in the ACP addressing scheme used). IKEv2 authentication MUST use authentication method 14 (\"Digital Signature\") for ACP certificates; this authentication method can be used with both RSA and ECDSA certificates, as indicated by a PKIX- style OID. The Digital Signature hash SHA2-512 MUST be supported (in addition to SHA2-256). Once there are updates to RFC8247, these should accordingly be reflected in updates to these ACP requirements, for example if ENCR_AES_GCM_16 was to be superceeded in the future or the key- exchange group recommendations are changed. Additional requirements from RFC8247 MAY be used for ACP channels as long as they do not result in a reduction of security over the above MTI requirements. 6.7.1.2."}
{"_id":"doc-en-autonomic-control-plane-ffb4a877871cc1c192231f6cae0ad9a0f7053e83c2e4c3b6aad9480353193046","title":"","text":"the first transport encryption supported in some classes of constrained devices. An ACP node announces its ability to support DTLS as the ACP secure channel protocol in GRASP as the \"DTLS\" method for the \"AN_ACP\" objective. To run ACP via UDP and DTLS v1.2 RFC6347 a locally assigned UDP port is used that is announced as a parameter in the GRASP AN_ACP objective to candidate neighbors."}
{"_id":"doc-en-basic-yang-module-2c5fd403df584f32f686c3cfb83f45a62a54f821fabbf67c5d1f205fd099f761","title":"","text":"Abstract This document defines a YANG RPC and a minimal datastore tree required to retrieve attestation evidence about integrity measurements from a composite device with one or more roots of trust for reporting. Complementary measurement logs are also provided by the YANG RPC originating from one or more roots of trust of measurement. The module defined requires at least one TPM 1.2 or TPM 2.0 and corresponding Trusted Software Stack included in the device components of the composite device the YANG server is running on. This document defines a YANG RPC and a minimal datastore required to retrieve attestation evidence about integrity measurements from a device following the operational context defined in I-D.ietf-rats- tpm-based-network-device-attest. Complementary measurement logs are also provided by the YANG RPC originating from one or more roots of trust of measurement. The module defined requires at least one TPM 1.2 or TPM 2.0 and corresponding Trusted Software Stack included in the device components of the composite device the YANG server is running on. 1. This document is based on the terminology defined in the I-D.ietf- rats-architecture and uses the interaction model and information elements defined in the I-D.birkholz-rats-reference-interaction-model document. The currently supported hardware security modules (HWM) - sometimes also referred to as an embedded secure element (eSE) - is the Trusted Platform Module (TPM) version 1.2 and 2.0 specified by the Trusted Computing Group (TCG). One ore more TPMs embedded in the components of a composite device - sometimes also referred to as an aggregate device - are required in order to use the YANG module defined in this document. A TPM is used as a root of trust for reporting (RTR) in order to retrieve attestation evidence from a composite device (quote primitive operation). Additionally, it is used as a root of trust for storage (RTS) in order to retain shielded secrets and store system measurements using a folding hash function (extend primitive operation). rats-architecture and uses the operational context defined in I- D.ietf-rats-tpm-based-network-device-attest as well as the interaction model and information elements defined in I-D.birkholz- rats-reference-interaction-model. The currently supported hardware security modules (HWM) are the Trusted Platform Module (TPM) TPM1.2 and TPM2.0 specified by the Trusted Computing Group (TCG). One ore more TPMs embedded in the components of a composite device - sometimes also referred to as an aggregate device - are required in order to use the YANG module defined in this document. A TPM is used as a root of trust for reporting (RTR) in order to retrieve attestation evidence from a composite device (quote primitive operation). Additionally, it is used as a root of trust for storage (RTS) in order to retain shielded secrets and store system measurements using a folding hash function (extend primitive operation). 1.1."}
{"_id":"doc-en-basic-yang-module-7e31519ec927cb0becafb14f8515923966269bdeb47e14be973786322861bf93","title":"","text":"2.2.1. This YANG module imports modules from RFC6991, RFC8348, I-D.ietf- netconf-crypto-types, ietf-asymmetric-algs.yang. netconf-keystore, ietf-tcg-algs.yang. 2.3. 2.2.1.1. This module supports the following types of attestation event logs: , , and . 2.2.1.2. - Allows a Verifier to request a quote of PCRs from a TPM1.2 compliant cryptoprocessor. When one or more is not provided, all TPM1.2 compliant cryptoprocessors will respond. - Allows a Verifier to request a quote of PCRs from a TPM2.0 compliant cryptoprocessor. When one or more is not provided, all TPM2.0 compliant cryptoprocessors will respond. - Allows a Verifier to acquire the evidence which was extended into specific PCRs. 2.2.1.3. container - This exists when there are more than one TPM for a particular Attester. This allows each specific TPM to identify on which it belongs. container - Provides configuration and operational details for each supported TPM, including the tpm-firmware-version, PCRs which may be quoted, certificates which are associated with that TPM, and the current operational status. Of note is the certificates which are associated with that TPM. As a certificate is associated with a single Attestation key, knowledge of the certificate allows a specific TPM to be identified. container - Identifies which TCG algorithms are available for use the Attesting platform. This allows an operator to limit algorithms available for use by RPCs to just a desired set from the universe of all allowed by TCG. 2.2.1.4. 2.2.2. Cryptographic algorithm types were initially included within -v14 NETCONF's iana-crypto-types.yang. Unfortunately all this content including the algorithms needed here failed to make the -v15 used WGLC. Therefore a modified version of this draft is included here. Perhaps someone will steward this list as a separate draft. WGLC. As a result this document has encoded the TCG Algorithm definitions of TCG-Algos, revision 1.32. By including this full table as a separate YANG file within this document, it is possible for other YANG models to leverage the contents of this model. 2.2.2.1. There are two types of features supported and . Support for either of these features indicates that a cryptoprocessor supporting the corresponding type of TCG API is present on an Attester. Most commonly, only one type of cryptoprocessor will be available on an Attester. 2.2.2.2. There are three types of identities in this model. The first are the cryptographic functions supportable by a TPM algorithm, these include: , , , , , , , and . The definitions of each of these are in Table 2 of TCG-Algos. The second are API specifications for tpms: and . The third are specific algorithm types. Each algorithm type defines what cryptographic functions may be supported, and on which type of API specification. It is not required that an implementation of a specific TPM will support all algorithm types. The contents of each specific algorithm mirrors what is in Table 3 of TCG-Algos. 2.2.2.3. Note that not all cryptographic functions are required for use by ietf-tpm-remote-attestation.yang. However the full definition of Table 3 of TCG-Algos will allow use by additional YANG specifications. 3. This document will include requests to IANA: To be defined yet. To be defined yet. But keeping up with changes to ietf-tcg-algs.yang will be necessary. 4. There are always some. The YANG module specified in this document defines a schema for data that is designed to be accessed via network management protocols such as NETCONF RFC6241 or RESTCONF RFC8040. The lowest NETCONF layer is the secure transport layer, and the mandatory-to-implement secure transport is Secure Shell (SSH) RFC6242. The lowest RESTCONF layer is HTTPS, and the mandatory-to-implement secure transport is TLS RFC5246. There are a number of data nodes defined in this YANG module that are writable/creatable/deletable (i.e., config true, which is the default). These data nodes may be considered sensitive or vulnerable in some network environments. Write operations (e.g., edit-config) to these data nodes without proper protection can have a negative effect on network operations. These are the subtrees and data nodes and their sensitivity/vulnerability: Container: , , , and all could be populated with algorithms which are not supported by the underlying physical TPM installed by the equipment vendor. Container: - Although shown as 'rw', it is system generated - It is possible to configure PCRs for extraction which are not being extended by system software. This could unnecessarily use TPM resources. - It is possible to provision a certificate which does not correspond to a Attestation Identity Key (AIK) within the TPM. RPC: - Need to verify that the certificate is for an active AIK. RPC: - Need to verify that the certificate is for an active AIK. RPC: - Pulling lots of logs can chew up system resources. 5. Changes from version 02 to version 03: moved to tcg-algs cleaned up model to eliminate sources of errors removed key establishment RPC added lots of XPATH which must all be scrubbed still Descriptive text added on model contents. Changes from version 01 to version 02: Extracted Crypto-types into a separate YANG file"}
{"_id":"doc-en-brski-cloud-e85debb6a44d8d34b88f4b87609c87c872a9801616b3bc66aedc92d35c3d911a","title":"","text":"1. Bootstrapping Remote Secure Key Infrastructures BRSKI specifies automated bootstrapping of an Autonomic Control Plane. BRSKI Section 2.7 describes how a pledge \"MAY contact a well-known URI of a cloud registrar if a local registrar cannot be discovered or if the pledge's target use cases do not include a local registrar\". automated network onboarding of devices, referred to as pledges, within an Autonomic Control Plane or other managed network infrastructure. BRSKI Section 2.7 describes how a pledge \"MAY contact a well-known URI of a cloud registrar if a local registrar cannot be discovered or if the pledge's target use cases do not include a local registrar\". This document further specifies use of a BRSKI cloud registrar and clarifies operations that are not sufficiently specified in BRSKI."}
{"_id":"doc-en-brski-cloud-3d1e1c5b37c2d89f14eb8c482acdd24f9859e24b58779ee2f8e1dba9088e28ef","title":"","text":"logically separate entities. The two functions could of course be integrated into a single service. TWO CHOICES: 1. Cloud Registrar redirects to Owner Registrar 2. Cloud Registrar returns VOUCHER pinning Owner Register. There are two different mechanisms for a cloud registrar to handle voucher requests: 1. the Cloud Registrar redirects the request to Owner Registrar for handling 2. the Cloud Registrar returns a voucher pinning the Owner Register and includes additional bootstrapping information embedded in the voucher Both mechanisms are described in detail later in this document. 2.1."}
{"_id":"doc-en-capport-wg-architecture-eae58172de6628d7415d18d10a6002a5fef63eb7dd66eccfe45aae2cc7a8327f","title":"","text":" CAPPORT Architecture Captive Portal Architecture draft-ietf-capport-architecture-08 Abstract This document describes a CAPPORT architecture. DHCP or Router Advertisements, an optional signaling protocol, and an HTTP API are used to provide the solution. The role of Provisioning Domains (PvDs) is described. This document describes a captive portal architecture. DHCP or Router Advertisements, an optional signaling protocol, and an HTTP API are used to provide the solution. The role of Provisioning Domains (PvDs) is described. 1."}
{"_id":"doc-en-capport-wg-architecture-cbb5facecf9afca18dae531bc9160f9040cceb00c931b24ddb1158c112e66966","title":"","text":"2.2.1. A standard for providing a portal URI using DHCP or Router Advertisements is described in RFC7710bis. The CAPPORT architecture expects this URI to indicate the API described in section_api. Advertisements is described in RFC7710bis. The captive portal architecture expects this URI to indicate the API described in section_api. 2.2.2."}
{"_id":"doc-en-capport-wg-architecture-38acf2b9d8bccb6559d4dd9a464d16b23f259df5128e945e3b2e1c913b95cc8d","title":"","text":"A side-benefit of the architecture described in this document is that devices without user interfaces are able to identify parameters of captivity. However, this document does not yet describe a mechanism for such devices to escape captivity. captivity. However, this document does not describe a mechanism for such devices to negotiate for unrestricted network access. A future document could provide a solution to devices without user interfaces. This document focuses on devices with user interfaces. The architecture uses the following mechanisms:"}
{"_id":"doc-en-capport-wg-architecture-926f8a128fb73ef2b12ada41147c0e3b444c7c546aba16d514232186cdd03a31","title":"","text":"section_capport_enforcement, until site-specific requirements have been met. At this time we consider only devices with web browsers, with web This document only considers devices with web browsers, with web applications being the means of satisfying Captive Portal Conditions. An example interactive User Equipment is a smart phone. An example of such User Equipment is a smart phone. The User Equipment:"}
{"_id":"doc-en-capport-wg-architecture-9bfe229f3fa780a27110ee4576c34cd24503e57e370cd9eacfc4b3c1a09336ad","title":"","text":"A Captive Portal API needs to present information to clients that is unique to that client. To do this, some systems use information from the context of a request, such as the source address, to identify the UE. User Equipment. Using information from context rather than information from the URI allows the same URI to be used for different clients. However, it also means that the resource is unable to provide relevant information if the UE makes a request using a different network path. This might happen when UE has multiple network interfaces. It might also happen if the address of the API provided by DNS depends on where the query originates (as in split DNS RFC8499). information if the User Equipment makes a request using a different network path. This might happen when User Equipment has multiple network interfaces. It might also happen if the address of the API provided by DNS depends on where the query originates (as in split DNS RFC8499). Accessing the API MAY depend on contextual information. However, the URIs provided in the API SHOULD be unique to the UE and not dependent on contextual information to function correctly. Though a URI might still correctly resolve when the UE makes the request from a different network, it is possible that some functions could be limited to when the UE makes requests using the captive network. For example, payment options could be absent or a warning could be displayed to indicate the payment is not for the current connection. URIs provided in the API SHOULD be unique to the User Equipment and not dependent on contextual information to function correctly. Though a URI might still correctly resolve when the User Equipment makes the request from a different network, it is possible that some functions could be limited to when the User Equipment makes requests using the captive network. For example, payment options could be absent or a warning could be displayed to indicate the payment is not for the current connection. URIs could include some means of identifying the User Equipment in the URIs. However, including unauthenticated User Equipment"}
{"_id":"doc-en-capport-wg-architecture-d7f6704191cd5cb84e0cb4a9704a1386635675706d9f16c40a15d1cb27e66b70","title":"","text":"Captive Portal Signaling Protocol: Also known as Signaling Protocol. The protocol for communicating Captive Portal Signals. Captive Portal Session: Also referred to simply as the \"session\", a Captive Portal Session is the association for a particular User Equipment that starts when it interacts with the Captive Portal and gains open access to the network, and ends when the User Equipment moves back into the original captive state. The Captive Network maintains the state of each active Session, and can limit Sessions based on a length of time or a number of bytes used. The Session is associated with a particular User Equipment using the User Equipment's identifier (see ue_identity). 2. 2.1."}
{"_id":"doc-en-capport-wg-architecture-8963a352cd25fcd248c6e9cf45009536d90adf2bac13c4770c67640e8c2e8db9","title":"","text":"Architecture RFC7556 provides some discussion on authenticating an operator. Given that a user chooses to visit a Captive Portal URI, the URI location SHOULD be securely provided to the user's device. E.g., the DHCPv6 AUTH option can sign this information. The user makes an informed choice to visit and trust the Captive Portal URI. Since the network provides Captive Portal URI to the user equipment, the network SHOULD do so securely so that the user's trust in the network can extend to their trust of the Captive Portal URI. E.g., the DHCPv6 AUTH option can sign this information. If a user decides to incorrectly trust an attacking network, they might be convinced to visit an attacking web page and unwittingly"}
{"_id":"doc-en-capport-wg-architecture-b652ceb3a87da81817881d7f7707d85f9a67dd4c4d95da053e4a05e29c57c34d","title":"","text":"This document describes an architecture for implementing captive portals while addressing most of the problems arising for current captive portal mechanisms. The architecture is guided by these principles: requirements: A side-benefit of the architecture described in this document is that devices without user interfaces are able to identify parameters of"}
{"_id":"doc-en-capport-wg-architecture-9a1711a0fdca4c243a60f03d9e3c0d2d1de02f258a886c7b334dda402724e690","title":"","text":"The authors thank Benjamin Kaduk for providing the content related to TLS certificate validation of the API server. The authors thank Michael Richardson for providing wording requiring DNSSEC and TLS to operate without the user adding exceptions. The authors thank various individuals for their feedback on the mailing list and during the IETF98 hackathon: David Bird, Erik Kline, Alexis La Goulette, Alex Roscoe, Darshak Thakore, and Vincent van"}
{"_id":"doc-en-capport-wg-architecture-699137b0f14013a6fdb94f6f877bcd0f4d73e468de296d61eae531cae2732f30","title":"","text":"The API MUST ensure the integrity of this information, as well as its confidentiality. An attacker with access to this information might be able to masquerade as a specific User Equipment when interacting with the API, which could then allow them to masquerade as that User Equipment when interacting with the User Portal. This could give them the ability to determine whether the User Equipment has accessed the portal, or deny the User Equipment service by ending their session using mechanisms provided by the User Portal, or consume that User Equipment's quota. An attacker with the ability to modify the information could deny service to the User Equipment, or cause them to appear as a different User Equipment. 7.4. If a Signaling Protocol is implemented, it may be possible for any"}
{"_id":"doc-en-capport-wg-architecture-37ecb0c58cf50e8e7993dd447b89ee043f88d9003f9d4676e525888291a3470b","title":"","text":"2.5. User Equipment may send traffic to hosts blocked by the captive network prior to the Enforcement device granting it access. The Enforcement Device rightly blocks or resets these requests. However, in the absence of a signal from the Enforcement Device or interaction with the API server, the User Equipment can only guess at whether it is captive. Consequently, allowing the Enforcement Device to explicitly signal to the User Equipment that the traffic is being blocked may improve the user's experience. An Enforcement Device may also want to notify the User Equipment of a pending expiry of its access to the external network, so providing the Enforcement Device the ability to preemptively signal may be desirable. A specific Captive Portal Signaling Protocol is out of scope for this document. However, in order to ensure that future protocols fit into the architecture, requirements for a Captive Portal Signaling Protocol follow: The Captive Portal Signaling Protocol does not provide any means of indicating that the network prevents access to some destinations. The intent is to rely on the Captive Portal API and the web portal to which it points to communicate local network policies. The Captive Portal Enforcement function MAY send Captive Portal Signals when User Equipment that has not satisfied the Captive Portal Conditions attempts to send traffic to the network. These signals MUST be rate-limited to a configurable rate. The signals MUST NOT be sent to the destinations/peers that the User Equipment is restricted from accessing. The indications are only to be sent to the User Equipment. When User Equipment first connects to a network, or when there are changes in status, the Enforcement Device could generate a signal toward the User Equipment. This signal indicates that the User Equipment might need to contact the API Server to receive updated information. For instance, this signal might be generated when the end of a session is imminent, or when network access was denied. An Enforcement Device MUST rate-limit any signal generated in response to these conditions. See section_signal_risks for a discussion of risks related to a Captive Portal Signal. 2.6."}
{"_id":"doc-en-capport-wg-architecture-637b74356b8f8aecb363f6a4b1bb8fc97f1c224bc1af1a13da235bb825d32c36","title":"","text":"7.5. The Signal could inform the User Equipment that it is being held captive. There is no requirement that the User Equipment do something about this. Devices MAY permit users to disable automatic reaction to captive-portal indications for privacy reasons. However, there would be the trade-off that the user doesn't get notified when network access is restricted. Hence, end-user devices MAY allow users to manually control captive portal interactions, possibly on the granularity of Provisioning Domains. The Captive Portal Signal could inform the User Equipment that it is being held captive. There is no requirement that the User Equipment do something about this. Devices MAY permit users to disable automatic reaction to Captive Portal Signals indications for privacy reasons. However, there would be the trade-off that the user doesn't get notified when network access is restricted. Hence, end-user devices MAY allow users to manually control captive portal interactions, possibly on the granularity of Provisioning Domains. "}
{"_id":"doc-en-capport-wg-architecture-69835d20f5eb2f9a4e6323609f06742d31f40ab28a64e28fbd0f153753cf8fa6","title":"","text":"information, expiry time, method of providing credentials, security token for validating ICMP messages. This document does not specify the details of the API. The API MUST use TLS for privacy and server authentication. The implementation of the API MUST ensure both privacy and integrity of any information provided by or required by it. The CAPPORT API MUST support TLS for privacy and server authentication. This document does not specify the details of the API. 2.4."}
{"_id":"doc-en-capport-wg-architecture-6e3d7c57f3731ebfd3730a777c2eefe4477eee75b47ef22a711e806cf236585f","title":"","text":"5.2. The solution described here assumes that when the User Equipment needs to trust the API server, server authentication will be utilized using TLS mechanisms. needs to trust the API server, server authentication will be performed using TLS mechanisms. 5.3. The solution described here requires that the API be secured using TLS. This is required to allow the user equipment and API server to exchange secrets which can be used to validate future interactions. The API must ensure the integrity of this information, as well as its confidentiality. 5.4. It is possible for any user on the Internet to send ICMP packets in an attempt to cause the receiving equipment to go to the captive portal. This has been considered and addressed in the following"}
{"_id":"doc-en-capport-wg-architecture-dc598443ab6bd46a9b8bc3789090ea757a42dab7f9d6f2494abb5d4ee23478bd","title":"","text":"Even when redirected, the User Equipment securely authenticates with API servers. 5.4. 5.5. The ICMP messaging informs the User Equipment that it is being held captive. There is no requirement that the User Equipment do"}
{"_id":"doc-en-capport-wg-architecture-6bb54d5e0c7d682f3fd7a6c94e81664afa69df1a964e612df4d764ce09faf725","title":"","text":"3. Multiple components in the architecture interact with both the User Equipment and each other. Since the User Equipment is the focus of these interactions, the components must be able to both identify the user equipment from their interactions with it, and be able to agree on the identify of the user equipment when interacting with each other. The methods by which the components interact restrict the type of information that may be used as an identifying charactertics. This section discusses the identifying charactersitics. 3.1. An Identifier is a chatacteristic of the User Equipment used by the components of a Captive Portal to uniquely determine which specific User Equipment is interacting with them. An Identifier MAY be a field contained in packets sent by the User Equipment to the External Network. Or, an Identifier MAY be an ephemeral property not contained in packets destined for the External Network, but instead correlated with such information through knowledge available to the different components. 3.2. The set of possible identifiers is quite large. However, in order to be considered a good identifer, an identifier SHOULD meet the following criteria. Note that the optimal identifier will likely change depending on the positino of the components in the network as well as the information available to them. An identifier SHOULD: Uniquely Identify the User Equipment Be Hard to Spoof Be Visible to the API Be Visible to the Enforcement Device 3.2.1. In order to uniquely identify the User Equipment, at most one user equipment interacting with the other components of the Captive Portal MUST have a given value of the identifier. Over time, the user equipment identified by the value MAY change. Allowing the identified device to change over time ensures that the space of possible identifying vallues need not be overly large. Independent Captive Portals MAY use the same identifying value to identify different User Equipment. Allowing indendent captive portals to reuse identifying values allows the identifier to be a property of the local network, expanding the space of possible identifiers. 3.2.2. A good identifier does not lend itself to being easily spoofed. At no time should it be simple or straightforward for one User Equipment to pretend to be another User Equipment, regardless of whether both are active at the same time. This property is particularly important when the user equipment is extended externally to devices such as billing systems, or where the identity of the User Equipment could imply liability. 3.2.3. Since the API will need to perform operations which rely on the identify of the user equipment, such as query whether it is captive, the API needs to be able to relate requests to the User Equipment making the request. 3.2.4. The Enforcement Device will decide on a per packet basis whether it should be permitted to communicate with the external network. Since this decision depends on which User Equipment sent the packet, the Enforcement Device requires that it be able to map the packet to its concept of the User Equipment. 3.3. To evaluate whether an identifer is appropriate, one should consider every recommended property from the perspective of interactions among the components in the architecture. When comparing identifiers, choose the one which best satifies all of the recommended properties. The architecture does not provide an exact measure of how well an identifier satisfies a given property; care should be taken in performing the evaluation. 3.4. This section provides some examples of identifiers, along with some evaluation of whether they are good identifiers. The list of identifiers is not exhaustive. Other identifiers may be used. An important point to note is that whether the identifiers are good depends heavily on the capabilities of the components and where in the network the components exist. 3.4.1. The physical interface by which the User Equipment is attached to the network can be used to identify the User Equipment. This identifier has the property of being extremely difficult to spoof: the User Equipment is unaware of the property; one User Equipment cannot manipulate its interactions to appear as though it is another. Further, if only a single User Equipment is attatched to a given physical interface, then the identifier will be unique. If multiple User Equipment is attached to the network on the same physical interface, then this property is not appropriate. Another consideration related to uniqueness of the User Equipment is that if the attached User Equipment changes, both the API server and the Enforcement Device must invalidate their state related to the User Equipment. The Enforcement Device needs to be aware of the physical interface, which constrains the environment: it must either be part of the device providing physical access (e.g., implemented in firmware), or packets traversing the network must be extended to include information about the source physical interface (e.g. a tunnel). The API server faces a similar problem, implying that it should co- exist with the Enforcement Device, or that the enforcement device should extend requests to it with the identifying information. 3.4.2. A natural identifier to consider is the IP address of the User Equipment. At any given time, no device on the network can have the same IP address without causing the network to malfunction, so it is appropriate from the perspective of uniqueness. However, it may be possible to spoof the IP address, particularly for malicious reasons where proper functioning of the network is not necessary for the malicious actor. Consequently, any solution using the IP address should proactively try to prevent spoofing of the IP address. Similarily, if the mapping of IP address to User Equipment is changed, the components of the architecture must remove or update their mapping to prevent spoofing. Demonstrations of return routeability, such as that required for TCP connection establishment, might be sufficient defense against spoofing, though this might not be sufficient in networks that use broadcast media (such as some wireless networks). Since the IP address may traverse multiple segments of the network, more flexibility is afforded to the Enforcement Device and the API server: they simply must exist on a segment of the network where the IP address is still unique. However, consider that a NAT may be deployed between the User Equipment and the Enforcement Device. In such cases, it is possible for the components to still uniquely identify the device if they are aware of the port mapping. In some situtations, the User Equipment may have multiple IP addresses, while still satisfying all of the recommended properties. This raises some challenges to the components of the network. For example, if the user equipment tries to access the network with multiple IP addresses, should the enforcement device and API server treat each IP address as a unique User Equipment, or should it tie the multiple addresses together into one view of the subscriber? An implementation MAY do either. Attention should be paid to IPv6 and the fact that it is expected for a device to have multiple IPv6 addresses on a single link. In such cases, idenfication could be performed by subnet, such as the /64 to which the IP belongs. 4. This section aims to improve understanding by describing a possible workflow of solutions adhering to the architecture. 3.1. 4.1. This section describes a possible work-flow when User Equipment initially joins a Captive Network."}
{"_id":"doc-en-capport-wg-architecture-9b26bc841e76d50e6c54918d7f74191f5eae882ebb7b56858a1e42e68d4cfadd","title":"","text":"The User Equipment accesses the network until conditions Expire. 3.2. 4.2. This section describes a possible work-flow when conditions expire and the user visits the portal again (e.g., low quota, or time"}
{"_id":"doc-en-capport-wg-architecture-eda4ff6994535468ce26c23c90380c4b1ee9da9587d0e8f78eacabc9e340fc29","title":"","text":"The User Equipment accesses the external network. 4. 5. This memo includes no request to IANA. 5. 6. 5.1. 6.1. When joining a network, some trust is placed in the network operator. This is usually considered to be a decision by a user on the basis of"}
{"_id":"doc-en-capport-wg-architecture-62077b4d3f3e7953648c092be0ed4b04dc171e620329c332896f0a80805e0aa2","title":"","text":"provide credentials to an attacker. Browsers can authenticate servers but cannot detect cleverly misspelled domains, for example. 5.2. 6.2. The solution described here assumes that when the User Equipment needs to trust the API server, server authentication will be performed using TLS mechanisms. 5.3. 6.3. The solution described here requires that the API be secured using TLS. This is required to allow the user equipment and API server to"}
{"_id":"doc-en-capport-wg-architecture-1e79281aea37ce2b3e6bbcec80b2e9d6c7bce194f626ef67d9ff36b68836fbcd","title":"","text":"The API must ensure the integrity of this information, as well as its confidentiality. 5.4. 6.4. It is possible for any user on the Internet to send ICMP packets in an attempt to cause the receiving equipment to go to the captive"}
{"_id":"doc-en-capport-wg-architecture-777fe5e2c5297c6469d26912ca933da09fae3799129e3b9b158553fec13a668f","title":"","text":"Even when redirected, the User Equipment securely authenticates with API servers. 5.5. 6.5. The ICMP messaging informs the User Equipment that it is being held captive. There is no requirement that the User Equipment do"}
{"_id":"doc-en-coap-tcp-tls-77e71ad572856016b003c0838b9ed38ce1a71b9b32e5e739302c9ebec2ceb0b9","title":"","text":"2.2. Both the client and the server MUST send a Capabilities and Settings message (CSM see csm) as its first message on the connection. This message establishes the initial settings and capabilities for the endpoint such as maximum message size or support for block-wise transfers. The absence of options in the CSM indicates that base values are assumed. To avoid unnecessary latency, a client MAY send additional messages without waiting to receive the server CSM; however, it is important to note that the server CSM might advertise capabilities that impact how a client is expected to communicate with the server. For example, the server CSM could advertise a Max-Message-Size option (see max-message-size) that is smaller than the base value (1152). Clients and servers MUST treat a missing or invalid CSM as a connection error and abort the connection (see sec-abort). 2.3. The CoAP message format defined in RFC7252, as shown in CoAP-Header, relies on the datagram transport (UDP, or DTLS over UDP) for keeping the individual messages separate and for providing length"}
{"_id":"doc-en-coap-tcp-tls-2a65b46eccf7e456ab8201bf2c2098e4224f7f89f5d41e73459d6c416fed2918","title":"","text":"The semantics of the other CoAP header fields are left unchanged. 2.4. 2.3. Once a connection is established, both the client and the server MUST send a Capabilities and Settings message (CSM see csm) as its first message on the connection. This message establishes the initial settings and capabilities for the endpoint such as maximum message size or support for block-wise transfers. The absence of options in the CSM indicates that base values are assumed. To avoid unnecessary latency, a client MAY send additional messages without waiting to receive the server CSM; however, it is important to note that the server CSM might advertise capabilities that impact how a client is expected to communicate with the server. For example, the server CSM could advertise a Max-Message-Size option (see max-message-size) that is smaller than the base value (1152). Clients and servers MUST treat a missing or invalid CSM as a connection error and abort the connection (see sec-abort). CoAP requests and responses are exchanged asynchronously over the TCP/TLS connection. A CoAP client can send multiple requests without"}
{"_id":"doc-en-coap-tcp-tls-182cda7f964d70e2165af8b960654a052cd56cfdfa98ed3934bd80980346582e","title":"","text":"Retransmission and deduplication of messages is provided by the TCP/ TLS protocol. 2.4. Empty messages (Code 0.00) can always be sent and MUST be ignored by the recipient. This provides a basic keep-alive function that can refresh NAT bindings. If a client does not receive any response for some time after sending a CoAP request (or, similarly, when a client observes a resource and it does not receive any notification for some time), it can send a CoAP Ping Signaling message (sec-ping) to test the connection and verify that the server is responsive. 3. CoAP over WebSockets is intentionally similar to CoAP over TCP; therefore, this section only specifies the differences between the transports. CoAP over WebSockets can be used in a number of configurations. The most basic configuration is a CoAP client retrieving or updating a CoAP resource located at a CoAP server that exposes a WebSocket CoAP resource located on a CoAP server that exposes a WebSocket endpoint (arch-1). The CoAP client acts as the WebSocket client, establishes a WebSocket connection, and sends a CoAP request, to which the CoAP server returns a CoAP response. The WebSocket"}
{"_id":"doc-en-coap-tcp-tls-2b88b72b3c238c3993ba60e04c639f19419b9ea20ecba4d73323409a01da1556","title":"","text":"Further configurations are possible, including those where a WebSocket connection is established through an HTTP proxy. CoAP over WebSockets is intentionally very similar to CoAP over UDP. Therefore, instead of presenting CoAP over WebSockets as a new protocol, this document specifies it as a series of deltas from RFC7252. 3.1. Before CoAP requests and responses are exchanged, a WebSocket"}
{"_id":"doc-en-coap-tcp-tls-fe6a7e65aca21593a8090371150d5d9970702feeca06818289d5d226df2457d4","title":"","text":"frames as specified in Sections 5 and 6 of RFC6455. The message format shown in ws-message-format is the same as the CoAP over TCP message format (see tcp-message-format) with one restriction. The Length (Len) field MUST be set to zero because the WebSockets frame contains the length. over TCP message format (see tcp-message-format) with one change. The Length (Len) field MUST be set to zero because the WebSockets frame contains the length. The CoAP over TCP message format eliminates the Version field defined in CoAP over UDP. If CoAP version negotiation is required in the future, CoAP over WebSockets can address the requirement by the definition of a new subprotocol identifier that is negotiated during the opening handshake. As with CoAP over TCP, the message format for CoAP over Websockets eliminates the Version field defined in CoAP over UDP. If CoAP version negotiation is required in the future, CoAP over WebSockets can address the requirement by the definition of a new subprotocol identifier that is negotiated during the opening handshake. Requests and response messages can be fragmented as specified in Section 5.4 of RFC6455, though typically they are sent unfragmented"}
{"_id":"doc-en-coap-tcp-tls-742a2fa1da737a986fc7eb1a6de3a4addd597df485eabaa129f4a5b8d4e54bcb","title":"","text":"requests and responses can be transferred in a block-wise fashion as defined in RFC7959. Empty messages (Code 0.00) MUST be ignored by the recipient (see also sec-ping). 3.3. As with CoAP over TCP, both the client and the server MUST send a Capabilities and Settings message (CSM see csm) as its first message on the WebSocket connection. CoAP requests and responses are exchanged asynchronously over the WebSocket connection. A CoAP client can send multiple requests without waiting for a response and the CoAP server can return"}
{"_id":"doc-en-coap-tcp-tls-6d1bbb995768701d0f31882905477a5e0c6828cc0acabc8fea63e956cb551463","title":"","text":"The connection is bi-directional, so requests can be sent both by the entity that established the connection and the remote host. Retransmission and deduplication of messages is provided by the WebSocket protocol. CoAP over WebSockets therefore does not make a distinction between Confirmable or Non-Confirmable messages, and does not provide Acknowledgement or Reset messages. As with CoAP over TCP, retransmission and deduplication of messages is provided by the WebSocket protocol. CoAP over WebSockets therefore does not make a distinction between Confirmable or Non- Confirmable messages, and does not provide Acknowledgement or Reset messages. 3.4. When a client does not receive any response for some time after sending a CoAP request (or, similarly, when a client observes a resource and it does not receive any notification for some time), the connection between the WebSocket client and the WebSocket server may be lost or temporarily disrupted without the client being aware of it. To check the health of the WebSocket connection (and thereby of all active requests, if any), a client can send a CoAP Ping Signaling message (sec-ping). WebSocket Ping and unsolicited Pong frames as specified in Section 5.5 of RFC6455 SHOULD NOT be used to ensure that redundant maintenance traffic is not transmitted. There is no way to retransmit a request without creating a new one. Re-registering interest in a resource is permitted, but entirely unnecessary. 3.5. The WebSocket connection is closed as specified in Section 7 of RFC6455. All requests for which the CoAP client has not received a response yet are cancelled when the connection is closed. As with CoAP over TCP, the client can test the health of the CoAP over WebSocket connection by sending a CoAP Ping Signaling message (sec-ping). WebSocket Ping and unsolicited Pong frames (Section 5.5 of RFC6455) SHOULD NOT be used to ensure that redundant maintenance traffic is not transmitted. 4."}
{"_id":"doc-en-coap-tcp-tls-8d128db22d499bd8d29e6571c091b59222873e5e31ceebc80cb67f721e2427f1","title":"","text":"4.4. In CoAP over TCP, Empty messages (Code 0.00) can always be sent and MUST be ignored by the recipient. This provides a basic keep-alive function that can refresh NAT bindings. In contrast, Ping and Pong messages are a bidirectional exchange. In CoAP over reliable transports, Empty messages (Code 0.00) can always be sent and MUST be ignored by the recipient. This provides a basic keep-alive function. In contrast, Ping and Pong messages are a bidirectional exchange. Upon receipt of a Ping message, a single Pong message is returned with the identical token. As with all Signaling messages, the"}
{"_id":"doc-en-coap-tcp-tls-89fbabeb99dc26738e5957532cb22825696260512aff9452e415ef395a3c96da","title":"","text":"\"authority\" as defined in Section 3.2 of RFC3986. The Alternative-Address Option is a repeatable option as defined in Section 5.4.5 of RFC7252. Section 5.4.5 of RFC7252. When multiple occurrences of the option are included, the peer can choose any of the alternative transport addresses. The elective Hold-Off Option indicates that the server is requesting that the peer not reconnect to it for the number of seconds given in"}
{"_id":"doc-en-coap-tcp-tls-5732372e2ecfe3e6a6fed627e4a591b76ec032f6c79ce0166ef700c41f0d4fbb","title":"","text":"The syntax for the URI schemes in this section are specified using Augmented Backus-Naur Form (ABNF) RFC5234. The definitions of \"host\", \"port\", \"path-abempty\", and \"query\" are adopted from RFC3986. \"host\", \"port\", \"path-abempty\", \"query\", and \"fragment\" are adopted from RFC3986. Section 8 (Multicast CoAP) in RFC7252 is not applicable to these schemes."}
{"_id":"doc-en-coap-tcp-tls-25edcb46ee2f353c2be6b13cd6aa33511fef627f229f472421ef023ae44583ba","title":"","text":"Capability and Settings messages are used for two purposes: Capability options advertise the capabilities of the sender to the recipient. Each capability option advertises one capability of the sender to the recipient. Setting options indicate a setting that will be applied by the sender."}
{"_id":"doc-en-coap-tcp-tls-b547c894ff0ae3242d46deb0c3576ac57797e9143f48f924b3745610e097d007","title":"","text":"2.3. Both the client and the server MUST send a Capability and Settings message (CSM see csm) as its first message on the connection. This message establishes the initial settings and capabilities for the endpoint such as maximum message size or support for block-wise transfers. The absence of options in the CSM indicates that base values are assumed. Clients and servers MUST treat a missing or invalid CSM as a connection error and abort the connection (see sec-abort). 2.4. The CoAP message format defined in RFC7252, as shown in CoAP-Header, relies on the datagram transport (UDP, or DTLS over UDP) for keeping the individual messages separate and for providing length"}
{"_id":"doc-en-coap-tcp-tls-25d2ade63912b81aa1ec60f9edb7b096b3d7b523510ace45a5e5d548bf8c0cb2","title":"","text":"The semantics of the other CoAP header fields are left unchanged. 2.4. 2.5. CoAP requests and responses are exchanged asynchronously over the TCP/TLS connection. A CoAP client can send multiple requests without"}
{"_id":"doc-en-coap-tcp-tls-db183d0eb658bd64dcd02e618bccfcfccc2ab00f6e5d0e4c66b2ea5e77afc4b8","title":"","text":"Setting options indicate a setting that will be applied by the sender. Most CSM Options are useful mainly as initial messages in the connection. A Capability and Settings message MUST be sent by both endpoints at the start of the connection and MAY be sent at any other time by either endpoint over the lifetime of the connection. Both capability and settings options are cumulative. A Capability and Settings message does not invalidate a previously sent capability"}
{"_id":"doc-en-coap-tcp-tls-95bc6a859d5a865328c8c77c67ca6117836ab7a072937aa5424a4b8ec37d42f3","title":"","text":"Base values are listed below for CSM Options. These are the values for the Capability and Setting before any Capability and Settings messages sends a modified value. messages send a modified value. These are not default values for the option as defined in Section 5.4.4 in RFC7252. A default value would mean that an empty"}
{"_id":"doc-en-core-problem-details-24a46b985bcc12a1fa804afcee5c91ad56a1c46a6871dd3e56924408999b893d","title":"","text":"1.1. The terminology from RFC7252 and STD94 applies. Readers are also expected to be familiar with the terminology from RFC7807. The terminology from RFC7252, STD94, and RFC8610 applies; in particular CBOR diagnostic notation is defined in STD94 and RFC8610. Readers are also expected to be familiar with the terminology from RFC7807. In this document, the structure of data is specified in CDDL RFC8610 RFC9165."}
{"_id":"doc-en-core-problem-details-80de1c0e10bd911e35ebcb06ce99431618605c9f9d39f8e2eab9a818d3999563","title":"","text":"be dereferenced in the normal course of handling problem details (i.e., outside diagnostic/debugging procedures involving humans). An example of a custom extension using a URI as \"custom-problem- detail-entries\" key is shown in fig-example-custom-with-uri. fig-example-custom-with-uri shows an example (in CBOR diagnostic notation) of a custom extension using a (made-up) URI as \"custom- problem-detail-entries\" key. Obviously, an SDO like 3GPP can also easily register such a custom problem detail entry to receive a more efficient unsigned integer key; the same example but using a registered unsigned int as \"custom- problem-detail-entries\" key is shown in fig-example-custom-with-uint. key; fig-example-custom-with-uint shows how the same example would look like using a (made-up) registered unsigned int as \"custom- problem-detail-entries\" key: In summary, the keys for the maps used inside Custom Problem Detail entries are defined specifically to the identifier of that Custom"}
{"_id":"doc-en-cose-spec-2d4996ff5670b3e57adbb10b6de510fc4ef3649e1b5b247178e21b1a80dc8285","title":"","text":"calculation of the counter signature can be computed. Details on computing counter signatures are found in counter_signature. This parameter provides the time the content was created. For signatures and recipient structures, this would be the time that the signature or recipient key object was created. For content structures, this would be the time that the content was created. The unsigned integer value is the number of seconds, excluding leap seconds; after midnight UTC, January 1, 1970. This parameter provides the time the content cryptographic operation is performed. For signatures and recipient structures, this would be the time that the signature or recipient key object was created. For content structures, this would be the time that the content structure was created. The unsigned integer value is the number of seconds, excluding leap seconds; after midnight UTC, January 1, 1970. The field is primarily intended to be to be used for countersignatures, however it can additionally be used for replay detection as well. The CDDL fragment that represents the set of headers defined in this section is given below. Each of the headers is tagged as optional"}
{"_id":"doc-en-cose-spec-4953b66712a8dbb504f945a275b6ff6901d9cf7b83cb05ce197bf6da81884888","title":"","text":"1.3. There currently is no standard CBOR grammar available for use by specifications. In this document, we use a modified version of the CBOR data definition language (CDDL) defined in I-D.greevenbosch- appsawg-cbor-cddl. The differences between the defined grammar and the one we used are mostly self explanatory. The biggest difference being the addition of the choice operator '|'. Additionally, note the use of the null value which is used to occupy a location in an array but to mark that the element is not present. specifications. In this document, we use the grammar defined in the CBOR data definition language (CDDL) I-D.greevenbosch-appsawg-cbor- cddl. 2."}
{"_id":"doc-en-cose-spec-006af2f9b6b13be8bd383a4ecb6be1319624729847a4ec9765a7b4756425480c","title":"","text":"contains the information about the plain text or encryption process that is to be integrity protected. The field is encoded in CBOR as a 'bstr' if present and the value 'null' if there is no in CBOR as a 'bstr' if present and the value 'nil' if there is no data. The contents of the protected field is a CBOR map of the protected data names and values. The map is CBOR encoded before placing it into the bstr. Only values associated with the current"}
{"_id":"doc-en-cose-spec-79c829ae7c28825d0050175ab08b060bfb98515b363753ada9511c6b8d955c22","title":"","text":"would apply to multiple recipient structures. contains information about the plain text that is not integrity protected. If there are no field, then the value 'null' is used. protected. If there are no field, then the value 'nil' is used. Only values associated with the current cipher text are to be placed in this location even if the value would apply to multiple recipient structures. contains the initialization vector (IV), or it's equivalent, if one is needed by the encryption algorithm. If there is no IV, then the value 'null' is used. then the value 'nil' is used. contains additional authenticated data (aad) supplied by the application. This field contains information about the plain text data that is authenticated, but not encrypted. If the application does not provide this data, the value 'null' is used. does not provide this data, the value 'nil' is used. contains the encrypted plain text. If the cipherText is to be transported independently of the control information about the encryption process (i.e. detached content) then the value 'null' is encoded here. encryption process (i.e. detached content) then the value 'nil' is encoded here. contains the recipient information. The field can have one of three data types:"}
{"_id":"doc-en-cose-spec-9071f49b06d173c3563475f660a674a8efa1ba50867762feb3153e00ee8013a8","title":"","text":"recipients can be encoded either this way or as a single array element. A 'null' value if there are no recipients. A 'nil' value if there are no recipients. 4.1."}
{"_id":"doc-en-cose-spec-a6e8db8dd2bd5f7269e0720218795ac659a97160c5e6c38c74ae477d7b5d0e08","title":"","text":"4.1.1. In direct encryption mode, a shared secret between the sender and the recipient is used as the CEK. For direct encryption mode, no recipient structure is built. All of the information about the key is placed in either the protected or unprotected fields at the content level. When direct encryption mode is used, it MUST be the only mode used on the message. It is a massive security leak to have both direct encryption and a different key management mode on the same message. recipient is used as the CEK. When direct encryption mode is used, it MUST be the only mode used on the message. It is a massive security leak to have both direct encryption and a different key management mode on the same message. For JOSE, direct encryption key management is the only key management method allowed for doing MAC-ed messages. In COSE, all of the key"}
{"_id":"doc-en-cose-spec-d882aa20d67afc6b95a20db98e9a53661cd34c617ef4578dcf71d5ca14fe15ac","title":"","text":"The COSE_encrypt structure for the recipient is organized as follows: The 'protected', 'iv', 'aad', 'ciphertext' and 'recipients' fields MUST be null. MUST be nil. At a minimum, the 'unprotected' field SHOULD contain the 'alg' parameter as well as a parameter identifying the shared secret."}
{"_id":"doc-en-cose-spec-22e8321d27228bbb4492d6a7d4ef71cce695a7eed74cb0eaa80c4609af9236c4","title":"","text":"The COSE_encrypt structure for the recipient is organized as follows: The 'protected', 'aad', and 'recipients' fields MUST be null. The 'protected', 'aad', and 'recipients' fields MUST be nil. The plain text to be encrypted is the key from next layer down (usually the content layer)."}
{"_id":"doc-en-cose-spec-1f6b14ce51e55e61ba1dce302632476ee81ea7c8d393a37378326f595b15122e","title":"","text":"4.1.4. Direct Key Agreement derives the CEK from the shared secret computed by the key agreement operation. For Direct Key Agreement, no recipient structure is built. All of the information about the key and key agreement process is placed in either the 'protected' or 'unprotected' fields at the content level. by the key agreement operation. When direct key agreement mode is used, it SHOULD be the only mode used on the message. This method creates the CEK directly and that"}
{"_id":"doc-en-cose-spec-79ec7985e0bc3526c6cdcf7bccf6a5c7b125743aaaaa950ef6fa51ab3cbad6a7","title":"","text":"The COSE_encrypt structure for the recipient is organized as follows: The 'protected', 'aad', and 'iv' fields all use the 'null' value. The 'protected', 'aad', and 'iv' fields all use the 'nil' value. At a minimum, the 'unprotected' field SHOULD contain the 'alg' parameter as well as a parameter identifying the asymmetric key."}
{"_id":"doc-en-cose-spec-7b576e0bb0084be37569623611b158131dc7dca280e5772dd6f31c0efba1bda4","title":"","text":"The COSE_encrypt structure for the recipient is organized as follows: The 'protected', 'aad', and 'iv' fields all use the 'null' value. The 'protected', 'aad', and 'iv' fields all use the 'nil' value. The plain text to be encrypted is the key from next layer down (usually the content layer)."}
{"_id":"doc-en-cose-spec-09aac05347249c81bcd23a65033a50d4bc359d32c7df85779a5e147e53e423b3","title":"","text":"The following values are used for L: limits messages to 2^16 bytes in length. The nonce length is 13 bytes allowing for 2^(13*8) possible values of the nonce without repeating. limits messages to 2^16 bytes (64Kbyte) in length. This sufficently long for messages in the constrainted world. The nonce length is 13 bytes allowing for 2^(13*8) possible values of the nonce without repeating. limits messages to 2^64 byes in length. The nonce length is 7 bytes allowing for 2^56 possible values of the nonce without"}
{"_id":"doc-en-data-plane-drafts-21d7a0b4348ed0720367e2061ebf601b157bb1b8af159bdd183306aa21b50d4c","title":"","text":"7. Security considerations for DetNet are described in detail in I- D.ietf-detnet-security. This section considers exclusively security considerations which are specific to the DetNet data plane. D.ietf-detnet-security. General security considerations are described in I-D.ietf-detnet-architecture. This section considers exclusively security considerations which are specific to the DetNet IP data plane. Security aspects which are unique to DetNet are those whose aim is to provide the specific quality of service aspects of DetNet, which are"}
{"_id":"doc-en-data-plane-drafts-e5498e1b16ce7ef1531e720bc11ccb5ea65ddee277b3fea8c1d04228fa6fc3e1","title":"","text":"and bounded end-to-end delivery latency. The primary considerations for the data plane is to maintain confidentiality of data traversing the DetNet network, application flows can be protected through whatever means is provided by the underlying technology. For example, encryption may be used, such as that provided by IPSec RFC4301 for IP flows and by MACSec IEEE802.1AE-2018 for Ethernet (Layer-2) flows. DetNet flows are identified on a per-flow basis, which may provide attackers with additional information about the data flows (when compared to networks that do not include per-flow identification). This is an inherent property of DetNet which has security implications that should be considered when determining if DetNet is a suitable technology for any given use case. To provide uninterrupted availability of the DetNet quality of service, provisions can be made against DOS attacks and delay attacks. To protect against DOS attacks, excess traffic due to malicious or malfunctioning devices can be prevented or mitigated, for example through the use of traffic admission control applied at the input of a DetNet domain. To prevent DetNet packets from being delayed by an entityexternal to a DetNet domain, DetNet technology definition can allow for the mitigation of Man-In-The-Middle attacks, for example through use of authentication and authorization of devices within the DetNet domain. Because DetNet mechanisms or applications that rely on DetNet can make heavy use of methods that require precise time synchronization, the accuracy, availability, and integrity of time synchronization is of critical importance. Extensive discussion of this topic can be found in RFC7384. integrity of data and delivery of the associated DetNet service traversing the DetNet network. Application flows can be protected through whatever means is provided by the underlying technology. For example, encryption may be used, such as that provided by IPSec RFC4301 for IP flows and/or by an underlying sub-net using MACSec IEEE802.1AE-2018 for IP over Ethernet (Layer-2) flows. From a data plane perspective this document does not add or modify any header information. At the management and control level DetNet flows are identified on a per-flow basis, which may provide controller plane attackers with additional information about the data flows (when compared to controller planes that do not include per-flow identification). This is an inherent property of DetNet which has security implications that should be considered when determining if DetNet is a suitable technology for any given use case. To provide uninterrupted availability of the DetNet service, provisions can be made against DOS attacks and delay attacks. To protect against DOS attacks, excess traffic due to malicious or malfunctioning devices can be prevented or mitigated, for example through the use of existing mechanism such as policing and shaping applied at the input of a DetNet domain. To prevent DetNet packets from being delayed by an entity external to a DetNet domain, DetNet technology definition can allow for the mitigation of Man-In-The- Middle attacks, for example through use of authentication and authorization of devices within the DetNet domain. 8."}
{"_id":"doc-en-deprecation-header-0c0833b6ff096ead915ed22a75bb44f0c3ede84400f83c07fbe7b9efaf8bcd66","title":"","text":"The \"Deprecation\" response header field describes the deprecation of the resource identified with the response it occurred within (see Section 3.1.4.1 of HTTP). It conveys either the deprecation date, which may be in the future (the resource context will be deprecated at that date) or in the past (the resource context has been deprecated at that date), or it simply flags the resource context as being deprecated. Section 3.1.4.1 of HTTP). It conveys the deprecation date, which may be in the future (the resource context will be deprecated at that date) or in the past (the resource context has been deprecated at that date). Servers MUST NOT include more than one \"Deprecation\" header field in the same response. The date, if present, is the date when the resource was or will be deprecated. It is in the form of an IMF-fixdate timestamp. The date is the date when the resource was or will be deprecated. It is in the form of an IMF-fixdate timestamp. The following example shows that the resource context has been deprecated on Sunday, November 11, 2018 at 23:59:59 GMT: The deprecation date can be in the future. This means that the resource will be deprecated at the given date in future. If the deprecation date is not known, the header field can carry the simple string \"true\", indicating that the resource context is deprecated, without indicating when that happened: resource will be deprecated at the indicated date in the future. 2.2."}
{"_id":"doc-en-deprecation-header-ee6fb4ada29d533c7b7a246d1c4e516024606cd4277a497829796dca8fbd7d89","title":"","text":"10. The first example shows a deprecation header field without date information: The second example shows a deprecation header with date information The first example shows a deprecation header with date information and a link to the successor version: The third example shows a deprecation header field with links for the successor version and for the API's deprecation policy. In addition, it shows the sunset date for the deprecated resource: The second example shows a deprecation header field with links for the successor version and for the API's deprecation policy. In addition, it shows the sunset date for the deprecated resource: "}
{"_id":"doc-en-dnssec-chain-extension-f789bfd16df943c455c4da0e319ab0fe54293b0abffce15f483afb5e764ab149","title":"","text":"unsigned CNAME records that may have been synthesized in the response from a DNS resolver. The subsequent RRsets MUST contain the full sequence of DNS records needed to authenticate the TLSA record set from the server's trust anchor. Typically this means a sequence of DNSKEY and DS RRsets that cover all zones from the target zone containing the TLSA record set to the trust anchor zone. The subsequent RRsets MUST contain the full set of DNS records needed to authenticate the TLSA record set from the server's trust anchor. Typically this means a set of DNSKEY and DS RRsets that cover all zones from the target zone containing the TLSA record set to the trust anchor zone. The TLS client should be prepared to receive this set of RRsets in any order. Names that are aliased via CNAME and/or DNAME records may involve multiple branches of the DNS tree. In this case, the authentication"}
{"_id":"doc-en-draft-ietf-add-ddr-dcbbcd1ed0f6b46da6738cd46d0461aee3671f18dd44f592b1f1676faaa9c4bc","title":"","text":"for encrypted DNS protocols when the name of an encrypted resolver is known. This mechanism is designed to be limited to cases where unencrypted resolvers and their designated resolvers are operated by the same entity. the same entity or cooperating entities. 1."}
{"_id":"doc-en-draft-ietf-add-ddr-1b70f2af2e04d1dfff71de3c318664e4b377346248eb441a2259e3f02ecd303d","title":"","text":"Both of these approaches allow clients to confirm that a discovered Encrypted Resolver is designated by the originally provisioned resolver. \"Equivalence\" in this context means that the resolvers are operated by the same entity; for example, the resolvers are accessible on the same IP address, or there is a certificate that claims ownership over both resolvers. resolver. \"Designated\" in this context means that the resolvers are operated by the same entity or cooperating entities; for example, the resolvers are accessible on the same IP address, or there is a certificate that claims ownership over both resolvers. 1.1."}
{"_id":"doc-en-draft-ietf-add-ddr-681c20b38496ab9032119722d4306e9cdd99a8731f772436c13631e753acf606","title":"","text":"Resolvers. Other protocols can also use the format defined by I- D.schwartz-svcb-dns. However, if any protocol does not involve some form of certificate validation, new validation mechanisms will need to be defined to support validating equivalence as defined in to be defined to support validating designation as defined in authenticated. 4."}
{"_id":"doc-en-draft-ietf-add-ddr-63cf5a4b5f65f976f86aad0697c16593e7585cb59b92a75cee5b72f26c6cdc2b","title":"","text":"4.1. When a client discovers Designated Resolvers from an Unencrypted Resolver IP address, it can choose to use these Designated Resolvers either automatically, or based on some other policy, heuristic, or user choice. This document defines two preferred methods to automatically use Designated Resolvers: Authenticated Discovery authenticated, for when a TLS certificate can be used to validate the resolver's identity. Opportunistic Discovery opportunistic, for when a resolver is accessed using a non-public IP address. A client MAY additionally use a discovered Designated Resolver without either of these methods, based on implementation-specific policy or user input. Details of such policy are out of scope of this document. Clients SHOULD NOT automatically use a Designated Resolver without some sort of validation, such as the two methods defined in this document or a future mechanism. 4.2. Authenticated Discovery is a mechanism that allows automatic use of a Designated Resolver that supports DNS encryption that performs a TLS handshake. In order to be considered an authenticated Designated Resolver, the TLS certificate presented by the Encrypted Resolver MUST contain both the domain name (from the SVCB answer) and the IP address of the TLS certificate presented by the Designated Resolver MUST contain both the domain name (from the SVCB answer) and the IP address of the designating Unencrypted Resolver within the SubjectAlternativeName certificate field. The client MUST check the SubjectAlternativeName field for both the Unencrypted Resolver's IP address and the"}
{"_id":"doc-en-draft-ietf-add-ddr-e1cdee34517174c51ba851d2b9d9bce57493d1dfb9caf25954c2087be7703f45","title":"","text":"Resolver for any cases in which it would have otherwise used the Unencrypted Resolver. If the Designated Resolver has a different IP address than the Unencrypted Resolver and the TLS certificate does not cover the Unencrypted Resolver address, the client MUST NOT use the discovered Encrypted Resolver. Additionally, the client SHOULD suppress any further queries for Designated Resolvers using this Unencrypted Resolver for the length of time indicated by the SVCB record's Time to Live (TTL). not cover the Unencrypted Resolver address, the client MUST NOT automatically use the discovered Designated Resolver. Additionally, the client SHOULD suppress any further queries for Designated Resolvers using this Unencrypted Resolver for the length of time indicated by the SVCB record's Time to Live (TTL). If the Designated Resolver and the Unencrypted Resolver share an IP address, clients MAY choose to opportunistically use the Encrypted address, clients MAY choose to opportunistically use the Designated Resolver even without this certificate check (opportunistic). If resolving the name of an Encrypted Resolver from an SVCB record If resolving the name of a Designated Resolver from an SVCB record yields an IP address that was not presented in the Additional Answers section or ipv4hint or ipv6hint fields of the original SVCB query, the connection made to that IP address MUST pass the same TLS certificate checks before being allowed to replace a previously known and validated IP address for the same Encrypted Resolver name. and validated IP address for the same Designated Resolver name. 4.2. 4.3. There are situations where authenticated discovery of encrypted DNS configuration over unencrypted DNS is not possible. This includes"}
{"_id":"doc-en-draft-ietf-add-ddr-951b93871e7b70e5e3e8b04ac1255e6849c44e97c83e152f508b011aefefe4f6","title":"","text":"like RA guard RFC6105. An attacker might try to direct Encrypted DNS traffic to itself by causing the client to think that a discovered Designated Resolver uses a different IP address from the Unencrypted Resolver. Such an Encrypted Resolver might have a valid certificate, Resolver. Such a Designated Resolver might have a valid certificate, but be operated by an attacker that is trying to observe or modify user queries without the knowledge of the client or network. If the IP address of a Designated Resolver differs from that of an Unencrypted Resolver, clients MUST validate that the IP address of the Unencrypted Resolver is covered by the SubjectAlternativeName of the Encrypted Resolver's TLS certificate (authenticated). The constraints on validation of Designated Resolvers specified here apply specifically to the automatic discovery mechanisms defined in this documents, which are referred to as Authenticated Discovery and Opportunistic Discovery. Clients MAY use some other mechanism to validate and use Designated Resolvers discovered using the DNS SVCB record. However, use of such an alternate mechanism needs to take into account the attack scenarios detailed here. Opportunistic use of Encrypted Resolvers MUST be limited to cases where the Unencrypted Resolver and Designated Resolver have the same IP address (opportunistic). If the IP address of a Designated Resolver differs from that of an Unencrypted Resolver, clients applying Authenicated Discovery (authenticated) MUST validate that the IP address of the Unencrypted Resolver is covered by the SubjectAlternativeName of the Designated Resolver's TLS certificate. Clients using Opportunistic Discovery (opportunistic) MUST be limited to cases where the Unencrypted Resolver and Designated Resolver have the same IP address. 8."}
{"_id":"doc-en-draft-ietf-add-split-horizon-authority-9ac2caff1c07dbffa8fdda7c1f13c66b1b3a1866ffd03aa1cb4b084d0ec104c6","title":"","text":"resolvers frequently support a local \"hosts file\" that preempts query forwarding, and most DNS forwarders and full resolvers can also serve responses from a local zone file. Other standardized hybrid resolution behaviors include Local Root RFC8806, mDNS RFC6762, and NXDOMAIN synthesis for .onion RFC7686. resolution behaviors include RFC8806, RFC6762, and RFC7686. In many network environments, the network offers clients a DNS server (e.g. DHCP OFFER, IPv6 Router Advertisement). Although this server"}
{"_id":"doc-en-draft-ietf-add-split-horizon-authority-2958f39bf33bd83ca64914b9218bc03ad7132ccbb2956f78a00274c97ddcfbd4","title":"","text":"3. The protocol in this document allows the domain owner to create a split-horizon DNS. Other entities which do not own the domain are detected by the client. Thus, DNS filtering is not enabled by this The protocol in this document is designed to support the ability of a domain owner to create or authorize a split-horizon view of their domain. The protocol does not support split-horizon views created by any other entity. Thus, DNS filtering is not enabled by this protocol. 4."}
{"_id":"doc-en-draft-ietf-add-split-horizon-authority-b0fe77821075f64d3244e91ce539b81642c2b4ddc0287c70801eceec6983c0d9","title":"","text":"4.1. There are several DHCP options that convey local domain hints of different kinds. The most directly relevant is \"RDNSS Selection\" RFC6731, which provides \"a list of domains ... about which the RDNSS has special knowledge\", along with a \"High\", \"Medium\", or \"Low\" preference for each name. The specification notes the difficulty of relying on these hints without validation: Other local domain hints in DHCP include the \"Domain Name\" RFC2132, \"Access Network Domain Name\" RFC5986, \"Client FQDN\" RFC4704, and \"Name Service Search\" RFC2937 options. This specification may help clients to interpret these hints. For example, a rogue DHCP server could use the \"Client FQDN\" option to assign a client the name different kinds. The most directly relevant is RFC6731, which provides \"a list of domains ... about which the RDNSS has special knowledge\", along with a \"High\", \"Medium\", or \"Low\" preference for each name. The specification notes the difficulty of relying on these hints without validation: Other local domain hints in DHCP include the RFC2132, RFC5986, \"Client FQDN\" RFC4704, and RFC2937 options. This specification may help clients to interpret these hints. For example, a rogue DHCP server could use the \"Client FQDN\" option to assign a client the name \"www.example.com\" in order to prevent the client from reaching the true \"www.example.com\". A client could use this specification to check the network's authority over this name, and adjust its behavior"}
{"_id":"doc-en-draft-ietf-add-split-horizon-authority-0fd3319d858a0242d37713d159b51538efada9622f5f0fa09bd13aae489a3688","title":"","text":"SSID, IP subnet assigned, DNS server IP address or name, and other similar mechanisms. For example, one existing implementation determines the host has joined an internal network because the DHCP- assigned IP address belongs to the company's IP address (as assigned by the regional IP addressing authority) and the DHCP-advertised DNS IP address is one used by IT at that network. Other mechanisms exist in other products but are not interesting to this specification; rather what is interesting is this step to determine \"we have joined the internal corporate network\" occurred and the DNS server is configured as authoritative for certain DNS zones (e.g., *.example.com). assigned IP address belongs to the company's IP range (as assigned by the regional IP addressing authority) and the DHCP-advertised DNS IP address is one used by IT at that network. Other mechanisms exist in other products but are not interesting to this specification; rather what is interesting is this step to determine \"we have joined the internal corporate network\" occurred and the DNS server is configured as authoritative for certain DNS zones (e.g., ). Because a rogue network can simulate all or most of the above characteristics this specification details how to validate these characteristics, this specification details how to validate these claims in validating. 4.3."}
{"_id":"doc-en-draft-ietf-add-split-horizon-authority-18a7630e47ea45b7bb39c11e3c23714714200333efa525bcca570f3626ef0175","title":"","text":"7. Two examples are shown below. The first example showing an company with an internal-only DNS server resolving the entire zone for that company (e.g., *.example.com) the second example resolving only a subdomain of the company's zone (e.g., *.internal.example.com). Two examples are shown below. The first example shows a company with an internal-only DNS server that claims the entire zone for that company (e.g., ). In the second example, the internal servers resolves only a subdomain of the company's zone (e.g., ). 7.1."}
{"_id":"doc-en-draft-ietf-add-split-horizon-authority-84469f6551d5a17818ffbb92b250df7d47b42b6e21e253f847dd202781356350","title":"","text":"Today, on the Internet it publishes two NS records, \"ns1.example.com\" and \"ns2.example.com\". The host and network first need mutual support one of the mechanisms described in learning. Shown in fig-learn is learning using DNR and PvD. First, the host and network both need to support one of the discovery mechanisms described in learning. fig-learn shows discovery using DNR and PvD. Validation is then perfomed using either example-verify-public or Validation is then perfomed using either example-verify-external or example-verify-dnssec. 7.1.1. The figure below shows the steps performed to verify the local claims of DNS authority using a public resolver. of DNS authority using an external resolver. 7.1.2."}
{"_id":"doc-en-draft-ietf-add-split-horizon-authority-82ca04643426ae28f898e125c076c5ca9cde5f29e928fcaa969c7d3195e0a009","title":"","text":"7.2. A subdomain can also be used for all internal DNS names (e.g., the zone internal.example.com exists only on the internal DNS server). For successful validation described in this document the the internal DNS server will need a certificate signed by a CA trusted by the client. In many split-horizon deployments, all non-public domain names are placed in a separate child zone (e.g., ). In this configuration, the message flow is similar to internal- only, except that queries for hosts not within the subdomain (e.g., For such a name internal.example.com the message flow is similar to internal-only the difference is that queries for hosts not within the subdomain (www.example.com) are sent to the public resolver rather than resolver for internal.example.com. ) are sent to the external resolver rather than resolver for internal.example.com. As in internal-only, the internal DNS server will need a certificate signed by a CA trusted by the client. 8."}
{"_id":"doc-en-draft-ietf-add-split-horizon-authority-3e2c37f883ad366301846de57b1e217add6696a24f061803c2b33407b8d453c6","title":"","text":"ensure that names under the split-horizon are correctly signed or place them in an unsigned zone. If an internal zone name (e.g., internal.example.com) is used with this specification and a public certificate is obtained for validation, that internal zone name will exist in Certificate Transparency logs RFC9162. It should be noted, however, that this specification does not leak individual host names (e.g., www.internal.example.com) into the Certificate Transparancy logs or to public DNS resolvers. If an internal zone name (e.g., ) is used with this specification and a public certificate is obtained for validation, that internal zone name will exist in Certificate Transparency logs RFC9162. It should be noted, however, that this specification does not leak individual host names (e.g., ) into the Certificate Transparency logs or to external DNS resolvers. 10."}
{"_id":"doc-en-draft-ietf-add-svcb-dns-4204c4c291328fcfadd0f342578cff8553461fb29dc2cb7960c6e5ffebac56c8","title":"","text":"3. Names are formed using Port-Prefix Naming (Section 2.3 of SVCB), with a scheme of \"dns\". For example, SVCB records for a DNS service identified as \"\"dns1.example.com\"\" would be located at \"\"_dns.dns1.example.com\"\". SVCB record names (i.e. QNAMEs) are formed using Port-Prefix Naming (Section 2.3 of SVCB), with a scheme of \"dns\". For example, SVCB records for a DNS service identified as \"\"dns1.example.com\"\" would be queried at \"\"_dns.dns1.example.com\"\". In some use cases, the name used for retrieving these DNS records is different from the server identity used to authenticate the secure transport. To distinguish them, we use the following terms: Binding authority - The service name (Section 1.4 of SVCB) and optional port number used as input to Port-Prefix Naming. Authentication name - The name used for secure transport authentication. It must be a DNS hostname or a literal IP address. Unless otherwise specified, it is the service name from the binding authority. 3.1."}
{"_id":"doc-en-draft-ietf-add-svcb-dns-c9d635c7d5472f1fbfaddca9fea941ac0e9dd5ea1912fb953c1c9bc6030fc607","title":"","text":"default of 53). DNS URIs normally omit the authority, or specify an IP address, but a hostname and non-default port number are allowed. When a non-default port number is part of a service identifier, Port- When the binding authority specifies a non-default port number, Port- Prefix Naming places the port number in an additional a prefix on the name. For example, SVCB records for a DNS service identified as \"\"dns1.example.com:9953\"\" would be located at name. For example, if the binding authority is \"\"dns1.example.com:9953\"\", the client would query for SVCB records at \"\"_9953._dns.dns1.example.com\"\". If two DNS services operating on different port numbers provide different behaviors, this arrangement allows them to preserve the distinction when specifying alternative"}
{"_id":"doc-en-draft-ietf-add-svcb-dns-97a128269a53d954181b02767915f03cf9a73503edf313db8abf7bd6d5ef6d04","title":"","text":"presentation and wire format) is a relative URI Template RFC6570, normally starting with \"/\". If the \"alpn\" SvcParamKey indicates support for HTTP, clients MAY construct a DNS over HTTPS URI Template by combining the prefix \"https://\", the service name, the port from the \"port\" key if present, and the \"dohpath\" value. (The DNS service's original port number MUST NOT be used.) by combining the prefix \"https://\", the authentication name, the port from the \"port\" key if present, and the \"dohpath\" value. (The binding authority's port number MUST NOT be used.) Clients SHOULD NOT query for any \"HTTPS\" RRs when using the constructed URI Template. Instead, the SvcParams and address records"}
{"_id":"doc-en-draft-ietf-add-svcb-dns-577706367cf67d3bde7bf0cae7df5c2890631ae0814b8f8112e9aa5e24d103eb","title":"","text":"This section considers an adversary who can add or remove responses to the SVCB query. Clients MUST authenticate the server to its name during secure transport establishment. This name is the hostname used to construct the original SVCB query, and cannot be influenced by the SVCB record contents. Accordingly, this draft does not mandate the use of DNSSEC. This draft also does not specify how clients authenticate the name (e.g. selection of roots of trust), which might vary according to the context. During secure transport establishment, clients MUST authenticate the server to its authentication name, which is not influenced by the SVCB record contents. Accordingly, this draft does not mandate the use of DNSSEC. This draft also does not specify how clients authenticate the name (e.g. selection of roots of trust), which might vary according to the context. Although this adversary cannot alter the authentication name of the service, it does have control of the port number and \"dohpath\" value."}
{"_id":"doc-en-draft-ietf-dnsop-terminology-bis-839ce897b0747e33dcdfe4d672228e3d7be16d595c6963066298f515daaffe4e","title":"","text":"the delegation, even though they are not themselves authoritative data. \"A lame delegations exists when a nameserver is delegated responsibility for providing nameservice for a zone (via NS records) but is not performing nameservice for that zone (usually because it is not set up as a primary or secondary for the zone).\" (Definition from RFC1912, Section 2.8) \"[Resource records] which are not part of the authoritative data [of the zone], and are address resource records for the [name servers in subzones]. These RRs are only necessary if the name"}
{"_id":"doc-en-draft-ietf-dnssd-srp-91079ccf1e82c1e6586cede353b29c5a581690590fdeec698f628ee8229e72cb","title":"","text":"An instruction is a Service Discovery Instruction if it contains Note that there can be more than one Service Discovery Instruction for the same name if the SRP requestor is advertising more than one service of the same type, or is changing the target of a PTR RR. For each such PTR RR add or remove, the above constraints must be met. 2.3.1.2. An instruction is a Service Description Instruction if, for the"}
{"_id":"doc-en-draft-ietf-doh-dns-over-https-49bb7bc75fe4b75284a6244bf4291b27022db42affd59a6e4af627ba8b8dda7f","title":"","text":"The protocol must permit the addition of new formats for DNS queries and responses. The protocol must ensure interoperable media formats through a mandatory to implement format wherein a query must be able to contain future modifications to the DNS protocol including the inclusion of one or more EDNS extensions (including those not yet defined). The protocol must ensure interoperability by specifying a single format for requests and responses that is mandatory to implement. That format must be able to support future modifications to the DNS protocol including the inclusion of one or more EDNS extensions (including those not yet defined). The protocol must use a secure transport that meets the requirements for HTTPS."}
{"_id":"doc-en-draft-ietf-doh-dns-over-https-063f00f786329604c4ff607e8b79b33d6729b5705aefd26a4f99c1bb53ec2ed1","title":"","text":"A client can use DNS over HTTPS as one of multiple mechanisms to obtain DNS data. If a client of this protocol encounters an HTTP error after sending a DNS query, and then falls back to a different DNS retrieval mechanism, doing so can weaken the privacy expected by the user of the client. DNS retrieval mechanism, doing so can weaken the privacy and authenticity expected by the user of the client. 9."}
{"_id":"doc-en-draft-ietf-doh-dns-over-https-64e20bc77b8e82e1ad8115f9bf4cd6797c7fda63892a18bbaac8537e054fcdf8","title":"","text":"to achieve similar performance. Those features were introduced to HTTP in HTTP/2 RFC7540. Earlier versions of HTTP are capable of conveying the semantic requirements of DOH but may result in very poor performance for many uses cases. poor performance. 6.3."}
{"_id":"doc-en-draft-ietf-doh-dns-over-https-27347aa777fb28a6706ed34b5862e29abb96611bf025e952a5ced516f6f42aa3","title":"","text":"The DNS API client SHOULD include an HTTP \"Accept\" request header to indicate what type of content can be understood in response. Irrespective of the value of the Accept request header, the client MUST be prepared to process \"message/dns\" (as described in dnswire) responses but MAY also process any other type it receives. MUST be prepared to process \"application/dns-message\" (as described in dnswire) responses but MAY also process any other type it receives. In order to maximize cache friendliness, DNS API clients using media formats that include DNS ID, such as message/dns, SHOULD use a DNS ID of 0 in every DNS request. HTTP correlates the request and response, thus eliminating the need for the ID in a media type such as message/ dns. The use of a varying DNS ID can cause semantically equivalent DNS queries to be cached separately. formats that include DNS ID, such as application/dns-message, SHOULD use a DNS ID of 0 in every DNS request. HTTP correlates the request and response, thus eliminating the need for the ID in a media type such as application/dns-message. The use of a varying DNS ID can cause semantically equivalent DNS queries to be cached separately. DNS API clients can use HTTP/2 padding and compression in the same way that other HTTP/2 clients use (or don't use) them."}
{"_id":"doc-en-draft-ietf-doh-dns-over-https-303d651872f10dcee2588ab18fa7b55b93cbe28a37d985883e193c488da01d3c","title":"","text":"\"https://dnsserver.example.net/dns-query{?dns}\" to resolve IN A records. The requests are represented as message/dns typed bodies. The requests are represented as application/dns-message typed bodies. The first example request uses GET to request www.example.com"}
{"_id":"doc-en-draft-ietf-doh-dns-over-https-1897c903de9ae9c9865392187aec1e24d18fcd5c7126fb282d63fc6cdf702e40","title":"","text":"At the time this is published, the response types are works in progress. The only response type defined in this document is \"message/dns\", but it is possible that other response formats will be defined in the future. \"application/dns-message\", but it is possible that other response formats will be defined in the future. The DNS response for \"message/dns\" in dnswire MAY have one or more EDNS options, depending on the extension definition of the extensions given in the DNS request. The DNS response for \"application/dns-message\" in dnswire MAY have one or more EDNS options, depending on the extension definition of the extensions given in the DNS request. Each DNS request-response pair is matched to one HTTP exchange. The responses may be processed and transported in any order using HTTP's"}
{"_id":"doc-en-draft-ietf-doh-dns-over-https-6066e09ce7e086598175d1cc119b17ca89f0fda69887d2f8e410072776c8ce91","title":"","text":"caching discusses the relationship between DNS and HTTP response caching. A DNS API server MUST be able to process message/dns request messages. A DNS API server MUST be able to process application/dns-message request messages. A DNS API server SHOULD respond with HTTP status code 415 (Unsupported Media Type) upon receiving a media type it is unable to"}
{"_id":"doc-en-draft-ietf-doh-dns-over-https-dfc4f1ba67f0be632f21db0302782979736c9c6be0a66b38508a5357c398170c","title":"","text":"5.4. In order to maximize interoperability, DNS API clients and DNS API servers MUST support the \"message/dns\" media type. Other media types MAY be used as defined by HTTP Content Negotiation (RFC7231 Section 3.4). servers MUST support the \"application/dns-message\" media type. Other media types MAY be used as defined by HTTP Content Negotiation (RFC7231 Section 3.4). 6."}
{"_id":"doc-en-draft-ietf-doh-dns-over-https-173ebe5bae611e37b993829e8e4aa2ff6218d9b5c6f95bdb32f115e18a6d71d6","title":"","text":"DNS API clients using the DNS wire format MAY have one or more EDNS options RFC6891 in the request. The media type is \"message/dns\". The media type is \"application/dns-message\". 7."}
{"_id":"doc-en-draft-ietf-doh-dns-over-https-25270461a705cbec86bb6bf7238fb013694e499172f7bcc43cc451c7ab242330","title":"","text":" DNS Queries over HTTPS DNS Queries over HTTPS (DOH) draft-ietf-doh-dns-over-https Abstract This document describes how to run DNS service over HTTP (DOH) using https:// URIs. This document describes how to make DNS queries over HTTPS. 1. This document defines a specific protocol for sending DNS RFC1035 queries and getting DNS responses over HTTP RFC7540 using https:// queries and getting DNS responses over HTTP RFC7540 using https URIs (and therefore TLS RFC5246 security for integrity and confidentiality). Each DNS query-response pair is mapped into a HTTP exchange."}
{"_id":"doc-en-draft-ietf-doh-dns-over-https-feaf6c66708e9a4dbb158734cbad2007b8faffab738b95fa611505b9f79790ad","title":"","text":"5.3. Before using DOH response data for DNS resolution, the client MUST establish that the HTTP request URI is a trusted service for the DOH query. For HTTP requests initiated by the DNS API client this trust establish that the HTTP request URI is authorized for the DOH query. For HTTP requests initiated by the DNS API client this authorization is implicit in the selection of URI. For HTTP server push (RFC7540 Section 8.2) extra care must be taken to ensure that the pushed URI is one that the client would have directed the same query to if the client had initiated the request. This specification does not extend DNS resolution privileges to URIs that are not recognized by the client as trusted DNS API servers. client as authorized DNS API servers. 5.4."}
{"_id":"doc-en-draft-ietf-doh-dns-over-https-0f8da6819c07c74a00f0f61a0764f3a63021ff23ee65df686faa3a7ee143f65d","title":"","text":"security implications of HTTP caching for other protocols that use HTTP. A server that is acting both as a normal web server and a DNS API server is in a position to choose which DNS names it forces a client to resolve (through its web service) and also be the one to answer those queries (through its DNS API service). An untrusted DNS API server can thus easily cause damage by poisoning a client's cache with names that the DNS API server chooses to poison. A client MUST NOT trust a DNS API server simply because it was discovered, or because the client was told to trust the DNS API server by an untrusted party. Instead, a client MUST only trust DNS API server that is configured as trustworthy. In the absence of information about the authenticity of responses, such as DNSSEC, a DNS API server can poison a client's cache. A client MUST NOT authorize arbitrary DNS API servers. Instead, a client MUST specifically authorize DNS API servers using mechanisms such as explicit configuration. A client can use DNS over HTTPS as one of multiple mechanisms to obtain DNS data. If a client of this protocol encounters an HTTP"}
{"_id":"doc-en-draft-ietf-doh-dns-over-https-10d2080b43fc4c31575f3b9905dc858a103df9887c603c100987812ea6a20879","title":"","text":"partially because they did not follow HTTP best practices. This document defines a specific protocol for sending DNS RFC1035 queries and getting DNS responses over modern versions of HTTP RFC7540 using https:// (and therefore TLS RFC5246 security for integrity and confidentiality). Each DNS query-response pair is mapped into a HTTP request-response pair. queries and getting DNS responses over HTTP RFC7540 using https:// (and therefore TLS RFC5246 security for integrity and confidentiality). Each DNS query-response pair is mapped into a HTTP request-response pair. The described approach is more than a tunnel over HTTP. It establishes default media formatting types for requests and responses"}
{"_id":"doc-en-draft-ietf-doh-dns-over-https-c953746767c7373190d4f3666edd1a7287bda156be4997b9e305406428f81b8f","title":"","text":"This protocol MUST be used with https scheme URI RFC7230. This protocol MUST use HTTP/2 RFC7540 or its successors in order to satisfy the security requirements of DNS over HTTPS. Further, the messages in classic UDP based DNS RFC1035 are inherently unordered and have low overhead. A competitive HTTP transport needs to support reordering, priority, parallelism, and header compression, all of which are supported by HTTP/2 RFC7540 or its successors. 7.1. The minimum version of HTTP used by DOH SHOULD be HTTP/2 RFC7540. The messages in classic UDP based DNS RFC1035 are inherently unordered and have low overhead. A competitive HTTP transport needs to support reordering, parallelism, priority, and header compression to acheive similar performance. Those features were introduced to HTTP in HTTP/2 RFC7540. Earlier versions of HTTP are capable of conveying the semantic requirements of DOH but would result in very poor performance for many uses cases. 8."}
{"_id":"doc-en-draft-ietf-doh-dns-over-https-87f2f02800c95310ecc249fec802f9eb296f47b1c0652cfec813a3d19d12d944","title":"","text":"9. Running DNS over HTTPS relies on the security of the underlying HTTP connection. By requiring at least RFC7540 levels of support for TLS, this protocol expects to use current best practices for secure transport. transport. Implementations utilizing HTTP/2 benefit from the TLS profile defined in RFC7540 Section 9.2. Session level encryption has well known weaknesses with respect to traffic analysis which might be particularly acute when dealing with"}
{"_id":"doc-en-draft-ietf-doh-dns-over-https-a3bc7ab18d4dd9b1c33d22c73b7a0f4b32f13112187667273175b06366bb6ca6","title":"","text":"but is not limited to, spoofing DNS responses, blocking DNS requests, and tracking. HTTP authentication and proxy friendliness are expected to make this protocol function in some environments where DNS directly on TLS (RFC7858) would not. unsecured DNS (DNS) or DNS directly on TLS (RFC7858) would not. A secondary use case is web applications that want to access DNS information. Standardizing an HTTPS mechanism allows this to be done"}
{"_id":"doc-en-draft-ietf-doh-dns-over-https-cf413bf939d99ab5ff4f54c8db35556f37eb993ebbc4d2796a7274150b8916d4","title":"","text":"conveying the semantic requirements of DOH but may result in very poor performance for many uses cases. 7.3. Before using DOH response data for DNS resolution, the client MUST establish that the HTTP request URI is a trusted service for the DOH query. For HTTP requests initiated by the DNS API client this trust is implicit in the selection of URI. For HTTP server push (RFC7540 Section 8.2) extra care must be taken to ensure that the pushed URI is one that the client would have directed the same query to if the client had initiated the request. This specification does not extend DNS resolution privileges to URIs that are not recognized by the client as trusted DNS API servers. 8. 8.1."}
{"_id":"doc-en-draft-ietf-emu-eap-tls13-584b6a983644c091be570b97c498208c32b28c40c4a1da21aae74ececa17051c","title":"","text":"using the TLS exporter interface RFC5705 (for TLS 1.3 this is defined in Section 7.5 of RFC8446). All other parameters such as MSK and EMSK are derived in the same manner as with EAP-TLS RFC5216, Section 2.3. The definitions are repeated below for simplicity: All other parameters are derived in the same manner as with EAP-TLS RFC5216, Section 2.3. The definitions are repeated below for simplicity: The use of these keys is specific to the lower layer, as described RFC5247."}
{"_id":"doc-en-draft-ietf-emu-eap-tls13-eb39c879560e480de9d27831531762f069e16c84f64c787001e83353ef03157a","title":"","text":"The PSK associated with the ticket depends on the client Finished and cannot be pre-computed in handshakes with client authentication. The NewSessionTicket message MUST NOT include an \"early_data\" extension. A mechanism by which clients can specify the desired number of tickets needed for future connections is defined in I-D.ietf-tls- ticketrequests. Servers should take into account that fewer newSessionTickets will likely be needed in EAP-TLS than in the usual HTTPS connection scenario. In most cases a single newSessionTicket will be sufficient. A mechanism by which clients can specify the desired number of tickets needed for future connections is defined in I- D.ietf-tls-ticketrequests. figbase2 shows an example message flow for a succesfull EAP-TLS full handshake with mutual authentication and ticket establishment of a"}
{"_id":"doc-en-draft-ietf-emu-eap-tls13-0133553de3a19d3a2b5b67f9af056aec377de3ff91af19f761ccb105bbd63d5d","title":"","text":"order things are sent and the application data MAY therefore be sent before a NewSessionTicket. TLS application data 0x00 is therefore to be interpreted as success after the EAP-Request that contains TLS application data 0x00. After the EAP-TLS server has received an empty EAP-Response to the EAP-Request containing the TLS application data 0x00, the EAP-TLS server sends EAP-Success. application data 0x00. After the EAP-TLS server has sent an EAP- Request containing the TLS application data 0x00 and received an EAP- Response packet of EAP-Type=EAP-TLS and no data, the EAP-TLS server sends EAP-Success. figbase1 shows an example message flow for a successful EAP-TLS full handshake with mutual authentication (and neither HelloRetryRequest"}
{"_id":"doc-en-draft-ietf-emu-eap-tls13-b0e29c188869e8833ec0b412f6f1850031929d5625335aa9754e1b02122eabd7","title":"","text":"\"key_share\" and using the \"psk_dhe_ke\" pre-shared key exchange mode is also important in order to limit the impact of a key compromise. When using \"psk_dhe_ke\", TLS 1.3 provides forward secrecy meaning that key leakage does not compromise any earlier connections. It is RECOMMMENDED to use \"psk_dhe_ke\" for resumption. that key leakage does not compromise any earlier connections. The \"psk_dh_ke\" mechanism MUST be used for resumption unless the deployment has a local requirement to allow configuration of other mechanisms. 2.1.4."}
{"_id":"doc-en-draft-ietf-emu-eap-tls13-522410b279f78a3e9109266c1c9476427b92ea204865c53912c8ec2aec72c44e","title":"","text":"figterm3 shows an example message flow where the EAP-TLS server authenticates to the EAP-TLS peer successfully, but the EAP-TLS peer fails to authenticate to the EAP-TLS server and sends a TLS Error alert. fails to authenticate to the EAP-TLS server and the server sends a TLS Error alert. 2.1.5."}
{"_id":"doc-en-draft-ietf-emu-eap-tls13-82a35e7d8ca0ca3fb4bb0b7f8dde4dcd5beb9c42e679fe54be2f38edcb9ece79","title":"","text":"accounting. As suggested in RFC8446, EAP-TLS peers MUST NOT store resumption PSKs or tickets (and associated cached data) for longer than 7 days, regardless of the PSK or ticket lifetime. The EAP-TLS peer MAY delete them earlier based on local policy. The cached data MAY also be removed on the EAP-TLS server or EAP-TLS peer if any certificate in the certificate chain has been revoked or has expired. In all such cases, an attempt at resumption results in a full TLS handshake instead. or tickets (and associated cached data) for longer than 604800 seconds (7 days), regardless of the PSK or ticket lifetime. The EAP- TLS peer MAY delete them earlier based on local policy. The cached data MAY also be removed on the EAP-TLS server or EAP-TLS peer if any certificate in the certificate chain has been revoked or has expired. In all such cases, an attempt at resumption results in a full TLS handshake instead. Information from the EAP-TLS exchange (e.g., the identity provided in EAP-Response/Identity) as well as non-EAP information (e.g., IP"}
{"_id":"doc-en-draft-ietf-jsonpath-base-98133de4f0ae1a6acd5eca1f5ee706b478b6210d22f1dda61c6e4ec0c6cac1d7","title":"","text":"3.6. Note that JSON \"null\" is treated the same as any other JSON value: it is not taken to mean \"undefined\" or \"missing\". 3.6.1. JSON document: Queries: 3.7. A Normalized Path is a JSONPath with restricted syntax that identifies a node by providing a query that results in exactly that node. For example, the JSONPath expression \"$.book[?(@.price<10)]\""}
{"_id":"doc-en-draft-ietf-jsonpath-base-360b47d484fc6e035fe2325efc7c0ac8ecc153accf394b688b0879d90d1d4cff","title":"","text":"only if that object has a member with that name. Nothing is selected from a value that is not a object. Array indexing via \"element-index\" is a way of selecting a particular array element using a zero-based index. For example, selector \"[0]\" selects the first and selector \"[4]\" the fifth element of a sufficiently long array. The \"index-selector\" applied with an \"element-index\" to an array selects an array element using a zero-based index. For example, selector \"[0]\" selects the first and selector \"[4]\" the fifth element of a sufficiently long array. Nothing is selected, and it is not an error, if the index lies outside the range of the array. Nothing is selected from a value that is not an array. A negative \"element-index\" counts from the array end. For example, selector \"[-1]\" selects the last and selector \"[-2]\" selects the"}
{"_id":"doc-en-draft-ietf-jsonpath-base-7c73081d73450f0c26ba64f8383e13fb21eb56858e9211386372fe31e3bde4cf","title":"","text":"of the selector entries in the list and yields the concatenation of the lists (in the order of the selector entries) of nodes selected by the selector entries. Note that any node selected in more than one of the selector entries is kept as many times in the node list. of the selector entries is kept as many times in the nodelist. To be valid, integer values in the \"element-index\" and \"slice-index\" components MUST be in the I-JSON range of exact values, see synsem-"}
{"_id":"doc-en-draft-ietf-jsonpath-base-4aa47c3c0a9ea4d5105fbc162040c7fc4064cb5f15ce3d274a0e701b57660b6d","title":"","text":"strings, with those strings coming from the JSONPath and from member names and string values in the JSON to which it is being applied. Two strings MUST be considered equal if and only if they are identical sequences of Unicode code points. In other words, identical sequences of Unicode scalar values. In other words, normalization operations MUST NOT be applied to either the string from the JSONPath or from the JSON prior to comparison."}
{"_id":"doc-en-draft-ietf-jsonpath-base-1d454f0aa6ffd404cfed4f4ddcedfbf7ac4f62fff978f8f8ad7f6bac0da3459e","title":"","text":"A \"dot-wild-selector\" acts as a wildcard by selecting the nodes of all member values of an object in its input nodelist as well as all element nodes of an array in its input nodelist. Applying the \"dot- wild-selector\" to a primitive JSON value (number, string, or true/false/null) selects no node. wild-selector\" to a primitive JSON value (a number, a string, \"true\", \"false\", or \"null\") selects no node. 3.4.3.3."}
{"_id":"doc-en-draft-ietf-jsonpath-base-0320ec99af9e59c02c7cd11b345023097026a8edda72fd468387423001c1e35e","title":"","text":"An \"index-wild-selector\" selects the nodes of all member values of an object as well as of all elements of an array. Applying the \"index- wild-selector\" to a primitive JSON value (such as a number, string, or true/false/null) selects no node. wild-selector\" to a primitive JSON value (that is, a number, a string, \"true\", \"false\", or \"null\") selects no node. The \"index-wild-selector\" behaves identically to the \"dot-wild- selector\"."}
{"_id":"doc-en-draft-ietf-jsonpath-base-f6419ed53018200fc59fe9cbf52fdde4228eefdcb2ebe5b1030118850fde3988","title":"","text":"contained in the current lean syntax \"[?]\" as a special case. Comparisons are restricted to Singular Path values and primitive values (such as number, string, \"true\", \"false\", \"null\"). values (that is, numbers, strings, \"true\", \"false\", and \"null\"). Alphabetic characters in ABNF are case-insensitive, so \"e\" can be either \"e\" or \"E\"."}
{"_id":"doc-en-draft-ietf-jsonpath-base-59b4e1d770c6ebf87738388f9ae4eaa576b1c956167d0a1e3df0bd37d2b1d965","title":"","text":"consisting of a single node, each such path is replaced by the value of its node and then: comparison using one of the operators \"==\" yields true if and only if the comparison is between equal primitive values. a comparison using the operator \"==\" yields true if and only if the comparison is between values of the same primitive type (numbers, strings, booleans, and \"null\") which are equal. comparisons using one of the operators \"<=\" or \">=\" yield true if and only if the comparison is between numeric values which satisfy the comparison. a comparison using the operator \"!=\" yields true if and only if the comparison is not between values of the same primitive type (numbers, strings, booleans, and \"null\") which are equal. any comparison of two values using one of the operators \"!=\", \">\", \"<\" is defined as the negation of the comparison of the same values using the operator \"==\", \"<=\", \">=\", respectively. a comparison using one of the operators \"<\", \"<=\", \">\", or \">=\" yields true if and only if the comparison is between values of the same type which are both numbers or both strings and which satisfy the comparison: Note that \"==\" comparisons between a structured value and any value, including the same structured value, yield false. Consequently, \"!=\" comparisons between a structured value and any value, including the same structured value, yield true. numbers in the I-JSON RFC7493 range of exact values MUST compare using the normal mathematical ordering; one or both numbers outside that range MAY compare using an implementation specific ordering the empty string compares less than any non-empty string a non-empty string compares less than another non-empty string if and only if the first string starts with a lower Unicode scalar value than the second string or if both strings start with the same Unicode scalar value and the remainder of the first string compares less than the remainder of the second string. Note that \"==\" comparisons between a structured value (that is, an object or an array) and any value, including the same structured value, yield false and \"!=\" comparisons between a structured value and any value, including the same structured value, yield true. 3.4.7.2.2.1."}
{"_id":"doc-en-draft-ietf-jsonpath-base-df538b883d1bcd6d4b12706a284754d1719d7edd6bd6dd1f3a21f32331edadc0","title":"","text":"of the selector entries is kept as many times in the nodelist. To be valid, integer values in the \"element-index\" and \"slice-index\" components MUST be in the I-JSON range of exact values, see synsem- overview. components MUST be in the I-JSON RFC7493 range of exact values, see synsem-overview. 3.4.8.3."}
{"_id":"doc-en-draft-ietf-jsonpath-base-36bdc8ee9942b01f28417b645e9936a9a9db22ca021226e38167a700125ee17e","title":"","text":"Additional terms used in this specification are defined below. 1.1.1. This specification models the argument as a tree of JSON values, each with its own node. A node is either the root node or one of its descendants. This specification models the result of applying a query to the argument as a nodelist (a list of nodes). So nodes are the selectable parts of the argument. The only parts of an object that can be selected by a query are the member values. Member names and members (name/value pairs) cannot be selected. So member values have nodes, but members and member names do not. Similarly, member values are children of an object, but members and member names are not. 1.2. This section is informative."}
{"_id":"doc-en-draft-ietf-jsonpath-base-d3f1357a3d7ef6bdd2e41fd7dc54579ad97c4374302b22b2078a9f555ecbbb41","title":"","text":"A syntactically valid segment MUST NOT produce errors when executing the query. This means that some operations that might be considered erroneous, such as indexing beyond the end of an array, simply result in fewer nodes being selected. erroneous, such as using an index lying outside the range of an array, simply result in fewer nodes being selected. Consider this example. With the argument \"{\"a\":[{\"b\":0},{\"b\":1},{\"c\":2}]}\", the query \"$.a[*].b\" selects the"}
{"_id":"doc-en-draft-ietf-jsonpath-base-8156b12baef29f4ee13584651dc48b9bca65a88016f1e12fdcfc856c581f678e","title":"","text":"2.5.3.2. The \"index-selector\" applied to an array selects an array element using a zero-based index. For example, the selector \"0\" selects the first and the selector \"4\" selects the fifth element of a A non-negative \"index-selector\" applied to an array selects an array element using a zero-based index. For example, the selector \"0\" selects the first and the selector \"4\" selects the fifth element of a sufficiently long array. Nothing is selected, and it is not an error, if the index lies outside the range of the array. Nothing is selected from a value that is not an array."}
{"_id":"doc-en-draft-ietf-jsonpath-base-1ae6281be62311641cb4e0699cbb813f6a3e58e302f7e03d4f0fcfddb3c7f58d","title":"","text":"as slice bounds and must first be normalized. Normalization for this purpose is defined as: The result of the array indexing expression \"i\" applied to an array of length \"len\" is defined to be the result of the array slicing The result of the array index expression \"i\" applied to an array of length \"len\" is defined to be the result of the array slicing expression \"Normalize(i, len):Normalize(i, len)+1:1\". Slice expression parameters \"start\" and \"end\" are used to derive"}
{"_id":"doc-en-draft-ietf-jsonpath-base-9748144844577cebfed59ef895486916000804ae3c6e53f67185faa88abceab9","title":"","text":"the lower bound and which is the upper bound: The slice expression selects elements with indices between the lower and upper bounds. In the following pseudocode, the \"a(i)\" construct expresses the 0-based indexing operation on the underlying array. and upper bounds. In the following pseudocode, \"a(i)\" is the \"i+1\"th element of the array \"a\" (i.e., \"a(0)\" is the first element, \"a(1)\" the second, and so forth). When \"step = 0\", no elements are selected and the result array is empty."}
{"_id":"doc-en-draft-ietf-jsonpath-base-ceb7b23109c0ce800ccecf615b085480fbceded4b2256c5be89a9e1f0d776650","title":"","text":". A string is a well-formed JSONPath query if it conforms to the ABNF syntax in this document. A well-formed JSONPath query is valid if it also fulfills all semantic requirements posed by this document. if it also fulfills all semantic requirements posed by this document, which are: To be valid, integer numbers in the JSONPath query that are relevant to the JSONPath processing (e.g., index values and steps) MUST be within the range of exact values defined in I-JSON RFC7493, namely within the interval [-(2 Integer numbers in the JSONPath query that are relevant to the JSONPath processing (e.g., index values and steps) MUST be within the range of exact values defined in I-JSON RFC7493, namely within the interval [-(2 )+1, (2 )+1, (2 )-1]). )-1]. To be valid, strings on the right-hand side of the \"=~\" regex matching operator need to conform to I-D.draft-ietf-jsonpath-iregexp. Strings on the right-hand side of the \"=~\" regex matching operator MUST conform to I-D.draft-ietf-jsonpath-iregexp. The well-formedness and the validity of JSONPath queries are independent of the JSON value the query is applied to; no further"}
{"_id":"doc-en-draft-ietf-jsonpath-base-0a349e84b0fa3f8d1163cc44d773951024816a5c42a3652f6efc0ea7f019a449","title":"","text":"Note: \"double-quoted\" strings follow the JSON string syntax (RFC8259); \"single-quoted\" strings follow an analogous pattern (syntax-index). (syntax-index). No attempt was made to improve on this syntax, so characters with scalar values above 0x10000, such as U+0026 U+0023 U+0031 U+0032 U+0039 U+0033 U+0030 U+0030 U+003B (\"🤔\", AMPERSAND, NUMBER SIGN, DIGIT ONE, DIGIT TWO, DIGIT NINE, DIGIT THREE, DIGIT ZERO, DIGIT ZERO, SEMICOLON), need to be represented by a pair of surrogate escapes (\"\"uD83EuDD14\"\" in this case). 2.5.1.2."}
{"_id":"doc-en-draft-ietf-jsonpath-base-ebbba8831d8e9531efd3621e9c10bebb9adb9641ac2e632fdc04e97fc56065c7","title":"","text":"A function argument is a \"filter-path\" or a \"comparable\". According to filter-selector, a \"function-expression\" is valid as a According to filter-selector, a \"function-expr\" is valid as a \"filter-path\" or a \"comparable\". Any function expressions in a query must be well-formed (by"}
{"_id":"doc-en-draft-ietf-jsonpath-base-3ba5427bff1a96fa9e136928860c780c41e69bb4416b71b992940b30934162eb","title":"","text":"primitive values (that is, numbers, strings, \"true\", \"false\", and \"null\"). These can be obtained via literal values; Singular Queries, each of which selects at most one node the value of which is then used; and function expressions (see fnex) of type \"ValueType\" or \"NodesType\" (see type-conv). used; and function expressions (see fnex) of type \"ValueType\". Literals can be notated in the way that is usual for JSON (with the extension that strings can use single-quote delimiters). Alphabetic"}
{"_id":"doc-en-draft-ietf-jsonpath-base-20518d8cf0c06a0eae6393eab91ee98f8f5de14aa5542855578c41857cf87b5a","title":"","text":"applies) \"NodesType\". If it occurs directly as a \"comparable\" in a comparison, the function is declared to have a result type of \"ValueType\", or (conversion applies) \"NodesType\". function is declared to have a result type of \"ValueType\". Otherwise, it occurs as an argument in another function expression, and the following rules for function arguments apply"}
{"_id":"doc-en-draft-ietf-jsonpath-base-ebc634b98fe9702a717176e201f5d47758c6a03f40f75dcde04c84fac2acf08f","title":"","text":"these are used to define \"!=\", \"<=\", \">\", and \">=\". When either side of a comparison results in an empty nodelist or \"Nothing\": \"Nothing\" (see typesys): a comparison using the operator \"==\" yields true if and only the other side also results in an empty nodelist or \"Nothing\"."}
{"_id":"doc-en-draft-ietf-jsonpath-base-9b5334451efd46f822223ef7389ef45ca11212573ad0a16a2464591db5bb510c","title":"","text":"first string compares less than the remainder of the second string. Note that comparisons using the operator \"<\" yield false if either value being compared is an object, array, boolean, or \"null\". \"!=\", \"<=\", \">\", and \">=\" are defined in terms of the other comparison operators. For any \"a\" and \"b\":"}
{"_id":"doc-en-draft-ietf-masque-connect-ip-ee4e4967cc4c3f04b7dbc43cd9dfa33968b41e47be7380d1204e504207f68697","title":"","text":"Clients are configured to use IP proxying over HTTP via an URI Template TEMPLATE. The URI template MAY contain two variables: \"target\" and \"ipproto\" (scope). The optionality of the variables \"target\" and \"ipproto\"; see scope. The optionality of the variables needs to be considered when defining the template so that either the variable is self-identifying or it is possible to exclude it in the syntax."}
{"_id":"doc-en-draft-ietf-masque-connect-ip-3db52aa79597cf87846a4e1d304940f82610479d326c422129d0e69f2c24fce3","title":"","text":"To initiate an IP tunnel associated with a single HTTP stream, a client issues a request containing the \"connect-ip\" upgrade token. The target of the tunnel is indicated by the client to the IP proxy via the \"target_host\" and \"target_port\" variables of the URI Template; see client-config. When sending its IP proxying request, the client SHALL perform URI template expansion to determine the path and query of its request, see client-config. A successful response indicates that the IP proxy is willing to open an IP forwarding tunnel between it and the client. Any response other than a successful response indicates that the tunnel has not been formed. By virtue of the definition of the Capsule Protocol (see HTTP-DGRAM), IP proxying requests do not carry any message content. Similarly, successful IP proxying responses also do not carry any message content. 4.1. Upon receiving an IP proxying request: if the recipient is configured to use another HTTP proxy, it will act as an intermediary by forwarding the request to another HTTP server. Note that such intermediaries may need to re-encode the request if they forward it using a version of HTTP that is different from the one used to receive it, as the request encoding differs by version (see below). otherwise, the recipient will act as an IP proxy. It extracts the optional \"target\" and \"ipproto\" variables from the URI it has reconstructed from the request headers, decodes their percent- encoding, and establishes an IP tunnel. IP proxies MUST validate whether the decoded \"target\" and \"ipproto\" variables meet the requirements in scope. If they do not, the IP proxy MUST treat the request as malformed; see H2 and H3. If the \"target\" variable is a DNS name, the IP proxy MUST perform DNS resolution before replying to the HTTP request. If errors occur during this process, the IP proxy MUST reject the request and SHOULD send details using an appropriate Proxy-Status header field PROXY- STATUS. For example, if DNS resolution returns an error, the proxy can use the \"dns_error\" Proxy Error Type from PROXY-STATUS. The lifetime of the IP forwarding tunnel is tied to the IP proxying request stream. The IP proxy MUST maintain all IP address and route"}
{"_id":"doc-en-draft-ietf-masque-connect-ip-c2c281169dcd00f2e1e062e7c128d18b9b25fda444d7d12a334db750e6724a5e","title":"","text":"tunnel due to a period of inactivity, but they MUST close the request stream when doing so. A successful response (as defined in Sections resp1 and resp23) indicates that the IP proxy has established an IP tunnel and is willing to proxy IP payloads. Any response other than a successful response indicates that the request has failed; thus, the client MUST abort the request. Along with a successful response, the IP proxy can send capsules to assign addresses and advertise routes to the client (capsules). The client can also assign addresses and advertise routes to the IP proxy for network-to-network routing. By virtue of the definition of the Capsule Protocol (see HTTP-DGRAM), IP proxying requests do not carry any message content. Similarly, successful IP proxying responses also do not carry any message content. 4.1. 4.2. When using HTTP/1.1 H1, an IP proxying request will meet the following requirements:"}
{"_id":"doc-en-draft-ietf-masque-connect-ip-563182f5253ce88600d7651843e28e17f9e8ae3112f0c3ce4facfe137f1d8ae5","title":"","text":"wishes to open an IP forwarding tunnel with no target or protocol limitations, it could send the following request: 4.2. 4.3. The IP proxy indicates a successful response by replying with the following requirements:"}
{"_id":"doc-en-draft-ietf-masque-connect-ip-731ced6bd0778ae41baf1482f4406d64d4fa36ff3bcab9122c1d11f7f75d40eb","title":"","text":"For example, the IP proxy could respond with: 4.3. 4.4. When using HTTP/2 H2 or HTTP/3 H3, IP proxying requests use HTTP Extended CONNECT. This requires that servers send an HTTP Setting as"}
{"_id":"doc-en-draft-ietf-masque-connect-ip-1a9041d54cf1f4eb6891a820ffd77871c520adc0be0ca59c3c5e8fc21ed73e99","title":"","text":"IP packet forwarding, or a specific proxied flow; see scope. An IP proxying request that does not conform to these restrictions is malformed (see H2 and H3). malformed; see H2 and H3. For example, if the client is configured with URI Template \"https://example.org/.well-known/masque/ip/{target}/{ipproto}/\" and wishes to open an IP forwarding tunnel with no target or protocol limitations, it could send the following request: 4.4. 4.5. The IP proxy indicates a successful response by replying with the following requirements:"}
{"_id":"doc-en-draft-ietf-masque-connect-ip-4123071a38692e6fe2d88ad9aca1865801f731cb00bfb8c4a95b51d8c11e45e2","title":"","text":"For example, the IP proxy could respond with: 4.5. 4.6. Unlike UDP proxying requests, which require specifying a target host, IP proxying requests can allow endpoints to send arbitrary IP packets"}
{"_id":"doc-en-draft-ietf-masque-connect-ip-c25dd4c3abc463cdc3b05f9935285e78f7a4b9229f9b417e8d18239f15fefda6","title":"","text":"If present, the IP prefix length in \"target\" SHALL be preceded by a percent-encoded slash (\"/\"): \"%2F\". The IP prefix length MUST represent an integer between 0 and the length of the IP address in bits, inclusive. represent a decimal integer between 0 and the length of the IP address in bits, inclusive. \"ipproto\" MUST represent an integer between 0 and 255 inclusive, or the wildcard value \"*\". \"ipproto\" MUST represent a decimal integer between 0 and 255 inclusive, or the wildcard value \"*\". IP proxies MAY perform access control using the scoping information provided by the client: if the client is not authorized to access any of the destinations included in the scope, then the IP proxy can immediately fail the request. 4.6. 4.7. This document defines multiple new capsule types that allow endpoints to exchange IP configuration information. Both endpoints MAY send any number of these new capsules. 4.6.1. 4.7.1. The ADDRESS_ASSIGN capsule (see iana-types for the value of the capsule type) allows an endpoint to inform its peer of the list of IP"}
{"_id":"doc-en-draft-ietf-masque-connect-ip-8d1cb5b77b69a758e6835b4eb14189034ee7043377b3265641e50240fc0c8e44","title":"","text":"ADDRESS_REQUEST capsules, endpoints MAY send ADDRESS_ASSIGN capsules unprompted. 4.6.2. 4.7.2. The ADDRESS_REQUEST capsule (see iana-types for the value of the capsule type) allows an endpoint to request assignment of IP"}
{"_id":"doc-en-draft-ietf-masque-connect-ip-3479fcb1ffbbd55d641a4f6351d7fd5ad6597b41814fe8968d9a9913756b968c","title":"","text":"If an endpoint receives an ADDRESS_REQUEST capsule that contains zero Requested Addresses, it MUST abort the IP proxying request stream. 4.6.3. 4.7.3. The ROUTE_ADVERTISEMENT capsule (see iana-types for the value of the capsule type) allows an endpoint to communicate to its peer that it"}
{"_id":"doc-en-draft-ietf-masque-connect-ip-05a009d2b64decb7df67bb5add067ca5d48d2f87eafacf4e87c606511e4f9efb","title":"","text":"4.2.1. The ADDRESS_ASSIGN capsule allows an endpoint to inform its peer that it has assigned an IP address to it. It allows assigning a prefix which can contain multiple addresses. This capsule uses a Capsule Type of 0xfff100. Its value uses the following format: it has assigned an IP address or prefix to it. The ADDRESS_ASSIGN capsule allows assigning a prefix which can contain multiple addresses. Any of these addresses can be used as the source address on IP packets originated by the receiver of this capsule. This capsule uses a Capsule Type of 0xfff100. Its value uses the following format: IP Version of this address assignment. MUST be either 4 or 6."}
{"_id":"doc-en-draft-ietf-masque-connect-ip-6c1152a0517efa733b751061382c3b095d03a068180ddec0e8afe979980d64ec","title":"","text":"The number of bits in the IP Address that are used to define the prefix that is being assigned. This MUST be less than or equal to the length of the IP Address field, in bits. If the prefix length is equal to the length of the IP Address, the endpoint is only allowed to send packets from a single source address. If the prefix length is less than the length of the IP address, the endpoint is allowed to send packets from any source address that falls within the prefix. is equal to the length of the IP Address, the receiver of this capsule is only allowed to send packets from a single source address. If the prefix length is less than the length of the IP address, the receiver of this capsule is allowed to send packets from any source address that falls within the prefix. If an endpoint receives multiple ADDRESS_ASSIGN capsules, all of the assigned addresses or prefixes can be used. For example, multiple"}
{"_id":"doc-en-draft-ietf-masque-connect-ip-f94077806dad3d1e51d61ea2349fa2d73fa822f9188e28b8730231d4d5420967","title":"","text":"notifies its peer that if the receiver of the ROUTE_ADVERTISEMENT capsule sends IP packets for this prefix in HTTP Datagrams, the sender of the capsule will forward them along its preexisting route. This capsule uses a Capsule Type of 0xfff102. Its value uses the following format: Any of these addresses can be used as the destination address on IP packets originated by the receiver of this capsule. This capsule uses a Capsule Type of 0xfff102. Its value uses the following format: IP Version of this route advertisement. MUST be either 4 or 6."}
{"_id":"doc-en-draft-ietf-masque-connect-ip-98400c365ac9380cc5f7f3cb837570d19b1dc54888e4284505806862a4e7d5c1","title":"","text":"requesting full-tunnel IP packet forwarding, or a specific proxied flow, see scope. Along with a request, the client can send a REGISTER_DATAGRAM_CONTEXT capsule HTTP-DGRAM to negotiate support for sending IP packets in HTTP Datagrams (packet-handling). The client SHOULD also include the \"Capsule-Protocol\" header with a value of \"?1\" to negotiate support for sending and receiving HTTP capsules (HTTP-DGRAM). Any 2xx (Successful) response indicates that the proxy is willing to open an IP forwarding tunnel between it and the client. Any response"}
{"_id":"doc-en-draft-ietf-masque-connect-ip-1874d2ebf11f107b16d48fab72c07bd87cdd9485b9b433f84912b3424e351ec0","title":"","text":"5. IP packets are encoded using HTTP Datagrams HTTP-DGRAM with the IP_PACKET HTTP Datagram Format Type (see value in iana-format-type). When using the IP_PACKET HTTP Datagram Format Type, full IP packets (from the IP Version field until the last byte of the IP Payload) are sent unmodified in the \"HTTP Datagram Payload\" field of an HTTP Datagram. In order to use HTTP Datagrams, the client will first decide whether or not it will attempt to use HTTP Datagram Contexts and then register its context ID (or lack thereof) using the corresponding registration capsule, see HTTP-DGRAM. When sending a registration capsule using the \"Datagram Format Type\" set to IP_PACKET, the \"Datagram Format Additional Data\" field SHALL be empty. Servers MUST NOT register contexts using the IP_PACKET HTTP Datagram Format Type. Clients MUST NOT register more than one context using the IP_PACKET HTTP Datagram Format Type. Endpoints MUST NOT close contexts using the IP_PACKET HTTP Datagram Format Type. If an endpoint detects a violation of any of these requirements, it MUST abort the stream. This protocol allows future extensions to exchange HTTP Datagrams which carry different semantics from IP packets. For example, an extension could define a way to send compressed IP header fields. In order to allow for this extensibility, all HTTP Datagrams associated with IP proxying request streams start with a context ID, see payload-format. Context IDs are 62-bit integers (0 to 2 -1). Context IDs are encoded as variable-length integers, see Section 16 of QUIC. The context ID value of 0 is reserved for IP packets, while non-zero values are dynamically allocated: non-zero even-numbered context IDs are client-allocated, and odd-numbered context IDs are server-allocated. The context ID namespace is tied to a given HTTP request: it is possible for a context ID with the same numeric value to be simultaneously assigned different semantics in distinct requests, potentially with different semantics. Context IDs MUST NOT be re-allocated within a given HTTP namespace but MAY be allocated in any order. Once allocated, any context ID can be used by both client and server - only allocation carries separate namespaces to avoid requiring synchronization. Registration is the action by which an endpoint informs its peer of the semantics and format of a given context ID. This document does not define how registration occurs. Depending on the method being used, it is possible for datagrams to be received with Context IDs which have not yet been registered, for instance due to reordering of the datagram and the registration packets during transmission. 6. When associated with IP proxying request streams, the HTTP Datagram Payload field of HTTP Datagrams (see HTTP-DGRAM) has the format defined in dgram-format. Note that when HTTP Datagrams are encoded using QUIC DATAGRAM frames, the Context ID field defined below directly follows the Quarter Stream ID field which is at the start of the QUIC DATAGRAM frame payload: A variable-length integer that contains the value of the Context ID. If an HTTP/3 datagram which carries an unknown Context ID is received, the receiver SHALL either drop that datagram silently or buffer it temporarily (on the order of a round trip) while awaiting the registration of the corresponding Context ID. The payload of the datagram, whose semantics depend on value of the previous field. Note that this field can be empty. IP packets are encoded using HTTP Datagrams with the Context ID set to zero. When the Context ID is set to zero, the Payload field contains a full IP packet (from the IP Version field until the last byte of the IP Payload). Clients MAY optimistically start sending proxied IP packets before receiving the response to its IP proxying request, noting however"}
{"_id":"doc-en-draft-ietf-masque-connect-ip-481a7c03e1eb276e3abf73618acd117b4da0c52c2cf5caa124d75d99a72a9be0","title":"","text":"request with a failure, or if the datagrams are received by the proxy before the request. Extensions to this mechanism MAY define new HTTP Datagram Format Types in order to use different semantics or encodings for IP payloads. For example, an extension could define a new HTTP Datagram Format Type which enables compression of IP header fields. When a CONNECT-IP endpoint receives an HTTP Datagram containing an IP packet, it will parse the packet's IP header, perform any local policy checks (e.g., source address validation), check their routing"}
{"_id":"doc-en-draft-ietf-masque-connect-ip-9037b11d080b504a13944d7468014603badb79579d266f23f88c15bf64e526b6","title":"","text":"Endpoints MAY implement additional filtering policies on the IP packets they forward. 6. 7. CONNECT-IP enables many different use cases that can benefit from IP packet proxying and tunnelling. These examples are provided to help illustrate some of the ways in which CONNECT-IP can be used. 6.1. 7.1. The following example shows a point-to-network VPN setup, where a client receives a set of local addresses, and can send to any remote"}
{"_id":"doc-en-draft-ietf-masque-connect-ip-c581f09a199f4097a7c74c0069050530fcef5fca561482d3c4f380775c5317a9","title":"","text":"case, the advertised route is restricted to 192.0.2.0/24, rather than 0.0.0.0/0. 6.2. 7.2. The following example shows an IP flow forwarding setup, where a client requests to establish a forwarding tunnel to"}
{"_id":"doc-en-draft-ietf-masque-connect-ip-7eb1ebc9a350ab7c9ce58f7f6eaf266216f94e1f78710b8ad2a568daa3780964","title":"","text":"(2001:db8::3456), scoped to SCTP. The client can send and recieve SCTP IP packets to the remote host. 6.3. 7.3. The following example shows a setup where a client is proxying UDP packets through a CONNECT-IP proxy in order to control connection"}
{"_id":"doc-en-draft-ietf-masque-connect-ip-c0912f0a387641b6a9d5fad8d7ac13ee4858c7b3f12f9523800333d9e5efc11f","title":"","text":"UDP. The client can send and recieve UDP IP packets to the either of the server addresses to enable Happy Eyeballs through the proxy. 7. 8. There are significant risks in allowing arbitrary clients to establish a tunnel to arbitrary servers, as that could allow bad"}
{"_id":"doc-en-draft-ietf-masque-connect-ip-130de939cc266c7972aaf5356cf7794cd440954a36a1d50136dd493eca957de7","title":"","text":"they SHOULD follow the guidance in BCP38 to help prevent denial of service attacks. 8. 9. 8.1. 9.1. This document will request IANA to register \"connect-ip\" in the HTTP Upgrade Token Registry maintained at"}
{"_id":"doc-en-draft-ietf-masque-connect-ip-febe82071f743a27875c4c79e68ea48759247c50eccd4d405f1815fbeac93ea5","title":"","text":"This document 8.2. This document will request IANA to register IP_PACKET in the \"HTTP Datagram Format Types\" registry established by HTTP-DGRAM. 8.3. 9.2. This document will request IANA to add the following values to the \"HTTP Capsule Types\" registry created by HTTP-DGRAM:"}
{"_id":"doc-en-draft-ietf-masque-connect-ip-4229888feb894271f289aff8101d5844a0565e2ddbf991037fea18ffac9c1e5f","title":"","text":"scope for this document but can be implemented using CONNECT-IP extensions. Since CONNECT-IP endpoints can proxy IP packets send by their peer, they SHOULD follow the guidance in BCP38 to help prevent denial of service attacks. Falsifying IP source addresses in sent traffic has been common for denial of service attacks. Implementations of this mechanism need to ensure that they do not facilitate such attacks. In particular, there are scenarios where an endpoint knows that its peer is only allowed to send IP packets from a given prefix. For example, that can happen through out of band configuration information, or when allowed prefixes are shared via ADDRESS_ASSIGN capsules. In such scenarios, endpoints MUST follow the recommendations from BCP38 to prevent source address spoofing. 10."}
{"_id":"doc-en-draft-ietf-masque-connect-ip-e8910b90c99a17a2bfd18580c764b76312e3a9f1eff2ea5b4afac991ef527bea","title":"","text":"4.2.1. The ADDRESS_ASSIGN capsule (see iana-types for the value of the capsule type) allows an endpoint to inform its peer that it has assigned an IP address or prefix to it. The ADDRESS_ASSIGN capsule allows assigning a prefix which can contain multiple addresses. Any capsule type) allows an endpoint to inform its peer of the list of IP addresses or prefixes it has assigned to it. Every capsule contains the full list of IP prefixes currently assigned to the receiver. Any of these addresses can be used as the source address on IP packets originated by the receiver of this capsule. If an endpoint receives multiple ADDRESS_ASSIGN capsules, all of the assigned addresses or prefixes can be used. For example, multiple ADDRESS_ASSIGN capsules are necessary to assign both IPv4 and IPv6 addresses. The ADDRESS_ASSIGN capsule contains a sequence of zero or more Assigned Addresses. Note that an ADDRESS_ASSIGN capsule can also indicate that a previously assigned address is no longer assigned. An ADDRESS_ASSIGN capsule can also be empty. In some deployments of CONNECT-IP, an endpoint needs to be assigned an address by its peer before it knows what source address to set on its own packets. For example, in the Remote Access case (example- remote) the client cannot send IP packets until it knows what address to use. In these deployments, endpoints need to send ADDRESS_ASSIGN capsules to allow their peers to send traffic. to use. In these deployments, the endpoint that is expecting an address assignment MUST send an ADDRESS_REQUEST capsule. This isn't required if the endpoint does not need any address assignment, for example when it is configured out-of-band with static addresses. While ADDRESS_ASSIGN capsules are commonly sent in response to ADDRESS_REQUEST capsules, endpoints MAY send ADDRESS_ASSIGN capsules unprompted. 4.2.2. The ADDRESS_REQUEST capsule (see iana-types for the value of the capsule type) allows an endpoint to request assignment of an IP address from its peer. This capsule is not required for simple client/proxy communication where the client only expects to receive one address from the proxy. The capsule allows the endpoint to capsule type) allows an endpoint to request assignment of IP addresses from its peer. The capsule allows the endpoint to optionally indicate a preference for which address it would get assigned. The ADDRESS_REQUEST capsule contains a sequence of Requested Addresses. If the IP Address is all-zero (0.0.0.0 or ::), this indicates that the sender is requesting an address of that address family but does not have a preference for a specific address. In that scenario, the prefix length still indicates the sender's preference for the prefix length it is requesting. Upon receiving the ADDRESS_REQUEST capsule, an endpoint SHOULD assign an IP address to its peer, and then respond with an ADDRESS_ASSIGN capsule to inform the peer of the assignment. capsule to inform the peer of the assignment. Note that the receiver of the ADDRESS_REQUEST capsule is not required to assign the requested address, and that it can also assign some requested addresses but not others. 4.2.3."}
{"_id":"doc-en-draft-ietf-masque-connect-ip-de01a0a7843563ebef6dd45a2b2c1a3b6e0825e6e5ed1b0b467f17445ae4f969","title":"","text":"receiving the response to its IP proxying request, noting however that those may not be processed by the proxy if it responds to the request with a failure, or if the datagrams are received by the proxy before the request. before the request. Since receiving addresses and routes is required in order to know that a packet can be sent through the tunnel, such optimistic packets might be dropped by the proxy if it chooses to provide different addressing or routing information than what the client assumed. When a CONNECT-IP endpoint receives an HTTP Datagram containing an IP packet, it will parse the packet's IP header, perform any local"}
{"_id":"doc-en-draft-ietf-masque-connect-ip-c3a23c888520e4a2a0a5f6042a73471f263145536e889f1d8b1336477774c7f4","title":"","text":"9. Extensions to CONNECT-IP can define behavior changes to this mechanism. Such extensions SHOULD define new capsule types to exchange configuration information if needed. It is RECOMMENDED for extensions that modify addressing to specify that their extension capsules be sent before the ADDRESS_ASSIGN capsule and that they do not take effect until the ADDRESS_ASSIGN capsule is parsed. This allows modifications to address assignement to operate atomically. Similarly, extensions that modify routing SHOULD behave similarly with regards to the ROUTE_ADVERTISEMENT capsule. 10. There are significant risks in allowing arbitrary clients to establish a tunnel to arbitrary servers, as that could allow bad actors to send traffic and have it attributed to the proxy. Proxies"}
{"_id":"doc-en-draft-ietf-masque-connect-ip-54961ab5d31ffe4b34aa6628627834b91b0d16641c3a9640b0cdcde6eab56633","title":"","text":"scenarios, endpoints MUST follow the recommendations from BCP38 to prevent source address spoofing. 10. 11. 10.1. 11.1. This document will request IANA to register \"connect-ip\" in the HTTP Upgrade Token Registry maintained at <>. 10.2. 11.2. This document will request IANA to update the entry for the \"masque\" URI suffix in the \"Well-Known URIs\" registry maintained at"}
{"_id":"doc-en-draft-ietf-masque-connect-ip-40e7e614bf192a2ef5784c3b8e56e36485016afe05f5c8151615efaf97d4bb85","title":"","text":"IANA is requested to update the \"Reference\" field to include this document in addition to previous values from that field. 10.3. 11.3. This document will request IANA to add the following values to the \"HTTP Capsule Types\" registry created by HTTP-DGRAM:"}
{"_id":"doc-en-draft-ietf-masque-connect-udp-76d65a481898713ad612e89c70e0fb7dcea6144c039d58fd7bb0e5a01d034ab4","title":"","text":"This document defines the \"connect-udp\" HTTP Upgrade Token. \"connect- udp\" uses the Capsule Protocol as defined in HTTP-DGRAM. A \"connect-udp\" request requests that the recipient proxy establish a tunnel over a single HTTP stream to the destination target identified by the \"target_host\" and \"target_port\" variables of the URI Template (see client-config). If the request is successful, the proxy commits to converting received HTTP Datagrams into UDP packets and vice versa Clients issue requests containing a \"connect-udp\" upgrade token to initiate a UDP tunnel associated with a single HTTP stream. The target of the tunnel is indicated by the client to the proxy via the \"target_host\" and \"target_port\" variables of the URI Template (see client-config). If the request is successful, the proxy commits to converting received HTTP Datagrams into UDP packets and vice versa until the tunnel is closed. Tunnels are commonly used to create an end-to-end virtual connection, which can then be secured using QUIC QUIC or another protocol running over UDP."}
{"_id":"doc-en-draft-ietf-masque-connect-udp-736a623b1ac3390c50a79c8e49aedfc9be5c05e3d3ee3ed4fc695381f7054461","title":"","text":"udp/{target_host}/{target_port}/\" and wishes to open a UDP proxying tunnel to target 192.0.2.42:443, it could send the following request: In HTTP/1.1, this protocol uses the GET method to mimic the design of the WebSocket Protocol WEBSOCKET. 3.3. The UDP proxy SHALL indicate a successful response by replying with"}
{"_id":"doc-en-draft-ietf-masque-connect-udp-cb1ed04a0438ac5aa36350b000fe7970c4125c0489f6e35ac084922dc83f3d09","title":"","text":"The path component of the URI Template MUST start with a slash \"/\". All template variables MUST be within the path component of the URI. All template variables MUST be within the path or query components of the URI. The URI template MUST contain the two variables \"target_host\" and \"target_port\" and MAY contain other variables."}
{"_id":"doc-en-draft-ietf-masque-connect-udp-2c6639a51ad5278e142b7f29d037394160e81b9b0976049533dffc120a212c62","title":"","text":"the method SHALL be \"GET\". the request-target SHALL use absolute-form (see H1). the request SHALL include a single Host header field containing the origin of the UDP proxy."}
{"_id":"doc-en-draft-ietf-masque-connect-udp-8a87cae2229c5187276e7f0fc7dea4f5fdf3f970943fa5dad09e2adf61efeffb","title":"","text":"contains the unmodified payload of a UDP packet (referred to as \"data octets\" in UDP). Clients MAY optimistically start sending UDP packets in HTTP Datagrams before receiving the response to its UDP proxying request. However, implementors should note that such proxied packets may not be processed by the UDP proxy if it responds to the request with a failure, or if the proxied packets are received by the UDP proxy before the request. By virtue of the definition of the UDP header UDP, it is not possible to encode UDP payloads longer than 65527 bytes. Therefore, endpoints MUST NOT send HTTP Datagrams with a Payload field longer than 65527"}
{"_id":"doc-en-draft-ietf-masque-connect-udp-b69cda0efbf330fc0740215533faca515f771d89bc9394e3bedea3b3add5563a","title":"","text":"Payload field is longer than that limit without buffering the capsule contents. If a UDP proxy receives an HTTP Datagram before it has received the corresponding request, it SHALL either drop that HTTP Datagram silently or buffer it temporarily (on the order of a round trip) while awaiting the corresponding request. Note that buffering datagrams (either because the request was not yet received, or because the Context ID is not yet known) consumes resources. Receivers that buffer datagrams SHOULD apply buffering limits in order to reduce the risk of resource exhaustion occuring. For example, receivers can limit the total number of buffered datagrams, or the cumulative size of buffered datagrams, on a per- stream, per-context, or per-connection basis. A client MAY optimistically start sending UDP packets in HTTP Datagrams before receiving the response to its UDP proxying request. However, implementors should note that such proxied packets may not be processed by the UDP proxy if it responds to the request with a failure, or if the proxied packets are received by the UDP proxy before the request and the UDP proxy chooses to not buffer them. 6. UDP proxies SHOULD strive to avoid increasing burstiness of UDP"}
{"_id":"doc-en-draft-ietf-masque-connect-udp-4e5a9b4f9c48033dfb25031a161b943c41985043be8249ea941420928c51d678","title":"","text":"consider its CONNECT-UDP request as failed. The proxy that is creating the UDP socket to the destination responds to the CONNECT-UDP request with a 2xx (Successful) response, and indicates it supports HTTP Datagrams by sending the corresponding registration capsule. to the CONNECT-UDP request with a 2xx (Successful) response. Clients MAY optimistically start sending proxied UDP packets before receiving the response to its CONNECT-UDP request, noting however"}
{"_id":"doc-en-draft-ietf-masque-connect-udp-2a75a84760551d90c9ea75c38dd2277ed72c72cf0dc7214c24d4c1681d6b4e07","title":"","text":"5.1. When using HTTP/3 with the QUIC Datagram extension DGRAM, UDP payloads are transmitted in QUIC DATAGRAM frames. Since those cannot be fragmented, they can only carry payloads up to a given length determined by the QUIC connection configuration and the path MTU. If a proxy is using QUIC DATAGRAM frames and it receives a UDP payload from the target that will not fit inside a QUIC DATAGRAM frame, the proxy SHOULD NOT send the UDP payload in a DATAGRAM capsule, as that defeats the end-to-end unreliability characteristic that methods such as Datagram Packetization Layer Path MTU Discovery (DPLPMTUD) depend on RFC8899. In this scenario, the proxy SHOULD drop the UDP payload and send an ICMP \"Packet Too Big\" message to the target RFC4443. 5.2. UDP proxying does not create an IP-in-IP tunnel, so the guidance in RFC6040 about transferring ECN marks between inner and outer IP headers does not apply. There is no inner IP header in UDP proxying"}
{"_id":"doc-en-draft-ietf-masque-connect-udp-311f88dab64f6ea9bf18f305b11d7045353caf97e83905a50f98963ac8d44719","title":"","text":"recovery (e.g., QUIC), and the underlying HTTP connection runs over TCP, the proxied traffic will incur at least two nested loss recovery mechanisms. This can reduce performance as both can sometimes independently retransmit the same data. To avoid this, HTTP/3 datagrams SHOULD be used. independently retransmit the same data. To avoid this, UDP proxying SHOULD be performed over HTTP/3 to allow leveraging the QUIC DATAGRAM frame. 6.1."}
{"_id":"doc-en-draft-ietf-masque-h3-datagram-ea67f3da5e78667eac53ab861e998e159b412d250170f2c340a069bfa99e094e","title":"","text":"that datagram silently or buffer it temporarily while awaiting the creation of the corresponding stream. HTTP/3 datagrams MUST only be sent with an association to a stream that supports semantics for HTTP Datagrams. For example, existing HTTP methods GET and POST do not define semantics for associated HTTP Datagrams; therefore, HTTP/3 datagrams cannot be sent associated with GET or POST request streams. If an endpoint receives an HTTP/3 datagram associated with a method that has no known semantics for HTTP Datagrams, it MUST abort the corresponding stream with H3_GENERAL_PROTOCOL_ERROR. Future extensions MAY remove these requirements if they define semantics for such HTTP Datagrams and negotiate mutual support. 4. This specification introduces the Capsule Protocol. The Capsule Protocol is a sequence of type-length-value tuples that new HTTP Methods or new HTTP Upgrade Tokens can choose to use. It allows endpoints to reliably communicate request-related information end-to- end on HTTP request streams, even in the presence of HTTP intermediaries. The Capsule Protocol can be used to exchange HTTP Datagrams when HTTP is running over a transport that does not support the QUIC DATAGRAM frame. Upgrade Tokens can choose to use. It allows endpoints to reliably communicate request-related information end-to-end on HTTP request streams, even in the presence of HTTP intermediaries. The Capsule Protocol can be used to exchange HTTP Datagrams when HTTP is running over a transport that does not support the QUIC DATAGRAM frame. This specification defines the \"data stream\" of an HTTP request as the bidirectional stream of bytes that follow the headers in both"}
{"_id":"doc-en-draft-ietf-masque-h3-datagram-0c0ddbb018163896280f22a1cdf7166a0ad9c532d311c5b59c676f851f7772ce","title":"","text":"HTTP message content after the headers. Note that use of the Capsule Protocol is not required to use HTTP Datagrams. If a new HTTP Method or Upgrade Token is only defined over transports that support QUIC DATAGRAM frames, they might not need a stream encoding. Additionally, definitions of new HTTP Methods or of new HTTP Upgrade Tokens can use HTTP Datagrams with their own data stream protocol. However, new HTTP Method or Upgrade Tokens SHOULD use the Capsule Protocol unless they have a good reason not to. Datagrams. If a new HTTP Upgrade Token is only defined over transports that support QUIC DATAGRAM frames, they might not need a stream encoding. Additionally, definitions of new HTTP Upgrade Tokens can use HTTP Datagrams with their own data stream protocol. However, new HTTP Upgrade Tokens that wish to use HTTP Datagrams SHOULD use the Capsule Protocol unless they have a good reason not to. 4.1. Definitions of new HTTP Methods or of new HTTP Upgrade Tokens can state that their data stream uses the Capsule Protocol. If they do so, that means that the contents of their data stream uses the following format (using the notation from the \"Notational Conventions\" section of QUIC): Definitions of new HTTP Upgrade Tokens can state that their data stream uses the Capsule Protocol. If they do so, that means that the contents of their data stream uses the following format (using the notation from the \"Notational Conventions\" section of QUIC): A variable-length integer indicating the Type of the capsule. Endpoints that receive a capsule with an unknown Capsule Type MUST"}
{"_id":"doc-en-draft-ietf-masque-h3-datagram-1d65ecd393db268ab358c3435f7bc0e41d96b3fac30d050311ba3c91919ca078","title":"","text":"By virtue of the definition of the data stream, the Capsule Protocol is not in use on responses unless the response includes a 2xx (Successful) status code. The Capsule Protocol MUST NOT be used with messages that contain Content-Length or Transfer-Encoding header fields. (Successful) status code. The Capsule Protocol MUST NOT be used with messages that contain Content-Length, Content-Type, or Transfer-Encoding header fields. Additionally, HTTP status codes 204 (No Content), 205 (Reset Content), and 206 (Partial Content) MUST NOT be sent on responses that use the Capsule Protocol. 4.2. Definitions of new HTTP Methods or of new HTTP Upgrade Tokens that use the Capsule Protocol MAY use the Capsule-Protocol header field to simplify intermediary processing. Definitions of new HTTP Upgrade Tokens that use the Capsule Protocol MAY use the Capsule-Protocol header field to simplify intermediary processing. \"Capsule-Protocol\" is an Item Structured Header RFC8941. Its value MUST be a Boolean. Its ABNF is:"}
{"_id":"doc-en-draft-ietf-masque-h3-datagram-b0ec4c39b8edc5b944598e051c8567d890768e0e80587a2489d4f7779dbaf477","title":"","text":"?1. A Capsule-Protocol header field with a value of ?0 has the same semantics as when the header is not present. Intermediaries MAY use this header field to allow processing of HTTP Datagrams for unknown HTTP methods or unknown HTTP Upgrade Tokens. HTTP Upgrade Tokens; note that this is only possible for HTTP Upgrade or Extended CONNECT. The Capsule-Protocol header field MUST NOT be sent multiple times on a message. The Capsule-Protocol header field MUST NOT be used on"}
{"_id":"doc-en-draft-ietf-masque-h3-datagram-273a4f011f57a54389e11d60ff569313787930e685238578c8dfedb3e90d10c8","title":"","text":"datagrams, it's best for all implementations that support this feature to always send this Settings parameter, see setting. Since use of the Capsule Protocol is restricted to new HTTP Upgrade Tokens, it is not accessible from Web Platform APIs (such as those commonly accessed via JavaScript in web browsers). 8. 8.1."}
{"_id":"doc-en-draft-ietf-masque-h3-datagram-9df30977509e05c9dcc0db6bbbf41514a0155e2b50d093354a18de7bae725ed0","title":"","text":"the security and congestion-control properties of QUIC. However, QUIC DATAGRAM frames do not provide a means to demultiplex application contexts. This document describes how to use QUIC DATAGRAM frames when the application protocol running over QUIC is HTTP/3. It associates datagrams with client-initiated bidirectional streams. Additionally, this document defines the Capsule Protocol that can convey datagrams over prior versions of HTTP. DATAGRAM frames with HTTP/3 by association with HTTP requests. Additionally, this document defines the Capsule Protocol that can convey datagrams over prior versions of HTTP. 1."}
{"_id":"doc-en-draft-ietf-masque-h3-datagram-d3fffa87ff310caa3eaea06c40f7ce751d0735a080ef08f9aba234cb576501e8","title":"","text":"leveraging the security and congestion-control properties of QUIC. However, QUIC DATAGRAM frames do not provide a means to demultiplex application contexts. This document describes how to use QUIC DATAGRAM frames when the application protocol running over QUIC is HTTP/3 H3. It associates datagrams with client-initiated bidirectional streams. Additionally, this document defines the Capsule Protocol that can convey datagrams over prior versions of HTTP. DATAGRAM frames with HTTP/3 H3 by association with HTTP requests. Additionally, this document defines the Capsule Protocol that can convey datagrams over prior versions of HTTP. This document is structured as follows:"}
{"_id":"doc-en-draft-ietf-masque-h3-datagram-79d72a986d3f3d0c9b3df38a41bed63adce68cb2a70210be1224793edab5431a","title":"","text":"large as to not be usable, the implementation SHOULD discard the capsule without buffering its contents into memory. Note that use of the Capsule Protocol is not required to use HTTP Datagrams. If an HTTP extension that uses HTTP Datagrams is only defined over transports that support QUIC DATAGRAM frames, it might not need a stream encoding. Additionally, HTTP extensions can use HTTP Datagrams with their own data stream protocol. However, new HTTP extensions that wish to use HTTP Datagrams SHOULD use the Capsule Protocol unless they have a good reason not to. Note that it is possible for an HTTP extension to use HTTP Datagrams without using the Capsule Protocol. For example, if an HTTP extension that uses HTTP Datagrams is only defined over transports that support QUIC DATAGRAM frames, it might not need a stream encoding. Additionally, HTTP extensions can use HTTP Datagrams with their own data stream protocol. However, new HTTP extensions that wish to use HTTP Datagrams SHOULD use the Capsule Protocol as failing to do so will make it harder for the HTTP extension to support versions of HTTP other than HTTP/3 and will prevent interoperability with intermediaries that only support the Capsule Protocol. 4."}
{"_id":"doc-en-draft-ietf-masque-h3-datagram-f49281b63a6eb2a6f439fd6ada8668a4db7f50d9d3825457f238756b63982da0","title":"","text":"8. This document does not have additional security considerations beyond those defined in QUIC and DGRAM. Since this feature requires sending an HTTP/3 Settings parameter, it \"sticks out\". In other words, probing clients can learn whether a server supports this feature. Implementations that support this feature SHOULD always send this Settings parameter to avoid leaking the fact that there are applications using HTTP/3 datagrams enabled on this endpoint. 9."}
{"_id":"doc-en-draft-ietf-masque-h3-datagram-9c2dbdcfe88922ab270cb6da7a512fdd72c4b678d2fbf4c02b2570cfaddfd1d7","title":"","text":"given QUIC connection, HTTP datagrams contain two layers of multiplexing. First, the QUIC DATAGRAM frame payload starts with an encoded stream identifier that associates the datagram with a given QUIC stream. Second, datagrams carry a context identifier (see datagram-contexts) that allows multiplexing multiple datagram QUIC stream. Second, datagrams optionally carry a context identifier (see datagram-contexts) that allows multiplexing multiple datagram contexts related to a given HTTP request. Conceptually, the first layer of multiplexing is per-hop, while the second is end-to-end."}
{"_id":"doc-en-draft-ietf-masque-h3-datagram-f86bb1aafb90f1a3f530fbd7bbccc0d74a40ac185cbd37f73aa9d18cf2adfa91","title":"","text":"the datagram: the context identifier then maps to a compression context that the receiver can use to reconstruct the elided data. Contexts are identified within the scope of a given request by a numeric value, referred to as the context ID. A context ID is a 62-bit integer (0 to 2^62-1). Contexts are optional, their use is negotiated on each request stream using registration capsules, see register-capsule and register-no- context-capsule. When contexts are used, they are identified within the scope of a given request by a numeric value, referred to as the context ID. A context ID is a 62-bit integer (0 to 2^62-1). While stream IDs are a per-hop concept, context IDs are an end-to-end concept. In other words, if a datagram travels through one or more"}
{"_id":"doc-en-draft-ietf-masque-h3-datagram-63f74ba0619ddeaeb79bb9cd21400aebc1ebb026157d454422718090503b466d","title":"","text":"streams, and those have stream IDs that are divisible by four.) A variable-length integer indicating the context ID of the datagram (see datagram-contexts). datagram (see datagram-contexts). Whether or not this field is present depends on which registration capsules were exchanged on the associated stream: if a REGISTER_DATAGRAM_CONTEXT capsule (see register-capsule) has been sent or received on this stream, then the field is present; if a REGISTER_DATAGRAM_NO_CONTEXT capsule (see register-no-context-capsule) has been sent or received, then this field is absent; if neither has been sent or received, then it is not yet possible to parse this datagram and the receiver MUST either drop that datagram silently or buffer it temporarily while awaiting the registration capsule. The payload of the datagram, whose semantics are defined by individual applications. Note that this field can be empty."}
{"_id":"doc-en-draft-ietf-masque-h3-datagram-eb40d983bd994b3613f223f3a2940414dc39d19222d803ff2760fa8dd0116c07","title":"","text":"Servers MUST NOT send a REGISTER_DATAGRAM_CONTEXT capsule on a stream before they have received at least one REGISTER_DATAGRAM_CONTEXT capsule from the client on that stream. This ensures that clients control whether datagrams are allowed for a given request. If a capsule or one REGISTER_DATAGRAM_NO_CONTEXT capsule from the client on that stream. This ensures that clients control whether datagrams are allowed for a given request. If a client receives a REGISTER_DATAGRAM_CONTEXT capsule on a stream where the client has not yet sent a REGISTER_DATAGRAM_CONTEXT capsule, the client MUST abruptly terminate the corresponding stream with a stream error of type H3_GENERAL_PROTOCOL_ERROR. Servers MUST NOT send a REGISTER_DATAGRAM_CONTEXT capsule on a stream where it has received a REGISTER_DATAGRAM_NO_CONTEXT capsule. If a client receives a REGISTER_DATAGRAM_CONTEXT capsule on a stream where the client has not yet sent a REGISTER_DATAGRAM_CONTEXT capsule, the the client has sent a REGISTER_DATAGRAM_NO_CONTEXT capsule, the client MUST abruptly terminate the corresponding stream with a stream error of type H3_GENERAL_PROTOCOL_ERROR. 4.2. The REGISTER_DATAGRAM_NO_CONTEXT capsule (type=0x03) allows a client to inform the server that datagram contexts will not be used with this stream. It also informs the server of the encoding and semantics of datagrams associated with this stream. Its Capsule Data field consists of: A string of comma-separated key-value pairs to enable extensibility, see the definition of the same field in register- capsule for details. Note that this registration is unilateral and bidirectional: the client unilaterally defines the semantics it will apply to the datagrams it sends and receives with this stream. Endpoints MUST NOT send DATAGRAM frames without a Context ID until they have either sent or received a REGISTER_DATAGRAM_NO_CONTEXT Capsule. However, due to reordering, an endpoint that receives a DATAGRAM frame before receiving either a REGISTER_DATAGRAM_CONTEXT capsule or a REGISTER_DATAGRAM_NO_CONTEXT capsule MUST NOT treat it as an error, it SHALL instead drop the DATAGRAM frame silently, or buffer it temporarily while awaiting a REGISTER_DATAGRAM_NO_CONTEXT capsule or the corresponding REGISTER_DATAGRAM_CONTEXT capsule. Servers MUST NOT send the REGISTER_DATAGRAM_NO_CONTEXT capsule. If a client receives a REGISTER_DATAGRAM_NO_CONTEXT capsule, the client MUST abruptly terminate the corresponding stream with a stream error of type H3_GENERAL_PROTOCOL_ERROR. Clients MUST NOT send more than one REGISTER_DATAGRAM_NO_CONTEXT capsule on a stream. If a server receives a second REGISTER_DATAGRAM_NO_CONTEXT capsule on the same stream, the server MUST abruptly terminate the corresponding stream with a stream error of type H3_GENERAL_PROTOCOL_ERROR. Clients MUST NOT send a REGISTER_DATAGRAM_NO_CONTEXT capsule on a stream before they have sent at least one HEADERS frame on that stream. This removes the need to buffer REGISTER_DATAGRAM_CONTEXT capsules when the server needs information from headers to determine how to react to the capsule. If a server receives a REGISTER_DATAGRAM_NO_CONTEXT capsule on a stream that hasn't yet received a HEADERS frame, the server MUST abruptly terminate the corresponding stream with a stream error of type H3_GENERAL_PROTOCOL_ERROR. Clients MUST NOT send both REGISTER_DATAGRAM_CONTEXT capsules and REGISTER_DATAGRAM_NO_CONTEXT capsules on the same stream. If a server receives both a REGISTER_DATAGRAM_CONTEXT capsule and a REGISTER_DATAGRAM_NO_CONTEXT capsule on the same stream, the server MUST abruptly terminate the corresponding stream with a stream error of type H3_GENERAL_PROTOCOL_ERROR. 4.3. The CLOSE_DATAGRAM_CONTEXT capsule (type=0x01) allows an endpoint to inform its peer that it will no longer send or parse received datagrams associated with a given context ID. Its Capsule Data field"}
{"_id":"doc-en-draft-ietf-masque-h3-datagram-a7d7e43e78ca79d82b4c4ba3540a552dcabb5c30808d8ffdf69a3b9163593a26","title":"","text":"MUST abruptly terminate the corresponding stream with a stream error of type H3_GENERAL_PROTOCOL_ERROR. 4.3. 4.4. The DATAGRAM capsule (type=0x02) allows an endpoint to send a datagram frame over an HTTP stream. This is particularly useful when"}
{"_id":"doc-en-draft-ietf-masque-h3-datagram-67bd9842dc58b822d2a2bc3db517fe141f2bd4faca3a735bb9b88e0bcd82d1af","title":"","text":"Its Capsule Data field consists of: A variable-length integer indicating the context ID of the datagram (see datagram-contexts). datagram (see datagram-contexts). Whether or not this field is present depends on which registration capsules were exchanged on the associated stream: if a REGISTER_DATAGRAM_CONTEXT capsule (see register-capsule) has been sent or received on this stream, then the field is present; if a REGISTER_DATAGRAM_NO_CONTEXT capsule (see register-no-context-capsule) has been sent or received, then this field is absent; if neither has been sent or received, then it is not yet possible to parse this datagram and the receiver MUST either drop that datagram silently or buffer it temporarily while awaiting the registration capsule. The payload of the datagram, whose semantics are defined by individual applications. Note that this field can be empty."}
{"_id":"doc-en-draft-ietf-mops-streaming-opcons-828dbc1e87f6c7213f0f6d2ebb6361d0ac966eee23587330fc591a9a006adc70","title":"","text":"3.2.1. There are many reasons why path characteristics might change suddenly, but we can divide these reasons into two categories: There are many reasons why path characteristics might change in normal operation, for example: If the path topology changes. For example, routing changes, which can happen in normal operation, may result in traffic being"}
{"_id":"doc-en-draft-ietf-mops-streaming-opcons-31cc0912cdadd4da8f3e7a9e6ab82778f8ad4d9e505f6237e71c40eedf3d7dbf","title":"","text":"If cross traffic that also traverses part or all of the same path topology increases or decreases, especially if this new cross traffic is \"inelastic,\" and does not, itself, respond to indications of path congestion. To recognize that a path carrying streaming media is not behaving the way it normally does, having an expected baseline that describes the way it normally does is fundamental. Analytics that aid in that recognition can be more or less sophisticated and can be as simple as noticing that the apparent round trip times for media traffic carried over TCP transport on some paths are suddenly and significantly longer than usual. Passive monitors can detect changes in the elapsed time between the acknowledgements for specific TCP segments from a TCP receiver since TCP octet sequence numbers and acknowledgements for those sequence numbers are carried in the clear, even if the TCP payload itself is encrypted. See reliable-behavior for more information. As transport protocols evolve to encrypt their transport header fields, one side effect of increasing encryption is the kind of passive monitoring, or even \"performance enhancement\" (RFC3135) that was possible with the older transport protocols (UDP, described in unreliable-behavior and TCP, described in reliable-behavior) is no longer possible with newer transport protocols such as QUIC (described in quic-behavior). The IETF has specified a \"latency spin bit\" mechanism in Section 17.4 of RFC9000 to allow passive latency monitoring from observation points on the network path throughout the duration of a connection, but currently chartered work in the IETF is focusing on endpoint monitoring and reporting, rather than on passive monitoring. One example is the \"qlog\" mechanism I-D.ietf-quic-qlog-main-schema, a protocol-agnostic mechanism used to provide better visibility for encrypted protocols such as QUIC (I-D.ietf-quic-qlog-quic-events) and for HTTP/3 (I-D.ietf-quic-qlog-h3-events). traffic is \"inelastic,\" and does not respond to indications of path congestion. Wireless links (Wi-Fi, 5G, LTE, etc.) often see rapid changes to capacity from changes in radio interference and signal strength as endpoints move. To recognize that a path carrying streaming media has experienced a change, maintaining a baseline that captures its prior properties is fundamental. Analytics that aid in that recognition can be more or less sophisticated and can usefully operate on several different time scales, from milliseconds to hours or days. Useful properties to monitor for changes can include: round-trip times loss rate (and explicit congestion notification (ECN) (RFC3168 when in use) out of order packet rate packet and byte receive rate application level goodput properties of other connections carrying competing traffic, in addition to the connections carrying the streaming media externally provided measurements, for example from network cards or metrics collected by the operating system 3.3."}
{"_id":"doc-en-draft-ietf-mops-streaming-opcons-05ac3b1ab38c807c7aaff04eb12e6e037c3d4e29df48f7b99bde5bac438fc22c","title":"","text":"5.5.3. As many end devices have moved to wireless connectivity for the final hop (Wi-Fi, 5G, or LTE), new problems in bandwidth detection have emerged from radio interference and signal strength effects. As many end devices have moved to wireless connections for the final hop (such as Wi-Fi, 5G, LTE, etc.), new problems in bandwidth detection have emerged. Each of these technologies can experience sudden changes in capacity as the end user device moves from place to place and encounters new sources of interference. Microwave ovens, for example, can cause a throughput degradation of more than a factor of 2 while active Micro. 5G and LTE likewise can easily see rate variation by a factor of 2 or more over a span of seconds as users move around. In most real-world operating environments, wireless links can often experience sudden changes in capacity as the end user device moves from place to place or encounters new sources of interference. Microwave ovens, for example, can cause a throughput degradation in Wi-Fi of more than a factor of 2 while active Micro. 5G and LTE likewise can easily see rate variation by a factor of 2 or more over a span of seconds as users move around. These swings in actual transport capacity can result in user experience issues that can be exacerbated by insufficiently responsive ABR algorithms. experience issues when interacting with ABR algorithms that aren't tuned to handle the capacity variation gracefully. 5.6."}
{"_id":"doc-en-draft-ietf-mops-streaming-opcons-13376bef5bee8133bd093b5f9df113c7da5109cf48372e48faf251b46e449e9d","title":"","text":"Operational Considerations for Streaming Media draft-ietf-mops-streaming-opcons-00 draft-ietf-mops-streaming-opcons-01 Abstract"}
{"_id":"doc-en-draft-ietf-mops-streaming-opcons-b28de0c1bf785805a0c5fc041c5dc5be4eb3fe70c4f275fd5d47970842a00f34","title":"","text":"watch for increasing numbers of end users uploading significant amounts of content. 2.6. The causes of unpredictable usage described in sec-unpredictable were more or less the result of human choices, but we were reminded during a post-IETF 107 meeting that humans are not always in control, and forces of nature can cause enormous fluctuations in traffic patterns. In his talk, Sanjay Mishra Mishra reported that after the CoViD-19 pandemic broke out in early 2020, Comcast's streaming and web video consumption rose by 38%, with their reported peak traffic up 32% overall between March 1 to March 30 Comcast, AT&T reported a 28% jump in core network traffic (single day in April, as compared to pre stay-at-home daily average traffic), with video accounting for nearly half of all mobile network traffic, while social networking and web browsing remained the highest percentage (almost a quarter each) of overall mobility traffic ATT, and Verizon reported similar trends with video traffic up 36% over an average day (pre COVID-19) Verizon. We note that other operators saw similar spikes during this time period. Craig Labowitz Labovitz reported Weekday peak traffic increases over 45%-50% from pre-lockdown levels, A 30% increase in upstream traffic over their pre-pandemic levels, and A steady increase in the overall volume of DDoS traffic, with amounts exceeding the pre-pandemic levels by 40%. (He attributed this increase to the significant rise in gaming-related DDoS attacks (LabovitzDDoS), as gaming usage also increased.) 3. 3.1."}
{"_id":"doc-en-draft-ietf-mops-streaming-opcons-a561efe7cb56c85177f16725b6ba736a00d4075b5450c46832d2ff71002caa76","title":"","text":"Abstract This document provides an overview of operational networking issues that pertain to quality of experience in delivery of video and other that pertain to quality of experience in streaming of video and other high-bitrate media over the internet. 1."}
{"_id":"doc-en-draft-ietf-mops-streaming-opcons-33b287c0205c4a56dfff743ce77269f0e386019ae0124bed67f895563234a565","title":"","text":"compound annual growth rate continuing at 34% (from Appendix D of CVNI). A substantial part of this growth is due to increased use of streaming video, although the amount of video traffic in real-time communications (for example, online videoconferencing) has also grown significantly. While both streaming video and videoconferencing have real-time delivery and latency requirements, these requirements vary from one application to another. For example, videoconferencing demands an end-to-end (one-way) latency of a few hundreds of milliseconds whereas live streaming can tolerate latencies of several seconds. This document specifically focuses on the streaming applications and defines streaming as follows: Streaming is transmission of a continuous media from a server to a client and its simultaneous consumption by the client. Here, continous media refers to media and associated streams such as video, audio, metadata, etc. In this definition, the critical term is \"simultaneous\", as it is not considered streaming if one downloads a video file and plays it after the download is completed, which would be called download-and-play. This has two implications. First, server's transmission rate must (loosely or tightly) match to client's consumption rate for an uninterrupted playback. That is, the client must not run out of data (buffer underrun) or take more than it can keep (buffer overrun) as any excess media is simply discarded. Second, client's consumption rate is limited by not only bandwidth availability but also the real- time constraints. That is, the client cannot fetch media that is not available yet. In many contexts, video traffic can be handled transparently as generic application-level traffic. However, as the volume of video traffic continues to grow, it's becoming increasingly important to"}
{"_id":"doc-en-draft-ietf-mops-streaming-opcons-5d55c3d3f19e91ceb918c06ebd348f86ab470b709535aa82b4d9d838a1cec6bb","title":"","text":"further. In this case, the immersive content is typically referred to as volumetric media. One way to represent the volumetric media is to use point clouds, where streaming a single object may easily require a bitrate of 30 Mbps or higher. Refer to PCC for more details. require a bitrate of 30 Mbps or higher. Refer to MPEGI and PCC for more details. 2.2."}
{"_id":"doc-en-draft-ietf-mops-streaming-opcons-b1aa26013cd3d48177e3bc1bf01dbe61c32fab24ca2eabeb8bc9e13e26f63ca6","title":"","text":"3.1. Adaptive BitRate (ABR) is a sort of application-level response strategy in which the receiving media player attempts to detect the available bandwidth of the network path by experiment or by observing the successful application-layer download speed, then chooses a video bitrate (among the limited number of available options) that fits within that bandwidth, typically adjusting as changes in available bandwidth occur in the network or changes in capabilities occur in the player (such as available memory, CPU, display size, etc.). strategy in which the streaming client attempts to detect the available bandwidth of the network path by observing the successful application-layer download speed, then chooses a bitrate for each of the video, audio, subtitles and metadata (among the limited number of available options) that fits within that bandwidth, typically adjusting as changes in available bandwidth occur in the network or changes in capabilities occur during the playback (such as available memory, CPU, display size, etc.). The choice of bitrate occurs within the context of optimizing for some metric monitored by the video player, such as highest achievable video quality, or lowest rate of expected rebuffering events. some metric monitored by the client, such as highest achievable video quality or lowest chances for a rebuffering (playback stall). 3.2. ABR playback is commonly implemented by video players using HLS ABR playback is commonly implemented by streaming clients using HLS RFC8216 or DASH DASH to perform a reliable segmented delivery of video data over HTTP. Different player implementations and receiving devices use different strategies, often proprietary algorithms (called rate adaptation or bitrate selection algorithms), to perform available bandwidth estimation/prediction and the bitrate selection. Most players only use passive observations, i.e., they do not generate probe traffic to measure the available bandwidth. media over HTTP. Different implementations use different strategies ABRSurvey, often proprietary algorithms (called rate adaptation or bitrate selection algorithms) to perform available bandwidth estimation/prediction and the bitrate selection. Most clients only use passive observations, i.e., they do not generate probe traffic to measure the available bandwidth. This kind of bandwidth-measurement systems can experience trouble in several ways that can be affected by networking design choices."}
{"_id":"doc-en-draft-ietf-mops-streaming-opcons-d5b72b3b4b348dedb98009b5fd1141a29efdec07da41efcd5a538932a7ce039d","title":"","text":"9. Thanks to Mark Nottingham, Glenn Deen, Dave Oran, Aaron Falk, Kyle Rose, Leslie Daigle, Lucas Pardue, Matt Stock, Alexandre Gouaillard, and Mike English for their very helpful reviews and comments. Thanks to Alexandre Gouaillard, Aaron Falk, Dave Oran, Glenn Deen, Kyle Rose, Leslie Daigle, Lucas Pardue, Mark Nottingham, Matt Stock, Mike English, Roni Even, and Will Law for very helpful suggestions, reviews and comments. (If we missed your name, please let us know!) 10. References"}
{"_id":"doc-en-draft-ietf-ppm-dap-cd755929fa1280293725ec132dc97bff00b1ba68356f58c9193ef8421087355f","title":"","text":"errors. The \"instance\" value MUST be the endpoint to which the request was targeted. The problem document MUST also include a \"taskid\" member which contains the associated PPM task ID, encoded with base64 RFC4648 (this value is always known, see task- configuration). with base64 using the standard alphabet RFC4648 (this value is always known, see task-configuration). In the remainder of this document, we use the tokens in the table above to refer to error types, rather than the full URNs. For"}
{"_id":"doc-en-draft-ietf-ppm-dap-37b4c62f3195961e4ca59648adc6ce08aabde57772eded7ac8f9b2dee4075fe7","title":"","text":"This protocol is extensible and allows for the addition of new cryptographic schemes that implement the VDAF interface specified in I-D.draft-cfrg-patton-vdaf. Candidates include: VDAF. Candidates include: \"prio3\", which allows for aggregate statistics such as sum, mean, histograms, etc. This class of VDAFs is based on Prio CGB17 and"}
{"_id":"doc-en-draft-ietf-ppm-dap-8ac2455ebc146eea7bb91c5ddcc48aed838a3757ebcf38bb05988c26e32d63c9","title":"","text":"client ever sees the values for individual clients. In order to address this problem, the aggregators engage in a secure, multi-party computation specified by the chosen VDAF I-D.draft-cfrg- patton-vdaf in order to prepare a report for aggregation. At the beginning of this computation, each aggregator is in possession of an input share uploaded by the client. At the end of the computation, each aggregator is in posession of either an \"output share\" that is ready to be aggregated or an indication that a valid output share could not be computed. multi-party computation specified by the chosen VDAF VDAF in order to prepare a report for aggregation. At the beginning of this computation, each aggregator is in possession of an input share uploaded by the client. At the end of the computation, each aggregator is in posession of either an \"output share\" that is ready to be aggregated or an indication that a valid output share could not be computed. To facilitiate this computation, the input shares generated by the client include information used by the aggregators during aggregation"}
{"_id":"doc-en-draft-ietf-ppm-dap-9ba671105a5260fd26caef9a94c1b475f00c0233b47b00d643236f94eec17e87","title":"","text":"\"vdaf_verify_param\": The aggregator's VDAF verification parameter output by the setup algorithm computed jointly by the aggregators before the start of the PPM protocol I-D.draft-cfrg-patton-vdaf). [OPEN ISSUE: This is yet to be specified. See issue#161.] before the start of the PPM protocol VDAF). [OPEN ISSUE: This is yet to be specified. See issue#161.] Finally, the collector is configured with the HPKE secret key corresponding to \"collector_hpke_config\"."}
{"_id":"doc-en-draft-ietf-ppm-dap-9f92847689138f9fb6aa1720ec47faf833ef644d6f9623147102ff9f81ca5d2d","title":"","text":"The following terms are used: This document uses the presentation language of RFC8446. This document uses the presentation language of RFC8446 to define messages in the PPM protocol. Encoding and decoding of these messages as byte strings also follows RFC8446. 2."}
{"_id":"doc-en-draft-ietf-ppm-dap-6e16bc1085b093463bc11202bf8e66209f9cae061567be7eebafc011fdf834b3","title":"","text":"6. Prio assumes a powerful adversary with the ability to compromise an unbounded number of clients. In doing so, the adversary can provide malicious (yet truthful) inputs to the aggregation function. Prio also assumes that all but one server operates honestly, where a dishonest server does not execute the protocol faithfully as specified. The system also assumes that servers communicate over secure and mutually authenticated channels. In practice, this can be done by TLS or some other form of application-layer authentication. In the presence of this adversary, Prio provides two important properties for computing an aggregation function F: Privacy. The aggregators and collector learn only the output of F computed over all client inputs, and nothing else. Robustness. As long as the aggregators execute the input- validation protocol correctly, a malicious client can skew the output of F only by reporting false (untruthful) input. The output cannot be influenced in any other way. There are several additional constraints that a Prio deployment must satisfy in order to achieve these goals: Minimum batch size. The aggregation batch size has an obvious impact on privacy. (A batch size of one hides nothing of the input.) Aggregation function choice. Some aggregation functions leak slightly more than the function output itself. [TODO: discuss these in more detail.] PPM assumes an active attacker that controls the network and has the ability to statically corrupt any number of clients, aggregators, and collectors. That is, the attacker can learn the secret state of any party prior to the start of its attack. For example, it may coerce a client into providing malicious input shares for aggregation or coerce an aggregator into diverting from the protocol specified (e.g., by divulging its input shares to the attacker). In the presence of this adversary, PPM aims to achieve the following high-level secure aggregation goals: Privacy. Clients trust that some aggregator is honest. That is, as long as at least one aggregator executes the protocol faithfully, the parties learn nothing beyond the aggregate result (i.e., the output of the aggregation function computed over the honest measurements). Correctness. The collector trusts that the aggregators execute the protocol correctly. That is, as long as the aggregators execute the protocol faithfully, a malicious client can skew the aggregate result only by reporting a false (untruthful) measurement. The result cannot be influenced in any other way. Currently, the specification does not achieve these goals. In particular, there are several open issues that need to be addressed before these goals are met. Details for each issue are below. When crafted maliciously, collect requests may leak more information about the measurements than the system intends. For example, the spec currently allows sequences of collect requests to reveal an aggregate result for a batch smaller than the minimum batch size. [OPEN ISSUE: See issue#195. This also has implications for how we solve issue#183.] Even benign collect requests may leak information beyond what one might expect intuitively. For example, the Poplar1 VDAF VDAF can be used to compute the set of heavy hitters among a set of arbitrary bit strings uploaded by clients. This requires multiple evaluations of the VDAF, the results of which reveal information to the aggregators and collector beyond what follows from the heavy hitters themselves. Note that this leakage can be mitigated using differential privacy. [OPEN ISSUE: We have yet not specified how to add DP.] The core PPM spec does not defend against Sybil attacks. In this type of attack, the adversary adds to a batch a number of reports that skew the aggregate result in its favor. For example: The result may reveal additional information about the honest measurements, leading to a privacy violation; or the result may have some property that is desirable to the adversary (\"stats poisoning\"). The upload sub-protocol includes an extensions mechanism that can be used to prevent -- or at least mitigate -- these types of attacks. See upload-extensions. [OPEN ISSUE: No such extension has been implemented, so we're not yet sure if the current mechanism is sufficient.] Attacks may also come from the network. Thus, it is required that the aggregators and collector communicate with one another over mutually authenticated and confidential channels. The core PPM spec does not specify such a mechanism beyond requiring server authentication for HTTPS sessions. Note that clients are not required to authenticate themselves. [OPEN ISSUE: It might be better to be prescriptive about leader authentication in leader- helper channels and collector authenticaiton in collector-leader channels. For the latter we have issue#155.] 6.1. [OPEN ISSUE: This subsection is a bit out-of-date.] In this section, we enumerate the actors participating in the Prio system and enumerate their assets (secrets that are either inherently valuable or which confer some capability that enables further attack"}
{"_id":"doc-en-draft-ietf-ppm-dap-961aeae09e968bdbdee2c5aae9d48b2fc353e05be76a663729f265f114c99dc6","title":"","text":"To generate the report, the client begins by sharding its measurement into a sequence of input shares as specified by the VDAF in use. To encrypt an input share, the client first generates an HPKE RFC9180 context for the aggregator by running encrypt an input share, the client generates an HPKE RFC9180 ciphertext and encapsulated key for the aggregator by running where \"pk\" is the aggregator's public key and \"server_role\" is the Role of the intended recipient (\"0x02\" for the leader and \"0x03\" for the helper). In general, the info string for computing the HPKE context is suffixed by two bytes, the first of which identifies the role of the sender and the second of which identifies the role of the intended recipient. \"enc\" is the HPKE encapsulated key and \"context\" is the HPKE context used by the client for encryption. The payload is encrypted as where \"input_share\" is the aggregator's input share and \"nonce\" and \"extensions\" are the corresponding fields of \"Report\". Clients MUST NOT use the same \"enc\" for multiple reports. where \"pk\" is the aggregator's public key; \"server_role\" is the Role of the intended recipient (\"0x02\" for the leader and \"0x03\" for the helper); \"task_id\", \"nonce\", and \"extensions\" are the corresponding fields of \"Report\"; and \"input_share\" is the aggregator's input share. The leader responds to well-formed requests to \"[leader]/upload\" with HTTP status code 200 OK and an empty body. Malformed requests are"}
{"_id":"doc-en-draft-ietf-ppm-dap-8990a5fbb3a69e74d116beab1d47a21771319ce1a1fbbb9cfc07261a1b078724","title":"","text":"report share as invalid with the error \"hpke-unknown-config-id\". Otherwise, it decrypts the payload with the following procedure: where \"sk\" is the HPKE secret key, \"task_id\" is the task ID, \"nonce\" and \"extensions\" are the nonce and extensions of the report share respectively, and \"server_role\" is 0x02 if the aggregator is the leader and 0x03 otherwise. If decryption fails, the aggregator marks the report share as invalid with the error \"hpke-decrypt-error\". Otherwise, it outputs the resulting \"input_share\". where \"sk\" is the HPKE secret key, and \"server_role\" is the role of the aggregator (\"0x02\" for the leader and \"0x03\" for the helper). If decryption fails, the aggregator marks the report share as invalid with the error \"hpke-decrypt-error\". Otherwise, it outputs the resulting \"input_share\". 4.3.1.4."}
{"_id":"doc-en-draft-ietf-ppm-dap-60c5cba1cd863ded3ff76765784ce4961513fae2d3144fc47b92517e79c887f5","title":"","text":"\"AggregateShareReq\" is done as follows: where \"pk\" is the HPKE public key encoded by the collector's HPKE key, and server_role is is \"0x02\" for the leader and \"0x03\" for a helper. key, \"server_role\" is \"0x02\" for the leader and \"0x03\" for a helper. The collector decrypts these aggregate shares using the opposite process. Specifically, given an encrypted input share, denoted \"enc_share\", for a given batch interval, denoted \"batch_interval\", decryption works as follows: where \"sk\" is the HPKE secret key, \"task_id\" is the task ID for a given collect request, and \"server_role\" is the role of the server that sent the aggregate share (\"0x02\" for the leader and \"0x03\" for the helper). where \"sk\" is the HPKE secret key, \"task_id\" is the task ID for the collect request, and \"server_role\" is the role of the server that sent the aggregate share (\"0x02\" for the leader and \"0x03\" for the helper). 4.4.5."}
{"_id":"doc-en-draft-ietf-ppm-dap-e247f8670b98eee84317a7a104fe2ea68868ee6b5eb17edfcd0e077ed73f7846","title":"","text":"\"batch_interval\" is the batch interval of the request. \"agg_param\", an aggregation parameter for the VDAF being executed. \"report_count\" is the number of reports included in the aggregation. \"checksum\" is the checksum computed over the set of client reports. \"job_id\" is the ID of the aggregation job. This request MUST be authenticated as described in https-sender-auth. To handle the leader's request, the helper first ensures that the request meets the requirements for batch parameters following the"}
{"_id":"doc-en-draft-ietf-ppm-dap-8e529b6366b35298ef61e05071632d40bcd4c129c036df8f1bf07bbfef80d882","title":"","text":"where \"[leader]\" is the first entry in the task's aggregator endpoints. The payload is structured as follows: This message is called the Client's report. It consists of a \"header\" and the encrypted input share of each of the Aggregators. The header consists of the task ID and report \"metadata\". The metadata consists of the following fields: This message is called the Client's report. It consists of the report metaata, the \"public share\" output by the VDAF's input- distribution algorithm, and the encrypted input share of each of the Aggregators. The header consists of the task ID and report \"metadata\". The metadata consists of the following fields: A timestamp representing the time at which the report was generated. Specifically, the \"time\" field is set to the number of"}
{"_id":"doc-en-draft-ietf-ppm-dap-a09af04f835ae98bab1b2364303d3dc45a9fad0b3aaa284d64a6d85ce0da509a","title":"","text":"4.4.1.3. Each report share has a corresponding task ID, report metadata (timestamp, nonce, and extensions), and encrypted input share. Let \"task_id\", \"metadata\", and \"encrypted_input_share\" denote these values, respectively. Given these values, an aggregator decrypts the input share as follows. First, the aggregator looks up the HPKE config and corresponding secret key indicated by (timestamp, nonce, and extensions), the public share sent to each Aggregator, and the recipient's encrypted input share. Let \"task_id\", \"metadata\", \"public_share\", and \"encrypted_input_share\" denote these values, respectively. Given these values, an aggregator decrypts the input share as follows. First, the aggregator looks up the HPKE config and corresponding secret key indicated by \"encrypted_input_share.config_id\". If not found, then it marks the report share as invalid with the error \"hpke-unknown-config-id\". Otherwise, it decrypts the payload with the following procedure:"}
{"_id":"doc-en-draft-ietf-ppm-dap-7023732128a3ac6bbf54e133b85ec885cf57e06cbd4d21607f2a5ab64db7e799","title":"","text":"\"vdaf_verify_key\" is the VDAF verification key shared by the aggregators; \"agg_id\" is the aggregator ID (\"0x00\" for the Leader and \"0x01\" for the helper); and \"agg_param\" is the opaque aggregation parameter distributed to the aggregtors by the collector. \"0x01\" for the helper); \"agg_param\" is the opaque aggregation parameter distributed to the aggregtors by the collector; \"public_share\" is the public share generated by the client and distributed to each aggregator; and \"input_share\" is the aggregator's input share. If either step fails, the aggregator marks the report as invalid with error \"vdaf-prep-error\". Otherwise, the value \"out\" is interpreted"}
{"_id":"doc-en-draft-ietf-ppm-dap-d0f6076e0555b100b9a579dacba886d0c28cf092b3ff6c70585b97e9d46aac7f","title":"","text":"aggregate shares into an aggregate result using the VDAF's \"agg_shares_to_result\" algorithm. In particular, let \"agg_shares\" denote the ordered sequence of aggregator shares, ordered by aggregator index, and let \"agg_param\" be the opaque aggregation parameter. The final aggregate result is computed as follows: aggregator index, let \"report_count\" denote the report count sent by the Leader, and let \"agg_param\" be the opaque aggregation parameter. The final aggregate result is computed as follows: 4.5.4."}
{"_id":"doc-en-draft-ietf-ppm-dap-47fba0b21412e40a9b5f5e422db11972d8aee5faa828ad9c83bd209315e2dbcd","title":"","text":"participating clients or permit some attacks on robustness. This auxiliary information could be removed by having clients submit reports to an anonymizing proxy server which would then use Oblivious HTTP I-D.thomson-http-oblivious to forward inputs to the DAP leader, without requiring any server participating in DAP to be aware of whatever client authentication or attestation scheme is in use. HTTP I-D.draft-ietf-ohai-ohttp-07 to forward inputs to the DAP leader, without requiring any server participating in DAP to be aware of whatever client authentication or attestation scheme is in use. 7.4."}
{"_id":"doc-en-draft-ietf-ppm-dap-4da227be88a46edcc9a6c6a31f5308502e46d22fcb95996232f5543eb9425818","title":"","text":"*Collect:* The collector makes one or more requests to the leader in order to obtain the final output of the protocol. Before the output can be computed, the aggregators (i.e, the leader and helpers) need to have verified and aggregated a sufficient number helper) need to have verified and aggregated a sufficient number of inputs. Depending on the PA protocol, it may be possible for the aggregators to do so immediately when reports are uploaded. (See prio.) However, in general it is necessary for them to wait until (a) enough reports have been uploaded and (b) the collector has made a request. (See hits.) [TODO: Say that the protocol involves multiple helpers. The downside of using secret sharing is that the protocol requires at least two servers to be online during the entire data aggregation process. To ameliorate this problem, we run the protocol in parallel with multiple helpers.] 3. This section specifies a protocol for executing generic PA tasks."}
{"_id":"doc-en-draft-ietf-ppm-dap-9b53a672d8c4e053628765aa07453df5bd958658c3e8d05f3080c91d1ea81277","title":"","text":"\"task\": The PA task. \"helper_urls\": The helpers' endpoint URLs. \"helper_url\": The helpers endpoint URL. \"collector_config\": The HPKE configuration of the collector (described in hpke-config). [OPEN ISSUE: Maybe the collector's"}
{"_id":"doc-en-draft-ietf-ppm-dap-1ca98a1935988ca4312a8c8b63bbada75b89b5cf13d5b4a9c69b160ff9d83ab9","title":"","text":"3.3.2. For each URL \"[helper]\" in \"PAUploadStartResp.helper_urls\", the client sends a GET request to \"[helper]/key_config\". The helper responds with status 200 and an \"HpkeConfig\" message. Next, the client collects the set of helpers it will upload shares to. It ignores a helper if: Let \"[helper]\" denote the helper URL encoded by \"PAUploadStartResp.param.helper_url\". When a client sends a GET request to \"[helper]/key_config\", the helper responds with status 200 and an \"HpkeConfig\" message. The client aborts if any of the following happen: the client and helper failed to establish a secure, helper- authenticated channel;"}
{"_id":"doc-en-draft-ietf-ppm-dap-4c48eeb4a2a0aad8117564c82d8eb7081f9f9adfd8e990a47763f635c2ceba42","title":"","text":"the key config specifies a KEM, KDF, or AEAD algorithm the client doesn't recognize. If the set of supported helpers is empty, then the client aborts and alerts the leader with \"no supported helpers\". Otherwise, for each supported helper the client issues a POST request to \"[leader]/upload_finish\" with a payload constructed as described below. [OPEN ISSUE: Should the request URL encode the PA task? This would be necessary if we make \"upload_start\" an idempotent GET per issue#48.]"}
{"_id":"doc-en-draft-ietf-ppm-dap-76a48fd3937b7792e2dfa42e184203d0e047b625b28e411ff198e13be49ee9ee","title":"","text":"that about a client? I'm not sure, so I'd be inclined to remove this unless we have a concrete use case.] The client begins by setting up an HPKE I-D.irtf-cfrg-hpke context for the helper by running Next, the client issues a POST request to \"[leader]/upload_finish\". It begins by setting up an HPKE I-D.irtf-cfrg-hpke context for the helper by running where \"pk\" is the KEM public key encoded by \"HpkeConfig.public_key\". The outputs are the helper's encapsulated context \"enc\" and the"}
{"_id":"doc-en-draft-ietf-ppm-dap-63f5e604d6f57b1d01b7448851767801f98cee90981622a22bfef9eb207423e1","title":"","text":"SetupBaseS() will be, as well as the aad for context.Seal(). The aad might be the entire \"transcript\" between the client and helper.] [OPEN ISSUE: Is it safe to generate the proof once, then secret-share between each (leader, helper) pair? Probably not in general, but maybe for Prio?] [OPEN ISSUE: allow server to send joint randomness in UploadStartResp, and then enforce uniqueness via double-spend state or something else (see issue#48).]"}
{"_id":"doc-en-draft-ietf-ppm-dap-bd288ed3229520b0fcfda987426cc830f22eced123c930f23936419e0bba9e56","title":"","text":"We sometimes refer to this message as the _report_. The message contains the \"task\" fields of the previous request. In addition, it includes the time (in seconds since the beginning of UNIX time) at which the report was generated, the helper's HPKE config id, endpoint URL, and the helper and leader shares. The helper share has the following structure: which the report was generated, the helper's HPKE config id, and the helper and leader shares. The helper share has the following structure: Field \"enc\" encodes the helper's encapsulated HPKE context. The remainder of the structure contains the share itself, the structure"}
{"_id":"doc-en-draft-ietf-ppm-dap-80d1a2f3ded427d30973f6f009d433fa9fd605f80dcca17fb2f05d841707faae","title":"","text":"3.4.2.1. The process begins with a PACollectReq. The leader collects a sequence of reports that are all associated with the same PA task, helper URL, and helper HPKE config id. Let \"[helper]\" denote \"PACollectReq.helper_url\". The leader sends a POST request to \"[helper]/aggregate\" with the following message: sequence of reports that are all associated with the same PA task. Let \"[helper]\" denote \"PAParam.helper_url\", where \"PAParam\" is the PA parameters structure associated \"PAAggregateReq.task.id\". The leader sends a POST request to \"[helper]/aggregate\" with the following message: The structure contains the PA task, the helper's HPKE config id, an opaque _helper state_ string, and a sequence of _sub-requests_, each"}
{"_id":"doc-en-draft-ietf-rats-reference-interaction-models-09258d8ec5ebc6f656334fa3f1859482ba0585c74c464733e101d5b39af6b762","title":"","text":"The term \"Remote Attestation\" is a common expression and often associated or connoted with certain properties. The term \"Remote\" in this context does not necessarily refer to a remote entity in the scope of network topologies or the Internet. It rather refers to a decoupled system or entities that exchange the payload of the scope of network topologies or the Internet. It rather refers to decoupled systems or entities that exchange the payload of the Conceptual Message type called Evidence I-D.ietf-rats-architecture. This conveyance can also be \"Local\", if the Verifier role is part of the same entity as the Attester role, e.g., separate system components of the same Composite Device (a single RATS entity). Examples of these types of co-located environments include: a Trusted Execution Environment (TEE), Baseboard Management Controllers (BMCs), as well as other physical or logical protected/isolated/shielded Computing Environments (e.g. embedded Secure Elements (eSE) or Trusted Platform Modules (TPM)). Readers of this document should be familiar with the concept of Layered Attestation as described in Section 4.3 Two Types of Environments of an Attester in I-D.ietf- rats-architecture and the definition of Attestation as described in I-D.ietf-rats-tpm-based-network-device-attest. components of the same Composite Device (a single RATS entity). Even if an entity takes on two or more different roles, the functions they provide typically reside in isolated environments that are components of the same entity. Examples of such isolated environments include: a Trusted Execution Environment (TEE), Baseboard Management Controllers (BMCs), as well as other physical or logical protected/isolated/shielded Computing Environments (e.g. embedded Secure Elements (eSE) or Trusted Platform Modules (TPM)). Readers of this document should be familiar with the concept of Layered Attestation as described in Section 4.3 Two Types of Environments of an Attester in I-D.ietf-rats-architecture and the definition of Attestation as described in I-D.ietf-rats-tpm-based-network-device- attest. 3."}
{"_id":"doc-en-draft-ietf-rats-reference-interaction-models-cb0e4c4d23b66f84e2d5cf662c01db92ef76d23f52edf1c457a613b57f732958","title":"","text":"_mandatory_ Reference Claims are components of Reference Values as defined in I-D.ietf-rats-architecture. [Editor's Note: Definition might become obsolete, if replaced by Reference Values. Is there a difference between Claims and Values here? Analogously, why is not named Reference Claims in the RATS arch?] Reference Claims are used to appraise the Claims received from an Attester. For example, Reference Claims MAY be Reference Reference Values as defined in I-D.ietf-rats-architecture. This specific type of Claims is used to appraise Claims incorporated in Evidence. For example, Reference Values MAY be Reference Integrity Measurements (RIM) or assertions that are implicitly trusted because they are signed by a trusted authority (see Endorsements in I-D.ietf-rats-architecture). Reference Claims Endorsements in I-D.ietf-rats-architecture). Reference Values typically represent (trusted) Claim sets about an Attester's intended platform operational state."}
{"_id":"doc-en-draft-ietf-rats-reference-interaction-models-dfff8a75560b13d080621c8437c38a9d298ee65b34473b71d5dc37eee4ed835f","title":"","text":"signature, the Attester Identity, and the Handle, and then appraises the Claims. Appraisal procedures are application-specific and can be conducted via comparison of the Claims with corresponding Reference Claims, such as Reference Integrity Measurements. The final output Values, such as Reference Integrity Measurements. The final output of the Verifier are Attestation Results. Attestation Results constitute new Claim Sets about the properties and characteristics of an Attester, which enables Relying Parties, for example, to assess an"}
{"_id":"doc-en-draft-ietf-sedate-datetime-extended-aa144415ddd4b13b504df9da1599c5056e674f5f18efac69d7d94d7cda4f5f44","title":"","text":"order to allow the inclusion of an optional suffix. The extended date/time format is described by the rule \"date-time- ext\". \"date-time\" is imported from RFC3339, \"ALPHA\" and \"DIGIT\" from RFC5234. ext\". \"date-time\" and \"time-numoffset\" are imported from RFC3339, \"ALPHA\" and \"DIGIT\" from RFC5234. Note that a \"time-zone\" is syntactically similar to a \"suffix-tag\", but does not include an equals sign. This special case is only"}
{"_id":"doc-en-draft-ietf-sedate-datetime-extended-a2fe01fdc7f5344999abb48d5134f576c1346714f332314e08138bf5ef7817a0","title":"","text":"Each distinct instant in time can be represented in a descriptive text format using a timestamp, and ISO8601 standardizes a widely- adopted timestamp format, which forms the basis of RFC3339. However, this format only allows timestamps to contain very little additional relevant information, which means that, beyond that, any contextual information related to a given timestamp needs to be either handled separately or attached to it in a non-standard manner. adopted timestamp format, which forms the basis of the Internet Date/ Time Format RFC3339. However, this format only allows timestamps to contain very little additional relevant information, which means that, beyond that, any contextual information related to a given timestamp needs to be either handled separately or attached to it in a non-standard manner. This is already a pressing issue for applications that handle each instant with an associated time zone name, to take into account"}
{"_id":"doc-en-draft-ietf-sedate-datetime-extended-1cf3e8414c183b08d168ae2093df9ea3b37209a96af605f683693394d3be83c5","title":"","text":"The format provides a generalized way to attach any additional information to the timestamp. We refer to this format as the Internet Extended Date/Time Format (IXDTF). This document does not address extensions to the format where the semantic result is no longer a fixed timestamp that is referenced to a (past or future) UTC time. For instance, it does not address:"}
{"_id":"doc-en-draft-ietf-sedate-datetime-extended-0243a18d3d2edacdf3a70175cdb9d554f6f53ef2519099d691e846faf5bc2029","title":"","text":"For the format defined here, suffix tags are always : They can be added or left out as desired by the generator of the string in Internet Date/Time Format. (An application might require the presence of specific suffix tags, though.) string in Internet Extended Date/Time Format (IXDTF). (An application might require the presence of specific suffix tags, though.) Without further indication, they are also : Even if included in the Internet Date/Time Format string, the recipient is free to ignore the suffix tag. Reasons might include that the recipient does not implement (or know about) the specific suffix key, or that it does recognize the key but cannot act on the value provided. : Even if included in the IXDTF string, the recipient is free to ignore the suffix tag. Reasons might include that the recipient does not implement (or know about) the specific suffix key, or that it does recognize the key but cannot act on the value provided. A suffix tag may also indicate that it is : The recipient is advised that it MUST not act on the Internet Date/ Time Format string unless it can process the suffix tag as specified. A critical suffix tag is indicated by following its opening bracket with an exclamation mark (see \"critical-flag\" in abnf). : The recipient is advised that it MUST not act on the Internet Extended Date/Time Format (IXDTF) string unless it can process the suffix tag as specified. A critical suffix tag is indicated by following its opening bracket with an exclamation mark (see \"critical-flag\" in abnf). Internet Date/Time Format strings such as: IXDTF strings such as: are internally inconsistent, as Europe/Paris does not use a time zone offset of 0 (which is indicated in the \"Z\", an abbreviation for"}
{"_id":"doc-en-draft-ietf-sedate-datetime-extended-4274e5b27b961ec1971eb8bb8964777b4cb50110560bb7fcd86cb4a43a0718d3","title":"","text":"However, all have an internal inconsistency or an unrecognized suffix key/ value, so a recipient MUST treat the Internet Date/Time Format string as erroneous. value, so a recipient MUST treat the IXDTF string as erroneous. Note that this does not mean that an application is disallowed to perform additional processing on elective suffix tags, e.g., asking"}
{"_id":"doc-en-draft-ietf-sedate-datetime-extended-e8ba666c349eaecc49f98850d714783e5b6f14ce1d41ad6aeb7c6536938ec307","title":"","text":"The following rules extend the ABNF syntax defined in RFC3339 in order to allow the inclusion of an optional suffix. The extended date/time format is described by the rule \"date-time- ext\". The Internet Extended Date/Time Format (IXDTF) is described by the rule \"date-time-ext\". \"date-time\" and \"time-numoffset\" are imported from RFC3339, \"ALPHA\" and \"DIGIT\" from RFC5234."}
{"_id":"doc-en-draft-ietf-sedate-datetime-extended-1187d412c076553665540f0ea7abd167817c07154a55993a24f8458f046a150c","title":"","text":"3.2. Here are some examples of Internet extended date/time format. Here are some examples of Internet Extended Date/Time Format (IXDTF). rfc3339-datetime represents 39 minutes and 57 seconds after the 16th hour of December 19th, 1996 with an offset of -08:00 from UTC. Note"}
{"_id":"doc-en-draft-ietf-taps-transport-security-ff8ad1ec6e9d3304d81f82b5b60d15f7be180e4a7312a1facd60b1accd1e518b","title":"","text":"5.1. Configuration interfaces are used to configure the security protocols before a handshake begins or the keys are negotiated. before a handshake begins or keys are negotiated. Identities and Private Keys (IPK): The application can provide its identity, credentials (e.g., certificates), and private keys, or"}
{"_id":"doc-en-draft-ietf-taps-transport-security-d584a60f59cb4b2ab498f18e0662fa0f94ff19e9e57dda416ae212ba6923f299","title":"","text":"Identity Validation (IV): During a handshake, the security protocol will conduct identity validation of the peer. This can call into the application to offload validation. offload validation or occur transparently to the application. TLS"}
{"_id":"doc-en-draft-ietf-taps-transport-security-a8f5489d278303c4dde1ff4a19ae8ed3e9520741e5a9e3b5c8c5893ee07bde9a","title":"","text":"Source Address Validation (SAV): The handshake protocol may interact with the transport protocol or application to validate the address of the remote peer that has sent data. This involves sending a cookie exchange to avoid DoS attacks. sending a cookie exchange to avoid DoS attacks. (This list omits protocols which depend on TCP and therefore implicitly perform SAV.) DTLS"}
{"_id":"doc-en-draft-ietf-taps-transport-security-e221e2d78dab69d8b46f57cc3b47308e388790fa1c930bffc4ee405f6fd38c5c","title":"","text":"5.2. Cryptographic algorithm negotiation: Transport security protocols should permit applications to configure supported or enabled cryptographic algorithms. Cryptographic algorithm negotiation (AN): Transport security protocols should permit applications to configure supported or enabled cryptographic algorithms. Transport dependency: None. Application dependency: Application awareness of supported or desired algorithms. Application authentication delegation: Some protocols may Application authentication delegation (AD): Some protocols may completely defer endpoint authentication to applications, e.g., to reduce online protocol complexity."}
{"_id":"doc-en-draft-ietf-taps-transport-security-0fd6e272cdae2409a9a21a2e7e103db43802f5457d98894de6716be70a071eac","title":"","text":"Application dependency: Application opt-in and policy for endpoint authentication Mutual authentication: Transport security protocols should allow each endpoint to authenticate the other if required by the Mutual authentication (MA): Transport security protocols should allow each endpoint to authenticate the other if required by the application. Transport dependency: None."}
{"_id":"doc-en-draft-ietf-taps-transport-security-96913cb8d8a0a910960791bc0f955d744b3eaaca09d7c2876edfe2a161ece0fb","title":"","text":"Application dependency: Mutual authentication required for application support. DoS mitigation: Transport security protocols may need to support volumetric DoS prevention via, e.g., cookies or initiator-side puzzles. DoS mitigation (DM): Transport security protocols may need to support volumetric DoS prevention via, e.g., cookies or initiator- side puzzles. Transport dependency: None. Application dependency: None. Connection mobility: Sessions should not be bound to a network connection (or 5-tuple). This allows cryptographic key material and other state information to be reused in the event of a connection change. Examples of this include a NAT rebinding that occurs without a client's knowledge. Connection mobility (CM): Sessions should not be bound to a network connection (or 5-tuple). This allows cryptographic key material and other state information to be reused in the event of a connection change. Examples of this include a NAT rebinding that occurs without a client's knowledge. Transport dependency: Connections are unreliable or can change due to unpredictable network events, e.g., NAT re-bindings. Application dependency: None. Source validation: Source validation must be provided to mitigate server-targeted DoS attacks. This can be done with puzzles or cookies. Source validation (SV): Source validation must be provided to mitigate server-targeted DoS attacks. This can be done with puzzles or cookies. Transport dependency: Packets may arrive as datagrams instead of streams from unauthenticated sources. Application dependency: None. Application-layer feature negotiation: The type of application using a transport security protocol often requires features configured at the connection establishment layer, e.g., ALPN RFC7301. Moreover, application-layer features may often be used to offload the session to another server which can better handle the request. (The TLS SNI is one example of such a feature.) As such, transport security protocols should provide a generic mechanism to allow for such application-specific features and options to be configured or otherwise negotiated. Application-layer feature negotiation (AFN): The type of application using a transport security protocol often requires features configured at the connection establishment layer, e.g., ALPN RFC7301. Moreover, application-layer features may often be used to offload the session to another server which can better handle the request. (The TLS SNI is one example of such a feature.) As such, transport security protocols should provide a generic mechanism to allow for such application-specific features and options to be configured or otherwise negotiated. Transport dependency: None. Application dependency: Specification of application-layer features or functionality. Configuration extensions: The protocol negotiation should be Configuration extensions (CX): The protocol negotiation should be extensible with addition of new configuration options. Transport dependency: None."}
{"_id":"doc-en-draft-ietf-taps-transport-security-28bfeda4537613be6fff861551347e3970f30af1d729444d475dce1fdf61c46b","title":"","text":"Application dependency: Specification of application-specific extensions. Session caching (and management): Sessions should be cacheable to enable reuse and amortize the cost of performing session Session caching and management (SC): Sessions should be cacheable to enable reuse and amortize the cost of performing session establishment handshakes. Transport dependency: None. Application dependency: None. Length-hiding padding: Applications may wish to defer traffic padding to the security protocol to deter traffic analysis Length-hiding padding (LHP): Applications may wish to defer traffic padding to the security protocol to deter traffic analysis attacks. Transport dependency: None. Application dependency: Knowledge of desired padding policies. 5.3. The following table lists the availability of the above-listed optional features in each of the analyzed protocols. \"Mandatory\" indicates that the feature is intrinsic to the protocol and cannot be disabled. \"Supported\" indicates that the feature is optionally provided natively or through a (standardized, where applicable) extension. M=Mandatory S=Supported but not required U=Unsupported *=On TCP; MPTCP would provide this ability **=TCP provides SYN cookies natively, but these are not cryptographically strong +=For transport packets only 6. This section describes the interface surface exposed by the security"}
{"_id":"doc-en-draft-ietf-tls-ctls-5165c5c535cdccd341100c69878ef3c70c9bfb00ccd98d01421ec3f81799277b","title":"","text":"4.2.2. [[TODO]] [[OPEN ISSUE: Limiting this to one value would potentially save some bytes here, at the cost of generality.]] 4.3."}
{"_id":"doc-en-draft-ietf-tls-esni-985865443bdda06149620e39f11aa3140831d0be25446a057e0d6fe8de241fdd","title":"","text":"7.2. ESNI requires encrypted DNS to be an effective privacy protection mechanism. However, verifying the server's identity from the Certificate message, particularly when using the X509 CertificateType, may result in additional network traffic that may reveal the server identity. Examples of this traffic may include requests for revocation information, such as OCSP or CRL traffic, or requests for repository information, such as authorityInformationAccess. It may also include implementation- specific traffic for additional information sources as part of verification. Implementations SHOULD avoid leaking information that may identify the server. Even when sent over an encrypted transport, such requests may result in indirect exposure of the server's identity, such as indicating a specific CA or service being used. To mitigate this risk, servers SHOULD deliver such information in-band when possible, such as through the use of OCSP stapling, and clients SHOULD take steps to minimize or protect such requests during certificate validation. 7.3. I-D.ietf-tls-sni-encryption lists several requirements for SNI encryption. In this section, we re-iterate these requirements and assess the ESNI design against them. 7.2.1. 7.3.1. Since the SNI encryption key is derived from a (EC)DH operation between the client's ephemeral and server's semi-static ESNI key, the"}
{"_id":"doc-en-draft-ietf-tls-esni-cc8ca0407ea784fad8eca1f5cb7a6652b66cc0fb92dd1640535935e4c3207f44","title":"","text":"Hello, with a different ephemeral key share, as the terminating server will fail to decrypt and verify the ESNI value. 7.2.2. 7.3.2. This design depends upon DNS as a vehicle for semi-static public key distribution. Server operators may partition their private keys"}
{"_id":"doc-en-draft-ietf-tls-esni-f79c33719cbb0c9af2ccb95ddf102b48b81f87c5fdb1759f98b156cffdac91da","title":"","text":"by sending different Resource Records containing ESNIRecord and ESNIKeys values with different keys using a short TTL. 7.2.3. 7.3.3. This design requires servers to decrypt ClientHello messages with ClientEncryptedSNI extensions carrying valid digests. Thus, it is"}
{"_id":"doc-en-draft-ietf-tls-esni-87db6dfba1f2606c23dfc2eb499c1a96c790fece8ceabb15b7c153af597316a0","title":"","text":"server. This attack is bound by the number of valid TCP connections an attacker can open. 7.2.4. 7.3.4. As more clients enable ESNI support, e.g., as normal part of Web browser functionality, with keys supplied by shared hosting"}
{"_id":"doc-en-draft-ietf-tls-esni-5c65ec1ccfa21d0851453bbe89c8ebfb03cc0afa8ee8c4049210cdc3e979ebf5","title":"","text":"ESNI extensions (see grease-extensions), which helps ensure the ecosystem handles the values correctly. 7.2.5. 7.3.5. This design is not forward secret because the server's ESNI key is static. However, the window of exposure is bound by the key lifetime. It is RECOMMENDED that servers rotate keys frequently. 7.2.6. 7.3.6. This design permits servers operating in Split Mode to forward connections directly to backend origin servers, thereby avoiding unnecessary MiTM attacks. 7.2.7. 7.3.7. Assuming ESNI records retrieved from DNS are validated, e.g., via DNSSEC or fetched from a trusted Recursive Resolver, spoofing a"}
{"_id":"doc-en-draft-ietf-tls-esni-9d769baf7c194d57b76f3f86caa7a54f2fb5391a9605017c7fbc70a9b1ca4339","title":"","text":"client validates the server certificate against the public name before retrying. 7.2.8. 7.3.8. This design has no impact on application layer protocol negotiation. It may affect connection routing, server certificate selection, and client certificate verification. Thus, it is compatible with multiple protocols. 7.3. 7.4. Note that the backend server has no way of knowing what the SNI was, but that does not lead to additional privacy exposure because the"}
{"_id":"doc-en-draft-ietf-tls-esni-218c56887b545bf27d9e185fe5320d4ab745fface2df3faf9b9fe2c4ab7a9f7e","title":"","text":"nonce re-use since the client's ESNI key share, and thus the value of Zx, does not change across ClientHello retries.) Note that ESNIContents will not be directly transmitted to the server in the ClientHello. The server will instead reconstruct the same object by obtaining its values from ClientEncryptedSNI and ClientHello. [[TODO: label swapping fixes a bug in the spec, though this may not be the best way to deal with HRR. See https://github.com/tlswg/ draft-ietf-tls-esni/issues/121 and https://github.com/tlswg/draft- ietf-tls-esni/pull/170 for more details.]] Same value as ClientEncryptedSNI.record_digest. Same value as ClientEncryptedSNI.key_share. Same nonce as ClientHello.random. The client then creates a ClientESNIInner structure: A random 16-octet value to be echoed by the server in the"}
{"_id":"doc-en-draft-ietf-tls-esni-3b680c3dbe7291917aa446c1cd057acd2145cef790758b5311f321b608bd5c0d","title":"","text":"receipt of a second ClientHello message with a ClientECH value, servers set up their HPKE context and decrypt ClientECH as follows: It is an error for the client to offer ECH before the HelloRetryRequest but not after. Likewise, it is an error for the client to offer ECH after the HelloRetryRequest but not before. If the client-facing server accepts ECH for the first ClientHello but not the second, or it accepts ECH for the second ClientHello but not the first, then the client MUST abort the handshake with an \"illegal_parameter\" alert. If the client offered ECH in the first ClientHello, then it MUST offer ECH in the second. Likewise, if the client did not offer ECH in the first ClientHello, then it MUST NOT not offer ECH in the second. [[OPEN ISSUE: Should we be using the PSK input or the info input? On the one hand, the requirements on info seem weaker, but maybe"}
{"_id":"doc-en-draft-ietf-tls-esni-111fd331ac6a6b716886bff0e0572b7aef9389192d6d72a47f087b12106f2148","title":"","text":"negotiating ECH, including servers which do not implement this specification. 7.1.1. It is an error for the client to offer ECH before the HelloRetryRequest but not after. Likewise, it is an error for the client to offer ECH after the HelloRetryRequest but not before. If either of these conditions occurs, then the client-facing server MUST abort the handshake with an \"illegal_parameter\" alert. 7.2. When the client-facing server accepts ECH, it forwards the"}
{"_id":"doc-en-draft-ietf-tls-esni-4a5108b01df8b95621ec20d0e247c067ad3e4607ab636348830eb9ada526609c","title":"","text":"If the server sends an \"encrypted_client_hello\" extension, the client MUST check the extension syntactically and abort the connection with a \"decode_error\" alert if it is invalid. a \"decode_error\" alert if it is invalid. It otherwise ignores the extension and MUST NOT use the retry keys. Offering a GREASE extension is not considered offering an encrypted ClientHello for purposes of requirements in client-behavior. In"}
{"_id":"doc-en-draft-ietf-tls-esni-b4cd8d854989b0ef3268245760730e252d23457b22fa7057aa51c3b5cec8c5fa","title":"","text":"10.8.6. This design permits servers operating in Split Mode to forward connections directly to backend origin servers, thereby avoiding unnecessary MiTM attacks. connections directly to backend origin servers. The client authenticates the identity of the backend origin server, thereby avoiding unnecessary MiTM attacks. 10.8.7. Assuming ECH records retrieved from DNS are authenticated, e.g., via DNSSEC or fetched from a trusted Recursive Resolver, spoofing a server operating in Split Mode is not possible. See plaintext-dns for more details regarding plaintext DNS. Conversely, assuming ECH records retrieved from DNS are authenticated, e.g., via DNSSEC or fetched from a trusted Recursive Resolver, spoofing a client-facing server operating in Split Mode is not possible. See plaintext-dns for more details regarding plaintext DNS. Authenticating the ECHConfigs structure naturally authenticates the included public name. This also authenticates any retry signals from the server because the client validates the server certificate against the public name before retrying. the client-facing server because the client validates the server certificate against the public name before retrying. 10.8.8. 10.8.7. This design has no impact on application layer protocol negotiation. It may affect connection routing, server certificate selection, and client certificate verification. Thus, it is compatible with multiple protocols. multiple application and transport protocols. By encrypting the entire ClientHello, this design additionally supports encrypting the ALPN extension. 10.9."}
{"_id":"doc-en-draft-ietf-tls-esni-4416c6e8b48a74079461ca22094271725eb40d443ad54f806598f567969070b6","title":"","text":"\"encrypted_client_hello\" extension and proceeds with the handshake as usual, per RFC8446, Section 4.1.2. If it supports ECH but does not recognize the configuration specified by the client, then it ignores the extension and If it supports ECH but cannot decrypt the extension, then it terminates the handshake using the ClientHelloOuter. This is referred to as \"ECH rejection\". When ECH is rejected, the server sends an acceptable ECH configuration in its EncryptedExtensions message. If it supports ECH and recognizes the configuration, then it attempts to decrypt the ClientHelloInner. It aborts the handshake if decryption fails; otherwise it forwards the ClientHelloInner to the backend, who terminates the connection. This is referred to as \"ECH acceptance\". If it supports ECH and decrypts the extension, it forwards the ClientHelloInner to the backend, who terminates the connection. This is referred to as \"ECH acceptance\". Upon receiving the server's response, the client determines whether or not ECH was accepted and proceeds with the handshake accordingly."}
{"_id":"doc-en-draft-ietf-tls-esni-73b51beae371d8e3675e471ea4de66349871b2bdf34228ad6594883b1f2bbdc8","title":"","text":"\"ECHConfig.cipher_suites\" list. The configuration identifier, equal to \"Expand(Extract(\"\", config), \"tls13 ech config id\", Nh)\", where \"config\" is the config), \"tls ech config id\", Nh)\", where \"config\" is the \"ECHConfig\" structure and \"Extract\", \"Expand\", and \"Nh\" are as specified by the cipher suite KDF. (Passing the literal \"\"\"\" as the salt is interpreted by \"Extract\" as no salt being provided.)"}
{"_id":"doc-en-draft-ietf-tls-esni-3816583b3d13409d8acfe8caff5d6c3e67e1ebf2417a6e020ed7000e5dfc28e1","title":"","text":"Note that the HPKE functions Deserialize and SetupBaseS are those which match \"ECHConfig.kem_id\" and the AEAD/KDF used with \"context\" are those which match the client's chosen preference from \"ECHConfig.cipher_suites\". \"ECHConfig.cipher_suites\". The \"info\" parameter to SetupBaseS is the concatenation of \"tls ech\", a zero byte, and the serialized ECHConfig. The value of the \"encrypted_client_hello\" extension in the ClientHelloOuter is a \"ClientECH\" with the following values:"}
{"_id":"doc-en-draft-ietf-tls-esni-2f72c8187c992397ce54244d26a9f75f4c4ab0611b4ca25908de0c73331f23b5","title":"","text":"\"payload\", as computed above. If optional configuration identifiers (see optional-configs)) are used, the \"config_id\" field MAY be empty or randomly generated. Unless specified by the application using (D)TLS or externally configured on both sides, implementations MUST compute the field as specified in encrypted-client-hello. 6.2. This section describes a deterministic padding mechanism based on the"}
{"_id":"doc-en-draft-ietf-tls-esni-c711f611f6d48c9eeb995bf33492b83f10753d551a0c08f7b9ffc26528a2421e","title":"","text":"of the first ClientHelloInner via the derived ech_hrr_key by modifying HPKE setup as follows: Clients then encrypt the second ClientHelloInner using this new HPKE context. In doing so, the encrypted value is also authenticated by ech_hrr_key. The rationale for this is described in flow-hrr-hijack. The \"info\" parameter to SetupPSKS is the concatenation of \"tls ech\", a zero byte, and the serialized ECHConfig. Clients then encrypt the second ClientHelloInner using this new HPKE context. In doing so, the encrypted value is also authenticated by ech_hrr_key. The rationale for this is described in flow-hrr-hijack. Client-facing servers perform the corresponding process when decrypting second ClientHelloInner messages. In particular, upon"}
{"_id":"doc-en-draft-ietf-tls-esni-ee9e5b544127d91e5fa56850ada8ea86d4df48cd8bf4e9fedcf2b4f2c3f86b45","title":"","text":"servers set up their HPKE context and decrypt ClientECH as follows: ClientHelloOuterAAD is computed from the second ClientHelloOuter as described in authenticating-outer. described in authenticating-outer. The \"info\" parameter to SetupPSKR is computed as above. If the client offered ECH in the first ClientHello, then it MUST offer ECH in the second. Likewise, if the client did not offer ECH"}
{"_id":"doc-en-draft-ietf-tls-esni-a0114017f8b71f1e59b0c8042df045efbc41b9399c90055d581acf33f0449a4a","title":"","text":"extension will result in a new ClientHello to process, so even the client's TLS version preferences may have changed. The ClientECH value is said to match a known ECHConfig if there exists an ECHConfig that can be used to successfully decrypt ClientECH.payload. This matching procedure should be done using one of the following two checks: First, the server collects a set of candidate ECHConfigs. This set is determined by one of the two following methods: Compare ClientECH.config_id against identifiers of known ECHConfig and choose the one that matches. Compare ClientECH.config_id against identifiers of known ECHConfigs and select the one that matches, if any, as a candidate. Use trial decryption of ClientECH.payload with known ECHConfig and choose the one that succeeds. Collect all known ECHConfigs as candidates, with trial decryption below determining the final selection. Some uses of ECH, such as local discovery mode, may omit the ClientECH.config_id since it can be used as a tracking vector. In such cases, trial decryption should be used for matching ClientECH to known ECHConfig. Unless specified by the application using (D)TLS or externally configured on both sides, implementations MUST use the first method. If the ClientECH value does not match any known ECHConfig structure, it MUST ignore the extension and proceed with the connection, with the following added behavior: It MUST include the \"encrypted_client_hello\" extension in its EncryptedExtensions with the \"retry_configs\" field set to one or more ECHConfig structures with up-to-date keys. Servers MAY supply multiple ECHConfig values of different versions. This allows a server to support multiple versions at once. If offered, the server MUST ignore the \"pre_shared_key\" extension in the ClientHello. Note that an unrecognized ClientECH.config_id value may be a GREASE ECH extension (see grease-extensions), so it is necessary for servers to proceed with the connection and rely on the client to abort if ECH was required. In particular, the unrecognized value alone does not indicate a misconfigured ECH advertisement (misconfiguration). Instead, servers can measure occurrences of the \"ech_required\" alert to detect this case. such cases, the second method should be used for matching ClientECH to known ECHConfig. See optional-configs. Unless specified by the application using (D)TLS or externally configured on both sides, implementations MUST use the first method. The server then iterates over all candidate ECHConfigs, attempting to decrypt the \"encrypted_client_hello\" extension: Once a suitable ECHConfig is found, the server verifies that the ECHConfig supports the cipher suite indicated by ClientECH.cipher_suite and that the version of ECH indicated by the client matches the ECHConfig.version. If not, then the server MUST abort with an \"illegal_parameter\" alert. Otherwise, the server decrypts ClientECH.payload, using the private key skR corresponding to ECHConfig, as follows: The server verifies that the ECHConfig supports the cipher suite indicated by the ClientECH.cipher_suite and that the version of ECH indicated by the client matches the ECHConfig.version. If not, the server continues to the next candidate ECHConfig. Next, the server decrypts ClientECH.payload, using the private key skR corresponding to ECHConfig, as follows: ClientHelloOuterAAD is computed from ClientHelloOuter as described in authenticating-outer. If decryption fails, the server MUST abort the connection with a \"decrypt_error\" alert. Otherwise, the server reconstructs ClientHelloInner from EncodedClientHelloInner, as described in encoding-inner. authenticating-outer. The \"info\" parameter to SetupBaseS is the concatenation \"tls ech\", a zero byte, and the serialized ECHConfig. If decryption fails, the server continues to the next candidate ECHConfig. Otherwise, the server reconstructs ClientHelloInner from EncodedClientHelloInner, as described in encoding-inner. It then stops consider candidate ECHConfigs. Upon determining the ClientHelloInner, the client-facing server then forwards the ClientHelloInner to the appropriate backend server,"}
{"_id":"doc-en-draft-ietf-tls-esni-b17855a5e0adaf91c4c63842500d5ef4b3333c1d420f0a0acba5d31135ce8311","title":"","text":"ClientHelloInner. The client-facing server forwards all other TLS messages between the client and backend server unmodified. Otherwise, if all candidate ECHConfigs fail to decrypt the extension, the client-facing server MUST ignore the extension and proceed with the connection using ClientHelloOuter. This connection proceeds as usual, except the server MUST include the \"encrypted_client_hello\" extension in its EncryptedExtensions with the \"retry_configs\" field set to one or more ECHConfig structures with up-to-date keys. Servers MAY supply multiple ECHConfig values of different versions. This allows a server to support multiple versions at once. Note that decryption failure could indicate a GREASE ECH extension (see grease-extensions), so it is necessary for servers to proceed with the connection and rely on the client to abort if ECH was required. In particular, the unrecognized value alone does not indicate a misconfigured ECH advertisement (misconfiguration). Instead, servers can measure occurrences of the \"ech_required\" alert to detect this case. 7.1.1. In case a HelloRetryRequest (HRR) is sent, the client-facing server"}
{"_id":"doc-en-draft-ietf-tls-esni-1f068bbdab18329c94059ab59375cd6e0fb4c79d722e0a53d3b416e21afbd248","title":"","text":"extension but CH1 does not, then the server MUST abort the handshake with an \"illegal_parameter\" alert. Suppose the \"encrypted_client_hello\" extension is sent in both CH1 and CH2, If the configuration identifier (see ech-configuration) differs between CH1 and CH2, then the server MUST abort with an \"illegal_parameter\" alert. If the \"encrypted_client_hello\" extension is sent in CH2, the server follows the procedure in client-facing-server to decrypt the extension, but it uses the previously-selected ECHConfig as the set of candidate ECHConfigs. If decryption fails, the server aborts the connection with a \"decrypt_error\" alert rather than continuing the handshake with the second ClientHelloOuter. [[OPEN ISSUE: If the client-facing server implements stateless HRR, it has no way to send a cookie, short of as-yet-unspecified"}
{"_id":"doc-en-draft-ietf-tls-esni-e849e438d2bb8adead35515ef3726300714d56c8331946cb02b54697dda5a70b","title":"","text":"The non-empty name of the client-facing server, i.e., the entity trusted to update the ECH configuration. This is used to correct misconfigured clients, as described in handle-server-response. This value MUST NOT begin or end with an ASCII dot and MUST be parsable as a dot-separated sequence of LDH labels, as defined in RFC5890, Section 2.3.1. Clients MUST ignore any \"ECHConfig\" structure whose \"public_name\" does not meet these criteria. Note that these criteria are incomplete; they incidentally rule out textual representations of IPv6 addresses (see RFC3986, Section 3.2.2), but do not exclude IPv4 addresses in standard dotted-decimal or other non-standard notations such as octal and hexadecimal (see RFC3986, Section 7.4). If \"public_name\" contains a literal IPv4 or IPv6 address, the client SHOULD ignore the \"ECHConfig\" to avoid sending a non-compliant \"server_name\" extension on the ClientHelloOuter (see RFC6066, Section 3). A list of extensions that the client must take into consideration when generating a ClientHello message. These are described below"}
{"_id":"doc-en-draft-ietf-tls-esni-75b4bfceb1b0f57726b08c2da304acc534ba9fadf0566a7ec1e98b4e2406f5b6","title":"","text":"\"psk_key_exchange_modes\" from the ClientHelloInner into the ClientHelloOuter. When the client offers the \"early_data\" extension in ClientHelloInner, it MUST also include the \"early_data\" extension in ClientHelloOuter. This allows servers that reject ECH and use ClientHelloOuter to safely ignore any early data sent by the client per RFC8446, Section 4.2.10. [[OPEN ISSUE: We currently require HRR-sensitive parameters to match in ClientHelloInner and ClientHelloOuter in order to simplify client- side logic in the event of HRR. See https://github.com/tlswg/draft-"}
{"_id":"doc-en-draft-ietf-tls-esni-94d2c825c622d5084ec3d57b6b0420489917f7b0765d4ffb455f7245b5f4b8db","title":"","text":"ClientHelloInner. The list of HPKE KDF and AEAD identifier pairs clients can use for encrypting ClientHelloInner. encrypting ClientHelloInner. See real-ech for how clients choose from this list. The client-facing server advertises a sequence of ECH configurations to clients, serialized as follows."}
{"_id":"doc-en-draft-ietf-tls-md5-sha1-deprecate-103496426c6f04fc2bc9db8f28c7756490a01e910d9f276ed61b8f5980306cf0","title":"","text":"Deprecating MD5 and SHA-1 signature hashes in TLS 1.2 draft-ietf-tls-md5-sha1-deprecate-04 draft-ietf-tls-md5-sha1-deprecate-05 Abstract The MD5 and SHA-1 hashing algorithms are steadily weakening in strength and their deprecation process should begin for their use in TLS 1.2 digital signatures. However, this document does not deprecate SHA-1 in HMAC for record protection. This document updates RFC 5246 and RFC 7525. The MD5 and SHA-1 hashing algorithms are increasingly vulnerable to attack and this document deprecates their use in TLS 1.2 digital signatures. However, this document does not deprecate SHA-1 in HMAC for record protection. This document updates RFC 5246 and RFC 7525. 1."}
{"_id":"doc-en-draft-ietf-tls-md5-sha1-deprecate-2f346881ace6124cddfb03c07bfa95949c68cbec8a2b3d88512f7f07809e4b72","title":"","text":"recommendation to use stronger language deprecating use of both SHA-1 and MD5. The prior text did not explicitly include MD5 or SHA-1; and this text adds guidance to ensure that these algorithms have been deprecated.. deprecated. Section 4.3:"}
{"_id":"doc-en-draft-ietf-tls-md5-sha1-deprecate-0088217a77aa131d3200781cd200834c36d0a0bf3d501d03b210cc70bfa4138a","title":"","text":"recommended) as defined by RFC8447. The following entries are to be updated: Other entries of the resgistry remain the same. Other entries of the registry remain the same. 9. Concerns with TLS 1.2 implementations falling back to SHA-1 is an issue. This draft updates the TLS 1.2 specification to deprecate issue. This document updates the TLS 1.2 specification to deprecate support for MD5 and SHA-1 for digital signatures. However, this document does not deprecate SHA-1 in HMAC for record protection."}
{"_id":"doc-en-draft-ietf-tls-md5-sha1-deprecate-bf9c75c2b956ba7d11e87ce2b8d649740d7eda66eb99fa4d9626014c771ead8e","title":"","text":"2. Clients MUST NOT include MD5 and SHA-1 in the signature_algorithms extension. If a client does not send a signature_algorithms extension, then the server MUST abort the handshake and send a handshake_failure alert, except when digital signatures are not used (for example, when using PSK ciphers). Clients MUST include the signature_algorithms extension. Clients MUST NOT include MD5 and SHA-1 in this extension. 3."}
{"_id":"doc-en-draft-ietf-tls-md5-sha1-deprecate-f5025aa88c7447e450f5243aa91b55cf3be5fd8f555b633a7e46b2c63769bb72","title":"","text":"4. Servers MUST NOT include MD5 and SHA-1 in ServerKeyExchange messages. If a client receives a MD5 or SHA-1 signature in a ServerKeyExchange message it MUST abort the connection with the illegal_parameter alert. If no other signature algorithms are available (for example, if the client does not send a signature_algorithms extension), the server MUST abort the handshake with a handshake_failure alert or select a different cipher suite. 5."}
{"_id":"doc-en-draft-ietf-tls-md5-sha1-deprecate-6b49e348e181a9544a9cce1bbc1a5692652d37fd997d1a9bc42273088aefbb88","title":"","text":"6. RFC5246, The Transport Layer Security (TLS) Protocol Version 1.2, suggests that implementations can assume support for MD5 and SHA-1 by their peer. This update changes the suggestion to assume support for SHA-256 instead, due to MD5 and SHA-1 being deprecated. In Section 7.4.1.4.1: the text should be revised from: OLD: \"Note: this is a change from TLS 1.1 where there are no explicit rules, but as a practical matter one can assume that the peer supports MD5 and SHA- 1.\" NEW: \"Note: This is a change from TLS 1.1 where there are no explicit rules, but as a practical matter one can assume that the peer supports SHA-256.\" 7. The document updates the \"TLS SignatureScheme\" registry to change the recommended status of SHA-1 based signature schemes to N (not recommended) as defined by RFC8447. The following entries are to be"}
{"_id":"doc-en-draft-ietf-tls-md5-sha1-deprecate-d968866b0bfbe10472e943857fbeef1b16d5f4ae5633443640a60d5dd5caf4fc","title":"","text":"[RFC5246][RFC8447][RFC-to-be] 8. 7. Concerns with TLS 1.2 implementations falling back to SHA-1 is an issue. This document updates the TLS 1.2 specification to deprecate support for MD5 and SHA-1 for digital signatures. However, this document does not deprecate SHA-1 in HMAC for record protection. 9. 8. The authors would like to thank Hubert Kario for his help in writing the initial draft. We are also grateful to Daniel Migault, Martin"}
{"_id":"doc-en-draft-ietf-tls-md5-sha1-deprecate-cbe8d9ada9b13d4d756117590cb8091dfb21fa6ef5901d3de0e95c8e204ed590","title":"","text":"The MD5 and SHA-1 hashing algorithms are steadily weakening in strength and their deprecation process should begin for their use in TLS 1.2 digital signatures. However, this document does not deprecate SHA-1 in HMAC for record protection. deprecate SHA-1 in HMAC for record protection. This document updates RFC 5246 and RFC 7525. 1. The usage of MD5 and SHA-1 for signature hashing in TLS 1.2 is specified in RFC5246. MD5 and SHA-1 have been proven to be insecure, subject to collision attacks. RFC6151 details the security considerations, including collision attacks for MD5, published in 2011. NIST formally deprecated use of SHA-1 in 2011 NISTSP800-131A-R2 and disallowed its use for digital signatures at the end of 2013, based on both the Wang, et. al, attack and the potential for brute-force attack. In 2016, researchers from INRIA identified a new class of transcript collision attacks on TLS (and other protocols) that rely on efficient collision-finding algorithms on the underlying hash constructions Transcript-Collision. Further, in 2017, researchers from Google and CWI Amsterdam SHA-1-Collision proved SHA-1 collision attacks were practical. This document updates RFC5246 and RFC7525 in such a way that MD5 and SHA-1 MUST NOT be used for digital signatures. However, this document does not deprecate SHA-1 in HMAC for record protection. subject to collision attacks Wang. In 2011, RFC6151 detailed the security considerations, including collision attacks for MD5. NIST formally deprecated use of SHA-1 in 2011 NISTSP800-131A-R2 and disallowed its use for digital signatures at the end of 2013, based on both the Wang, et. al, attack and the potential for brute-force attack. In 2016, researchers from INRIA identified a new class of transcript collision attacks on TLS (and other protocols) that rely on efficient collision-finding algorithms on the underlying hash constructions Transcript-Collision. Further, in 2017, researchers from Google and CWI Amsterdam SHA-1-Collision proved SHA-1 collision attacks were practical. This document updates RFC5246 and RFC7525 in such a way that MD5 and SHA-1 MUST NOT be used for digital signatures. However, this document does not deprecate SHA-1 in HMAC for record protection. 1.1. The key words \"MUST\", \"MUST NOT\", \"REQUIRED\", \"SHALL\", \"SHALL NOT\", \"SHOULD\", \"SHOULD NOT\", \"RECOMMENDED\", \"MAY\", and \"OPTIONAL\" in this document are to be interpreted as described in RFC2119. \"SHOULD\", \"SHOULD NOT\", \"RECOMMENDED\", \"NOT RECOMMENDED\", \"MAY\", and \"OPTIONAL\" in this document are to be interpreted as described in BCP 14 RFC2119 RFC8174 when, and only when, they appear in all capitals, as shown here. 2."}
{"_id":"doc-en-draft-ietf-tls-md5-sha1-deprecate-9a6ba92ae62e4797ec848cbfe44cbcdd017b35e6f3615b04df26bc736bc20176","title":"","text":"their peer. This update changes the suggestion to assume support for SHA-256 instead, due to MD5 and SHA-1 being deprecated. In Section 7.4.1.4.1: the text should be revised from: OLD: In Section 7.4.1.4.1: the text should be revised from \" Note: this is a change from TLS 1.1 where there are no explicit rules, but as a practical matter one can assume that the peer supports MD5 and SHA- 1.\" \"Note: this is a change from TLS 1.1 where there are no explicit rules, but as a practical matter one can assume that the peer supports MD5 and SHA- 1.\" NEW:"}
{"_id":"doc-en-draft-ietf-tls-md5-sha1-deprecate-87518e26d7a34e2170b0cc84b75cd4cf3b5f6c26fa48c19eefcb9378c962a774","title":"","text":"(TLS) and Datagram Transport Layer Security (DTLS) recommends use of SHA-256 as a minimum requirement. This update moves the minimum recommendation to use stronger language deprecating use of both SHA-1 and MD5. The prior text did not explicitly include MD5 and this text adds it to ensure it is understood as having been deprecated. and MD5. The prior text did not explicitly include MD5 or SHA-1; and this text adds guidance to ensure that these algorithms have been deprecated.. Section 4.3:"}
{"_id":"doc-en-draft-ietf-tls-md5-sha1-deprecate-55b05e4b5dc30d2e43e2db63134654696b8436ac77cf4ea6148fb91212450d07","title":"","text":"Servers SHOULD authenticate using certificates with at least a 2048-bit modulus for the public key. In addition, the use of the SHA-256 hash algorithm is RECOMMENDED, SHA-1 or MD5 MUST NOT be used (see CAB-Baseline for more details). Clients MUST indicate to servers that they request SHA-256, by using the \"Signature Algorithms\" extension defined in TLS 1.2. In addition, the use of the SHA-256 hash algorithm is RECOMMENDED; and SHA-1 or MD5 MUST NOT be used (see CAB-Baseline for more details). Clients MUST indicate to servers that they request SHA- 256, by using the \"Signature Algorithms\" extension defined in TLS 1.2. 8."}
{"_id":"doc-en-draft-ietf-tls-ticketrequest-0c8156c5cf1769c1d2b51910eaaaf8e2fbab03000e3a2929f05881418cb53f1e","title":"","text":"will typically be the minimum of the server's self-imposed limit and TicketRequestContents.count. Servers that support ticket requests MUST NOT echo \"ticket_request\" in the EncryptedExtensions message. A client MUST abort the connection with an \"illegal_parameter\" alert if the \"ticket_request\" extension is present in the EncryptedExtensions message. A server that supports ticket requests MAY echo the \"ticket_request\" extension in the EncryptedExtensions message. If present, it contains a TicketRequestContents structure, where TicketRequestContents.count indicates the number of tickets the server expects to send to the client. Servers MUST NOT send the \"ticket_request\" extension in ServerHello or HelloRetryRequest messages. A client MUST abort the connection with an \"illegal_parameter\" alert if the \"ticket_request\" extension is present in either of these messages. If a client receives a HelloRetryRequest, the presence (or absence) of the \"ticket_request\" extension MUST be maintained in the second"}
{"_id":"doc-en-draft-ietf-tls-ticketrequest-bd8973c9b8c5af4e042e4ed7df48a8741bee10cdc97c97971cf28eb6f10a70f3","title":"","text":"IANA is requested to Create an entry, ticket_request(TBD), in the existing registry for ExtensionType (defined in RFC8446), with \"TLS 1.3\" column values being set to \"CH\", and \"Recommended\" column being set to \"Yes\". 1.3\" column values being set to \"CH, EE\", and \"Recommended\" column being set to \"Yes\". 5."}
{"_id":"doc-en-draft-ietf-webtrans-http3-bf30bc51144d493a2dbb29113d6de721e5bcfac988115c52c4bd9fe32b929b34","title":"","text":"4.2. WebTransport clients can initiate bidirectional streams by opening an HTTP/3 bidirectional stream and sending an HTTP/3 frame with type WebTransport endpoints can initiate bidirectional streams by opening an HTTP/3 bidirectional stream and sending an HTTP/3 frame with type \"WEBTRANSPORT_STREAM\" (type=0x41). The format of the frame SHALL be the frame type, followed by the session ID, encoded as a variable- length integer, followed by the user-specified stream data (fig-bidi- client). The frame SHALL last until the end of the stream. 4.3. HTTP/3 does not by itself define any semantics for server-initiated bidirectional streams. If WebTransport setting is negotiated by both endpoints, the syntax of the server-initiated bidirectional streams SHALL be the same as the syntax of client-initated bidirectional streams, that is, a sequence of HTTP/3 frames. The only frame defined by this document for use within server-initiated bidirectional streams is WEBTRANSPORT_STREAM. WebTransport servers can initiate bidirectional streams by opening a bidirectional stream within the HTTP/3 connection. Note that since HTTP/3 does not define any semantics for server-initiated bidirectional streams, this document is a normative reference for the semantics of such streams for all HTTP/3 connections in which the SETTINGS_ENABLE_WEBTRANSPORT option is negotiated. The format of those streams SHALL be the session ID, encoded as a variable-length integer, followed by the user-specified stream data (fig-bidi- server). TODO: move the paragraph above into a separate draft; define what happens with already existing HTTP/3 frames on server-initiated bidirectional streams. 4.4. 4.3. Datagrams can be sent using the DATAGRAM frame as defined in QUIC- DATAGRAM and HTTP3-DATAGRAM. For all HTTP/3 connections in which the"}
{"_id":"doc-en-draft-ietf-webtrans-http3-ed0187882dff4212f37e93c799e0ca6b54797791e4f318b5fcaa2939745fbbe4","title":"","text":"MTUs can vary. TODO: Describe how the path MTU can be computed, specifically propagation across HTTP proxies. 4.5. 4.4. In WebTransport over HTTP/3, the client MAY send its SETTINGS frame, as well as multiple WebTransport CONNECT requests, WebTransport data"}
{"_id":"doc-en-draft-irtf-nwcrg-coding-and-congestion-in-transport-98722c6ea0fd419965475b8736401cfb693e869d52158f75a9bfccdfe62ac695","title":"","text":"Coding is a reliability mechanism that is distinct and separated from the loss detection of congestion controls. Using coding can be a useful way to better deal with tail losses or with networks with non- congestion losses. However, coding mechanisms could hide congestion signals to the server. This memo proposes a discussion on how coding and congestion signals could interact and proposes best current practice. congestion losses. However, coding mechanisms should not hide congestion signals. This memo offers a discussion of how coding and congestion control interact. 1."}
{"_id":"doc-en-draft-irtf-nwcrg-coding-and-congestion-in-transport-94edff8dfcc7a8a85713625150df95b6ba20eb5919da55e8d541d66fb6608426","title":"","text":"it is not an IETF product and is not a standard. There are cases where deploying coding improves the quality of the transmission. As example, the server may hardly detect tail losses that impact may impact the application layer. Another example may be the networks where non-congestion losses are persistent and prevent the server from exploiting the link capacity. RFC5681 defines TCP as a loss-based congestion control and coding mechanisms can hide congestion signals to the server. transmission. As an example, the server may hardly detect tail losses that impact may impact the application layer [MICHAEL: I don't understand this. Why would it not detect them? And why is detecting them the problem?]. Another example are networks where non- congestion losses are persistent and prevent a sender from exploiting the link capacity. RFC5681 defines TCP as a loss-based congestion control; because coding repairs such losses, blindly applying it may easily lead to an implementation that also hides a congestion signal to the sender. It is important to ensure that such information hiding does not occur. Coding is a reliability mechanism that is distinct and separated from the loss detection of congestion controls. This memo discusses"}
{"_id":"doc-en-draft-irtf-nwcrg-coding-and-congestion-in-transport-84dc321096921420d8c972a1c1a81711726a4537b7be72c3af3f33f2ddc918f3","title":"","text":"consider congestion control aspects when proposing coding solutions. The proposed recommendations apply for coding at the transport or application layer and coding for tunnels is out-of-the scope of the application layer. Coding for tunnels is out of scope for the document. 2. fig:sep-channel presents the notations that will be used in this document and introduce the Congestion Control (CC) and Forward Erasure Correction (FEC) channels. Congestion Control channel carries data packets (from the server to the client) and a potential Erasure Correction (FEC) channels. The Congestion Control channel carries data packets (from a server to a client) and a potential information signaling the packets that have been received (from the client to the server). Forward Erasure Correction channel carries coded packets (from the server to the client) and a potiential information signaling the packets that have been repaired (from the client to the server). It is worth pointing out that there are cases where these channels are not separated. client to the server). The Forward Erasure Correction channel carries coded packets (from the server to the client) and a potiential information signaling the packets that have been repaired (from the client to the server). It is worth pointing out that there are cases where these channels are not separated. Inside a host, the CC and FEC entities can be regarded as conceptually separate: As this diagram shows, the inputs to FEC (data to work upon, and signaling from the receiver about losses and/or repaired blocks) are distinct from the inputs to CC. The latter calculates a sending rate or window from network measurements, and it takes the data to send as input, sometimes along with application requirements such as upper/ lower rate bounds, periods of quiescence, or a priority. It is not clear that the ACK signals feeding into a congestion control algorithm are useful to FEC in their raw form, and vice versa - information about repaired blocks may be quite irrelevant to a CC algorithm. However, there can be meaningful other interactions (indicated by the horizontal double arrow) between the two entities, usually as a result of their operation rather than by relaying their own raw inputs. For example, the network measurements carried out by CC can yield a longer-term statistical measure such as a loss ratio which is useful input for a FEC coding scheme. Similarly, unequal error protection using fountain codes can be used to assign different priorities to blocks of data, and these priorities can be honored by a CC mechanism. 3."}
{"_id":"doc-en-draft-irtf-nwcrg-coding-and-congestion-in-transport-9c42aa6df28a34d26bd125820023e85a6e08bff1ccd0cfd88a2c12c44013c991","title":"","text":"3.2. The document focuses on end-to-end coding, i.e. in cases where coding is added at the server and client end points. The discussions should The document focuses on end-to-end coding, i.e. cases where coding is added at the server and client end points. The discussions should then consider fairness with non-coding solutions. 4. The solution can be described as follows: The solution can be described as follows: [MICHAEL: So far, it hasn't been clear that we're going to describe a \"solution\". A solution to which problem? I thought we're only discussing how FEC and CC relate.] The client MUST indicate to the server that one or multiple packets have been repaired using a coding scheme. The \"repaired packet\" signal does not guarantee that the packet actually needed to be repaired, since it could have been delayed but not lost. The client indicates to the server that one or multiple packets have been repaired using a coding scheme. The \"repaired packet\" signal does not guarantee that the packet actually needed to be repaired, since it could have been delayed but not lost. The server MUST be able to detect the \"repaired packet\" signal. The server must be able to detect the \"repaired packet\" signal. The base solution does not describe how the congestion control reacts to such signal. The rationale behind this solution is the following: the server has more information on the congestion status and the application characteristics. Moreover, congestion control should not be splitted between multiple entities otherwise non-optimized decisions may be taken. characteristics. Moreover, congestion control should not be split between multiple entities, as otherwise non-optimized decisions may be taken. The proposed solution applies for coding in the transport and application layers. The proposed approach is inline with the one in application layers. The proposed approach is in-line with the one in I-D.swett-nwcrg-coding-for-quic. The proposed solution does not applies for the interaction between coding under the transport layer apply for the interaction between coding under the transport layer (i.e. not end-to-end), such as coding for tunnels. 5."}
{"_id":"doc-en-draft-irtf-nwcrg-coding-and-congestion-in-transport-d92d16c705978fb5d7cc5837e47fa89457833e3aab826f0809aaec2d5b09a64f","title":"","text":"In this solution, the coded packets are sent on top of what is allowed by a congestion window. Examples of the solution could be adding a given pourcentage of the congestion window as supplementary adding a given percentage of the congestion window as supplementary packets or sending a given amount of coded packets at a given rate. The redundancy flow can be decorrelated from the congestion control that manages source packets : a secondary congestion control can be that manages source packets: a secondary congestion control can be introduced, such as in coupled congestion control for RTP media I- D.ietf-rmcat-coupled-cc. An example would be to exploit a lower than best-effort congestion control RFC6297. The advantage of such solution is that coding would help in challenges cases where transmission losses are persistent. The advantage of such a solution is that coding would help in challenging cases where transmission losses are persistent. The drawback of such solution is that it may result in coding The drawback of such a solution is that it may result in coding solutions being unfair towards non-coding solutions. This solutions may result in adding congestion in congested networks."}
{"_id":"doc-en-draft-irtf-nwcrg-coding-and-congestion-in-transport-41f97e2bf6ccc4f3706ef9fbb975307be6578a485a532f75d9ef7204cca485d5","title":"","text":"or preferably send coded packets instead of the following packets in the send buffer. The advantage of this solution is that it does not contribute in adding more congestion than the congestion window allows. Indeed, all traffic (source and redundancy) is controlled by one congestion control only and TCP metrics for fairness can be indifferently applied in this case. The advantage of this solution is that it does not add more traffic than the congestion window allows. Indeed, all traffic (source and redundancy) is controlled by one congestion control only and TCP metrics for fairness can be indifferently applied in this case. The main drawback is the decrease of goodput if coded packets are sent but are not used at the client side. 6. Delay-based congestion controls ignore packets that have been repaired with coding. There is no need to define best current [MICHAEL: I would remove this section entirely: it only adds to confusion. If the inputs are seen as distinct, and we say that the raw inputs shouldn't be shared, then why would one even think about what delay-based CC does with this input? It's just not the right input.] Delay-based congestion controls ignore packets that have been repaired with coding. There is no need to define best current pratices in this case. However, more discussions are required for congestion controls that use loss as congestion signals (potentially among other congestion detection mechanism). 6.1. In this solution, the server reacts to repaired packet signals as to congestion-implied packet losses. That being said, this does not necessarily means that the packets have actually been lost. The server may have other means to identify that the packet was just out- of-ordered and ignore the repaired packet signals. [MICHAEL: As above, lets remove all of this please. This text gets in the way of a clean separation.] In this solution, the server reacts to repaired packet signals as to congestion-implied packet losses. That being said, this does not necessarily mean that the packets have actually been lost. The server may have other means to identify that the packet was just out-of-order and ignore the repaired packet signals. The advantages of the solution are (1) that coding mechanisms do not hide congestion signals, such as packets voluntary dropped by a AQM RFC7567 and (2) packets may be repaired faster than with traditionnal retransmission mechanisms. RFC7567 and (2) packets may be repaired faster than with a traditional retransmission mechanisms. The drawback of this solution is that, if there is a high non- congestion loss rate, the congestion control throughput may decrease"}
{"_id":"doc-en-draft-irtf-nwcrg-coding-and-congestion-in-transport-c33b46969441b25f9f099332250504cd73fdc92bacaebc6a47a6f5f58183fd27","title":"","text":"6.2. In this solution, the server does not reduce the congestion window with the same amount when the \"repaired packet\" signal is received, i.e. when a packet has been lost but repaired. Example of this solution could be based on RFC8511 or considering that recovering an isolated packet is not an actual sign of congestion. [MICHAEL: this is even just a terrible idea. There's no good rationale to back off less when a packet is repaired.] In this solution, the server does not reduce the congestion window with the same amount when the \"repaired packet\" signal is received, i.e. when a packet has been lost but repaired. Example of this solution could be based on RFC8511 or considering that recovering an isolated packet is not an actual sign of congestion. The advantage of the solution is that in cases where there is no actual congestion, coding could help in improving the transmission"}
{"_id":"doc-en-draft-irtf-nwcrg-coding-and-congestion-in-transport-487058ef7d6720c6f7841970e0deb4b27ffb0aaaf3d4798fe2ac9f74a40ca2d4","title":"","text":"6.3. This is the case for delay-based congestion controls. The interaction between delay-based congestion controls and the delay induced by a coding mechanisms is an open research activity. That being said, a potential approach would be that loss-based congestion control ignores the \"repaired packet\" signal. [MICHAEL: as above, also here, the signals are discussed as going into both blocks, leading to a strange unification of things that shouldn't be together. Let's remove this. Also, the idea of ignoring packet loss for CC is appalling anyway.] This is the case for delay-based congestion controls. The interaction between delay- based congestion controls and the delay induced by a coding mechanisms is an open research activity. That being said, a potential approach would be that loss-based congestion control ignores the \"repaired packet\" signal. The advantage of this solution is that coding would provided substantial benefits in cases where there are transmission losses."}
{"_id":"doc-en-draft-irtf-nwcrg-coding-and-congestion-in-transport-8307567b1a24499a8ef0e42df060c1b322a1cb16271167487f6bc808705324b5","title":"","text":"7. This section provides a summary on the content in previous sections. The fig:summary sums up some recommendations. It is worth pointing out that the \"coding without congestion\" considers that coded packets are sent along with original data packets, in opposition with the solution where coded packets are transmitted only when there is no more original packets to transmit. Moreover, the values indicated in this Figure consider a channel that does not exhibit a high loss pattern. [MICHAEL: I'm sorry to say that I find this table to be in the same style, of wrongly mixing things together, and would like to see it removed altogether.] This section provides a summary on the content in previous sections. The fig:summary sums up some recommendations. It is worth pointing out that the \"coding without congestion\" considers that coded packets are sent along with original data packets, in opposition with the solution where coded packets are transmitted only when there is no more original packets to transmit. Moreover, the values indicated in this Figure consider a channel that does not exhibit a high loss pattern. 8."}
{"_id":"doc-en-draft-webtransport-http2-cd18602bb525741a12511c50911f8e6addd489a93a2a3e8ea48d116d1025de38","title":"","text":"5.4. frames implicitly create a stream and carry stream data. The Type field in the frame takes the form 0b00001XXX (or the set of values from 0x08 to 0x0f) to maximize compatibility with QUIC. However, unlike QUIC, there are only one bit used to determine the fields that are present in the frame: The FIN bit (0x01) indicates that the frame marks the end of the stream. The final size of the stream is the sum of the length, in bytes, of all data previously sent on this stream and the length of this frame without the length of the Stream ID. frames implicitly create a stream and carry stream data. The Type field in the frame is either 0x0a or 0x0b. This uses the same frame types as a QUIC STREAM frame with the OFF bit clear and the LEN bit set. The FIN bit (0x01) in the frame type indicates that the frame marks the end of the stream in one direction. Stream data consists of any number of 0x0a frames followed by a terminal 0x0b frame. frames contain the following fields: The stream ID for the stream. Zero or more bytes of data for the stream. Empty frames MUST NOT be used unless they open or close a stream; an endpoint MAY treat an empty frame that neither starts nor ends a stream as a session error. 5.5."}
{"_id":"doc-en-dtls-conn-id-652ad7aed6b42429fe185b6d73d5f65bc9477117f48348011369c7dddd4165c2","title":"","text":"ClientHello, MUST contain the ConnectionId structure. This structure contains the CID value the client wishes the server to use when sending messages to the client. A zero-length CID value indicates that the client is prepared to send with a CID but does not wish the that the client is prepared to send using a CID but does not wish the server to use one when sending. A server willing to use CIDs will respond with a \"connection_id\" extension in the ServerHello, containing the CID it wishes the client to use when sending messages towards it. A zero-length value indicates that the server will send with the client's CID but does not wish the client to include a CID. indicates that the server will send using the client's CID but does not wish the client to include a CID when sending. Because each party sends the value in the \"connection_id\" extension it wants to receive as a CID in encrypted records, it is possible for"}
{"_id":"doc-en-dtls-conn-id-21cad0f7f8b46b1eb4159eb17b5691070775887a04aa0499f53a00b0fb1b5398","title":"","text":"5.2. The following MAC algorithm applies to block ciphers that use the with Encrypt-then-MAC processing described in RFC7366. Encrypt-then-MAC processing described in RFC7366. 5.3."}
{"_id":"doc-en-dtls-conn-id-c4d52e8a412b20f4ff080751571a120d7090a96d2b85a1ded3b97fa6d2851390","title":"","text":"publication, the early allocation will be deprecated in favor of this assignment. A new column \"DTLS-Only\" is added to the registry. The valid entries are \"Y\" if the extension is only applicable to DTLS, \"N\" otherwise. All the pre-existing entries are given the value \"N\". Note: The value \"N\" in the Recommended column is set because this extension is intended only for specific use cases. This document describes the behavior of this extension for DTLS 1.2 only; it is not"}
{"_id":"doc-en-dtls-conn-id-a2760bf65e5582578a9fa0cdbb3075ff3fce57ca33d8713026e848483d1b9176","title":"","text":"6. dtls-example2 shows an example exchange where a connection id is used uni-directionally from the client to the server. uni-directionally from the client to the server. To indicate that a connection_id has zero length we use the term 'connection_id=empty'. Note: In the example exchange the CID is included in the record layer once encryption is enabled. In DTLS 1.2 only one handshake message is encrypted, namely the Finished message. Since the example shows how to use the CID for payloads sent from the client to the server only the record layer payload containing the Finished messagen contains a CID. Application data payloads sent from the client to the server contain a CID in this example as well. 7."}
{"_id":"doc-en-dtls-rrc-ae5ca07f26ff386d7a5df7bb02e0bb7d24ca3100d84ea579ccaf66039502836f","title":"","text":"10. [[to-be-removed: RFC Editor: please replace RFCthis with this RFC number and remove this note.]] 10.1. IANA is requested to allocate an entry to the TLS \"ContentType\" registry, for the \"return_routability_check(TBD2)\" message defined in this document. The \"return_routability_check\" content type is only applicable to DTLS 1.2 and 1.3. 10.2. IANA is requested to allocate the extension code point (TBD1) for the \"rrc\" extension to the \"TLS ExtensionType Values\" registry as described in tbl-ext. 10.3. IANA is requested to create a new sub-registry for RRC Message Types in the TLS Parameters registry IANA.tls-parameters, with the policy \"expert review\" RFC8126. Each entry in the registry must include: The initial state of this sub-registry is as follows: 11. Issues against this document are tracked at https://github.com/tlswg/"}
{"_id":"doc-en-dtls-rrc-a28d483b8af29fe73e30c8684a366b5221ee4a11417cf37a2a8001895e28da3d","title":"","text":"those datagrams are cryptographically authenticated). On-path adversaries can, in general, pose a harm to connectivity. When using DTLS 1.3, peers SHOULD avoid using the same CID on multiple network paths, in particular when initiating connection migration or when probing a new network path, as described in path- validation, as an adversary can otherwise correlate the communication interaction across those different paths. DTLS 1.3 provides mechanisms to ensure that a new CID can always be used. In general, an endpoint should proactively send a RequestConnectionId message to ask for new CIDs as soon as the pool of spare CIDs is depleted (or goes below a threshold). Also, in case a peer might have exhausted available CIDs, a migrating endpoint could include NewConnectionId in packets sent on the new path to make sure that the subsequent path validation can use fresh CIDs. Note that DTLS 1.2 does not offer the ability to request new CIDs during the session lifetime since CIDs have the same life-span of the connection. Therefore, deployments that use DTLS in multihoming environments SHOULD refuse to use CIDs with DTLS 1.2 and switch to DTLS 1.3 if the correlation privacy threat is a concern. 10. [[to-be-removed: RFC Editor: please replace RFCthis with this RFC"}
{"_id":"doc-en-dtls-rrc-d059dc599f6150df5f357e539b7315129101fd5340f23fdfc831d9aad07016ec","title":"","text":"active path, implementations SHOULD use T = 3xRTT. If an implementation has no way to obtain information regarding the RTT of the active path, a value of 1s SHOULD be used. RTT of the active path, T SHOULD be set to 1s. Profiles for specific deployment environments - for example, constrained networks I-D.ietf-uta-tls13-iot-profile - MAY specify a"}
{"_id":"doc-en-dtls13-spec-03ce4c87f9daa834eab2fbd339d9ccd523d3a744f8da05f1b49c379425d38db2","title":"","text":"Handshake messages are potentially larger than any given datagram, thus creating the problem of IP fragmentation. Datagram transport protocols, like UDP, are more vulnerable to denial of service attacks and require a return-routability check with the help of cookies to be integrated into the handshake. A detailed discussion of countermeasures can be found in dos. Datagram transport protocols, like UDP, are susceptible to abusive behavior effecting denial of service attacks against nonparticipants, and require a return-routability check with the help of cookies to be integrated into the handshake. A detailed discussion of countermeasures can be found in dos. 3.1."}
{"_id":"doc-en-dtls13-spec-3a613c065e876c5c86b5120ccf93c6392162623b1f3c32bb17b52946ab25fa5d","title":"","text":"error. Note that if DTLS is run over UDP, then any implementation which does this will be extremely susceptible to denial-of-service (DoS) attacks because UDP forgery is so easy. Thus, this practice is NOT RECOMMENDED for such transports. NOT RECOMMENDED for such transports, both to increase the reliability of DTLS service and to avoid the risk of spoofing attacks sending traffic to unrelated third parties. If DTLS is being carried over a transport that is resistant to forgery (e.g., SCTP with SCTP-AUTH), then it is safer to send alerts"}
{"_id":"doc-en-dtls13-spec-c2152c265194f1c8f8ef7b10d0d6b9ba2a522102d2b983141ccec36dbe02bf73","title":"","text":"datagram. Omitting the length field MUST only be used for the last record in a datagram. Implementations which send multiple records in the same datagram SHOULD omit the connection id from all but the first record; receiving implementations MUST assume that any subsequent records without connection IDs belong to the same association. Sending implementations MUST NOT mix records from multiple DTLS associations in the same datagram. If the second or later record has a connection ID which does not correspond to the same association used for previous records, the rest of the datagram MUST be discarded. If a connection ID is negotiated, then it MUST be contained in all datagrams. Sending implementations MUST NOT mix records from multiple DTLS associations in the same datagram. If the second or later record has a connection ID which does not correspond to the same association used for previous records, the rest of the datagram MUST be discarded. When expanded, the epoch and sequence number can be combined into an unpacked RecordNumber structure, as shown below:"}
{"_id":"doc-en-dtls13-spec-8f3f90e9380d25ed6c00dfb44b9249dcbcd23e607130473db41b2dc6481c5318","title":"","text":"5.7.3. DTLS does not have any built-in congestion control or rate control; in general this is not an issue because messages tend to be small. However, in principle, some messages - especially Certificate - can be quite large. If all the messages in a large flight are sent at once, this can result in network congestion. A better strategy is to send out only part of the flight, sending more when messages are acknowledged. DTLS offers a number of mechanisms for minimizing the size of the certificate message, including the cached information extension RFC7924 and certificate compression RFC8879. 5.7.4. DTLS 1.3 makes use of the following categories of post-handshake messages:"}
{"_id":"doc-en-dtls13-spec-4bb8b62a0a07a75a914c6c496d69471ff8afea864f4ab2996b9e1066afc8737c","title":"","text":"The basic design philosophy of DTLS is to construct \"TLS over datagram transport\". Datagram transport does not require nor provide reliable or in-order delivery of data. The DTLS protocol preserves this property for application data. Applications such as media this property for application data. Applications, such as media streaming, Internet telephony, and online gaming use datagram transport for communication due to the delay-sensitive nature of transported data. The behavior of such applications is unchanged when the DTLS protocol is used to secure communication, since the DTLS protocol does not compensate for lost or reordered data traffic. Note that while low-latency streaming and gaming use DTLS to protect data (e.g. for protection of a WebRTC data channel), telephony utilizes DTLS for key establishment, and Secure Real-time Transport Protocol (SRTP) for protection of data RFC5763. TLS cannot be used directly in datagram environments for the following five reasons:"}
{"_id":"doc-en-dtls13-spec-b73172c871eee62bed0ab1b6a46dd007686a13d6717bf7fd383e365a8f99b124","title":"","text":"thus avoiding concerns about interleaving multiple HelloRetryRequests. For more detail on timeouts and retransmission, see timeout- retransmissions. 3.2. In DTLS, each handshake message is assigned a specific sequence"}
{"_id":"doc-en-dtls13-spec-78fee04bd663a247274f040ee8c7978260f2326c4f23db43129890c3fba0b522","title":"","text":"DTLS record MUST fit within a single datagram. In order to avoid IP fragmentation, clients of the DTLS record layer SHOULD attempt to size records so that they fit within any PMTU estimates obtained from the record layer. the record layer. For more information about PMTU issues see pmtu- issues. Multiple DTLS records MAY be placed in a single datagram. Records are encoded consecutively. The length field from DTLS records"}
{"_id":"doc-en-dtls13-spec-0c6912baeb8e98f5b288e070d85b2619d8eaa61ce415ac871ff21607759b6cd6","title":"","text":"probes the implementation to see how it responds to various types of error. Note that if DTLS is run over UDP, then any implementation which does this will be extremely susceptible to denial-of-service (DoS) attacks because UDP forgery is so easy. Thus, this practice is NOT RECOMMENDED for such transports, both to increase the reliability of DTLS service and to avoid the risk of spoofing attacks sending traffic to unrelated third parties. (DoS) attacks because UDP forgery is so easy. Thus, the practice of generating fatal alerts is NOT RECOMMENDED for such transports, both to increase the reliability of DTLS service and to avoid the risk of spoofing attacks sending traffic to unrelated third parties. If DTLS is being carried over a transport that is resistant to forgery (e.g., SCTP with SCTP-AUTH), then it is safer to send alerts"}
{"_id":"doc-en-dtls13-spec-9ff29dcfa216ba0b8dcbdc94fd48301042163f08ee7fc40226fc552ce650c937","title":"","text":"5.8.2. Though timer values are the choice of the implementation, mishandling of the timer can lead to serious congestion problems, for example if many instances of a DTLS time out early and retransmit too quickly on a congested link. Implementations SHOULD use an initial timer value of 100 msec (the minimum defined in RFC 6298 RFC6298) and double the value at each retransmission, up to no less than 60 seconds (the RFC 6298 maximum). Application specific profiles, such as those used for the Internet of Things environment, may recommend longer timer values. Note that a 100 msec timer is recommended rather than the 3-second RFC 6298 default in order to improve latency for time- sensitive applications. Because DTLS only uses retransmission for handshake and not dataflow, the effect on congestion should be minimal. The configuration of timer settings varies with implementations and certain deployment environments require timer value adjustments. Mishandling of the timer can lead to serious congestion problems, for example if many instances of a DTLS time out early and retransmit too quickly on a congested link. Implementations SHOULD use an initial timer value of 100 msec (the minimum defined in RFC 6298 RFC6298) and double the value at each retransmission, up to no less than 60 seconds (the RFC 6298 maximum). Application specific profiles, such as those used for the Internet of Things environment, may recommend longer timer values. Note that a 100 msec timer is recommended rather than the 3-second RFC 6298 default in order to improve latency for time-sensitive applications. Because DTLS only uses retransmission for handshake and not dataflow, the effect on congestion should be minimal. Implementations SHOULD retain the current timer value until a message is transmitted and acknowledged without having to be retransmitted,"}
{"_id":"doc-en-dtls13-spec-46fd45657aaf6114b06e8875401f1fdb57cd344526c1e8351ad3cfce0c1fedbe","title":"","text":"be quite large. If all the messages in a large flight are sent at once, this can result in network congestion. A better strategy is to send out only part of the flight, sending more when messages are acknowledged. DTLS offers a number of mechanisms for minimizing the size of the certificate message, including the cached information extension RFC7924 and certificate compression RFC8879. acknowledged. Several extensions have been standardized to reduce the size of the certificate message, for example the cached information extension RFC7924, certificate compression RFC8879 and RFC6066, which defines the \"client_certificate_url\" extension allowing DTLS clients to send a sequence of Uniform Resource Locators (URLs) instead of the client certificate. 5.8.4."}
{"_id":"doc-en-dtls13-spec-bd1d5237e7cb4e6cdb39ba0baf6d0ffc3a0b74e3c85c89086c6cbbb5ddf9485c","title":"","text":"first. Likewise, a server MAY send multiple CertificateRequest messages at once without having completed earlier client authentication requests before. In contrast, implementations MUST NOT have send KeyUpdate, NewConnectionId or RequestConnectionId NOT have sent KeyUpdate, NewConnectionId or RequestConnectionId message if an earlier message of the same type has not yet been acknowledged."}
{"_id":"doc-en-dtls13-spec-0f941295916ca68f53d18d6f3de5ed9a038a6cd9978a801c05d07c8b74fcc484","title":"","text":"retransmissions. Note that the client sends an empty ACK message because it can only acknowledge Record 1 sent by the server once it has processed messages in Record 0 needed to establish epoch 2 keys, which are needed to encrypt to decrypt messages found in Record 1. which are needed to encrypt or decrypt messages found in Record 1. ack-msg provides the necessary background details for this interaction."}
{"_id":"doc-en-dtls13-spec-0a26bc6a6d5f80357ae14c1fde403d9f8b8a590ceb1a5ae86b353e5e994b9f8d","title":"","text":"peer will retransmit in any case and therefore the ACK just allows for selective retransmission, as opposed to the whole flight retransmission in previous versions of DTLS. For instance in the flow shown in Figure 11 if the client does not send the ACK message when it received record 1 indicating loss of record 0, the entire flight would be retransmitted. When DTLS 1.3 is used in deployments with lossy networks, such as low-power, long range radio networks as well as low-power mesh networks, the use of ACKs is recommended. flow shown in dtls-key-update if the client does not send the ACK message when it received record 1 indicating loss of record 0, the entire flight would be retransmitted. When DTLS 1.3 is used in deployments with lossy networks, such as low-power, long range radio networks as well as low-power mesh networks, the use of ACKs is recommended. The use of the ACK for the second case is mandatory for the proper functioning of the protocol. For instance, the ACK message sent by the client in Figure 13, acknowledges receipt and processing of record 4 (containing the NewSessionTicket message) and if it is not sent the server will continue retransmission of the NewSessionTicket indefinitely until its transmission cap is reached. indefinitely until its maximum retransmission timemout value is reached. 8."}
{"_id":"doc-en-dtls13-spec-9b435bf1f7bdf9541114090f7a24e3d9ff11a774831d2297087d3b7d6c70098b","title":"","text":"sequence number fields in the DTLSCiphertext structure have been reduced from those in previous versions. The DTLS epoch serialized in DTLSPlaintext is 2 octets long for compatibility with DTLS 1.2. However, this value is set as the least significant 2 octets of the connection epoch, which is an 8 octet counter incremented on every KeyUpdate. See seq-and-epoch for details. The sequence number is set to be the low order 48 bits of the 64 bit sequence number. Plaintext records MUST NOT be sent with sequence numbers that would exceed 2^48-1, so the upper 16 bits will always be 0. The DTLSCiphertext structure has a variable length header. DTLSPlaintext records are used to send unprotected records and"}
{"_id":"doc-en-dtls13-spec-3e2c7bb7785367cdb74427cf53503603458b4ce562a04c9f5c3203e59041c944","title":"","text":"compatibility purposes. It MUST be ignored for all purposes. See TLS13; Appendix D.1 for the rationale for this. The least significant 2 bytes of the connection epoch value. The unified header (unified_hdr) is a structure of variable length, as shown in cid_hdr."}
{"_id":"doc-en-dtls13-spec-8b751862b4c267b421cb885e311ecb5564a2a4c32d5eb56a17059a086d2c7f88","title":"","text":"When expanded, the epoch and sequence number can be combined into an unpacked RecordNumber structure, as shown below: This 64-bit value is used in the ACK message as well as in the \"record_sequence_number\" input to the AEAD function. This 128-bit value is used in the ACK message. The entire header value shown in hdr_examples (but prior to record number encryption, see rne) is used as as the additional data value for the AEAD function. For instance, if the minimal variant is used, the AAD is 2 octets long. Note that this design is different from the additional data calculation for DTLS 1.2 and for DTLS 1.2 with Connection ID. Connection ID. In DTLS 1.3 the 64-bit sequence_number is used as the sequence number for the AEAD computation; unlike DTLS 1.2, the epoch is not included. 4.1."}
{"_id":"doc-en-dtls13-spec-0d119707d56c71fc864ae44f0d8cf106d1a96279c53d11ff90e1e200eaff06f5","title":"","text":"Implementations MUST either abandon an association or re-key prior to allowing the sequence number to wrap. Implementations MUST NOT allow the epoch to wrap, but instead MUST establish a new association, terminating the old association. 4.2.2. When receiving protected DTLS records, the recipient does not have a full epoch or sequence number value in the record and so there is some opportunity for ambiguity. Because the full epoch and sequence number are used to compute the per-record nonce, failure to reconstruct these values leads to failure to deprotect the record, and so implementations MAY use a mechanism of their choice to determine the full values. This section provides an algorithm which is comparatively simple and which implementations are RECOMMENDED to follow. some opportunity for ambiguity. Because the full sequence number is used to compute the per-record nonce and the epoch determines the keys, failure to reconstruct these values leads to failure to deprotect the record, and so implementations MAY use a mechanism of their choice to determine the full values. This section provides an algorithm which is comparatively simple and which implementations are RECOMMENDED to follow. If the epoch bits match those of the current epoch, then implementations SHOULD reconstruct the sequence number by computing"}
{"_id":"doc-en-dtls13-spec-039b51ab29fb86086c4efbfb5265f7022ccb9320bbf2e733e977cadb85bbf86c","title":"","text":"include handshake messages, such as post-handshake messages (e.g., a NewSessionTicket message). epoch value (4 to 2^16-1) is used for payloads protected using epoch value (4 to 2^64-1) is used for payloads protected using keys from the [sender]_application_traffic_secret_N (N>0). Using these reserved epoch values a receiver knows what cipher state"}
{"_id":"doc-en-dtls13-spec-afaeb42d6d70047100bff8de0dae47abb894f9908361aee5e5a79ad7cc90a6ee","title":"","text":"successful ACK processing updates the keys of the KeyUpdate message sender, which is reflected in the change of epoch values. With a 128-bit key as in AES-256, rekeying 2^64 times has a high probability of key reuse within a given connection. Note that even if the key repeats, the IV is also independently generated. In order to provide an extra margin of security, sending implementations MUST NOT allow the epoch to exceed 2^48-1. In order to allow this value to be changed later, receiving implementations MUST NOT enforce this rule. If a sending implementation receives a KeyUpdate with request_update set to \"update_requested\", it MUST NOT send its own KeyUpdate if that would cause it to exceed these limits. 9. If the client and server have negotiated the \"connection_id\""}
{"_id":"doc-en-dtls13-spec-0889cab4e64a70b2de9e7e042c13d2b9c7e13f47c13f7d603b252fcd408ebc89","title":"","text":"the \"TLS Alerts\" registry with value 52. IANA is requested to allocate two values in the \"TLS Handshake Type\" registry, defined in TLS13, for RequestConnectionId (TBD), and NewConnectionId (TBD), as defined in this document. The value for registry, defined in TLS13, for request_connection_id (TBD), and new_connection_id (TBD), as defined in this document. The value for the \"DTLS-OK\" columns are \"Y\". IANA is requested to add this RFC as a reference to the TLS Cipher"}
{"_id":"doc-en-dtls13-spec-327ed5da6994de26ff653ac60fc8dc3beed0ff9a5c2910a05628ce736d89c04d","title":"","text":"the connection establishment. With these exceptions, the DTLS message formats, flows, and logic are the same as those of TLS 1.3. the same as those of TLS 1.3. DTLS implementations SHOULD not use the TLS 1.3 \"compatibility mode\" described in I-D.ietf-tls-tls13, Section D.4 and DTLS servers SHOULD ignore the \"session_id\" value generated by the client rather than sending ChangeCipherSpec messages. Implementations MUST still ignore ChangeCipherSpec messages received during the handshake and at all other times SHOULD treat them as if they had failed to deprotect. 5.1."}
{"_id":"doc-en-dtls13-spec-5f4b640840384b98d4f7fd1c00482343a1d481370c1b605a6ab67f86b6cd60c9","title":"","text":"Same as for TLS 1.3. A DTLS 1.3-only client MUST set the legacy_cookie field to zero length. length. If a DTLS 1.3 ClientHello is received with any other value in this field, the server MUST abort the handshake with an \"illegal_parameter\" alert. Same as for TLS 1.3."}
{"_id":"doc-en-dynlink-44b6cd8453976fa132898d9379f048a5b770a93b5c60b2aaad870db865d38aa9","title":"","text":"4.1.3. When the Push method is assigned to a binding, the source endpoint sends PUT requests to the destination resource when the Conditional Notification Attributes are satisfied for the source resource. The source endpoint SHOULD only send a notification request if any included Conditional Notification Attributes are met. The binding entry for this method MUST be stored on the source endpoint. The Push method can be used to allow a source endpoint to replace an outdated resource state at the destination with a newer representation. When the Push method is assigned to a binding, the source endpoint sends PUT requests to the destination resource when the Conditional Notification Attributes are satisfied for the source resource. The source endpoint SHOULD only send a notification request if any included Conditional Notification Attributes are met. The binding entry for this method MUST be stored on the source endpoint. 4.1.4. An alternative means for a source endpoint to deliver change-of-state notifications to a destination resource is to use the Execute Method. While the Push method simply updates the state of the destination resource with the representation of the source resource, Execute can be used when the destination endpoint wishes to receive all state changes from a source. This allows, for example, the existence of a resource collection consisting of all the state changes at the destination endpoint. When the Execute method is assigned to a binding, the source endpoint sends POST requests to the destination resource when the Conditional Notification Attributes are satisfied for the source resource. The source endpoint SHOULD only send a notification request if any included Conditional Notification Attributes are met. The binding entry for this method MUST be stored on the source endpoint. Note: Both the Push and the Execute methods are examples of Server Push mechanisms that are being researched in the Thing-to-Thing Research Group (T2TRG) I-D.irtf-t2trg-rest-iot. 4.2."}
{"_id":"doc-en-dynlink-d041dde83f943fe35c88c4528a979c10a3ad5e2f9a4ccc67b36357ffd029bf22","title":"","text":"9. draft-ietf-core-dynlink-10 Binding methods now support both POST and PUT operations for server push. draft-ietf-core-dynlink-09 Corrections in Table 1, Table 2, Figure 2."}
{"_id":"doc-en-dynlink-aa765d5ceb864f069a49695dd084e609a6e7517064006d314fd26b656b3fb798","title":"","text":"seconds, between two consecutive notifications (whether or not the resource value has changed). In the absence of this parameter, the maximum period is up to the server. The maximum period MUST be greater than zero and MUST be greater than the minimum period parameter (if present) otherwise the receiver MUST return a CoAP error code 4.00 \"Bad Request\" (or equivalent). greater than zero and MUST be greater than, or equal to, the minimum period parameter (if present) otherwise the receiver MUST return a CoAP error code 4.00 \"Bad Request\" (or equivalent). 3.1.3."}
{"_id":"doc-en-echo-request-tag-4c81215742bcc6c7f89b44b647f373fe26c3d7c5a32376f69bfc6012c0640dd3","title":"","text":"the request does not contain a fresh Echo option value, and the server cannot verify the freshness of the request in some other way, the server MUST NOT process the request further and SHOULD send a 4.01 Unauthorized response with an Echo option. 4.01 Unauthorized response with an Echo option. The server MAY include the same Echo option value in several different responses and to different clients. The application decides under what conditions a CoAP request to a resource is required to be fresh. These conditions can for example"}
{"_id":"doc-en-edhoc-5f6b9267d06010eaa6cb28b53b73692f716636a98bfae77304ba4f7b1ec9d25b","title":"","text":"Cryptographically, EDHOC does not put requirements on the lower layers. EDHOC is not bound to a particular transport layer, and can be used in environments without IP. The transport is responsible to handle message loss, reordering, message duplication, fragmentation, and denial of service protection, where necessary. be used in environments without IP. The application using EDHOC is responsible to handle message loss, reordering, message duplication, fragmentation, demultiplex EDHOC messages from other types of messages, and denial of service protection, where necessary. The Initiator and the Responder need to have agreed on a transport to be used for EDHOC, see applicability. It is recommended to transport"}
{"_id":"doc-en-edhoc-41efa29c9bbb93199c8a033a6cc8b00738bbbb3e6ff0b5ecce1cd5104cc4c0c1","title":"","text":"Pass AD_1 to the security application. If any verification step fails, the Responder MUST send an EDHOC error message back, formatted as defined in error, and the protocol MUST be discontinued. If any processing step fails, the Responder SHOULD send an EDHOC error message back, formatted as defined in error, and the session MUST be discontinued. Sending error messages is essential for debugging but MAY e.g. be skipped due to denial of service reasons, see security. 5.4."}
{"_id":"doc-en-edhoc-b9557cb86fc72d427bfddb67a89db722d355eedaf98682a1dcf17c4acb2acbfb","title":"","text":"Pass AD_2 to the security application. If any verification step fails, the Initiator MUST send an EDHOC error message back, formatted as defined in error, and the protocol MUST be discontinued. If any processing step fails, the Initiator SHOULD send an EDHOC error message back, formatted as defined in error. Sending error messages is essential for debugging but MAY e.g.be skipped if a session cannot be found or due to denial of service reasons, see security. If an error message is sent, the session MUST be discontinued. 5.5."}
{"_id":"doc-en-edhoc-fca774dbce37a92fb7adad2a98bd36f162005aa0a07b184d0e826e1f3d1dff47","title":"","text":"security application. The application can now derive application keys using the EDHOC-Exporter interface. If any verification step fails, the Responder MUST send an EDHOC error message back, formatted as defined in error, and the protocol MUST be discontinued. If any processing step fails, the Responder SHOULD send an EDHOC error message back, formatted as defined in error. Sending error messages is essential for debugging but MAY e.g.be skipped if a session cannot be found or due to denial of service reasons, see security. If an error message is sent, the session MUST be discontinued. After verifying message_3, the Responder is assured that the Initiator has calculated the key PRK_4x3m (explicit key confirmation)"}
{"_id":"doc-en-edhoc-aa065f99ec5a899dbfc3553f703cb77e70e373e095d6c774b92e2fe10275e821","title":"","text":"transported depends on lower layers, which need to enable error messages to be sent and processed as intended. All error messages in EDHOC are fatal. After sending an error message, the sender MUST discontinue the protocol. The receiver SHOULD treat an error message as an indication that the other party likely has discontinued the protocol. But as the error message is not authenticated, a received error messages might also have been sent by an attacker and the receiver MAY therefore try to continue the protocol. Errors in EDHOC are fatal. After sending an error message, the sender MUST discontinue the protocol. The receiver SHOULD treat an error message as an indication that the other party likely has discontinued the protocol. But as the error message is not authenticated, a received error message might also have been sent by an attacker and the receiver MAY therefore try to continue the protocol. error SHALL be a CBOR Sequence (see CBOR) as defined below"}
{"_id":"doc-en-edhoc-49f82ef8b7940daae46f4fbe72ea5cdb5b06d04f6ab350fd3dc850f7266f90ed","title":"","text":"cipher suite, and the parameters defined in asym-msg4-proc. If any verification step fails the Initiator MUST send an EDHOC error message back, formatted as defined in error, and the protocol MUST be message back, formatted as defined in error, and the session MUST be discontinued. 7.2."}
{"_id":"doc-en-edhoc-68ed9e6b604fb6026d4a9f039800dbbced9c03138847b3922b6784278496d409","title":"","text":"the initiator to demonstrate reachability at its apparent network address. An attacker can also send faked message_2, message_3, message_4, or error in an attempt to trick the receiving party to send an error message and discontinue the session. EDHOC implementations MAY evaluate if a received message is likely to have be forged by and attacker and ignore it without sending an error message or discontinuing the session. 8.6. The availability of a secure random number generator is essential for"}
{"_id":"doc-en-edhoc-820c5abb20d5133f294937cf0ed335c1dd91809d36bac6252386de6d475a44f2","title":"","text":"Application keys and other application specific data can be derived using the EDHOC-Exporter interface defined as: where label is a tstr defined by the application and length is a uint defined by the application. The label SHALL be different for each different exporter value. The transcript hash TH_4 is a CBOR encoded bstr and the input to the hash function is a CBOR Sequence. label_context is a CBOR sequence: where H() is the hash function in the selected cipher suite. Example use of the EDHOC-Exporter is given in I-D.ietf-core-oscore-edhoc. where label is a registered tstr from the EDHOC Exporter Label registry (exporter-label), context is a bstr defined by the application, and length is a uint defined by the application. The (label, context) pair must be unique, i.e. a (label, context) MUST NOT be used for two different purposes. However an application can re-derive the same key several times as long as it is done in a secure way. For example, in most encryption algorithms the same (key, nonce) pair must not be reused. The transcript hash TH_4 is a CBOR encoded bstr and the input to the hash function is a CBOR Sequence. where H() is the hash function in the selected cipher suite. Examples of use of the EDHOC-Exporter are given in asym-msg4-proc and I-D.ietf-core-oscore-edhoc. To provide forward secrecy in an even more efficient way than re- running EDHOC, EDHOC provides the function EDHOC-KeyUpdate. When EDHOC-KeyUpdate is called the old PRK_4x3m is deleted and the new PRk_4x3m is calculated as a \"hash\" of the old key using the Extract PRK_4x3m is calculated as a \"hash\" of the old key using the Extract function as illustrated by the following pseudocode: 5."}
{"_id":"doc-en-edhoc-0e76b65a22300863515b953fa2c5a82addca8203b190c777f241821764882813","title":"","text":"9.1. IANA has created a new registry titled \"EDHOC Exporter Label\" under the new heading \"EDHOC\". The registration procedure is \"Expert Review\". The columns of the registry are Label, Description, and Reference. All columns are text strings. The initial contents of the registry are: 9.2. IANA has created a new registry titled \"EDHOC Cipher Suites\" under the new heading \"EDHOC\". The registration procedure is \"Expert Review\". The columns of the registry are Value, Array, Description, and Reference, where Value is an integer and the other columns are text strings. The initial contents of the registry are: 9.2. 9.3. IANA has created a new registry entitled \"EDHOC Method Type\" under the new heading \"EDHOC\". The registration procedure is \"Expert"}
{"_id":"doc-en-edhoc-de57744442d2d5b48009a01663cf7a8972b7d9b84aa4bf157abd2497688f609c","title":"","text":"strings. The initial contents of the registry is shown in fig- method-types. 9.3. 9.4. IANA has created a new registry entitled \"EDHOC Error Codes\" under the new heading \"EDHOC\". The registration procedure is"}
{"_id":"doc-en-edhoc-c3aed6336732bdd7f1ac9d7a0d1caafbe99818f036c3241b265acf25cf7cc9aa","title":"","text":"is a CDDL defined type, and Description is a text string. The initial contents of the registry is shown in fig-error-codes. 9.4. 9.5. IANA has added the well-known URI 'edhoc' to the Well-Known URIs registry."}
{"_id":"doc-en-edhoc-76f7e85cd46660923010fe3ee253c31595773806daa3f727847bb806b2b41adb","title":"","text":"Related information: None 9.5. 9.6. IANA has added the media type 'application/edhoc' to the Media Types registry."}
{"_id":"doc-en-edhoc-59cd005585e9707571804bde7615477237094a1b5f884a5fa6835452e8353eb5","title":"","text":"Change Controller: IESG 9.6. 9.7. IANA has added the media type 'application/edhoc' to the CoAP Content-Formats registry."}
{"_id":"doc-en-edhoc-c5e42a90878a4b74036f9ce1ae73e5a28f19c4ab0f2ec4171aceeac48796bcbd","title":"","text":"Reference: [[this document]] 9.7. 9.8. The IANA Registries established in this document is defined as \"Expert Review\". This section gives some general guidelines for what"}
{"_id":"doc-en-edhoc-7bdb177e8ad2f339bd43d71a003174367b8c457ecac28a3247c956677e8d3869","title":"","text":"Responder, respectively, see m3 and m2. When the credential is a certificate, CRED_x is an end-entity certificate (i.e., not the certificate chain), encoded as a CBOR bstr. In X.509 and C509 certificates, signature keys typically have key usage \"digitalSignature\" and Diffie-Hellman public keys typically have key usage \"keyAgreement\". certificate (i.e., not the certificate chain). In X.509 and C509 certificates, signature keys typically have key usage \"digitalSignature\" and Diffie-Hellman public keys typically have key usage \"keyAgreement\". To prevent misbinding attacks in systems where an attacker can register public keys without proving knowledge of the private key,"}
{"_id":"doc-en-edhoc-8838ecc308c4c3ab35f74c1f60e951337b17cbeb2e9566e449fb45b498e22b15","title":"","text":"external_aad = << TH_2, CRED_R, ? EAD_2 >> CRED_R - bstr containing the credential of the Responder, see CRED_R - CBOR item containing the credential of the Responder, see EAD_2 = unprotected external authorization data, see"}
{"_id":"doc-en-edhoc-fdfc1cdb62ae0bcf94858c5f5e04ed0bb38d2dede3eb07deef32866cd69f68c4","title":"","text":"external_aad = << TH_3, CRED_I, ? EAD_3 >> CRED_I - bstr containing the credential of the Initiator, see id_cred. CRED_I - CBOR item containing the credential of the Initiator, see id_cred. EAD_3 = protected external authorization data, see"}
{"_id":"doc-en-edhoc-9b49717e23f351b4004133b5d4011796990bd4e76007dbc6c8a5dac7bebb012c","title":"","text":"algorithms (AEAD, hash) in the selected cipher suite (see cs) and the application can make use of the established connection identifiers C_I and C_R (see ci). EDHOC may be used with the media type application/edhoc defined in media-type. application/edhoc+cbor-seq defined in media-type. The Initiator can derive symmetric application keys after creating EDHOC message_3, see exporter. Protected application data can"}
{"_id":"doc-en-edhoc-0d72a2ab1725524f95e1695b430f8eb86ac7c6db4b77971dc9ed3ce492cc5cae","title":"","text":"9.8. IANA has added the media type \"application/edhoc\" to the \"Media Types\" registry. IANA has added the media types \"application/edhoc+cbor-seq\" and \"application/cid-edhoc+cbor-seq\" to the \"Media Types\" registry. 9.8.1. Type name: application Subtype name: edhoc Subtype name: edhoc+cbor-seq Required parameters: N/A"}
{"_id":"doc-en-edhoc-cc221e96a2c832158ae65981945095dda42650b78127eb92741222b10e655554","title":"","text":"Change Controller: IESG 9.9. 9.8.2. Type name: application Subtype name: cid-edhoc+cbor-seq IANA has added the media type \"application/edhoc\" to the \"CoAP Content-Formats\" registry under the group name \"Constrained RESTful Environments (CoRE) Parameters\". Required parameters: N/A Media Type: application/edhoc Optional parameters: N/A Encoding: Encoding considerations: binary ID: TBD42 Security considerations: See Section 7 of this document. Reference: [[this document]] Interoperability considerations: N/A Published specification: [[this document]] (this document) Applications that use this media type: To be identified Fragment identifier considerations: N/A Additional information: Magic number(s): N/A File extension(s): N/A Macintosh file type code(s): N/A Person & email address to contact for further information: See \"Authors' Addresses\" section. Intended usage: COMMON Restrictions on usage: N/A Author: See \"Authors' Addresses\" section. Change Controller: IESG 9.9. IANA has added the media types \"application/edhoc+cbor-seq\" and \"application/cid-edhoc+cbor-seq\" to the \"CoAP Content-Formats\" registry under the group name \"Constrained RESTful Environments (CoRE) Parameters\". 9.10."}
{"_id":"doc-en-edhoc-5df741ab4080915547862ce7acbab20ba8d595a4074a0259b937b9591b59dd44","title":"","text":"of SP-800-56A. For secp256r1, secp384r1, and secp521r1, at least partial public-key validation MUST be done. A static Diffie-Hellman key for authentication in method 1, 2 or 3 MUST NOT not be used as a digital signature key for authentication in method 0, unless proven secure by a dedicated cryptographic analysis. A preliminary conjecture is that a minor change to EDHOC may be sufficient to fit the analysis of secure shared signature and ECDH key usage in [Degabriele2011] and [[Thormarker2021]]. So-called selfie attacks are mitigated as long as the Initiator does not have its own identity in the set of Responder identities it is allowed to communicate with. In trust on first use (TOFU) use cases"}
{"_id":"doc-en-edhoc-c348a12b07eff6dd7b37eb126343097fe45e795fcda2a127c551addcced1dfb1","title":"","text":"protect against passive attacker as active attackers can always get the Responder's identity by sending their own message_1. EDHOC uses the Expand function (typically HKDF-Expand) as a binary additive stream cipher. HKDF-Expand is not often used as it is slow on long messages, and most applications require both IND-CCA confidentiality as well as integrity protection. For the encryption of message_2, any speed difference is negligible, IND-CCA does not increase security, and integrity is provided by the inner MAC (and signature depending on method). stream cipher which is proven secure as long as the expand function is a PRF. HKDF-Expand is not often used as a stream cipher as it is slow on long messages, and most applications require both IND-CCA confidentiality as well as integrity protection. For the encryption of message_2, any speed difference is negligible, IND-CCA does not increase security, and integrity is provided by the inner MAC (and signature depending on method). Requirements for how to securely generate, validate, and process the ephemeral public keys depend on the elliptic curve. For X25519 and"}
{"_id":"doc-en-edhoc-b124e60b4b34110a2af96ef88d800d75e449e7cf3c210472901f4779afe3f0d5","title":"","text":"of SP-800-56A. For secp256r1, secp384r1, and secp521r1, at least partial public-key validation MUST be done. A static Diffie-Hellman key for authentication in method 1, 2 or 3 MUST NOT not be used as a digital signature key for authentication in method 0, unless proven secure by a dedicated cryptographic analysis. As noted in Section 12 of I-D.ietf-cose-rfc8152bis-struct the use of a single key for multiple algorithms is strongly disencouraged unless proven secure by a dedicated cryptographic analysis. In particular this recommendation applies to using the same private key for static Diffie-Hellman authentication and digital signature authentication. A preliminary conjecture is that a minor change to EDHOC may be sufficient to fit the analysis of secure shared signature and ECDH key usage in Degabriele11 and Thormarker21."}
{"_id":"doc-en-edhoc-31957aa86451ead40f7b0b96b15afe5ae2cfb63802e7b0a440841ba9d0fb954b","title":"","text":"such code to be read or tampered with by code outside that environment. Note that HKDF-Expand has a relativly small maximum output length of 255 * hash_length. This means that when when SHA-256 is used as hash algorithm, message_2 cannot be longer than 8160 bytes. The sequence of transcript hashes in EHDOC (TH_2, TH_3, TH_4) do not make use of a so called running hash, this is a design choice as running hashes are often not supported on constrained platforms."}
{"_id":"doc-en-edhoc-d458d2814d2c42065ad505cc4053283383cfd931f3d0ee420d14b2224427e8c7","title":"","text":"much previous information as possible. EDHOC is furthermore designed to be as compact and lightweight as possible, in terms of message sizes, processing, and the ability to reuse already existing CBOR, COSE, and CoAP libraries. COSE, and CoAP libraries. Like (D)TLS, authentication is the responsibility of the application, EDHOC identifies (and optionally transports) authentication credentials, and provides proof-of- possession of the private authentication key. To simplify for implementors, the use of CBOR and COSE in EDHOC is summarized in CBORandCOSE. Test vectors including CBOR diagnostic"}
{"_id":"doc-en-edhoc-0331bec169a893906b2b542d0ebd9cb2648ab1ba66d8e1fe81c29c76bf7f3ef4","title":"","text":"So-called selfie attacks are mitigated as long as the Initiator does not have its own identity in the set of Responder identities it is allowed to communicate with. In trust on first use (TOFU) use cases the Initiator should verify that the Responder's identity is not equal to its own. Any future EHDOC methods using e.g., pre-shared keys might need to mitigate this in other ways. allowed to communicate with. In Trust on first use (TOFU) use cases, see tofu, the Initiator should verify that the Responder's identity is not equal to its own. Any future EHDOC methods using e.g., pre- shared keys might need to mitigate this in other ways. 8.3."}
{"_id":"doc-en-edhoc-a512c1578b243afdce2bc2d135b820d21fc7891eb4b0c9b07b74442d6ec4f3a3","title":"","text":"3.8. In order to reduce round trips and the number of messages or to In order to reduce round trips and the number of messages, or to simplify processing, external security applications may be integrated into EDHOC by transporting authorization related data in the messages. EDHOC allows opaque external authorization data (EAD) to be sent in each of the four EDHOC messages (EAD_1, EAD_2, EAD_3, EAD_4). EDHOC allows processing of external authorization data (EAD) to be defined in a separate specification, and sent in dedicated fields of the four EDHOC messages (EAD_1, EAD_2, EAD_3, EAD_4). EAD is opaque data to EDHOC. External authorization data is a CBOR sequence (see CBOR) consisting of one or more (ead_label, ead_value) pairs as defined below: Each EAD field is a CBOR sequence (see CBOR) consisting of one or more EAD items (ead_label, ead_value) as defined below: A security application using external authorization data need to register an ead_label, specify the ead_value format for each message (see iana-ead), and describe processing and security considerations. register a positive ead_label and the associated ead_value format for each EAD item it uses (see iana-ead), and describe processing and security considerations. Each application registers their own EAD items and defines associated operations. The application may define multiple uses of certain EAD items, e.g., the same EAD item may be used in different EDHOC messages with the same application. An EAD item can be either critical or non-critical, determined by the sign of the ead_label in the transported EAD item included in the EDHOC message. Using the registered positive value indicates that the EAD item is non-critical. The corresponding negative value indicates that the EAD item is critical. ead_label = 0 MUST NOT be used. If an endpoint receives a critical EAD item it does not recognize or a critical EAD item that contains information that it cannot process, the EDHOC protocol MUST be discontinued. A non-critical EAD item can be ignored. The specification registring a new EAD label needs to describe under what conditions the EAD item is critical or non-critical. The EAD fields of EDHOC must not be used for generic application data. Examples of the use of EAD is provided in ead-appendix. data. Examples of the use of EAD are provided in ead-appendix. 3.9."}
{"_id":"doc-en-edhoc-c50170d92a3245abfd05ce7690a864c5305675bcab1a5d3defe7c71598fe10b9","title":"","text":"Authorization Data\" under the new group name \"Ephemeral Diffie- Hellman Over COSE (EDHOC)\". The registration procedure is \"Specification Required\". The columns of the registry are Label, Message, Description, and Reference, where Label is an integer and the other columns are text strings. Description, and Reference, where Label is a positive integer and the other columns are text strings. 9.6."}
{"_id":"doc-en-edhoc-e5f6f963136be1e9cf3361b956f6e524fbf7ce6d41c94ff899aaf0242c1d0e2a","title":"","text":"3.1. The EDHOC protocol consists of three mandatory messages (message_1, message_2, message_3) between Initiator and Responder, an optional fourth message (message_4), and an error message. All EDHOC messages are CBOR Sequences RFC8742, and are deterministically encoded. fig- flow illustrates an EDHOC message flow with the optional fourth message as well as the content of each message. The protocol message_2, message_3) between an Initiator and a Responder, an optional fourth message (message_4), and an error message. The roles have slightly different security properties which should be considered when the roles are assigned, see sec-prop. All EDHOC messages are CBOR Sequences RFC8742, and are deterministically encoded. fig-flow illustrates an EDHOC message flow with the optional fourth message as well as the content of each message. The protocol elements in the figure are introduced in overview and asym. Message formatting and processing are specified in asym and error."}
{"_id":"doc-en-edhoc-1b430c85180705242ea8ee91e0b649992fd4e748c35b7bf7475b7167b72cb301","title":"","text":"respectively, and the public authentication keys are denoted G_I and G_R, respectively. For X.509 certificates the authentication key is represented with a For X.509 certificates the authentication key is represented by a SubjectPublicKeyInfo field. For CWT and CCS (see auth-cred)) the authentication key is represented with a 'cnf' claim RFC8747 containing a COSE_Key RFC9052. authentication key is represented by a 'cnf' claim RFC8747 containing a COSE_Key RFC9052. In EDHOC, a raw public key (RPK) is an authentication key encoded as a COSE_Key wrapped in a CCS. 3.5.2. The authentication credentials, CRED_I and CRED_R, contain the public authentication key of the Initiator and the Responder, respectively. The authentication credential typically also contains other parameters that needs to be verified by the application, see auth- validation, and in particular information about the identity (\"subject\") of the endpoint to prevent misbinding attacks, see identities. EDHOC relies on COSE for identification of credentials (see id_cred), for example X.509 certificates RFC5280, C509 certificates I-D.ietf- cose-cbor-encoded-cert, CWTs RFC8392 and CWT Claims Sets (CCS) RFC8392. When the identified credential is a chain or a bag, the authentication credential CRED_x is just the end entity X.509 or C509 certificate / CWT. certificate / CWT. The Initiator and the Responder MAY use different types of authentication credentials, e.g., one uses an RPK and the other uses a public key certificate. Since CRED_R is used in the integrity verification, see asym- msg2-proc, it needs to be specified such that it is identical when"}
{"_id":"doc-en-edhoc-510b2d9d214225fe74663c534e53205af98c0e655ee517923b8172d3a8a4f589","title":"","text":"SHALL be the C509Certificate I-D.ietf-cose-cbor-encoded-cert. When the authentication credential is a CWT including a COSE_Key, then CRED_x SHALL be the untagged CWT. CRED_x SHALL be the untagged CWT. When the authentication credential includes a COSE_Key but is not in a CWT, CRED_x SHALL be an untagged CCS. in a CWT, CRED_x SHALL be an untagged CCS. This is how RPKs are encoded, see fig-ccs for an example. Naked COSE_Keys are thus dressed as CCS when used in EDHOC, which is done by prefixing the COSE_Key with 0xA108A101. Naked COSE_Keys are thus dressed as CCS when used in EDHOC, in its simplest form by prefixing the COSE_Key with 0xA108A101 (a map with a 'cnf' claim). In that case the resulting authentication credential contains no other identity than the public key itself, see identities. An example of a CRED_x is shown below:"}
{"_id":"doc-en-edhoc-1c23ad0f94cd83b4b9e2620525d35594f2663cf9d396bb9f2211d0adf9187348","title":"","text":"protocol execution (specifically, cipher suite, see cs) but other parameters are only communicated and may not be negotiated (e.g., which authentication method is used, see method). Yet other parameters need to be known out-of-band. parameters need to be known out-of-band. The application decides which endpoint is Initiator and which is Responder. The purpose of an application profile is to describe the intended use of EDHOC to allow for the relevant processing and verifications to be"}
{"_id":"doc-en-edhoc-37f71fcbb7a413fec8e1bbaa3f107aad34b788b68f55dc0a6b2ca237cca4590f","title":"","text":"Transport of external authorization data. EDHOC is designed to encrypt and integrity protect as much information as possible. Symmetric keys and random material derived using EDHOC_KDF are derived with as much previous information as possible, see fig-edhoc-kdf. EDHOC is furthermore designed to be as compact and lightweight as possible, in terms of message sizes, information as possible. Symmetric keys and random material used in EDHOC are derived using EDHOC_KDF with as much previous information as possible, see fig-edhoc-kdf. EDHOC is furthermore designed to be as compact and lightweight as possible, in terms of message sizes, processing, and the ability to reuse already existing CBOR, COSE, and CoAP libraries. Like in (D)TLS, authentication is the responsibility of the application. EDHOC identifies (and optionally transports)"}
{"_id":"doc-en-edhoc-d5cddf0a654d8d511253b070905e91c4618dd0f89cc045b52c1c2075cb4e025c","title":"","text":"length, the output length in bits. fig-edhoc-kdf lists derivations made with EDHOC_KDF during message processing, where fig-edhoc-kdf lists derivations made with EDHOC_KDF, where hash_length - length of output size of the EDHOC hash algorithm of the selected cipher suite"}
{"_id":"doc-en-edhoc-32d9cf001ed8a80a6ab76b04fff4de85fa23437845eb1f0db231ebd21a15c9e2","title":"","text":"4.1.3. The pseudorandom key PRK_out, derived as shown in fig-edhoc-kdf is The pseudorandom key PRK_out, derived as shown in fig-edhoc-kdf, is the output session key of a successful EDHOC exchange. Keys for applications are derived using EDHOC_Exporter from PRK_exporter (see exporter) which in turn is derived from PRK_out. For the purpose of generating application keys, it is sufficient to store PRK_out or PRK_exporter. (Note that the word \"store\" used here does not imply that the application has access to the plaintext PRK_out since that may be reserved for code within a Trusted Execution Environment, see impl-cons). Keys for applications are derived using EDHOC_Exporter (see exporter) from PRK_exporter, which in turn is derived from PRK_out as shown in fig-edhoc-kdf. For the purpose of generating application keys, it is sufficient to store PRK_out or PRK_exporter. (Note that the word \"store\" used here does not imply that the application has access to the plaintext PRK_out since that may be reserved for code within a Trusted Execution Environment, see impl-cons). 4.2. This section defines EDHOC_Exporter in terms of EDHOC_KDF and PRK_out. A key update function is defined in keyupdate. PRK_exporter. A key update function is defined in keyupdate. 4.2.1."}
{"_id":"doc-en-edhoc-85293cb053b7f6d87ee0e25d977132a0ed94ff7f974815966f4e944900d9abee","title":"","text":"length is a uint defined by the application PRK_exporter is derived from PRK_out: where hash_length denotes the output size in bytes of the EDHOC hash algorithm of the selected cipher suite. The (exporter_label, context) pair used in EDHOC_Exporter must be unique, i.e., an (exporter_label, context) MUST NOT be used for two different purposes. However an application can re-derive the same"}
{"_id":"doc-en-edhoc-c3527951bcc3bc7b24222d32cb5f1f2b31be574b0aeb074223a15244999eedd9","title":"","text":"(method equals 1 or 3), then mac_length_2 is the EDHOC MAC length of the selected cipher suite. If the Responder authenticates with a signature key (method equals 0 or 2), then mac_length_2 is equal to the output size of the EDHOC hash algorithm of the selected cipher suite. mac_length_2 is equal to hash_length. ID_CRED_R - identifier to facilitate the retrieval of CRED_R, see"}
{"_id":"doc-en-edhoc-1dd1626c32ef63c812e06a0b4d52cc30832decf84c52a7848ea5e7c70b889fc0","title":"","text":"(method equals 2 or 3), then mac_length_3 is the EDHOC MAC length of the selected cipher suite. If the Initiator authenticates with a signature key (method equals 0 or 1), then mac_length_3 is equal to the output size of the EDHOC hash algorithm of the selected cipher suite. mac_length_3 is equal to hash_length. ID_CRED_I - identifier to facilitate the retrieval of CRED_I, see"}
{"_id":"doc-en-external-psk-design-team-9f1b500e2e90a8d9c07f396b6b27218849e2282dd65e2f0df3caf6fbd9ef4b4d","title":"","text":"4. Applications MUST use external PSKs that adhere to the following requirements: Each PSK MUST be derived from at least 128 of entropy and MUST be at least 128-bits long unless the TLS handshake is being used with a separate key establishment mechanism such as a Diffie-Hellman exchange. This recommendation protects against passive attacks using exhaustive search of the PSK. Applications MUST adhere to the following requirements for external PSKs: Each PSK SHOULD be derived from at least 128 bits of entropy, MUST be at least 128 bits long, and SHOULD be combined with a DH exchange for forward secrecy. Low entropy PSKs, i.e., those derived from less than 128 bits of entropy, MUST be combined with a Password Authenticated Key Exchange (PAKE) mechanism. Each PSK MUST NOT be shared between with more than two logical nodes. As a result, an agent that acts as both a client and a"}
{"_id":"doc-en-external-psk-design-team-ff85f505f7af44c91991ce6de4e30efb277b20c7edd5ae08f2ad6e43e405b256","title":"","text":"violated, then the security properties of TLS are severely weakened. As discussed in use-cases, there are use cases where it is desirable for multiple clients or multiple servers share a PSK. If this is for multiple clients or multiple servers to share a PSK. If this is done naively by having all members share a common key, then TLS only authenticates the entire group, and the security of the overall system is inherently rather brittle. There are a number of obvious"}
{"_id":"doc-en-external-psk-design-team-5a83d2a36188e1e658508d7d943bf403bd3ba391428009a29de197d3e9c90fdd","title":"","text":"appearing in cleartext in a ClientHello. As a result, a passive adversary can link two or more connections together that use the same external PSK on the wire. Applications should take precautions when using external PSKs if these risks. using external PSKs to mitigate these risks. In addition to linkability in the network, external PSKs are intrinsically linkable by PSK receivers. Specifically, servers can"}
{"_id":"doc-en-external-psk-design-team-f7d518cbd771addf822239a031f8e88613b61549c18cbe7cc54597ef67b50ed5","title":"","text":"constrained UI. Moreover, PSK production lacks guidance unlike user passwords. Some devices are provisioned PSKs via an out-of-band, cloud-based Some devices provision PSKs via an out-of-band, cloud-based syncing protocol. Some secrets may be baked into or hardware or software device"}
{"_id":"doc-en-external-psk-design-team-d535adb1d55b89ac71805bf2f8e2da1b72a88e7f0eb8af48b2313004a1cc8890","title":"","text":"Each PSK SHOULD be derived from at least 128 bits of entropy, MUST be at least 128 bits long, and SHOULD be combined with a DH exchange for forward secrecy. Low entropy PSKs, i.e., those derived from less than 128 bits of entropy, MUST be combined with a Password Authenticated Key Exchange (PAKE) mechanism. exchange for forward secrecy. As discussed in sec-properties, low entropy PSKs, i.e., those derived from less than 128 bits of entropy, are subject to attack and SHOULD be avoided. Low entropy keys are only secure against active attack if a Password Authenticated Key Exchange (PAKE) is used with TLS. Each PSK MUST NOT be shared between with more than two logical nodes. As a result, an agent that acts as both a client and a"}
{"_id":"doc-en-external-psk-design-team-3286fc898a5e7744e0ff124bac66dcc62093aeeed2849e738452d0e796250427","title":"","text":"6.1. Most major TLS implementations support external PSKs. And all have a common interface that applications may use when supplying them for individual connections. Details about existing stacks at the time of writing are below. Most major TLS implementations support external PSKs. Stacks supporting external PSKs provide interfaces that applications may use when supplying them for individual connections. Details about existing stacks at the time of writing are below. OpenSSL and BoringSSL: Applications specify support for external PSKs via distinct ciphersuites. They also then configure callbacks that are invoked for PSK selection during the handshake. These callbacks must provide a PSK identity (as a character string) and key (as a byte string). (If no identity is provided, a default one is assumed.) They are typically invoked with a PSK hint, i.e., the hint provided by the server as per RFC4279. The PSK length is validated to be between [1, 256] bytes upon selection. These callbacks must provide a PSK identity and key. The exact format of the callback depends on the negotiated TLS protocol version with new callback functions added specifically to OpenSSL for TLS 1.3 RFC8446 PSK support. The PSK length is validated to be between [1, 256] bytes. The PSK identity may be up to 128 bytes long. mbedTLS: Client applications configure PSKs before creating a connection by providing the PSK identity and value inline. Servers must implement callbacks similar to that of OpenSSL. PSK lengths are validate to be between [1, 16] bytes. Servers must implement callbacks similar to that of OpenSSL. Both PSK identity and key lengths may be between [1, 16] bytes long. gnuTLS: Applications configure PSK values, either as raw byte strings or hexadecimal strings. The PSK size is not validated. strings or hexadecimal strings. The PSK identity and key size are not validated. wolfSSL: Applications configure PSKs with callbacks similar to OpenSSL."}
{"_id":"doc-en-external-psk-design-team-6337e99e43888e0d846da0a62960d52f0b6ef047c05ae844d7d41238ed93d262","title":"","text":"Deployments should take care that the length of the PSK identity is sufficient to avoid obvious collisions. [[OPEN ISSUE: discuss implication of collisions between external and resumption PSKs.]] 6.1.2. It is possible, though unlikely, that an external PSK identity may clash with a resumption PSK identity. The TLS stack implementation and sequencing of PSK callbacks influences the application's behaviour when identity collisions occur. When a server receives a PSK identity in a TLS 1.3 ClientHello, some TLS stacks execute the application's registered callback function before checking the stack's internal session resumption cache. This means that if a PSK identity collision occurs, the application will be given precedence over how to handle the PSK. 7."}
{"_id":"doc-en-fec-8cd4c0dec5f6ef644b0e2c1a571d4fe79066efc72de5d0986895f49744a39746","title":"","text":"indicated by congestion control and the receiver, this will lead to less bandwidth available for the primary encoding, even when the redundant data is not being used. This is in contrast to methods like RTX RFC4588 or flexfec I-D.ietf-payload-flexible-fec-scheme retransmissions, which only transmit redundant data when necessary, at the cost of an extra roundtrip. like RTX RFC4588 or flexfec's retransmission mode ( I-D.ietf-payload- flexible-fec-scheme, Section 1.1.7), which only transmit redundant data when necessary, at the cost of an extra roundtrip. Given this, WebRTC implementations SHOULD consider using RTX or flexfec retransmissions instead of FEC when RTT is low, and SHOULD"}
{"_id":"doc-en-fec-82e06b27369e2bb456d5e2764b6cf8b797133ff4b9164827360602f27c7ec783","title":"","text":"This approach, as described in RFC2198, allows for redundant data to be piggybacked on an existing primary encoding, all in a single packet. This redundant data may be an exact copy of a previous packet, or for codecs that support variable-bitrate encodings, payload, or for codecs that support variable-bitrate encodings, possibly a smaller, lower-quality representation. In certain cases, the redundant data could include multiple prior packets. the redundant data could include encodings of multiple prior audio frames. Since there is only a single set of packet headers, this approach allows for a very efficient representation of primary + redundant"}
{"_id":"doc-en-fec-530b0a8f94ee55b6a0b9b96dd36a331ed4b346a48d85d8b2b0a91d78a1a37edd","title":"","text":"Some audio codecs, notably Opus RFC6716 and AMR RFC4867, support their own in-band FEC mechanism, where redundant data is included in the codec payload. the codec payload. This is similar to the redundant encoding mechanism described above, but as it adds no additional framing, it can be slightly more efficient. For Opus, packets deemed as important are re-encoded at a lower bitrate and added to the subsequent packet, allowing partial recovery For Opus, audio frames deemed important are re-encoded at a lower bitrate and appended to the next payload, allowing partial recovery of a lost packet. This scheme is fairly efficient; experiments performed indicate that when Opus FEC is used, the overhead imposed is about 20-30%, depending on the amount of protection needed. Note that this mechanism can only carry redundancy information for the immediately preceding packet; as such the decoder cannot fully recover multiple consecutive lost packets, which can be a problem on wireless networks. See RFC6716, Section 2.1.7 for complete details. is only about 20-30%, depending on the amount of protection needed. Note that this mechanism can only carry redundancy information for the immediately preceding audio frame; as such the decoder cannot fully recover multiple consecutive lost packets, which can be a problem on wireless networks. See RFC6716, Section 2.1.7 for complete details. For AMR/AMR-WB, packets can contain copies or lower-quality encodings of multiple prior audio frames. This mechanism is similar to the redundant encoding mechanism described above, but as it adds no additional framing, it can be slightly more efficient. See RFC4867, Section 3.7.1 for details on this mechanism. of multiple prior audio frames. See RFC4867, Section 3.7.1 for details on this mechanism. In-band FEC mechanisms cannot recover any of the RTP header."}
{"_id":"doc-en-fec-54fb52df3ac8c94ef94a62e6457a2371e75313600de09c6fd7325d157b1e7e5f","title":"","text":"Support for a SSRC-multiplexed flexfec stream to protect a given RTP stream SHOULD be indicated by including one of the formats described in I-D.ietf-payload-flexible-fec-scheme, Section 5.1, as an in I-D.ietf-payload-flexible-fec-scheme, Section 5.1.2, as an additional supported media type for the associated m= section in the SDP offer RFC3264. As mentioned above, when BUNDLE is used, only a single flexfec repair stream will be created for each BUNDLE group,"}
{"_id":"doc-en-gnap-core-protocol-02c4ee00c79fd027db9b46c7aae08cf7d373578aeed0e169f574a880d93d191c","title":"","text":"result MAY be used by the client instance in the request- capabilities of the request. OPTIONAL. A list of the AS's interaction methods. The values of this list correspond to the possible fields in the request- interact of the request. OPTIONAL. A list of the AS's interaction start methods. The values of this list correspond to the possible values for the request-interact-start of the request. OPTIONAL. A list of the AS's interaction finish methods. The values of this list correspond to the possible values for the method element of the request-interact-finish of the request. OPTIONAL. A list of the AS's supported key proofing mechanisms. The values of this list correspond to possible values of the"}
{"_id":"doc-en-gnap-core-protocol-09e9c190de88c6fba6f965fee60dcaae771896be7ad725dc83e5d2b1c45d7850","title":"","text":"Mutual TLS certificate verification OAuth Demonstration of Proof-of-Possession key proof header HTTP Signing signature header OAuth PoP key proof authentication header"}
{"_id":"doc-en-gnap-core-protocol-aa18f8b4059445d1ddb25e6e132e588d27557da993275497595c28026c38875c","title":"","text":"7.3.4. This method is indicated by \"dpop\" in the \"proof\" field. The signer creates a Demonstration of Proof-of-Possession signature header as described in I-D.ietf-oauth-dpop section 2. In addition, this specification defines the following fields to be added to the DPoP payload: Digest of the request body as the value of the Digest header defined in RFC3230. When a request contains a message body, such as a POST or PUT request, this field is REQUIRED. In this example, the request body is the following JSON object: ~~~ { \"access_token\": { \"access\": [ \"dolphin-metadata\" ] }, \"interact\": { \"start\": [\"redirect\"], \"finish\": { \"method\": \"redirect\", \"uri\": \"https://client.foo/callback\", \"nonce\": \"VJLO6A4CAYLBXHTR0KRO\" } }, \"client\": { \"proof\": \"dpop\", \"key\": { \"jwk\": { \"kid\": \"gnap-rsa\", \"kty\": \"RSA\", \"e\": \"AQAB\", \"alg\": \"RS256\", \"n\": \"hYOJ- XOKISdMMShn_G4W9m20mT0VWtQBsmBBkI2cmRt4Ai8Bf YdHsFzAtYKOjpBR1RpKpJmVKxIGNy0g6Z3ad2XYsh8KowlyVy8IkZ8NMwSrcUIBZG YXjHpwjzvfGvXH_5KJlnR3_uRUp4Z4Ujk2bCaKegDn11V2vxE41hqaPUnhRZxe0jR ETddzsE3mu1SK8dTCROjwUl14mUNo8iTrTm4n0qDadz8BkPo-uv4BC0bunS0K3bA_ 3UgVp7zBlQFoFnLTO2uWp_muLEWGl67gBq9MO3brKXfGhi3kOzywzwPTuq-cVQDyE N7aL0SxCb3Hc4IdqDaMg8qHUyObpPitDQ\" } } \"display\": { \"name\": \"My Client Display Name\", \"uri\": \"https://client.foo/\" }, } } ~~~ The JOSE header contains the following parameters, including the public key: The JWS Payload contains the following JWT claims, including a hash of the body: This results in the following full HTTP message request: The verifier MUST parse and validate the DPoP proof header as defined in I-D.ietf-oauth-dpop. If the HTTP message request includes a message body, the verifier MUST calculate the digest of the body and compare it to the \"htd\" value. The verifier MUST ensure the key presented in the DPoP proof header is the same as the expected key of the signer. 7.3.5. This method is indicated by \"httpsig\" in the \"proof\" field. The sender creates an HTTP Message Signature as described in I-D.ietf- httpbis-message-signatures."}
{"_id":"doc-en-gnap-core-protocol-9bc9878116ca756f92e153fc50e421cb8cb47bea03b912f31cbfb1f12cc92f58","title":"","text":"The verifier MUST validate the signature against the expected key of the signer. 7.3.6. 7.3.5. This method is indicated by \"oauthpop\" in the \"proof\" field. The signer creates an HTTP Authorization PoP header as described in I-"}
{"_id":"doc-en-gnap-core-protocol-4a8106697e62e7c1f9e2006667ebffa4fec11d7e3b8b1a1d692d5b035f8d3484","title":"","text":"If the client instance is capable of directing the end-user to a URL defined by the AS at runtime, the client instance indicates this by sending the \"redirect\" field with the boolean value \"true\". The means by which the client instance will activate this URL is out of scope of this specification, but common methods include an HTTP redirect, launching a browser on the end-user's device, providing a scannable image encoding, and printing out a URL to an interactive console. While this URL is generally hosted at the AS, the client instance can make no assumptions about its contents, composition, or relationship to the AS grant URL. including \"redirect\" in the array under the \"start\" key. The means by which the client instance will activate this URL is out of scope of this specification, but common methods include an HTTP redirect, launching a browser on the end-user's device, providing a scannable image encoding, and printing out a URL to an interactive console. While this URL is generally hosted at the AS, the client instance can make no assumptions about its contents, composition, or relationship to the AS grant URL. If this interaction mode is supported for this client instance and request, the AS returns a redirect interaction response response-"}
{"_id":"doc-en-gnap-core-protocol-d04e470aec27bcaacb67f7ba06c273cfd2d8956a301c2c024a540f04c7312f68","title":"","text":"If the client instance can open a URL associated with an application on the end-user's device, the client instance indicates this by sending the \"app\" field with boolean value \"true\". The means by including \"app\" in the array under the \"start\" key. The means by which the client instance determines the application to open with this URL are out of scope of this specification."}
{"_id":"doc-en-gnap-core-protocol-df9f8779f05c37b1cb8c631949514a34851ef8313d7c5fd4a2ec89d6589f1fc5","title":"","text":"If the client instance is capable of displaying or otherwise communicating a short, human-entered code to the RO, the client instance indicates this by sending the \"user_code\" field with the boolean value \"true\". This code is to be entered at a static URL that does not change at runtime. While this URL is generally hosted at the AS, the client instance can make no assumptions about its instance indicates this by including \"user_code\" in the array under the \"start\" key. This code is to be entered at a static URL that does not change at runtime. While this URL is generally hosted at the AS, the client instance can make no assumptions about its contents, composition, or relationship to the AS grant URL. If this interaction mode is supported for this client instance and"}
{"_id":"doc-en-gnap-core-protocol-ca99ad0372d2b6fcd039032b7f4dea30c3d715c9d4f99733841a9e0db693c108","title":"","text":"ability given to a subject to perform a given operation on a resource under the control of an RS. person, organization or device. person, organization or device. It decides whether and under which conditions its attributes can be disclosed to other parties. statement asserted by an AS about a subject."}
{"_id":"doc-en-gnap-core-protocol-916a79c198d22b037e4ee9670b8b8c1325721be6799dfd735a94dce2c449aee0","title":"","text":"as far as the overall protocol is concerned. A single role need not be deployed as a monolithic service. For example, A client instance could have components that are installed example, a client instance could have components that are installed on the end user's device as well as a back-end system that it communicates with. If both of these components participate in the delegation protocol, they are both considered part of the client"}
{"_id":"doc-en-gnap-core-protocol-863cca6826f1975d522063b9c66c4bbbd01f93725f7c707cfba59d8a6d29d9b0","title":"","text":"In some circumstances, the information needed at a given stage is communicated out of band or is preconfigured between the components or entities performing the roles. For example, one entity can fulfil multiple roles, and so explicit communication between the roles is not necessary within the protocol flow. Additionally some components may not be involved in all use cases. For example, a client instance could be calling the AS just to get direct user information and have no need to get an access token to call an RS. or entities performing the roles. For example, one entity can fulfill multiple roles, and so explicit communication between the roles is not necessary within the protocol flow. Additionally some components may not be involved in all use cases. For example, a client instance could be calling the AS just to get direct user information and have no need to get an access token to call an RS. 1.5.1."}
{"_id":"doc-en-gnap-core-protocol-adf8ccaa070e88fdae8e7af5bf2e1cfa811dfd5e3d2c8a9f42717862a296dd57","title":"","text":"The client instance stores the continuation information from (2) for use in (8) and (10). The client instance then interaction- redirect given by the AS in (2). usercode given by the AS in (2). The user's directs their browser to the user code URI. This URI is stable and can be communicated via the client software's The users directs their browser to the user code URI. This URI is stable and can be communicated via the client software's documentation, the AS documentation, or the client software itself. Since it is assumed that the RO will interact with the AS through a secondary device, the client instance does not provide a"}
{"_id":"doc-en-gnap-core-protocol-cef4fdd120bd76a41ddca849a4b311d27be8f772f43cf76225519884bc22929f","title":"","text":"The client instance request. The client instance does not send any interaction modes to the server. The AS determines that the request is been authorized, the AS grants access to the information in the form of response-token to the client instance. Note that response-subject is not generally The AS determines that the request has been authorized, the AS grants access to the resource in the form of response-token to the client instance. Note that response-subject is not generally applicable in this use case, as there is no user involved. The client instance use-access-token to call the RS."}
{"_id":"doc-en-gnap-core-protocol-843b72f988161a3708a17686dee9d8d8f408be6799a23141427c0f2a8fec7dc1","title":"","text":"the RS again. The RS validates the access token and determines that the access token is expired The RS responds to the client instance with an token is expired. The RS responds to the client instance with an error. The client instance calls the token management URI returned in (2)"}
{"_id":"doc-en-gnap-core-protocol-c9542a010c75169cc4b8c41234dd94ed415f8563a4014fecd7ba0609fabd2816","title":"","text":"2. To start a request, the client instance sends RFC8259 document with To start a request, the client instance sends a RFC8259 document with an object as its root. Each member of the request object represents a different aspect of the client instance's request. Each field is described in detail in a section below. Additional members of this request object can be defined by extensions to this protocol as described in extensions to this protocol as described in request-extending. A non-normative example of a grant request is below:"}
{"_id":"doc-en-gnap-core-protocol-0103b8f3ba4d6f413fd7eff29c9606ff77c968c0a6b0b26c1fe865ca6384f996","title":"","text":"to determine appropriate key information, the client instance can send this instance identifier as a direct reference value in lieu of the \"client\" object. The instance identifier MAY be assigned to a client instance at runtime through the response-dynamic-handles or MAY be obtained in another fashion, such as a static registration process at the AS. client instance at runtime through a grant response (response- dynamic-handles) or MAY be obtained in another fashion, such as a static registration process at the AS. When the AS receives a request with an instance identifier, the AS MUST ensure that the key used to binding-keys is associated with the"}
{"_id":"doc-en-gnap-core-protocol-aab8279ccebfb9d11d5f86359feeaa935501db6bc2e372979f03f8e9b19961d5","title":"","text":"In response to a client instance's request, the AS responds with a JSON object as the HTTP entity body. Each possible field is detailed in the sections below in the sections below. In this example, the AS is returning an response-interact-redirect, a response-interact-finish, and a response-continue."}
{"_id":"doc-en-gnap-core-protocol-1a9f09ed0395fafe38c1dba671fa6c11be3ddc38a84220cf72a5dce4a9939645","title":"","text":"it can request-interact-usercode. The AS determines that interaction is needed and response with a response-interact-usercode. This could optionally include a URI to direct the user to, but this URI should be static and so could be configured in the client instance's documentation. The AS also includes information the client instance will need to response- continue in (8) and (10). The AS associates this continuation information with an ongoing request that will be referenced in (4), (6), (8), and (10). response-interact-usercode. The AS also includes information the client instance will need to response-continue in (8) and (10). The AS associates this continuation information with an ongoing request that will be referenced in (4), (6), (8), and (10). The client instance stores the continuation information from (2) for use in (8) and (10). The client instance then interaction-"}
{"_id":"doc-en-gnap-core-protocol-d098050bb2500fbcc9889ce580ad0df524c63d2c1361f3b7bb3471178ba57b70","title":"","text":"any interaction modes to the server, indicating that it does not expect to interact with the RO. The client instance can also signal which RO it requires authorization from, if known, by using the request-user. the request-user. It's also possible for the AS to determine which RO needs to be contacted by the nature of what access is being requested. The AS determines that interaction is needed, but the client instance cannot interact with the RO. The AS response with the"}
{"_id":"doc-en-gnap-core-protocol-b8bfac2393e8a5fad240ac382f6ae6909d47ca1fe10946698e01968ce5523880","title":"","text":"response-token-single, the proof of that key MUST be used when presenting the access token. A key presented by value MUST be a public key in at least one supported format. If a key is sent in multiple formats, all the key format values MUST be equivalent. Note that while most formats present the full value of the public key, some formats present a value cryptographically derived from the public key. See additional discussion of public keys in security-symmetric. A key presented by value MUST be a public key in at least one supported format. If a key is sent in multiple formats, all the key format values MUST be equivalent. Note that while most formats present the full value of the public key, some formats present a value cryptographically derived from the public key. A key presented by value MUST be a public key and MUST be presented in one and only one supported format, as discussed in security- multiple-key-formats. Note that while most formats present the full value of the public key, some formats present a value cryptographically derived from the public key. See additional discussion of the presentation of public keys in security-symmetric. Additional key formats are defined in the IANA-key-formats. This non-normative example shows a single key presented in multiple formats. This example key is intended to be used with the httpsig- binding proofing mechanism, as indicated by the \"httpsig\" value of the \"proof\" field. This non-normative example shows a single key presented in two different formats. This example key is intended to be used with the httpsig-binding proofing mechanism, as indicated by the \"httpsig\" value of the \"proof\" field. As a JSON Web Key: As a certificate in PEM format: 7.1.1."}
{"_id":"doc-en-gnap-core-protocol-f33b79527fb247b67f05b8bf4ef1fc9a7b31866f7b65cf29736a3813223a09bc","title":"","text":"SSRF is somewhat more difficult to manage at runtime, and systems should generally refuse to fetch a URI if unsure. 12.33. Keys presented by value are allowed to be in only a single format, as discussed in key-format. Presenting the same key in multiple formats is not allowed and is considered an error in the request. If multiple keys formats were allowed, receivers of these key definitions need to be able to make sure that it's the same key represented in each field and not simply use one of the key formats without checking for equivalence. If equivalence were not carefully checked, it is possible for an attacker to insert their own key into one of the formats without needing to have control over the other formats. This could potentially lead to a situation where one key is used by part of the system (such as identifying the client instance) and a different key in a different format in the same message is used for other things, like calculating signature validity. To combat this, all keys presented by value have to be in exactly one supported format known by the receiver. Normally, a client instance is going to be configured with its keys in a single format, and it will simply present that format as-is to the AS in its request. A client instance capable of multiple formats can use discovery to determine which formats are supported, if desired. An AS should be generous in supporting many different key formats to allow different types of client software and client instance deployments. 13. The privacy considerations in this section are modeled after the list"}
{"_id":"doc-en-gnap-core-protocol-e383a0c5f315aede939765d55eb7c4488982d477cbc34d09034714b1a22a06a9","title":"","text":"An example set of protocol messages for this method can be found in example-async. Additional considerations for asynchronous interactions like this are discussed in security-async. 1.6.5. In this example flow, the AS policy allows the client instance to"}
{"_id":"doc-en-gnap-core-protocol-112a751a731c8d17f31abc46911b9585c2e19ccdc45623997e2a42c8e9eda92e","title":"","text":"returned and it might not match what the client instance requested, see the section on subject information for details. 1.6.8. In this scenario, the end user and resource owner are two different people. In this scenario, the client instance already knows who the end user is, likely through a separate authentication process. The end user, operating the client instance, needs to get subject information about another person in the system, the RO. The RO is given an opportunity to release this information using an asynchronous interaction method with the AS. This scenario would apply, for instance, when the end user is an agent in a call-center and the resource owner is a customer authorizing the call center agent to access their account on their behalf. Precondition: The end user is authenticated to the client instance, and the client instance has an identifier representing the end user that it can present to the AS. This identifier should be unique to the particular session with the client instance and the AS. The RO communicates a human-readable identifier to the end user, such as an email address or account number. This communication happens out of band from the protocol, such as over the phone between parties. Note that the RO is not interacting with the client instance. The end user communicates the identifier to the client instance. The means by which the identifier is communicated to the client instance is out of scope for this specification. The client instance request. The request includes the RO's identifier in the request-subject \"sub_ids\" field, and the end user's identifier in the request-user of the request. The request includes no interaction start methods, since the end user is not expected to be the one interacting with the AS. The request does include the request-interact-callback-push to allow the AS to signal to the client instance when the interaction with the RO has concluded. The AS sees that the identifier for the end user and subject being requested are different. The AS determines that it can reach out to the RO asynchronously for approval. While it is doing so, the AS returns a response-continue with a \"finish\" nonce to allow the client instance to keep polling after interaction with the RO has concluded. The AS contacts the RO and has them authenticate to the system. The means for doing this are outside the scope of this specification, but the identity of the RO is known from the subject identifier sent in (3). The RO is prompted to authorize the end user's request via the client instance. Since the end user was identified in (3) via the user field, the AS can show this information to the RO during the authorization request. The RO completes the authorization with the AS. The AS marks the request as . The RO pushes the interaction-pushback to the client instance. Note that in the case the RO cannot be reached or the RO denies the request, the AS still sends the interaction finish message to the client instance, after which the client instance can negotiate next steps if possible. The client instance validates the interaction finish message and continue-after-interaction. The AS returns the RO's response-subject to the client instance. The client instance can display or otherwise utilize the RO's user information in its session with the end user. Note that since the client instance requested different sets of user information in (3), the client instance does not conflate the end user with the RO. Additional considerations for asynchronous interactions like this are discussed in security-async. 2. To start a request, the client instance sends a RFC8259 document with"}
{"_id":"doc-en-gnap-core-protocol-c99091c0a09b5a6da7756a41ef2bf9c8aaa48fb29721cbd706a1920ada806560","title":"","text":"12.34. GNAP allows the RO to be contacted by the AS asynchronously, outside the regular flow of the protocol. This allows for some advanced use cases, such as cross-user authentication or information release, but such advanced use cases have some distinct issues that implementors need to be fully aware of before using these features. First, in many applications, the return of a subject information to the client instance could indicate to the client instance that the end-user is the party represented by that information, functionally allowing the end-user to authenticate to the client application. While the details of a fully functional authentication protocol are outside the scope of GNAP, it is a common exercise for a client instance to be requesting information about the end user. This is facilitated by the several interaction-start defined in GNAP that allow the end user to begin interaction directly with the AS. However, when the subject of the information is intentionally not the end-user, the client application will need some way to differentiate between requests for authentication of the end user and requests for information about a different user. Confusing these states could lead to an attacker having their account associated with a privileged user. Client instances can mitigate this by having distinct code paths for primary end user authentication and requesting subject information about secondary users, such as in a call center. In such use cases, the client software used by the resource owner (the caller) and the end-user (the agent) are generally distinct, allowing the AS to differentiate between the agent's corporate device making the request and the caller's personal device approving the request. Second, RO's interacting asynchronously do not usually have the same context as an end user in an application attempting to perform the task needing authorization. As such, the asynchronous requests for authorization coming to the RO from the AS might have very little to do with what the RO is doing at the time. This situation can consequently lead to authorization fatigue on the part of the RO, where any incoming authorization request is quickly approved and dispatched without the RO making a proper verification of the request. An attacker can exploit this fatigue and get the RO to authorize the attacker's system for access. To mitigate this, AS systems deploying asynchronous authorization should only prompt the RO when the RO is expecting such a request, and significant user experience engineering efforts need to be employed to ensure the RO can clearly make the appropriate security decision. Furthermore, audit capability, and the ability to undo access decisions that may be ongoing, is particularly important in the asynchronous case. An attacker may aim to gain access to confidential or sensitive resources. The measures for hardening and monitoring resource server systems (beyond protection with access tokens) is out of the scope of"}
{"_id":"doc-en-gnap-core-protocol-0f7837fb1c430274e157b4ba51eb6d59cf60855f5db6f2f96642e000ed29602b","title":"","text":"4.2. If an interaction response-interact-finish method is associated with the current request, the AS MUST follow the appropriate method at upon completion of interaction in order to signal the client instance to continue, except for some limited error cases discussed below. If a finish method is not available, the AS SHOULD instruct the RO to the current request, the AS MUST follow the appropriate method upon completion of interaction in order to signal the client instance to continue, except for some limited error cases discussed below. If a finish method is not available, the AS SHOULD instruct the RO to return to the client instance upon completion. The AS MUST create an interaction reference and associate that"}
{"_id":"doc-en-gnap-core-protocol-481a12c44cec8c8efb636808891de248c08862916d4b3a21630d967fa0ba444d","title":"","text":"appropriate cryptographic processes to ensure the integrity of the assertion. For example, when SAML 2 assertions are used, the receiver hast to For example, when SAML 2 assertions are used, the receiver has to parse an XML document. There are many well-known security vulnerabilities in XML parsers, and the XML standard itself can be attacked through the use of processing instructions and entity"}
{"_id":"doc-en-gnap-core-protocol-4715714a2420c632c1257656c2464ce3807a021a321b733ff4346e82f93ad04c","title":"","text":"usercode and the AS supports this mode for the client instance's request, the AS responds with a \"user_code\" field. This field is string containing a unique short code that the user can type into a web page. This string MUST be case-insensitive, MUST consist of only easily typeable characters (such as letters or numbers). The time in which this code will be accepted SHOULD be short lived, such as several minutes. It is RECOMMENDED that this code be no more than web page. To facilitate usability, this string MUST be case- insensitive, MUST consist of only easily typeable characters (such as letters or numbers). The string MUST be randomly generated so as to be unguessable by an attacker within the time it is accepted. The time in which this code will be accepted SHOULD be short lived, such as several minutes. It is RECOMMENDED that this code be no more than eight characters in length. The client instance MUST communicate the \"user_code\" value to the end"}
{"_id":"doc-en-gnap-core-protocol-80669b6f27e6cb9fc1b39aa0cb7f8b474f8fb6ac2c0dfdc2c8259ecb716946c3","title":"","text":"When the end user is directed to enter a short code through the response-interact-usercode mode, the client instance communicates the user code to the end user and directs the end user to enter that code at an associated URI. This mode is designed to be used when the client instance is not able to communicate or facilitate launching an arbitrary URI. The associated URI could be statically configured with the client instance or in the client software's documentation. As a consequence, these URIs SHOULD be short. The user code URI MUST be reachable from the end user's browser, though the URI is usually be opened on a separate device from the client instance itself. The URI MUST be accessible from an HTTP GET request and MUST be protected by HTTPS or equivalent means. at an associated URI. The client instance MAY format the user code in such a way as to facilitate memorability and transfer of the code, so long as this formatting does not alter the value as accepted at the user code URI. For example, a client instance receiving the user code \"A1BC3DFF\" could choose to display this to the user as \"A1BC 3DFF\", breaking up the long string into two shorter strings. In this example, the space in between the two parts would be removed upon its entry into the user code URI. This mode is designed to be used when the client instance is not able to communicate or facilitate launching an arbitrary URI. The associated URI could be statically configured with the client instance or in the client software's documentation. As a consequence, these URIs SHOULD be short. The user code URI MUST be reachable from the end user's browser, though the URI is usually be opened on a separate device from the client instance itself. The URI MUST be accessible from an HTTP GET request and MUST be protected by HTTPS or equivalent means. In many cases, the URI indicates a web page hosted at the AS, allowing the AS to authenticate the end user as the RO and"}
{"_id":"doc-en-gnap-core-protocol-148489b8f083dd74b438150a6a0d918c8891d43d2d6c1207568c223e2871a938","title":"","text":"When the end user is directed to enter a short code through the response-interact-usercodeuri mode, the client instance communicates the user code and associated URI to the end user and directs the end user to enter that code at the URI. This mode is used when the client instance is not able to facilitate launching a complex arbitrary URI but can communicate arbitrary values like URIs. As a consequence, these URIs SHOULD be short to allow the URI to be typed by the end user. The client instance MUST NOT modify the URI when communicating it to the end user; in particular the client instance MUST NOT add any parameters to the URI. The user code URI MUST be reachable from the end user's browser, though the URI is usually be opened on a separate device from the client instance itself. The URI MUST be accessible from an HTTP GET request and MUST be protected by HTTPS or equivalent means. user to enter that code at the URI. The client instance MAY format the user code in such a way as to facilitate memorability and transfer of the code, so long as this formatting does not alter the value as accepted at the user code URI. For example, a client instance receiving the user code \"A1BC3DFF\" could choose to display this to the user as \"A1BC 3DFF\", breaking up the long string into two shorter strings. In this example, the space in between the two parts would be removed upon its entry into the user code URI. This mode is used when the client instance is not able to facilitate launching a complex arbitrary URI but can communicate arbitrary values like URIs. As a consequence, these URIs SHOULD be short to allow the URI to be typed by the end user. The client instance MUST NOT modify the URI when communicating it to the end user; in particular the client instance MUST NOT add any parameters to the URI. The user code URI MUST be reachable from the end user's browser, though the URI is usually be opened on a separate device from the client instance itself. The URI MUST be accessible from an HTTP GET request and MUST be protected by HTTPS or equivalent means. In many cases, the URI indicates a web page hosted at the AS, allowing the AS to authenticate the end user as the RO and"}
{"_id":"doc-en-gnap-core-protocol-a8bf5d3343a48054a4a2696968fd5168d0fc7c4d1665bbc5a1da45b8d6e274bc","title":"","text":"13.27. Several parts of the GNAP process make use of unguessable randomized values, such as nonces, tokens, and randomized URIs. Since these values are intended to be unique, a sufficiently powerful attacker could make a large number of requests to trigger generation of randomized values in an attempt to exhaust the random number values, such as nonces, tokens, user codes, and randomized URIs. Since these values are intended to be unique, a sufficiently powerful attacker could make a large number of requests to trigger generation of randomized values in an attempt to exhaust the random number generation space. While this attack is particularly applicable to the AS, client software could likewise be targeted by an attacker triggering new grant requests against an AS."}
{"_id":"doc-en-gnap-core-protocol-d98715142366e21f63a21b2677b569d203aae2409a01ad85e170f2ba4c6c3bca","title":"","text":"This specification defines the following interaction start modes: All interaction start method definitions MUST provide enough information to uniquely identify the grant request during the interaction. In the \"redirect\" and \"app\" modes, this is done using a unique URI (including its parameters). In the \"user_code\" and \"user_code_uri\" mode, this is done using the value of the user code. Additional start modes are defined in the IANA-interaction-start- modes."}
{"_id":"doc-en-gnap-core-protocol-865d5ec485071602c73bacc5009d3473a7988f139901d27c96cf0f936cab1775","title":"","text":"methods: If interaction finishing is supported for this client instance and request, the AS response-interact-finish used by the client instance to validate the callback. Requests to the callback URI MUST be processed as described in interaction-finish, and the AS MUST require presentation of an interaction callback reference as described in continue-after-interaction. request, the AS will response-interact-finish used by the client instance to validate the callback. All interaction finish methods MUST use this nonce to allow the client to verify the connection between the pending interaction request and the callback. GNAP does this through the use of the interaction hash, defined in interaction- hash. All requests to the callback URI MUST be processed as described in interaction-finish. All interaction finish methods MUST require presentation of an interaction reference for continuing this grant request. This means that the the interaction reference MUST be returned by the AS and MUST be presented by the client as described in continue-after- interaction. The means by which the interaction reference is returned to the client instance is specific to the interaction finish method. 2.5.2.1."}
{"_id":"doc-en-gnap-core-protocol-57a63cf55193b04610327cca03eca4e6580f9560becc6cc2e972d5dbda1fe2b4","title":"","text":"hash. The client instance will use this value to validate the \"finish\" call. The AS MUST send the hash and interaction reference based on the interaction finish mode as described in the following sections. All interaction finish methods MUST define a way to convey the hash and interaction reference back to the client instance. When an interaction finish method is used, the client instance MUST present the interaction reference back to the AS as part of its continue- after-interaction. Note that in many error cases, such as when the RO has denied access, the \"finish\" method is still enacted by the AS. This pattern allows"}
{"_id":"doc-en-gnap-resource-servers-51b5041fac16dcec22c516e6eec82caaf11c523ca0b93a747aeaa42f9f660799","title":"","text":"3.1. A GNAP AS offering RS-facing services can publish its features on a well-known discovery document using the URL \".well-known/gnap-as-rs\". well-known discovery document using the URL \".well-known/gnap-as-rs\" appended to the grant request endpoint URL. This endpoint contains a JSON document RFC8259 consisting of a single JSON object with any combination of the following optional fields: The discovery response is a JSON document RFC8259 consisting of a single JSON object with the following fields: The URL of the endpoint offering introspection. OPTIONAL. The URL of the endpoint offering introspection. The location MUST be a URL RFC3986 with a scheme component that MUST be https, a host component, and optionally, port, path and query components and no fragment components. A list of token formats supported by this AS. The URL of the endpoint offering resource registration. The grant endpoint of the GNAP AS. The URL of the endpoint offering resource registration. The location MUST be a URL RFC3986 with a scheme component that MUST be https, a host component, and optionally, port, path and query components and no fragment components. REQUIRED. The location of the AS's grant request endpoint, used by the RS to derive downstream access tokens. The location MUST be a URL RFC3986 with a scheme component that MUST be https, a host component, and optionally, port, path and query components and no fragment components. This URL MUST be the same URL used by client instances in support of GNAP requests. OPTIONAL. A list of the AS's supported key proofing mechanisms. The values of this list correspond to possible values of the \"proof\" field of the key section of the request. 3.2."}
{"_id":"doc-en-gnap-resource-servers-a23990e935c0bbbb8de7d5ceffaf8ca093e2b080fb329ca6fe67f7003dc10c53","title":"","text":"If the RS needs to, it can post a set of resources as described in the Resource Access Rights section of I-D.ietf-gnap-core-protocol to the AS's resource registration endpoint. the AS's resource registration endpoint along with information about what the RS will need to validate the request. REQUIRED. The list of access rights associated with the request in the format described in the \"Resource Access Rights\" section of I-D.ietf-gnap-core-protocol. REQUIRED. The identification used to authenticate the resource server making this call, either by value or by reference as described in authentication. OPTIONAL. The token format required to access the identified resource. If the field is omitted, the token format is at the discretion of the AS. If the AS does not support the requested token format, the AS MUST return an error to the RS. OPTIONAL. If present and set to \"true\", the RS expects to make a token introspection request as described in introspection. If absent or set to \"false\", the RS does not anticipate needing to make an introspection request for tokens relating to this resource set. The RS MUST identify itself with its own key and sign the request. The AS responds with a handle appropriate to represent the resources list that the RS presented. The AS responds with a reference appropriate to represent the resources list that the RS presented in its request as well as any additional information the RS might need in future requests. REQUIRED. A single string representing the list of resources registered in the request. The RS MAY make this handle available to a client instance as part of a discovery response as described in I-D.ietf-gnap-core-protocol or as documentation to client software developers. The RS MAY make this handle available as part of a discovery response as described in I-D.ietf-gnap-core-protocol or as documentation to developers. OPTIONAL. An instance identifier that the RS can use to refer to itself in future calls to the AS, in lieu of sending its key by value. [[ See issue #117 [2] ]] OPTIONAL. The introspection endpoint of this AS, used to allow the RS to perform token introspection. 4."}
{"_id":"doc-en-gnap-resource-servers-8baf162f1b60335e9676e64a8dafc73d9678bea99b98c41ae5557568b0b739ed","title":"","text":"itself with its own key in the \"client\" field and sign the request just as any client instance would. [[ See issue #116 [3] ]] [[ See issue #116 [2] ]] The AS responds with a token for the downstream RS2 as described in I-D.ietf-gnap-core-protocol. The downstream RS2 could repeat this"}
{"_id":"doc-en-gnap-resource-servers-54264bc01128c104c57b166ea5822efe3bbcd3c8890425d34d961da6c93d7bda","title":"","text":"[1] https://github.com/ietf-wg-gnap/gnap-core-protocol/issues/115 [2] https://github.com/ietf-wg-gnap/gnap-core-protocol/issues/117 [3] https://github.com/ietf-wg-gnap/gnap-core-protocol/issues/116 [2] https://github.com/ietf-wg-gnap/gnap-core-protocol/issues/116 "}
{"_id":"doc-en-gnap-resource-servers-27eb84f2ad23c61b9ccbf1f506de4959ce812b3c4701e6dd451ce2f11d24dffb","title":"","text":"The RS signs the request with its own key and sends the access token as the body of the request. REQUIRED. The access token value presented to the RS by the client instance. RECOMMENDED. The proofing method used by the client instance to bind the token to the RS request. REQUIRED. The identification used to authenticate the resource server making this call, either by value or by reference as described in authentication. OPTIONAL. The minimum access rights required to fulfill the request. This MUST be in the format described in the Resource Access Rights section of I-D.ietf-gnap-core-protocol. The AS MUST validate the access token value and determine if the token is active. An active access token is defined as a token that was issued by the processing AS, has not been revoked, has not expired, and is appropriate for presentation at the identified RS. The AS responds with a data structure describing the token's current state and any information the RS would need to validate the token's presentation, such as its intended proofing mechanism and key material. The response MAY include any fields defined in an access token response. material. REQUIRED. If \"true\", the access token presented is active, as defined above. If any of the criteria for an active token are not true, or if the AS is unable to make a determination (such as the token is not found), the value is set to \"false\" and other fields are omitted. If the access token is active, additional fields from the single access token response structure defined in I-D.ietf-gnap-core- protocol are included. In particular, these include the following: REQUIRED. The access rights associated with this access token. This MUST be in the format described in the Resource Access Rights section of I-D.ietf-gnap-core-protocol. This array MAY be filtered or otherwise limited for consumption by the identified RS, including being an empty array. REQUIRED if the token is bound. The key bound to the access token, to allow the RS to validate the signature of the request from the client instance. If the access token is a bearer token, this MUST NOT be included. OPTIONAL. The set of flags associated with the access token. The response MAY include any additional fields defined in an access token response and MUST NOT include the access token \"value\" itself. 3.4."}
{"_id":"doc-en-groupcomm-bis-5047e2e4e7e2f136a9cd79c5182b17df41a75c858b242fa84b34bdd068fa0432","title":"","text":"control application were shown in Section 2.2 of RFC7390. An application group can be named in many ways through different types of identifiers, such as numbers, URIs or other strings. An application group name or identifier, if explicitly encoded in a CoAP request, is typically included in the path component or in the query component of a Group URI. It may also be encoded using the Uri-Host Option RFC7252 in case application group members implement a virtual CoAP server specific to that application group. The application group can then be identified by the value of the Uri-Host Option and each virtual server serves one specific application group. However, encoding the application group in the Uri-Host Option is not the preferred method because in this case the application group cannot be encoded in a Group URI, and also the Uri-Host Option is being used for another purpose than encoding the host part of a URI as intended by RFC7252 - which is potentially confusing. Appendix A of I-D.ietf- core-resource-directory shows an example registration of an application group into a Resource Directory (RD), along with the CoAP group it uses and the resources supported by the application group. In this example an application group identifier is not explicitly encoded in the RD nor in CoAP requests made to the group, but it implicitly follows from the CoAP group used for the request. So there is a one-to-one binding between the CoAP group and the application group. The \"NoSec\" security group is used. A best practice for encoding application group into a Group URI is to use one URI path component to identify the application group and use the following URI paths component(s) to identify the resource within this application group. For example, //res1 or /base//res1/res2 conform to this practice. An application group identifier (like ) should be as short as possible when used in constrained networks. types of identifiers, such as name string, number, URI or other type of string. An application group name may be explicitly encoded in a CoAP Group URI, or it may be not included in the Group URI. This is an implementation-specific decision. If the application group name is explicitly encoded in a CoAP Group URI, it can be encoded within one of the URI path component: this is the most common and RECOMMENDED method to encode the application group name. A best practice for encoding application group into a Group URI is to use one URI path component to identify the application group and use the following URI paths component(s) to identify the resource within this application group. For example, //res1 or /base//res1/res2 conform to this practice. An application group name (like ) should be as short as possible when used in constrained networks. URI query component: using this method, the query may consist of the group name (?) or it may be one parameter of the query (?g= or ?param1=value1&gn=). URI host subcomponent: using this method, the application group becomes equal to the CoAP group. This can only be used if there is a one-to-one mapping between CoAP groups and application groups. URI port subcomponent: using this method, the application group is identified by a number that is encoded in some way in the destination port. There are also methods to encode the application group name within the CoAP request even though it is not encoded within the Group URI. Examples of such methods are: encode in a Uri-Host Option RFC7252 which is added to the CoAP request by the client before sending it out. Each CoAP server that is part of the CoAP group, receiving this request, decodes the Uri-Host Option and treats it as an application group name. (It can also treat the application group name in this Option as a \"virtual CoAP server\" specific to that application group, exactly in the same way that the Uri-Host Option was intended to allow support for multiple virtual servers hosted on the same port. The net effect of both treatments is the same.) encode in a new (custom/application-specific) CoAP Option which is added to the CoAP request by the client before sending it out. Each CoAP server that is part of the CoAP group, receiving this request, would by design understand this Option, would decode it, and treat it as an application group name. Finally, it is possible to not encode the application group name at all within the CoAP request. This yields the most compact representation on the wire. In this case, each CoAP server needs to determine the application group based on contextual information, such as client identity and/or target resource. For example, each application group on a server could have a unique set of resources that does not overlap with any resources of other application groups. Appendix A of I-D.ietf-core-resource-directory shows an example registration of an application group into a Resource Directory (RD), along with the CoAP group it uses and the resources supported by the application group. In this example an application group name \"lights\" is encoded in the \"ep\" (endpoint) attribute of the RD registration entry. The CoAP group is ff35:30:2001:db8:f1::8000:1 and the \"NoSec\" security group is used. A security group is identified by a stable and invariant string used as group name, which is generally not related with other kinds of"}
{"_id":"doc-en-https-notif-28b1d8c007e16c8abf3eb478adea9e8a9a2b065f996eab5297132495db57a270","title":"","text":"6. Encoding notifications for the HTTPS notifications is the same as the encoding notifications as defined in RFC8040 Section 6.4, with the following changes. Instead of saying that for JSON-encoding purposes, the module name for \"notification\" element will be \"ietf- restconf, it will say that for JSON-encoding purposes, the module name for \"notification\" element will be \"ietf-https-notif\". With those changes, the SSE event notification encoded JSON example that would be sent over the HTTPS notif transport would appear as follows: Notifications are encoded as defined in RFC8040 Section 6.4. The examples in that section apply for sending notifications over the \"https-notif\" based transport. An example of YANG-Push in JSON would look something like this: An example of YANG-Push in XML would look something like this: 7."}
{"_id":"doc-en-idempotency-47f3bcd029c2d5409632fb6cb217a3f85347d9dac0f5a57a23cf0d35a7458bdf","title":"","text":"If the \"Idempotency-Key\" request header is missing for a documented idempotent operation requiring this header, the resource server SHOULD reply with an HTTP \"400\" status code with body containing a link pointing to relevant documentation. Alternately, using the HTTP header \"Link\", the client can be informed about the error as shown below. link pointing to relevant documentation. Following examples shows an error response describing the problem using RFC7807. Alternately, using the HTTP header \"Link\", the client can be informed about the error as shown below. If there is an attempt to reuse an idempotency key with a different request payload, the resource server SHOULD reply with a HTTP \"422\" status code with body containing a link pointing to relevant documentation. The status code \"422\" is defined in Section 11.2 of RFC4918. The server can also inform the client by using the HTTP header \"Link\" as shown below. RFC4918. The server can also inform the client by using the HTTP header \"Link\" as shown below. If the request is retried, while the original request is still being processed, the resource server SHOULD reply with an HTTP \"409\" status code with body containing a link or the HTTP header \"Link\" pointing to the relevant documentation. code with body containing problem description. Or, alternately using the HTTP header \"Link\" pointing to the relevant documentation Error scenarios above describe the status of failed idempotent requests after the resource server prcocesses them. Clients MUST"}
{"_id":"doc-en-ietf-rats-wg-architecture-ce3986ae3052eb5f822cb025a480317dc0058d5b33cc51af6689eaf25a1cd062","title":"","text":"6. An entity in the RATS architecture includes at least one of the roles defined in this document. As a result, the entity can participate as a constituent of the RATS architecture. Additionally, an entity can aggregate more than one role into itself. These collapsed roles combine the duties of multiple roles. In these cases, interaction between these roles do not necessarily use the Internet Protocol. They can be using a loopback device or other IP-based communication between separate environments, but they do not have to. Alternative channels to convey conceptual messages include function calls, sockets, GPIO interfaces, local busses, or hypervisor calls. This type of conveyance is typically found in Composite Devices. Most importantly, these conveyance methods are out-of-scope of RATS, but they are presumed to exist in order to convey conceptual messages appropriately between roles. defined in this document. An entity can aggregate more than one role into itself. These collapsed roles combine the duties of multiple roles. In these cases, interaction between these roles do not necessarily use the Internet Protocol. They can be using a loopback device or other IP-based communication between separate environments, but they do not have to. Alternative channels to convey conceptual messages include function calls, sockets, GPIO interfaces, local busses, or hypervisor calls. This type of conveyance is typically found in Composite Devices. Most importantly, these conveyance methods are out-of-scope of RATS, but they are presumed to exist in order to convey conceptual messages appropriately between roles. For example, an entity that both connects to a wide-area network and to a system bus is taking on both the Attester and Verifier roles."}
{"_id":"doc-en-ietf-rats-wg-architecture-f902c4c779b0a54a703c043a99e668c00ea04e81b853dd1fbd7ab5ba0906cab4","title":"","text":"role. The entity, as a system bus Verifier, may choose to fully isolate its role as a wide-area network Attester. In essence, an entity that combines more than one role also creates and consumes the corresponding conceptual messages as defined in this In essence, an entity that combines more than one role creates and consumes the corresponding conceptual messages as defined in this document. 7."}
{"_id":"doc-en-ietf-rats-wg-architecture-c0ec67d14126c02a24c4e0d0060bfcef4c6dde1e70fd36ec484caef9eab9d8b1","title":"","text":"12. 12.1. Implementers need to pay close attention to the isolation and protection of the Attester and the factory processes for provisioning the Attestation Key Material. When either of these are compromised, the remote attestation becomes worthless because the attacker can forge Evidence. Remote attestation applies to use cases with a range of security requirements, so the protections discussed here range from low to high security where low security may be only application or process isolation by the device's operating system and high security involves specialized hardware to defend against physical attacks on a chip. 12.1.1. It is assumed that the Attester is located in an isolated environment of a device like a process, a dedicated chip a TEE or such that collects the Claims, formats them and signs them with an Attestation Key. The Attester must be protected from unauthorized modification to ensure it behaves correctly. There must also be confidentiality so that the signing key is not captured and used elsewhere to forge evidence. In many cases the user or owner of the device must not be able to modify or exfiltrate keys from the Attesting Environment of the Attester. For example the owner or user of a mobile phone or FIDO authenticator is not trusted. The point of remote attestation is for the Relying Party to be able to trust the Attester even though they don't trust the user or owner. Some of the measures for low level security include process or application isolation by a high-level operating system, and perhaps restricting access to root or system privilege. For extremely simple single-use devices that don't use a protected mode operating system, like a Bluetooth speaker, the isolation might only be the plastic housing for the device. At medium level security, a special restricted operating environment like a Trusted Execution Environment (TEE) might be used. In this case, only security-oriented software has access to the Attester and key material. For high level security, specialized hardware will likely be used providing protection against chip decapping attacks, power supply and clock glitching, faulting injection and RF and power side channel attacks. 12.1.2. Attestation key provisioning is the process that occurs in the factory or elsewhere that establishes the signing key material on the device and the verification key material off the device. Sometimes this is referred to as \"personalization\". One way to provision a key is to first generate it external to the device and then copy the key onto the device. In this case, confidentiality of the generator, as well as the path over which the key is provisioned, is necessary. This can be achieved in a number of ways. Confidentiality can be achieved entirely with physical provisioning facility security involving no encryption at all. For low-security use cases, this might be simply locking doors and limiting personnel that can enter the facility. For high-security use cases, this might involve a special area of the facility accessible only to select security-trained personnel. Cryptography can also be used to support confidentiality, but keys that are used to then provision attestation keys must somehow have been provisioned securely beforehand (a recursive problem). In many cases both some physical security and some cryptography will be necessary and useful to establish confidentiality. Another way to provision the key material is to generate it on the device and export the verification key. If public key cryptography is being used, then only integrity is necessary. Confidentiality is not necessary. In all cases, the Attestation Key provisioning process must ensure that only attestation key material that is generated by a valid Endorser is established in Attesters and then configured correctly. For many use cases, this will involve physical security at the facility, to prevent unauthorized devices from being manufactured that may be counterfeit or incorrectly configured. 12.2. Any solution that conveys information used for security purposes, whether such information is in the form of Evidence, Attestation Results, Endorsements, or Appraisal Policy must support end-to-end"}
{"_id":"doc-en-ietf-rats-wg-architecture-0a61f96a1eeea132cc81908dfb7f12546ed0dfd9d95c7dda382239ecc854ad05","title":"","text":"An Attester creates Evidence that is conveyed to a Verifier. The Verifier uses the Evidence, and any Endorsements from Endorsers, by applying an Evidence Appraisal Policy to assess the by applying an Appraisal Policy for Evidence to assess the trustworthiness of the Attester, and generates Attestation Results for use by Relying Parties. The Appraisal Policy for Evidence might be obtained from an Endorser along with the Endorsements, or might be"}
{"_id":"doc-en-ietf-rats-wg-architecture-709895eaa893a94fbb8fc1b91f7bfc19c0383967143eb1f04cf889abefff248f","title":"","text":"by applying an Appraisal Policy for Evidence to assess the trustworthiness of the Attester, and generates Attestation Results for use by Relying Parties. The Appraisal Policy for Evidence might be obtained from an Endorser along with the Endorsements, or might be obtained via some other mechanism such as being configured in the Verifier by an administrator. be obtained from an Endorser along with the Endorsements, and/or might be obtained via some other mechanism such as being configured in the Verifier by the Verifier Owner. The Relying Party uses Attestation Results by applying its own Appraisal Policy to make application-specific decisions such as authorization decisions. The Appraisal Policy for Attestation Results might, for example, be configured in the Relying Party by an administrator. Results is configured in the Relying Party by the Relying Party Owner, and/or is programmed into the Relying Party. 4.1."}
{"_id":"doc-en-ietf-rats-wg-architecture-9046d01a09014588bc09826da9c5b0bb63eb0304376759db3ee96ff4af8b2dff","title":"","text":"12. This document does not require any actions by IANA. 13. Special thanks go to David Wooten, Joerg Borchert, Hannes Tschofenig, Laurence Lundblade, Diego Lopez, Jessica Fitzgerald-McKay, Frank Xia, and Nancy Cam-Winget."}
{"_id":"doc-en-ietf-rats-wg-architecture-d26cc5dc52e0bf3ac75971e75778d0800ae61fbfc0c29949a6663769e8e142a6","title":"","text":"Environment, then this sub-entity generates Evidence about its trustworthiness. Therefore each sub-entity can be called an Attester. Among these Attesters, there may be only some, which can be called Lead Attesters, that have the communication functionality with the Verifier. Other Attesters don't have this ability, but they are connected to the Lead Attesters via internal links or network be called Lead Attesters, that have the ability to communicate with the Verifier. Other Attesters don't have this ability, but they are connected to the Lead Attesters via internal links or network connections, and they are evaluated via the Lead Attester's help. For example, a carrier-grade router is a composite device consisting of a chassis and multiple slots. The trustworthiness of the router depends on all its slots' trustworthiness. Each slot has an Attesting Environment such as a TPM or TEE collecting the claims of its boot process, then it generates Evidence from the claims to prove its trustworthiness. Among these slots, only a main slot can communicate with the Verifier while other slots cannot. But other slots can communicate with the main slot by the links between them inside the router. So the main slot collects the Evidence of other slots, produces the final Evidence of the whole router and conveys the final Evidence to the Verifier. Therefore the router is a Composite Attester, each slot is an Attester and the main slot is the Lead Attester. Another example is a multi-chassis router which is composed of multiple single carrier-grade routers. The multi-chassis router provides higher throughput by interconnecting multiple routers and simpler management by being logically treated as one router. Among these routers, there is only one main router that connects to the Verifier. Other routers are only connected to the main router by the network cables, and therefore they are managed and verified via this main router. So, in this case, the multi-chassis router is the Composite Attester, each router is an Attester and the main router is the Lead Attester. composite depicts the data that flows between the Composite Attester and Verifier for the remote attestation. its boot process, after which it generates Evidence from the claims. Among these slots, only a main slot can communicate with the Verifier while other slots cannot. But other slots can communicate with the main slot by the links between them inside the router. So the main slot collects the Evidence of other slots, produces the final Evidence of the whole router and conveys the final Evidence to the Verifier. Therefore the router is a Composite Attester, each slot is an Attester, and the main slot is the Lead Attester. Another example is a multi-chassis router composed of multiple single carrier-grade routers. The multi-chassis router provides higher throughput by interconnecting multiple routers and simpler management by being logically treated as one router. Among these routers, there is only one main router that connects to the Verifier. Other routers are only connected to the main router by the network cables, and therefore they are managed and verified via this main router. So, in this case, the multi-chassis router is the Composite Attester, each router is an Attester and the main router is the Lead Attester. composite depicts the conceptual data flow for a Composite Attester. In the Composite Attester, each Attester generates its own Evidence by its Attesting Environments collecting the claims from its Target Environments. The Lead Attester collects the Evidence of all other by its Attesting Environment(s) collecting the claims from its Target Environment(s). The Lead Attester collects the Evidence of all other Attesters and then generates the Evidence of the whole Composite Attester. Inside the Lead Attester, there may be an optional Verifying Environment. The Verifying Environment can verify the collected Evidence of other Attesters to evaluate their trustworthiness. Therefore, there are two situations when the Lead Attester generates the final Evidence. One situation is that the Lead Attester has no Verifying Environment. In this situation, the Lead Attester just collects the Evidence of other Attesters but doesn't verify them. It may just string all these Evidence into a whole one, or it may reorganize these Evidence with a new structure and sign this final Evidence. Then it conveys the final Evidence to the Verifier and the Verifier evaluates the Composite Attester's, including the Lead Attester's and other Attesters', trustworthiness. The other situation is that the Lead Attester has a Verifying Environment. After collecting the Evidence of other Attesters, the Lead Attester verifies these Evidence by using the Endorsements and Appraisal Policies, which are got from the Verifier or some reliable parties, for evaluating these Attesters' trustworthiness. Then the Lead Attester makes the verification results as claims which are the input to the final Evidence of the whole Composite Attester. Then the Lead Attester conveys the final Attestation Evidence to the Verifier on behalf of the Composite Attester. Before receiving the Endorsements and Appraisal Policies for other Attesters, to increase the security, the Lead Attester may first generate Evidence about its trustworthiness and convey this Evidence to the Verifier for evaluating. The Lead Attester's Claims Collector may or may not include its own Verifier. One situation is that the Claims Collector has no internal Verifier. In this situation, the Claims Collecctor simply combines the various Evidences into the final Evidence that is sent off to the remote Verifier, which evaluates the Composite Attester's, including the Lead Attester's and other Attesters', trustworthiness. The other situation is that the Lead Attester's Claims Collector has an internal Verifier. After collecting the Evidence of other Attesters, the Claims Collector verifies them using Endorsements and Appraisal Policies (obtained the same way as any other Verifier), for evaluating these Attesters' trustworthiness. Then the Claims Collector combines the Attestation Results into the final Evidence of the whole Composite Attester which is sent off to the remote Verifier, which might treat the claims obtained from the local Attestation Results as if they were Evidence. 5."}
{"_id":"doc-en-ietf-rats-wg-architecture-4831d32884a99ddb7eed17e9a4d5153565279ef9f11ebbef682bfed312e68802","title":"","text":"An Attester creates Evidence that is conveyed to a Verifier. The Verifier uses the Evidence, and any Endorsements from Endorsers, by applying an Appraisal Policy for Evidence to assess the trustworthiness of the Attester, and generates Attestation Results for use by Relying Parties. The Appraisal Policy for Evidence might be obtained from an Endorser along with the Endorsements, and/or might be obtained via some other mechanism such as being configured in the Verifier by the Verifier Owner. The Verifier uses the Evidence, any Reference Values from Reference Value Providers, and any Endorsements from Endorsers, by applying an Appraisal Policy for Evidence to assess the trustworthiness of the Attester, and generates Attestation Results for use by Relying Parties. The Appraisal Policy for Evidence might be obtained from an Endorser along with the Endorsements, and/or might be obtained via some other mechanism such as being configured in the Verifier by the Verifier Owner. The Relying Party uses Attestation Results by applying its own appraisal policy to make application-specific decisions such as"}
{"_id":"doc-en-ietf-rats-wg-architecture-732e560dc88acb62edd412f4befa134ef8557f7ea1729c24708d22b4acd0e4c3","title":"","text":"It is also worth pointing out that the choice of model is generally up to the Relying Party. The same device may need to create Evidence for different Relying Parties and/or different use cases. For instance, it would provide Evidence to a network infrastructure device to gain access to the network, and to a server holding confidential data to gain access to that data. As such, both models may simultaneously be in use by the same device. instance, it would use one model to provide Evidence to a network infrastructure device to gain access to the network, and the other model to provide Evidence to a server holding confidential data to gain access to that data. As such, both models may simultaneously be in use by the same device. combination shows another example of a combination where Relying Party 1 uses the passport model, whereas Relying Party 2 uses an"}
{"_id":"doc-en-ietf-rats-wg-architecture-e809b0977aedbfd8388c5a07c28343463532045c9c6dcb498df205de3a9c972e","title":"","text":"As a system bus-connected entity, a Verifier consumes Evidence from other devices connected to the system bus that implement Attester roles. As a wide-area network connected entity, it may implement an Attester role. The entity, as a system bus Verifier, may choose to fully isolate its role as a wide-area network Attester. Attester role. In essence, an entity that combines more than one role creates and consumes the corresponding conceptual messages as defined in this"}
{"_id":"doc-en-ietf-rats-wg-architecture-2f27009098e0601e02049f60db353147a9e2889bb61faff54b3a9c9d9a282195","title":"","text":"12.1. Implementers need to pay close attention to the isolation and protection of the Attester and the factory processes for provisioning the Attestation key material. If either of these are compromised, the remote attestation becomes worthless because the attacker can forge Evidence. Implementers need to pay close attention to the protection of the Attester and the factory processes for provisioning the Attestation key material. If either of these are compromised, the remote attestation becomes worthless because an attacker can forge Evidence or manipulate the Attesting Environment. For example, a Target Environment should not be able to tamper with the Attesting Environment that measures it, by isolating the two environments from each other in some way. Remote attestation applies to use cases with a range of security requirements, so the protections discussed here range from low to"}
{"_id":"doc-en-ietf-rats-wg-architecture-d7eea0d390b842076f1abb2309831c24c9320cacd2f95019facfa7b77fd3e05e","title":"","text":"vouched for via Endorsements because no Evidence is generated about them are referred to as roots of trust. The manufacturer of the Attester arranges for its Attesting Environment to be provisioned with key material. The key material is typically in the form of an asymmetric key pair (e.g., an RSA or ECDSA private key and a manufacturer-signed IDevID certificate) secured in the Attester. The Verifier is provided with an appropriate trust anchor, or provided with a database of public keys (rather than certificates), or even carefully secured lists of symmetric keys. The nature of how the Verifier manages to validate the signatures produced by the Attester is critical to the secure operation of an Attestation system, but is not the subject of standardization within this architecture. The manufacturer having arranged for an Attesting Environment to be provisioned with key material with which to sign Evidence, the Verifier is then provided with some way of verifying the signature on the Evidence. This may be in the form of an appropriate trust anchor, or the Verifier may be provided with a database of public keys (rather than certificates) or even carefully secured lists of symmetric keys. The nature of how the Verifier manages to validate the signatures produced by the Attester is critical to the secure operation of an Attestation system, but is not the subject of standardization within this architecture. A conveyance protocol that provides authentication and integrity protection can be used to convey unprotected Evidence, assuming the"}
{"_id":"doc-en-ietf-rats-wg-architecture-0f846af874142829f5f6e683f3d51d4d6fb91d379d338049cebc89157ea6a538","title":"","text":"boot, or immutable hardware/ROM. It is also important that the appraisal policy was itself obtained securely. As such, if appraisal policies for a Relying Party or for a Verifier can be configured via a network protocol, the ability to create Evidence about the integrity of the entity providing the appraisal policy needs to be considered. securely. If an attacker can configure appraisal policies for a Relying Party or for a Verifier, then integrity of the process is compromised. The security of conveyed information may be applied at different layers, whether by a conveyance protocol, or an information encoding"}
{"_id":"doc-en-ietf-rats-wg-architecture-0cbb689b165234effec2d315ceab864804a5a77cfdb68cf522cfc8d419041f31","title":"","text":"Claims about a root of trust typically are asserted by Endorsers. The device illustrated in layered includes (A) a BIOS stored in read- only memory, (B) an updatable bootloader, and (C) an operating system kernel. only memory, (B) an operating system kernel, and (C) an application or workload. Attesting Environment A, the read-only BIOS in this example, has to ensure the integrity of the bootloader (Target Environment B). There"}
{"_id":"doc-en-ietf-rats-wg-architecture-f789a2515e549360c1a9ff0fbb3a594ed445f3e89035a837620eac9fc0cd4942","title":"","text":"in read-only memory, (B) a bootloader, and (C) an operating system kernel. The first Attesting Environment, the read-only BIOS in this example, has to ensure the integrity of the bootloader (the first Target The first Attesting Environment, the ROM in this example, has to ensure the integrity of the bootloader (the first Target Environment). There are potentially multiple kernels to boot, and the decision is up to the bootloader. Only a bootloader with intact integrity will make an appropriate decision. Therefore, the Claims"}
{"_id":"doc-en-ietf-rats-wg-architecture-7bad6b86ccf597c828a2c1d074e766cd1bc84276cf79b27ed4025249d18317fe","title":"","text":"whether in the same conveyance protocol as part of the Evidence or not. As explained in overview, artifacts are defined by which roles produce them or consume them. In some protocol instantiations, other roles may cache and forward artifacts as opaque data, to one or more entities implementing the consuming role. 4. RFC4949 has defined a number of terms that are also used in this"}
{"_id":"doc-en-ietf-rats-wg-architecture-1dde053502ed4fceb2b8b250fd83f9a7bb290e4a4e5c7c06b89c18abb7640b84","title":"","text":"obtained via some other mechanism such as being configured in the Verifier by an administrator. For example, for some claims the Verifier might check the values of claims in the Evidence against constraints specified in the Appraisal Policy for Evidence. Such constraints might involve a comparison for equality against reference values, or a check for being in a range bounded by reference values, or membership in a set of reference values, or a check against values in other claims, or any other test. Such reference values might be specified as part of the Appraisal Policy for Evidence itself, or might be obtained from a separate source, such as an Endorsement, and then used by the Appraisal Policy for Evidence. The actual data format and semantics of a known-good value are specific to claims and implementations. There is no general purpose format for them or general means for comparison defined in this architecture document. Similarly, for some claims the Verifier might check the values of claims in the Evidence for membership in a set, or against a range of values, or against known- bad values such as an expiration time. These reference values may be conveyed to the Verifier as part of an Endorsement or as part of Appraisal Policy or both as these are the two input paths to the Verifier. The Relying Party uses Attestation Results by applying its own Appraisal Policy to make application-specific decisions such as authorization decisions. The Attestation Result Appraisal Policy"}
{"_id":"doc-en-ietf-rats-wg-architecture-4db1f402e0f283ed872c4fefb5ca829517313f2c81c2c66b91efe0919d13bb34","title":"","text":"4.1. The Verifier, when appraising Evidence, or the Relying Party, when appraising Attestation Results, checks the values of some claims against constraints specified in its Appraisal Policy. Such constraints might involve a comparison for equality against a reference value, or a check for being in a range bounded by reference values, or membership in a set of reference values, or a check against values in other claims, or any other test. Such reference values might be specified as part of the Appraisal Policy itself, or might be obtained from a separate source, such as an Endorsement, and then used by the Appraisal Policy. The actual data format and semantics of any reference values are specific to claims and implementations. This architecture document does not define any general purpose format for them or general means for comparison. 4.2. An Attester consists of at least one Attesting Environment and at least one Target Environment. In some implementations, the Attesting and Target Environments might be combined. Other implementations"}
{"_id":"doc-en-ietf-rats-wg-architecture-5d46c9641a02934466b6e69e6f30e645a849e86ca1b916c4fa730011b2990e9e","title":"","text":"Environments are designed specifically with claims collection in mind. 4.2. 4.3. By definition, the Attester role takes on the duty to create Evidence. The fact that an Attester role is composed of several"}
{"_id":"doc-en-ietf-rats-wg-architecture-91335aaf89e3fbdfa73b1f9ada43a7e100cdbe5377f773ffb31541bcfc41120a","title":"","text":"Therefore, creating a layered boot sequence and correspondingly enabling Layered Attestation. 4.3. 4.4. A Composite Device is an entity composed of multiple sub-entities such that its trustworthiness has to be determined by the appraisal"}
{"_id":"doc-en-ietf-rats-wg-architecture-b48f8a4e0817057bdbb6ad91ef69e15eb80c47c05c39bed06825cbe5cfdccbae","title":"","text":"Universal Time, or might be defined relative to some other timestamp or timeticks counter. We now walk through a number of hypothetical examples of how a solution might be built. This list is not intended to be complete, but is just representative enough to highlight various timing considerations. Using the table above, a number of hypothetical examples of how a solution might be built are illustrated below. a solution might be built. This list is not intended to be complete, but is just representative enough to highlight various timing considerations. 15.1."}
{"_id":"doc-en-ietf-rats-wg-architecture-97ddd0b5156dd379d1f3af35dfc3cf5576b94f6af8bdbf28b842607e76dd7c3f","title":"","text":"15.3. The following example illustrates a hypothetical Background-Check Model solution that uses timestamps and requires roughly synchronized clocks between the Attester, Verifier, and Relying Party. The time considerations in this example are equivalent to those discussed under Example 1 above. Model solution that uses centrally generated identifiers for explicit time-keeping (referred to as \"handle\" in this example). Handles can be qualifying data, such as nonces or signed timestamps. In this example, centrally generated signed timestamps and - and synchronized clocks between all entities - are distributed in periodic intervals as handles. If the Attester lacks a source of time based on an absolute timescale, a relative source of time, such as a tick counter can be used, alternatively. In this example, evidence generation is not triggered at value generation, but at events at which the Attesting Environment becomes of changes to the Target Environment. In comparison with example 1, the time considerations in this example go into more detail with respect to the life-cycle of Claims and Evidence. While the goal is to create up-to-date and recent Evidence as soon as possible, typically there is a latency between value generation and Attester awareness. At time(AA) the Attesting Environment is able to trigger an event (e.g. based on an Event-Condition-Action model) to create attestation Evidence that is as recent as possible. In essence, at time(AA) the Attesting Environment is aware of new values that where generated at time(VG) and corresponding Claim values are collected immediately. Consecutively, Evidence based on relevant \"old\" Claims and the just collected \"new\" Claims is generated at time(EG). In essence, the Claims used to generate the Evidence are generated at various time(VG) before time(AA). In order to create attestation Evidence at at time(AA), the Attester requires a fresh (i.e. not expired) centrally generated handle that has been distributed to all involved entities. In general, The duration a handle remains fresh depends on the content-type of the handle. If it is a (relative or absolute) timestamp, clocks synchronized with a shared and trustworthy source of time are required. If another value type is used as a handle, the reception time of the handle time(HD) provides an epoch (relative time of zero) for measuring the duration of validity (similar to a heart-beat timeout). From the point of view of a Verifier, validity of Evidence is only given if the handle used in Evidence satisfies delta(time(HD),time(EG))distribution-interval. In this usage scenario, time(VG), time(AA), and time(EG) are tightly coupled. Also, the absolute point in time at which a handle is received by all three entities is assumed to be close to identical. 15.4."}
{"_id":"doc-en-ietf-wg-privacypass-base-drafts-1639f33cb97209a92c5419b17f72ccb5bdc1a6109456888f874491427169bebb","title":"","text":"attempted against. An empty redemption is returned when the limit has been hit: 5.4. A consequence of limiting the number of participants (Attesters or Issuers) in Privacy Pass deployments for meaningful privacy is that it forces concentrated centralization amongst those participants. CENTRALIZATION discusses several ways in which this might be mitigated. For example, a multi-stakeholder governance model could be established to determine what participants are fit to operate as participants in a Privacy Pass deployment. This is precisely the model used to control the Web's trust model. Alternatively, Privacy Pass deployments might mitigate this problem through implementation. For example, rather than centralize the role of attestation in one or few entities, attestation could be a distributed function performed by a quorum of many parties, provided that neither Issuers nor Origins learn which attester implementations were chosen. As a result, clients could have more opportunities to switch between attestation participants. 6. We present a number of security considerations that prevent malicious"}
{"_id":"doc-en-ietf-wg-privacypass-base-drafts-aa8a6e2b09b63b3e34020c0fcc07d3aab118841eaf679eda847a0c29f0219d06","title":"","text":"that attest to this information. The most basic Privacy Pass protocol provides a set of cross-origin authorization tokens that protect the client's anonymity during authorization tokens that protect the Clients' anonymity during interactions with a server. This allows clients to communicate an attestation of a previously authenticated server action without having to reauthenticate manually. The tokens retain anonymity in"}
{"_id":"doc-en-ietf-wg-privacypass-base-drafts-78d4a60fb08e7ece06acdc44b658f92de988be247b80fdf973fd8064bae8d2ba","title":"","text":"properties include, though are not limited to: Capable of solving a CAPTCHA. Clients that solve CAPTCHA challenges can be attested to have this capability for the purposes of being ruled out as a bot or otherwise automated Client. challenges can be attested to have this capability for the purpose of being ruled out as a bot or otherwise automated Client. Client state. Clients can be associated with state and the attester can attest to this state. Examples of state include the number of issuance protocol invocations, the client's geographic number of issuance protocol invocations, the Client's geographic region, and whether the client has a valid application-layer account. Trusted device. Some Clients run on trusted hardware that are capable of producing device-level attestation statements. Each of these attestation types have different security properties. Each of these attestation types has different security properties. For example, attesting to having a valid account is different from attesting to running on trusted hardware. In general, Attesters should accept a limited form of attestation formats."}
{"_id":"doc-en-ietf-wg-privacypass-base-drafts-fe72781742a41d20441b5f923b60030c856d7d3deab4478296edcb43e44c8850","title":"","text":"on compliant devices, then the corresponding attestation format should be untrusted until the exploit is patched. Addressing changes in attestation quality is therefore a deployment-specific task. In Split Attester and Issuer deployments, Issuers can choose to remove compromised Attesters from their trusted set until the compromise is patched, without needing to modify Origin allow-lists. Split Attester and Issuer deployments (see deploy-split), Issuers can choose to remove compromised Attesters from their trusted set until the compromise is patched, without needing to modify Origin allow- lists. 3.2.2."}
{"_id":"doc-en-ietf-wg-privacypass-base-drafts-9dd84d71b4886f4274a44f659f694952611f7c60eb462337174f0eaa7c10e45e","title":"","text":"any given time. The Issuer public key MUST be made available to all Clients in such a way that key rotations and other updates are publicly visible. The key material and protocol configuration that an Issuer uses to produce tokens corresponds to a number of different pieces of information. an Issuer uses to produce tokens corresponds to two different pieces of information. The issuance protocol in use; and"}
{"_id":"doc-en-ietf-wg-privacypass-base-drafts-3876597005f34e542004c473e94a7c040efdb714663298c0b4e37d64df0b1187","title":"","text":"public metadata is metadata the client can see but cannot check for correctness. As an example, the opaque public metadata might be a \"fraud detection signal\", computed on behalf of the Issuer, during token issuance. In normal circumstances, clients cannot determine if token issuance. In normal circumstances, Clients cannot determine if this value is correct or otherwise a tracking vector. Private metadata is that which clients cannot observe as part of the Private metadata is that which Clients cannot observe as part of the token issuance flow. Such instantiations may be built on the Private Metadata Bit construction from Kreuter et al. KLOR20 or the attribute-based VOPRF from Huang et al. HIJK21."}
{"_id":"doc-en-ietf-wg-privacypass-base-drafts-b15df546270329592ec1ab3270a04b1d922bb2a923becddfdd6428263164daf1","title":"","text":"different forms. For example, any Client can only remain private relative to the entire space of other Clients using the protocol. Moreover, by owning tokens for a given set of keys, the Client's anonymity set shrinks to the total number of clients controlling anonymity set shrinks to the total number of Clients controlling tokens for the same keys. In the following, we consider the possible ways that Issuers can"}
{"_id":"doc-en-ietf-wg-privacypass-base-drafts-f8f28857ce530f1c76ca9026afda3442fbede97b94c0dcf072ba2433d2a6ee2b","title":"","text":"Client anonymity. Such techniques are closely linked to the type of key schedule that is used by the Issuer. When an Issuer rotates their key, any Client that invokes the issuance protocol in this key cycle will be part of a group of possible clients owning valid tokens cycle will be part of a group of possible Clients owning valid tokens for this key. To mechanize this attack strategy, an Issuer could introduce a key rotation policy that forces Clients into small key cycles, reducing the size of the anonymity set for these Clients."}
{"_id":"doc-en-ietf-wg-privacypass-base-drafts-d9148b82a76ed3a2f0566e67baf8ec740a7b0e2ef130a1afe3936fe162fa444a","title":"","text":"partition, the Client limits the number of different Issuers used to a small number to maintain the privacy properties the Client requires. As long as each redemption partition maintains a strong privacy boundary with each other, the verifier will only be able to learn a number of bits of information up to the limits within that \"redemption partition\". privacy boundary with the others, the number of bits of information the verifier can learn is bounded by the number of \"redemption partitions\". To support this strategy, the client keeps track of a \"partition\" which contains the set of Issuers that redemptions have been"}
{"_id":"doc-en-ietf-wg-privacypass-base-drafts-e5801e25a891d55ce9a49c2b10d38c376cfcbc9ae81f80b7bf886f24bba46f13","title":"","text":"6. We present a number of security considerations that prevent malicious Clients from abusing the protocol. 6.1. Beyond the aforementioned security gaols for the Issuance protocol (issuance-protocol), it is important for Privacy Pass deployments to mitigate the risk of abuse by malicious Clients. When a Client holds tokens for an Issuer, it is possible for any verifier to cause that client to redeem tokens for that Issuer. This can lead to an attack where a malicious verifier can force a Client to spend all of their tokens from a given Issuer. To prevent this from happening, tokens can be scoped to single Origins such that they can only be redeemed within for a single Origin. can only be redeemed for a single Origin. If tokens are cross-Origin, Clients should use alternate methods to prevent many tokens from being redeemed at once. For example, if the"}
{"_id":"doc-en-ietf-wg-privacypass-base-drafts-72b8e6eb3252e71bd3b7a53d86438097db3f146cfc03cd748e91dd150e31d911","title":"","text":"directly communicating with an Issuer. Depending on the attestation, Attesters can store state about a Client, such as the number of overall tokens issued thus far. As an example of an issuance protocol, in the original Privacy Pass protocol PPSRV, tokens were protocol, in the original Privacy Pass protocol PPEXT, tokens were only issued to Clients that solved CAPTCHAs. In this context, the Attester attested that some client solved a CAPTCHA and the resulting token produced by the Issuer was proof of this fact."}
{"_id":"doc-en-ietf-wg-privacypass-base-drafts-8f23145c0956074029ebeb7c118c2350cd8c5d7bfeea02dcae3c0b453158bb55","title":"","text":"valid token available, it presents the token to the origin (redemption). Unlike many authentication schemes in which a client will present the same credentials across multiple requests, tokens used with the \"PrivateToken\" scheme are single-use credentials, and are not reused. Spending the same token value more than once allows the origin to link multiple transactions to the same client. In deployment scenarios where origins send token challenges to request tokens, origins ought to expect at most one request containing a token from the client in reaction to a particular challenge. 2.1. Origins send a token challenge to clients in an \"WWW-Authenticate\""}
{"_id":"doc-en-ietf-wg-privacypass-base-drafts-1f6e59ee575ed3c0ce5aa0f93cce4654be4a125137195585cfca09bbd86db31b","title":"","text":"The Privacy Pass protocol provides a privacy-preserving authorization mechanism. In essence, the protocol allows clients to provide cryptographic tokens that prove nothing other than that they have been created by a given server in the past I-D.ietf-privacypass- architecture. been created by a given server in the past ARCHITECTURE. This document describes the issuance protocol for Privacy Pass. It specifies two variants: one that is privately verifiable based on the oblivious pseudorandom function from OPRF, and one that is publicly verifiable based on the blind RSA signature scheme BLINDRSA. This document DOES NOT cover the architectural framework required for running and maintaining the Privacy Pass protocol in the Internet setting. In addition, it DOES NOT cover the choices that are necessary for ensuring that client privacy leaks do not occur. Both of these considerations are covered in I-D.ietf-privacypass- architecture. This document does not cover the Privacy Pass architecture, including choices that are necessary for ensuring that client privacy leaks. This information is covered in ARCHITECTURE. 2."}
{"_id":"doc-en-ietf-wg-privacypass-base-drafts-c89125059f19caf58529b7a5536c7ed2117fb54f813f184dad7f91f3a617a529","title":"","text":"blind RSA documents also apply in the Privacy Pass use-case. Considerations related to broader privacy and security concerns in a multi-Client and multi-Issuer setting are deferred to the Architecture document I-D.ietf-privacypass-architecture. Architecture document ARCHITECTURE. Beyond these considerations, it is worth highlighting the fact that Client TokenRequest messages contain truncated token key IDs. This"}
{"_id":"doc-en-ietf-wg-privacypass-base-drafts-a7c9cd3fc6f029ed7d9c6b8274b24feea3162f60fa19258ce611eb6050c12430","title":"","text":"initially issued. At a high level, the Privacy Pass architecture consists of two protocols: issuance and redemption. The issuance protocol runs between an endpoint referred to as a Client and two functions in the Privacy Pass architecture: Attestation and Issuance. These two network functions can be implemented by the same protocol participant, but can also be implemented separately. The entity that implements Issuance, referred to as the Issuer, is responsible for issuing tokens in response to requests from Clients. The entity that implements Attestation, referred to as the Attester, is responsible for attesting to properties about the Client for which tokens are issued. The Issuer needs to be trusted by the server that later redeems the token. Attestation can be performed by the Issuer or by an Attester that is trusted by the Issuer. Clients might prefer to select different Attesters, separate from the Issuer, to be able to use preferred authentication methods or to improve privacy by not directly communicating with an Issuer. Depending on the attestation, Attesters can store state about a Client, such as the number of overall tokens issued thus far. As an example of an issuance protocol, in the original Privacy Pass protocol PPEXT, tokens were only issued to Clients that solved CAPTCHAs. In this context, the Attester attested that some client solved a CAPTCHA and the resulting token produced by the Issuer was proof of this fact. The redemption protocol runs between Client and Origin (server). It allows Origins to challenge Clients to present one or more tokens for protocols: issuance and redemption. The redemption protocol AUTHSCHEME runs between Client and Origin (server). It allows Origins to challenge Clients to present one or more tokens for authorization. Depending on the type of token, e.g., whether or not it can be cached, the Client either presents a previously obtained token or invokes the issuance protocol to acquire one for authorization. The issuance and redemption protocols operate in concert as shown in the figure below. token or invokes an issuance protocol, such as ISSUANCE, to acquire a token to present as authorization. This document describes requirements for both issuance and redemption protocols. It also provides recommendations on how the architecture should be deployed to ensure the privacy of clients and the security of all participating entities. The privacypass working group is working on AUTHSCHEME as an instantiation of a redemption protocol and ISSUANCE as an instantiation of the issuance protocol. protocols and how they interact. It also provides recommendations on how the architecture should be deployed to ensure the privacy of clients and the security of all participating entities. 2."}
{"_id":"doc-en-ietf-wg-privacypass-base-drafts-442a2a32c3871230129248eb828d19c4968440511d5e13bf1b16a3621d27d239","title":"","text":"Attester: An entity that attests to properties of Client for the purposes of token issuance. Redemption context: The interactions and set of information shared between the Client and Origin. Issuance context: The interactions and set of information shared between the Client, Attester, and Issuer. Attestation context: The interactions and set of information shared between the Client and Attester only, for the purposes of attesting the vailidity of the Client. 3. The Privacy Pass architecture consists of four logical entities - Client, Origin, Issuer, and Attester - that work in concert as shown in introduction for token issuance and redemption. This section describes the purpose of token issuance and redemption and the requirements therein on the relevant participants. Client, Origin, Issuer, and Attester - that work in concert as for token issuance and redemption. This section describes the purpose of token issuance and redemption and the requirements on the relevant participants. The typical interaction flow for Privacy Pass tokens uses the following steps: A Client interacts with an Origin by sending an HTTP request. The Origin sends an HTTP response that contains a token challenge that indicates a specific Issuer to use. Note that the request might be made as part of accessing a resource normally, or with the specific intent of triggering a token challenge. If the Client already has a token available that satisfies the token challenge, it can skip to step 6 and redeem its token. Otherwise, it invokes the issuance protocol to request a token from the designated Issuer. The first step in the issuance protocol is attestation. Specifically, the Attester performs attestation checks on the Client. These checks could be proof of solving a CAPTCHA, device trust, hardware attestation, etc (see attester). If attestation succeeds, the client creates a Token Request to send to the designated Issuer (generally via the Attester). The Attester and Issuer might be functions on the same server, depending on the deployment model (see deployment). Depending on the details of Attestation, the Client can send the Token Request to the Attester alongside any attestation information. If attestation fails, the Client receives an error and issuance aborts without a token. The Issuer generates a Token Response based on the Token Request, which is returned to the Client (generally via the Attester). Upon receiving the Token Response, the Client computes a token from the token challenge and Token Response. This token can be validated by anyone with the per-Issuer key, but cannot be linked to the content of the Token Request or Token Response. If the Client has a token, it includes it in a subsequent HTTP request to the Origin, as authorization. This token is sent only once. The Origin validates that the token was generated by the expected Issuer and has not already been redeemed for the corresponding token challenge. If the Client does not have a token, perhaps because issuance failed, the client does not reply to the Origin's challenge with a new request. 3.1."}
{"_id":"doc-en-ietf-wg-privacypass-base-drafts-1bcbb0066d54fddd8f01a8452462f9cea4b79b70128a137e7314d83c0ab7b4f8","title":"","text":"identifiers or IP address information, to the Issuer. Tokens produced by an Issuer that admits issuance for any type of attestation cannot be relied on for any specific property. See attester-role for more details. attester for more details. 3.2.1."}
{"_id":"doc-en-ietf-wg-privacypass-base-drafts-863202349e8ec81866e82dac50a8ebe2e721de5bfb3f4f1659d3babbee019652","title":"","text":"timestamp of the event, Client visible information (including the IP address), and the Origin name. The challenge controls the type of token that the Origin will accept for the given resource. As described in AUTHSCHEME, there are a number of ways in which the token may vary, including: The challenge provides the client with the information necessary to obtain tokens that the server might subsequently accept (in this context). As described in AUTHSCHEME, there are a number of ways in which the token may vary, including: Issuance protocol. The token identifies the type of issuance protocol required for producing the token. Different issuance"}
{"_id":"doc-en-ietf-wg-privacypass-base-drafts-37bd72f35bf3ec5b99b5723098dca5f2328f570c5f7b84204b6e7d60f743a212","title":"","text":"3.2.1. Attestation is an important part of the issuance protocol. Attestation is the process by which an Attester bears witness to, confirms, or authenticates a Client so as to verify a property about the Client that is required for Issuance. Examples of attestation properties include, though are not limited to: Capable of solving a CAPTCHA. Clients that solve CAPTCHA challenges can be attested to have this capability for the purpose of being ruled out as a bot or otherwise automated Client. Client state. Clients can be associated with state and the attester can attest to this state. Examples of state include the number of issuance protocol invocations, the Client's geographic region, and whether the client has a valid application-layer account. Trusted device. Some Clients run on trusted hardware that are capable of producing device-level attestation statements. Each of these attestation types has different security properties. For example, attesting to having a valid account is different from attesting to running on trusted hardware. In general, minimizing the set of attestation formats helps minimize the amount of information leaked through a token. Attestation is an important part of the issuance protocol. In Privacy Pass, attestation is the process by which an Attester bears witness to, confirms, or authenticates a Client so as to verify a property about the Client that is required for Issuance. RFC9334 describes an architecture for attestation procedures. Using that architecture as a conceptual basis, Clients are RATS attesters that produce attestation evidence, and Attesters are RATS verififiers that appraise the validity of attestation evidence. The type of attestation procedure is a deployment-specific option and outside the scope of the issuance protocol. Example attestation procedures are below. Solving a CAPTCHA. Clients that solve CAPTCHA challenges can be attested to have this capability for the purpose of being ruled out as a bot or otherwise automated Client. Presenting evidence of Client device validity. Some Clients run on trusted hardware that are capable of producing device-level attestation evidence. Proving properties about Client state. Clients can be associated with state and the Attester can verify this state. Examples of state include the Client's geographic region and whether the Client has a valid application-layer account. Attesters may support different types of attestation procedures. A type of attestation procedure is also referred as an attestation format. In general, each attestation format has different security properties. For example, attesting to having a valid account is different from attesting to running on trusted hardware. In general, minimizing the set of attestation formats helps minimize the amount of information leaked through a token. Each attestation format also has an impact on the overall system privacy. Requiring a conjunction of attestation types could decrease"}
{"_id":"doc-en-ietf-wg-privacypass-base-drafts-0fb0b229d988893660d390065e11429e210e650741142aab8737f4d63c7660c1","title":"","text":"If the Client already has a token available that satisfies the token challenge, e.g., because the Client has a cache of previously issued tokens, it can skip to step-redemption and redeem its token. Otherwise, it invokes the issuance protocol to request a token from the designated Issuer. The first step in the issuance protocol is attestation. Specifically, the Attester performs attestation checks on the Client. These checks could be proof of solving a CAPTCHA, device trust, hardware attestation, etc (see attester). If attestation succeeds, the client creates a Token Request to send to the designated Issuer (generally via the Attester). The Attester and Issuer might be functions on the same server, depending on the deployment model (see deployment). Depending on the details of Attestation, the Client can send the Token Request to the Attester alongside any attestation information. If attestation fails, the Client receives an error and issuance aborts without a token. redeem its token. If the Client does not have a token available and decides it wants to obtain one (or more) bound to the token challenge, it then invokes the issuance protocol. As a prerequisite to the issuance protocol, the Client runs the deployment specific attestation process that is required for the designated Issuer. Client attestation can be done via proof of solving a CAPTCHA, checking device or hardware attestation validity, etc; see attester for more details. If the attestation process completes successfully, the client creates a Token Request to send to the designated Issuer (generally via the Attester). The Attester and Issuer might be functions on the same server, depending on the deployment model (see deployment). Depending on the attestation process, it is possible for attestation to run alongside the issuance protocol, e.g., where Clients send necessary attestation information to the Attester along with their Token Request. If the attestation process fails, the Client receives an error and issuance aborts without a token. The Issuer generates a Token Response based on the Token Request, which is returned to the Client (generally via the Attester)."}
{"_id":"doc-en-ietf-wg-privacypass-base-drafts-15e724de4045c01f37028476122e4e84d5375fd4418e92275e326c57008cfb70","title":"","text":"Issuer-Client unlinkability. This is similar to Origin-Client unlinkability in that a Client in an issuance context is indistinguishable from any other Client that might use the same issuance context. The set of Clients that share the same redemption context is referred to as a redemption anonymity set. issuance context. The set of Clients that share the same issuance context is referred to as an issuance anonymity set. Attester-Origin unlinkability. This is similar to Origin-Client and Issuer-Client unlinkability. It means that given two attestation contexts, the Attester cannot determine if both contexts correspond to the same Origin or two different Origins. The set of Clients that share the same attestation context is referred to as an anonymity set. referred to as an attestation anonymity set. By ensuring that different contexts cannot be linked in this way, only the Client is able to correlate information that might be used"}
{"_id":"doc-en-ietf-wg-privacypass-base-drafts-a89fc1896946b80dbce72ccf46d6542d2e6a9ba3251d49e20ac789a49f1793ba","title":"","text":"If the Client already has a token available that satisfies the token challenge, e.g., because the Client has a cache of previously issued tokens, it can skip to step-redemption and redeem its token. redeem its token; see hoarding for security considerations of cached tokens. If the Client does not have a token available and decides it wants to obtain one (or more) bound to the token challenge, it then"}
{"_id":"doc-en-ietf-wg-privacypass-base-drafts-31a3f5579fd7ff21183e2aad8e8f7b7c17bba4b7b82997e8f4a368b299af5593","title":"","text":"Origins. Implementing mitigations discused in deployment and privacy is therefore necessary to ensure that Privacy Pass offers meaningful privacy improvements to end-users. 7.1. Depending on the Origin's token challenge, Clients can request and cache more than one token using an issuance protocol. Cached tokens help improve privacy by separating the time of token issuance from the time of token redemption, and also allow Clients to reduce the overhead of receiving new tokens via the issuance protocol. As a consequence, Origins that send token challenges which are compatible with cached tokens need to take precautions to ensure that tokens are not replayed. This is typically done via keeping track of tokens that are redeemed for the period of time in which cached tokens would be accepted for particular challenges. Moreover, since tokens are not intrinsically bound to Clients, it is possible for malicious Clients to collude and share tokens in a so- called \"hoarding attack.\" As an example of this attack, many distributed Clients could obtain cacheable tokens and them share them with a single Client to redeem in a way that would violate an Origin's attempt to limit tokens to any one particular Client. Depending on the deployment model, it can be possible to detect these types of attacks by comparing issuance and redemption contexts; for example, this is possible in the Joint Origin and Issuer model. "}
{"_id":"doc-en-ietf-wg-privacypass-base-drafts-43cd344bd71db6ec1c1494cc83cbbad1c79c0e77b498bc4aa0e7e40a1e7719db","title":"","text":"3.4.1. Attestation is an important part of the issuance protocol. In Privacy Pass, attestation is the process by which an Attester bears witness to, confirms, or authenticates a Client so as to verify a property about the Client that is required for Issuance. Clients explicitly trust Attesters to perform attestation correctly and in a way that does not violate their privacy. In Privacy Pass, attestation is the process by which an Attester bears witness to, confirms, or authenticates a Client so as to verify properties about the Client that are required for Issuance. Issuers trust Attesters to perform attestation correctly. RFC9334 describes an architecture for attestation procedures. Using that architecture as a conceptual basis, Clients are RATS attesters"}
{"_id":"doc-en-ietf-wg-privacypass-base-drafts-f3633eee33cf4f0508ae513d997e8ba8574369a98a6e7a5b1342d35fa612261e","title":"","text":"minimizing the set of supported attestation procedures helps minimize the amount of information leaked through a token. Each attestation procedure also has an impact on the overall system privacy. Requiring a conjunction of attestation types could decrease the overall anonymity set size. For example, the number of Clients that have solved a CAPTCHA in the past day, that have a valid account, and that are running on a trusted device is less than the number of Clients that have solved a CAPTCHA in the past day. Attesters SHOULD not admit attestation types that result in small anonymity sets. The role of the Attester in the issuance protocol and its impact on privacy depends on the type of attestation procedure, issuance protocol, deployment model. For instance, requiring a conjunction of attestation procedures could decrease the overall anonymity set size. As an example, the number of Clients that have solved a CAPTCHA in the past day, that have a valid account, and that are running on a trusted device is less than the number of Clients that have solved a CAPTCHA in the past day. Attesters SHOULD NOT be based on attestation procedures that result in small anonymity sets. Depending on the issuance protocol, the Issuer might learn information about the Origin. To ensure Issuer-Client unlinkability, the Issuer should be unable to link that information to a specific Client. For such issuance protocols where the Attester has access to Client-specific information, such as is the case for attestation procedures that involve Client-specific information (such as application-layer account information) or for deployment models where the Attester learns Client-specific information (such as Client IP addresses), Clients trust the Attester to not share any Client- specific information with the Issuer. In deployments where the Attester does not learn Client-specific information, the Client does not need to explicitly trust the Attester in this regard. Issuers trust Attesters to correctly and reliably perform attestation. However, certain types of attestation can vary in value"}
{"_id":"doc-en-ip-handling-50e8dcf8511440d55c15fe626676a84ebab3c957f0fe3ca7b35888d7d37db04e","title":"","text":"WebRTC IP Address Handling Requirements draft-ietf-rtcweb-ip-handling-10 draft-ietf-rtcweb-ip-handling-11 Abstract"}
{"_id":"doc-en-ip-handling-112860d792f7e34f8b15ed5e9d7cae1535d654afc906326e1e732dda5259aa84","title":"","text":"2. The key words \"MUST\", \"MUST NOT\", \"REQUIRED\", \"SHALL\", \"SHALL NOT\", \"SHOULD\", \"SHOULD NOT\", \"RECOMMENDED\", \"MAY\", and \"OPTIONAL\" in this document are to be interpreted as described in RFC2119. \"SHOULD\", \"SHOULD NOT\", \"RECOMMENDED\", \"NOT RECOMMENDED\", \"MAY\", and \"OPTIONAL\" in this document are to be interpreted as described in BCP 14 RFC2119 RFC8174 when, and only when, they appear in all capitals, as shown here. 3. In order to establish a peer-to-peer connection, WebRTC implementations use Interactive Connectivity Establishment (ICE) RFC5245, which attempts to discover multiple IP addresses using RFC8445, which attempts to discover multiple IP addresses using techniques such as Session Traversal Utilities for NAT (STUN) RFC5389 and Traversal Using Relays around NAT (TURN) RFC5766, and then checks the connectivity of each local-address-remote-address pair in order"}
{"_id":"doc-en-ip-handling-adf2af0e4a590a525bd51a7cc3959ff2fa22b77ec23053f4d649ad959b0c98a5","title":"","text":"choose stricter modes if desired, e.g., if a user indicates they want all WebRTC traffic to follow the default route. Future versions of this document may define additional modes and/or update the recommended default modes. Future documents may define additional modes and/or update the recommended default modes. Note that the suggested defaults can still be used even for organizations that want all external WebRTC traffic to traverse a"}
{"_id":"doc-en-jsep-7842e3505d456f8d2a1cbaa9769fe5a2814bb0f1dc17413eeeaf9dcde9b8521e","title":"","text":"1.3. When RFC8829 was published, inconsistencies regarding BUNDLE RFC8843 operation were identified with regard to both the specification text as well as implementation behavior. The former concern was addressed via an update to RFC8843. For the latter concern, it was observed that some implementations implemented the \"max-bundle\" bundle policy defined in RFC8829 by assuming that bundling had already been negotiated, rather than marking \"m=\" sections as bundle-only as indicated by the specification. In order to prevent unexpected changes to applications relying on the pre-standard behavior, the decision was made to deprecate \"max-bundle\" and instead introduce an identically defined \"must-bundle\" policy that, when selected, provides the behavior originally specified by RFC8829. When RFC8829 was published, inconsistencies regarding BUNDLE I- D.ietf-mmusic-rfc8843-bis operation were identified with regard to both the specification text as well as implementation behavior. The former concern was addressed via an update to I-D.ietf-mmusic- rfc8843-bis. For the latter concern, it was observed that some implementations implemented the \"max-bundle\" bundle policy defined in RFC8829 by assuming that bundling had already been negotiated, rather than marking \"m=\" sections as bundle-only as indicated by the specification. In order to prevent unexpected changes to applications relying on the pre-standard behavior, the decision was made to deprecate \"max-bundle\" and instead introduce an identically defined \"must-bundle\" policy that, when selected, provides the behavior originally specified by RFC8829. 2."}
{"_id":"doc-en-jsep-94559728c668b541130cc9dbd90c969863d930f0ae6838df481c1fdbcb942cf5","title":"","text":"bundled (either by a successful bundle negotiation or by being marked as bundle-only), then candidates will be gathered and exchanged for that \"m=\" section if and only if its MID item is a BUNDLE-tag, as described in RFC8843. described in I-D.ietf-mmusic-rfc8843-bis. 3.5.2."}
{"_id":"doc-en-jsep-1278bf8cc89a409f120cb181e0dedf5709f55b47bc4fca7b967e6786606ce9ce","title":"","text":"MUST be zero. The application can specify its preferred policy regarding the use of BUNDLE, the multiplexing mechanism defined in RFC8843. Regardless of policy, the application will always try to negotiate bundle onto a single transport and will offer a single bundle group across all \"m=\" sections; use of this single transport is contingent upon the answerer accepting bundle. However, by specifying a policy from the list below, the application can control exactly how aggressively it will try to bundle media streams together, which affects how it will interoperate with a non-bundle-aware endpoint. When negotiating with a non-bundle-aware endpoint, only the streams not marked as bundle- only streams will be established. BUNDLE, the multiplexing mechanism defined in I-D.ietf-mmusic- rfc8843-bis. Regardless of policy, the application will always try to negotiate bundle onto a single transport and will offer a single bundle group across all \"m=\" sections; use of this single transport is contingent upon the answerer accepting bundle. However, by specifying a policy from the list below, the application can control exactly how aggressively it will try to bundle media streams together, which affects how it will interoperate with a non-bundle- aware endpoint. When negotiating with a non-bundle-aware endpoint, only the streams not marked as bundle-only streams will be established. The set of available policies is as follows:"}
{"_id":"doc-en-jsep-12c9c6c1283bfca7bbd7be1f2e0eb83c837d271a89ed305d68444ecd3c2b6c48","title":"","text":"RFC8859 groups SDP attributes into different categories. To avoid unnecessary duplication when bundling, attributes of category IDENTICAL or TRANSPORT MUST NOT be repeated in bundled \"m=\" sections, repeating the guidance from RFC8843. This includes \"m=\" sections for which bundling has been negotiated and is still desired, as well as \"m=\" sections marked as bundle-only. repeating the guidance from I-D.ietf-mmusic-rfc8843-bis. This includes \"m=\" sections for which bundling has been negotiated and is still desired, as well as \"m=\" sections marked as bundle-only. The following attributes, which are of a category other than IDENTICAL or TRANSPORT, MUST be included in each \"m=\" section:"}
{"_id":"doc-en-jsep-d8f21908a8400c89fa23db622a98164463dfaaea046104febb4293e95e2e41d3","title":"","text":"possible, and media sections will not be marked as bundle-only. This is by design, but could cause issues in the rare case of sending a subsequent offer as an initial offer to a non-bundle-aware endpoint via Third Party Call Control (3PCC). via Third Party Call Control (3PCC), as discussed in I-D.ietf-mmusic- rfc8843-bis. \"a=group:LS\" attributes are generated in the same way as for initial offers, with the additional stipulation that any lip sync groups that"}
{"_id":"doc-en-jsep-c6f7bc5d762b8d898808c9b0e8ce335b4745c7b066e0444100769d9ca7dae0a0","title":"","text":"If the answer contains valid bundle groups, discard any ICE components for the \"m=\" sections that will be bundled onto the primary ICE components in each bundle, and begin muxing these \"m=\" sections accordingly, as described in RFC8843. sections accordingly, as described in I-D.ietf-mmusic-rfc8843-bis. If the description is of type \"answer\" and there are still remaining candidates in the ICE candidate pool, discard them."}
{"_id":"doc-en-jsep-7f4d25042c9966bfb33de5706d4e1ec62de6ba04565c1e46a76baea6d4872d64","title":"","text":"6. When bundling, associating incoming RTP/RTCP with the proper \"m=\" section is defined in RFC8843. When not bundling, the proper \"m=\" section is clear from the ICE component over which the RTP/RTCP is received. section is defined in I-D.ietf-mmusic-rfc8843-bis. When not bundling, the proper \"m=\" section is clear from the ICE component over which the RTP/RTCP is received. Once the proper \"m=\" section or sections are known, RTP/RTCP is delivered to the RtpTransceiver(s) associated with the \"m=\""}
{"_id":"doc-en-jsep-80b04ccbbdd5e390f7bb2c3f0c84edf9abdfa70e90ed5532d5157a650429f726","title":"","text":"RFC4566 is the base SDP specification and MUST be implemented. RFC5764 MUST be supported for signaling the UDP/TLS/RTP/SAVPF RFC5764 and TCP/TLS/RTP/SAVPF I-D.nandakumar-mmusic-proto-iana- RFC5764 and TCP/DTLS/RTP/SAVPF I-D.nandakumar-mmusic-proto-iana- registration RTP profiles. RFC5245 MUST be implemented for signaling the ICE credentials and"}
{"_id":"doc-en-jsep-5d8ddceb5fe76f40a6403978c88d6af977a32662c86d571b4fd08a3c5805c7be","title":"","text":"5.1.3. For media m= sections, JSEP endpoints MUST support both the \"UDP/TLS/ RTP/SAVPF\" and \"TCP/TLS/RTP/SAVPF\" profiles and MUST indicate one of RTP/SAVPF\" and \"TCP/DTLS/RTP/SAVPF\" profiles and MUST indicate one of these two profiles for each media m= line they produce in an offer. For data m= sections, JSEP endpoints must support both the \"UDP/TLS/ SCTP\" and \"TCP/TLS/SCTP\" profiles and MUST indicate one of these two For data m= sections, JSEP endpoints must support both the \"UDP/DTLS/ SCTP\" and \"TCP/DTLS/SCTP\" profiles and MUST indicate one of these two profiles for each data m= line they produce in an offer. Because ICE can select either TCP or UDP transport depending on network conditions, both advertisements are consistent with ICE eventually"}
{"_id":"doc-en-jsep-8bd1564c727ca7f95fb6bbff208b46ec5da6e01949384952ee6497e1dc7d3532","title":"","text":"compatible mode and use AVP timing, i.e., \"trr-int=4\". For data m= sections, JSEP endpoints MUST support receiving the \"UDP/ TLS/SCTP\", \"TCP/TLS/SCTP\", or \"DTLS/SCTP\" (for backwards \"UDP/ DTLS/SCTP\", \"TCP/DTLS/SCTP\", or \"DTLS/SCTP\" (for backwards compatibility) profiles. Note that re-offers by JSEP endpoints MUST use the correct profile"}
{"_id":"doc-en-jsep-6bd5e177a644a2f6408d83ea93f91f702c0a573d6fc8690aa7e0332e835273ed","title":"","text":"To properly indicate use of DTLS, the field MUST be set to \"UDP/TLS/RTP/SAVPF\", as specified in RFC5764, Section 8, if the default candidate uses UDP transport, or \"TCP/TLS/RTP/SAVPF\", as default candidate uses UDP transport, or \"TCP/DTLS/RTP/SAVPF\", as specified inI-D.nandakumar-mmusic-proto-iana-registration if the default candidate uses TCP transport."}
{"_id":"doc-en-jsep-6dcc5ae3882183d7f18b4a673b5030d94035d407e30800d3c74f21e26d6d8138","title":"","text":"Lastly, if a data channel has been created, a m= section MUST be generated for data. The field MUST be set to \"application\" and the field MUST be set to \"UDP/TLS/SCTP\" if the default candidate uses UDP transport, or \"TCP/TLS/SCTP\" if the default and the field MUST be set to \"UDP/DTLS/SCTP\" if the default candidate uses UDP transport, or \"TCP/DTLS/SCTP\" if the default candidate uses TCP transport I-D.ietf-mmusic-sctp-sdp. The \"fmt\" value MUST be set to the SCTP port number, as specified in Section 4.1. [TODO: update this to use a=sctp-port, as indicated in"}
{"_id":"doc-en-jsep-c762e4f5bab05a3e337928991146a572fc3620141376dd10427b906473e834e2","title":"","text":"Specific processing MUST also be applied for the following attribute lines: If present, a single \"a=ice-lite\" line is parsed as specified in RFC5245, Section 15.3, and a value indicating the presence of ice- lite is stored. If present, a single \"a=ice-ufrag\" line is parsed as specified in RFC5245, Section 15.4, and the ufrag value is stored."}
{"_id":"doc-en-jsep-7722fab71628317e2bf50e0d0d59463c78736118b8585fccbce641fb0b4b76cf","title":"","text":"BUNDLE, the multiplexing mechanism defined in I-D.ietf-mmusic-sdp- bundle-negotiation. Regardless of policy, the application will always try to negotiate BUNDLE onto a single transport, and will offer a single BUNDLE group across all media sections. However, by specifying a policy from the list below, the application can control how aggressively it will try to BUNDLE media streams together, which affects how it will interoperate with a non-BUNDLE-aware endpoint. When negotiating with a non-BUNDLE-aware endpoint, only the streams not marked as bundle-only streams will be established. The set of available policies is as follows: offer a single BUNDLE group across all media section; use of this single transport is contingent upon the answerer accepting BUNDLE. However, by specifying a policy from the list below, the application can control exactly how aggressively it will try to BUNDLE media streams together, which affects how it will interoperate with a non- BUNDLE-aware endpoint. When negotiating with a non-BUNDLE-aware endpoint, only the streams not marked as bundle-only streams will be established. The set of available policies is as follows: The first media section of each type (audio, video, or application) will contain transport parameters, which will allow"}
{"_id":"doc-en-jsep-d77eb756468df98f833760c05db7e7c2c54ce0fde8d8591ba2a140404ad143b6","title":"","text":"present, but an \"AS\" value is specified, generate a \"TIAS\" value using this formula: TIAS = AS * 0.95 - 50 * 40 * 8 TIAS = AS * 1000 * 0.95 - 50 * 40 * 8 The 50 is based on 50 packets per second, the 40 is based on an estimate of total header size, and the 0.95 is to allocate 5% to RTCP. If more accurate control of bandwidth is needed, \"TIAS\" should be used instead of \"AS\". estimate of total header size, the 1000 is to change the unit from kbps to bps and the 0.95 is to allocate 5% to RTCP. If more accurate control of bandwidth is needed, \"TIAS\" should be used instead of \"AS\". For any \"RR\" or \"RS\" bandwidth values, handle as specified in RFC3556, Section 2."}
{"_id":"doc-en-jsep-0baa6580b865641c5957acc24a2dee658e11195db4a28e81598b77a016913116","title":"","text":"The next step is to generate m= sections, as specified in RFC4566 Section 5.14. An m= section is generated for each RtpTransceiver that has been added to the PeerConnection via the addTrack, addTransceiver, and setRemoteDescription methods. [[OPEN ISSUE: move discussion of setRemoteDescription to the subsequent-offer section.]] This is done in the order that their associated RtpTransceivers were added to the PeerConnection and excludes RtpTranscievers that are stopped and not associated with an m= section (either due to an m= section being recycled or an RtpTransceiver having been stopped before being associated with an m= section) . that has been added to the PeerConnection. This is done in the order that their associated RtpTransceivers were added to the PeerConnection and excludes RtpTransceivers that are stopped and not associated with an m= section (either due to an m= section being recycled or an RtpTransceiver having been stopped before being associated with an m= section) . Each m= section, provided it is not marked as bundle-only, MUST generate a unique set of ICE credentials and gather its own unique"}
{"_id":"doc-en-jsep-e0a92dcd4bbe85103269978c17fc24b4174775708d67fd44d87a2c1f351880d9","title":"","text":"as defined in RFC5245, Section 4.1.1, unless it has been marked as bundle-only. Or, if the ICE ufrag and password values have changed, trigger the ICE Agent to start an ICE restart and begin gathering new candidates for the media section, as defined in RFC5245, Section 9.1.1.1, unless it has been marked as bundle-only. Or, if the ICE ufrag and password values have changed, and it has not been marked as bundle-only, trigger the ICE Agent to start an ICE restart, and begin gathering new candidates for the media section as described in RFC5245, Section 9.1.1.1. If this description is an answer, also start checks on that media section as defined in RFC5245, Section 9.3.1.1. If the media section proto value indicates use of RTP:"}
{"_id":"doc-en-jsep-127bf575e8d843281fca70c5923d4c6189dccb2b2506c5fc14a4c304f8fee16e","title":"","text":"parameters are out of bounds, or cannot be applied, processing MUST stop and an error MUST be returned. If the description is of type \"offer\", and the ICE ufrag or password changed from the previous remote description, as described in Section 9.1.1.1 of RFC5245, mark that an ICE restart is needed. If the ICE ufrag or password changed from the previous remote description, then an ICE restart is needed, as described in Section 9.1.1.1 of RFC5245 If the description is of type \"offer\", mark that an ICE restart is needed. If the description is of type \"answer\" and the current local description is also an ICE restart, then signal the ICE agent to begin checks as described in Section 9.3.1.1 of RFC5245. An answer MUST change the ufrag and password in an answer if and only if ICE is restarting, as described in Section 9.2.1.1 of RFC5245. Configure the ICE components associated with this media section to use the supplied ICE remote ufrag and password for their"}
{"_id":"doc-en-jsep-e162b0d2d28374cc9e03978d942db00a5b0c4d57cdd0fb3b7171b0e406843eec","title":"","text":"4.1.3. [TODO] The addTransceiver method adds a new RTPTransceiver to the PeerConnection. If a MediaStreamTrack argument is provided, then the transceiver will be configured with that media type and the track will be attached to the transceiver. Otherwise, the application MUST explicitly specify the type; this mode is useful for creating recvonly transceivers as well as for creating transceivers to which a track can be attached at some later point. At the time of creation, the application can also specify a transceiver direction attribute, a set of MediaStreams which the transceiver is associated with (allowing LS group assignments), and a set of encodings for the media (used for simulcast as desccribed in sec.simulcast). 4.1.4."}
{"_id":"doc-en-jsep-66db5e97495583424fde2d53b294803bf042b56b6a9dda6243cc4ecef7c33084","title":"","text":"For each specified RTP header extension, establish a mapping between the extension ID and URI, as described in section 6 of RFC5285. If any indicated RTP header extension is unknown, this MUST result in an error. RFC5285. If any indicated RTP header extension is not supported, this MUST result in an error. If the MID header extension is supported, prepare to demux RTP data intended for this media section based on the MID header extension, as described in I-D.ietf-mmusic-msid, Section 3.2. For each specified payload type, establish a mapping between the payload type ID and the actual media format, as described in RFC3264. If any indicated payload type is unknown, this MUST result in an error. For each specified media format, establish a mapping between the payload type and the actual media format, as described in RFC3264, Section 6.1. If any indicated media format is not supported, this MUST result in an error. For each specified \"rtx\" media format, establish a mapping between the RTX payload type and its associated primary payload"}
{"_id":"doc-en-jsep-d280bd1d2702c9446da901e27453348ed7712cb582989f82ad43bd4fe66bb519","title":"","text":"If the media section proto value indicates use of RTP: [TODO: header extensions] If the m= section is being recycled (see sec.subsequent- offers), dissociate the currently associated RtpTransceiver by setting its mid attribute to null."}
{"_id":"doc-en-jsep-6184e715bef95e7500bbec4e0538a0cffd8c0b8d992822a36eed6665adfd9cd7","title":"","text":"section by setting the value of the RtpTransceiver's mid attribute to the MID of the m= section. For each specified payload type that is also supported by the local implementation, establish a mapping between the payload type ID and the actual media format. [TODO - Justin to add more to explain mapping.] If any indicated payload type is unknown, it MUST be ignored. [TODO: should fail on answers] For each specified media format that is also supported by the local implementation, establish a mapping between the specified payload type and the media format, as described in RFC3264, Section 6.1. Specifically, this means that the implementation records the payload type to be used in outgoing RTP packets when sending each specified media format, as well as the relative preference for each format that is indicated in their ordering. If any indicated media format is not supported by the local implementation, it MUST be ignored. For each specified \"rtx\" media format, establish a mapping between the RTX payload type and its associated primary payload type, as described in RFC4588. If any referenced primary payload types are not present, this MUST result in an error. type, as described in RFC4588, Section 4. If any referenced primary payload types are not present, this MUST result in an error. For each specified fmtp parameter that is supported by the local implementation, enable them on the associated payload types. local implementation, enable them on the associated media formats. For each specified RTP header extension that is also supported by the local implementation, establish a mapping between the extension ID and URI, as described in RFC5285, Section 5. Specifically, this means that the implementation records the extension ID to be used in outgoing RTP packets when sending each specified header extension. If any indicated RTP header extension is not supported by the local implementation, it MUST be ignored. For each specified RTCP feedback mechanism that is supported by the local implementation, enable them on the associated payload types. the local implementation, enable them on the associated media formats. For any specified \"TIAS\" bandwidth value, set this value as a constraint on the maximum RTP bitrate to be used when sending"}
{"_id":"doc-en-jsep-f871d54783937998fba4d01108408087414102a9b978e46768d4c85788b50905","title":"","text":"[TODO: handling of CN, telephone-event, \"red\"] If the media section if of type audio: If the media section is of type audio: For any specified \"ptime\" value, configure the available payload types to use the specified packet size. If the specified size is not supported for a payload type, use the media formats to use the specified packet size. If the specified size is not supported for a media format, use the next closest value instead. Finally, if this description is of type \"pranswer\" or \"answer\","}
{"_id":"doc-en-jsep-450198946b60d913c5f6a60dfc82f9b60636958baa5c8d441b922d19861bc9b4","title":"","text":"If the media section proto value indicates use of RTP: If the media section references any media formats, RTP header extensions, or RTCP feedback mechanisms that were not present in the corresponding media section in the offer, this indicates a negotiation problem and MUST result in an error. If the media section has RTCP mux enabled, discard any RTCP component, and begin or continue muxing RTCP over the RTP component, as specified in RFC5761, Section 5.1.3. Otherwise,"}
{"_id":"doc-en-jsep-578aa5232e16a6677164d5e22e4f39549834665191445d4880b9a8a747d05ee4","title":"","text":"the RTCP transmission for this media section to use reduced- size RTCP, as specified in RFC5506. [TODO: enable appropriate rtcp-fb mechanisms] If the directional attribute in the answer is of type \"sendrecv\" or \"sendonly\", prepare to start transmitting media using the specified primary SSRC and one of the selected payload types, once the underlying transport layers have been established. If RID values are specified, include the RID header extension in the RTP streams, as indicated in I-D.ietf- mmusic-rid, Section 4). If simulcast is negotiated, send the number of Source RTP Streams as specified in I-D.ietf-mmusic- sdp-simulcast, Section 6.2.2. If the directional attribute is of type \"recvonly\" or \"inactive\", stop transmitting RTP media, although RTCP should still be sent, as described in RFC3264, Section 5.1. using the most preferred media format from the remote description that is also present in the answer, as described in RFC3264, Sections 6.1 and 7, once the underlying transport layers have been established. [TODO: add discusssion of RED/FEC/RTX/CN] The payload type mapping from the remote description is used to determine payload types for the outgoing RTP streams. Any RTP header extensions that were negotiated should be included in the outgoing RTP streams, using the extension mapping from the remote description; if the RID header extension has been negotiated, and RID values are specified, include the RID header extension in the outgoing RTP streams, as indicated in I-D.ietf-mmusic-rid, Section 4). If simulcast is negotiated, send the number of Source RTP Streams as specified in I-D.ietf-mmusic-sdp-simulcast, Section 6.2.2. If the directional attribute is of type \"recvonly\" or \"inactive\", stop transmitting RTP media, although RTCP should still be sent, as described in RFC3264, Section 5.1. If the media section proto value indicates use of SCTP:"}
{"_id":"doc-en-jsep-a9eca40777f9431806d975eb43e4c42c0fc49ad4a7f1faf7a0fd44aee953ca1b","title":"","text":"Each \"a=mid\" line MUST stay the same. Each \"a=ice-ufrag\" and \"a=ice-pwd\" line MUST stay the same. Each \"a=ice-ufrag\" and \"a=ice-pwd\" line MUST stay the same unless the \"IceRestart\" option (sec.options-handling was specified. Note that it's not clear why you would actually want to do this, since at this point ICE has not yet started and is thus unlikely to need a restart. For MediaStreamTracks that are still present, the \"a=msid\", \"a=ssrc\", and \"a=ssrc-group\" lines MUST stay the same."}
{"_id":"doc-en-jsep-2b2a34f017b665e2c248d1d39bd45d1434a9aba25559917e106ad54312e263c1","title":"","text":"resources allocated by the caller can be released, now that the exact session configuration is known. These \"resources\" can include things like extra ICE components, TURN candidates, or video decoders. Provisional answers, on the other hand, do no such deallocation results; as a result, multiple dissimilar provisional answers can be received and applied during call setup. Provisional answers, on the other hand, do no such deallocation; as a result, multiple dissimilar provisional answers can be received and applied during call setup. In RFC3264, the constraint at the signaling level is that only one offer can be outstanding for a given session, but at the media stack"}
{"_id":"doc-en-jsep-c81e1bfef15af0855ed14c0ebe3b02cb06cf185c656872fa1ccb85ade3b38dc2","title":"","text":"transceiver direction is intersected with the offered direction, as explained in the sec.generating-an-answer section below. Note that while setDirection sets the direction attribute of the transceiver immediately (sec.transceiver-direction), this attribute does not immediately affect whether the transceiver's RtpSender will send or its RtpReceiver will receive. The direction in effect is represented by the currentDirection attribute, which is only updated when an answer is applied. 4.2.4. The direction method returns the last value passed into setDirection."}
{"_id":"doc-en-jsep-600cd9bc8e3ac9c4c2fe538acd4f4619052bcc26b0c246fdf41df83ba7be1ed6","title":"","text":"If RTCP mux is indicated, prepare to demux RTP and RTCP from the RTP ICE component, as specified in RFC5761, Section 5.1.1. If RTCP mux is not indicated, but was indicated in a previous description, this MUST result in an error. If RTCP mux is not indicated, but was previously negotiated, i.e., the RTCP ICE component no longer exists, this MUST result in an error. For each specified RTP header extension, establish a mapping between the extension ID and URI, as described in section 6 of"}
{"_id":"doc-en-jsep-5bde5c503fd0f9e5e9e64ae4b1c589f6bdd8c8b90a43a469cf816c4228d82840","title":"","text":"local description is supplied, and the number of transports currently in use does not match the number of transports needed by the local description, the PeerConnection will create transports as needed and begin gathering candidates for them. either withdraw an appropriate number of ICE candidates from the candidate pool or begin gathering candidates if sufficient pre- gathered candidates are not available. If setRemoteDescription was previously called with an offer, and setLocalDescription is called with an answer (provisional or final),"}
{"_id":"doc-en-jsep-a2980697ead4c8dd2e3cfee1d0c097b9438b3d9b1428558641a91dab4324c289","title":"","text":"The 50 is based on 50 packets per second, the 40 is based on an estimate of total header size, the 1000 changes the unit from kbps to bps (as required by TIAS), and the 0.95 is to allocate 5% to RTCP. If more accurate control of bandwidth is needed, \"TIAS\" should be used instead of \"AS\". 5% to RTCP. \"TIAS\" is used in preference to \"AS\" because it provides more accurate control of bandwidth. For any \"RR\" or \"RS\" bandwidth values, handle as specified in RFC3556, Section 2."}
{"_id":"doc-en-jsep-788dac0f0f516b74b4b86546f484f79d5595ab90ffb26e35fd67356b6b021e89","title":"","text":"If the media section has been rejected (i.e. port is set to zero in the answer), stop any reception or transmission of media for this section, and discard any associated ICE components, as this section, and, if there was no accepted media section bundled with this media section, discard any associated ICE components, as described in Section 9.2.1.3 of RFC5245. If the remote DTLS fingerprint has been changed or the dtls-id has"}
{"_id":"doc-en-jsep-2d8bd175fc5ead2de919d4ecc6586f37571faffd17057a9a6a32a62a9e08f68a","title":"","text":"session configuration is known. These \"resources\" can include things like extra ICE components, TURN candidates, or video decoders. Provisional answers, on the other hand, do no such deallocation; as a result, multiple dissimilar provisional answers can be received and applied during call setup. result, multiple dissimilar provisional answers, with their own codec choices, transport parameters, etc., can be received and applied during call setup. Note that the final answer itself may be different than any received provisional answers. In RFC3264, the constraint at the signaling level is that only one offer can be outstanding for a given session, but at the media stack"}
{"_id":"doc-en-jsep-dfe4e56f78568dca6c84a1e3757b745705937bea95f3344f6f5d23859a2be792","title":"","text":"JSEP implementations must comply with the specifications listed below that govern the creation and processing of offers and answers. The first set of specifications is the \"mandatory-to-implement\" set. All implementations must support these behaviors, but may not use all of them if the remote side, which may not be a JSEP endpoint, does not support them. The second set of specifications is the \"mandatory-to-use\" set. The local JSEP endpoint and any remote endpoint must indicate support for these specifications in their session descriptions. 5.1.1. Implementations of JSEP MUST conform to I-D.ietf-rtcweb-rtp-usage. This list of mandatory-to-implement specifications is derived from the requirements outlined in that document and from I-D.ietf-rtcweb- security-arch. RFC4566 is the base SDP specification and MUST be implemented. RFC5764 MUST be supported for signaling the UDP/TLS/RTP/SAVPF RFC5764, TCP/DTLS/RTP/SAVPF RFC7850, \"UDP/DTLS/SCTP\" I-D.ietf- mmusic-sctp-sdp, and \"TCP/DTLS/SCTP\" I-D.ietf-mmusic-sctp-sdp RTP profiles. RFC5245 MUST be implemented for signaling the ICE credentials and candidate lines corresponding to each media stream. The ICE implementation MUST be a Full implementation, not a Lite implementation. RFC5763 MUST be implemented to signal DTLS certificate fingerprints. RFC5888 MUST be implemented for signaling grouping information, and MUST be used to identify m= lines via the a=mid attribute. I-D.ietf-mmusic-msid MUST be supported, in order to signal associations between RTP objects and W3C MediaStreams and MediaStreamTracks in a standard way. The bundle mechanism in I-D.ietf-mmusic-sdp-bundle-negotiation MUST be supported to signal the ability to multiplex RTP streams on a single UDP port, in order to avoid excessive use of port number resources. The SDP attributes of \"sendonly\", \"recvonly\", \"inactive\", and \"sendrecv\" from RFC4566 MUST be implemented to signal information about media direction. RFC5576 MUST be implemented to signal RTP SSRC values and grouping semantics. RFC4585 MUST be implemented to signal RTCP based feedback. RFC5761 MUST be implemented to signal multiplexing of RTP and RTCP. RFC5506 MUST be implemented to signal reduced-size RTCP messages. RFC4588 MUST be implemented to signal RTX payload type associations. RFC3556 MUST be supported for control of RTCP bandwidth limits. The SDES SRTP keying mechanism from RFC4568 MUST NOT be implemented, as discussed in I-D.ietf-rtcweb-security-arch. As required by RFC4566, Section 5.13, JSEP implementations MUST ignore unknown attribute (a=) lines. 5.1.2. All session descriptions handled by JSEP implementations, both local and remote, MUST indicate support for the following specifications. If any of these are absent, this omission MUST be treated as an"}
{"_id":"doc-en-jsep-224f773bb18c0160225a723509139cf552146de8ab19f947d93cb6ac3346346b","title":"","text":"DTLS RFC6347 or DTLS-SRTP RFC5763, MUST be used, as appropriate for the media type, as specified in 5.1.3. The SDES SRTP keying mechanism from RFC4568 MUST NOT be used, as discussed in I-D.ietf-rtcweb-security-arch. 5.1.2. For media m= sections, JSEP implementations MUST support both the \"UDP/TLS/ RTP/SAVPF\" and \"TCP/DTLS/RTP/SAVPF\" profiles and MUST indicate one of these two profiles for each media m= line they produce in an offer. For data m= sections, implementations MUST support both the \"UDP/DTLS/SCTP\" and \"TCP/DTLS/SCTP\" profiles and MUST indicate one of these two profiles for each data m= line they For media m= sections, JSEP implementations MUST support the \"UDP/TLS/RTP/SAVPF\" profile specified in RFC7850, and MUST indicate this profile for each media m= line they produce in an offer. For data m= sections, implementations MUST support the \"UDP/DTLS/SCTP\" profile and MUST indicate this profile for each data m= line they produce in an offer. Because ICE can select either TCP or UDP transport depending on network conditions, both advertisements are transport depending on network conditions, this advertisement is consistent with ICE eventually selecting either either UDP or TCP. Unfortunately, in an attempt at compatibility, some endpoints"}
{"_id":"doc-en-jsep-10c64cf98d36a859eb9f35f3eb5ca888dfa8f491922443f5ea38499c0205a78b","title":"","text":"Any \"a=extmap\" lines are parsed as specified in RFC5285, Section 5, and their values are stored. As required by RFC4566, Section 5.13, unknown attribute lines MUST be ignored. Once all the session-level lines have been parsed, processing continues with the lines in m= sections."}
{"_id":"doc-en-jsep-bd0dfa3be41dc791a14cc4697c24173ccffa6be7d9c6c63cffa2286a677a048d","title":"","text":"as specified in I-D.ietf-mmusic-sctp-sdp, Section 6, and the value stored. Otherwise, use the specified default. As required by RFC4566, Section 5.13, unknown attribute lines MUST be ignored. 5.7.3. Assuming parsing completes successfully, the parsed description is"}
{"_id":"doc-en-jsep-e08c8cbaea582dd97684946032f6eba6f818eeb4ec3d0955231dd944727ce65d","title":"","text":"section is bundled into another m= section, it still MUST NOT contain any ICE credentials. If the m= section is not bundled into another m= section, an \"a=rtcp\" attribute line MUST be added with of the default RTCP candidate, as indicated in RFC5761, Section 5.1.3. If the m= section is not bundled into another m= section, its \"a=rtcp\" attribute line MUST be filled in with the port and address of the default RTCP candidate, as indicated in RFC5761, Section 5.1.3. If no RTCP candidates have yet been gathered, dummy values MUST be used, as described in the initial offer section above. If the m= section is not bundled into another m= section, for each candidate that has been gathered during the most recent gathering"}
{"_id":"doc-en-jsep-9673618e30cb9dc51ca1f8c32f40bf9417c80cfbbae2636a9e6d2276ea01df47","title":"","text":"If the type is not correct for the current state, processing MUST stop and an error MUST be returned. The SessionDescription is then checked to ensure that its contents are identical to those generated in the last call to createOffer/ createAnswer, and thus have not been altered, as discussed in sec.modifying-sdp; otherwise, processing MUST stop and an error MUST be returned. Next, the SessionDescription is parsed into a data structure, as described in the sec.parsing-a-desc section below. If parsing fails for any reason, processing MUST stop and an error MUST be"}
{"_id":"doc-en-jsep-df203e025475a289403e0b83585e9166405770d94414e1d1e48b4b7d69ca04a5","title":"","text":"a local description. If an error is returned, the session MUST be restored to the state it was in before performing these steps. First, the parsed parameters are checked to ensure that they are identical to those generated in the last call to createOffer/ createAnswer, and thus have not been altered, as discussed in sec.modifying-sdp; otherwise, processing MUST stop and an error MUST be returned. Next, m= sections are processed. For each m= section, the following steps MUST be performed; if any parameters are out of bounds, or cannot be applied, processing MUST stop and an error MUST be"}
{"_id":"doc-en-jsep-58e099fda6151a7f22787819bfe804adfd22a4af0cb63d627c5740b7de077751","title":"","text":"An \"a=ice-options\" line with the \"trickle\" option MUST be added, as specified in I-D.ietf-ice-trickle, Section 4. If WebRTC identity is being used, an \"a=identity\" line as described in I-D.ietf-rtcweb-security-arch, Section 5. The next step is to generate m= sections, as specified in RFC4566 Section 5.14. An m= section is generated for each RtpTransceiver that has been added to the PeerConnection, excluding any stopped"}
{"_id":"doc-en-jsep-ffe41312eef75553069d352de6ee626763632e60f733963b1bf45a62b80264eb","title":"","text":"If present, a single \"a=dtls-id\" line is parsed as specified in I- D.ietf-mmusic-dtls-sdp Section 5, and the dtls-id value is stored. Any \"a=identity\" lines are parsed and the identity values stored for subsequent verification, as specified I-D.ietf-rtcweb- security-arch, Section 5. Any \"a=extmap\" lines are parsed as specified in RFC5285, Section 5, and their values are stored."}
{"_id":"doc-en-jsep-f2b3e5269c04a1442b634303b53053903c4489f8ae519b34efc18571ea0bce20","title":"","text":"appropriate). Note that when considering a MediaStreamTrack that is producing rotated video, the unrotated resolution MUST be used. This is required regardless of whether the receiver supports performing receive-side rotation (e.g., through CVO), as it significantly simplifies the matching logic. receive-side rotation (e.g., through CVO TS26.114), as it significantly simplifies the matching logic. For the purposes of resolution negotiation, only size limits are considered. Any other values, e.g. picture or sample aspect ratio,"}
{"_id":"doc-en-jsep-301b5fda434a19c8268010776fdc6af4906afe8e27efddf22d65bcb390e911c5","title":"","text":"mechanism (e.g., WebSockets); upon receipt of that offer, the remote party installs it using the setRemoteDescription() API. When the call is accepted, the callee uses the createAnswer() API to generate an appropriate answer, applies it using setLocalDescription(), and sends the answer back to the initiator over the signaling channel. When the offerer gets that answer, it installs it using setRemoteDescription(), and initial setup is complete. This process can be repeated for additional offer/answer exchanges. To complete the offer/answer exchange, the remote party uses the createAnswer() API to generate an appropriate answer, applies it using the setLocalDescription() API, and sends the answer back to the initiator over the signaling channel. When the initiator gets that answer, it installs it using the setRemoteDescription() API, and initial setup is complete. This process can be repeated for additional offer/answer exchanges. Regarding ICE RFC5245, JSEP decouples the ICE state machine from the overall signaling state machine, as the ICE state machine must remain"}
{"_id":"doc-en-jsep-f935703c5cf6743191a8c35229e03c098f9baa347cb104c1cbe9f5fec281392b","title":"","text":"The basic operations that the applications can have the media engine do are: Start exchanging media to a given remote peer, but keep all the Start exchanging media with a given remote peer, but keep all the resources reserved in the offer. Start exchanging media with a given remote peer, and free any"}
{"_id":"doc-en-jsep-89f5b00768389382bf47da5be43dbc3d77902b3529c485f42ed7956a3abc4f0f","title":"","text":"4.1.4. Session description objects (RTCSessionDescription) may be of type \"offer\", \"pranswer\", and \"answer\". These types provide information as to how the description parameter should be parsed, and how the media state should be changed. \"offer\", \"pranswer\", or \"answer\". These types provide information as to how the description parameter should be parsed, and how the media state should be changed. \"offer\" indicates that a description should be parsed as an offer; said description may include many possible media configurations. A"}
{"_id":"doc-en-jsep-dbd97cc9f9eec99dac37245b792c0f38835b4e5923234df2439b089e7e4a540d","title":"","text":"This API changes the local media state; among other things, it sets up local resources for sending and encoding media. If setRemoteDescription was previously called with an offer, and setLocalDescription is called with an answer (provisional or final), If setLocalDescription was previously called with an offer, and setRemoteDescription is called with an answer (provisional or final), and the media directions are compatible, and media are available to send, this will result in the starting of media transmission."}
{"_id":"doc-en-jsep-5bdd557d096df89d771546499f54fad840ef0d3f865818a3c18180ace9f031e7","title":"","text":"\"a=rid\" lines. Each m= section is also checked to ensure prohibited features are not used. If this is a local description, the \"ice-lite\" attribute MUST NOT be specified. not used. If the RTP/RTCP multiplexing policy is \"require\", each m= section MUST contain an \"a=rtcp-mux\" attribute. If an \"m=\" section"}
{"_id":"doc-en-jsep-f6a171b0cb9d8e416e47f0a62aadea063132b9c010f0d5f28b192b45801fcf10","title":"","text":"have to keep pace with the changes to SDP, at least until the time that this new encoding eclipsed SDP in popularity. However, to simplify Javascript processing, and provide for future flexibility, the SDP syntax is encapsulated within a SessionDescription object, which can be constructed from SDP, and be serialized out to SDP. If future specifications agree on a JSON format for session descriptions, we could easily enable this object to generate and consume that JSON. Other methods may be added to SessionDescription in the future to simplify handling of SessionDescriptions from Javascript. In the meantime, Javascript libraries can be used to perform these manipulations. Note that most applications should be able to treat the However, to provide for future flexibility, the SDP syntax is encapsulated within a SessionDescription object, which can be constructed from SDP, and be serialized out to SDP. If future specifications agree on a JSON format for session descriptions, we could easily enable this object to generate and consume that JSON. As detailed below, most applications should be able to treat the SessionDescriptions produced and consumed by these various API calls as opaque blobs; that is, the application will not need to read or change them."}
{"_id":"doc-en-jsep-c8abc0046535a8a3d48c865826a03f325d9c80930e03ab474a9969e9f35f7fc1","title":"","text":"If the m= section proto value indicates use of RTP: If there is no RtpTransceiver associated with this m= section (which will only happen when applying an offer), find one and associate it with this m= section according to the following steps: If there is no RtpTransceiver associated with this m= section, find one and associate it with this m= section according to the following steps. Note that this situation will only occur when applying an offer. Find the RtpTransceiver that corresponds to this m= section, using the mapping between transceivers and m= section"}
{"_id":"doc-en-jsep-46c0af679db7c8f574c9653131eb0f08693c7acd78b1321f8f349ca100db3f9f","title":"","text":"use the \"a=imageattr\" SDP attribute RFC6236 to indicate what video frame sizes it is capable of receiving. A receiver may have hard limits on what its video decoder can process, or it may have some maximum set by policy. maximum set by policy. By specifying these limits in an \"a=imageattr\" attribute, JSEP endpoints can attempt to ensure that the remote sender transmits video at an acceptable resolution. However, when communicating with a non-JSEP endpoint that does not understand this attribute, any signaled limits may be exceeded, and the JSEP implementation MUST handle this gracefully, e.g., by discarding the video. Note that certain codecs support transmission of samples with aspect ratios other than 1.0 (i.e., non-square pixels). JSEP"}
{"_id":"doc-en-jsep-528ea7f30e7371d151544b946993d380d86d187cd7f9b6dc653b8eb8ac93feac","title":"","text":"hardware decoder capababilities, local policy) to determine the absolute minimum and maximum sizes it can receive. If there are no known local limits, the \"a=imageattr\" attribute SHOULD be omitted. If these local limits preclude receiving any video, i.e., the degenerate case of no permitted resolutions, the \"a=imageattr\" attribute MUST be omitted, and the m= section MUST be marked as sendonly/inactive, as appropriate. Otherwise, an \"a=imageattr\" attribute is created with \"recv\" direction, and the resulting resolution space formed from the aforementioned intersection is used to specify its minimum and maximum x= and y= values. If the intersection is the null set, i.e., the degenerate case of no permitted resolutions, this MUST be represented by x=0 and y=0 values. maximum x= and y= values. The rules here express a single set of preferences, and therefore, the \"a=imageattr\" q= value is not important. It SHOULD be set to"}
{"_id":"doc-en-jsep-af89357382722c4def3e28424cc2e2f31bb1ac98c60216e22688cf876085aacc","title":"","text":"by allowing receipt of arbitrarily small resolutions, perhaps via fallback to a software decoder. In the special case of a maximum resolution of [0, 0], as described above, the sender MUST NOT transmit the encoding. 3.7. JSEP supports simulcast transmission of a MediaStreamTrack, where"}
{"_id":"doc-en-jsep-2d51672f6c943cae839f007b2a0ac2a79bfe54bc447107d261461922cd6fceff","title":"","text":"guarantee that applications do so. The JSEP implementation MUST be prepared for the JS to pass in bogus data instead. Conversely, the application programmer MUST recognize that the JS Conversely, the application programmer needs to be aware that the JS does not have complete control of endpoint behavior. One case that bears particular mention is that editing ICE candidates out of the SDP or suppressing trickled candidates does not have the expected"}
{"_id":"doc-en-jsep-5c0f2920379d849fa5ae563de6c43b796951ee323c7af833bb1ac3b80d5bc282","title":"","text":"A second approach that was considered but not chosen was to decouple the management of the media control objects from session descriptions, instead offering APIs that would control each component directly. This was rejected based on a feeling that requiring directly. This was rejected based on the argument that requiring exposure of this level of complexity to the application programmer would not be beneficial; it would result in an API where even a simple example would require a significant amount of code to"}
{"_id":"doc-en-jsep-2fafd98a0f85eda9ea0eff95a8fde7998ba4464d92a4c7b7e32b1cd2a9bf3710","title":"","text":"of codecs sent to a remote party indicates what the local side is willing to receive, which, when intersected with the set of codecs the remote side supports, specifies what the remote side should send. However, not all parameters follow this rule; for example, the fingerprints RFC8122 sent to a remote party are calculated based on the local certificate(s) offered; the remote party MUST either accept these parameters or reject them altogether, with no option to choose different values. However, not all parameters follow this rule; some parameters are declarative and the remote side MUST either accept them or reject them altogether. An example of such a parameter is the DTLS fingerprints RFC8122, which are calculated based on the local certificate(s) offered, and are not subject to negotiation. In addition, various RFCs put different conditions on the format of offers versus answers. For example, an offer may propose an"}
{"_id":"doc-en-jsep-62aa7c3ac9a8da22775afea07598628636b3d8993ac7efe21a7018401410baa1","title":"","text":"security considerations for this document. While formally the JSEP interface is an API, it is better to think of it is an Internet protocol, with the JS being untrustworthy from the perspective of the endpoint. Thus, the threat model of RFC3552 applies. In particular, JS can call the API in any order and with any inputs, including malicious ones. This is particularly relevant when we consider the SDP which is passed to setLocalDescription(). While correct API usage requires that the application pass in SDP which was derived from createOffer() or createAnswer(), there is no guarantee that applications do so. The JSEP implementation MUST be prepared for the JS to pass in bogus data instead. Conversely, the application programmer needs to be aware that the JS does not have complete control of endpoint behavior. One case that bears particular mention is that editing ICE candidates out of the SDP or suppressing trickled candidates does not have the expected behavior: implementations will still perform checks from those candidates even if they are not sent to the other side. Thus, for instance, it is not possible to prevent the remote peer from learning your public IP address by removing server reflexive candidates. Applications which wish to conceal their public IP address should instead configure the ICE agent to use only relay candidates. it is an Internet protocol, with the application JavaScript being untrustworthy from the perspective of the JSEP implementation. Thus, the threat model of RFC3552 applies. In particular, JavaScript can call the API in any order and with any inputs, including malicious ones. This is particularly relevant when we consider the SDP which is passed to setLocalDescription(). While correct API usage requires that the application pass in SDP which was derived from createOffer() or createAnswer(), there is no guarantee that applications do so. The JSEP implementation MUST be prepared for the JavaScript to pass in bogus data instead. Conversely, the application programmer needs to be aware that the JavaScript does not have complete control of endpoint behavior. One case that bears particular mention is that editing ICE candidates out of the SDP or suppressing trickled candidates does not have the expected behavior: implementations will still perform checks from those candidates even if they are not sent to the other side. Thus, for instance, it is not possible to prevent the remote peer from learning your public IP address by removing server reflexive candidates. Applications which wish to conceal their public IP address should instead configure the ICE agent to use only relay candidates. 9."}
{"_id":"doc-en-jsep-558990803dd5fecda967971f4164608528fd6404b14d0ffee5cba652a463ad3d","title":"","text":"header extension defined in I-D.ietf-mmusic-sdp-bundle- negotiation, Section 11. An \"a=rtcp\" line, as specified in RFC3605, Section 2.1, containing the dummy value \"9 IN IP6 ::\", because no candidates have yet been gathered. An \"a=msid\" line, as specified in I-D.ietf-mmusic-msid, Section 2. An \"a=sendrecv\" line, as specified in RFC3264, Section 5.1."}
{"_id":"doc-en-jsep-38a37a8bbdc23c41b6972aefaf3652e31a629735f6f81cfa5c559760e15a3723","title":"","text":"Each \"m=\" and c=\" line MUST be filled in with the port and address of the default candidate for the m= section, as described in RFC5245, Section 4.3. If no candidates have yet been gathered, the dummy values MUST be used, as described above. [TODO: update profile UDP/TCP per default candidate] RFC5245, Section 4.3. Each \"a=rtcp\" attribute line MUST also be filled in with the port and address of the appropriate default candidate, either the default RTP or RTCP candidate, depending on whether RTCP multiplexing is currently active or not. Note that if RTCP multiplexing is being offered, but not yet active, the default RTCP candidate MUST be used, as indicated in RFC5761, section 5.1.3. In each case, if no candidates of the desired type have yet been gathered, dummy values MUST be used, as described above. [TODO: update profile UDP/TCP per default candidate] Each \"a=mid\" line MUST stay the same."}
{"_id":"doc-en-jsep-40b70721c851ef2018813cbafc7191d4f87ae58ba2534dba57981532de50faab","title":"","text":"Section 9.1. The \"mid\" value MUST match that specified in the offer. An \"a=rtcp\" line, as specified in RFC3605, Section 2.1, containing the dummy value \"9 IN IP6 ::\", because no candidates have yet been gathered. If a local MediaStreamTrack has been associated, an \"a=msid\" line, as specified in I-D.ietf-mmusic-msid, Section 2."}
{"_id":"doc-en-jsep-fda192eae2d5cbaba241c56beb5cb471d2e47d74b09f533d4ccaac752e5c97a2","title":"","text":"JSEP's handling of session descriptions is simple and straightforward. Whenever an offer/answer exchange is needed, the initiating side creates an offer by calling a createOffer() API. The initiating side creates an offer by calling a createOffer API. The application then uses that offer to set up its local config via the setLocalDescription() API. The offer is finally sent off to the remote side over its preferred signaling mechanism (e.g., WebSockets); upon receipt of that offer, the remote party installs it using the setRemoteDescription() API. setLocalDescription API. The offer is finally sent off to the remote side over its preferred signaling mechanism (e.g., WebSockets); upon receipt of that offer, the remote party installs it using the setRemoteDescription API. To complete the offer/answer exchange, the remote party uses the createAnswer() API to generate an appropriate answer, applies it using the setLocalDescription() API, and sends the answer back to the createAnswer API to generate an appropriate answer, applies it using the setLocalDescription API, and sends the answer back to the initiator over the signaling channel. When the initiator gets that answer, it installs it using the setRemoteDescription() API, and answer, it installs it using the setRemoteDescription API, and initial setup is complete. This process can be repeated for additional offer/answer exchanges."}
{"_id":"doc-en-jsep-60ccd89ae4052ea6420be29f60f4393f78fa93f9a0800ce2e2339b9fb90ab143","title":"","text":"using SIP for signaling, if one offer is sent and is then canceled using a SIP CANCEL, another offer can be generated even though no answer was received for the first offer. To support this, the JSEP media layer can provide an offer via the createOffer() method whenever the JavaScript application needs one for the signaling. The answerer can send back zero or more provisional answers and then finally end the offer/answer exchange by sending a final answer. The state machine for this is as follows: media layer can provide an offer via the createOffer method whenever the JavaScript application needs one for the signaling. The answerer can send back zero or more provisional answers and then finally end the offer/answer exchange by sending a final answer. The state machine for this is as follows: Aside from these state transitions, there is no other difference between the handling of provisional (\"pranswer\") and final (\"answer\")"}
{"_id":"doc-en-jsep-b438c910ec815836f50c575366430f09608fc24e89baa5f40ba4933c396f555b","title":"","text":"in RFC5888. addTrack attempts to minimize the number of transceivers as follows: if the PeerConnection is in the \"have-remote-offer\" state, the track will be attached to the first compatible transceiver that was created by the most recent call to setRemoteDescription() and does not have a local track. Otherwise, a new transceiver will be created, as described in sec.addTransceiver. that was created by the most recent call to setRemoteDescription and does not have a local track. Otherwise, a new transceiver will be created, as described in sec.addTransceiver. 4.1.3."}
{"_id":"doc-en-jsep-b6003c615fd4948b627573282a1aa26af9bb25a710ca7ee5ac27b7bac399a1c1","title":"","text":"\"offer\" indicates that a description should be parsed as an offer; said description may include many possible media configurations. A description used as an \"offer\" may be applied any time the PeerConnection is in a stable state or applied as an update to a PeerConnection is in a \"stable\" state or applied as an update to a previously supplied but unanswered \"offer\". \"pranswer\" indicates that a description should be parsed as an"}
{"_id":"doc-en-jsep-e18656bf6c23f0ff5daa9b1e42a7b067b4982262aa29f4222297ebf0a3ee47bb","title":"","text":"voicemail). \"rollback\" is a special session description type implying that the state machine should be rolled back to the previous stable state, as described in sec.rollback. The contents MUST be empty. state machine should be rolled back to the previous \"stable\" state, as described in sec.rollback. The contents MUST be empty. 4.1.8.1."}
{"_id":"doc-en-jsep-f66e960df7a331de39e1704a8541f2aca136affedd535087ef27b3fb6f0c08f3","title":"","text":"after setRemoteDescription, decides it does not want to accept the new parameters and sends a reject message back to the offerer. Now, the offerer, and possibly the answerer as well, needs to return to a stable state and the previous local/remote description. To support \"stable\" state and the previous local/remote description. To support this, we introduce the concept of \"rollback\", which discards any proposed changes to the session, returning the state machine to the stable state. A rollback is performed by supplying a session \"stable\" state. A rollback is performed by supplying a session description of type \"rollback\" with empty contents to either setLocalDescription or setRemoteDescription."}
{"_id":"doc-en-jsep-bbcea763563873686f1ae6892656a5be0d813e9447db2fbae9418c4cecd9cc9a","title":"","text":"5.2.3.1. If the \"IceRestart\" option is specified, with a value of \"true\", the If the IceRestart option is specified, with a value of \"true\", the offer MUST indicate an ICE restart by generating new ICE ufrag and pwd attributes, as specified in RFC8839. If this option is specified on an initial offer, it has no effect (since a new ICE ufrag and pwd"}
{"_id":"doc-en-jsep-ed92783b89ecbc43d0755c107970c8800a6a04f653b5bf1c32c59d391554a20e","title":"","text":"A rollback may be performed if the PeerConnection is in any state except for \"stable\". This means that both offers and provisional answers can be rolled back. Rollback can only be used to cancel proposed changes; there is no support for rolling back from a stable state to a previous stable state. If a rollback is attempted in the \"stable\" state, processing MUST stop and an error MUST be returned. Note that this implies that once the answerer has performed setLocalDescription with its answer, this cannot be rolled back. proposed changes; there is no support for rolling back from a \"stable\" state to a previous \"stable\" state. If a rollback is attempted in the \"stable\" state, processing MUST stop and an error MUST be returned. Note that this implies that once the answerer has performed setLocalDescription with its answer, this cannot be rolled back. The effect of rollback MUST be the same regardless of whether setLocalDescription or setRemoteDescription is called."}
{"_id":"doc-en-jsep-a1b4bc9b501631bede32cc2ddbf0e635011212abe38ab85eff783f877239a5ff","title":"","text":"the threat model of RFC3552 applies. In particular, JavaScript can call the API in any order and with any inputs, including malicious ones. This is particularly relevant when we consider the SDP that is passed to setLocalDescription(). While correct API usage requires that the application pass in SDP that was derived from createOffer() or createAnswer(), there is no guarantee that applications do so. The JSEP implementation MUST be prepared for the JavaScript to pass in bogus data instead. passed to setLocalDescription. While correct API usage requires that the application pass in SDP that was derived from createOffer or createAnswer, there is no guarantee that applications do so. The JSEP implementation MUST be prepared for the JavaScript to pass in bogus data instead. Conversely, the application programmer needs to be aware that the JavaScript does not have complete control of endpoint behavior. One"}
{"_id":"doc-en-link-template-641b376705633785401a68d55d1994975c4532ddf97cadad4710332a6e06dbde","title":"","text":"BCP 14 RFC2119 RFC8174 when, and only when, they appear in all capitals, as shown here. This document uses the Augmented BNF defined in HTTP to specify valid protocol elements. Additionally, it uses the modified \"parameter\" rule from RFC5987 and the \"URI-Template\" rule from URI-TEMPLATE. This specification uses the following terms from STRUCTURED-FIELDS: List, String, Parameter. 2. The Link-Template header field provides a means for serialising one or more links into HTTP message metadata. It is semantically equivalent to the Link header field defined in WEB-LINKING, except that it uses URI Templates URI-TEMPLATE to convey the structure of links. The Link-Template header field is a Structured Field STRUCTURED- FIELDS that serializes one or more links into HTTP message metadata. It is semantically equivalent to the Link header field defined in WEB-LINKING, except that it uses URI Templates URI-TEMPLATE to convey the structure of links. Its value is a List of Strings. Each String is a URI Template, and Parameters on it carry associated metadata. For example:"}
{"_id":"doc-en-link-template-693dfabd2670e0f820a3e3db8f370edd7b21c626d27ece4d1ad9e54a5bd0dd21","title":"","text":"Parameters on a templated-link have identical semantics to those of a Link header field. This includes (but is not limited to) the use of the \"rel\" parameter to convey the relation type, the \"anchor\" parameter to modify the context IRI, and so on. parameter to modify the context IRI, and so on. Parameter values MUST be Strings. Likewise, the requirements for parameters on templated-links are the same as those for a Link header field; in particular, the \"rel\" parameter MUST NOT appear more than once, and if it does, the templated-link MUST be ignored by parsers. same as those for a Link header field. This specification defines additional semantics for the \"var-base\" parameter on templated-links; see below."}
{"_id":"doc-en-load-balancers-f9dfdcc1dda037d9aa946adb437758fa25dc33f6104557874995454b122d27ca","title":"","text":"Load balancers SHOULD drop short header packets with unroutable DCIDs. The routing of long headers with unroutable DCIDs depends on the server ID allocation strategy, described in sid-allocation. However, the load balancer MUST NOT drop these packets, with one exception. When forwarding a packet with a long header and unroutable DCID, load balancers MUST use a fallback algorithm as specified in fallback- algorithm. Load balancers MAY drop packets with long headers and unroutable DCIDs if and only if it knows that the encoded QUIC version does not"}
{"_id":"doc-en-load-balancers-5d9c244b7aa3a9e20da1af15b554c3f7381c159f4fd21aad8febfd888ddf21f3","title":"","text":"4.3. For any given configuration, the configuration agent must specify if server IDs will be statically or dynamically allocated. Load Balancer configurations with statically allocated server IDs explicitly include a mapping of server IDs to forwarding addresses. The corresponding server configurations contain one or more unique server IDs. Load Balancer configurations include a mapping of server IDs to forwarding addresses. The corresponding server configurations contain one or more unique server IDs. A dynamically allocated configuration does not have a pre-defined assignment, reducing configuration complexity. However, it places limits on the maximum server ID length and requires more state at the load balancer. In certain edge cases, it can force parts of the system to fail over to 5-tuple routing for a short time. In either case, the configuration agent chooses a server ID length for each configuration that MUST be at least one octet. For Static Allocation, the maximum length depends on the algorithm. For dynamic allocation, the maximum length is 7 octets. The configuration agent chooses a server ID length for each configuration that MUST be at least one octet. A QUIC-LB configuration MAY significantly over-provision the server ID space (i.e., provide far more codepoints than there are servers) to increase the probability that a randomly generated Destination Connection ID is unroutable. The configuration agent SHOULD provide a means for servers to express the number of server IDs it can usefully employ, because a single routing address actually corresponds to multiple server entities (see lb-chains). Conceptually, each configuration has its own set of server ID allocations, though two static configurations with identical server ID lengths MAY use a common allocation between them."}
{"_id":"doc-en-load-balancers-5a62e50edf11869dff2d7cab67d339cb4572021e68e9b0ae8043d2ae0830da4a","title":"","text":"A server encodes one of its assigned server IDs in any CID it generates using the relevant configuration. 4.3.1. In the static allocation method, the configuration agent assigns at least one server ID to each server. When forwarding a packet with a long header and unroutable DCID, load balancers MUST forward packets with long headers and unroutable DCIDs using an fallback algorithm as specified in fallback-algorithm. 4.3.2. In the dynamic allocation method, the load balancer assigns server IDs dynamically so that configuration does not require fixed server ID assignment. This reduces linkability and simplifies configuration. However, it also limits the length of the server ID and requires the load balancer to lie on the path of outbound packets. As the server mapping is no longer part of the configuration, standby load balancers need an out-of-band mechanism to synchronize server ID allocations in the event of failures of the primary device. To summarize, the load balancer forwards incoming Initial packets arbitrarily and both load balancer and server are sometimes able to infer a potential server ID allocation from the CID in the packet. The server can signal acceptance of that allocation by using it immediately, in which case both entities add it to their permanent table. Usually, however, the server will reject the allocation by not using it, in which case it is not added to the permanent assignment list. 4.3.2.1. The configuration agent does not assign server IDs, but does configure a server ID length. The server ID MUST be at least one and no more than seven octets. See sid-limits for other considerations if also using the Plaintext CID algorithm. 4.3.2.2. The load balancer maintains a mapping of assigned server IDs to routing information for servers, initialized as empty. This mapping is independent for each operating configuration. Note that when the load balancer's tables for a configuration are empty, all incoming DCIDs corresponding to that configuration are unroutable by definition. The load balancer processes a long header packet as follows: If the config rotation bits do not match a known configuration, the load balancer routes the packet using a fallback algorithm (see fallback-algorithm). It does not extract a server ID. If there is a matching configuration, but the CID is not long enough to apply the algorithm, the load balancer pads the connection ID with zeros to the required length. Otherwise, the load balancer extracts the server ID in accordance with the configured algorithm and parameters. If the load balancer extracted a server ID already in its mapping, it routes the packet accordingly. If the server ID is not in the mapping, it routes the packet according to a fallback algorithm and awaits the first long header the server sends in response. If the load balancer extracted an unassigned server ID and observes that the first long header packet the server sends has a Source Connection ID that encodes the same server ID, it adds that server ID to the mapping. Otherwise, it takes no action. 4.3.2.3. Each server maintains a list of server IDs assigned to it, initialized empty. Upon receipt of a packet with a client-generated DCID, the server MUST follow these steps in order: If the config rotation bits do not correspond to a known configuration, do not attempt to extract a server ID. If the DCID is not long enough to decode using the configured algorithm, pad it with zeros to the required length and extract a server ID. If the DCID is long enough to decode, extract the server ID. If the server ID is not already in its list, the server MUST decide whether or not to immediately use it to encode a CID on the new connection. If it chooses to use it, it adds the server ID to its list. If it does not, it MUST NOT use the server ID in future CIDs. The server SHOULD NOT use more than one CID, unless it is close to exhausting the nonces for an existing assignment. Note also that the load balancer may observe a single entity claiming multiple server IDs because that entity actually represents multiple servers devices or processors. The server MUST generate a new connection ID if the client-generated CID is of insufficient length for the configuration. The server then processes the packet normally. When a server needs a new connection ID, it uses one of the server IDs in its list to populate the server ID field of that CID. It MAY vary this selection to reduce linkability within a connection. After loading a new configuration, a server may not have any available SIDs. This is because an incoming packet may not contain the config rotation bits necessary to extract a server ID in accordance with the algorithm above. When required to generate a CID under these conditions, the server MUST generate CIDs using the 5-tuple routing codepoint (see config-failover. Note that these connections will not be robust to client address changes while they use this connection ID. For this reason, a server SHOULD retire these connection IDs and replace them with routable ones once it receives a client-generated CID that allows it to acquire a server ID. As, statistically, one in every four such CIDs can provide a server ID, this is typically a short interval. 4.4. All connection IDs use the following format:"}
{"_id":"doc-en-load-balancers-e76130e90b8614a97aedf8741b0b4af4529f1cc42efd4204fd0e54dac7e795ef","title":"","text":"QUIC-LB requires common configuration to synchronize understanding of encodings and guarantee explicit consent of the server. The load balancer and server MUST agree on a routing algorithm, server ID allocation method, and the relevant parameters for that algorithm. The load balancer and server MUST agree on a routing algorithm and the relevant parameters for that algorithm. All algorithm configurations can have a server ID length, nonce length, and key. However, for Plaintext CID, there is no key. If server IDs are statically allocated, the load balancer MUST receive the full table of mappings, and each server must receive its assigned SID(s), from the configuration agent. The load balancer MUST receive the full table of mappings, and each server must receive its assigned SID(s), from the configuration agent. Note that server IDs are opaque bytes, not integers, so there is no notion of network order or host order."}
{"_id":"doc-en-load-balancers-13a807c0aecbbc1f6f7a482cc927e346346e7cc35c239bfdb73b43a9250dd9a4","title":"","text":"fewer than 2^40 tokens are generated with a single key, the risk of collisions is lower than 0.001%. 11.8. When using Dynamic SID allocation, the load balancer's SID table can be as large as 2^56 entries, which is prohibitively large. To constrain the size of this table, servers are encouraged to accept as few SIDs as possible, so that the remainder do not enter the load balancer's table. 12. There are no IANA requirements."}
{"_id":"doc-en-load-balancers-ed0b1ec7dd6ddaddba22c6db1b62bfcf2d186ba93d6c32f1494efc64982bb13d","title":"","text":"The Stream Cipher CID algorithm provides cryptographic protection at the cost of additional per-packet processing at the load balancer to decrypt every incoming connection ID. The CID format is depicted below. decrypt every incoming connection ID. 5.2.1."}
{"_id":"doc-en-load-balancers-840bb472edd8884cde6760e63742986a58b03d031cfad118ce004615e6988d5b","title":"","text":"octet of the Connection ID are reserved to express the length of the following connection ID, not including the first octet. A server not using this functionality SHOULD make the six bits appear to be random. A server not using this functionality SHOULD choose the six bits so as to have no observable relationship to previous connection IDs issued for that connection. 2.4."}
{"_id":"doc-en-load-balancers-201a7de0b78fcbcb03bdf86e06dc53c331b2d77da3362f2694121af395cd976a","title":"","text":"respective fields. If there is no key in the configuration, the server MUST fill the Nonce field with bytes that appear to be random. If there is a key, the server fills the nonce field with a nonce of its choosing. See cid-entropy for details. Nonce field with bytes that have no observable relationship to the field in previously issued connection IDs. If there is a key, the server fills the nonce field with a nonce of its choosing. See cid- entropy for details. The server MAY append additional bytes to the connection ID, up to the limit specified in that version of QUIC, for its own use. These"}
{"_id":"doc-en-load-balancers-aef7cb879d772bf4dce79f0bf19c661bdfe795580847a3469c49dfef6c7780fe","title":"","text":"two connection IDs to the same connection, client, or server. In particular, all servers using a configuration MUST consistently add the same length to each connection ID, to preserve the linkability objectives of QUIC-LB. Any additional bytes SHOULD appear random unless individual servers are not distinguishable (e.g. any server using that configuration appends identical bytes to every connection ID). objectives of QUIC-LB. Any additional bytes SHOULD NOT provide any observable correlation to previous connection IDs for that connection (e.g., the bytes can be chosen at random). If there is no key in the configuration, the Connection ID is complete. Otherwise, there are further steps, as described in the"}
{"_id":"doc-en-load-balancers-4517c77e6090530bd6d18dcd76880eb4310ffb41ff4cf33b1fd26f0cf745b1b0","title":"","text":"Whether or not it implements the counter method, the server MUST NOT reuse a nonce until it switches to a configuration with new keys. If the nonce is sent in plaintext, servers MUST generate nonces so that they appear to be random. Observable correlations between plaintext nonces would provide trivial linkability between individual connections, rather than just to a common server. Servers are forbidden from generating linkable plaintext nonces, because observable correlations between plaintext nonces would provide trivial linkability between individual connections, rather than just to a common server. For any algorithm, configuration agents SHOULD implement an out-of- band method to discover when servers are in danger of exhausting"}
{"_id":"doc-en-load-balancers-f580441518844f441cdc11a0c2a17d8e7b7282f786aa069f81ee9732d00ba3de","title":"","text":"shifting necessary in the event that there are an odd number of octets. The expand_left() function outputs 16 octets, with its first argument in the most significant bits, its second argument in the least significant byte, its third argument in the second least significant byte, and zeros in all other positions. Thus, When configured with both a key, and a nonce length and server ID length that sum to any number other than 16, the server MUST follow the algorith below to encrypt the connection ID. expand_right() is similar, except that the second argument is in the most significant byte, the third is in the second most significant byte, and the first argument is in the least significant bits. Therefore, 4.3.2.1. Similarly, truncate_left() and truncate_right() take the most significant and least significant bits, respectively, from a ciphertext. For example, to take 28 bits of a ciphertext: The 4-pass algorithm is a four-round Feistel Network with the round function being AES-ECB. Most modern applications of Feistel Networks have more than four rounds. The implications of this choice, which is meant to limit the per-packet compute overhead at load balancers, are discussed in distinguishing-attacks. The server concatenates the server ID and nonce into a single field, which is then split into equal halves. In successive passes, one of these halves is expanded into a 16B plaintext, encrypted with AES- ECB, and the result XORed with the other half. The diagram below shows the conceptual processing of a plaintext server ID and nonce into a connection ID. 'FO' stands for 'First Octet'. 4.3.2.2. Two functions are useful to define: The expand(length, pass, input_bytes) function concatenates three arguments and outputs 16 zero-padded octets. The first argument 'length' is an 8-bit integer that reports the sum of the configured nonce length and server id length in octets, and forms the most significant octet of the output. The 'length' argument MUST NOT exceed 28. The second argument is an 8-bit integer that is the 'pass' of the algorithm, and forms the second-most significant octet of the output. The third argument is a variable-length stream of octets, which is copied into the third-most significant octet of the output and beyond. The length of this octet stream is half the 'length', rounded up. All remaining octets of the output are zero. For example, Similarly, truncate(input, n) returns the first n octets of 'input'. Let 'half_len' be equal to 'plaintext_len' / 2, rounded up. 4.3.2.3. The example at the end of this section helps to clarify the steps described below. The server concatenates the server ID and nonce to create plaintext_CID. plaintext_CID. The length of the result in octets is plaintext_len. The server splits plaintext_CID into components left_0 and right_0 of equal length, splitting an odd octet in half if necessary. For example, 0x7040b81b55ccf3 would split into a left_0 of 0x7040b81 and right_0 of 0xb55ccf3. of equal length half_len. If plaintext_len is odd, right_0 clears its first four bits, and left_0 clears its last four bits. For example, 0x7040b81b55ccf3 would split into a left_0 of 0x7040b810 and right_0 of 0x0b55ccf3. Encrypt the result of expand_left(left_0, index)) to obtain a ciphertext, where 'index' is one octet: the two most significant bits of which are 0b00, and the six least significant bits are the length of the resulting connection ID in bytes, cid_len. Encrypt the result of expand(plaintext_len, 1, left_0) using an AES-ECB-128 cipher to obtain a ciphertext. XOR the least significant bits of the ciphertext with right_0 to form right_1. XOR the first half_len octets of the ciphertext with right_0 to form right_1. Steps 3 and 4 can be summarized as Thus steps 3 and 4 can be expressed as \"right_1 = right_0 ^ truncate_right( AES_ECB(key, expand_left(left_0, cid_len, 1)), len(right_0)) \" If the plaintext_len is odd, clear the first four bits of right_1. Repeat steps 3 and 4, but use them to compute left_1 by expanding and encrypting right_1 with the most significant octet as the concatenation of 0b01 and cid_len, and XOR the results with and encrypting right_1 with pass = 2, and XOR the results with left_0. \"left_1 = left_0 ^ truncate_left( AES_ECB(key, expand_right(right_1, cid_len, 2)), len(left_0)) \" If the plaintext_len is odd, clear the last four bits of left_1. Repeat steps 3 and 4, but use them to compute right_2 by expanding and encrypting left_1 with the least significant octet as the concatenation of 0b10 and cid_len, and XOR the results with and encrypting left_1 with pass = 3, and XOR the results with right_1. \"right_2 = right_1 ^ truncate_right( AES_ECB(key, expand_left(left_1, cid_len, 3), len(right_1)) \" If the plaintext_len is odd, clear the first four bits of right_2. Repeat steps 3 and 4, but use them to compute left_2 by expanding and encrypting right_2 with the most significant octet as the concatenation of 0b11 ands cid_len, and XOR the results with and encrypting right_2 with pass = 4, and XOR the results with left_1. \"left_2 = left_1 ^ truncate_left( AES_ECB(key, expand_right(right_2, cid_len, 4), len(left_1)) \" If the plaintext_len is odd, clear the last four bits of left_2. The server concatenates left_2 with right_2 to form the ciphertext CID, which it appends to the first octet. CID, which it appends to the first octet. If plaintext_len is odd, the four least significant bits of left_2 and four most significant bits of right_2, which are all zero, are stripped off before concatenation to make the resulting ciphertext the same length as the original plaintext. 4.3.2.4. The following example executes the steps for the provided inputs. Note that the plaintext is of odd octet length, so the middle octet"}
{"_id":"doc-en-load-balancers-3bffe323afc6e3c118dd3f01e7f47c74aedae764a63c6168b52626ab4c19d0a9","title":"","text":"(i.e., the nonce is at least as large as the server ID). If the server ID is longer, a fourth pass is necessary: \"right_0 = right_1 ^ truncate_right( AES_ECB(key, expand_left(left_0, cid_len, 1), len(right_1)) \" and the load balancer has to concatenate left_0 and right_0 to obtain the complete server ID."}
{"_id":"doc-en-load-balancers-9f1403e0b05b7c262d7b685bcd026ed7282f0838c815a781b72f20e800a26e70","title":"","text":"connection if servers make reasonable selections when generating new IDs for that connection. 10.3. A simple deployment of QUIC-LB in a cloud provider might use the same global QUIC-LB configuration across all its load balancers that route to customer servers. An attacker could then simply become a customer, obtain the configuration, and then extract server IDs of other customers' connections at will. To avoid this, the configuration agent SHOULD issue QUIC-LB configurations to mutually distrustful servers that have different keys (for the block cipher or stream cipher algorithms) or routing masks and divisors (for the obfuscated algorithm). The load balancers can distinguish these configurations by external IP address, or by assigning different values to the config rotation bits (config-rotation). Note that either of these techniques exposes information to outside observers, as traffic destined for each server set can be easily distinguished. These techniques are not necessary for the plaintext algorithm, as it does not attempt to conceal the server ID. 10.4. Section 21.9 of QUIC-TRANSPORT discusses the Stateless Reset Oracle attack. For a server deployment to be vulnerable, an attacking client must be able to cause two packets with the same Destination CID to arrive at two different servers that share the same cryptographic context for Stateless Reset tokens. As QUIC-LB requires deterministic routing of DCIDs over the life of a connection, it is a sufficient means of avoiding an Oracle without additional measures. 11. There are no IANA requirements."}
{"_id":"doc-en-load-balancers-5e8d96a795a7ed58b9b74e2483e08252d1afb1b58d107bf4324b4cf73ff13c34","title":"","text":"The extracted server mapping might not correspond to an active server. A field that should be all zeroes after decryption may not be so. Load balancers MUST forward packets with long headers with non- compliant DCIDs to an active server using an algorithm of its own choosing. It need not coordinate this algorithm with the servers."}
{"_id":"doc-en-load-balancers-123d54535b8edaad7796a1fc00a69c34a91c9cff75e40f5840914b9105ee6452","title":"","text":"The server ID will start in the second octet of the decrypted connection ID and occupy continuous octets beyond that. The configuration agent selects a zero-padding length. This SHOULD be at least four octets to allow detection of non-compliant DCIDs. The server ID and zero- padding length MUST sum to no more than 16 octets. They SHOULD sum to no more than 12 octets, to provide servers adequate space to encode their own opaque data. They server ID length MUST be no more than 16 octets and SHOULD sum to no more than 12 octets, to provide servers adequate space to encode their own opaque data. The configuration agent also selects an 16-octet AES-ECB key to use for connection ID decryption."}
{"_id":"doc-en-load-balancers-8b5af87f8670a79ddd0b1b37050bc08ff1a71366aa82645a2985c9e498f043b5","title":"","text":"octet to obtain the config rotation bits. It then decrypts the subsequent 16 octets using AES-ECB decryption and the chosen key. The decrypted plaintext contains the server id, zero padding, and opaque server data in that order. The load balancer uses the server ID octets for routing. The decrypted plaintext contains the server id and opaque server data in that order. The load balancer uses the server ID octets for routing. 4.4.3. When generating a routable connection ID, the server MUST choose a connection ID length between 17 and 20 octets. The server writes its provided server ID into the server ID octets, zeroes into the zero- padding octets, and arbitrary bits into the remaining bits. These arbitrary bits MAY encode additional information. Bits in the first, eighteenth, nineteenth, and twentieth octets SHOULD appear essentially random to observers. The first octet is reserved as described in first-octet. provided server ID into the server ID octets and arbitrary bits into the remaining bits. These arbitrary bits MAY encode additional information. Bits in the eighteenth, nineteenth, and twentieth octets SHOULD appear essentially random to observers. The first octet is reserved as described in first-octet. The server then encrypts the second through seventeenth octets using the 128-bit AES-ECB cipher."}
{"_id":"doc-en-load-balancers-8c232b688b69142d0c199bc10bd0d5a4295404cb20b86344d425f4c2f37a2855","title":"","text":"state Retry Service also needs the token key, and to be aware if a NAT sits between it and the servers. The following pseudocode describes the data items necessary to store a full QUIC-LB configuration at the server. It is meant to describe the conceptual range and not specify the presentation of such configuration in an internet packet. The comments signify the range of acceptable values where applicable. yang-model provides a YANG Model of the a full QUIC-LB configuration. 9."}
{"_id":"doc-en-lxnm-2101eb1a1dbda6cdcddaf8fa307570680da005cdb169a53c6308eff192176754","title":"","text":"The bandwidth is per L2VPN service. 'svc-inbound-bandwidth' indicates the inbound bandwidth of the 'svc-pe-to-ce-bandwidth' indicates the inbound bandwidth of the connection (i.e., download bandwidth from the service provider to the site). 'svc-outbound-bandwidth' indicates the outbound bandwidth of the 'svc-ce-to-pe-bandwidth' indicates the outbound bandwidth of the connection (i.e., upload bandwidth from the site to the service provider)."}
{"_id":"doc-en-mdns-ice-candidates-16e47efa98b559e2b9369641e470bd2b30e76091660f220b512607fd88a0cc58","title":"","text":"away. When mDNS fails, ICE will attempt to fall back to either NAT hairpin, if supported, or TURN relay, if not. As noted in IPHandling, this may result in increased media latency and reduced connectivity/ increased cost (depending on whether the application chooses to use TURN). if supported, or TURN relay if not. This may result in reduced connectivity, reduced throughput and increased latency, as well as increased cost in case of TURN relay. One potential mitigation, as discussed in {#privacy}, is to not conceal candidates created from RFC4941 IPv6 addresses. This permits"}
{"_id":"doc-en-mdns-ice-candidates-cfe44227bad3d5f057527c6b7d86d42b91da745705abcfc4ab3ea55aaec32203","title":"","text":"\".local\" name may happen through Unicast DNS as noted in RFC6762, Section 3. An ICE agent that supports mDNS candidates MUST support the situation where the hostname resolution results in more than one IP address. In this case, the ICE agent MUST take exactly one of the resolved IP addresses and ignore the others. The ICE agent SHOULD use the first IPv6 address resolved, if one exists, or the first IPv4 address, if not. An ICE agent SHOULD ignore candidates where the hostname resolution returns more than one IP address. An ICE agent MAY add additional restrictions regarding the ICE candidates it will resolve using mDNS, as this mechanism allows"}
{"_id":"doc-en-mdns-ice-candidates-95cf5e54adeadc90bc63f1493ad7c4a3bbd69ba2d3e3b3667cbef0f7e95a9f0e","title":"","text":"not end with \".local\" or if the value contains more than one \".\", then process the candidate as defined in RFC8445. If the ICE candidate policy is \"relay\", as defined in JSEP, ignore the candidate. Otherwise, resolve the candidate using mDNS. The ICE agent SHOULD set the unicast-response bit of the corresponding mDNS query message; this minimizes multicast traffic, as the response is"}
{"_id":"doc-en-mdns-ice-candidates-1abd1253c91edd75c01f16f7c3b572b482a08c489a117e5a4bdd6ba7fe46c058","title":"","text":"section 5.1.1, the candidate is processed as follows: Check whether the ICE agent has a usable registered mDNS hostname resolving to the ICE host candidate's IP address. If one exists, skip ahead to Step 6. resolving to the ICE candidate's IP address. If one exists, skip ahead to Step 6. Generate a unique mDNS hostname. The unique name MUST consist of a version 4 UUID as defined in RFC4122, followed by \".local\"."}
{"_id":"doc-en-mdns-ice-candidates-c9c06dd22c5498618cdddc0b0b055f0934b9f21a9261c3491f1dee691bc784bf","title":"","text":"Store the mDNS hostname and its related IP address in the ICE agent for future reuse. Replace the IP address of the ICE host candidate with its mDNS Replace the IP address of the ICE candidate with its mDNS hostname, and expose the candidate as usual. An ICE agent can implement this procedure in any way so long as it"}
{"_id":"doc-en-mdns-ice-candidates-7bc83991ea0f97efeb44eb6a95edaaea576c3fdd69d5edd22eff73cdd6c9d3a4","title":"","text":"2.2. For any remote host ICE candidate received by the ICE agent, the following procedure is used: For any remote ICE candidate received by the ICE agent, the following procedure is used: If the connection-address field value of the ICE candidate does not end with \".local\" or if the value contains more than one \".\","}
{"_id":"doc-en-mdns-ice-candidates-b9bfb4224a5e5a41293a1089065a7e9119efcad597bb517fcddaa2df8312ae7d","title":"","text":"Otherwise, resolve the candidate using mDNS. If it resolves to an IP address, replace the value of the ICE host candidate by the resolved IP address and continue processing of the candidate. If it resolves to an IP address, replace the mDNS hostname of the ICE candidate with the resolved IP address and continue processing of the candidate. Otherwise, ignore the candidate."}
{"_id":"doc-en-mdns-ice-candidates-e1b6d5cd8a0392641fd569750849974eb5f92c524e95432ed68b0ccedc809d01","title":"","text":"A peer-reflexive remote candidate could be learned and constructed from the source transport address of the STUN Binding request as an ICE connectivity check. The peer-reflexive candidate could share the same address as a remote host ICE candidate that will be signaled or has been signaled, received and is in the process of name resolution. In addition to the elimination procedure of redundant candidates defined in Section 5.1.3 of RFC8445, which could remove constructed peer-reflexive remote candidates, the address of any existing peer- reflexive remote candidate should not be exposed to Web applications by ICE agents that implement this proposal, as detailed in Section #guidelines. same address as a remote mDNS ICE candidate whose name is in the process of being resolved. In addition to the elimination procedure of redundant candidates defined in Section 5.1.3 of RFC8445, which could remove constructed peer-reflexive remote candidates, the address of any existing peer-reflexive remote candidate should not be exposed to Web applications by ICE agents that implement this proposal, as detailed in Section #guidelines. 3."}
{"_id":"doc-en-mdns-ice-candidates-19a8c30993aacab45b4cdc8704833d41129855f711efa8a4362748f4a84c4a3b","title":"","text":"When there is no user consent, the following filtering should be done to prevent private IP address leakage: host ICE candidates with an IP address are not exposed as ICE candidate events. ICE candidates with an IP address are not exposed as ICE candidate events. Server reflexive ICE candidate raddr field is set to 0.0.0.0 and rport to 0. SDP does not expose any a=candidate line corresponding to a host ICE candidate which contains an IP address. SDP does not expose any a=candidate line corresponding to an ICE candidate which contains an IP address. Statistics related to ICE candidates MUST NOT contain the resolved IP address of a remote mDNS candidate or the IP address of a peer-"}
{"_id":"doc-en-mdns-ice-candidates-cf627192a24934d3b6c34e460266792cea2ddc446f9efb76bcf2b0e0eb2765dd","title":"","text":"1. As detailed in IPHandling, exposing client private IP addresses by default maximizes the probability of successfully creating direct peer-to-peer connection between two clients, but creates a significant surface for user fingerprinting. IPHandling recognizes default to web applications maximizes the probability of successfully creating direct peer-to-peer connections between clients, but creates a significant surface for user fingerprinting. IPHandling recognizes this issue, but also admits that there is no current solution to this problem; implementations that choose to use Mode 3 to address the privacy concerns often suffer from failing or suboptimal connections"}
{"_id":"doc-en-mdns-ice-candidates-1c8325c5da892f6103430ba9d0946a42dac917d872ee8f3f000138f4bbf66e3f","title":"","text":"not be supported. This document proposes an overall solution to this problem by registering ephemeral mDNS RFC6762 names for each local private IP address, and then providing those names, rather than the IP addresses, to the web application when it gathers ICE candidates. WebRTC implementations resolve these names to IP addresses and perform ICE processing as usual, but the actual IP addresses are not exposed to the web application. providing a mechanism for WebRTC implementations to register ephemeral mDNS RFC6762 names for local private IP addresses, and then provide those names, rather than the IP addresses, in their ICE candidates. While this technique is intended to benefit WebRTC implementations in web browsers, by preventing collection of private IP addresses by arbitrary web pages, it can also be used by any endpoint that wants to avoid disclosing information about its local network to remote peers on other networks. WebRTC and WebRTC-compatible endpoints Overview that receive ICE candidates with mDNS names will resolve these names to IP addresses and perform ICE processing as usual. In the case where the endpoint is a web application, the WebRTC implementation will manage this resolution internally and will not disclose the actual IP addresses to the application. 2."}
{"_id":"doc-en-mdns-ice-candidates-96e022a496070747a2108c81b5f5cbf43ca036058405bedf30583e1145ec0137","title":"","text":"3.1. This section outlines how mDNS should be used by ICE agents to conceal local IP addresses. Naturally, if the ICE agent does not want to conceal its IPs, e.g., if it has a priori knowledge that its addresses are in fact public, this processing is unnecessary. For any host candidate gathered by an ICE agent as part of RFC8445, Section 5.1.1, the candidate is handled as follows:"}
{"_id":"doc-en-mdns-ice-candidates-1811a48b4cdd8b15db6fe0a054a7c287d4bd34591510b96be6fb647cbde6e285","title":"","text":"3.2. This section outlines how received ICE candidates with mDNS names are processed by ICE agents, and is relevant to all endpoints. For any remote ICE candidate received by the ICE agent, the following procedure is used:"}
{"_id":"doc-en-mdns-ice-candidates-d5c1114d7f5255e3df8536c415476e1b075cf03ff6fd458f7e9d0b5f824efee4","title":"","text":"An ICE agent that supports mDNS candidates MUST support the situation where the hostname resolution results in more than one IP address. In this case, the ICE agent MUST take exactly one of the resolved IP addresses and ignore the others. The ICE agent SHOULD, if available, use the first IPv6 address resolved, otherwise the first IPv4 address. addresses and ignore the others. The ICE agent SHOULD use the first IPv6 address resolved, if one exists, or the first IPv4 address, if not. 4."}
{"_id":"doc-en-mdns-ice-candidates-47ddcb3b59df8e0b7925d8acde6736a2153a8a276bfbe65bda3727c8283f81fe","title":"","text":"want to conceal its IPs, e.g., if it has a priori knowledge that its addresses are in fact public, this processing is unnecessary. For any host candidate gathered by an ICE agent as part of RFC8445, Section 5.1.1, the candidate is handled as follows: This section outlines how mDNS should be used by ICE agents to conceal local IP addresses. For each host candidate gathered by an ICE agent as part of the gathering process described in RFC8445, Section 5.1.1, the candidate is handled as described below. Check whether this IP address satisfies the ICE agent's policy regarding whether an address is safe to expose. If so, expose the candidate and abort this process. Check whether the ICE agent has a usable registered mDNS hostname resolving to the ICE candidate's IP address. If one exists, skip"}
{"_id":"doc-en-mdns-ice-candidates-25a9d1b6b3ec4b6d4b23ad8214653f37a7cb77bede55ce058e4b5a1b130a7551","title":"","text":"Replace the IP address of the ICE candidate with its mDNS hostname and provide the candidate to the web application. An ICE agent can implement this procedure in any way so long as it produces equivalent results to this procedure. ICE agents can implement this procedure in any way as long as it produces equivalent results. An implementation may for instance pre- register mDNS hostnames by executing steps 3 to 6 and prepopulate an ICE agent accordingly. By doing so, only step 7 of the above procedure will be executed at the time of gathering candidates. An implementation may for instance pre-register mDNS hostnames by executing steps 3 to 5 and prepopulate an ICE agent accordingly. By doing so, only step 6 of the above procedure will be executed at the time of gathering candidates. ICE agents may also decide that certain local IP addresses are safe to expose. This may be because the ICE agent has a priori knowledge that the address is in fact public, or because the agent has made a policy decision to not conceal certain types of IP addresses (e.g., those with built-in privacy protections) as a calculated choice to improve connectivity. This topic is discussed further in {#privacy} below. An implementation may also detect that mDNS is not supported by the available network interfaces. The ICE agent may skip steps 2 and 3 available network interfaces. The ICE agent may skip steps 3 and 4 and directly decide to not expose the host candidate. This procedure ensures that an mDNS name is used to replace only one"}
{"_id":"doc-en-mdns-ice-candidates-ecaa77590fc4e95e971a258ac2876756c4de73950a54cabee6d570fcff619655","title":"","text":"increased cost (depending on whether the application chooses to use TURN). The exact impact of this technique is being researched experimentally and will be provided before publication of this document. One potential mitigation, as discussed in {#privacy}, is to not conceal candidates created from RFC4941 IPv6 addresses. This permits connectivity even in large internal networks or where mDNS is disabled. The exact impact of the mDNS technique is being researched experimentally and will be provided before publication of this document. 4.2."}
{"_id":"doc-en-mdns-ice-candidates-d6435a42860b2c982a811cc37163b5cbcc782565d4e09b77ea9641d502b786f6","title":"","text":"6.4. Naturally, an address that is already exposed to the Internet does not need to be protected by mDNS, as it can be trivially observed by the web server or remote endpoint. However, determining this ahead of time is not straightforward; while the fact that an IPv4 address is private can sometimes be inferred by its value, e.g., whether it is an RFC1918 address, the reverse is not necessarily true. IPv6 addresses present their own complications, e.g., private IPv6 addresses as a result of NAT64 RFC6146. Instead, the determination of whether an address is public can be reliably made as part of the ICE gathering process, namely, if the query to the STUN RFC5389 server returns the same value as the local address. This can be done for both IPv4 and IPv6 local addresses, provided that the application has configured both IPv4 and IPv6 STUN servers. If this situation occurs, i.e., STUN returns the same IP address value for an address that has already been communicated as an mDNS candidate during the current ICE gathering phase, the ICE agent MUST NOT eliminate the candidate as redundant and MUST send the IP address as a server-reflexive candidate. This allows the ICE agent to send mDNS candidates immediately (i.e., without waiting for STUN), even if the associated addresses may not be private. Once an address has been identified as public, the ICE agent MAY cache this information and omit mDNS protection for that address in future ICE gathering phases. 6.5. As noted in IPHandling, private IPv4 addresses are especially problematic because of their unbounded lifetime. However, the RFC4941 IPv6 addresses recommended for WebRTC have inherent privacy protections, namely a short lifetime and the lack of any stateful information. Accordingly, implementations MAY choose to not conceal RFC4941 addresses with mDNS names as a tradeoff for improved peer-to- peer connectivity. 6.6. As noted in IPHandling, privacy may be breached if a web application running in two browsing contexts can determine whether it is running on the same device. While the approach in this document prevents the"}
{"_id":"doc-en-mdns-ice-candidates-9bdbee633d250b5e53a8a4bb7e69ed3b89e1a639c66f4f827b707e187d53b387","title":"","text":"a context that has a different origin than the top-level browsing context), or a private browsing context. 6.5. 6.7. Even when local IP addresses are not exposed, the number of mDNS hostname candidates can still provide a fingerprinting dimension."}
{"_id":"doc-en-mdns-ice-candidates-f5d88d56a8c69cfe1bc990b8c483293cc60713fa2a95035fc08bdce2af28bcf1","title":"","text":"included in this candidate collection. However, disclosure of these addresses has privacy implications. This document describes a way to share local IP addresses with other clients while preserving client privacy. This is achieved by obfuscating IP addresses with privacy. This is achieved by concealing IP addresses with dynamically generated Multicast DNS (mDNS) names. 1."}
{"_id":"doc-en-mls-architecture-b7f69bc06ae74b726494e2521a1d7116871fdb05c9542c8e0eadbc309f364832","title":"","text":"addition or removal of group members without informing all other members. Membership of an MLS group is the managed at the level of individual Membership of an MLS group is managed at the level of individual clients. In most cases, a client corresponds to a specific device used by a user. If a user has multiple devices, the user will be represented in a group by multiple clients. If an application wishes"}
{"_id":"doc-en-mls-architecture-ff178e2ef9cfe1b66b9231d316530ff47f08712417429ba214e076bf81ed26c8","title":"","text":"among parallel groups. For example, suppose a common member M of two groups A and B has performed a key update in group A but not in group B. The key update provides PCS with regard to M in group A. If a PSK exported from group A and injected into group B, then some of PSK is exported from group A and injected into group B, then some of these PCS properties carry over to group B, since the PSK and secrets derived from it are only known to the new, updated version of M, not to the old, possibly compromised version of M."}
{"_id":"doc-en-mls-architecture-211a693df3ab5a3996eb88c9395163a75c3e8eeaee902bdfdc0abcdb89871824","title":"","text":"its prior membership with a PSK. There are a few practical challenges to this approach. For example, the application will need to ensure that the new members have the the application will need to ensure that all members have the required PSK, including any new members that have joined the group since the epoch in which the PSK was issued."}
{"_id":"doc-en-mls-architecture-742a24122460fc4c3f652161a5ed5e6a9388b4298c93ed94e68683131f0c8fc2","title":"","text":"agreement properties of MLS will confirm that all members of the group agree on the content of these extensions. 5.8. Application messages carried by MLS are opaque to the protocol; they can contain arbitrary data. Each application which uses MLS needs to define the format of its \"application_data\" and any mechanism necessary to negotiate the format of that content over the lifetime of an MLS group. In many applications this means managing format migrations for groups with multiple members who may each be offline at unpredictable times. *RECOMMENDATION:* Use the default content mechanism defined in I- D.mahy-mls-content-neg, unless the specific application defines another mechanism which more appropriately addresses the same requirements for that application of MLS. The MLS framing for application messages also provides a field where clients can send information that is authenticated but not encrypted. Such information can be used by servers that handle the message, but group members are assured that it has not been tampered with. Application messages carried by MLS are opaque; they can contain arbitrary data. The MLS framing for application messages also provides a field where clients can send information that is authenticated but not encrypted. Such information can be used by servers that handle the message, but group members are assured that it has not been tampered with. 5.9. 5.8. The protocol aims to be compatible with federated environments. While this document does not specify all necessary mechanisms"}
{"_id":"doc-en-mls-architecture-a851290b68b9839b602f61f4947127826ccd2cc522db9cfbdaf3362d6d57a213","title":"","text":"authentication mechanisms, ciphersuites, and infrastructure functionalities. 5.10. 5.9. It is important that multiple versions of MLS be able to coexist in the future. Thus, MLS offers a version negotiation mechanism; this"}
{"_id":"doc-en-mls-architecture-c633c8d7f69ecacb49ac2d4e8879f1e7c1ad63f96f519e899d16bc9d478b5c6c","title":"","text":"relatively short period of time, clients have an indication that the credential might have been created without the user's knowledge. Due to the asynchronous nature of MLS, however, there may be transient inconsistencies in a user's device set, so correlating users' clients inconsistencies in a user's client set, so correlating users' clients across groups is more of a detection mechanism than a prevention mechanism."}
{"_id":"doc-en-mls-architecture-a581283b4ac2e0c6cb1a63be8e5b0dcd8c28617b4f64db7f3cfc8e516e2916d2","title":"","text":"Various academic works have analyzed MLS and the different security guarantees it aims to provide. The security of large parts of the protocol has been analyzed by [BBN19] (draft 7), [ACDT21] (draft 11) and [AJM20] (draft 12). protocol has been analyzed by BBN19 (draft 7), ACDT21 (draft 11) and AJM20 (draft 12). Individual components of various drafts of the MLS protocol have been analyzed in isolation and with differing adversarial models, for example, [BBR18], [ACDT19], [ACCKKMPPWY19], [AJM20] and [ACJM20] example, BBR18, ACDT19, ACCKKMPPWY19, AJM20, ACJM20, and AHKM21 analyze the ratcheting tree as the sub-protocol of MLS that facilitates key agreement, while [BCK21] analyzes the key derivation paths in the ratchet tree and key schedule. Finally, [CHK21] analyzes the authentication and cross-group healing guarantees provided by MLS. facilitates key agreement, while BCK21 analyzes the key derivation paths in the ratchet tree and key schedule. Finally, CHK21 analyzes the authentication and cross-group healing guarantees provided by MLS. 8. ACCKKMPPWY19: https://eprint.iacr.org/2019/1489 ACDT19: https://eprint.iacr.org/2019/1189 ACDT21: https://eprint.iacr.org/2021/1083 ACJM20: https://eprint.iacr.org/2020/752 AHKM21: https://eprint.iacr.org/2021/1456 AJM20: https://eprint.iacr.org/2020/1327 BBN19: https://hal.laas.fr/INRIA/hal-02425229 BBR18: https://hal.inria.fr/hal-02425247 BCK21: https://eprint.iacr.org/2021/137 CHK21: https://www.usenix.org/system/files/sec21-cremers.pdf 9. This document makes no requests of IANA."}
{"_id":"doc-en-mls-architecture-551ee3af09b4b062387a8f9824a6181db49c7238e132ce07e76e892ec0900775","title":"","text":"KT log under a user's identity. The verification function would correspond to verifying a key's inclusion in the log for a claimed identity, together with the KT log's mechanisms for a user to monitor and control which keys are associated to their identity. monitor and control which keys are associated with their identity. By the nature of its roles in MLS authentication, the AS is invested with a large amount of trust and the compromise of one of its"}
{"_id":"doc-en-mls-architecture-885471911f2ea86b2cd0ba50706a8aa3e59ab620708502de621109b02b87d1c8","title":"","text":"is persistently offline may still be holding old keying material and thus be a threat to both FS and PCS if it is later compromised. MLS partially defend against this problem by active member including freshness, however not much can be done on the inactive side especially in the case where the client has not processed messages. MLS partially defends against this problem by active members including freshness, however not much can be done on the inactive side especially in the case where the client has not processed messages. *RECOMMENDATION:* Mandate a key updates from clients that are not *RECOMMENDATION:* Mandate key updates from clients that are not otherwise sending messages and evict clients which are idle for too long."}
{"_id":"doc-en-mls-architecture-a30e43fee302303fb3780b8d5cc5ba50435211bc52a4215a32a437a3870714d7","title":"","text":"the secrets themselves are protected by HPKE encryption. Note that under that compromise scenario, authentication is not affected in neither of these cases. As every member of the group can affected in either of these cases. As every member of the group can compute the AEAD keys for all the chains (they have access to the Group Secrets) in order to send and receive messages, the authentication provided by the AEAD encryption layer of the common"}
{"_id":"doc-en-mls-architecture-069b44cb60d284f8207a5ef97f356f35038a86413b9ec78e429096b0fd26e584","title":"","text":"secrecy. If the adversary is active, the adversary can follow the protocol and perform updates on behalf of the compromised party with no ability to an honest group to recover message secrecy. However, MLS provides PCS against active adaptive attackers through its Remove group operation. This means that, as long as other members of the group are honest, the protocol will guarantee message secrecy for all perform updates on behalf of the compromised party with no ability for an honest group to recover message secrecy. However, MLS provides PCS against active adaptive attackers through its Remove group operation. This means that, as long as other members of the group are honest, the protocol will guarantee message secrecy for all messages exchanged in the epochs after the compromised party has been removed."}
{"_id":"doc-en-mls-architecture-9c06ad9fa6d9f0c1cef64ac8aefe2f25c7ea82325b2172d4493a445f9e2ea5d7","title":"","text":"epochs until an honest update from the compromised client happens. Note that under this compromise scenario, the attacker can perform all operations which are available to an legitimate client even all operations which are available to a legitimate client even without access to the actual value of the signature key. Without access to the group secrets, the adversary will not have the"}
{"_id":"doc-en-mls-architecture-561eac95d2574bc5969752ea4a8ffc0f7c12243732718591f0729e4145cd1be1","title":"","text":"compromised parties refresh their credentials securely. Beware that in both oracle and private key access, an active adaptive attacker, can follow the protocol and request to update its own attacker can follow the protocol and request to update its own credential. This in turn induces a signature key rotation which could provide the attacker with part or the full value of the private key depending on the architecture of the service provider."}
{"_id":"doc-en-mls-architecture-914da249f84b22c1957c90ae592afa89215da23a6a83419f4fa0e1f458549057","title":"","text":"and changed with each message received by a client. However, the signature private keys are mostly used by clients to send a message. They also are providing the strong authentication guarantees to other clients, hence we consider that their protection by additional security mechanism should be a priority. send a message. They also provide strong authentication guarantees to other clients, hence we consider that their protection by additional security mechanisms should be a priority. Overall there is no way to detect or prevent these compromise, as Overall there is no way to detect or prevent these compromises, as discussed in the previous sections, performing separation of the application secret states can help recovery after compromise, this is the case for signature keys but similar concern exists for the"}
{"_id":"doc-en-mls-architecture-c4cab0c2e97f7214a531006061116769eabbeaf85c4e4957e12c3c35c34ea540","title":"","text":"notification provider have to be trusted to avoid making correlation on which devices are recipients of the same message. For secure messaging systems, push notification are often sent real- For secure messaging systems, push notifications are often sent real- time as it is not acceptable to create artificial delays for message retrieval."}
{"_id":"doc-en-mls-architecture-e621c9eac6b7d5a6a6fea2889f82eea6c7ef679bc7c325469d6f17e28bb2ff0a","title":"","text":"The attacker can publish or distribute credentials Infrastructures that provide cryptographic material or credentials in place of the MLS client (which is under the control of the user) have often the ability to use the associated secrets to perform operations on behalf of the user, which is unacceptable in many situations. Other mechanisms can be used to prevent this issue, such as the service blessing cryptographic material used by an MLS client. place of the MLS client (which is under the control of the user) often have the ability to use the associated secrets to perform operations on behalf of the user, which is unacceptable in many situations. Other mechanisms can be used to prevent this issue, such as the service blessing cryptographic material used by an MLS client. *RECOMMENDATION:* Make clients submit signature public keys to the AS, this is usually better than the AS generating public key pairs"}
{"_id":"doc-en-mls-architecture-da73517a2df34275c997ddf16196bc2a83b49cc5f779411a23fc8e82bfd4d1c7","title":"","text":"inside the group. When members perform changes directly, this is clearly the case. External joins are authorized indirectly, in the sense that a member publishing a GroupInfo object authorizes anyone to join who has access to the GroupInfo object. External joins do not allow for more granular authorization checks to be done before the new member is added to the group, so if an application wishes to both allow external joins and enforce such checks, then either all the members of the group must all have the ability to check and reject invalid External joins autonomously, or the application needs to do such checks when a member joins and remove them if those checks fail. to join who has access to the GroupInfo object. Both types of joins are done via a Commit message, which could be blocked by the DS or rejected by clients if the join is not authorized. The former approach requires that Commits be visible to the DS; the latter approach requires that clients all share a consistent policy. In the unfortunate event that an unauthorized member is able to join, MLS enables any member to remove them. Application setup may also determine other criteria for membership validity. For example, per-device signature keys can be signed by an"}
{"_id":"doc-en-mls-architecture-3850832e1a6a1098c24849f675b3e5c835c7d91e4007b21775be7b2945c03364","title":"","text":"5.5. Within an MLS group, every member is authenticated to other member, by means of credentials issued and verified by the Authentication Within an MLS group, every member is authenticated to other member by means of credentials issued and verified by the Authentication Service. MLS does not prescribe what actions, if any, an application should take in the event that a group member presents an invalid credential. For example, an application may require such a member to"}
{"_id":"doc-en-mls-architecture-d86695525d7467a19b6a3f0d009058d28bd7fee98b22b43b790a8c76583e4613","title":"","text":"In some authentication systems, it is possible for a previously-valid credential to become invalid over time. For example, in a system based on X.509 certificates, credentials can expire or be revoked. Fortunately, the MLS update mechansisms allow a client to replace an old credential with a new one. This is best done before the old credential becomes invalid. The MLS update mechanisms allow a client to replace an old credential with a new one. This is best done before the old credential becomes invalid. *RECOMMENDATION:* Proactively rotate credentials, especially if a credential is about to become invalid."}
{"_id":"doc-en-mls-architecture-c1b64e848ec1c4ddf5a0eedd2627a1617d40da7f3ccf5e29017ed432f63139b7","title":"","text":"2. 2.1. MLS provides a way for _clients_ to form _groups_ within which they can communicate securely. For example, a set of users might use clients on their phones or laptops to join a group and communicate with each other. A group may be as small as two clients (e.g., for simple person to person messaging) or as large as tens of thousands. A client that is part of a group is a _member_ of that group. A client that is part of a group is a _member_ of that group. As groups change membership and group or member properties, they advance from one _epoch_ to another and the cryptographic state of the group evolves. The group is represented using a _ratchet tree_, which represents the members as the leaves of a tree. It is used to efficiently encrypt to subsets of the members. Each member has a _LeafNode_ object in the tree holding the client's identity, credentials, and capabilities. Various messages are used in the evolution from epoch to epoch. A _Proposal_ message proposes a change to be made in the next epoch, such as adding or removing a member. A _Commit_ message initiates a new epoch by instructing members of the group to implement a collection of proposals. Proposals and Commits are collectively called _Handshake messages_. A _KeyPackage_ provides keys that can be used to add the client to a group, including its LeafNode, and _Signature Key_. A _Welcome_ message provides a new member to the group with the information to initialize their state for the epoch in which they were added. Of course most (but not all) applications use MLS to send encrypted group messages. An _application message_ is an MLS message with an arbitrary application payload. Finally, a _PublicMessage_ contains an integrity-protected MLS Handshake message, while a _PrivateMessage_ contains a confidential, integrity-protected Handshake or Application message. For a more detailed explanation of these terms, please consult the MLS protocol specification. 2.2. In order to communicate securely, users initially interact with services at their disposal to establish the necessary values and"}
{"_id":"doc-en-mls-architecture-3a2b4465214d6b08fd66b051d813d48e5190c5048d50170f6f5143a0e6445692","title":"","text":"restricted to certain users, but we assume that those restrictions are enforced by the application layer. 2.1. 2.3. While informally, a group can be considered to be a set of users possibly using multiple endpoint devices to interact with the Service"}
{"_id":"doc-en-mls-protocol-19a126f3fecc0f2ec62dba9d5ff15c73c34ab42bf7386a7f8c1b429cd7406ea9","title":"","text":"RFC EDITOR PLEASE DELETE THIS SECTION. draft-04 ECIES is now renamed in favor of HPKE (*) draft-03 Added ciphersuites and signature schemes (*)"}
{"_id":"doc-en-mls-protocol-8ec05c118062f844e6fe37b3e536af2eaebd7c360a17699d8f70ef703fddd285","title":"","text":"ciphertext in the list is the encryption to the corresponding node in the resolution. The ECIESCiphertext values encoding the encrypted secret values are computed as follows: Generate an ephemeral DH key pair (x, x*G) in the DH group specified by the ciphersuite in use Compute the shared secret Z with the node's other child Derive a key and nonce as described below Encrypt the node's secret value using the AEAD algorithm specified by the ciphersuite in use, with the following inputs: Key: The key derived from Z Nonce: The nonce derived from Z Additional Authenticated Data: The empty octet string Plaintext: The secret value, without any further formatting Encode the ECIESCiphertext with the following values: ephemeral_key: The ephemeral public key x*G ciphertext: The AEAD output The HPKECiphertext values are computed according to the Encrypt function defined in HPKE. Decryption is performed in the corresponding way, using the private key of the resolution node and the ephemeral public key transmitted"}
{"_id":"doc-en-mls-protocol-fc6a0103ab789a47689cfe76604783d23c022e7e6e066cffa0e609270da9d39c","title":"","text":"The Welcome message contains the information that the new member needs to initialize a GroupState object that can be updated to the current state using the Add message. This information is encrypted for the new member using ECIES. The recipient key pair for the ECIES for the new member using HPKE. The recipient key pair for the HPKE encryption is the one included in the indicated UserInitKey, corresponding to the indicated ciphersuite."}
{"_id":"doc-en-mls-protocol-e078f6411b40556c87d4d0221de28ae6eea0d4a440affa1c9c15ba62db4263d7","title":"","text":"simply copy all fields except the \"leaf_secret\" from its GroupState object. [[ OPEN ISSUE: The Welcome message needs to be sent encrypted for the new member. This should be done using the public key in the UserInitKey, either with ECIES or X3DH. ]] [[ OPEN ISSUE: The Welcome message needs to be synchronized in the same way as the Add. That is, the Welcome should be sent only if the Add succeeds, and is not in conflict with another, simultaneous Add."}
{"_id":"doc-en-mls-protocol-2fdbe4b0e5ea24995f3c2152c4138129c85c516a536fbb3a350831f7b49c68c1","title":"","text":"each Participant creates an initial Participant Application Secret to be used for its own sending chain: Note that [sender] represent the uint32 value encoding the index of the participant in the ratchet tree. Note that [sender] represents the index of the member in the roster. Updating the Application secret and deriving the associated AEAD key and nonce can be summarized as the following Application key schedule"}
{"_id":"doc-en-mls-protocol-0452bf14763bcd0456d7bc57ad29555736b1fa429ca79d5c2d67f3593f2da019","title":"","text":"A Key Derivation Function (KDF) A Derive-Public-Key function that produces a public key from a private key A Derive-Key-Pair function that produces an asymmetric keypair from a node secret A ratchet tree is a left-balanced binary tree, in which each node contains up to three values:"}
{"_id":"doc-en-mls-protocol-7f9ba1daf0c86177ffc4e839c25f082e2093aa2a03ce40a83a549d628fb913ab","title":"","text":"An asymmetric public key The private key for a node is derived from its secret value using the KDF. The public key is then derived from the private key using the Derive-Public-Key function. The contents of the parent are based on the latest-updated child. Nodes in a tree are always updated along the \"direct path\" from a leaf to the root. The generator of the update chooses a random secret value \"path_secret[0]\", and generates a sequence of \"path secrets\", one for each node from the leaf to the root. That is, path_secret[0] is used for the leaf, path_secret[1] for its parent, and so on. At each step, the path secret is used to derive a new secret value for the corresponding node, from which the node's key pair is derived. The contents of a parent node are computed from one of its children as follows: For example, suppose there is a group with four participants: The contents of the parent are based on the latest-updated child. For example, if participants with leaf secrets A, B, C, and D join a group in that order, then the resulting tree will have the following structure: If the first participant subsequently generates an update based on a secret X, then the sender would generate the following sequence of path secrets and node secrets: If the first participant subsequently changes its leaf secret to be X, then the tree will have the following structure. After the update, the tree will have the following structure, where \"ns[i]\" represents the node_secret values generated as described above: 5.3."}
{"_id":"doc-en-mls-protocol-2a1c7a28ac813f189b8e238ece284f1f3a76b98cf083695eafa682cbccc5f8f9","title":"","text":"curves, they SHOULD perform the additional checks specified in Section 7 of Encryption keys are derived from shared secrets by taking the first 16 bytes of H(Z), where Z is the shared secret and H is SHA-256. 5.5.2. This ciphersuite uses the following primitives:"}
{"_id":"doc-en-mls-protocol-b4f739d2e618a889ff807e52d67637d423480f2490534cc7b20d3e59225f93e3","title":"","text":"elliptic curve equation. For these curves, implementers do not need to verify membership in the correct subgroup. Encryption keys are derived from shared secrets by taking the first 16 bytes of H(Z), where Z is the shared secret and H is SHA-256. 5.6. A member of a group authenticates the identities of other"}
{"_id":"doc-en-mls-protocol-bb949e381e37bff79b1ce17aba05512cf1f5d420f2307e74362cf835087cab8e","title":"","text":"Rename the GroupState structure to GroupContext (*) Rename UserInitKey to ClientInitKey draft-05 Common framing for handshake and application messages (*)"}
{"_id":"doc-en-mls-protocol-e119b9168db2809cdd3620a16157a2799e872e513d7739c4e2cb636686cff333","title":"","text":"A short-lived HPKE key pair used to introduce a new client to a group. Initialization keys are published for each client (UserInitKey). (ClientInitKey). A secret that represent a member's contribution to the group secret (so called because the members' leaf keys are the leaves in"}
{"_id":"doc-en-mls-protocol-ad4f975158ee3623c0487e6608431fe84544101134ff30f4142a26e1b73d9973","title":"","text":"Removing a member. Before the initialization of a group, clients publish UserInitKey Before the initialization of a group, clients publish ClientInitKey objects to a directory provided to the Messaging Service. When a client A wants to establish a group with B and C, it first downloads UserInitKeys for B and C. It then initializes a group state containing only itself and uses the UserInitKeys to compute downloads ClientInitKeys for B and C. It then initializes a group state containing only itself and uses the ClientInitKeys to compute Welcome and Add messages to add B and C, in a sequence chosen by A. The Welcome messages are sent directly to the new members (there is no need to send them to the group). The Add messages are broadcasted"}
{"_id":"doc-en-mls-protocol-76ff65386597c75828d9a2f22747b43649636656753174c9d13196f396027318","title":"","text":"update its state to reflect their addition. Subsequent additions of group members proceed in the same way. Any member of the group can download an UserInitKey for a new client and broadcast an Add message that the current group can use to update member of the group can download an ClientInitKey for a new client and broadcast an Add message that the current group can use to update their state and the new client can use to initialize its state. To enforce forward secrecy and post-compromise security of messages,"}
{"_id":"doc-en-mls-protocol-f2ed7a560d689e7e6b238891e80b219b1c2e286e6234135bdba9638d8fd18f0c","title":"","text":"In order to facilitate asynchronous addition of clients to a group, it is possible to pre-publish initialization keys that provide some public information about a user. UserInitKey messages provide public information about a user. ClientInitKey messages provide information about a client that any existing member can use to add this client to the group asynchronously. A UserInitKey object specifies what ciphersuites a client supports, A ClientInitKey object specifies what ciphersuites a client supports, as well as providing public keys that the client can use for key derivation and signing. The client's identity key is intended to be stable throughout the lifetime of the group; there is no mechanism to change it. Init keys are intended to be used a very limited number of times, potentially once. (see init-key-reuse). UserInitKeys also contain an identifier chosen by the client, which the client MUST assure uniquely identifies a given UserInitKey object among the set of UserInitKeys created by this client. of times, potentially once. (see init-key-reuse). ClientInitKeys also contain an identifier chosen by the client, which the client MUST assure uniquely identifies a given ClientInitKey object among the set of ClientInitKeys created by this client. The init_keys array MUST have the same length as the cipher_suites array, and each entry in the init_keys array MUST be a public key for"}
{"_id":"doc-en-mls-protocol-80c44f20ca584d9e8bdc170513ee71cd0725ceab67251ae4161be1b3588ce683","title":"","text":"and used in the HPKE construction for TreeKEM. The whole structure is signed using the client's identity key. A UserInitKey object with an invalid signature field MUST be considered malformed. The input to the signature computation comprises all of the fields except for the signature field. ClientInitKey object with an invalid signature field MUST be considered malformed. The input to the signature computation comprises all of the fields except for the signature field. 8."}
{"_id":"doc-en-mls-protocol-8b3f8f182ff2daf7092c134134c7c709d9a475284fcee1a4155cb580a631b8fb","title":"","text":"needs to initialize a GroupContext object that can be updated to the current state using the Add message. This information is encrypted for the new member using HPKE. The recipient key pair for the HPKE encryption is the one included in the indicated UserInitKey, encryption is the one included in the indicated ClientInitKey, corresponding to the indicated ciphersuite. In the description of the tree as a list of nodes, the \"credential\""}
{"_id":"doc-en-mls-protocol-8f873fd8a450706d992f86fab2818a73066c78f8f5f3cac1e9dd2904b41a83c3","title":"","text":"The \"welcome_info_hash\" field contains a hash of the WelcomeInfo object sent in a Welcome message to the new member. A group member generates this message by requesting a UserInitKey A group member generates this message by requesting a ClientInitKey from the directory for the user to be added, and encoding it into an Add message."}
{"_id":"doc-en-mls-protocol-6356518850f9d5a94bb28ec69b6f0630b2e29cd371b27684663cb1bca1184d01","title":"","text":"If the \"index\" value is equal to the size of the group, increment the size of the group, and extend the tree accordingly Verify the signature on the included UserInitKey; if the signature verification fails, abort Verify the signature on the included ClientInitKey; if the signature verification fails, abort Generate a WelcomeInfo object describing the state prior to the add, and verify that its hash is the same as the value of the"}
{"_id":"doc-en-mls-protocol-1a78eee1b1299622b7d97261a8db0246215221e9f8a0e9c6d73aba1cc38ad89c","title":"","text":"direct path of the new node Set the leaf node in the tree at position \"index\" to a new node containing the public key from the UserInitKey in the Add containing the public key from the ClientInitKey in the Add corresponding to the ciphersuite in use, as well as the credential under which the UserInitKey was signed under which the ClientInitKey was signed The \"update_secret\" resulting from this change is an all-zero octet string of length Hash.length."}
{"_id":"doc-en-mls-protocol-1cb408822032dc61a0d9c359f9a978f409c96c5426ff02e6038bded0262621af","title":"","text":"RFC EDITOR PLEASE DELETE THIS SECTION. draft-07 Initial version of the Tree based Application Key Schedule (*) Initial definition of the Init message for group creation (*) Fix issue with the transcript used for newcomers (*) Clarifications on message framing and HPKE contexts (*) draft-06 Reorder blanking and update in the Remove operation (*)"}
{"_id":"doc-en-mls-protocol-5425bffc3f87d57b72cf750eb410f877607a1849e3fb9f8e932364055fed8d27","title":"","text":"For application messages, a chain of keys is derived for each sender in a similar fashion. This allows forward secrecy at the level of application messages within and out of an epoch. A step in this chain (the second subscript) is called a \"generation\". As before the value [sender] represents the index of the member that will use this key to send, encoded as a uint32. [[ OPEN ISSUE: The HKDF context field is left empty for now. A proper security study is needed to make sure that we do not need more information in the context to achieve the security goals.]] [[ OPEN ISSUE: At the moment there is no contributivity of Application secrets chained from the initial one to the next generation of Epoch secret. While this seems safe because cryptographic operations using the application secrets can't affect the group init_secret, it remains to be proven correct. ]] The following rules apply to the usage of the secrets, keys, and nonces derived above: Senders MUST only use a given secret once and monotonically increment the generation of their secret. This is important to provide Forward Secrecy at the level of Application messages. An attacker getting hold of a member specific Application Secret at generation [N+1] will not be able to derive the member's Application Secret [N] nor the associated AEAD key and nonce. Receivers MUST delete an Application Secret once it has been used to derive the corresponding AEAD key and nonce as well as the next Application Secret. Receivers MAY keep the AEAD key and nonce around for some reasonable period. Receivers MUST delete AEAD keys and nonces once they have been used to successfully decrypt a message. chain (the second subscript) is called a \"generation\". The details of application key derivation are described in the astree section below. 7."}
{"_id":"doc-en-mls-protocol-5ad36bab72eda069b49908d3ab4558b6ac0820a764e0616eaa42e1eb6ccffa0d","title":"","text":"tree of Application Secrets as well as one symmetric ratchet per group member. Each client maintains their own local copy of (parts of) the Application Key Schedule for each epoch during which they are a group member. They derive new keys, nonces and secrets as needed while deleting old ones as soon as they have been used. Each client maintains their own local copy of the Application Key Schedule for each epoch during which they are a group member. They derive new keys, nonces and secrets as needed while deleting old ones as soon as they have been used. Application messages MUST be protected with the Authenticated- Encryption with Associated-Data (AEAD) encryption scheme associated with the MLS ciphersuite. Note that \"Authenticated\" in this context does not mean messages are known to be sent by a specific client but only from a legitimate member of the group. To authenticate a message from a particular member, signatures are required. Handshake messages MUST use asymmetric signatures to strongly authenticate the sender of a message. with the MLS ciphersuite using the common framing mechanism. Note that \"Authenticated\" in this context does not mean messages are known to be sent by a specific client but only from a legitimate member of the group. To authenticate a message from a particular member, signatures are required. Handshake messages MUST use asymmetric signatures to strongly authenticate the sender of a message. 11.1. The Application schedule begins with the Application secrets which are arranged in an \"Application Secret Tree\" or AS Tree for short; a left balanced binary tree with the same set of nodes and edges as the epoch's ratchet tree. Each leaf in the AS Tree is associated with the same group member as the corresponding leaf in the ratchet tree. Nodes are also assigned an index according to their position in the array representation of the tree (described in tree-math). If N is a node index in the AS Tree then left(N) and right(N) denote the children of N (if they exist). The application key schedule begins with the application secrets which are arranged in an \"Application Secret Tree\" or AS Tree for short; a left balanced binary tree with the same set of nodes and edges as the epoch's ratchet tree. Each leaf in the AS Tree is associated with the same group member as the corresponding leaf in the ratchet tree. Nodes are also assigned an index according to their position in the array representation of the tree (described in tree-math). If N is a node index in the AS Tree then left(N) and right(N) denote the children of N (if they exist). Each node in the tree is assigned a secret. The root's secret is simply the application_secret of that epoch. (See key-schedule for"}
{"_id":"doc-en-mls-protocol-5ff1f0bed1346154ac6f44c4c3ed0986ff2da030e61e163a5cc65d4f30f6f3f2","title":"","text":"The secret of any other node in the tree is derived from its parent's secret using a call to Derive-App-Secret. If N is a node index in the ASTree then the secrets of the children If N is a node index in the AS Tree then the secrets of the children of N are defined to be: Note that fixing concrete values for GroupState_[n] and Note that fixing concrete values for GroupContext_[n] and application_secret completely defines all secrets in the AS Tree. 11.2."}
{"_id":"doc-en-mls-protocol-9150ca549707fe13e8dfafbffb17874deee86e4fee0306e078fde4924596cbe7","title":"","text":"11.3. It is important to delete all security sensitive values as soon as It is important to delete all security sensitive values S as soon as they, or another value derived from them, is used for encryption or decryption."}
{"_id":"doc-en-mls-protocol-c4ce0793277ca42a662f956444478e1f057980c839a4331c4cb84750de649c92","title":"","text":"encrypt or (successfully) decrypt a message or if a key, nonce or secret derived from S has been consumed. (This goes both for values derived via Derive-Secret and HKDF-Expand- Label). if a key, nonce or secret derived from S has been consumed. (This goes both for values derived via Derive-Secret and HKDF-Expand- Label.) Here, S may be the init_secret, update_secret, epoch_secret, application_secret as well as any secret in the AS Tree or one of the"}
{"_id":"doc-en-mls-protocol-1b4a7ad651c3aa96bf8047d6a212478dd7f758132e639a6b30f6f6aa0de48ea0","title":"","text":"11.4. During each epoch senders MUST NOT encrypt more messages than permitted by the security bounds of the AEAD scheme used. During each epoch senders MUST NOT encrypt more data than permitted by the security bounds of the AEAD scheme used. Note that each change to the Group through a Handshake message will also set a new application_secret. Hence this change MUST be applied"}
{"_id":"doc-en-mls-protocol-02081cfbe6f9bc2a7386019a0fd6ea142fac9dc312f96d89e45e4a97b558b650","title":"","text":"In this document, we describe a protocol based on tree structures that enable asynchronous group keying with forward secrecy and post- compromise security. Based on earlier work on \"asynchronous ratcheting trees\" art, the mechanism presented here use a ratcheting trees\" art, the protocol presented here uses an asynchronous key-encapsulation mechanism for tree structures. This mechanism allows the members of the group to derive and update shared keys with costs that scale as the log of the group size."}
{"_id":"doc-en-mls-protocol-2f28804b7fdb160707f74f75edd686ca904739a0c7fa8b3cde4bf15dbcd01d48","title":"","text":"group. Initialization keys are published for each client (ClientInitKey). A secret that represent a member's contribution to the group A secret that represents a member's contribution to the group secret (so called because the members' leaf keys are the leaves in the group's ratchet tree)."}
{"_id":"doc-en-mls-protocol-dba7e3f7478d597be92a56aadb1f810ef435178fdda66314444d58211a1d17f7","title":"","text":"The recipient of an update processes it with the following steps: Compute the updated path secrets * Identify a node in the direct path for which the local member is in the subtree of the non- updated child * Identify a node in the resolution of the copath node for which this node has a private key * Decrypt the path secret for the parent of the copath node using the private key from the resolution node * Derive path secrets for ancestors of that node using the algorithm described above * The recipient SHOULD verify that the received public keys agree with the public keys derived from the new node_secret values Merge the updated path secrets into the tree * Replace the public keys for nodes on the direct path with the received public keys * For nodes where an updated path secret was computed in step 1, compute the corresponding node secret and node key pair and replace the values stored at the node with the computed values. Compute the updated path secrets. Identify a node in the direct path for which the local member is in the subtree of the non-updated child. Identify a node in the resolution of the copath node for which this node has a private key. Decrypt the path secret for the parent of the copath node using the private key from the resolution node. Derive path secrets for ancestors of that node using the algorithm described above. The recipient SHOULD verify that the received public keys agree with the public keys derived from the new node_secret values. Merge the updated path secrets into the tree. Replace the public keys for nodes on the direct path with the received public keys. For nodes where an updated path secret was computed in step 1, compute the corresponding node secret and node key pair and replace the values stored at the node with the computed values. For example, in order to communicate the example update described in the previous section, the sender would transmit the following values: In this table, the value pk(X) represents the public key corresponding derived from the node secret X. The value E(K, S) represents the public-key encryption of the path secret S to the public key K. In this table, the value pk(X) represents the public key derived from the node secret X. The value E(K, S) represents the public-key encryption of the path secret S to the public key K. 6."}
{"_id":"doc-en-mls-protocol-e73f7930769a3f96297c5ab768392b61b4d4cda1cfea23a425842dbc88715cd8","title":"","text":"6.1. 6.1.1. This ciphersuite uses the following primitives: Hash function: SHA-256"}
{"_id":"doc-en-mls-protocol-9a346037ae80ce6d2e45581b0f82433da9d285038f08b323876950948ea490e9","title":"","text":"curves, they SHOULD perform the additional checks specified in Section 7 of 6.1.1. 6.1.2. This ciphersuite uses the following primitives:"}
{"_id":"doc-en-mls-protocol-4d3f0508cc8083ad1aedd66442244d0268ea558d568e0bc277b5791f7e4795d1","title":"","text":"The creator of the group constructs an Init message as follows: Fetch a UserInitKey for each member (including the creator) Fetch a ClientInitKey for each member (including the creator) Identify a protocol version and cipher suite that is supported by all proposed members. Construct a ratchet tree with its leaves populated with the public keys and credentials from the UserInitKeys of the members, and all other nodes blank. keys and credentials from the ClientInitKeys of the members, and all other nodes blank. Generate a fresh leaf key pair for the first leaf"}
{"_id":"doc-en-mls-protocol-7e0bc2ea42d98ce2d91e30c294b14bd5aab957910998fba993b15805b4043f86","title":"","text":"Decompose group operations into Proposals and Commits (*) Enable Add and Remove proposals from outside the group (*) draft-07 Initial version of the Tree based Application Key Schedule (*)"}
{"_id":"doc-en-mls-protocol-8e68dec2273f05bd9c06b706dafee28426819c888a20ee257abe413c196882b2","title":"","text":"Blank the intermediate nodes along the path from the removed leaf to the root 10.1.4. Add and Remove proposals can be constructed and sent to the group by a party that is outside the group. For example, a Delivery Service might propose to remove a member of a group has been inactive for a long time, or propose adding a newly-hired staff member to a group representing a real-world team. Proposals originating outside the group are identified by having a \"sender\" value in the range 0xFFFFFF00 - 0xFFFFFFFF. The specific value 0xFFFFFFFF is reserved for clients proposing that they themselves be added. Proposals with types other than Add MUST NOT be sent with this sender index. In such cases, the MLSPlaintext MUST be signed with the private key corresponding to the ClientInitKey in the Add message. Recipients MUST verify that the MLSPlaintext carrying the Proposal message is validly signed with this key. The remaining values 0xFFFFFF00 - 0xFFFFFFFE are reserved for signer that are pre-provisioned to the clients within a group. If proposals with these sender IDs are to be accepted within a group, the members of the group MUST be provisioned by the application with a mapping between sender indices in this range and authorized signing keys. To ensure consistent handling of external proposals, the application MUST ensure that the members of a group have the same mapping and apply the same policies to external proposals. An external proposal MUST be sent as an MLSPlaintext object, since the sender will not have the keys necessary to construct an MLSCiphertext object. [[ TODO: Should recognized external signers be added to some object that the group explicitly agrees on, e.g., as an extension to the GroupContext? ]] 10.2. A Commit message initiates a new epoch for the group, based on a"}
{"_id":"doc-en-mls-protocol-587df03756f009434cf703a029ca7b45bd49dfdcaae6ae9ed48d3e5b0964a133","title":"","text":"A hash function A Diffie-Hellman finite-field group or elliptic curve A Diffie-Hellman finite-field group or elliptic curve group An AEAD encryption algorithm"}
{"_id":"doc-en-mls-protocol-cb2ac7ed2f2c4812c3d7d2e5774215f78ee66acd93d6591c4297f6024d5b3e4c","title":"","text":"14. TODO: Registries for protocol parameters, e.g., ciphersuites This document requests the creation of the following new IANA registries: MLS Ciphersuites All of these registries should be under a heading of \"Message Layer Security\", and administered under a Specification Required policy RFC8126. 14.1. The \"MLS Ciphersuites\" registry lists identifiers for suites of cryptographic algorithms defined for use with MLS. These are two- byte values, so the maximum possible value is 0xFFFF = 65535. Values in the range 0xF000 - 0xFFFF are reserved for vendor-internal usage. Template: Value: The two-byte identifier for the ciphersuite Name: The name of the ciphersuite Reference: Where this algorithm is defined The initial contents for this registry are as follows: [[ Note to RFC Editor: Please replace \"XXXX\" above with the number assigned to this RFC. ]] "}
{"_id":"doc-en-mls-protocol-08ea2b6195c41069052030ca56ff73b45fab8c9373054c73f16bbe1642f9c875","title":"","text":"where \"node_public_key\" is the public key of the node that the path secret is being encrypted for, group_context is the current GroupContext object for the group, and the functions \"SetupBaseI\" and GroupContext object for the group, and the functions \"SetupBaseS\" and \"Seal\" are defined according to I-D.irtf-cfrg-hpke. Decryption is performed in the corresponding way, using the private"}
{"_id":"doc-en-mls-protocol-ab4be247e133979061a5ad3559e5fc1b24a38ad48d9fce337e0c7c7315d1cdf9","title":"","text":"left and right children, respectively. When computing the hash of a leaf node, the hash of a \"LeafNodeHashInput\" object is used: Note that the \"node_index\" field contains the index of the leaf among the nodes in the tree, not its index among the leaves; \"node_index = 2 * leaf_index\". 7.6. Each member of the group maintains a GroupContext object that"}
{"_id":"doc-en-mls-protocol-798d16f20ffa5a5389b0bec9c3663252c1cb43e53615f638473a1ad98784d087","title":"","text":"An AEAD encryption algorithm A hash algorithm A signature algorithm The HPKE parameters are used to instantiate HPKE I-D.irtf-cfrg-hpke"}
{"_id":"doc-en-mls-protocol-84d3bfee38625453e01cea93d161e5c8c0b798aa21a302a3d503d1f79bc31abd","title":"","text":"Application messages The sender information used to look up the key for the content encryption is encrypted under AEAD using a random nonce and the \"sender_data_key\" which is derived from the \"sender_data_secret\" as follows: The sender information used to look up the key for content encryption is encrypted with an AEAD where the key and nonce are derived from both \"sender_data_secret\" and a sample of the encrypted message content. For handshake and application messages, a sequence of keys is derived via a \"sender ratchet\". Each sender has their own sender ratchet,"}
{"_id":"doc-en-mls-protocol-ce46db2dc053e6b716c6cc8df0501aa1eef97ca6cd23f2dc97e451a4cd2b28a4","title":"","text":"each key/nonce pair MUST NOT be used to encrypt more than one message. Keys, nonces and secrets of ratchets are derived using Keys, nonces, and the secrets in ratchets are derived using DeriveAppSecret. The context in a given call consists of the index of the sender's leaf in the ratchet tree and the current position in the ratchet. In particular, the index of the sender's leaf in the"}
{"_id":"doc-en-mls-protocol-46536a0f9c2b51a6fae7ba1f978dc125bdfd00163fb0df0656b4a54ee41b3dae","title":"","text":"Set group_id, epoch, content_type and authenticated_data fields from the MLSPlaintext object directly Randomly generate the sender_data_nonce field Identify the key and key generation depending on the content type Encrypt an MLSSenderData object for the encrypted_sender_data field from MLSPlaintext and the key generation Generate and sign an MLSPlaintextTBS object from the MLSPlaintext object Encrypt an MLSCiphertextContent for the ciphertext field using the key identified, the signature, and MLSPlaintext object key identified and MLSPlaintext object Encrypt the sender data using a key and nonce derived from the \"sender_data_secret\" for the epoch and a sample of the encrypted MLSCiphertextContent. Decryption is done by decrypting the metadata, then the message, and then verifying the content signature. Decryption is done by decrypting the sender data, then the message, and then verifying the content signature. The following sections describe the encryption and signing processes in detail. 8.1. The \"sender data\" used to look up the key for the content encryption is encrypted under AEAD using the MLSCiphertext sender_data_nonce and the sender_data_key from the keyschedule. It is encoded as an object of the following form: MLSSenderData.sender is assumed to be a \"member\" sender type. When constructing an MLSSenderData from a Sender object, the sender MUST verify Sender.sender_type is \"member\" and use Sender.sender for MLSSenderData.sender. The \"reuse_guard\" field contains a fresh random value used to avoid nonce reuse in the case of state loss or corruption, as described in content-signing-and-encryption. The Additional Authenticated Data (AAD) for the SenderData ciphertext computation is its prefix in the MLSCiphertext, namely: When parsing a SenderData struct as part of message decryption, the recipient MUST verify that the sender field represents an occupied leaf in the ratchet tree. In particular, the sender index value MUST be less than the number of leaves in the tree. 8.2. The signature field in an MLSPlaintext object is computed using the The \"signature\" field in an MLSPlaintext object is computed using the signing private key corresponding to the credential at the leaf in the tree indicated by the sender field. The signature covers the plaintext metadata and message content, which is all of MLSPlaintext"}
{"_id":"doc-en-mls-protocol-b8df48baa5cf006a64142376a4ecd24262912b981090414aaf3d785b275c7758","title":"","text":"GroupContext for the current epoch, so that signatures are specific to a given group and epoch. The ciphertext field of the MLSCiphertext object is produced by 8.2. The \"ciphertext\" field of the MLSCiphertext object is produced by supplying the inputs described below to the AEAD function specified by the ciphersuite in use. The plaintext input contains content and signature of the MLSPlaintext, plus optional padding. These values"}
{"_id":"doc-en-mls-protocol-351a5107ebc7cfefee7fded208274c0ddedca5f937f5d201924516088e01ad61","title":"","text":"contains an object of the following form, with the values used to identify the key and nonce: The ciphertext field of the MLSCiphertext object is produced by supplying these inputs to the AEAD function specified by the ciphersuite in use. 8.3. The \"sender data\" used to look up the key for the content encryption is encrypted with the ciphersuite's AEAD with a key and nonce derived from both the \"sender_data_secret\" and a sample of the encrypted content. Before being encrypted, the sender data is encoded as an object of the following form: MLSSenderData.sender is assumed to be a \"member\" sender type. When constructing an MLSSenderData from a Sender object, the sender MUST verify Sender.sender_type is \"member\" and use Sender.sender for MLSSenderData.sender. The \"reuse_guard\" field contains a fresh random value used to avoid nonce reuse in the case of state loss or corruption, as described in content-encryption. The key and nonce provided to the AEAD are computed as the KDF of the first \"KDF.Nh\" bytes of the ciphertext generated in the previous section. If the length of the ciphertext is less than \"KDF.Nh\", the whole ciphertext is used without padding. In pseudocode, the key and nonce are derived as: ``` ciphertext_sample = ciphertext[0..KDF.Nh-1] sender_data_key = ExpandWithLabel(sender_data_secret, \"key\", ciphertext_sample, AEAD.Nk) sender_data_nonce = ExpandWithLabel(sender_data_secret, \"nonce\", ciphertext_sample, AEAD.Nn) ``` The Additional Authenticated Data (AAD) for the SenderData ciphertext is all the fields of MLSCiphertext excluding \"encrypted_sender_data\": When parsing a SenderData struct as part of message decryption, the recipient MUST verify that the sender field represents an occupied leaf in the ratchet tree. In particular, the sender index value MUST be less than the number of leaves in the tree. 9."}
{"_id":"doc-en-mls-protocol-bc0397d21359aebc3effc5cb815c5d82fd1faaaab3d45b470ddc765c4ec45843","title":"","text":"The mandatory-to-implement ciphersuite for MLS 1.0 is \"MLS10_128_HPKE25519_AES128GCM_SHA256_Ed25519\" which uses Curve25519, HKDF over SHA2-256 and AES-128-GCM for HPKE, and AES- 128-GCM with Ed25519 for symmetric encryption and signatures. Curve25519 for key exchange, AES-128-GCM for HPKE, HKDF over SHA2-256, AES for metadata masking, and Ed25519 for signatures. Values with the first byte 255 (decimal) are reserved for Private Use."}
{"_id":"doc-en-mls-protocol-c1b281c0877c6c0648d214f137ce094380d81b68b52d27035adf9a2340129a25","title":"","text":"Provider (SP) as described in I-D.ietf-mls-architecture. In particular, we assume the SP provides the following services: A long-term identity key provider which allows clients to A long-term signature key provider which allows clients to authenticate protocol messages in a group. A broadcast channel, for each group, which will relay a message to"}
{"_id":"doc-en-mls-protocol-93ca278a00fbb1908338dd85a616f9a35047c2afa9fe14a2834e69164c533ec5","title":"","text":"A member of a group authenticates the identities of other participants by means of credentials issued by some authentication system, like a PKI. Each type of credential MUST express the following data: following data in the context of the group it is used with: The public key of a signature key pair The public key of a signature key pair matching the SignatureScheme specified by the CipherSuite of the group The identity of the holder of the private key The signature scheme that the holder will use to sign MLS messages The identity of the holder of the private keys Credentials MAY also include information that allows a relying party to verify the identity / signing key binding. Additionally, Credentials SHOULD specify the signature scheme corresponding to each contained public key. A BasicCredential is a raw, unauthenticated assertion of an identity/ key binding. The format of the key in the \"public_key\" field is defined by the relevant ciphersuite: the group ciphersuite for a"}
{"_id":"doc-en-mls-protocol-7bbef6c52f3be4fdd6b338325c445a835f28200e9e608b7e9016ce668519b64a","title":"","text":"A KeyPackage object specifies a ciphersuite that the client supports, as well as providing a public key that others can use for key agreement. The client's identity key can be updated throughout the agreement. The client's signature key can be updated throughout the lifetime of the group by sending a new KeyPackage with a new identity; the new identity MUST be validated by the authentication service. signature key; the new signature key MUST be validated by the authentication service. When used as InitKeys, KeyPackages are intended to be used only once and SHOULD NOT be reused except in case of last resort. (See"}
{"_id":"doc-en-mls-protocol-d3b5e0334df888b7afa255e4741f6af40ac364f9a870c2667fd59e6d52c7fd29","title":"","text":"The value for hpke_init_key MUST be a public key for the asymmetric encryption scheme defined by cipher_suite. The whole structure is signed using the client's identity key. A KeyPackage object with an signed using the client's signature key. A KeyPackage object with an invalid signature field MUST be considered malformed. The input to the signature computation comprises all of the fields except for the signature field."}
{"_id":"doc-en-mls-protocol-dfd7f532913cc7320ed6289e4946563c40b5e8979b54b31a657d08cf75bb9ca3","title":"","text":"creator, because they are derived from an authenticated key exchange protocol. Subsequent leaf keys are known only by their owner. Note that the long-term identity keys used by the protocol MUST be Note that the long-term signature keys used by the protocol MUST be distributed by an \"honest\" authentication service for clients to authenticate their legitimate peers."}
{"_id":"doc-en-mls-protocol-372d4051aeebbe84f91e395355596507e90e3f0497f2755e09928f0c125e8378","title":"","text":"The second form considers authentication with respect to the sender, meaning the group members can verify that a message originated from a particular member of the group. This property is provided by digital signatures on the messages under identity keys. signatures on the messages under signature keys. 14.3."}
{"_id":"doc-en-mls-protocol-8e5012348f5572e550ae9fd3a4566bbdc67f0b95563d8c71218374298cfb49ad","title":"","text":"reveal previous message or root keys. Post-compromise security is provided by Commit operations, in which a new root key is generated from the latest ratcheting tree. If the adversary cannot derive the updated root key after an Commit operation, it cannot compute any updated root key after a Commit operation, it cannot compute any derived secrets. In the case where the client could have been compromised (device"}
{"_id":"doc-en-mls-protocol-59ba7e93f646ac14dac7bac860f786c6722ad66791166377dd4b2c978490aab3","title":"","text":"A signed object describing a client's identity and capabilities, and including a hybrid public-key encryption (HPKE I-D.irtf-cfrg- hpke ) public key that can be used to encrypt to that client. hpke) public key that can be used to encrypt to that client. A key package that is prepublished by a client, which other clients can use to introduce the client to a new group."}
{"_id":"doc-en-mls-protocol-8a8eab75a269648bf3d43324092ec1d2b49ab518e512f68ef3dd338309ac7d67","title":"","text":"A signature algorithm The HPKE parameters are used to instantiate HPKE I-D.irtf-cfrg-hpke for the purpose of public-key encryption. The \"DeriveKeyPair\" function associated to the KEM for the ciphersuite maps octet strings to HPKE key pairs. MLS uses draft-07 of HPKE I-D.irtf-cfrg-hpke for public-key encryption. The \"DeriveKeyPair\" function associated to the KEM for the ciphersuite maps octet strings to HPKE key pairs. Ciphersuites are represented with the CipherSuite type. HPKE public keys are opaque values in a format defined by the underlying protocol"}
{"_id":"doc-en-mls-protocol-b7ffd9555a15da20fb775da3f6ba3ccdc9940b1b6536c900f73bc737d1136153","title":"","text":"Name: The name of the ciphersuite Recommended: Whether support for this extension is recommended by the IETF MLS WG. Valid values are \"Y\" and \"N\". The \"Recommended\" column is assigned a value of \"N\" unless explicitly requested, and adding a value with a \"Recommended\" value of \"Y\" requires Standards Action RFC8126. IESG Approval is REQUIRED for a Y->N transition. Recommended: Whether support for this ciphersuite is recommended by the IETF MLS WG. Valid values are \"Y\" and \"N\". The \"Recommended\" column is assigned a value of \"N\" unless explicitly requested, and adding a value with a \"Recommended\" value of \"Y\" requires Standards Action RFC8126. IESG Approval is REQUIRED for a Y->N transition. Reference: The document where this ciphersuite is defined"}
{"_id":"doc-en-mls-protocol-c8104cf17024ec285ea90503867d9f45cf9c72e101d16b267078701f7d18c3a3","title":"","text":"16.3. This registry lists identifiers for types of credentials that can be used for authentication in the MLS protocol. The extension type field is two bytes wide, so valid extension type values are in the used for authentication in the MLS protocol. The credential type field is two bytes wide, so valid credential type values are in the range 0x0000 to 0xffff. Template:"}
{"_id":"doc-en-mls-protocol-9f5f1985298bf53d8cb16540810e43d9e970a30c6284941c1483b79c69a6e7c6","title":"","text":"Name: The name of the credential type Recommended: Whether support for this extension is recommended by Recommended: Whether support for this credential is recommended by the IETF MLS WG. Valid values are \"Y\" and \"N\". The \"Recommended\" column is assigned a value of \"N\" unless explicitly requested, and adding a value with a \"Recommended\" value of \"Y\" requires Standards Action RFC8126. IESG Approval is REQUIRED for a Y->N transition. Reference: The document where this extension is defined Reference: The document where this credential is defined Initial contents:"}
{"_id":"doc-en-mls-protocol-6fc8e8713e24e6fd8621e45a83da8b89b993798554ac0b673c9c6845f0c2ed88","title":"","text":"in the \"PreSharedKeyID\" object. Specifically, \"psk_secret\" is computed as follows: The \"index\" field in \"PSKLabel\" corresponds to the index of the PSK in the \"psk\" array, while the \"count\" field contains the total number of PSKs. Here \"0\" represents the all-zero vector of length KDF.Nh. The \"index\" field in \"PSKLabel\" corresponds to the index of the PSK in the \"psk\" array, while the \"count\" field contains the total number of PSKs. In other words, the PSKs are chained together with KDF.Extract invocations, as follows: In particular, if there are no PreSharedKey proposals in a given Commit, then the resulting \"psk_secret\" is \"psk_secret_[0]\", the all- zero vector. 8.3."}
{"_id":"doc-en-mls-protocol-e7734825320b1156a9065d7d92a6c272b003af02aa996879fd8bc8906a91149f","title":"","text":"In this case, the new ratchet tree is the same as the provisional ratchet tree. If one or more PreSharedKey proposals are part of the commit, derive the \"psk_secret\" as specified in pre-shared-keys, where the Derive the \"psk_secret\" as specified in pre-shared-keys, where the order of PSKs in the derivation corresponds to the order of PreSharedKey proposals in the \"proposals\" vector. Otherwise, set \"psk_secret\" to a zero-length octet string. PreSharedKey proposals in the \"proposals\" vector. Construct an MLSPlaintext object containing the Commit object. Sign the MLSPlaintext using the old GroupContext as context."}
{"_id":"doc-en-mls-protocol-80b5eb4538954ce7a9f4918a71a9fb7b1aedce3eb3aabf68728b6beda8aca906","title":"","text":"Update the confirmed and interim transcript hashes using the new Commit, and generate the new GroupContext. If the \"proposals\" vector contains any PreSharedKey proposals, derive the \"psk_secret\" as specified in pre-shared-keys, where the Derive the \"psk_secret\" as specified in pre-shared-keys, where the order of PSKs in the derivation corresponds to the order of PreSharedKey proposals in the \"proposals\" vector. Otherwise, set \"psk_secret\" to 0. PreSharedKey proposals in the \"proposals\" vector. Use the \"init_secret\" from the previous epoch, the \"commit_secret\" and the \"psk_secret\" as defined in the previous steps, and the new"}
{"_id":"doc-en-mls-protocol-02db944cafe4d8d26766cc5b336aed4554c883767ec87172590c280b5398e398","title":"","text":"Each leaf is given an _index_ (or _leaf index_), starting at \"0\" from the left to \"n-1\" at the right. Finally, a node in the tree may also be _blank_, indicating that no value is present at that node (i.e. no keying material). This is often the case when a leaf was recently removed from the tree. There are multiple ways that an implementation might represent a ratchet tree in memory. For example, left-balanced binary trees can be represented as an array of nodes, with node relationships computed"}
{"_id":"doc-en-mls-protocol-7910c5ba73195b50b7280286912d5b623227a3170a0473f0603df1a657282559","title":"","text":"The conditions under which each of these values must or must not be present are laid out in views. A node in the tree may also be _blank_, indicating that no value is present at that node. The _resolution_ of a node is an ordered list of non-blank nodes that collectively cover all non-blank descendants of the node. The resolution of a non-blank node with no unmerged leaves is just the node itself. More generally, the resolution of a node is effectively a depth-first, left-first enumeration of the nearest non-blank nodes below the node: The _resolution_ of a node is an ordered list of non-blank nodes that collectively cover all non-blank descendants of the node. The resolution of a non-blank node with no unmerged leaves is just the node itself. More generally, the resolution of a node is effectively a depth-first, left-first enumeration of the nearest non-blank nodes below the node: The resolution of a non-blank node comprises the node itself, followed by its list of unmerged leaves, if any"}
{"_id":"doc-en-mls-protocol-c8efe1f5bd511b4c4e25f6538c4198f1ce2ba282ae4401aa90caabfbb532be5d","title":"","text":"\"lazy\" version of this operation, where only the leaf changes and intermediate nodes are blanked out. The \"path\" field of a Commit message MUST be populated if the Commit covers at least one Update or Remove proposal. The \"path\" field MUST also be populated if the Commit covers no proposals at all (i.e., if the proposals vector is empty). The \"path\" field MAY be omitted if the Commit covers only Add proposals. In pseudocode, the logic for validating a Commit is as follows: By default, the \"path\" field of a Commit MUST be populated. The \"path\" field MAY be omitted if (a) it covers at least one proposal and (b) none proposals covered by the Commit are of \"path required\" types. A proposal type requires a path if it cannot change the group membership in a way that requires the forward secrecy and post- compromise security guarantees that an UpdatePath provides. The only proposal types defined in this document that do not require a path are: \"add\" \"psk\" \"app_ack\" \"reinit\" New proposal types MUST state whether they require a path. If any instance of a proposal type requires a path, then the proposal type requires a path. This attribute of a proposal type is reflected in the \"Path Required\" field of the proposal type registry defined in mls-proposal-types. Update and Remove proposals are the clearest examples of proposals that require a path. An UpdatePath is required to evict the removed member or the old appearance of the updated member. In pseudocode, the logic for validating the \"path\" field of a Commit is as follows: To summarize, a Commit can have three different configurations, with different uses:"}
{"_id":"doc-en-mls-protocol-3f4154d1285116b2c112bbd858259b19148c02359c9157af6e6a41b60b11dbe9","title":"","text":"committer's contribution to the group and provides PCS with regard to the committer. A \"partial\" Commit that references Add, PreSharedKey, or ReInit proposals but where the path is empty. Such a commit doesn't provide PCS with regard to the committer. A \"partial\" Commit that references proposals that do not require a path, and where the path is empty. Such a commit doesn't provide PCS with regard to the committer. A \"full\" Commit that references proposals of any type, which provides FS with regard to any removed members and PCS for the"}
{"_id":"doc-en-mls-protocol-22608b819893b09baaea388eded02c62d62de0e15d96c4771b74266ac1b25869","title":"","text":"12.3. A new group can be formed from a subset of an existing group's members, using the same parameters as the old group. The creator of the group indicates this situation by including a PreSharedKey of type \"resumption\" with usage \"branch\" in the Welcome message that creates the branched subgroup. members, using the same parameters as the old group. A member can create a sub-group by performing the following steps: Determine a subset of existing members that should be a part of the sub-group. Create a new tree for the sub-group by fetching a new KeyPackage for each existing member that should be included in the sub-group. Create a Welcome message that includes a PreSharedKey of type \"resumption\" with usage \"branch\". A client receiving a Welcome including a PreSharedKey of type \"resumption\" with usage \"branch\" MUST verify that the new group"}
{"_id":"doc-en-mls-protocol-427e96608eaa68f3d650584abb9042741fbd7ee0e39eca58034604812c193b35","title":"","text":"The \"version\" and \"ciphersuite\" values in the Welcome MUST be the same as those used by the old group. Each LeafNode in the new group's tree MUST be a leaf in the old group's tree at the epoch indicated in the PreSharedKey. Each LeafNode in a new subgroup MUST match some LeafNode in the original group. In this context, a pair of LeafNodes is said to \"match\" if the identifiers presented by their respective credentials are considered equivalent by the application. In addition, to avoid key re-use, the \"psk_nonce\" included in the \"PreSharedKeyID\" object MUST be a randomly sampled nonce of length"}
{"_id":"doc-en-mls-protocol-3e8f3b3b9738dba4ad22ee581d746d14597aa6a3dc26d8d86ade103205141ad3","title":"","text":"The following structure is used to fully describe the data transmitted in plaintexts or ciphertexts. The following figure illustrates how the various structures described in this section relate to each other, and the high-level operations used to produce and consume them: 7.1. MLSMessageContent is authenticated using the MLSMessageAuth"}
{"_id":"doc-en-mls-protocol-60bc152f0a6243a033c62025bf49878363e7b47cf5c29ac908385ea9c67b1f3c","title":"","text":"cryptographic state of the group, this section defines a scheme for generating a hash value (called the \"tree hash\") that represents the contents of the group's ratchet tree and the members' leaf nodes. The tree hash of a tree is the tree hash of its root node, which we define recursively, starting with the leaves. The tree hash of a leaf node is the hash of leaf's \"LeafNodeHashInput\" object which might include a \"LeafNode\" object depending on whether or not it is blank. Now the tree hash of any non-leaf node is recursively defined to be the hash of its \"ParentNodeHashInput\". This includes an optional \"ParentNode\" object depending on whether the node is blank or not. The \"left_hash\" and \"right_hash\" fields hold the tree hashes of the node's left and right children, respectively. The tree hash of an individual node is the hash of the node's \"TreeHashInput\" object, which may contain either a \"LeafNodeHashInput\" or a \"ParentNodeHashInput\" depending on the type of node. \"LeafNodeHashInput\" objects contain the \"leaf_index\" and the \"LeafNode\" (if any). \"ParentNodeHashInput\" objects contain the \"ParentNode\" (if any) and the tree hash of the node's left and right children. The tree hash of an entire tree corresponds to the tree hash of the root node, which is computed recursively by starting at the leaf nodes and building up. 8.8."}
{"_id":"doc-en-mls-protocol-75aae8b203bc80530d0d42d3313b9a09b5871e4225d61de004b26e380a200d81","title":"","text":"input to the key schedule, the Commit and GroupSecrets objects MUST indicate the same set of PSKs, in the same order. Each time a client injects a PSK into a group, the \"psk_nonce\" of its PreSharedKeyID MUST be set to a fresh random value of length \"KDF.Nh\", where \"KDF\" is the KDF for the ciphersuite of the group into which the PSK is being injected. This ensures that even when a PSK is used multiple times, the value used as an input into the key schedule is different each time. On receiving a Commit with a \"PreSharedKey\" proposal or a GroupSecrets object with the \"psks\" field set, the receiving Client includes them in the key schedule in the order listed in the Commit,"}
{"_id":"doc-en-mls-protocol-bc34900b207b1024909c73293957b9cd0779d7ef734aca730551ac7020e54589","title":"","text":"Welcome message MUST be the same as the corresponding fields in the ReInit proposal. The \"epoch\" in the Welcome message MUST be 1 The Welcome MUST specify a PreSharedKey of type \"resumption\" with usage \"reinit\". The \"group_id\" must match the old group, and the \"epoch\" must indicate the epoch after the Commit covering the ReInit. The \"psk_nonce\" included in the \"PreSharedKeyID\" of the resumption PSK MUST be a randomly sampled nonce of length \"KDF.Nh\", for the KDF defined by the new group's ciphersuite. Note that these three steps may be done by the same group member or different members. For example, if a group member sends a commit with an inline ReInit proposal (steps 1 and 2), but then goes"}
{"_id":"doc-en-mls-protocol-bed2758dcdc96b53d36991423f6b1bef317b25a251537ff141ec619c07e7c25c","title":"","text":"The \"version\" and \"ciphersuite\" values in the Welcome MUST be the same as those used by the old group. The \"epoch\" in the Welcome message MUST be 1. Each LeafNode in a new subgroup MUST match some LeafNode in the original group. In this context, a pair of LeafNodes is said to \"match\" if the identifiers presented by their respective credentials are considered equivalent by the application. In addition, to avoid key re-use, the \"psk_nonce\" included in the \"PreSharedKeyID\" object MUST be a randomly sampled nonce of length \"KDF.Nh\". Resumption PSKs with usage \"branch\" MUST NOT be used in other contexts. A PreSharedKey proposal with type \"resumption\" and usage \"branch\" MUST be considered invalid."}
{"_id":"doc-en-mls-protocol-c60dea75a9ab9ec8ba23fc1eb50de7b46c2ef6eaac2854c642f22e923df72e2e","title":"","text":"A PreSharedKey proposal is invalid if any of the following is true: The \"psktype\" in the PreSharedKeyID struct is not set to \"external\". \"resumption\" and the \"usage\" is \"reinit\" or \"branch\". The \"psk_nonce\" is not of length \"KDF.Nh\"."}
{"_id":"doc-en-mls-protocol-5e330fa3f17d2e4016b574684be39a81fbafe86efb0a8a087bc9311a0c07770f","title":"","text":"A GroupContextExtensions proposal is used to update the list of extensions in the GroupContext for the group. \"struct { Extension extensions; } GroupContextExtensions; \" A GroupContextExtensions proposal is invalid if it includes a \"required_capabilities\" extension and some members of the group do not support some of the required capabilities (including those added"}
{"_id":"doc-en-mls-protocol-d8f477fb22adb56ce12783e893d70ebabf47e1cd37ddeeaf77bf89d42d947e3d","title":"","text":"5.3.2. In some credential schemes, a valid credential can \"expire\", or become invalid after a certain point in time. For example, each X.509 certificate has a \"notAfter\" field, expressing a time after which the certificate is not valid. Expired credentials can cause operational problems in light of the validation requirements of credential-validation. Applications can apply some operational practices and adaptations to Authentication Service policies to moderate these impacts. In general, to avoid operational problems such as new joiners rejecting expired credentials in a group, applications that use such credentials should ensure to the extent practical that all of the credentials in use in a group are valid at all times. If a member finds that its credential has expired (or will soon), it should issue an Update or Commit that replaces it with a valid credential. For this reason, members SHOULD accept Update proposals and Commits issued by members with expired credentials, if the credential in the Update or Commit is valid. Similarly, when a client is processing messages sent some time in the past (e.g., syncing up with a group after being offline), the client SHOULD accept signatures from members with expired credentials, since the credential may have been valid at the time the message was sent. If a member finds that another member's credential has expired, they may issue a Remove that removes that member. For example, an application could require a member preparing to issue a Commit to check the tree for expired credentials and include Remove proposals for those members in its Commit. In situations where the group tree is known to the DS, the DS could also monitor the tree for expired credentials and issue external Remove proposals. Some credential schemes also allow credentials to be revoked. Revocation is similar to expiry, in that a previously valid credential becomes invalid. As such, most of the considerations above also apply to revoked credentials. However, applications may want to treat revoked credentials differently, e.g., removing members with revoked credentials while allowing members with expired credentials time to update. 5.3.3. MLS implementations will presumably provide applications with a way to request protocol operations with regard to other clients (e.g., removing clients). Such functions will need to refer to the other"}
{"_id":"doc-en-mls-protocol-d472f4a042b306d14e4566484ec22b9752961caadaafba4b928d71b1e05fb574","title":"","text":"A signing key pair used to authenticate the sender of a message. A message that proposes a change to the group, e.g., adding or removing a member. A message that implements the changes to the group proposed in a set of Proposals. An MLS protocol message that is signed by its sender and authenticated as coming from a member of the group in a particular epoch, but not encrypted. An MLS protocol message that is both signed by its sender, authenticated as coming from a member of the group in a particular epoch, and encrypted so that it is confidential to the members of the group in that epoch. A PublicMessage or PrivateMessage carrying an MLS Proposal or Commit object, as opposed to application data."}
{"_id":"doc-en-mls-protocol-abe2155e922db94caea3143c8a48351843c5e0ba56bedbfe968d6959f639755b","title":"","text":"with an algorithm such as HMAC or an AEAD algorithm. The PublicMessage and PrivateMessage formats are defined in message- framing; they represent integrity-protected and confidentiality- protected messages, respectively. Security notions such as forward secrecy and post-compromise security are defined in security- considerations. framing. Security notions such as forward secrecy and post- compromise security are defined in security-considerations. 2.1."}
{"_id":"doc-en-mls-protocol-995a0718e426d320ff22a87a67f5d2234b940688afc7fbd2813bf7c2bd1404f0","title":"","text":"5.1.1. HPKE public keys are opaque values in a format defined by the underlying protocol (see the Cryptographic Dependencies section of the HPKE specification for more information). underlying protocol (see Section 4 of RFC9180 for more information). Signature public keys are likewise represented as opaque values in a format defined by the ciphersuite's signature scheme."}
{"_id":"doc-en-mls-protocol-1de4be908ab8ead6b35afadf23a5094525e8649a4b99a8072148ef2c200faa3b","title":"","text":"the \"extensions\" field of a LeafNode object with the \"application_id\" extension. However, applications SHOULD NOT rely on the data in an However, applications MUST NOT rely on the data in an \"application_id\" extension as if it were authenticated by the Authentication Service, and SHOULD gracefully handle cases where the identifier presented is not unique."}
{"_id":"doc-en-mls-protocol-ddac311f06495a35ba801ef0d55522dcace9790ee37cc5fe19be9ec7e1dfa97e","title":"","text":"12.2. A group member creating a commit and a group member processing a commit MUST verify that the list of committed proposals is valid Commit MUST verify that the list of committed proposals is valid using one of the following procedures, depending on whether the commit is external or not. commit is external or not. If the list of proposals is invalid, then the Commit message MUST be rejected as invalid. For a regular, i.e. not external, commit the list is invalid if any of the following occurs:"}
{"_id":"doc-en-multipath-2cebf042b3a058c514ef22145f7bf7aa8eab9275add661b0807ae94402faf3f9","title":"","text":"For example, assuming the IV value is \"6b26114b9cba2b63a9e8dd4f\", the connection ID sequence number is \"3\", and the packet number is \"aead\", the nonce will be set to \"6b2611489cba2b63a9a873e2\". \"aead\", the nonce will be set to \"6b2611489cba2b63a9e873e2\". 6.3.2."}
{"_id":"doc-en-multipath-3910ae56ab0ecade7352becd890f55216e139abacd0a5d9fdffa86e546d5b5ce","title":"","text":"Path Identifier (Path ID): An identifier that is used to identify a path in a QUIC connection at an endpoint. Path Identifier is used in multipath control frames (etc. PATH_ABANDON frame) to identify a path. The Path ID is defined as the sequence number of the destination Connection ID used for sending packets on that particular path. Packet Number Space Identifier (PNS ID): An identifier that is used to distinguish packet number spaces for different paths. It is used in 1-RTT packets and ACK_MP frames. Each node maintains a list of \"Received Packets\" for each of the CID that it provided to the peer, which is used for acknowledging packets received with that CID. The difference between Path Identifier and Packet Number Space Identifier, is that the Path Identifier is used in multipath control frames to identify a path, and the Packet Number Space Identifier is used in 1-RTT packets and ACK_MP frames to distinguish packet number spaces for different paths. Both identifiers have the same value, which is the sequence number of the connection ID, when a new path is established. The initial path that is used during the handshake (and multipath negotiation) has the path ID 0 and therefore all 0-RTT packets are also tracked and processed with the path ID 0. For 1-RTT packets, the path ID is the sequence number of the Destination Connection ID present in the packet header, as defined in Section 5.1.1 of QUIC- TRANSPORT. used in multipath control frames (e.g., PATH_ABANDON frame) to identify a path. The initial path that is used during the handshake (and multipath negotiation) has the path ID 0 and therefore all 0-RTT packets are also tracked and processed with the path ID 0. For 1-RTT packets, the path ID is the sequence number of the Destination Connection ID present in the packet header, as defined in Section 5.1.1 of QUIC-TRANSPORT that is used for sending packets on that particular path. 2."}
{"_id":"doc-en-multipath-3d860710b245e5cae008b46ffd7a7321da41b5115c44a4510e01a5d39a08ec67","title":"","text":"Associated Destination Connection ID: The Connection ID used to send packets over the path. If multiple packet number spaces are used over the connection, hosts MUST also track the following information. In Active state, hosts MUST also track the following information: Path Packet Number Space: The endpoint maintains a separate packet number for sending and receiving packets over this path. Packet number considerations described in QUIC-TRANSPORT apply within the given path. Path ID: The endpoint maintains a separate packet number space for sending and receiving packets over this path which is identified by the path ID. Packet number considerations as described in Section 12.3 of QUIC-TRANSPORT apply within the given path. In the \"Active\" state, hosts MUST also track the following information."}
{"_id":"doc-en-multipath-ecbad1f99495e813546d8e75041de3ce8fae2dd7348334b202083ad8f955e316","title":"","text":"The ACK_MP frame, as specified in ack-mp-frame, is used to acknowledge 1-RTT packets. Compared to the QUIC version 1 ACK frame, the ACK_MP frames additionally contains a Packet Number Space Identifier (PN Space ID). The PN Space ID used to distinguish packet number spaces for different paths and is simply derived from the sequence number of Destination Connection ID. Therefore, the packet number space for 1-RTT packets can be identified based on the Destination Connection ID in each packet. the ACK_MP frame additionally contains a Path ID. The Path ID is used to distinguish packet number spaces for different paths and is simply derived from the sequence number of Destination Connection ID. Therefore, the Path ID for 1-RTT packets can be identified based on the Destination Connection ID in each packet. Acknowledgements of Initial and Handshake packets MUST be carried using ACK frames, as specified in QUIC-TRANSPORT. The ACK frames, as"}
{"_id":"doc-en-multipath-5222655cd18952fba7885b5cfec89ff6b871bf893785140c2e82a9476cac42bf","title":"","text":"Section 5.3 of QUIC-TLS specifies AEAD usage, and in particular the use of a nonce, N, formed by combining the packet protection IV with the packet number. If multiple packet number spaces are used, the the packet number. When multiple packet number spaces are used, the packet number alone would not guarantee the uniqueness of the nonce. In order to guarantee the uniqueness of the nonce, the nonce N is calculated by combining the packet protection IV with the packet number and with the path identifier. The path ID for 1-RTT packets is the sequence number of the The Path ID for 1-RTT packets is the sequence number of the Connection ID as specified in QUIC-TRANSPORT. Section 19 of QUIC- TRANSPORT encodes the Connection ID Sequence Number as a variable- length integer, allowing values up to 2^62-1; in this specification,"}
{"_id":"doc-en-multipath-d868b373c94c0d8da8b07166aae0d509d92ba4656cbb7c02ca4f1747f488796f","title":"","text":"nonce. For example, assuming the IV value is \"6b26114b9cba2b63a9e8dd4f\", the connection ID sequence number is \"3\", and the packet number is Connection ID Sequence Number is \"3\", and the packet number is \"aead\", the nonce will be set to \"6b2611489cba2b63a9e873e2\". 5.3."}
{"_id":"doc-en-multipath-40043c21cd218c7b01fd9e92039b49f5e490f2e90bf172d5d9c960c0d1ab6316","title":"","text":"If the client has used all the allocated CID, it is supposed to retire those that are not used anymore, and the server is supposed to provide replacements, as specified in QUIC-TRANSPORT. Usually, it is desired to provide one more connection ID as currently in use, to desired to provide one more Connection ID as currently in use, to allow for new paths or migration. 6.2."}
{"_id":"doc-en-multipath-7a45ca4880360484d943c81cd670b248730d46210357dea6ea79b3627a6e1f8e","title":"","text":"PATH_ABANDON frame is considered lost, the peer SHOULD repeat it. PATH_ABANDON frames MAY be sent on any path, not only the path identified by the Packet Number Space Identifier. identified by the Path Identifier. 8.2."}
{"_id":"doc-en-multipath-939c7cabca119bd751786bf0908a5bd1bb3541eadafcb295f1fa072ba95c023f","title":"","text":"The ACK_MP frame (types TBD-00 and TBD-01; experiments use 0xbaba00..0xbaba01) is an extension of the ACK frame defined by QUIC- TRANSPORT. It is used to acknowledge packets that were sent on different paths when using multiple packet number spaces. If the frame type is TBD-01, ACK_MP frames also contain the sum of QUIC packets with associated ECN marks received on the connection up to this point. different paths using multiple packet number spaces. If the frame type is TBD-01, ACK_MP frames also contain the sum of QUIC packets with associated ECN marks received on the connection up to this point. ACK_MP frame is formatted as shown in fig-ack-mp-format. Compared to the ACK frame specified in QUIC-TRANSPORT, the following field is added. The identifier of the path packet number space of the 1-RTT packets which are acknowledged by the ACK_MP frame. If an endpoint receives an ACK_MP frame with a packet number space ID which was never issued by endpoints (i.e., with a sequence number larger than the largest one advertised), it MUST treat this as a connection error of type MP_PROTOCOL_VIOLATION and close the connection. If an endpoint receives an ACK_MP frame with a packet number space ID which is no more active (e.g., retired by a RETIRE_CONNECTION_ID frame or belonging to closed paths), it MUST ignore the ACK_MP frame without causing a connection error. The identifier of the path to identify the packet number space of the 1-RTT packets which are acknowledged by the ACK_MP frame. If an endpoint receives an ACK_MP frame with a Path ID which was never issued by endpoints (i.e., with a sequence number larger than the largest one advertised), it MUST treat this as a connection error of type MP_PROTOCOL_VIOLATION and close the connection. If an endpoint receives an ACK_MP frame with a Path ID which is no more active (e.g., retired by a RETIRE_CONNECTION_ID frame or belonging to closed paths), it MUST ignore the ACK_MP frame without causing a connection error. 9."}
{"_id":"doc-en-multipath-9a92e6c33862de6e2aa24be717e4c76a0d02cba9222ec3dc4a63010b71a56b82","title":"","text":"The transmission of QUIC packets on a regular QUIC connection is regulated by the arrival of data from the application and the congestion control scheme. QUIC packets can only be sent when the congestion window of at least one path is open. Multipath QUIC implementations also need to include a packet congestion control scheme. QUIC packets that increase the number of bytes in flight can only be sent when the congestion window allows it. Multipath QUIC implementations also need to include a packet scheduler that decides, among the paths whose congestion window is open, the path over which the next QUIC packet will be sent. Many factors can influence the definition of these algorithms and their precise definition is outside the scope of this document. Various packet schedulers have been proposed and implemented, notably for Multipath TCP. A companion draft I-D.bonaventure-iccrg-schedulers provides several general-purpose packet schedulers depending on the application goals. Note that the receiver could use a different scheduling strategy to send ACK(_MP) frames. The recommended default behaviour consists in sending ACK(_MP) frames on the path they acknowledge packets. Other scheduling strategies, such as sending ACK(_MP) frames on the lowest latency path, might be considered, but they could impact the sender with side effects on, e.g., the RTT estimation or the congestion control scheme. When adopting such asymetrical acknowledgment scheduling, the receiver should at least ensure that the sender negotiated one-way delay calculation mechanism (e.g., QUIC- Timestamp). open, the path over which the next QUIC packet will be sent. Most frames, including control frames (PATH_CHALLENGE and PATH_RESPONSE being the notable exceptions), can be sent and received on any active path. The scheduling is a local decision, based on the preferences of the application and the implementation. Note that this implies that an endpoint may send and receive ACK_MP frames on a path different from the one that carried the acknowledged packets. A reasonable default consists in sending ACK_MP frames on the path they acknowledge packets, but the receiver must not assume its peer will do so. 7.5."}
{"_id":"doc-en-multipath-5b2712c4792325170260ab29fb7a79055ea8cb5010324bc10dd13ccc900550de","title":"","text":"7.2.1. Packet protection for QUIC version 1 is specified is Section 5 of Packet protection for QUIC version 1 is specified in Section 5 of QUIC-TLS. The general principles of packet protection are not changed for QUIC Multipath. No changes are needed for setting packet protection keys, initial secrets, header protection, use of 0-RTT"}
{"_id":"doc-en-multipath-170a9a4e558edb62b1e2ea4ce7ece7852cd5551dd78c687ee339c0665dfae57e","title":"","text":"idle timeout\". When only one path is available, servers MUST follow the specifications in QUIC-TRANSPORT. When more than one path is available, servers shall monitor the arrival of non-probing packets on the available paths. Servers SHOULD stop sending traffic on paths through where no non-probing packet was received in the last 3 path RTTs, but MAY ignore that rule if it would disqualify all available paths. To avoid idle timeout of a path, endpoints can send ack-eliciting packets such as packets containing PING frames Section 19.2 of QUIC-TRANSPORT on that path to keep it alive. Sending periodic PING frames also helps prevent middlebox timeout, as discussed in Section 10.1.2 of QUIC-TRANSPORT. When more than one path is available, hosts shall monitor the arrival of non-probing packets and the acknowledgements for the packets sent over each path. Hosts SHOULD stop sending traffic on a path if for at least max_idle_timeout milliseconds (a) no non-probing packet was received or (b) no non-probing packet sent over this path was acknowledged, but MAY ignore that rule if it would disqualify all available paths. To avoid idle timeout of a path, endpoints can send ack-eliciting packets such as packets containing PING frames (Section 19.2 of QUIC-TRANSPORT) on that path to keep it alive. Sending periodic PING frames also helps prevent middlebox timeout, as discussed in Section 10.1.2 of QUIC-TRANSPORT. Server MAY release the resource associated with paths for which no non-probing packet was received for a sufficiently long path-idle"}
{"_id":"doc-en-oblivious-http-61cc0316372bb9edf8b47aa78e41bc241a05f72c867c05c4abe677fe1ad6aab7","title":"","text":"request of the oblivious request resource that includes the same content. When it receives a response, it sends a response to the client that includes the content of the response from the oblivious request resource. When generating a request, the proxy MUST follow the forwarding rules in Section 7.6 of HTTP. request resource. When forwarding a request, the proxy MUST follow the forwarding rules in Section 7.6 of HTTP. A generic HTTP intermediary implementation is suitable for the purposes of serving an oblivious proxy resource, but additional care is needed to ensure that client privacy is maintained. Firstly, a generic implementation will forward unknown fields. For oblivious HTTP, a proxy SHOULD NOT forward unknown fields. Though clients are not expected to include fields that might contain identifying information, removing unknown fields removes this privacy risk. Secondly, generic implementations are often configured to augment requests with information about the client, such as the Via field or the Forwarded field FORWARDED. A proxy MUST NOT add information about the client identity when forwarding requests. A proxy can also generate responses, though it assumed to not be able to examine the content of a request (other than to observe the choice of key identifier, KDF, and AEAD), so it is also assumed that it cannot generate an encapsulated response. A proxy MUST NOT add information about the client identity when forwarding requests. This includes the Via field, the Forwarded field FORWARDED, and any similar information. A client does not depend on the proxy using an authenticated and encrypted connection to the oblivious request resource, only that information about the client not be attached to forwarded requests. 7.2.1. As there are privacy benefits from having a large rate of requests"}
{"_id":"doc-en-oblivious-http-4f83fba745a72112e238400c314207f02bdefb5835a28b0fb301f6809a9e77fd","title":"","text":"7.2.2. This document assumes that all communication between different entities is protected by HTTPS. This protects information about which resources are the subject of request and prevents a network observer from being able to trivially correlate messages on either side of a proxy. As the time at which encapsulated request or response messages are sent can reveal information to a network observer. Though messages exchanged between the oblivious proxy resource and the oblivious"}
{"_id":"doc-en-oblivious-http-51e86d8b5f2dd60be3ab58a5005970a42c57e994569fcdf5a03307991c7a28c8","title":"","text":"7.3. The Oblivious Gateway Resource can be operated by a different entity than the Target Resource. However, this means that the client needs to trust the Oblivious Gateway Resource not to modify requests or responses. This analysis concerns itself with a deployment scenario where a single server provides both the Oblivious Gateway Resource and Target Resource. A server that operates both Oblivious Gateway and Target Resources is responsible for removing request encryption, generating a response to the Encapsulated Request, and encrypting the response."}
{"_id":"doc-en-oblivious-http-bf1501abc36a749ff389dc06524e2e701709e4c968d977baf2bd52ee3216649e","title":"","text":"the unprotected requests and responses, plus protections for traffic analysis; see ta. Nonsecure requests - such those with the \"http\" scheme as opposed to the \"https\" scheme - SHOULD NOT be used if the Oblivious Gateway and Target Resources are operated by different entities as that would expose both requests and response to modification or inspection by a network attacker. 7.4. An Oblivious Gateway Resource needs to have a plan for replacing keys. This might include regular replacement of keys, which can be assigned new key identifiers. If an Oblivious Gateway Resource"}
{"_id":"doc-en-oblivious-http-39c057b3294b3962b5811ef5dee1398d5626611e7c747e6ab547766da3e7d38a","title":"","text":"within the HPKE context created using the \"message/bhttp request\" label; see repurposing-the-encapsulation-format. 7.5. A server is responsible for either rejecting replayed requests or ensuring that the effect of replays does not adversely affect clients or resources; see replay. 7.4. or resources. Encrypted requests can be copied and replayed by the Oblivious Relay resource. The threat model for Oblivious HTTP allows the possibility"}
{"_id":"doc-en-oblivious-http-f2be66cd43fd38e519cfec2785b800470f51f4c0e7ea85a0b3c057e6cb88888b","title":"","text":"field ensures that responses have unique AEAD keys and nonces even when requests are replayed. 7.4.1. 7.5.1. Clients SHOULD include a \"Date\" header field in Encapsulated Requests, unless the Oblivious Gateway Resource does not use \"Date\""}
{"_id":"doc-en-oblivious-http-30cbf79ea1b3be12c2d4434bb09d3d4f760763985ec718ec44620262c7ed1322","title":"","text":"for the \"Date\" field to determine the time window over which the server will accept responses. 7.4.2. 7.5.2. An Oblivious Gateway Resource can reject requests that contain a \"Date\" value that is outside of its active window with a 400 series"}
{"_id":"doc-en-oblivious-http-d9af7bd81b53313b81b763e6ff67c78c71bba7424de073cf4955a511442372f0","title":"","text":"Oblivious Gateway Resource might be correlated using that information. 7.5. 7.6. This document does not provide forward secrecy for either requests or responses during the lifetime of the key configuration. A measure of forward secrecy can be provided by generating a new key configuration then deleting the old keys after a suitable period. 7.6. 7.7. This design does not provide post-compromise security for responses."}
{"_id":"doc-en-oblivious-http-ca13be02427f97ad14c2af22a3dc6e3f9e0bd49be7609555055ced0ae915f14f","title":"","text":"The total number of affected messages affected by server key compromise can be limited by regular rotation of server keys. 7.7. 7.8. Including a \"Date\" field in requests reveals some information about the client clock. This might be used to fingerprint clients UWT or"}
{"_id":"doc-en-oblivious-http-d43a5cbdb6cf6b58a3bd7da1d5695b50854aa14cd55c17a30ffdd8811aa4e8d3","title":"","text":"7. One goal of this design is that independent client requests are only linkable by the chosen key configuration. The Oblivious Relay and Gateway resources can link requests using the same key configuration by matching KeyConfig.key_id, or, if the Target Resource is willing to use trial decryption, a limited set of key configurations that share an identifier. An Oblivious Relay Resource can link requests using the public key corresponding to KeyConfig.key_id or via the URI of the Oblivious Gateway Resource. We refer to this set of information as the gateway's configuration. Whether or not targets can link requests depends on how gateway configuration information is produced and discovered by clients. Specifically, gateways can maliciously construct configurations to track individual clients. Ideally, all clients share a consistent view of the gateway configuration. The number of different valid configurations can exponentially partition the anonymity set of clients. For example, if there are two valid configurations, that would yield two anonymity sets consisting of clients that used one configuration and clients that used the other configuration. If the size of each set is large enough, this may not be a significant loss of privacy in practice. Ensuring that many clients share a configuration is necessary to provide privacy for clients. linkable by their content. However, the choice of client configuration might be used to correlate requests. A client configuration includes the Oblivious Relay Resource URI, the Oblivious Gateway key configuration (KeyConfig), and Oblivious Gateway Resource URI. A configuration is active if clients can successfully use it for interacting with with a target. Oblivious Relay and Gateway Resources can identify when requests use the same configuration by matching \"KeyConfig.key_id\" or the Oblivious Gateway Resource URI. The Oblivious Gateway Resource might use the source address of requests to correlate requests that use an Oblivious Relay Resource run by the same operator. If the Oblivious Gateway Resource is willing to use trial decryption, requests can be further separated into smaller groupings based on the keys that are used. Each active client configuration partitions the client anonymity set. In practice, it is infeasible to reduce the number of active configurations to one. Enabling diversity in choice of Oblivious Relay Resource naturally increases the number of active configurations. A small number of configurations might need to be active to allow for key rotation and server maintenance. Client privacy depends on having each configuration used by many other clients. It is critical prevent the use of unique client configurations, which might be used to track of individual clients, but it is also important to avoid creating small groupings of clients that might weaken privacy protections. A specific method for a client to acquire configurations is not included in this specification. Applications using this design MUST provide accommodations to mitigate tracking using gateway provide accommodations to mitigate tracking using client configurations. CONSISTENCY provides options for ensuring that configurations are consistent between clients. client configurations are consistent between clients. The content of requests or responses, if used in forming new requests, can be used to correlate requests. This includes obvious methods of linking requests, like cookies COOKIES, but it also includes any information in either message that might affect how subsequent requests are formulated. For example, FIELDING describes how interactions that are individually stateless can be used to build a stateful system when a client acts on the content of a response. 8."}
{"_id":"doc-en-oblivious-http-536be1ea3afc1ffb11f0d5c6b132ddb10e52c0b73de612009d7ef09642b911b7","title":"","text":"6. In this design, a client wishes to make a request of a server that is authoritative for the Target Resource. The client wishes to make this request without linking that request with either: authoritative for a Target Resource. The client wishes to make this request without linking that request with either: The identity at the network and transport layer of the client (that is, the client IP address and TCP or UDP port number the"}
{"_id":"doc-en-oblivious-http-7a54ec0d0d961950a14414b2ebf3ed305e8a27dbbb5ab7268446cdfb89baa580","title":"","text":"analysis could be used to match messages that are forwarded by the relay. A relay could, as part of its function, add delays in order to increase the anonymity set into which each message is attributed. This could latency to the overall time clients take to receive a response, which might not be what some clients want. A relay could, as part of its function, delay requests before forwarding them. Delays might increase the anonymity set into which each request is attributed. Any delay also increases the time that a client waits for a response, so delays SHOULD only be added with the consent - or at least awareness - of clients. A relay that forwards large volumes of exchanges can provide better privacy by providing larger sets of messages that need to be matched."}
{"_id":"doc-en-oblivious-http-fea7a46ec8bb11bba405f03531a4e8d098eab3e33b0c470951998878a71d7a5b","title":"","text":"response to the POST request made to that resource. Errors detected by the after successfully removing encapsulation and errors detected by the MUST be sent in an . errors detected by the MUST be sent in an . This might be because the request is malformed or the does not produce a response. In either case the can generate a response with an appropriate error status code (such as 400 (Bad Request) or 504 (Gateway Timeout); see HTTP and HTTP, respectively). This response is encapsulated in the same way as a successful response. Errors in the encapsulation of requests mean that responses cannot be encapsulated. This includes cases where the is incorrect or outdated. The can generate and send a response with an error status to the . This response MAY be forwarded to the or treated by the as a failure. If a receives a response that is not an , this could indicate that the client configuration used to construct the request is incorrect or out of date. 6."}
{"_id":"doc-en-oblivious-http-f58c9b8d8cf3e5b0e964ca6f02833c5c5ea36cf8a45605a4ca4d537e8c541be3","title":"","text":"4.6. The encrypted payload of an OHTTP request and response is a binary HTTP message BINARY. The and agree on this encrypted payload type by specifying the media type \"message/bhttp\" in the HPKE info string and HPKE export context string for request and response encryption, respectively. The encrypted payload of an Oblivious HTTP request and response is a binary HTTP message BINARY. The and agree on this encrypted payload type by specifying the media type \"message/bhttp\" in the HPKE info string and HPKE export context string for request and response encryption, respectively. Future specifications may repurpose the encapsulation mechanism described in this document. This requires that the specification"}
{"_id":"doc-en-oblivious-http-3961949c1aa9e2401a7ba4dee0bf069a03312a87ae6315d58d44ca8a45297b95","title":"","text":"This draft includes pseudocode that uses the functions and conventions defined in HPKE. This draft uses the variable-length integer encoding from Section 16 of QUIC. Encoding and decoding variable-length integers to a sequence of bytes are described using the functions \"vencode()\" and \"vdecode()\". The function \"len()\" takes the length of a sequence of bytes. Encoding an integer to a sequence of bytes in network byte order is described using the function \"encode(n, v)\", where \"n\" is the number of bytes and \"v\" is the integer value. The function \"len()\" returns the length of a sequence of bytes. Formats are described using notation from Section 1.3 of QUIC."}
{"_id":"doc-en-oblivious-http-dd0679cbf7a5f3dbe73b0a9a9e6408e2b0cb8f445350840b93f140bfdba4ff26","title":"","text":"5.1. Clients encapsulate a request \"request\" with an HPKE public key \"pkR\", whose Key Identifier is \"keyID\" as follows: Clients encapsulate a request \"request\" using values from a key configuration: the key identifier from the configuration, \"keyID\", the public key from the configuration, \"pkR\", and a selected combination of KDF, identified by \"kdfID\", and AEAD, identified by \"aeadID\". The client then constructs an encapsulated request, \"enc_request\", as follows: Compute an HPKE context using \"pkR\", yielding \"context\" and encapsulation key \"enc\". Encrypt (seal) \"request\" with \"keyID\" as associated data using Construct associated data, \"aad\", by concatenating the values of \"keyID\", \"kdfID\", and \"aeadID\", as 8-, 16- and 16-bit integers respectively, each in network byte order. Encrypt (seal) \"request\" with \"aad\" as associated data using \"context\", yielding ciphertext \"ct\". Concatenate the length of \"keyID\" as a variable-length integer, \"keyID\", \"enc\", and \"ct\", yielding an Encapsulated Request \"enc_request\". Note that \"enc\" is of fixed-length, so there is no ambiguity in parsing \"enc\" and \"ct\". Concatenate the three values of \"aad\", \"enc\", and \"ct\", yielding an Encapsulated Request \"enc_request\". Note that \"enc\" is of fixed-length, so there is no ambiguity in parsing this structure. In pseudocode, this procedure is as follows: Servers decrypt an Encapsulated Request by reversing this process. Given an Encapsulated Request \"enc_request\", a server: Parses \"enc_request\" into \"keyID\", \"enc\", and \"ct\" (indicated using the function \"parse()\" in pseudocode). The server is then able to find the HPKE private key, \"skR\", corresponding to \"keyID\". If no such key exists, the server returns an error; see errors. Parses \"enc_request\" into \"keyID\", \"kdfID\", \"aeadID\", \"enc\", and \"ct\" (indicated using the function \"parse()\" in pseudocode). The server is then able to find the HPKE private key, \"skR\", corresponding to \"keyID\". a. If \"keyID\" does not identify a key, the server returns an error. b. If \"kdfID\" and \"aeadID\" identify a combination of KDF and AEAD that the server is unwilling to use with \"skR\", the server returns an error. Compute an HPKE context using \"skR\" and the encapsulated key \"enc\", yielding \"context\". Construct additional associated data, \"aad\", as the Key Identifier \"keyID\" from \"enc_request\". Construct additional associated data, \"aad\", from \"keyID\", \"kdfID\", and \"aeadID\" or as the first five bytes of \"enc_request\". Decrypt \"ct\" using \"aad\" as associated data, yielding \"request\" or an error on failure. If decryption fails, the server returns an"}
{"_id":"doc-en-oblivious-http-9c843d6aa2404438d12088b0b85fb7861c4ea9a74135b1f1eb1403a79b26c19e","title":"","text":"Padding is a capability provided by binary HTTP messages; see BINARY. If the encapsulation method described in this document is used to protect a different message type (see repurposing), that message format might need to include padding support. format might need to include padding support. can also use padding for the same reason, but need to operate at the HTTP layer since they cannot manipulate binary HTTP messages; for example, see HTTP2 or HTTP3). 6.3."}
{"_id":"doc-en-oblivious-http-0d3a8cc8b4476a7ffce6b9452d8fff23ad7335efa23a947d46d7f0793e309c7b","title":"","text":"6.5.1. SHOULD include a \"Date\" header field in Encapsulated Requests, unless the does not use \"Date\" for anti-replay purposes. the has prior knowledge that indicates that the does not use \"Date\" for anti-replay purposes. Though HTTP requests often do not include a \"Date\" header field, the value of this field might be used by a server to limit the amount of"}
{"_id":"doc-en-oblivious-http-689f1e821326be3cef4498019c73af7e62db11c721e7b62c4e9187fe05188ea5","title":"","text":"might need to allow for the time it takes requests to arrive from the , with a time window that is large enough to allow for differences in clocks. Insufficient tolerance of time differences could result in valid requests being unnecessarily rejected. valid requests being unnecessarily rejected. Beyond allowing for multiple round trip times - to account for retransmission - network delays are unlikely to be significant in determining the size of the window, unless all potential are known to have excellent time- keeping. A specific window size might need to be determined experimentally. MUST NOT treat the time window as secret information. An attacker can actively probe with different values for the \"Date\" field to"}
{"_id":"doc-en-oblivious-http-c57e8d5fb8603abc5718b2bd8af95ebdb0963fc7e15a3d2edef0daa98839d01e","title":"","text":"corresponds to the key identifier, but the encapsulated request cannot be successfully decrypted using the key. 8.4. Encapsulated requests can be copied and replayed by the oblivious proxy resource. The design of oblivious HTTP does not assume that the oblivious proxy resource will not replay requests. In addition, if a client sends an encapsulated request in TLS early data (see Section 8 of TLS and RFC8470), a network-based adversary might be able to cause the request to be replayed. In both cases, the effect of a replay attack and the mitigations that might be employed are similar to TLS early data. A client or oblivious proxy resource MUST NOT automatically attempt to retry a failed request unless it receives a positive signal indicating that the request was not processed or forwarded. The HTTP/2 REFUSED_STREAM error code (Section 8.1.4 of RFC7540), the HTTP/3 H3_REQUEST_REJECTED error code (Section 8.1 of QUIC-HTTP), or a GOAWAY frame (in either protocol version) are all sufficient signals that no processing occurred. Connection failures or interruptions are not sufficient signals that no processing occurred. The anti-replay mechanisms described in Section 8 of TLS are generally applicable to oblivious HTTP requests. Servers can use the encapsulated keying material as a unique key for identifying potential replays. The mechanism used in TLS for managing differences in client and server clocks cannot be used as it depends on being able to observe previous interactions. Oblivious HTTP explicitly prevents such linkability. Applications can still include an explicit indication of time to limit the span of time over which a server might need to track accepted requests. Clock information could be used for client identification, so reduction in precision or obfuscation might be necessary. The considerations in RFC8470 as they relate to managing the risk of replay also apply, though there is no option to delay the processing of a request. Limiting requests to those with safe methods might not be satisfactory for some applications, particularly those that involve the submission of data to a server. The use of idempotent methods might be of some use in managing replay risk, though it is important to recognize that different idempotent requests can be combined to be not idempotent. Idempotent actions with a narrow scope based on the value of a protected nonce could enable data submission with limited replay exposure. A nonce might be added as an explicit part of a request, or, if the oblivious request and target resources are co-located, the encapsulated keying material can be used to produce a nonce. The server-chosen \"response_nonce\" field ensures that responses have unique AEAD keys and nonces even when requests are replayed. 9. Please update the \"Media Types\" registry at"}
{"_id":"doc-en-oblivious-http-8149077629496fa9d163e6f8f1ef9c8fd2f1f7b5e3ee9a23dbbbb28aa7c38ad5","title":"","text":"resource; see key-configuration. Clients MUST NOT include identifying information in the request that is encapsulated. is encapsulated. Identifying information includes cookies COOKIES, authentication credentials or tokens, and any information that might reveal client-specific information such as account credentials. Clients cannot carry connection-level state between requests as they only establish direct connections to the proxy responsible for the"}
{"_id":"doc-en-oblivious-http-9127fc8cb8ab5fc92535b586002c5724f88077c991adcdf8f50e535d1cfe1b9c","title":"","text":"HPKE algorithms that are used with that key. The identity of an oblivious proxy resource that will forward encapsulated requests and responses to the oblivious request resource. encapsulated requests and responses to a single oblivious request resource. See proxy-state for more information about the mapping between oblivious proxy and oblivious request resources. This information allows the client to make a request of an oblivious target resource without that resource having only a limited ability"}
{"_id":"doc-en-oblivious-http-2f5a17973db35d258d2fd494461ec1abeb7ff9d015803398cd0e8ccc03c2a373","title":"","text":"10. This section discusses various operational and deployment considerations. 10.1. Using Oblivious HTTP adds both cryptographic and latency to requests relative to a simple HTTP request-response exchange. Deploying proxy services that are on path between clients and servers avoids adding"}
{"_id":"doc-en-oblivious-http-fd1c58d3fe3db9f2eea5fbd12986b80013bd59db31a20090f5aefea9d34b38fd","title":"","text":"similar system ODoH found that deploying proxies close to servers was most effective in minimizing additional latency. 10.2. This protocol assumes a fixed, one-to-one mapping between the Oblivious Proxy Resource and the Oblivious Request Resource. This means that any encapsulated request sent to the Oblivious Proxy Resource will always be forwarded to the Oblivious Request Resource. This constraint was imposed to simplify proxy configuration and mitigate against the Oblivious Proxy Resource being used as a generic proxy for unknown Oblivious Request Resources. The proxy will only forward for Oblivious Request Resources that it has explicitly configured and allowed. It is possible for a server to be configured with multiple Oblivious Proxy Resources, each for a different Oblivious Request Resource as needed. 10.3. Oblivious HTTP might be incompatible with network interception regimes, such as those that rely on configuring clients with trust anchors and intercepting TLS connections. While TLS might be"}
{"_id":"doc-en-ops-drafts-87e33728211ae90b082b71570602ccdfa25d8ef6f5491d8db19046678270cc15","title":"","text":"2.1. QUIC packets may have either a long header, or a short header. The first bit of the QUIC header indicates which type of header is present. first bit of the QUIC header us the Header Form bit, and indicates which type of header is present. The long header exposes more information. It is used during connection establishment, including version negotiation, retry, and"}
{"_id":"doc-en-ops-drafts-872085782ebcd75ff23de71fc54d9d193a0a529a5b2ec6c652df6c3ff4be8838","title":"","text":"The following information is exposed in QUIC packet headers: demux bit: the second most significant bit of the first octet every QUIC packet of the current version is set to 1, for demultiplexing with other UDP-encapsulated protocols. \"fixed bit\": the second most significant bit of the first octet most QUIC packets of the current version is currently set to 1, for demultiplexing with other UDP-encapsulated protocols. latency spin bit: the third most significant bit of first octet in the short packet header. The spin bit is set by endpoints such"}
{"_id":"doc-en-ops-drafts-3960462371382e6cefadff9b3844ad667a9fa40fee81702383c55760c8b087fe","title":"","text":"end-to-end RTT. See spin-usage for further details. header type: the long header has a 2 bit packet type field following the Header Form bit. Header types correspond to stages of the handshake; see Section 17.2 of QUIC-TRANSPORT. following the Header Form and fixed bits. Header types correspond to stages of the handshake; see Section 17.2 of QUIC-TRANSPORT for details. version number: the version number present in the long header, and identifies the version used for that packet. Note that during"}
{"_id":"doc-en-ops-drafts-8da9ed8ada937a6e27b78025989fd1ac34f5485303fbf067b23795d331f0efbb","title":"","text":"subsequent connection attempt. The length of the token is explicit in both cases. Retry and Version Negotiation packets are not encrypted or obfuscated in any way. For other kinds of packets, other information in the packet headers is cryptographically obfuscated: Retry (Section 17.2.5 of QUIC-TRANSPORT) and Version Negotiation (Section 17.2.1 of QUIC-TRANSPORT) packets are not encrypted or obfuscated in any way. For other kinds of packets, other information in the packet headers is cryptographically obfuscated: packet number: Most packets (with the exception of Version Negotiation and Retry packets) have an associated packet number; however, this packet number is encrypted, and therefore not of use to on-path observers. The offset of the packet number is encoded in the header for packets with long headers, while it is implicit packet number: All packets except Version Negotiation and Retry packets have an associated packet number; however, this packet number is encrypted, and therefore not of use to on-path observers. The offset of the packet number is encoded in the header for packets with long headers, while it is implicit (depending on Destination Connection ID length) in short header packets. The length of the packet number is cryptographically obfuscated."}
{"_id":"doc-en-ops-drafts-5717a268f6a588381c65d96954990b12178803dafe1335f53b777349f233bbdc","title":"","text":"QUIC's stream multiplexing feature allows applications to run multiple streams over a single connection, without head-of-line blocking between streams, associated at a point in time with a single five-tuple. Stream data is carried within Frames, where one (UDP) packet on the wire can carry one of multiple stream frames. Stream can be independently open and closed, gracefully or by error. If a critical stream for the application is closed, the application can generate respective error messages on the application layer to inform the other end or the higher layer and eventually indicate QUIC to reset the connection. QUIC, however, does not need to know which streams are critical, and does not provide an interface to exceptional handling of any stream. There are special streams in QUIC that are used for control on the QUIC connection, however, these streams are not exposed to the application. five-tuple. Stream data is carried within Frames, where one QUIC packet on the wire can carry one or multiple stream frames. Streams can be unidirectional or bidirectional, and a stream may be initiated either by client or server. Only the initiator of a unidirectional stream can send data on it. Due to offset encoding limitations, a stream can carry a maximum of 2^62-1 bytes in each direction. In the presently unlikely event that this limit is reached by an application, the stream can simply be closed and replaced with a new one. Streams can be independently opened and closed, gracefully or by error. An application can gracefully close the egress direction of a stream by instructing QUIC to send a FIN bit in a STREAM frame. It cannot gracefully close the ingress direction without a peer- generated FIN, much like in TCP. However, an endpoint can abruptly close either the ingress or egress direction; these actions are fully independent of each other. If a stream that is critical for an application is closed, the application can generate respective error messages on the application layer to inform the other end and/or the higher layer, and eventually indicate QUIC to reset the connection. QUIC, however, does not need to know which streams are critical, and does not provide an interface for exceptional handling of any stream. Mapping of application data to streams is application-specific and described for HTTP/s in QUIC-HTTP. In general data that can be described for HTTP/3 in QUIC-HTTP. In general, data that can be processed independently, and therefore would suffer from head of line blocking if forced to be received in order, should be transmitted over different streams. If the application requires certain data to be received in order, the same stream should be used for that data. over separate streams. If the application requires certain data to be received in order, that data should be sent on the same stream. If there is a logical grouping of data chunks or messages, streams can be reused, or a new stream can be opened for each chunk/message. If one message is mapped to a single stream, resetting the stream to"}
{"_id":"doc-en-ops-drafts-9e5cbbba7ec12f71ab4859f268a1a135049f131a9f9b8e3f654998166afb7b8b","title":"","text":"currently open and currently used streams to the application to make the mapping of data to streams dependent on this information. Further, streams have a maximum number of bytes that can be sent on one stream. This number is high enough (2^64) that this will usually not be reached with current applications. Applications that send chunks of data over a very long period of time (such as days, months, or years), should rather utilize the 0-RTT session resumption ability provided by QUIC, than trying to maintain one connection open. While a QUIC implementation must necessarily provide a way for an application to send data on separate streams, it does not necessarily expose stream identifiers to the application (see e.g. QUIC-HTTP section 6) either at the sender or receiver end, so applications should not assume access to these identifiers. 4.1."}
{"_id":"doc-en-ops-drafts-c1f0c98c3e0e459ba20e1b4b9e1f408ff565969d92a88c79f51a4492f3efe68c","title":"","text":"frames. The Client Hello datagram exposes version number, source and destination connection IDs, and information in the TLS Client Hello message, including any TLS Server Name Indication (SNI) present, in the clear. The QUIC PADDING frame shown here may be present to ensure the Client Hello datagram has a minimum size of 1200 octets, to mitigate the possibility of handshake amplification. Note that the location of PADDING is implementation-dependent, and PADDING frames may not appear in the Initial packet in a coalesced packet. The Server Hello datagram exposes version number, source and destination connection IDs, and information in the TLS Server Hello message. destination connection IDs in the clear. Information in the TLS Client Hello frame, including any TLS Server Name Indication (SNI) present, is obfuscated using the Initial secret. The QUIC PADDING frame shown here may be present to ensure the Client Hello datagram has a minimum size of 1200 octets, to mitigate the possibility of handshake amplification. Note that the location of PADDING is implementation-dependent, and PADDING frames may not appear in the Initial packet in a coalesced packet. The Server Hello datagram also exposes version number, source and destination connection IDs and information in the TLS Server Hello message which is obfuscated using the Initial secret. The Initial Completion datagram does not expose any additional information; however, recognizing it can be used to determine that a"}
{"_id":"doc-en-ops-drafts-5206bd2aa50f24d9da59995e5e0be32950a251b56ede206490a1f48aca2f88a1","title":"","text":"The best way to obscure an encoding is to appear random to observers, which is most rigorously achieved with encryption. Even when encrypted, a scheme could embed the unencrypted length of the Connection ID in the Connection ID itself, instead of remembering it, e.g. by using the first few bits to indicate a certain size of a well-known set of possible sizes with multiple values that indicate the same size but are selected randomly. Connection ID in the Connection ID itself, instead of remembering it. QUIC_LB further specified possible algorithms to generate Connection IDs at load balancers."}
{"_id":"doc-en-ops-drafts-4f10deeaafbfb2d0d63f541d56fffe5ac4bdfaf88e426db1a8a506e2ccd46b88","title":"","text":"3.2. Connection establishment requires cleartext packets and is using a TLS handshake on stream 0. Therefore it is detectable using heuristics similar to those used to detect TLS over TCP. 0-RTT connection may additional also send data packets, right after the Client Initial with the TLS client hello. These data may be reordered in the network, therefore it may be possible that 0-RTT Protected data packets are seen before the Client Initial packet. Connection establishment uses Initial, Handshake, and Retry packets containing a TLS handshake on Stream 0. Connection establishment can therefore be detected using heuristics similar to those used to detect TLS over TCP. A client using 0-RTT connection may also send data packets in 0-RTT Protected packets directly after the Initial packet containing the TLS Client Hello. Since these packets may be reordered in the network, note that 0-RTT Protected data packets may be seen before the Initial packet. Note that only clients send Initial packets, so the sides of a connection can be distinguished by QUIC packet type in the handshake. 3.3. The cleartext TLS handshake may contain Server Name Indication (SNI) RFC6066, by which the client reveals the name of the server it intends to connect to, in order to allow the server to present a certificate based on that name. It may also contain information from Application-Layer Protocol Negotiation (ALPN) RFC7301, by which the client exposes the names of application-layer protocols it supports; an observer can deduce that one of those protocols will be used if the connection continues. Work is currently underway in the TLS working group to encrypt the SNI in TLS 1.3 TLS-ENCRYPT-SNI, reducing the information available in the SNI to the name of a fronting service, which can generally be identified by the IP address of the server anyway. If used with QUIC, this would make SNI-based application identification impossible through passive measurement. 3.4. The QUIC Connection ID (see rebinding) is designed to allow an on- path device such as a load-balancer to associate two flows as identified by five-tuple when the address and port of one of the"}
{"_id":"doc-en-ops-drafts-8edcb9eb23645234343da8e490f42ac5db322abcda291e60f479789a7c9516d7","title":"","text":"should be treated as opaque; see sec-loadbalancing for caveats regarding connection ID selection at servers. 3.4. 3.5. The QUIC does not expose the end of a connection; the only indication to on-path devices that a flow has ended is that packets are no"}
{"_id":"doc-en-ops-drafts-64c7408ccea6af9251d7c2f525154db0a93ffaf889f3ff1af47c4d71478dd342","title":"","text":"Changes to this behavior are currently under discussion: see https://github.com/quicwg/base-drafts/issues/602. 3.5. 3.6. Round-trip time of QUIC flows can be inferred by observation once per flow, during the handshake, as in passive TCP measurement; this"}
{"_id":"doc-en-ops-drafts-2d98419b95553ad06b55adced687c3bde3affcdc0ac3353330546c310902aaf2","title":"","text":"Changes to this behavior are currently under discussion: see https://github.com/quicwg/base-drafts/issues/631. 3.6. 3.7. All QUIC packets carry packet numbers in cleartext, and while the protocol allows packet numbers to be skipped, skipping is not"}
{"_id":"doc-en-ops-drafts-e121829d1457769bed2a12eb36465108fb3c707f5077542a5a04f1907d283dcf","title":"","text":"observation point and the receiver (\"downstream loss\") cannot be reliably estimated. 3.7. 3.8. QUIC explicitly exposes which side of a connection is a client and which side is a server during the handshake. In addition, the"}
{"_id":"doc-en-ops-drafts-45c006d3c9c6450f4659b1db3984d2e131640d25f8a8991ef3d954d51be4f847","title":"","text":"and a description of how common network management practices will be impacted by QUIC. Since QUIC's wire image WIRE-IMAGE is integrity protected and not modifiable on path, in-network operations are not possible without terminating the QUIC connection, for instance using a back-to-back proxy. Proxy operations are not in scope for this document. A proxy can either explicit identify itself as providing a proxy service, or may share the TLS credentials to authenticate as the server and (in some cases) client acting as a front-facing instance for the endpoint itself. Since QUIC's wire image WIRE-IMAGE is integrity-protected, in-network operations that depend on modification of data are not possible without the cooperation of an endpoint. Network operation practices that alter data are only possible if performed as a QUIC endpoint; this might be possible with the introduction of a proxy which authenticates as an endpoint. Proxy operations are not in scope for this document. Network management is not a one-size-fits-all endeavour: practices considered necessary or even mandatory within enterprise networks"}
{"_id":"doc-en-ops-drafts-c2c69a7f627f2fe290a9fb8fec90865084706387e0b69b47de3756b358984dbb","title":"","text":"fall back to some other transport protocol. In the case of HTTP, this fallback is TLS 1.3 over TCP. The IETF TAPS specifications I-D.ietf-taps-arch describe a system with a common API for multiple protocols and some of the implications of fallback between these different protocols, specifically precluding fallback to insecure protocols or to weaker versions of secure protocols. An application that implements fallback needs to consider the security consequences. A fallback to TCP and TLS 1.3 exposes control information to modification and manipulation in the network. Further"}
{"_id":"doc-en-ops-drafts-c4553e9757278d7285e7d9d576198a5c4111ed9ef69be9b184f8b81927097afd","title":"","text":"The CONNECTION_CLOSE frame provides an optional reason field, that can be used to append human-readable information to an error code. Note that QUIC RESET_STREAM and STOP_SENDING frames also include an error code, but no reason string. Application error codes are expected to be defined from a single space that applies to all three frame types. RESET_STREAM and STOP_SENDING frames also include an error code, but no reason string. Alternatively, a QUIC connection can be silently closed by each endpoint separately after an idle timeout. If enabled as indicated"}
{"_id":"doc-en-ops-drafts-379f39c22d0ca54c2bcc64181b7f11031956d91cb85e44fb8930007ee4253e21","title":"","text":"and identifies the version used for that packet. During Version Negotiation (see version and Section 17.2.1 of QUIC-TRANSPORT), the version number field has a special value (0x00000000) that identifies the packet as a Version Negotiation packet. Upon time of publishing of this document, QUIC versions that start with 0xff implement IETF drafts. QUIC version 1 uses version 0x00000001. Operators should expect to observe packets with other version numbers as a result of various Internet experiments and future standards. identifies the packet as a Version Negotiation packet. QUIC version 1 uses version 0x00000001. Operators should expect to observe packets with other version numbers as a result of various Internet experiments, future standards, and greasing. All deployed versions are maintained in an IANA registry (see Section 22.2 of QUIC-TRANSPORT). source and destination connection ID: short and long packet headers carry a destination connection ID, a variable-length field"}
{"_id":"doc-en-ops-drafts-f2e5f4464795eaab5d4213dc150dd76922ff182264d0acfb499283d2b8830ce7","title":"","text":"4.4. Flow control provides a means of managing access to the limited QUIC flow control provides a means of managing access to the limited buffers endpoints have for incoming data. This mechanism limits the amount of data that can be in buffers in endpoints or in transit on the network. However, there are several ways in which limits can"}
{"_id":"doc-en-ops-drafts-df4d02d1e8bf1703788f23290240ff8ac2213f1981c68adc1fdf3cb35e5ca59d","title":"","text":"Understanding what causes deadlocking might help implementations avoid deadlocks. Large messages can produce deadlocking if the recipient does not process the message incrementally. If the message is larger than the flow control credit available and the recipient does not release additional flow control credit until the entire message is received and delivered, a deadlock can occur. This is possible even where stream flow control limits are not reached because connection flow control limits can be consumed by other streams. A common flow control implementation technique is for a receiver to extend credit to the sender as a the data consumer reads data. In this setting, a length-prefixed message format makes it easier for the data consumer to leave data unread in the receiver's buffers and thereby withhold flow control credit. If flow control limits prevent the remainder of a message from being sent, a deadlock will result. A length prefix might also enable the detection of this sort of deadlock. Where protocols have messages that might be processed as a The size and rate of transport flow control credit updates can affect performance. Applications that use QUIC often have a data consumer that reads data from transport buffers. Some implementations might have independent transport-layer and application-layer receive buffers. Consuming data does not always imply it is immediately processed. However, a common flow control implementation technique is to extend credit to the sender, by emitting MAX_DATA and/or MAX_STREAM_DATA frames, as data is consumed. Delivery of these frames is affected by the latency of the back channel from the receiver to the data sender. If credit is not extended in a timely manner, the sending application can be blocked, effectively throttling the sender. Large application messages can produce deadlocking if the recipient does not read data from the transport incrementally. If the message is larger than the flow control credit available and the recipient does not release additional flow control credit until the entire message is received and delivered, a deadlock can occur. This is possible even where stream flow control limits are not reached because connection flow control limits can be consumed by other streams. A length-prefixed message format makes it easier for a data consumer to leave data unread in the transport buffer and thereby withhold flow control credit. If flow control limits prevent the remainder of a message from being sent, a deadlock will result. A length prefix might also enable the detection of this sort of deadlock. Where application protocols have messages that might be processed as a single unit, reserving flow control credit for the entire message atomically makes this style of deadlock less likely. A data consumer can read all data as it becomes available to cause the receiver to extend flow control credit to the sender and reduce the chances of a deadlock. However, releasing flow control credit might mean that the data consumer might need other means for holding a peer accountable for the state it keeps for partially processed messages. A data consumer can eagerly read all data as it becomes available, in order to make the receiver extend flow control credit and reduce the chances of a deadlock. However, such a data consumer might need other means for holding a peer accountable for the additional state it keeps for partially processed messages. Deadlocking can also occur if data on different streams is interdependent. Suppose that data on one stream arrives before the"}
{"_id":"doc-en-ops-drafts-3103ea739560acc27c78a615bc32e605aa1c40bfd1d979b304986107dd76a58f","title":"","text":"A single stream provides ordering. If the application requires certain data to be received in order, that data should be sent on the same stream. the same stream. There is no guarantee of transmission, reception, or delivery order across streams. Multiple streams provide concurrency. Data that can be processed independently, and therefore would suffer from head of line"}
{"_id":"doc-en-ops-drafts-12e8e818e1224ea18a08a4319cd847893c0d8ed1dfae993707c42bc0268f6dd4","title":"","text":"use of DiffServ Code Points (DSCPs) RFC2475 as well as Equal-Cost Multi-Path (ECMP) routing, is applied on a per flow-basis (and not per-packet) and as such that all packets belonging to the same QUIC connection get uniform treatment. Using ECMP to distribute packets from a single flow across multiple network paths or any other non- uniform treatment of packets belong to the same connection could result in variations in order, delivery rate, and drop rate. As feedback about loss or delay of each packet is used as input to the congestion controller, these variations could adversely affect performance. Depending on the loss recovery mechanism implemented, QUIC may be more tolerant of packet re-ordering than traditional TCP traffic (see packetnumber). However, it cannot be known by the network which exact recovery mechanism is used and therefore reordering tolerance should be considered as unknown. connection get uniform treatment. Using ECMP to distribute packets from a single flow across multiple network paths or any other non-uniform treatment of packets belong to the same connection could result in variations in order, delivery rate, and drop rate. As feedback about loss or delay of each packet is used as input to the congestion controller, these variations could adversely affect performance. Depending on the loss recovery mechanism implemented, QUIC may be more tolerant of packet re- ordering than traditional TCP traffic (see packetnumber). However, the recovery mechanism used by a flow cannot be known by the network and therefore reordering tolerance should be considered as unknown. 4.9."}
{"_id":"doc-en-ops-drafts-72268bbdf598de545844aa17edae21c43402b6d1a90f5c88c41ce1d2bd70a377","title":"","text":"12. QUIC assumes that all packets of a QUIC connection, or at least with the same 5-tuple {dest addr, source addr, protocol, dest port, source port}, will receive similar network treatment since feedback about loss or delay of each packet is used as input to the congestion controller. Therefore, it is not recommended to use different DiffServ Code Points (DSCPs) RFC2475 for packets belonging to the same connection. If differential network treatment, e.g. by the use of different DSCPs, is desired, multiple QUIC connections to the same server may be used. However, in general it is recommended to minimize the number of QUIC connections to the same server, to avoid increased overheads and, more importantly, competing congestion control. QUIC, as defined in RFC9000, has a single congestion controller and recovery handler. This design assumes that all packets of a QUIC connection, or at least with the same 5-tuple {dest addr, source addr, protocol, dest port, source port} that same the same DiffServ Code Point (DSCP) RFC2475, will receive similar network treatment since feedback about loss or delay of each packet is used as input to the congestion controller. Therefore, packets belonging to the same connection should use a single DSCP. Section 5.1 of RFC7657 provides a discussion of DiffServ interactions with datagram transport protocols RFC7657 (in this respect the interactions with QUIC resemble those of SCTP). When multiplexing multiple flows over a single QUIC connection, the selected DSCP value should be the one associated with the highest priority requested for all multiplexed flows. If differential network treatment is desired, e.g., by the use of different DSCPs, multiple QUIC connections to the same server may be used. However, in general it is recommended to minimize the number of QUIC connections to the same server, to avoid increased overhead and, more importantly, competing congestion control. As in other uses of DiffServ, when a packet enters a network segment that does not support the DSCP value, this could result in the connection not receiving the network treatment it expects. The DSCP value in this packet could also be remarked as the packet travels along the network path, changing the requested treatment. 13."}
{"_id":"doc-en-ops-drafts-011b9bf65266beb207e25922ddff7070e36ea305bf27e8ff277b9154da3d0b89","title":"","text":"7. QUIC version 1 without extensions uses an acknowledgment strategy adopted from TCP. That is, every other packet is acknowledged. However, generating and processing QUIC acknowledgments can consume significant resources, both in terms of processing costs and link utilization, especially on constraint networks. Some applications might be able to improve overall performance by using alternative strategies that reduce the rate of acknowledgments. adopted from TCP Section 13.2 of RFC9000). That is, it recommends every other packet is acknowledged. However, generating and processing QUIC acknowledgments consumes resources at a sender and receiver. Acknowledgments also incur forwarding costs and contribute to link utilization, which can impact performance over some types of network. Applications might be able to improve overall performance by using alternative strategies that reduce the rate of acknowledgments. 8."}
{"_id":"doc-en-ops-drafts-65c77934573b006404cdd3b80fef09dcdeb2a8c84067bd95bfc8e42072a9e63e","title":"","text":"Mapping of application data to streams is application-specific and described for HTTP/s in QUIC-HTTP. In general data that can be processed independently, and therefore would suffer from head of line blocking, if forced to be received in order, should be transmitted over different streams. If there is a logical grouping of those data chunks or messages, stream can be reused, or a new stream can be opened for each chunk/message. If one message is mapped on a single stream, resetting the stream if the message is not needed anymore can be used to emulate partialreliability on a message basis. If a QUIC receiver has maximum allowed concurrent streams open and the sender on the other end indicates that more streams are needed, it doesn't automatically lead to an increase of the maximum number of streams by the receiver. Therefore it can be valuable to expose maximum number of allowed, currently open and currently used streams to the application to make the mapping of data to streams dependent on this information. blocking if forced to be received in order, should be transmitted over different streams. If the application requires certain data to be received in order, the same stream should be used for that data. If there is a logical grouping of data chunks or messages, streams can be reused, or a new stream can be opened for each chunk/message. If one message is mapped to a single stream, resetting the stream to expire an unacknowledged message can be used to emulate partial reliability on a message basis. If a QUIC receiver has maximum allowed concurrent streams open and the sender on the other end indicates that more streams are needed, it doesn't automatically lead to an increase of the maximum number of streams by the receiver. Therefore it can be valuable to expose maximum number of allowed, currently open and currently used streams to the application to make the mapping of data to streams dependent on this information. Further, streams have a maximum number of bytes that can be sent on one stream. This number is high enough (2^64) that this will usually"}
{"_id":"doc-en-oscore-groupcomm-25ae9702c54917b8c68350b98a38ca3c31e73b7c19b578627cf2b988bfdde60b","title":"","text":"Context associated to endpoint X. The Recipient Key is used as salt in the HKDF, when deriving the Pairwise Recipient Key. The Shared Secret is computed as a static-static Diffie-Hellman shared secret NIST-800-56A, where the endpoint uses its private key and the public key of the other endpoint X. The Shared Secret is used as Input Keying Material (IKM) in the HKDF. IKM-Sender - the Input Keying Material (IKM) used in HKDF for the derivation of the Pairwise Sender Key - is the concatenation of the endpoint's own signature public key, endpoint X's signature public key from the Recipient Context, and the Shared Secret IKM-Recipient - the Input Keying Material (IKM) used in HKDF for the derivation of the Recipient Sender Key - is the concatenation of endpoint X's signature public key from the Recipient Context, the endpoint's own signature public key, and the Shared Secret. The Shared Secret is computed as a cofactor Diffie-Hellman shared secret, see Section 5.7.1.2 of NIST-800-56A, where the endpoint uses its private key and the public key of the other endpoint X. Note the requirement of validation of public keys in ssec-crypto- considerations. For X25519 and X448, the procedure is described in Section 5 of RFC7748 using public keys mapped to Montgomery coordinates, see montgomery. info and L are as defined in Section 3.2.1 of RFC8613. If EdDSA asymmetric keys are used, the Edward coordinates are mapped to Montgomery coordinates using the maps defined in Sections 4.1 and 4.2 of RFC7748, before using the X25519 and X448 functions defined in Section 5 of RFC7748. Section 5 of RFC7748. For further details, see montgomery. After establishing a partially or completely new Security Context (see ssec-sec-context-persistence and sec-group-key-management), the"}
{"_id":"doc-en-oscore-groupcomm-c8c9e216357f3c37a73b0fee2d30a1caceb80263b990e264a881cf5ae37e494f","title":"","text":"2.3.2. 2.3.2.1. The y-coordinate of the other endpoint's Ed25519 public key is decoded as specified in Section 5.1.3 of RFC8032. The Curve25519 u-coordinate is recovered as u = (1 + y) / (1 - y) (mod p) following the map in Section 4.1 of RFC7748. Note that the mapping is not defined for y = 1, and that y = -1 maps to u = 0 which corresponds to the neutral group element and thus will result in a degenerate shared secret. Therefore implementations MUST abort if the y-coordinate of the other endpoint's Ed25519 public key is 1 or -1 (mod p). The private signing key byte strings (= the lower 32 bytes used for generating the public key, see step 1 of Section 5.1.5 of RFC8032) are decoded the same way for signing in Ed25519 and scalar multiplication in X25519. Hence, to compute the shared secret the endpoint applies the X25519 function to the Ed25519 private signing key byte string and the encoded u-coordinate byte string as specified in Section 5 of RFC7748. 2.3.2.2. The y-coordinate of the other endpoint's Ed448 public key is decoded as specified in Section 5.2.3. of RFC8032. The Curve448 u-coordinate is recovered as u = y^2 * (d * y^2 - 1) / (y^2 - 1) (mod p) following the map from \"edwards448\" in Section 4.2 of RFC7748, and also using the relation x^2 = (y^2 - 1)/(d * y^2 - 1) from the curve equation. Note that the mapping is not defined for y = 1 or -1. Therefore implementations MUST abort if the y-coordinate of the peer endpoint's Ed448 public key is 1 or -1 (mod p). The private signing key byte strings (= the lower 57 bytes used for generating the public key, see step 1 of Section 5.2.5 of RFC8032) are decoded the same way for signing in Ed448 and scalar multiplication in X448. Hence, to compute the shared secret the endpoint applies the X448 function to the Ed448 private signing key byte string and the encoded u-coordinate byte string as specified in Section 5 of RFC7748. 2.3.3. When using any of its Pairwise Sender Keys, a sender endpoint including the 'Partial IV' parameter in the protected message MUST use the current fresh value of the Sender Sequence Number from its"}
{"_id":"doc-en-oscore-groupcomm-9305e657ad60604b79d7d3ee63f6c880d2c39fd72c14964741d05561f6431f6a","title":"","text":"sequences of one-to-one exchanges with servers in the group, by sending requests over unicast. 2.3.3. 2.3.4. If the pairwise mode is supported, the Security Context additionally includes Secret Derivation Algorithm, Secret Derivation Parameters"}
{"_id":"doc-en-oscore-groupcomm-8b63557b3cba85d10a580d386df98883b9c82689c020baa08d44a6e9aaef339b","title":"","text":"hold for Group OSCORE, about building the AEAD nonce and the secrecy of the Security Context parameters. The EdDSA signature algorithm and the elliptic curve Ed25519 RFC8032 are mandatory to implement. For endpoints that support the pairwise mode, the ECDH-SS + HKDF-256 algorithm specified in Section 6.3.1 of I-D.ietf-cose-rfc8152bis-algs and the X25519 curve RFC7748 are also mandatory to implement. The EdDSA signature algorithm Ed25519 RFC8032 is mandatory to implement. For endpoints that support the pairwise mode, the ECDH-SS + HKDF-256 algorithm specified in Section 6.3.1 of I-D.ietf-cose- rfc8152bis-algs and the X25519 algorithm RFC7748 are also mandatory to implement. Constrained IoT devices may alternatively represent Montgomery curves and (twisted) Edwards curves RFC7748 in the short-Weierstrass form"}
{"_id":"doc-en-oscore-groupcomm-ab24dd448fa91f1e2b3f4758732b62a867527d56d55c6e9ebbe7d0d2a723c6fc","title":"","text":"The derivation of pairwise keys defined in key-derivation-pairwise is compatible with ECDSA and EdDSA asymmetric keys, but is not compatible with RSA asymmetric keys. The security of using the same key pair for Diffie-Hellman and for signing is demonstrated in Degabriele. compatible with RSA asymmetric keys. For the public key translation from Ed25519 (Ed448) to X25519 (X448) specified in key-derivation-pairwise, variable time methods can be used since the translation operates on public information. Any byte string of appropriate length is accepted as a public key for X25519 (X448) in RFC7748, it is therefore not necessary for security to validate the translated public key (assuming the translation was successful). The security of using the same key pair for Diffie-Hellman and for signing (by considering the ECDH procedure in sec-derivation-pairwise as a Key Encapsulation Mechanism (KEM)) is demonstrated in Degabriele and Thormarker. Applications using ECDH (except X25519 and X448) based KEM in sec- derivation-pairwise are assumed to verify that a peer endpoint's public key is on the expected curve and that the shared secret is not the point at infinity. The KEM in Degabriele checks that the shared secret is different from the point at infinity, as does the procedure in Section 5.7.1.2 of NIST-800-56A which is referenced in sec- derivation-pairwise. Extending Theorem 2 of Degabriele, Thormarker shows that the same key pair can be used with X25519 and Ed25519 (X448 and Ed448) for the KEM specified in sec-derivation-pairwise. By symmetry in the KEM used in this document, both endpoints can consider themselves to have the recipient role in the KEM -- as discussed in Section 7 of Thormarker - and rely on the mentioned proofs for the security of their key pairs. Theorem 3 in Degabriele shows that the same key pair can be used for an ECDH based KEM and ECDSA. The KEM uses a different KDF than in sec-derivation-pairwise, but the proof only depends on that the KDF has certain required properties, which are the typical assumptions about HKDF, e.g., that output keys are pseudorandom. In order to comply with the assumptions of Theorem 3, received public keys MUST be successfully validated, see Section 5.6.2.3.4 of NIST-800-56A. The validation MAY be performed by a trusted Group Manager. For Degabriele to apply as it is written, public keys need to be in the expected subgroup. For this we rely on cofactor DH, Section 5.7.1.2 of NIST-800-56A which is referenced in sec-derivation-pairwise. HashEdDSA variants of Ed25519 and Ed448 are not used by COSE, see Section 2.2 of I-D.ietf-cose-rfc8152bis-algs, and are not covered by the analysis in Thormarker, and hence MUST NOT be used with the public keys used with pairwise keys as specified in this document. 10.14."}
{"_id":"doc-en-oscore-524ff0654518c6111a6e7a1f485584469ea0c63e077775840da862a11d99e6d7","title":"","text":"Observe RFC7641 is an optional feature. An implementation MAY support RFC7252 and the OSCORE option without supporting RFC7641, in which case the Observe related processing specified in this section, sequence-numbers and processing can be omitted. The Observe option as used here targets the requirements on forwarding of I-D.hartke-core-e2e-security-reqs (Section 2.2.1). This section specifies Observe processing associated to the Partial IV (observe-partial-iv) and Observe processing in the presence of RFC7641-compliant intermediaries (observe-option-processing). In contrast to e.g. block-wise, the Inner and Outer Observe option are not processed independently. Outer Observe is required to support Observe operations in intermediaries, but the additional use of Inner Observe is needed to protect Observe registrations end-to- end (see observe-option-processing). observe-without-intermed specifies a simplified Observe processing which is applicable in the absence of intermediaries. which case the Observe related processing can be omitted. Note that OSCORE is compliant with the requirement that a client must not register more than once for the same target resource (see Section 3.1 of RFC7641) since the target resource for Observe registration is identified by all options in the request that are part of the Cache-Key, including OSCORE. OSCORE supports a reduced set of RFC7641 operations performed in intermediary nodes as specified in this section. The use of Observe targets the requirements on forwarding of Section 2.2.1 of I- D.hartke-core-e2e-security-reqs, i.e. that observations go through any intermediate node, as illustrated in Figure 8 of RFC7641). 4.1.3.4.1. To support proxy operations, the CoAP client using Observe with OSCORE MUST set Outer Observe. If Observe was only sent encrypted end-to-end, an OSCORE-unaware proxy would not expect several responses to a non-Observe request and notifications would not reach the client. Moreover, intermediaries are allowed to cancel observations and inform the server; forbidding this may result in processing and transmission of notifications on the server side which do not reach the client. In case of registrations or re-registrations, the CoAP client using Observe with OSCORE MUST set both Inner and Outer Observe to the same value (0). This allows the server to verify that the observation was requested by the client, thereby avoiding unnecessary processing and transmission of notifications, since such notifications would not benefit the client. An intermediary that supports Observe MUST copy the OSCORE option in the next hop request unchanged. Although intermediaries are allowed to re-send notifications to other clients, when using OSCORE this does not happen, since requests from different clients will have different cache keys. The Outer Observe option in the CoAP request may be legitimately removed by a proxy or ignored by a server. In these cases, the server processes the request as a non-Observe request and produce a non-Observe response. If the OSCORE client receives a response to an Observe request without an Outer Observe value, then it verifies the response as a non-Observe response, as specified in ver-res. If the OSCORE client receives a response to a non-Observe request with an Outer Observe value, it stops processing the message, as specified in ver-res. Inner Observe is used by default to protect the value of the Observe option between the endpoints. Outer Observe is additionally used to support a selected set of intermediate node operations that are useful while maintaining end-to-end security. Intermediary nodes MUST copy the OSCORE option in the next hop request unchanged. In order to support Observe processing in OSCORE-unaware intermediaries, for messages with the Observe option the Outer Code SHALL be set to 0.05 (FETCH) for requests and to 2.05 (Content) for MUST be set to 0.05 (FETCH) for requests and to 2.05 (Content) for responses. 4.1.3.4.1. The client MUST set both Inner and Outer Observe to the same value in the request. In order to support the case of an intermediary node ignoring a registration request (Observe 0) and instead processing a non-Observe request (Section 2 of RFC7641), the server MUST only consider the received message a registration request if both Inner and Outer Observe are set to 0. Clients can re-register observations to ensure that the observation is still active and establish freshness again (RFC7641 Section 3.3.1). When an OSCORE protected observation is refreshed, not only the ETags, but also the Partial IV (and thus the payload and OSCORE option) change. The server uses the Partial IV of the new request as the 'request_piv' of new responses. Since intermediaries are not assumed to have a security context with the server, cancellation or re-registration of an observation initiated by an intermediary node is not supported. Cancellation of observation by an intermediary using the Reset message as response to a notification can still be applied. An intermediary node may forward a re-registration message, but if a proxy re-sends an old registration message from a client this will trigger the replay protection mechanism in the server which, depending on action, may result in a termination of the observation in proxy or client. An OSCORE aware intermediary SHALL NOT initiate re-registrations of observations. A server MAY respond to a replayed registration request with a cached notification. The server SHALL NOT respond to a replayed registration request with a message encrypted using the Partial IV of the request. Note that OSCORE is compliant with the requirement that a client must not register more than once for the same target resource (see Section 3.1 of RFC7641) since the target resource for Observe registration is identified by all options in the request that are part of the Cache-Key, including OSCORE. 4.1.3.4.2. If the server accepts an Observe registration, a Partial IV MUST be"}
{"_id":"doc-en-oscore-e1d8d0f834297c2e1061f4b1c5121d1c96c54b3a180e57d9e12715cd99d9f40c","title":"","text":"the order of notifications, the client SHALL maintain a Notification Number for each Observation it registers. The Notification Number is a non-negative integer containing the largest Partial IV of the received notifications for the associated Observe registration (see replay-protection). The Notification Number is initialized to the Partial IV of the first successfully received notification response to the registration request. In contrast to RFC7641, the received Partial IV MUST always be compared with the Notification Number, which thus MUST NOT be forgotten after 128 seconds. Further details of replay protection of notifications are specified in replay- protection. Clients can re-register observations to ensure that the observation is still active and establish freshness again (RFC7641 Section 3.3.1). When an OSCORE protected observation is refreshed, not only the ETags, but also the partial IV (and thus the payload and OSCORE option) change. The server uses the new request's Partial IV as the 'request_piv' of new responses. received notifications for the associated Observe registration. Further details of replay protection of notifications are specified in replay-notifications. The Inner Observe in a response MUST either have the value of Observe in the original CoAP message or be empty. The former is used to allow the server to set the Observe values to be received by the client. In the latter case the overhead of the Observe value is saved and instead the least significant bytes of the Partial IV is used as Observe value, see replay-notifications. The Outer Observe in the response may be needed for intermediary nodes to support multiple responses to one request. The client MAY ignore the Outer Observe value. If the client receives a response to an Observe request without an Observe value, then it verifies the response as a non-Observe response, as specified in ver-res. If the client receives a response to a non-Observe request with an Observe value, then it stops processing the message but keeps the observation alive, as specified in ver-res. 4.1.3.5."}
{"_id":"doc-en-oscore-5415102cee9146c4eebe8d6e1173f6ac03aeb18a8b9b3e09f08064b3e4d468dc","title":"","text":"The sending endpoint SHALL write the Code of the original CoAP message into the plaintext of the COSE object (see plaintext). After that, the sending endpoint writes an Outer Code to the OSCORE message. With one exeception (see observe-option-processing) the Outer Code SHALL by default be set to 0.02 (POST) for requests and to 2.04 (Changed) for responses. The receiving endpoint SHALL discard the Outer Code in the OSCORE message and write the Code of the COSE object plaintext (plaintext) into the decrypted CoAP message. message. With one exeception (see observe) the Outer Code SHALL by default be set to 0.02 (POST) for requests and to 2.04 (Changed) for responses. The receiving endpoint SHALL discard the Outer Code in the OSCORE message and write the Code of the COSE object plaintext (plaintext) into the decrypted CoAP message. The other currently defined CoAP Header fields are Unprotected (Class U). The sending endpoint SHALL write all other header fields of the"}
{"_id":"doc-en-oscore-340721ab547aa0bb6d35aa8ed562483d52d1fbd9f0f4d5838d7031f6fd3028ad","title":"","text":"7.4.1. Additionally to the previous section, the following applies when Observe is supported. 7.4.1.1. A client receiving a notification SHALL compare the Partial IV of a received notification with the Notification Number associated to that Observe registration. The ordering of notifications after OSCORE processing MUST be aligned with the Partial IV. The client MAY do so by copying the least significant bytes of the Partial IV into the Observe option, before passing it to CoAP processing. The client MAY ignore an Outer Observe option value. If the verification of the response succeeds, and the received Partial IV was greater than the Notification Number, then the client SHALL update the corresponding Notification Number with the received Partial IV. The client MUST stop processing notifications with a Partial IV which has been previously received. An application MAY require the client to discard notifications which have Partial IV less than the Notification Number. If messages are processed concurrently, the Partial IV needs to be validated a second time after decryption and before updating the replay protection data. The operation of validating the Partial IV and updating the replay protection data MUST be atomic. 7.4.1.2. In order to allow intermediaries to re-register their interest in a resource (see 3.3.1 of RFC7641), a server receiving an Observe registration with Token, kid and Partial IV identical to a previously received registration, and which decrypts without error SHALL not treat it as a replay and SHALL respond with a notification. The notification may be a cached copy of the latest sent notification (with the same Token, kid and Partial IV) or it may be a newly generated notification with a fresh Partial IV. The following applies additionally when Observe is supported. The Notification Number is initialized to the Partial IV of the first successfully received notification response to the registration request. A client receiving a notification SHALL compare the Partial IV of a verified notification with the Notification Number associated to that Observe registration. In contrast to RFC7641, the received Partial IV MUST always be compared with the Notification Number, which thus MUST NOT be forgotten after 128 seconds. If the verification of the response succeeds, and the received Partial IV was greater than the Notification Number, then the client SHALL update the corresponding Notification Number with the received Partial IV. The operation of validating the Partial IV and updating the replay protection data MUST be atomic. If the Inner Observe option is empty, then the client SHALL copy the least significant bytes of the Partial IV into the Observe option, before passing it to CoAP processing. If the Partial IV is less than or equal to the Notification Number, then the client SHALL stop processing the response but not cancel the observation. 7.5."}
{"_id":"doc-en-oscore-32adb7ab48d134c03636b81705cdc72a2713591f154b09b7bcaced1ffc561a72","title":"","text":"7.5.3. To prevent accepting replay of previously received notification responses, the client may perform the following procedure after boot: To prevent accepting replay of previously received notifications, the client may perform the following procedure after boot: The client rejects notifications bound to the earlier registration, removes all Notification Numbers and re-registers using Observe. The client forgets about earlier registrations, removes all Notification Numbers and re-registers using Observe. 8."}
{"_id":"doc-en-oscore-44f88823fc5e131c075541dd081adbf09e59982c16e2704e6644e791cdc85a25","title":"","text":"If Observe is implemented: Replace step 1 in ver-req with: A. Discard Code and all options marked in fig-option-protection with 'x' in column E, except for Observe, present in the received message. For example, an If-Match Outer option is discarded, Uri-Host Outer option is not discarded, Observe is not discarded. Insert the following step before step 1 in ver-req: Replace step 3 in ver-req with: A. Check if the Outer Observe option is present and has value zero. B. If Observe is present in the received message, and has value 0, check if the Token, kid and Partial IV are identical to a previously received Observe registration. In this case, replay verification is postponed until step C. Otherwise verify the 'Partial IV' parameter using the Replay Window, as described in replay-protection. Insert the following step between step 6 and 7 of ver-req: Insert the following steps between step 6 and 7 of ver-req: C. If Observe was present in the received message (in step 1): If the value of Observe in the Outer message is 0: If Observe is present and has value 0 in the decrypted options, discard the Outer Observe. If the Token, kid and Partial IV are identical to a previously received Observe registration, respond with a notification as described in observe-replay- processing; Otherwise, discard both the Outer and Inner (if present) Observe options and verify the 'Partial IV' parameter using the Replay Window, as described in replay-protection. If the value of Observe in the Outer message is not 0, discard the decrypted Observe option if present. B. If Inner Observe is present and has value zero, and Outer option is either not present or has not value 0, then remove the Observe option. 8.3."}
{"_id":"doc-en-oscore-827834580a2a0316a9cb2ebaca39855382699703565d79607f7638667cf4ac90","title":"","text":"If Observe is implemented: Replace step 1 of ver-res with: A. Discard Code and all options marked in fig-option-protection with 'x' in column E, except for Observe, present in the received message. For example, ETag Outer option is discarded, as well as Max-Age Outer option, Observe is not discarded. Insert the following steps between step 2 and 3 of ver-res: B. If the Observe option is present in the response, but the request was not an Observe registration, then go to 9. Replace step 6 of ver-res with: C. If an Observe option is included or the Notification number for the observation has already been initiated, but the Partial IV is not present in the response, then go to 9. A. If Inner Observe is present then: D. For Observe notifications, verify the received 'Partial IV' parameter against the corresponding Notification Number as described in replay-protection. If the request was not an Observe registration, then go to 9. Replace step 6 of ver-res with: If the Partial IV was not present in the response, then go to 9. E. If the response is a notification, initiate or update the corresponding Notification Number, as described in sequence-numbers. Otherwise, delete the attribute-value pair (Token, {Security Context, PIV}). If the request was an Observe registration and the Partial IV was present in the response, then verify the received 'Partial IV' parameter against the corresponding Notification Number, and follow the processing described in replay-notifications. Otherwise, delete the attribute-value pair (Token, {Security Context, PIV}). Replace step 7 of ver-res with: Replace step 9 of ver-res with: F. Add decrypted Code, options and payload to the decrypted request, except for decrypted Observe if present. The OSCORE option is removed. B. In case any of the previous erroneous conditions apply: the client SHALL stop processing the response. An error condition occurring while processing a response in an observation does not cancel the observation. A client MUST NOT react to failure by re- registering the observation immediately. An error condition occurring while processing a response in an observation does not cancel the observation. A client MUST NOT react to failure in step 5 by re-registering the observation immediately. Note that the attribute-value attribute-value pair (Token, {Security Context, PIV}) MUST be deleted whenever the Observation is cancelled or \"forgotten\". 9."}
{"_id":"doc-en-oscore-4a05d2fc25055935eab37cd24ff02fd59f6c7a1a7883ef9f2cf3f5d257ac78ef","title":"","text":"receiving endpoint discards the message, if complying to the policy) may be obtained as part of normal resource discovery. Applications need to use a padding scheme if the content of a message can be determined solely from the length of the payload. As an example, the strings \"YES\" and \"NO\" even if encrypted can be distinguished from each other as there is no padding supplied by the current set of encryption algorithms. Some information can be determined even from looking at boundary conditions. An example of this would be returning an integer between 0 and 100 where lengths of 1, 2 and 3 will provide information about where in the range things are. Three different methods to deal with this are: 1) ensure that all messages are the same length. For example using 0 and 1 instead of 'yes' and 'no'. 2) Use a character which is not part of the responses to pad to a fixed length. For example, pad with a space to three characters. 3) Use the PKCS #7 style padding scheme where m bytes are appended each having the value of m. For example, appending a 0 to \"YES\" and two 1's to \"NO\". This style of padding means that all values need to be padded. 8. Privacy threats executed through intermediate nodes are considerably"}
{"_id":"doc-en-perc-wg-2d7c2ed6ed409a88b2a711cce8292373ed0efae21c2c01d5842fbde4b74378dc","title":"","text":"Distributor, this framework utilizes a DTLS-SRTP RFC5764 association between an endpoint and the Key Distributor. To establish this association, an endpoint will send DTLS-SRTP messages to the Media Distributor which will then forward them to the Media Distributor as Distributor which will then forward them to the Key Distributor as defined in I-D.jones-perc-dtls-tunnel. The Key Encryption Key (KEK) (i.e., EKT Key) is also conveyed by the Key Distributor over the DTLS association to endpoints via procedures defined in PERC EKT [I-"}
{"_id":"doc-en-perc-wg-e9bd957a571e0345bc4ec193190624226440a25f07fd2ce19268578d4c36e53c","title":"","text":"Media Distributors use DTLS-SRTP RFC5764 directly with a peer Media Distributor to establish HBH keys for transmitting RTP and RTCP packets that peer Media Distributor. The Key Distributor does not packets to that peer Media Distributor. The Key Distributor does not facilitate establishing HBH keys for use between Media Distributors. 4.5.1. The procedures defined in DTLS Tunnel for PERC I-D.jones-perc-dtls- tunnel establish one or more DTLS tunnels between the Media tunnel establish one or more TLS tunnels between the Media Distributor and Key Distributor, making it is possible for the Media Distributor to facilitate the establishment of a secure DTLS association between each endpoint and the Key Distributor as shown"}
{"_id":"doc-en-perc-wg-33054e9dee30c143970cae107f624ef899043803d6e1492ccd8cbab7f9c14dba","title":"","text":"the DTLS signaling, but will instead forward DTLS packets received from an endpoint on to the Key Distributor (and vice versa) via a tunnel established between Media Distributor and the Key Distributor. This tunnel used to encapsulate the DTLS-SRTP signaling between the Key Distributor and endpoints will also be used to convey HBH key This tunnel is used to encapsulate the DTLS-SRTP signaling between the Key Distributor and endpoints will also be used to convey HBH key information from the Key Distributor to the Media Distributor, so no additional protocol or interface is required."}
{"_id":"doc-en-perc-wg-11db5227054ba2b8218221c23ad139887d781e0923a0e42476c4d87d3523b685","title":"","text":"fingerprint of the DTLS-SRTP certificate used for the call. This certificate is unique for a given call and a conference. This allows the Key Distributor to ensure that only authorized users participate in the conference. Similarly the Key Distributor can create a WeBRTC Identity assertion bound the fingerprint of the unique certificate in the conference. Similarly the Key Distributor can create a WebRTC Identity assertion to bind the fingerprint of the unique certificate used by the Key Distributor for this conference so that the endpoint can validate it is talking to the correct Key Distributor."}
{"_id":"doc-en-perc-wg-3e5fda1eeb56d1f3cf0cb16db42281435c8637191dd5ac5898ef3fa4df5868c8","title":"","text":"This document defines an extension to DTLS-SRTP called SRTP EKT Key Transport which enables secure transport of EKT keying material from one DTLS-SRTP peer to another. This allows those peers to process EKT keying material in SRTP (or SRTCP) and retrieve the embedded SRTP keying material. This combination of protocols is valuable because it combines the advantages of DTLS, which has strong authentication of the endpoint and flexibility, along with allowing secure multiparty RTP with loose coordination and efficient communication of per-source keys. the DTLS-SRTP peer in the server role to the client. This allows those peers to process EKT keying material in SRTP (or SRTCP) and retrieve the embedded SRTP keying material. This combination of protocols is valuable because it combines the advantages of DTLS, which has strong authentication of the endpoint and flexibility, along with allowing secure multiparty RTP with loose coordination and efficient communication of per-source keys. 5.1."}
{"_id":"doc-en-perc-wg-2d67f13e7d0129eedd0bada2f4e3ab58cc2b26dfab4705415c206575ef2ba441","title":"","text":"5.2. This document defines a new TLS negotiated extension called \"srtp_ekt_key_transport\" and a new TLS content type called EKTMessage. Using the syntax described in DTLS RFC6347, the following structures are used: If a DTLS client includes srtp_ekt_key_transport in its ClientHello, then a DTLS server that supports this extensions will includes srtp_ekt_key_transport in its ServerHello message. If a DTLS client includes srtp_ekt_key_transport in its ClientHello, but does not receive srtp_ekt_key_transport in the ServerHello, the DTLS client MUST NOT send DTLS EKTMessage messages. Also, the srtp_ekt_key_transport in the ServerHello MUST select one and only one EKTCipherType from the list provided by the client in the srtp_ekt_key_transport in the ClientHello. When a DTLS client sends the srtp_ekt_key_transport in its ClientHello message, it MUST include the SupportedEKTCiphers as the extension_data for the extension, listing the EKTCipherTypes the client is willing to use in preference order, with the most preferred version first. When the server responds in the srtp_ekt_key_transport in its ServerHello message, it MUST include a SupportedEKTCiphers list that selects a single EKTCipherType to use (selected from the list provided by the client) or it returns an empty list to indicate there is no matching EKTCipherType in the clients list that the server is also willing to use. The value to be used in the EKTCipherType for future extensions that define new ciphers is the value from the \"EKT Ciphers Type\" IANA registry defined in iana-ciphers. The figure above defines the contents for a new TLS content type called EKTMessage which is registered in iana-tls-content. The EKTMessage above is used as the opaque fragment in the TLSPlaintext structure defined in Section 6.2.1 of RFC5246 and the srtp_ekt_message as the content type. The srtp_ekt_message content type is defined and registered in iana-tls-ext. When the Server wishes to provide a new EKT Key, it can send EKTMessage containing an EKTKey with the new key information. The client MUST respond with an EKTMessage of type ekt_key_act, if the EKTKey was successfully processed and stored or respond with the the ekt_key_error EKTMessage otherwise. The diagram below shows a message flow of DTLS client and DTLS server using the DTLS-SRTP Key Transport extension. Note that when used in PERC I-D.ietf-perc-private-media-framework, the Server is actually split between the Media Distrbutor and Key Distributor. The messages in the above figure that are \"SRTP packets\" will not got to the Key Distributor but the other packets will be relayed by the Media Distributor to the Key Distributor. This document defines a new TLS negotiated extension and a new TLS handshake message type . The extension negotiates the cipher to be used in encrypting and decrypting EKTCiphertext values, and the handshake message carries the corresponding key. The diagram below shows a message flow of DTLS 1.3 client and server using EKT configured using the DTLS extensions described in this section. (The initial cookie exchange and other normal DTLS messages are omitted.) In the context of a multi-party SRTP session in which each endpoint performs a DTLS handshake as a client with a central DTLS server, the extensions defined in this session allow the DTLS server to set a common EKT key among all participants. Each endpoint can then use EKT tags encrypted with that common key to inform other endpoint of the keys it is using to protect SRTP packet. This avoids the need for many individual DTLS handshakes among the endpoints, at the cost of preventing endpoints from directly authenticating one another. 5.2.1. To indicate its support for EKT, a DTLS-SRTP client includes in its ClientHello an extension of type listing the EKT ciphers the client supports in preference order, with the most preferred version first. If the server agrees to use EKT, then it includes a extension in its ServerHello containing a cipher selected from among those advertised by the client. The field of this extension contains an \"EKTCipher\" value, encoded using the syntax defined in RFC5246: 5.2.2. Once a client and server have concluded a handshake that negotiated an EKT cipher, the server MUST provide to the client a key to be used when encrypting and decrypting EKTCiphertext values. EKT keys are sent in encrypted handshake records, using handshake type . The body of the handshake message contains an structure: [[ NOTE: RFC Editor, please replace \"TBD\" above with the code point assigend by IANA ]] The contents of the fields in this message are as follows: If the server did not provide a extension in its ServerHello, then EKTKey messages MUST NOT be sent by either the client or the server. When an EKTKey is received and processed successfully, the recipient MUST respond with an Ack handshake message as described in Section 7 of I-D.ietf-tls-dtls13. The EKTKey message and Ack must be retransmitted following the rules in Secton 4.2.4 of RFC6347. Note: To be clear, EKT can be used with versions of DTLS prior to 1.3. The only difference is that in a pre-1.3 TLS stacks will not have built-in support for generating and processing Ack messages. If an EKTKey message is received that cannot be processed, then the recipient MUST respond with an appropriate DTLS alert. 5.3."}
{"_id":"doc-en-perc-wg-34ce31bb9388c687a218fe66b7b80064c87bc6b4f38dc67c6ee1e619f177a685","title":"","text":"5.4. The DTLS ekt_key is sent using the retransmissions specified in Section 4.2.4. of DTLS RFC6347. The DTLS message is sent using the retransmissions specified in Section 4.2.4. of DTLS RFC6347. Retransmission is finished with an Ack message or an alert is received. 6."}
{"_id":"doc-en-perc-wg-f99484b7d6f9fdb4568c9b3768d9bebbf713aeb31eab673d2a8e73bc1cf4dc31","title":"","text":"7.3. IANA is requested to add srtp_ekt_key_transport as a new extension name to the \"ExtensionType Values\" table of the \"Transport Layer Security (TLS) Extensions\" registry with a reference to this specification and allocate a value of TBD to for this. Note to RFC Editor: TBD will be allocated by IANA. IANA is requested to add as a new extension name to the \"ExtensionType Values\" table of the \"Transport Layer Security (TLS) Extensions\" registry with a reference to this specification and allocate a value of TBD to for this. [[ Note to RFC Editor: TBD will be allocated by IANA. ]] Considerations for this type of extension are described in Section 5 of RFC4366 and requires \"IETF Consensus\". 7.4. IANA is requested to add srtp_ekt_message as an new descriptions name to the \"TLS ContentType Registry\" table of the \"Transport Layer Security (TLS) Extensions\" registry with a reference to this specification, a DTLS-OK value of \"Y\", and allocate a value of TBD to for this content type. Note to RFC Editor: TBD will be allocated by IANA. IANA is requested to add as a new entry in the \"TLS HandshakeType Registry\" table of the \"Transport Layer Security (TLS) Parameters\" registry with a reference to this specification, a DTLS-OK value of \"Y\", and allocate a value of TBD to for this content type. [[ Note to RFC Editor: TBD will be allocated by IANA. ]] This registry was defined in Section 12 of RFC5246 and requires \"Standards Action\"."}
{"_id":"doc-en-perc-wg-27a3a2d6f7074761c5d1394fc94822e5f570d414c87cc74b3d83019cdf7ede03","title":"","text":"a ciphertext value C with a length of N bytes. The decryption function returns a plaintext value P that is at least M bytes long, or returns an indication that the decryption operation failed because the ciphertext was invalid (i.e. it was not generated by the encryption of plaintext with the key K). These functions have the property that D(K, E(K, P)) = ( P concatenated with optional padding) for all values of K and P. Each cipher also has a limit T on the number of times that it can be used with any fixed key value. The EKTKey MUST NOT be used for encryption more that T times. Note that if the same EKT packet is retransmitted 3 times, that only counts as 1 encryption. The decryption function returns a plaintext value P that is M bytes long, or returns an indication that the decryption operation failed because the ciphertext was invalid (i.e. it was not generated by the encryption of plaintext with the key K). These functions have the property that D(K, E(K, P)) = P for all values of K and P. Each cipher also has a limit T on the number of times that it can be used with any fixed key value. The EKTKey MUST NOT be used for encryption more that T times. Note that if the same EKT packet is retransmitted 3 times, that only counts as 1 encryption. Security requirements for EKT ciphers are discussed in sec."}
{"_id":"doc-en-perc-wg-cf177a407b074ed7d8b9c849bfb86afd561353610846effe869d881384ab4af4","title":"","text":"other aspects of EKT processing. EKT ciphers are free to use this field in any way, but they SHOULD NOT use other EKT or SRTP fields as an input. The values of the parameters L, and T MUST be defined by each EKTCipher. each EKTCipher. The cipher MUST provide integrity protection. 2.5."}
{"_id":"doc-en-qlog-6701e221d77d7a6b93f95831ec2a87859c7e293dc3841839de74ea98cca50ce3","title":"","text":"2.2. For several types of events, it is sometimes impossible to tie them to a specific conceptual QUIC connection (e.g., a packet_dropped event triggered because the packet has an unknown connection_id in the header). Since qlog events in a trace are typically associated with a single connection, it is unclear how to log these events. Ideally, implementers SHOULD create a separate, individual \"endpoint- level\" trace file (or group_id value), not associated with a specific connection (for example a \"server.qlog\" or group_id = \"client\"), and log all events that do not belong to a single connection to this grouping trace. However, this is not always practical, depending on the implementation. Because the semantics of most of these events are well-defined in the protocols and because they are difficult to mis-interpret as belonging to a connection, implementers MAY choose to log events not belonging to a particular connection in any other trace, even those strongly associated with a single connection. Note that this can make it difficult to match logs from different vantage points with each other. For example, from the client side, it is easy to log connections with version negotiation or retry in the same trace, while on the server they would most likely be logged in separate traces. Servers can take extra efforts (and keep additional state) to keep these events combined in a single trace however (for example by also matching connections on their four-tuple instead of just the connection ID). A single qlog event trace is typically associated with a single QUIC connection. However, for several types of events (for example, a transport-packetdropped event with trigger value of \"connection_unknown\"), it can be impossible to tie them to a specific QUIC connection, especially on the server. There are various ways to handle these events, each making certain tradeoffs between file size overhead, flexibility, ease of use, or ease of implementation. Some options include: Log them in a separate endpoint-wide trace (or use a special group_id value) not associated with a single connection. Log them in the most recently used trace. Use additional heuristics for connection identification (for example use the four-tuple in addition to the Connection ID). Buffer events until they can be assigned to a connection (for example for version negotiation and retry events). 3."}
{"_id":"doc-en-quic-v2-8f0da2929a61eefa0b75add781456c8866b7104065d959ac7ac57366eb0f11fc","title":"","text":"QUIC version 2 endpoints MUST implement the QUIC version 1 specification as described in QUIC, QUIC-TLS, and RFC9002, with the following changes: following changes. The version field of long headers is 0x709a50c4. 3.1. The salt used to derive Initial keys in Section 5.2 of QUIC-TLS changes to: The version field of long headers is 0x709a50c4. The labels used in QUIC-TLS to derive packet protection keys (Section Section 5.1 of QUIC-TLS), header protection keys (Section Section 5.4 of QUIC-TLS), Retry Integrity Tag keys (Section Section 5.8 of QUIC-TLS), and key updates (Section Section 6.1 of QUIC-TLS) change from \"quic key\" to \"quicv2 key\", from \"quic iv\" to \"quicv2 iv\", from \"quic hp\" to \"quicv2 hp\", and from \"quic ku\" to \"quicv2 ku\", to meet the guidance for new versions in Section Section 9.6 of QUIC-TLS of that document. 3.2. The key and nonce used for the Retry Integrity Tag (Section 5.8 of QUIC-TLS) change to: Initial packets use a packet type field of 0b01. 0-RTT packets use a packet type field of 0b10. Handshake packets use a packet type field of 0b11. Retry packets use a packet type field of 0b00. 3.3. 3.3.1. The salt used to derive Initial keys in Section 5.2 of QUIC-TLS changes to: 3.3.2. The labels used in QUIC-TLS to derive packet protection keys (Section Section 5.1 of QUIC-TLS), header protection keys (Section Section 5.4 of QUIC-TLS), Retry Integrity Tag keys (Section Section 5.8 of QUIC-TLS), and key updates (Section Section 6.1 of QUIC-TLS) change from \"quic key\" to \"quicv2 key\", from \"quic iv\" to \"quicv2 iv\", from \"quic hp\" to \"quicv2 hp\", and from \"quic ku\" to \"quicv2 ku\", to meet the guidance for new versions in Section Section 9.6 of QUIC-TLS of that document. 3.3.3. The key and nonce used for the Retry Integrity Tag (Section 5.8 of QUIC-TLS) change to: 4."}
{"_id":"doc-en-quic-v2-b49e5d4eaa6b34082228b24a71dc5ef8827b4da5f580941943a6be9eb18f0a17","title":"","text":"Finally QUIC-VN provides two mechanisms for endpoints to negotiate the QUIC version to use. The \"incompatible\" version negotiation method can support switching from any initial QUIC version to any other version with full generality, at the cost of an additional round-trip at the start of the connection. \"Compatible\" version negotiation eliminates the round-trip penalty but levies some restrictions on how much the two versions can differ semantically. method can support switching from any QUIC version to any other version with full generality, at the cost of an additional round-trip at the start of the connection. \"Compatible\" version negotiation eliminates the round-trip penalty but levies some restrictions on how much the two versions can differ semantically. QUIC version 2 is meant to mitigate ossification concerns and exercise the version negotiation mechanisms. The only change is a"}
{"_id":"doc-en-quicwg-base-drafts-b258c273fde4b3ebe8d0b8ad3749d939536b3a6fe265397fb5a176372f0489cd","title":"","text":"data, unless priorities specified by the application indicate otherwise (see stream-prioritization). Even though a sender is encouraged to assemble frames containing up- to-date information every time it sends a packet, it is not forbidden to retransmit frames of lost packets as they are. A receiver MUST accept packets containing an outdated frame, such as a MAX_DATA frame carrying a smaller maximum data than one found in an older packet. Upon detecting losses, a sender MUST take appropriate congestion control action. The details of loss detection and congestion control are described in QUIC-RECOVERY."}
{"_id":"doc-en-quicwg-base-drafts-351c25538f77025738672ac0065311a149b59a4324648f5f6cb054c7331ca60a","title":"","text":"QUIC Stream ID for a client-initiated bidirectional stream encoded as a variable-length integer. A client MUST treat receipt of a GOAWAY frame containing a Stream ID of any other type as a connection error of type HTTP_MALFORMED_FRAME. of type HTTP_WRONG_STREAM. Clients do not need to send GOAWAY to initiate a graceful shutdown; they simply stop making new requests. A server MUST treat receipt of"}
{"_id":"doc-en-quicwg-base-drafts-5c03273e1eb18a62d691c2abd284c17a838cf172b46432861dd72e8b7ce7121b","title":"","text":"definitions) is closed. A connection enters the draining state when the idle timeout expires. Each endpoint advertises its own idle timeout to its peer. The idle timeout starts from the last packet received. In order to ensure that initiating new activity postpones an idle timeout, an endpoint restarts this timer when sending a packet. An endpoint does not postpone the idle timeout if another packet has been sent containing frames other than ACK or PADDING, and that other packet has not been acknowledged or declared lost. Packets that contain only ACK or PADDING frames are not acknowledged until an endpoint has other frames to send, so they could prevent the timeout from being refreshed. Each endpoint advertises its own idle timeout to its peer. An enpdpoint restarts any timer it maintains when a packet from its peer is received and processed successfully. The timer is also restarted when sending a packet containing frames other than ACK or PADDING (an ACK-eliciting packet, see QUIC-RECOVERY), but only if no other ACK- eliciting packets have been sent since last receiving a packet. Restarting when sending packets ensures that connections do not prematurely time out when initiating new activity. The value for an idle timeout can be asymmetric. The value advertised by an endpoint is only used to determine whether the"}
{"_id":"doc-en-quicwg-base-drafts-8df207df098e31f1aebd64ba5d22616c2676444b7ea88e24f26b902a5b9329d6","title":"","text":"result is smaller than the min_rtt, the RTT should be used, but the ack delay field should be ignored. A sender calculates both smoothed RTT and RTT variance similar to those specified in RFC6298, see on-ack-received. A sender calculates both smoothed RTT (SRTT) and RTT variance (RTTVAR) similar to those specified in RFC6298, see on-ack-received. A sender takes an RTT sample when an ACK frame is received that acknowledges a larger packet number than before (see on-ack-"}
{"_id":"doc-en-quicwg-base-drafts-13db27f44e4d6107539ae7e78ba57a25bd6025cafeace607bd61e74c55dd9dc1","title":"","text":"available and unused connection IDs. While each endpoint independently chooses how many connection IDs to issue, endpoints SHOULD provide and maintain at least eight connection IDs. The endpoint SHOULD do this by always supplying a new connection ID when a connection ID is retired by its peer or when the endpoint receives a packet with a previously unused connection ID. Endpoints that initiate migration and require non-zero-length connection IDs SHOULD provide their peers with new connection IDs before migration, or risk the peer closing the connection. endpoint SHOULD do this by supplying a new connection ID when a connection ID is retired by its peer or when the endpoint receives a packet with a previously unused connection ID. However, it MAY limit the frequency or the total number of connection IDs issued for each connection to avoid the risk of running out of connection IDs (see reset-token). An endpoint that initiates migration and requires non-zero-length connection IDs SHOULD ensure that the pool of connection IDs available to its peer allows the peer to use a new connection ID on migration, as the peer will close the connection if the pool is exhausted. 5.1.2."}
{"_id":"doc-en-quicwg-base-drafts-9b6c75971f7cccd1a05f15b96bfc3c86fa15873824ac7b5c65f1a88829e5503a","title":"","text":"Data is protected using a number of encryption levels: Plaintext Initial Keys Early Data (0-RTT) Keys"}
{"_id":"doc-en-quicwg-base-drafts-ed9f34a321889e0314a96ad62d365ece66a3c39840449552d4b9966e83758221","title":"","text":"using the KDF provided by TLS. In TLS 1.3, the HKDF-Expand-Label function described in Section 7.1 of TLS13 is used, using the hash function from the negotiated cipher suite. Other versions of TLS MUST provide a similar function in order to be used QUIC. MUST provide a similar function in order to be used with QUIC. The current encryption level secret and the label \"quic key\" are input to the KDF to produce the AEAD key; the label \"quic iv\" is used"}
{"_id":"doc-en-quicwg-base-drafts-fdc5b4d40cfbd863e2aa86237a5e9425a6a90762c83748f27e7fb26e402ee727","title":"","text":"in hexadecimal notation. Future versions of QUIC SHOULD generate a new salt value, thus ensuring that the keys are different for each version of QUIC. This prevents a middlebox that only recognizes one version of QUIC from seeing or modifying the contents of handshake packets from future versions. version of QUIC from seeing or modifying the contents of packets from future versions. The HKDF-Expand-Label function defined in TLS 1.3 MUST be used for Initial packets even where the TLS versions offered do not include"}
{"_id":"doc-en-quicwg-base-drafts-3a15b7424fffb8a142f6e647bf89ade76f53ffc88dc15b9e62b27822b8329712","title":"","text":"The \"extension_data\" field of the quic_transport_parameters extension contains a value that is defined by the version of QUIC that is in use. The quic_transport_parameters extension carries a TransportParameters when the version of QUIC defined in QUIC- TransportParameters struct when the version of QUIC defined in QUIC- TRANSPORT is used. The quic_transport_parameters extension is carried in the ClientHello"}
{"_id":"doc-en-quicwg-base-drafts-6fe641882ba5897e95b734a2cbddd277d04826c1c20bc4e4e501cd9a8dd4f4de","title":"","text":"Servers SHOULD NOT increase the QUIC MAX_STREAM_ID limit after sending a GOAWAY frame. Once GOAWAY is sent, the server MUST reject requests sent on streams with an identifier greater than or equal to the indicated last Stream ID. Clients MUST NOT send new requests on the connection after receiving GOAWAY, although requests might already be in transit. A new connection can be established for new requests. If the client has sent requests on streams with a Stream ID greater than or equal to that indicated in the GOAWAY frame, those requests are considered rejected (request-cancellation). Clients SHOULD cancel any requests on streams above this ID. Servers MAY also reject requests on streams below the indicated ID if these requests were not processed. Clients MUST NOT send new requests on the connection after receiving GOAWAY; a new connection MAY be established to send additional requests. Some requests might already be in transit. If the client has already sent requests on streams with a Stream ID greater than or equal to that indicated in the GOAWAY frame, those requests will not be processed and MAY be retried by the client on a different connection. The client MAY cancel these requests. It is RECOMMENDED that the server explicitly reject such requests (see request-cancellation) in order to clean up transport state for the affected streams. Requests on Stream IDs less than the Stream ID in the GOAWAY frame might have been processed; their status cannot be known until they are completed successfully, reset individually, or the connection terminates. might have been processed; their status cannot be known until a response is received, the stream is reset individually, or the connection terminates. Servers MAY reject individual requests on streams below the indicated ID if these requests were not processed. Servers SHOULD send a GOAWAY frame when the closing of a connection is known in advance, even if the advance notice is small, so that the"}
{"_id":"doc-en-quicwg-base-drafts-92b8ab01dfdbb56ddb4608850f0b928aae8fd538712d54180d7ea6792268d866","title":"","text":"A client MUST NOT send a DUPLICATE_PUSH frame. A server MUST treat the receipt of a DUPLICATE_PUSH frame as a connection error of type HTTP_MALFORMED_FRAME. HTTP_UNEXPECTED_FRAME. The DUPLICATE_PUSH frame carries a single variable-length integer that identifies the Push ID of a resource that the server has"}
{"_id":"doc-en-quicwg-base-drafts-dd059e149c46334cddaadf2ccff2b8a96486ba2c976105b18c8c5243889a63a1","title":"","text":"can be mounted using spoofed source addresses. In determining this limit, servers only count the size of successfully processed packets. Clients MUST ensure that UDP datagrams containing Initial packets are sized to at least 1200 bytes, adding padding to packets in the datagram as necessary. Once a client has received an acknowledgment for a Handshake packet it MAY send smaller datagrams. Sending padded datagrams ensures that the server is not overly constrained by the amplification restriction. Clients MUST ensure that UDP datagrams containing only Initial packets are sized to at least 1200 bytes, adding padding to packets in the datagram as necessary. Sending padded datagrams ensures that the server is not overly constrained by the amplification restriction. Packet loss, in particular loss of a Handshake packet from the server, can cause a situation in which the server cannot send when"}
{"_id":"doc-en-quicwg-base-drafts-abffcb95ba73fd615983afa79e8f3c54635d896ea4da7ebb557f3295aec0069e","title":"","text":"though 1-RTT keys are available to a server after receiving the first handshake messages from a client, the server cannot consider the client to be authenticated until it receives and validates the client's Finished message. client's Finished message. A server MUST NOT process 1-RTT packets until the handshake is complete. A server MAY buffer or discard 1-RTT packets that it cannot read. The requirement for the server to wait for the client Finished message creates a dependency on that message being delivered. A"}
{"_id":"doc-en-quicwg-base-drafts-99c8de01f73222ece3ca5d0c46784d50242838c3170bc4bec18182001e346586","title":"","text":"contain frames. QUIC payloads MUST contain at least one frame, and MAY contain multiple frames and multiple frame types. multiple frames and multiple frame types. Frames MUST fit within a single QUIC packet and MUST NOT span a QUIC packet boundary. Frames MUST fit within a single QUIC packet and MUST NOT span a QUIC packet boundary. Each frame begins with a Frame Type, indicating its type, followed by additional type-dependent fields: Each frame begins with a Frame Type, indicating its type, followed by additional type-dependent fields: The frame types defined in this specification are listed in frame- types. The Frame Type in ACK, STREAM, MAX_STREAMS, STREAMS_BLOCKED,"}
{"_id":"doc-en-quicwg-base-drafts-73ccabcab949da3f471f2381223da9740c2f6bc7261e1c214d0e204c6a3df934","title":"","text":"the frame. These frames are explained in more detail in frame- formats. An endpoint MUST treat the receipt of a frame of unknown type as a connection error of type FRAME_ENCODING_ERROR. All QUIC frames are idempotent in this version of QUIC. That is, a valid frame does not cause undesirable side effects or errors when received more than once."}
{"_id":"doc-en-quicwg-base-drafts-9ab6c511d149ace9683f8f2e004ebc5d35bd2db7ed2157e06a2bd0070c3d3f0f","title":"","text":"connections. Servers MAY discard any Initial packet that does not carry the expected token. A token SHOULD be constructed for the server to easily distinguish it from tokens that are sent in Retry packets as they are carried in the same field. The token MUST NOT include information that would allow it to be linked by an on-path observer to the connection on which it was issued. For example, it cannot include the connection ID or addressing information unless the values are encrypted. Unlike the token that is created for a Retry packet, there might be some time between when the token is created and when the token is subsequently used. Thus, a token SHOULD include an expiration time. The server MAY include either an explicit expiration time or an issued timestamp and dynamically calculate the expiration time. It is also unlikely that the client port number is the same on two subsequently used. Thus, a token SHOULD have an expiration time, which could be either an explicit expiration time or an issued timestamp that can be used to dynamically calculate the expiration time. A server can store the expiration time or include it in an encrypted form in the token. It is unlikely that the client port number is the same on two different connections; validating the port is therefore unlikely to be successful. A token SHOULD be constructed for the server to easily distinguish it from tokens that are sent in Retry packets as they are carried in the same field. If the client has a token received in a NEW_TOKEN frame on a previous connection to what it believes to be the same server, it SHOULD include that value in the Token field of its Initial packet."}
{"_id":"doc-en-quicwg-base-drafts-bb4f8091eefbdbbbb477db42b783f8318e705112376227ff4f6c5bc704b86272","title":"","text":"Before a TLS ciphersuite can be used with QUIC, a header protection algorithm MUST be specified for the AEAD used with that ciphersuite. This document defines algorithms for AEAD_AES_128_GCM, AEAD_AES_128_CCM, AEAD_AES_256_GCM, AEAD_AES_256_CCM (all AES AEADs are defined in AEAD), and AEAD_CHACHA20_POLY1305 CHACHA. Prior to TLS selecting a ciphersuite, AES header protection is used (hp-aes), matching the AEAD_AES_128_GCM packet protection. AEAD_AES_128_CCM, AEAD_AES_256_GCM (all AES AEADs are defined in AEAD), and AEAD_CHACHA20_POLY1305 CHACHA. Prior to TLS selecting a ciphersuite, AES header protection is used (hp-aes), matching the AEAD_AES_128_GCM packet protection. 5.4.2."}
{"_id":"doc-en-quicwg-base-drafts-e4168a08a31317fc409678fefd42b416036399e9eae66a2a8c7fdfb366e546ba","title":"","text":"5.4.3. This section defines the packet protection algorithm for AEAD_AES_128_GCM, AEAD_AES_128_CCM, AEAD_AES_256_GCM, and AEAD_AES_256_CCM. AEAD_AES_128_GCM and AEAD_AES_128_CCM use 128-bit AES AES in electronic code-book (ECB) mode. AEAD_AES_256_GCM, and AEAD_AES_256_CCM use 256-bit AES in ECB mode. AEAD_AES_128_GCM, AEAD_AES_128_CCM, and AEAD_AES_256_GCM. AEAD_AES_128_GCM and AEAD_AES_128_CCM use 128-bit AES AES in electronic code-book (ECB) mode. AEAD_AES_256_GCM uses 256-bit AES in ECB mode. This algorithm samples 16 bytes from the packet ciphertext. This value is used as the input to AES-ECB. In pseudocode:"}
{"_id":"doc-en-quicwg-base-drafts-7573c9326e4b52ad04727390a477e08de3df053985afc9d09e57ea9af66f5cb9","title":"","text":"8.1. The QUIC version negotiation mechanism is used to negotiate the version of QUIC that is used prior to the completion of the handshake. However, this packet is not authenticated, enabling an active attacker to force a version downgrade. To ensure that a QUIC version downgrade is not forced by an attacker, version information is copied into the TLS handshake, which provides integrity protection for the QUIC negotiation. This does not prevent version downgrade prior to the completion of the handshake, though it means that a downgrade causes a handshake failure. QUIC requires that the cryptographic handshake provide authenticated protocol negotiation. TLS uses Application Layer Protocol Negotiation (ALPN) RFC7301 to select an application protocol. Unless"}
{"_id":"doc-en-quicwg-base-drafts-df01538916ff5ad407e0d207b0ddb269716cfed1d3ceb3168d0e45013b879410","title":"","text":"have been lost or discarded by the server. A client MAY attempt to resend data in 0-RTT packets after it sends a new Initial packet. A client MUST NOT reset the packet number it uses for 0-RTT packets. The keys used to protect 0-RTT packets will not change as a result of responding to a Retry packet unless the client also regenerates the cryptographic handshake message. Sending packets with the same packet number in that case is likely to compromise the packet A client MUST NOT reset the packet number it uses for 0-RTT packets, since the keys used to protect 0-RTT packets will not change as a result of responding to a Retry packet. Sending packets with the same packet number in that case is likely to compromise the packet protection for all 0-RTT packets because the same key and nonce could be used to protect different content."}
{"_id":"doc-en-quicwg-base-drafts-d6652c91d4cc61c42a03230a50e09018570aa2145474dec9dc625de350229990","title":"","text":"from a packet number of 0. Thus, 0-RTT packets could need to use a longer packet number encoding. A client SHOULD instead generate a fresh cryptographic handshake message and start packet numbers from 0. This ensures that new 0-RTT packets will not use the same keys, avoiding any risk of key and nonce reuse; this also prevents 0-RTT packets from previous handshake attempts from being accepted as part of the connection. A client MUST NOT send 0-RTT packets once it starts processing 1-RTT packets from the server. This means that 0-RTT packets cannot contain any response to frames from 1-RTT packets. For instance, a"}
{"_id":"doc-en-quicwg-base-drafts-67b646d6ff1c39c95fbc0d44d0639e9fdf805fe13a69a6d183653f065a519d65","title":"","text":"compression-induced head-of-line blocking. See that document for additional details. To allow for better compression efficiency, the cookie header field RFC6265 MAY be split into separate header fields, each with one or more cookie-pairs, before compression. If a decompressed header list contains multiple cookie header fields, these MUST be concatenated before being passed into a non-HTTP/2, non-HTTP/3 context, as described in HTTP2, Section 8.1.2.5. An HTTP/3 implementation MAY impose a limit on the maximum size of the message header it will accept on an individual HTTP message. A server that receives a larger header field list than it is willing to"}
{"_id":"doc-en-quicwg-base-drafts-3e518acc7eef41a2a619c732934f4cfe6a26cb2d6cf52047d0633456b2a4b3f8","title":"","text":"The most appropriate error code (error-codes) SHOULD be included in the frame that signals the error. Where this specification identifies error conditions, it also identifies the error code that is used. is used; though these are worded as requirements, different implementation strategies might lead to different errors being reported. In particular, an endpoint MAY use any applicable error code when it detects an error condition; a generic error code (such as PROTOCOL_VIOLATION or INTERNAL_ERROR) can always be used in place of specific error codes. A stateless reset (stateless-reset) is not suitable for any error that can be signaled with a CONNECTION_CLOSE or RESET_STREAM frame."}
{"_id":"doc-en-quicwg-base-drafts-b2f98bd92b09c4154e3af1a307c2e77004f960a512ccf598085199693f903906","title":"","text":"See iana-error-codes for details of registering new error codes. In defining these error codes, several principles are applied. Error conditions that might require specific action on the part of a recipient are given unique codes. Errors that represent common conditions are given specific codes. Absent either of these conditions, error codes are used to identify a general function of the stack, like flow control or transport parameter handling. Finally, generic errors are provided for conditions where implementations are unable or unwilling to use more specific codes. 20.1. Application protocol error codes are 62-bit unsigned integers, but"}
{"_id":"doc-en-quicwg-base-drafts-0a5dc777f2f78dc4cb644908786bb70163ebe553de4918394be9aa59e3d60f2c","title":"","text":"process performed at the beginning of the connection SHOULD be applied for all paths used by the connection. In case multiple connections share the same network path, as determined by having the same source and destination IP address and UDP ports, endpoints should try to co-ordinate across all connections to ensure a clear signal to any on-path measurement points. When the spin bit is disabled, endpoints MAY set the spin bit to any value, and MUST ignore any incoming value. It is RECOMMENDED that endpoints set the spin bit to a random value either chosen"}
{"_id":"doc-en-quicwg-base-drafts-59e3c9124b80f75702025e4204f5c5a4ec055f5952b77b9f396bb1f64b78c22b","title":"","text":"Indicates that x is A bits long Indicates that x uses the prefixed integer encoding defined in Section 5.1 of RFC7541, beginning with an A-bit prefix. prefixed-integers, beginning with an A-bit prefix. Indicates that x is variable-length and extends to the end of the region."}
{"_id":"doc-en-quicwg-base-drafts-036fc47e0246dc479fdb9f2630841f5d69b4f3fc7d13927fbb8acda475191c17","title":"","text":"An encoder informs the decoder of a change to the dynamic table capacity using an instruction which begins with the '001' three-bit pattern. The new dynamic table capacity is represented as an integer with a 5-bit prefix (see Section 5.1 of RFC7541). pattern. This is followed by the new dynamic table capacity represented as an integer with a 5-bit prefix (see prefixed- integers). The new capacity MUST be lower than or equal to the limit described in maximum-dynamic-table-capacity. In HTTP/3, this limit is the"}
{"_id":"doc-en-quicwg-base-drafts-38495a65a4999ab1c665fdd01aeee49f38f2fe74f3d25d7de5a8ed9a1f30cf4f","title":"","text":"or the dynamic table using an instruction that starts with the '1' one-bit pattern. The second (\"S\") bit indicates whether the reference is to the static or dynamic table. The 6-bit prefix integer (see Section 5.1 of RFC7541) that follows is used to locate the table entry for the header name. When S=1, the number represents the static table index; when S=0, the number is the relative index of the entry in the dynamic table. integer (see prefixed-integers) that follows is used to locate the table entry for the header name. When S=1, the number represents the static table index; when S=0, the number is the relative index of the entry in the dynamic table. The header name reference is followed by the header field value represented as a string literal (see Section 5.2 of RFC7541). represented as a string literal (see string-literals). 4.3.3. An encoder adds an entry to the dynamic table where both the header field name and the header field value are represented as string literals (see primitives) using an instruction that starts with the '01' two-bit pattern. literals using an instruction that starts with the '01' two-bit pattern. The name is represented as a 6-bit prefix string literal, while the value is represented as an 8-bit prefix string literal. This is followed by the name represented as a 6-bit prefix string literal, and the value represented as an 8-bit prefix string literal (see string-literals). 4.3.4. An encoder duplicates an existing entry in the dynamic table using an instruction that starts with the '000' three-bit pattern. The relative index of the existing entry is represented as an integer with a 5-bit prefix. instruction that begins with the '000' three-bit pattern. This is followed by the relative index of the existing entry represented as an integer with a 5-bit prefix (see prefixed-integers. The existing entry is re-inserted into the dynamic table without resending either the name or the value. This is useful to mitigate"}
{"_id":"doc-en-quicwg-base-drafts-7709fde0ba8e5e990e31cd56a4825a9e40fc06475c71078b2ab521ebcb19ebb2","title":"","text":"After processing a header block whose declared Required Insert Count is not zero, the decoder emits a Header Acknowledgement instruction. The instruction begins with the '1' one-bit pattern and includes the header block's associated stream ID, encoded as a 7-bit prefix integer. It is used by the peer's encoder to know when it is safe to evict an entry (blocked-insertion), and possibly update the Known Received Count (known-received-count). The instruction begins with the '1' one-bit pattern which is followed by the header block's associated stream ID encoded as a 7-bit prefix integer (see prefixed-integers). This instruction is used as described in known-received-count and in state-synchronization. If an encoder receives a Header Acknowledgement instruction referring to a stream on which every header block with a non-zero Required"}
{"_id":"doc-en-quicwg-base-drafts-2787c20a417d67361a7a7acf316283bf36b06260fae97abcd743bbfb7c8577ef","title":"","text":"When a stream is reset or reading is abandoned, the decoder emits a Stream Cancellation instruction. The instruction begins with the '01' two-bit pattern. The instruction includes the stream ID of the affected stream encoded as a 6-bit prefix integer. See state- synchronization. '01' two-bit pattern, which is followed by the stream ID of the affected stream encoded as a 6-bit prefix integer. This instruction is used as described in state-synchronization. 4.4.3. The Insert Count Increment instruction begins with the '00' two-bit pattern. The instruction specifies the total number of dynamic table inserts and duplications since the last Insert Count Increment or Header Acknowledgement that increased the Known Received Count for the dynamic table (see known-received-count). The Increment field is encoded as a 6-bit prefix integer. The encoder uses this value to determine which table entries might cause a stream to become blocked, as described in state-synchronization. pattern, followed by the Increment encoded as a 6-bit prefix integer. The value of the Increment is the total number of dynamic table insertions and duplications processed by the decoder since the last time it sent a Header Acknowledgement instruction that increased the Known Received Count (see known-received-count) or an Insert Count Increment instruction. The encoder uses this value to update the Known Received Count, as described in state-synchronization. An encoder that receives an Increment field equal to zero or one that increases the Known Received Count beyond what the encoder has sent"}
{"_id":"doc-en-quicwg-base-drafts-591bec62e8699d099df34ecbe28a6eb8262717fd1e9771e1f339f38f0432e44c","title":"","text":"4.5. Header blocks contain compressed representations of header lists and are carried in frames on streams defined by the enclosing protocol. These representations reference the static table, or dynamic table in a particular state without modifying it. A header block consists of a prefix and a possibly empty sequence of representations defined in this section. Each representation corresponds to a single header field. These representations reference the static table or the dynamic table in a particular state, but do not modify that state. Header blocks are carried in frames on streams defined by the enclosing protocol. 4.5.1."}
{"_id":"doc-en-quicwg-base-drafts-c5d5331a20eca9d267deaa2dd9fe6774a272b63b5c6371afd873279265597ab1","title":"","text":"absolute index less than the Base, this representation starts with the '1' 1-bit pattern, followed by the \"S\" bit indicating whether the reference is into the static or dynamic table. The 6-bit prefix integer (see Section 5.1 of RFC7541) that follows is used to locate the table entry for the header name. When S=1, the number represents integer (see prefixed-integers) that follows is used to locate the table entry for the header field. When S=1, the number represents the static table index; when S=0, the number is the relative index of the entry in the dynamic table."}
{"_id":"doc-en-quicwg-base-drafts-cfcbcc215b407db64781ec03a5169750b124b8f4f79635e4c55f9ea3f4c9f9bc","title":"","text":"than or equal to the Base, the representation starts with the '0001' 4-bit pattern, followed by the post-base index (see post-base) of the matching header field, represented as an integer with a 4-bit prefix (see Section 5.1 of RFC7541). (see prefixed-integers). 4.5.4."}
{"_id":"doc-en-quicwg-base-drafts-f2bbd4507821c6308517e7651d08654bac4a07cb9a292661a2c678c26776b63b","title":"","text":"absolute index less than the Base, this representation starts with the '01' two-bit pattern. Only the header field name stored in the static or dynamic table is used. Any header field value MUST be ignored. The following bit, 'N', indicates whether an intermediary is permitted to add this header to the dynamic header table on subsequent hops. When the 'N' bit is set, the encoded header MUST"}
{"_id":"doc-en-quicwg-base-drafts-c68539fce684712df64eca26cfe7cd76785e4bb2580f0f62e14f070f4f436f54","title":"","text":"header field with the 'N' bit set, it MUST use a literal representation to forward this header field. This bit is intended for protecting header field values that are not to be put at risk by compressing them (see Section 7.1 of RFC7541 for more details). compressing them (see security-considerations for more details). The fourth (\"S\") bit indicates whether the reference is to the static or dynamic table. The 4-bit prefix integer (see Section 5.1 of RFC7541) that follows is used to locate the table entry for the header name. When S=1, the number represents the static table index; when S=0, the number is the relative index of the entry in the dynamic table. or dynamic table. The 4-bit prefix integer (see prefixed-integers) that follows is used to locate the table entry for the header name. When S=1, the number represents the static table index; when S=0, the number is the relative index of the entry in the dynamic table. Only the header field name is taken from the dynamic table entry; the header field value is encoded as an 8-bit prefix string literal (see string-literals). 4.5.5. If the name entry is in the dynamic table with an absolute index greater than or equal to the Base, the representation starts with the '0000' four-bit pattern. The fifth bit is the 'N' bit as described in literal-name-reference. Finally, the header field name is represented using the post-base index of that entry (see post-base) encoded as an integer with a 3-bit prefix. A literal header field with post-base name reference represents a header field where the name matches the header field name of a dynamic table entry with an absolute index greater than or equal to the Base. This representation starts with the '0000' four-bit pattern. The fifth bit is the 'N' bit as described in literal-name-reference. This is followed by a post-base index of the dynamic table entry (see post-base) encoded as an integer with a 3-bit prefix (see prefixed- integers). Only the header field name is taken from the dynamic table entry; the header field value is encoded as an 8-bit prefix string literal (see string-literals). 4.5.6. An addition to the header table where both the header field name and the header field value are represented as string literals (see primitives) starts with the '001' three-bit pattern. The fourth bit, 'N', indicates whether an intermediary is permitted to add this header to the dynamic header table on subsequent hops. When the 'N' bit is set, the encoded header MUST always be encoded with a literal representation. In particular, when a peer sends a header field that it received represented as a literal header field with the 'N' bit set, it MUST use a literal representation to forward this header field. This bit is intended for protecting header field values that are not to be put at risk by compressing them (see Section 7.1 of RFC7541 for more details). The name is represented as a 4-bit prefix string literal, while the value is represented as an 8-bit prefix string literal. The literal header field without name reference representation encodes a header field name and header field value as string literals. This representation begins with the '001' three-bit pattern. The fourth bit is the 'N' bit as described in literal-name-reference. The name follows, represented as a 4-bit prefix string literal, then the value, represented as an 8-bit prefix string literal (see string- literals). 5."}
{"_id":"doc-en-quicwg-base-drafts-717321cfc11393bc0eadc9f981a9b44332e4b9f15256b9098a48dce75003dbe5","title":"","text":"RETIRE_CONNECTION_ID frames and retransmitted if the packet containing them is lost. NEW_TOKEN frames are retransmitted if the packet containing them is lost. No special support is made for detecting reordered and duplicated NEW_TOKEN frames other than a direct comparison of the frame contents. PING and PADDING frames contain no information, so lost PING or PADDING frames do not require repair."}
{"_id":"doc-en-quicwg-base-drafts-d88624cb1a5383fbf8e441377d8f8977cffa162ef7cab24a136ab9365561d1b6","title":"","text":"An opaque blob that the client may use with a future Initial packet. An endpoint might receive multiple NEW_TOKEN frames that contain the same token value. Endpoints are responsible for discarding duplicate values, which might be used to link connection attempts; see validate-future. 19.8. STREAM frames implicitly create a stream and carry stream data. The"}
{"_id":"doc-en-quicwg-base-drafts-b60a54afd2080b84c26396076bbfb7bcc7c019ebc00affe5b70e169e23998f3d","title":"","text":"10. The security considerations of HTTP/3 should be comparable to those of HTTP/2 with TLS. Note that where HTTP/2 employs PADDING frames and Padding fields in other frames to make a connection more resistant to traffic analysis, HTTP/3 can either rely on transport- layer padding or employ the reserved frame and stream types discussed in frame-grease and stream-grease. of HTTP/2 with TLS; the considerations from Section 10 of HTTP2 apply in addition to those listed here. When HTTP Alternative Services is used for discovery for HTTP/3 endpoints, the security considerations of ALTSVC also apply. 10.1. Where HTTP/2 employs PADDING frames and Padding fields in other frames to make a connection more resistant to traffic analysis, HTTP/3 can either rely on transport-layer padding or employ the reserved frame and stream types discussed in frame-grease and stream- grease. These methods of padding produce different results in terms of the granularity of padding, the effect of packet loss and recovery, and how an implementation might control padding. 10.2. Several protocol elements contain nested length elements, typically in the form of frames with an explicit length containing variable- length integers. This could pose a security risk to an incautious implementer. An implementation MUST ensure that the length of a frame exactly matches the length of the fields it contains. 10.3. The use of 0-RTT with HTTP/3 creates an exposure to replay attack. The anti-replay mitigations in HTTP-REPLAY MUST be applied when using HTTP/3 with 0-RTT. 10.4. Certain HTTP implementations use the client address for logging or access-control purposes. Since a QUIC client's address might change during a connection (and future versions might support simultaneous"}
{"_id":"doc-en-quicwg-base-drafts-28d294e4b9775c1dc46da4ff7f8450dc4ce519366cc7baa591c1f56f9b88cb34","title":"","text":"peer. For example, a client might be willing to consume a very large response header, while servers are more cautious about request size. Parameters MUST NOT occur more than once in the SETTINGS frame. A receiver MAY treat the presence of the same parameter more than once as a connection error of type HTTP_SETTINGS_ERROR. The same setting identifier MUST NOT occur more than once in the SETTINGS frame. A receiver MAY treat the presence of duplicate setting identifiers as a connection error of type HTTP_SETTINGS_ERROR. The payload of a SETTINGS frame consists of zero or more parameters. Each parameter consists of a setting identifier and a value, both"}
{"_id":"doc-en-quicwg-base-drafts-6bfe8e6eabc1503277e5cec3eee6728e546c4fdbe3ba7c396195e43fd955ae52","title":"","text":"ChaCha20 function as defined in Section 2.4 of CHACHA. This uses a 256-bit key and 16 bytes sampled from the packet protection output. The first 4 bytes of the sampled ciphertext are interpreted as a 32-bit number in little-endian order and are used as the block count. The remaining 12 bytes are interpreted as three concatenated 32-bit numbers in little-endian order and used as the nonce. The first 4 bytes of the sampled ciphertext are the block counter. A ChaCha20 implementation could take a 32-bit integer in place of a byte sequence, in which case the byte sequence is interpreted as a little-endian value. The remaining 12 bytes are used as the nonce. A ChaCha20 implementation might take an array of three 32-bit integers in place of a byte sequence, in which case the nonce bytes are interpreted as a sequence of 32-bit little-endian integers. The encryption mask is produced by invoking ChaCha20 to protect 5 zero bytes. In pseudocode:"}
{"_id":"doc-en-quicwg-base-drafts-11920b4725030212facc03438671db692ef228118e3c527991d877760d18ed2c","title":"","text":"set to 0. A QUIC packet with a short header includes a Destination Connection ID. The short header does not include the Connection ID Lengths, Source Connection ID, or Version fields. ID immediately following the first byte. The short header does not include the Connection ID Lengths, Source Connection ID, or Version fields. The length of the Destination Connection ID is not specified in packets with a short header and is not constrained by this specification. The remainder of the packet has version-specific semantics."}
{"_id":"doc-en-quicwg-base-drafts-597013e2a179aefcaa993c110aa4dd24425b5e3453a5d710d1be2435d4c4265c","title":"","text":"Frame types which were used in HTTP/2 where there is no corresponding HTTP/3 frame have also been reserved (iana-frames). These frame types MUST NOT be sent, and receipt MAY be treated as an error of type HTTP_UNEXPECTED_FRAME. type HTTP_FRAME_UNEXPECTED. 8."}
{"_id":"doc-en-quicwg-base-drafts-40fbae2ae2d3ce1a64003a3942a8cae56fcbbdfad7a8c1df0bcf0abf70e20d57","title":"","text":"Packets containing only ACK frames are not congestion controlled, so there are limits on how frequently they can be sent. An endpoint MUST NOT send more than one ACK-frame-only packet in response to receiving an ack-eliciting packet (one containing frames other than ACK and/or PADDING). An endpoint MUST NOT send a packet containing only an ACK frame in response to a non-ack-eliciting packet (one containing only ACK and/or PADDING frames), even if there are packet gaps which precede the received packet. Limiting ACK frames avoids an infinite feedback loop of acknowledgements, which could prevent the connection from ever becoming idle. However, the endpoint acknowledges non-ack-eliciting packets when it sends an ACK frame. receiving an ack-eliciting packet. An endpoint MUST NOT send a non- ack-eliciting packet in response to a non-ack-eliciting packet, even if there are packet gaps which precede the received packet. Limiting ACK frames avoids an infinite feedback loop of acknowledgements, which could prevent the connection from ever becoming idle. However, the endpoint acknowledges non-ACK-eliciting packets when it sends an ACK frame. An endpoint SHOULD treat receipt of an acknowledgment for a packet it did not send as a connection error of type PROTOCOL_VIOLATION, if it"}
{"_id":"doc-en-quicwg-base-drafts-44d1e3df86a39094d74cfeabcbfa37e1add867335f49343e222a94b5f6947658","title":"","text":"frames should therefore not be paced, to avoid delaying their delivery to the peer. Sending multiple packets into the network without any delay between them creates a packet burst that might cause short-term congestion and losses. Implementations MUST either use pacing or limit such bursts to minimum of 10 * kMaxDatagramSize and max(2* kMaxDatagramSize, 14720)), the same as the recommended initial congestion window. As an example of a well-known and publicly available implementation of a flow pacer, implementers are referred to the Fair Queue packet scheduler (fq qdisc) in Linux (3.11 onwards)."}
{"_id":"doc-en-quicwg-base-drafts-42d14b1066176c67aa54edf457932654d09ed515b81f0a2370439163c747c116","title":"","text":"sender should not consider itself application limited if it would have fully utilized the congestion window without pacing delay. Sending multiple packets into the network without any delay between them creates a packet burst that might cause short-term congestion and losses. Implementations SHOULD either use pacing or reduce their congestion window to limit such bursts to minimum of 10 * kMaxDatagramSize and max(2* kMaxDatagramSize, 14720)), the same as the recommended initial congestion window. A sender MAY implement alternative mechanisms to update its congestion window after periods of under-utilization, such as those proposed for TCP in RFC7661."}
{"_id":"doc-en-quicwg-base-drafts-9723cf868dd7b986f05bab23b1f204e54110c0d6a811b94f967563e22f3cfa2f","title":"","text":"be routed to a server instance with more resources available for new connections. If a server receives a client Initial that can be unprotected but contains an invalid Retry token, it knows the client will not accept another Retry token. The server can discard such a packet and allow the client to time out to detect handshake failure, but that could impose a significant latency penalty on the client. A server MAY proceed with the connection without verifying the token, though the server MUST NOT consider the client address validated. If a server chooses not to proceed with the handshake, it SHOULD immediately close (immediate-close) the connection with an INVALID_TOKEN error. Note that a server has not established any state for the connection at this point and so does not enter the closing period. A flow showing the use of a Retry packet is shown in fig-retry. 8.1.2."}
{"_id":"doc-en-quicwg-base-drafts-29d86f8263c78cc2b1a07cf1ba09b72ff844cff042ab43b404786fce782909b8","title":"","text":"An endpoint detected an error with protocol compliance that was not covered by more specific error codes. A server received a Retry Token in a client Initial that is invalid. An endpoint has received more data in CRYPTO frames than it can buffer."}
{"_id":"doc-en-quicwg-base-drafts-ed4f7080e0c18d235ed6e11ec9d38e3e8d4fe8d162fc539eff0f215564f7e35f","title":"","text":"4.5.2. An indexed header field representation identifies an entry in either the static table or the dynamic table and causes that header field to be added to the decoded header list. If the entry is in the static table, or in the dynamic table with an absolute index less than the Base, this representation starts with the '1' 1-bit pattern, followed by the 'T' bit indicating whether the reference is into the static or dynamic table. The 6-bit prefix integer (see prefixed-integers) that follows is used to locate the table entry for the header field. When T=1, the number represents the static table index; when T=0, the number is the relative index of the entry in the dynamic table. An indexed header field representation identifies an entry in the static table, or an entry in the dynamic table with an absolute index less than the Base. This representation starts with the '1' 1-bit pattern, followed by the 'T' bit indicating whether the reference is into the static or dynamic table. The 6-bit prefix integer (see prefixed-integers) that follows is used to locate the table entry for the header field. When T=1, the number represents the static table index; when T=0, the number is the relative index of the entry in the dynamic table. 4.5.3. If the entry is in the dynamic table with an absolute index greater than or equal to the Base, the representation starts with the '0001' 4-bit pattern, followed by the post-base index (see post-base) of the matching header field, represented as an integer with a 4-bit prefix (see prefixed-integers). An indexed header field with post-base index representation identifies an entry in the dynamic table with an absolute index greater than or equal to the Base. 4.5.4. This representation starts with the '0001' 4-bit pattern. This is followed by the post-base index (see post-base) of the matching header field, represented as an integer with a 4-bit prefix (see prefixed-integers). A literal header field with name reference represents a header field where the header field name matches the header field name of an entry stored in the static table or the dynamic table. If the entry is in the static table, or in the dynamic table with an absolute index less than the Base, this representation starts with the '01' two-bit pattern. 4.5.4. The following bit, 'N', indicates whether an intermediary is permitted to add this header to the dynamic header table on subsequent hops. When the 'N' bit is set, the encoded header MUST always be encoded with a literal representation. In particular, when a peer sends a header field that it received represented as a literal header field with the 'N' bit set, it MUST use a literal representation to forward this header field. This bit is intended for protecting header field values that are not to be put at risk by compressing them (see security-considerations for more details). A literal header field with name reference representation encodes a header field where the header field name matches the header field name of an entry in the static table, or the header field name of an entry in the dynamic table with an absolute index less than the Base. This representation starts with the '01' two-bit pattern. The following bit, 'N', indicates whether an intermediary is permitted to add this header to the dynamic header table on subsequent hops. When the 'N' bit is set, the encoded header MUST always be encoded with a literal representation. In particular, when a peer sends a header field that it received represented as a literal header field with the 'N' bit set, it MUST use a literal representation to forward this header field. This bit is intended for protecting header field values that are not to be put at risk by compressing them (see security-considerations for more details). The fourth ('T') bit indicates whether the reference is to the static or dynamic table. The 4-bit prefix integer (see prefixed-integers)"}
{"_id":"doc-en-quicwg-base-drafts-d106e7c9dccb1fa695aec447f671b079887ddeb55e02cf180914c90b6df5d13c","title":"","text":"4.5.5. A literal header field with post-base name reference represents a header field where the name matches the header field name of a dynamic table entry with an absolute index greater than or equal to the Base. A literal header field with post-base name reference representation encodes a header field where the header field name matches the header field name of a dynamic table entry with an absolute index greater than or equal to the Base. This representation starts with the '0000' four-bit pattern. The fifth bit is the 'N' bit as described in literal-name-reference."}
{"_id":"doc-en-quicwg-base-drafts-ce50c354258fbe9786ad6d5697b8421165865a34c8eb155300f71544ff765af9","title":"","text":"4.5.6. The literal header field without name reference representation encodes a header field name and header field value as string encodes a header field name and a header field value as string literals. This representation begins with the '001' three-bit pattern. The"}
{"_id":"doc-en-quicwg-base-drafts-15ff77cee2c7ae0d4973de519aa76d4f7eba5d48a56b619704907a79e9dece63","title":"","text":"open a connection, which begins the exchange described in handshake; enable 0-RTT; and enable 0-RTT when available; and be informed when 0-RTT has been accepted or rejected by a server."}
{"_id":"doc-en-quicwg-base-drafts-73fd1d033563c06452a13cf6d9fab5fd63b79efe85b578a4c3a38667dc9106a6","title":"","text":"a token that is not applicable to the server that it is connecting to, unless the client has the knowledge that the server that issued the token and the server the client is connecting to are jointly managing the tokens. managing the tokens. A client MAY use a token from any previous connection to that server. A token allows a server to correlate activity between the connection where the token was issued and any connection where it is used."}
{"_id":"doc-en-quicwg-base-drafts-fd6ebe5e37d122378e33dd706c153895b217b1280ad7a64d91cd0a808c2f871b","title":"","text":"limit its use of tokens to only the information needed to validate client addresses. Clients MAY use tokens obtained on one connection for any connection attempt using the same version. When selecting a token to use, clients do not need to consider other properties of the connection that is being attempted, including the choice of possible application protocols, session tickets, or other connection properties. Attackers could replay tokens to use servers as amplifiers in DDoS attacks. To protect against such attacks, servers SHOULD ensure that tokens sent in Retry packets are only accepted for a short time."}
{"_id":"doc-en-quicwg-base-drafts-25c2150aeac866297dc1cfb3cea5a27b80a85fc65c56a73ecc2a3ac28fb22830","title":"","text":"write data, understanding when stream flow control credit (data- flow-control) has successfully been reserved to send the written data data; end the stream (clean termination), resulting in a STREAM frame (frame-stream) with the FIN bit set; and reset the stream (abrupt termination), resulting in a RESET_STREAM frame (frame-reset-stream), even if the stream was already ended. frame (frame-reset-stream), if the stream was not already in a terminal state. On the receiving part of a stream, application protocols need to be able to: read data read data; and abort reading of the stream and request closure, possibly resulting in a STOP_SENDING frame (frame-stop-sending) resulting in a STOP_SENDING frame (frame-stop-sending). Applications also need to be informed of state changes on streams, including when the peer has opened or reset a stream, when a peer"}
{"_id":"doc-en-quicwg-base-drafts-1e9b907f9936b671cfd90e203849bb3c1614845bdebfb74f59b710ddb69cc978","title":"","text":"A Retry packet causes a client to send another Initial packet, effectively restarting the connection process. A Retry packet indicates that the Initial was received, but not processed. A Retry packet MUST NOT be treated as an acknowledgment. packet cannot be treated as an acknowledgment, because it does not indicate that a packet was processed or specify the packet number. Clients that receive a Retry packet reset congestion control and loss recovery state, including resetting any pending timers. Other"}
{"_id":"doc-en-quicwg-base-drafts-877d4140b6547b49e01973b52fb0bc9e2c6eca3df79957346e8f63c2f901995c","title":"","text":"3.1.3. QUIC ends a loss epoch when a packet sent after loss is declared is acknowledged. TCP waits for the gap in the sequence number space to be filled, and so if a segment is lost multiple times in a row, the loss epoch may not end for several round trips. Because both should reduce their congestion windows only once per epoch, QUIC will do it correctly once for every round trip that experiences loss, while TCP may only do it once across multiple round trips. QUIC starts a loss epoch when a packet is lost and ends one when any packet sent after the epoch starts is acknowledged. TCP waits for the gap in the sequence number space to be filled, and so if a segment is lost multiple times in a row, the loss epoch may not end for several round trips. Because both should reduce their congestion windows only once per epoch, QUIC will do it correctly once for every round trip that experiences loss, while TCP may only do it once across multiple round trips. 3.1.4."}
{"_id":"doc-en-quicwg-base-drafts-96391d0d7d01c0422b2f1f5ef2cec9471d3532a8337a53ad061e6fd03694c7cf","title":"","text":"(request-response). Multiplexing of requests is performed using the QUIC stream abstraction, described in Section 2 of QUIC-TRANSPORT. Each request and response consumes a single QUIC stream. Streams are independent abstraction, described in Section 2 of QUIC-TRANSPORT. Each request- response pair consumes a single QUIC stream. Streams are independent of each other, so one stream that is blocked or suffers packet loss does not prevent progress on other streams."}
{"_id":"doc-en-quicwg-base-drafts-299685253442b59e047fa4d53dba9de592e6910051e34d9c3c8e7742eedc6e14","title":"","text":"The RECOMMENDED initial value for the packet reordering threshold (kPacketThreshold) is 3, based on best practices for TCP loss detection RFC5681 RFC6675. detection RFC5681 RFC6675. Implementations SHOULD NOT use a packet threshold less than 3, to keep in line with TCP RFC5681. Some networks may exhibit higher degrees of reordering, causing a sender to detect spurious losses. Implementers MAY use algorithms"}
{"_id":"doc-en-quicwg-base-drafts-7c1b073779ddc06de8afa29a073bde2e766d1a974dc0a73e0974910845a10d55","title":"","text":"Endpoints validate ECN for packets sent on each network path independently. An endpoint thus validates ECN on new connection establishment, when switching to a new server preferred address, and on active connection migration to a new path. on active connection migration to a new path. ecn-alg describes one possible algorithm for testing paths for ECN support. Even if an endpoint does not use ECN markings on packets it transmits, the endpoint MUST provide feedback about ECN markings"}
{"_id":"doc-en-quicwg-base-drafts-7831c4b61e977c93a3309c06e059eaf7bf17e3ca0c0bf29be344856f22af7d87","title":"","text":"carry this connection ID for the duration of the connection or until its peer invalidates the connection ID via a RETIRE_CONNECTION_ID frame (frame-retire-connection-id). Connection IDs that are issued and not retired are considered active; any active connection ID can be used. and not retired are considered active; any active connection ID is valid for use at any time, in any packet type. This includes the connection ID issued by the server via the preferred_address transport parameter. An endpoint SHOULD ensure that its peer has a sufficient number of available and unused connection IDs. Endpoints store received"}
{"_id":"doc-en-quicwg-base-drafts-1d9057684f44062df63310f8d68523499934f5047200794ffa666a54a0d71f96","title":"","text":"All HTTP/3 requests MUST include exactly one value for the \":method\", \":scheme\", and \":path\" pseudo-header fields, unless it is a CONNECT request (connect). An HTTP request that omits mandatory pseudo- header fields or contains invalid values for those fields is malformed (malformed). request (connect). If the \":scheme\" pseudo-header field identifies a scheme which has a mandatory authority component (including \"http\" and \"https\"), the request MUST contain either an \":authority\" pseudo-header field or a \"Host\" header field. If these fields are present, they MUST NOT be empty. If both fields are present, they MUST contain the same value. If the scheme does not have a mandatory authority component and none is provided in the request target, the request MUST NOT contain the \":authority\" pseudo-header and \"Host\" header fields. An HTTP request that omits mandatory pseudo-header fields or contains invalid values for those fields is malformed (malformed). HTTP/3 does not define a way to carry the version identifier that is included in the HTTP/1.1 request line."}
{"_id":"doc-en-quicwg-base-drafts-f060a48bc7df838dcaa12b13e0f698902b5f15d26ad4f969b1349e8469217a76","title":"","text":"A packet that does not increase the largest received packet number for its packet number space (packet-numbers) by exactly one. A packet can arrive out of order if it is delayed or if earlier packets are lost or delayed. packet can arrive out of order if it is delayed, if earlier packets are lost or delayed, or if the sender intentionally skips a packet number. An entity that can participate in a QUIC connection by generating, receiving, and processing QUIC packets. There are only two types"}
{"_id":"doc-en-quicwg-base-drafts-0065619791ef9b670100f7f7c51456c090d14b6c3d30d3037f01328d72e11330","title":"","text":"Servers MUST drop incoming packets under all other circumstances. 5.2.3. A server deployment could load balance among servers using only source and destination IP addresses and ports. Changes to the client's IP address or port could result in packets being forwarded to the wrong server. Such a server deployment could use one of the following methods for connection continuity when a client's address changes. Servers could use an out-of-band mechanism to forward packets to the correct server based on Connection ID. If servers can use other dedicated server IP addresses or ports than the one that the client initially connects to, they could use the preferred_address transport parameter to request that clients move connections to these dedicated addresses. Note that clients could choose not to use the preferred address. A server in a deployment that does not implement a solution to maintain connection continuity during connection migration SHOULD disallow migration using the disable_active_migration transport parameter. Server deployments that use this simple form of load balancing MUST avoid the creation of a stateless reset oracle; see reset-oracle. 5.3. A QUIC connection is a stateful interaction between a client and"}
{"_id":"doc-en-quicwg-base-drafts-aa347efcecc038b0915ef4514751ac9f9acfb273ecb71cc436769da2f884961d","title":"","text":"in connection failures, as the issuing endpoint might be unable to continue using the connection IDs with the active connection. An endpoint SHOULD limit the number of connection IDs it has retired locally and have not yet been acknowledged. An endpoint SHOULD allow for sending and tracking a number of RETIRE_CONNECTION_ID frames of at least twice the active_connection_id limit. An endpoint MUST NOT forget a connection ID without retiring it, though it MAY choose to treat having connection IDs in need of retirement that exceed this limit as a connection error of type CONNECTION_ID_LIMIT_ERROR. Endpoints SHOULD NOT issue updates of the Retire Prior To field before receiving RETIRE_CONNECTION_ID frames that retire all connection IDs indicated by the previous Retire Prior To value. 5.2. Incoming packets are classified on receipt. Packets can either be"}
{"_id":"doc-en-quicwg-base-drafts-2fdbb05f4ad4deec4e1db3c78fd19c665a1e7a7341d63f2fe105aea679b09d98","title":"","text":"7. TBD. Also see Section 7.1 of RFC7541. This section describes potential areas of security concern with QPACK: Use of compression as a length-based oracle for verifying guesses about secrets that are compressed into a shared compression context. Denial of service resulting from exhausting processing or memory capacity at a decoder. 7.1. QPACK reduces the length of header field encodings by exploiting the redundancy inherent in protocols like HTTP. The ultimate goal of this is to reduce the amount of data that is required to send HTTP requests or responses. The compression context used to encode header fields can be probed by an attacker who can both define header fields to be encoded and transmitted and observe the length of those fields once they are encoded. When an attacker can do both, they can adaptively modify requests in order to confirm guesses about the dynamic table state. If a guess is compressed into a shorter length, the attacker can observe the encoded length and infer that the guess was correct. This is possible even over the Transport Layer Security Protocol (TLS, see RFC5246), because while TLS provides confidentiality protection for content, it only provides a limited amount of protection for the length of that content. Padding schemes only provide limited protection against an attacker with these capabilities, potentially only forcing an increased number of guesses to learn the length associated with a given guess. Padding schemes also work directly against compression by increasing the number of bits that are transmitted. Attacks like CRIME CRIME demonstrated the existence of these general attacker capabilities. The specific attack exploited the fact that DEFLATE RFC1951 removes redundancy based on prefix matching. This permitted the attacker to confirm guesses a character at a time, reducing an exponential-time attack into a linear-time attack. 7.2. QPACK mitigates but does not completely prevent attacks modeled on CRIME CRIME by forcing a guess to match an entire header field value, rather than individual characters. An attacker can only learn whether a guess is correct or not, so is reduced to a brute force guess for the header field values. The viability of recovering specific header field values therefore depends on the entropy of values. As a result, values with high entropy are unlikely to be recovered successfully. However, values with low entropy remain vulnerable. Attacks of this nature are possible any time that two mutually distrustful entities control requests or responses that are placed onto a single HTTP/3 connection. If the shared QPACK compressor permits one entity to add entries to the dynamic table, and the other to access those entries, then the state of the table can be learned. Having requests or responses from mutually distrustful entities occurs when an intermediary either: sends requests from multiple clients on a single connection toward an origin server, or takes responses from multiple origin servers and places them on a shared connection toward a client. Web browsers also need to assume that requests made on the same connection by different web origins RFC6454 are made by mutually distrustful entities. 7.3. Users of HTTP that require confidentiality for header fields can use values with entropy sufficient to make guessing infeasible. However, this is impractical as a general solution because it forces all users of HTTP to take steps to mitigate attacks. It would impose new constraints on how HTTP is used. Rather than impose constraints on users of HTTP, an implementation of QPACK can instead constrain how compression is applied in order to limit the potential for dynamic table probing. An ideal solution segregates access to the dynamic table based on the entity that is constructing header fields. Header field values that are added to the table are attributed to an entity, and only the entity that created a particular value can extract that value. To improve compression performance of this option, certain entries might be tagged as being public. For example, a web browser might make the values of the Accept-Encoding header field available in all requests. An encoder without good knowledge of the provenance of header fields might instead introduce a penalty for a header field with many different values, such that a large number of attempts to guess a header field value results in the header field not being compared to the dynamic table entries in future messages, effectively preventing further guesses. Simply removing entries corresponding to the header field from the dynamic table can be ineffectual if the attacker has a reliable way of causing values to be reinstalled. For example, a request to load an image in a web browser typically includes the Cookie header field (a potentially highly valued target for this sort of attack), and web sites can easily force an image to be loaded, thereby refreshing the entry in the dynamic table. This response might be made inversely proportional to the length of the header field value. Disabling access to the dynamic table for a header field might occur for shorter values more quickly or with higher probability than for longer values. 7.4. Implementations can also choose to protect sensitive header fields by not compressing them and instead encoding their value as literals. Refusing to insert a header field into the dynamic table is only effective if doing so is avoided on all hops. The never indexed literal bit (see literal-name-reference) can be used to signal to intermediaries that a particular value was intentionally sent as a literal. An intermediary MUST NOT re-encode a value that uses a literal representation with the 'N' bit set with another representation that would index it. If QPACK is used for re-encoding, a literal representation with the 'N' bit set MUST be used. If HPACK is used for re-encoding, the never indexed literal representation (see Section 6.2.3 of RFC7541) MUST be used. The choice to mark that a header field should never be indexed depends on several factors. Since QPACK doesn't protect against guessing an entire header field value, short or low-entropy values are more readily recovered by an adversary. Therefore, an encoder might choose not to index values with low entropy. An encoder might also choose not to index values for header fields that are considered to be highly valuable or sensitive to recovery, such as the Cookie or Authorization header fields. On the contrary, an encoder might prefer indexing values for header fields that have little or no value if they were exposed. For instance, a User-Agent header field does not commonly vary between requests and is sent to any server. In that case, confirmation that a particular User-Agent value has been used provides little value. Note that these criteria for deciding to use a never indexed literal representation will evolve over time as new attacks are discovered. 7.5. There is no currently known attack against a static Huffman encoding. A study has shown that using a static Huffman encoding table created an information leakage, however this same study concluded that an attacker could not take advantage of this information leakage to recover any meaningful amount of information (see PETAL). 7.6. An attacker can try to cause an endpoint to exhaust its memory. QPACK is designed to limit both the peak and stable amounts of memory allocated by an endpoint. The amount of memory used by the encoder is limited by the protocol using QPACK through the definition of the maximum size of the dynamic table, and the maximum number of blocking streams. In HTTP/3, these values are controlled by the decoder through the settings parameters SETTINGS_QPACK_MAX_TABLE_CAPACITY and SETTINGS_QPACK_BLOCKED_STREAMS, respectively (see maximum-dynamic-table-capacity and blocked- streams). The limit on the size of the dynamic table takes into account the size of the data stored in the dynamic table, plus a small allowance for overhead. The limit on the number of blocked streams is only a proxy for the maximum amount of memory required by the decoder. The actual maximum amount of memory will depend on how much memory the decoder uses to track each blocked stream. A decoder can limit the amount of state memory used for the dynamic table by setting an appropriate value for the maximum size of the dynamic table. In HTTP/3, this is realized by setting an appropriate value for the SETTINGS_QPACK_MAX_TABLE_CAPACITY parameter. An encoder can limit the amount of state memory it uses by signaling a lower dynamic table size than the decoder allows (see eviction). A decoder can limit the amount of state memory used for blocked streams by setting an appropriate value for the maximum number of blocked streams. In HTTP/3, this is realized by setting an appropriate value for the QPACK_BLOCKED_STREAMS parameter. An encoder can limit the amount of state memory by only using as many blocked streams as it wishes to support; no signaling to the decoder is requred. The amount of temporary memory consumed by an encoder or decoder can be limited by processing header fields sequentially. A decoder implementation does not need to retain a complete list of header fields while decoding a header block. An encoder implementation does not need to retain a complete list of header fields while encoding a header block if it is using a single-pass algorithm. Note that it might be necessary for an application to retain a complete header list for other reasons; even if QPACK does not force this to occur, application constraints might make this necessary. While the negotiated limit on the dynamic table size accounts for much of the memory that can be consumed by a QPACK implementation,"}
{"_id":"doc-en-quicwg-base-drafts-e3dc4b9c7c706c5198134c8f6bec70d6a0907befd89649ea9197535a6a745808","title":"","text":"new streams, reading only from the encoder stream, or closing the connection. 7.7. An implementation of QPACK needs to ensure that large values for integers, long encoding for integers, or long string literals do not create security weaknesses. An implementation has to set a limit for the values it accepts for integers, as well as for the encoded length (see prefixed-integers). In the same way, it has to set a limit to the length it accepts for string literals (see string-literals). 8. 8.1."}
{"_id":"doc-en-quicwg-base-drafts-846d33f6056ed00af1679be1102afcb47438ff9573a15481f3f166cebb470f92","title":"","text":"would be too large to fit in a packet, however receivers MAY also limit ACK frame size further to preserve space for other frames. When discarding unacknowledged ACK Ranges, a receiver MUST retain the largest received packet number. A receiver SHOULD retain ACK Ranges containing newly received packets or higher-numbered packets. A receiver MUST retain an ACK Range unless it can ensure that it will not subsequently accept packets with numbers in that range. Maintaining a minimum packet number that increases as ranges are discarded is one way to achieve this with minimal state. Receivers can discard all ACK Ranges, but they MUST retain the largest packet number that has been successfully processed as that is used to recover packet numbers from subsequent packets; see packet- encoding. A receiver SHOULD include an ACK Range containing the largest received packet number in every ACK frame. The Largest Acknowledged field is used in ECN validation at a sender and including a lower value than what was included in a previous ACK frame could cause ECN to be unnecessarily disabled; see ecn-validation. A receiver that sends only non-ack-eliciting packets, such as ACK frames, might not receive an acknowledgement for a long period of"}
{"_id":"doc-en-quicwg-base-drafts-c3e17f5c3c62d78e058487ee04b2de06b533ee8bea738ab764574f3101ea918d","title":"","text":"21.12.1. The QUIC handshake incorporates the TLS 1.3 handshake and enjoys the cryptographic properties described in Appendix E.1 of TLS13. cryptographic properties described in Appendix E.1 of TLS13. Many of the security properties of QUIC depend on the TLS handshake providing these properties. Any attack on the TLS handshake could affect QUIC. In addition to those properties, the handshake is intended to provide some defense against DoS attacks on the handshake, as described below. Any attack on the TLS handshake that compromises the secrecy or uniqueness of session keys affects other security guarantees provided by QUIC that depends on these keys. For instance, migration (migration) depends on the efficacy of confidentiality protections, both for the negotiation of keys using the TLS handshake and for QUIC packet protection, to avoid linkability across network paths. An attack on the integrity of the TLS handshake might allow an attacker to affect the selection of application protocol or QUIC version. In addition to the properties provided by TLS, the QUIC handshake provides some defense against DoS attacks on the handshake. 21.12.1.1."}
{"_id":"doc-en-quicwg-base-drafts-d0545806d0383dcd3d2041826aaef413d3c8646c629c3f43891b3d33974f9868","title":"","text":"packets being encrypted with per-version keys and the Handshake and later packets being encrypted with keys derived from the TLS key exchange. Further, parameter negotiation is folded into the TLS transcript and thus provides the same security guarantees as ordinary TLS negotiation. Thus, an attacker can observe the client's transport parameters (as long as it knows the version-specific salt) transcript and thus provides the same integrity guarantees as ordinary TLS negotiation. An attacker can observe the client's transport parameters (as long as it knows the version-specific keys) but cannot observe the server's transport parameters and cannot influence parameter negotiation."}
{"_id":"doc-en-quicwg-base-drafts-90fc021160d9a3b26648fc117a838411525c3883c949c258e938e984f726fdc0","title":"","text":"6.2.3. Stream types of the format \"0x1f * N + 0x21\" for integer values of N are reserved to exercise the requirement that unknown types be ignored. These streams have no semantics, and can be sent when application-layer padding is desired. They MAY also be sent on Stream types of the format \"0x1f * N + 0x21\" for non-negative integer values of N are reserved to exercise the requirement that unknown types be ignored. These streams have no semantics, and can be sent when application-layer padding is desired. They MAY also be sent on connections where no data is currently being transferred. Endpoints MUST NOT consider these streams to have any meaning upon receipt."}
{"_id":"doc-en-quicwg-base-drafts-e7efccf1231fd0fb3e06f0dd75b948e5cdc50b8df3e1d5f26989ba30f2b9994e","title":"","text":"The default value is unlimited. See header-formatting for usage. Setting identifiers of the format \"0x1f * N + 0x21\" for integer values of N are reserved to exercise the requirement that unknown identifiers be ignored. Such settings have no defined meaning. Endpoints SHOULD include at least one such setting in their SETTINGS frame. Endpoints MUST NOT consider such settings to have any meaning upon receipt. Setting identifiers of the format \"0x1f * N + 0x21\" for non-negative integer values of N are reserved to exercise the requirement that unknown identifiers be ignored. Such settings have no defined meaning. Endpoints SHOULD include at least one such setting in their SETTINGS frame. Endpoints MUST NOT consider such settings to have any meaning upon receipt. Because the setting has no defined meaning, the value of the setting can be any value the implementation selects."}
{"_id":"doc-en-quicwg-base-drafts-80e26556fb4c66972250fe453e5150effbc552a98b256c452d146ea0c4f59b20","title":"","text":"7.2.8. Frame types of the format \"0x1f * N + 0x21\" for integer values of N are reserved to exercise the requirement that unknown types be ignored (extensions). These frames have no semantics, and can be sent on any open stream when application-layer padding is desired. They MAY also be sent on connections where no data is currently being transferred. Endpoints MUST NOT consider these frames to have any meaning upon receipt. Frame types of the format \"0x1f * N + 0x21\" for non-negative integer values of N are reserved to exercise the requirement that unknown types be ignored (extensions). These frames have no semantics, and can be sent on any open stream when application-layer padding is desired. They MAY also be sent on connections where no data is currently being transferred. Endpoints MUST NOT consider these frames to have any meaning upon receipt. The payload and length of the frames are selected in any manner the implementation chooses."}
{"_id":"doc-en-quicwg-base-drafts-f1c565922cddbbafd29e8559d42954d2be8f8beaf4029b905fbb760c1ee70360","title":"","text":"The requested operation cannot be served over HTTP/3. The peer should retry over HTTP/1.1. Error codes of the format \"0x1f * N + 0x21\" for integer values of N are reserved to exercise the requirement that unknown error codes be treated as equivalent to H3_NO_ERROR (extensions). Implementations SHOULD select an error code from this space with some probability when they would have sent H3_NO_ERROR. Error codes of the format \"0x1f * N + 0x21\" for non-negative integer values of N are reserved to exercise the requirement that unknown error codes be treated as equivalent to H3_NO_ERROR (extensions). Implementations SHOULD select an error code from this space with some probability when they would have sent H3_NO_ERROR. 9."}
{"_id":"doc-en-quicwg-base-drafts-38e15b0a9891ddde8612073cf90d5b7f5e12be78897fbdc8a27406890f568b93","title":"","text":"The entries in iana-frame-table are registered by this document. Additionally, each code of the format \"0x1f * N + 0x21\" for integer values of N (that is, \"0x21\", \"0x40\", ..., through Additionally, each code of the format \"0x1f * N + 0x21\" for non- negative integer values of N (that is, \"0x21\", \"0x40\", ..., through \"0x3FFFFFFFFFFFFFFE\") MUST NOT be assigned by IANA. 11.2.2."}
{"_id":"doc-en-quicwg-base-drafts-168f6619b07e3433cca7fecf3551ce0da284a0078293fe1b72300f82382a0223","title":"","text":"The entries in iana-setting-table are registered by this document. Additionally, each code of the format \"0x1f * N + 0x21\" for integer values of N (that is, \"0x21\", \"0x40\", ..., through Additionally, each code of the format \"0x1f * N + 0x21\" for non- negative integer values of N (that is, \"0x21\", \"0x40\", ..., through \"0x3FFFFFFFFFFFFFFE\") MUST NOT be assigned by IANA. 11.2.3."}
{"_id":"doc-en-quicwg-base-drafts-5c39be7de1dddb95300d820ccf25f7075b4afc0e0714b0deff7ac3f191483f53","title":"","text":"The entries in the iana-error-table are registered by this document. Additionally, each code of the format \"0x1f * N + 0x21\" for integer values of N (that is, \"0x21\", \"0x40\", ..., through Additionally, each code of the format \"0x1f * N + 0x21\" for non- negative integer values of N (that is, \"0x21\", \"0x40\", ..., through \"0x3FFFFFFFFFFFFFFE\") MUST NOT be assigned by IANA. 11.2.4."}
{"_id":"doc-en-quicwg-base-drafts-d74cc27da834ca7cda960a25ccec866c7af9e7f777b6b2fbc876ac20bc843161","title":"","text":"The entries in the following table are registered by this document. Additionally, each code of the format \"0x1f * N + 0x21\" for integer values of N (that is, \"0x21\", \"0x40\", ..., through Additionally, each code of the format \"0x1f * N + 0x21\" for non- negative integer values of N (that is, \"0x21\", \"0x40\", ..., through \"0x3FFFFFFFFFFFFFFE\") MUST NOT be assigned by IANA. 12. References"}
{"_id":"doc-en-quicwg-base-drafts-a6b5d158b53179a476c9ca1de2fbebe629bcafde07b408cf233238872b7d9aaf","title":"","text":"If TLS experiences an error, it generates an appropriate alert as defined in Section 6 of TLS13. A TLS alert is turned into a QUIC connection error by converting the one-byte alert description into a QUIC error code. The alert A TLS alert is converted into a QUIC connection error. The alert description is added to 0x100 to produce a QUIC error code from the range reserved for CRYPTO_ERROR. The resulting value is sent in a QUIC CONNECTION_CLOSE frame of type 0x1c."}
{"_id":"doc-en-quicwg-base-drafts-7d7b4931f3db2261b434b4d2eb64cafbfa023f39e04fa78968c06d2fb8940795","title":"","text":"The alert level of all TLS alerts is \"fatal\"; a TLS stack MUST NOT generate alerts at the \"warning\" level. QUIC permits the use of a generic code in place of a specific error code; see Section 11 of QUIC-TRANSPORT. For TLS alerts, this includes replacing any alert with a generic alert, such as handshake_failure (0x128 in QUIC). Endpoints MAY use a generic error code to avoid possibly exposing confidential information. 4.11. After QUIC moves to a new encryption level, packet protection keys"}
{"_id":"doc-en-quicwg-base-drafts-1a64b3e1e475eff1a934081f5d09eb2cfb49330d216742290010331b7331f301","title":"","text":"Key updates MUST be initiated before usage limits on packet protection keys are exceeded. For the cipher suites mentioned in this document, the limits in Section 5.5 of TLS13 apply. Other cipher suites MUST define usage limits in order to be used with QUIC. this document, the limits in Section 5.5 of TLS13 apply. TLS13 does not specify a limit for AEAD_AES_128_CCM, but the analysis in ccm- bounds shows that a limit of 2^23 packets can be used to obtain the same confidentiality protection as the limits specified in TLS. The usage limits defined in TLS 1.3 exist for protection against attacks on confidentiality and apply to successful applications of AEAD protection. The integrity protections in authenticated encryption also depend on limiting the number of attempts to forge packets. TLS achieves this by closing connections after any record fails an authentication check. In comparison, QUIC ignores any packet that cannot be authenticated, allowing multiple forgery attempts. Endpoints MUST count the number of received packets that fail authentication for each set of keys. If the number of packets that fail authentication with the same key exceeds a limit that is specific to the AEAD in use, the endpoint MUST stop using those keys. Endpoints MUST initiate a key update before reaching this limit. If a key update is not possible, the endpoint MUST immediately close the connection. Applying a limit reduces the probability that an attacker is able to successfully forge a packet; see AEBounds and ROBUST. Due to the way that header protection protects the Key Phase, packets that are discarded are likely to have an even distribution of both Key Phase values. This means that packets that fail authentication will often use the packet protection keys from the next key phase. It is therefore necessary to also track the number of packets that fail authentication with the next set of packet protection keys. To avoid exhaustion of both sets of keys, it might be necessary to initiate two key updates in succession. For AEAD_AES_128_GCM, AEAD_AES_256_GCM, and AEAD_CHACHA20_POLY1305, the limit on the number of packets that fail authentication is 2^36. Note that the analysis in AEBounds supports a higher limit for the AEAD_AES_128_GCM and AEAD_AES_256_GCM, but this specification recommends a lower limit. For AEAD_AES_128_CCM, the limit on the number of packets that fail authentication is 2^23.5; see ccm-bounds. These limits were originally calculated using assumptions about the limits on TLS record size. The maximum size of a TLS record is 2^14 bytes. In comparison, QUIC packets can be up to 2^16 bytes. However, it is expected that QUIC packets will generally be smaller than TLS records. Where packets might be larger than 2^14 bytes in length, smaller limits might be needed. Any TLS cipher suite that is specified for use with QUIC MUST define limits on the use of the associated AEAD function that preserves margins for confidentiality and integrity. That is, limits MUST be specified for the number of packets that can be authenticated and for the number packets that can fail authentication. Providing a reference to any analysis upon which values are based - and any assumptions used in that analysis - allows limits to be adapted to varying usage conditions. 6.7."}
{"_id":"doc-en-quicwg-base-drafts-52cb123520bb18b51e005144727360331ba5d0fc4250c5e4d80a6f2ec356c3ac","title":"","text":"protocol negotiation. TLS uses Application Layer Protocol Negotiation (ALPN) ALPN to select an application protocol. Unless another mechanism is used for agreeing on an application protocol, endpoints MUST use ALPN for this purpose. When using ALPN, endpoints MUST immediately close a connection (see Section 10.3 in QUIC- TRANSPORT) if an application protocol is not negotiated with a no_application_protocol TLS alert (QUIC error code 0x178, see tls- errors). While ALPN only specifies that servers use this alert, QUIC clients MUST also use it to terminate a connection when ALPN negotiation fails. endpoints MUST use ALPN for this purpose. When using ALPN, endpoints MUST immediately close a connection (see Section 10.3 of QUIC-TRANSPORT) with a no_application_protocol TLS alert (QUIC error code 0x178; see tls-errors) if an application protocol is not negotiated. While ALPN only specifies that servers use this alert, QUIC clients MUST use error 0x178 to terminate a connection when ALPN negotiation fails. An application protocol MAY restrict the QUIC versions that it can operate over. Servers MUST select an application protocol compatible"}
{"_id":"doc-en-quicwg-base-drafts-e94c1a43125192f8ce1efc062058e721acfab07ace4d880b7d983bdb68ab80c3","title":"","text":"Including transport parameters in the TLS handshake provides integrity protection for these values. The \"extension_data\" field of the quic_transport_parameters extension The extension_data field of the quic_transport_parameters extension contains a value that is defined by the version of QUIC that is in use."}
{"_id":"doc-en-quicwg-base-drafts-a6aafc509bea258bcc34523dc696412ff77b18e8be4af1d1d87093c75dd4990f","title":"","text":"output of AEAD_AES_128_GCM AEAD used with the following inputs: The secret key, K, is 128 bits equal to 0x4d32ecdb2a2133c841e4043df27d4430. 0xccce187ed09a09d05728155a6cb96be1. The nonce, N, is 96 bits equal to 0x4d1611d05513a552c587d575. The nonce, N, is 96 bits equal to 0xe54930f97f2136f0530a8c1c. The plaintext, P, is empty."}
{"_id":"doc-en-quicwg-base-drafts-e3103ea910d4d41012f2fa33b83f1b39dae859dad85ba7794d317e15117b467c","title":"","text":"The secret key and the nonce are values derived by calling HKDF- Expand-Label using 0x656e61e336ae9417f7f0edd8d78d461e2aa7084aba7a14c1e9f726d55709169a as 0x8b0d37eb8535022ebc8d76a207d80df22646ec06dc809642c30a8baa2baaff4c as the secret, with labels being \"quic key\" and \"quic iv\" (protection- keys)."}
{"_id":"doc-en-quicwg-base-drafts-53a109e621adfe818c67aae4a75cfeb5f7111c70293d0087a30c2e471147958b","title":"","text":"The payload of an Initial packet includes a CRYPTO frame (or frames) containing a cryptographic handshake message, ACK frames, or both. PING, PADDING, and CONNECTION_CLOSE frames are also permitted. An endpoint that receives an Initial packet containing other frames can either discard the packet as spurious or treat it as a connection error. PING, PADDING, and CONNECTION_CLOSE frames of type 0x1c are also permitted. An endpoint that receives an Initial packet containing other frames can either discard the packet as spurious or treat it as a connection error. The first packet sent by a client always includes a CRYPTO frame that contains the start or all of the first cryptographic handshake"}
{"_id":"doc-en-quicwg-base-drafts-e7edb34639f41bd97ec76076b2f5b336cae9d5f09aef3e1e4ac4587a79089fb8","title":"","text":"The payload of this packet contains CRYPTO frames and could contain PING, PADDING, or ACK frames. Handshake packets MAY contain CONNECTION_CLOSE frames. Endpoints MUST treat receipt of Handshake packets with other frames as a connection error. CONNECTION_CLOSE frames of type 0x1c. Endpoints MUST treat receipt of Handshake packets with other frames as a connection error. Like Initial packets (see discard-initial), data in CRYPTO frames for Handshake packets is discarded - and no longer retransmitted - when"}
{"_id":"doc-en-quicwg-base-drafts-b1885964e937944be147a9bc02ee7e1beaf409ba648f16bb0f083c3916940b66","title":"","text":"Indicates that x is repeated zero or more times (and that each instance is length E) This document uses network byte order (that is, big endian) values. Fields are placed starting from the high-order bits of each byte. fig-ex-format shows an example structure: 5."}
{"_id":"doc-en-quicwg-base-drafts-8f8b3bbec9ca7ea4b1a2b8c5b6e70f31f2512ba432bd28bb174fc18a539fb912","title":"","text":"A QUIC packet with a long header has the high bit of the first byte set to 1. All other bits in that byte are version specific. The next four bytes include a 32-bit Version field (see version). The next four bytes include a 32-bit Version field. Versions are described in version. The next byte contains the length in bytes of the Destination Connection ID (see connection-id) field that follows it. This length is encoded as an 8-bit unsigned integer. The Destination Connection ID field follows the DCID Length field and is between 0 and 255 bytes in length. Connection ID field that follows it. This length is encoded as an 8-bit unsigned integer. The Destination Connection ID field follows the Destination Connection ID Length field and is between 0 and 255 bytes in length. Connection IDs are described in connection-id. The next byte contains the length in bytes of the Source Connection ID field that follows it. This length is encoded as a 8-bit unsigned integer. The Source Connection ID field follows the SCID Length field and is between 0 and 255 bytes in length. integer. The Source Connection ID field follows the Source Connection ID Length field and is between 0 and 255 bytes in length. The remainder of the packet contains version-specific content."}
{"_id":"doc-en-quicwg-base-drafts-cd9febf26a13ba6bc217f581288176cccd3c544979836d0c14b500e2cca689b5","title":"","text":"A QUIC packet with a short header includes a Destination Connection ID immediately following the first byte. The short header does not include the Connection ID Lengths, Source Connection ID, or Version fields. The length of the Destination Connection ID is not specified fields. The length of the Destination Connection ID is not encoded in packets with a short header and is not constrained by this specification."}
{"_id":"doc-en-quicwg-base-drafts-c950b34f857f1f54a2916e9590608a234e8571bbf520edfe9083f2d77e687c1d","title":"","text":"The primary function of a connection ID is to ensure that changes in addressing at lower protocol layers (UDP, IP, and below) don't cause packets for a QUIC connection to be delivered to the wrong endpoint. The connection ID is used by endpoints and the intermediaries that support them to ensure that each QUIC packet can be delivered to the correct instance of an endpoint. At the endpoint, the connection ID is used to identify which QUIC connection the packet is intended for. packets for a QUIC connection to be delivered to the wrong QUIC endpoint. The connection ID is used by endpoints and the intermediaries that support them to ensure that each QUIC packet can be delivered to the correct instance of an endpoint. At the endpoint, the connection ID is used to identify which QUIC connection the packet is intended for. The connection ID is chosen by each endpoint using version-specific methods. Packets for the same QUIC connection might use different"}
{"_id":"doc-en-quicwg-base-drafts-5cdbee034bb2db13cd249dd87e0f92f795ccff91f73185a454dd13fe0defd16a","title":"","text":"Indicates that x is repeated zero or more times (and that each instance is length E) This document uses network byte order (that is, big endian) values. Fields are placed starting from the high-order bits of each byte. By convention, individual fields reference a complex field by using the name of the complex field."}
{"_id":"doc-en-quicwg-base-drafts-1b1ea5a27cf531b7f0499c07f466f1aa3f9947d3ba086d4ed6432a7c31ecb577","title":"","text":"packet protection keys for Initial packets. The client populates the Source Connection ID field with a value of its choosing and sets the SCID Length field to indicate the length. its choosing and sets the Source Connection ID Length field to indicate the length. The first flight of 0-RTT packets use the same Destination Connection ID and Source Connection ID values as the client's first Initial"}
{"_id":"doc-en-quicwg-base-drafts-f9322b93ac03e496c27187cc2b46880920f45fbd8647a7afa0408e5e36ebfb73","title":"","text":"If a zero-length connection ID is selected, the corresponding transport parameter is included with a zero-length value. fig-auth-cid shows the connection IDs that are used in a complete fig-auth-cid shows the connection IDs (with DCID=Destination Connection ID, SCID=Source Connection ID) that are used in a complete handshake. The exchange of Initial packets is shown, plus the later exchange of 1-RTT packets that includes the connection ID established during the handshake."}
{"_id":"doc-en-quicwg-base-drafts-42592eebf8d08d39a0cd975c8c7e592b904ed114a35248f87844110fd85aaccb","title":"","text":"SHOULD be able to read longer connection IDs from other QUIC versions in order to properly form a version negotiation packet. The Destination Connection ID field follows the DCID Length field and is between 0 and 20 bytes in length. negotiating-connection- ids describes the use of this field in more detail. The Destination Connection ID field follows the Destination Connection ID Length field and is between 0 and 20 bytes in length. negotiating-connection-ids describes the use of this field in more detail. The byte following the Destination Connection ID contains the length in bytes of the Source Connection ID field that follows it."}
{"_id":"doc-en-quicwg-base-drafts-7a4514e65081d1282bd90cb33636f04ddc1cf1d9968a634988ca845bd4946169","title":"","text":"IDs from other QUIC versions in order to properly form a version negotiation packet. The Source Connection ID field follows the SCID Length field and is between 0 and 20 bytes in length. negotiating-connection-ids describes the use of this field in more detail. The Source Connection ID field follows the Source Connection ID Length field and is between 0 and 20 bytes in length. negotiating- connection-ids describes the use of this field in more detail. In this version of QUIC, the following packet types with the long header are defined:"}
{"_id":"doc-en-quicwg-base-drafts-57cc1eab65c26ba5adf72ae8fa1601491b39528d0f563069d40bc135d9d76827","title":"","text":"The Initial packet contains a long header as well as the Length and Packet Number fields. The first byte contains the Reserved and Packet Number Length bits. Between the SCID and Length fields, there are two additional fields specific to the Initial packet. Packet Number Length bits. Between the Source Connection ID and Length fields, there are two additional fields specific to the Initial packet. A variable-length integer specifying the length of the Token field, in bytes. This value is zero if no token is present."}
{"_id":"doc-en-quicwg-base-drafts-2083c3e6000de131dcbf0c7b37973872255d9fcc956d2790285b60e2e9876f82","title":"","text":"transport parameter; see termination. However, state in middleboxes might time out earlier than that. Though REQ-5 in RFC4787 recommends a 2 minute timeout interval, experience shows that sending packets every 15 to 30 seconds is necessary to prevent the majority of middleboxes from losing state for UDP flows. every 30 seconds is necessary to prevent the majority of middleboxes from losing state for UDP flows GATEWAY. 10.3."}
{"_id":"doc-en-quicwg-base-drafts-08d9794fc39d1e6af46358c0a32211fb31f4f45d4cb90430cf394994101c63ce","title":"","text":"After a client receives a Retry packet, 0-RTT packets are likely to have been lost or discarded by the server. A client SHOULD attempt to resend data in 0-RTT packets after it sends a new Initial packet. A client MUST NOT reset the packet number it uses for 0-RTT packets, since the keys used to protect 0-RTT packets will not change as a result of responding to a Retry packet. Sending packets with the same packet number in that case is likely to compromise the packet protection for all 0-RTT packets because the same key and nonce could be used to protect different content. New packet numbers MUST be used for any new packets that are sent; as described in retry-continue, reusing packet numbers could compromise packet protection. A client only receives acknowledgments for its 0-RTT packets once the handshake is complete. Consequently, a server might expect 0-RTT"}
{"_id":"doc-en-quicwg-base-drafts-c47aa28b6483a8ae661f8730e61229e50b82c23bec74a797f09902f1b00fe4c7","title":"","text":"response to receiving a Retry. A client MUST NOT reset the packet number for any packet number space after processing a Retry packet; packet-0rtt contains more information on this. after processing a Retry packet. In particular, 0-RTT packets contain confidential information that will most likely be retransmitted on receiving a Retry packet. The keys used to protect these new 0-RTT packets will not change as a result of responding to a Retry packet. However, the data sent in these packets could be different than what was sent earlier. Sending these new packets with the same packet number is likely to compromise the packet protection for those packets because the same key and nonce could be used to protect different content. A server acknowledges the use of a Retry packet for a connection using the retry_source_connection_id transport parameter; see"}
{"_id":"doc-en-quicwg-base-drafts-fd55f0a0ac7ae84787c13bdc4a9da52a7a8eebc779c11113d385fe033d469f7f","title":"","text":"12.1. All QUIC packets except Version Negotiation packets use authenticated encryption with additional data (AEAD) RFC5116 to provide encryption with associated data (AEAD) RFC5116 to provide confidentiality and integrity protection. Retry packets use AEAD to provide integrity protection. Details of packet protection are found in QUIC-TLS; this section includes an overview of the process."}
{"_id":"doc-en-quicwg-base-drafts-06e2c13acbf927a18ef47c6dc31520fddc2c5c783e38e6ae7e2c2136e0398add","title":"","text":"Authenticated and encrypted header and payload QUIC uses UDP as a substrate to avoid requiring changes to legacy client operating systems and middleboxes. QUIC authenticates all of its headers and encrypts most of the data it exchanges, including its signaling, to avoid incurring a dependency on middleboxes. QUIC establishes a connection, which is a stateful interaction between a client and server. The primary purpose of a connection is to support the structured exchange of data by an application protocol. Streams are means by which an application protocol exchanges information. Streams are ordered sequences of bytes. Two types of stream can be created: bidirectional streams, which allow both endpoints to send data; and unidirectional streams, which allow a single endpoint to send. A credit-based scheme is used to limit stream creation and to bound the amount of data that can be sent. The QUIC handshake combines negotiation of cryptographic and transport parameters. The handshake is structured to permit the exchange of application data as soon as possible. This includes an option for clients to send data immediately (0-RTT), which might require prior communication to enable. QUIC connections are not strictly bound to a single network path. Connection migration uses connection identifiers to allow connections to transfer to a new network path. Frames are used in QUIC to communicate between endpoints. One or more frames are assembled into packets. QUIC authenticates all packets and encrypts as much as is practical. QUIC packets are carried in UDP datagrams to better facilitate deployment in existing systems and networks. Once established, multiple options are provided for connection termination. Applications can manage a graceful shutdown, endpoints can negotiate a timeout period, errors can cause immediate connection teardown, and a stateless mechanism provides for termination of connections after one endpoint has lost state. 1.1."}
{"_id":"doc-en-quicwg-base-drafts-04ace5a5f262064f11e5390128c1d5c593522bcb1441199c43ede1649d8ac884","title":"","text":"5. QUIC's connection establishment combines version negotiation with the cryptographic and transport handshakes to reduce connection establishment latency, as described in handshake. During connection establishment, each side validates the peer's address, as described in address-validation. Once established, a connection may migrate to a different IP or port at either endpoint as described in migration. Finally, a connection may be terminated by either endpoint, as described in termination. A QUIC connection is shared state between a client and a server. Each connection starts with a handshake phase, during which the two endpoints establish a shared secret using the cryptographic handshake protocol QUIC-TLS and negotiate the application protocol. The handshake (handshake) confirms that both endpoints are willing to communicate (validate-handshake) and establishes parameters for the connection (transport-parameters). An application protocol can use the connection during the handshake phase with some limitations. 0-RTT allows application data to be sent by a client before receiving a response from the server. However, 0-RTT provides no protection against replay attacks; see Section 9.2 of QUIC-TLS. A server can also send application data to a client before it receives the final cryptographic handshake messages that allow it to confirm the identity and liveness of the client. These capabilities allow an application protocol to offer the option of trading some security guarantees for reduced latency. The use of connection IDs (connection-id) allows connections to migrate to a new network path, both as a direct choice of an endpoint and when forced by a change in a middlebox. migration describes mitigations for the security and privacy issues associated with migration. For connections that are no longer needed or desired, there are several ways for a client and server to terminate a connection (termination). 5.1."}
{"_id":"doc-en-quicwg-base-drafts-a77902f1b3d3a1134b96cf1399111c5c9095677006dbd740304e330ef6315ced","title":"","text":"5.3. A QUIC connection is a stateful interaction between a client and server, the primary purpose of which is to support the exchange of data by an application protocol. Streams (streams) are the primary means by which an application protocol exchanges information. Each connection starts with a handshake phase, during which client and server establish a shared secret using the cryptographic handshake protocol QUIC-TLS and negotiate the application protocol. The handshake (handshake) confirms that both endpoints are willing to communicate (validate-handshake) and establishes parameters for the connection (transport-parameters). An application protocol can also operate in a limited fashion during the handshake phase. 0-RTT allows application data to be sent by a client before receiving any response from the server. However, 0-RTT lacks certain key security guarantees. In particular, there is no protection against replay attacks in 0-RTT; see QUIC-TLS. Separately, a server can also send application data to a client before it receives the final cryptographic handshake messages that allow it to confirm the identity and liveness of the client. These capabilities allow an application protocol to offer the option to trade some security guarantees for reduced latency. The use of connection IDs (connection-id) allows connections to migrate to a new network path, both as a direct choice of an endpoint and when forced by a change in a middlebox. migration describes mitigations for the security and privacy issues associated with migration. For connections that are no longer needed or desired, there are several ways for a client and server to terminate a connection (termination). 5.4. There are certain operations that an application MUST be able to perform when interacting with the QUIC transport. This document does not specify an API, but any implementation of this version of QUIC"}
{"_id":"doc-en-quicwg-base-drafts-2b8ab3839dd0824200190ace31eb39cb70458aa1bc897e1d21b337fc7d4e2574","title":"","text":"ordered delivery of cryptographic handshake data start from zero in each packet number space. fig-hs shows a simplied handshake and the exchange of packets and frames that are used to advance the handshake. Exchange of application data during the handshake is enabled where possible, shown with a '*'. Once completed, endpoints are able to exchange application data. Endpoints MUST explicitly negotiate an application protocol. This avoids situations where there is a disagreement about the protocol that is in use."}
{"_id":"doc-en-quicwg-base-drafts-3d179a5e50962dc7e89af4cc08b9d194054429474950ae3f762b29c3a039ce83","title":"","text":"A stateless reset uses an entire UDP datagram, starting with the first two bits of the packet header. The remainder of the first byte and an arbitrary number of bytes following it that are set to unpredictable values. The last 16 bytes of the datagram contain a Stateless Reset Token. and an arbitrary number of bytes following it that are set to values that SHOULD be indistinguishable from random. The last 16 bytes of the datagram contain a Stateless Reset Token. To entities other than its intended recipient, a stateless reset will appear to be a packet with a short header. For the stateless reset"}
{"_id":"doc-en-quicwg-base-drafts-53233dff404100f13efd5972818226ef1bacdcc86b149f45cb5b56f9e6140408","title":"","text":"This 8-byte field contains arbitrary data. A PATH_CHALLENGE frame containing 8 bytes that are hard to guess is sufficient to ensure that it is easier to receive the packet than it is to guess the value correctly. Including 64 bits of entropy in a PATH_CHALLENGE frame ensures that it is easier to receive the packet than it is to guess the value correctly. The recipient of this frame MUST generate a PATH_RESPONSE frame (frame-path-response) containing the same Data."}
{"_id":"doc-en-quicwg-base-drafts-b5a8736379abb0f6f316279e91a1f69c3d393a6c53706ba22191058b13509efa","title":"","text":"Any received 0-RTT data that the server responds to might be due to a replay attack. Therefore, the server's use of 1-RTT keys MUST be limited to sending data before the handshake is complete. A server MUST NOT process Therefore, the server's use of 1-RTT keys before the handshake is complete is limited to sending data. A server MUST NOT process incoming 1-RTT protected packets before the TLS handshake is complete. Because sending acknowledgments indicates that all frames in a packet have been processed, a server cannot send acknowledgments"}
{"_id":"doc-en-quicwg-base-drafts-26f50c22462fef2f64fafbb9cd014aa1f848d7ed24544cb2a436b712b27cb0b6","title":"","text":"receiving a TLS ClientHello. The server MAY retain these packets for later decryption in anticipation of receiving a ClientHello. A client generally receives 1-RTT keys at the same time as the handshake completes. Even if it has 1-RTT secrets, a client MUST NOT process incoming 1-RTT protected packets before the TLS handshake is complete. 5.8. Retry packets (see the Retry Packet section of QUIC-TRANSPORT) carry"}
{"_id":"doc-en-quicwg-base-drafts-7805168079f72e03faacf556ed29cc09991f049f343ecb958a9c7c02fc09ebd4","title":"","text":"Invalid packets without packet protection, such as Initial, Retry, or Version Negotiation, MAY be discarded. An endpoint MUST generate a connection error if it commits changes to state before discovering an error. connection error if processing of the contents of these packets prior to discovering an error resulted in changes to the state of a connection that cannot be reverted. 5.2.1."}
{"_id":"doc-en-quicwg-base-drafts-3106c22eb416218b7a73388c4947dd5e865a119e321ea94f0685972a3691574f","title":"","text":"On the other hand, reducing the frequency of packets that carry only acknowledgements reduces packet transmission and processing cost at both endpoints. It can also improve connection throughput on severely asymmetric links; see Section 3 of RFC3449. both endpoints. It can improve connection throughput on severely asymmetric links and reduce the volume of acknowledgment traffic using return path capacity; see Section 3 of RFC3449. A receiver SHOULD send an ACK frame after receiving at least two ack- eliciting packets. This recommendation is general in nature and"}
{"_id":"doc-en-quicwg-base-drafts-1ddb32caab0d3c9fa2c81f979a95516816becd979e31eba9ee02b2dfcaa7b384","title":"","text":"constants-of-interest) for a new path, but the delay SHOULD NOT be considered an RTT sample. Prior to handshake completion, when few to none RTT samples have been generated, it is possible that the probe timer expiration is due to an incorrect RTT estimate at the client. To allow the client to improve its RTT estimate, the new packet that it sends MUST be ack- eliciting. Initial packets and Handshake packets could be never acknowledged, but they are removed from bytes in flight when the Initial and Handshake keys are discarded, as described below in discarding-"}
{"_id":"doc-en-quicwg-base-drafts-da7a226a82f81f7d8155dabfd95df3d161084cc0725c6a92cbc4c84989dc2b0d","title":"","text":"6.2.4. When a PTO timer expires, a sender MUST send at least one ack- eliciting packet in the packet number space as a probe, unless there is no data available to send. An endpoint MAY send up to two full- sized datagrams containing ack-eliciting packets, to avoid an expensive consecutive PTO expiration due to a single lost datagram or transmit data from multiple packet number spaces. All probe packets sent on a PTO MUST be ack-eliciting. eliciting packet in the packet number space as a probe. An endpoint MAY send up to two full-sized datagrams containing ack-eliciting packets, to avoid an expensive consecutive PTO expiration due to a single lost datagram or transmit data from multiple packet number spaces. All probe packets sent on a PTO MUST be ack-eliciting. In addition to sending data in the packet number space for which the timer expired, the sender SHOULD send ack-eliciting packets from"}
{"_id":"doc-en-quicwg-base-drafts-86b68852f338a2251d9f488cef6a8bb5df5868ddaa31cd6295d10a712d144dce","title":"","text":"5.2. min_rtt is the minimum RTT observed for a given network path. min_rtt is set to the latest_rtt on the first RTT sample, and to the lesser of min_rtt and latest_rtt on subsequent samples. In this document, min_rtt is used by loss detection to reject implausibly small rtt samples. min_rtt is the sender's estimate of the minimum RTT observed for a given network path. In this document, min_rtt is used by loss detection to reject implausibly small rtt samples. min_rtt MUST be set to the latest_rtt on the first RTT sample. min_rtt MUST be set to the lesser of min_rtt and latest_rtt (latest- rtt) on all other samples. An endpoint uses only locally observed times in computing the min_rtt and does not adjust for acknowledgment delays reported by the peer."}
{"_id":"doc-en-quicwg-base-drafts-f5ff68bee34fca264efa276946fef766a773cc6c80851af24c29bd029c720cac","title":"","text":"The RTT for a network path may change over time. If a path's actual RTT decreases, the min_rtt will adapt immediately on the first low sample. If the path's actual RTT increases, the min_rtt will not adapt to it, allowing future RTT samples that are smaller than the new RTT to be included in smoothed_rtt. sample. If the path's actual RTT increases however, the min_rtt will not adapt to it, allowing future RTT samples that are smaller than the new RTT to be included in smoothed_rtt. Endpoints SHOULD set the min_rtt to the newest RTT sample after persistent congestion is established. This is to allow a connection to reset its estimate of min_rtt and smoothed_rtt (smoothed-rtt) after a disruptive network event, and because it is possible that an increase in path delay resulted in persistent congestion being incorrectly declared. Endpoints MAY re-establish the min_rtt at other times in the connection, such as when traffic volume is low and an acknowledgement is received with a low acknowledgement delay. Implementations SHOULD NOT refresh the min_rtt value too often, since the actual minimum RTT of the path is not frequently observable. 5.3."}
{"_id":"doc-en-quicwg-base-drafts-d5de768a9022304079560bc7937d2ff655792f4b3a0d7b37ae92d548c5b07c52","title":"","text":"with a value greater than 2^60, this would allow a maximum stream ID that cannot be expressed as a variable-length integer; see integer- encoding. If either is received, the connection MUST be closed immediately with a connection error of type STREAM_LIMIT_ERROR; see immediately with a connection error of type FRAME_ENCODING_ERROR; see immediate-close. Endpoints MUST NOT exceed the limit set by their peer. An endpoint"}
{"_id":"doc-en-quicwg-base-drafts-89c64bb2bae38d8e7f9d6dcebab3038da7e1d4a79ffffaf79b2a54022de9de4a","title":"","text":"address validation by sending a Retry packet (packet-retry) containing a token. This token MUST be repeated by the client in all Initial packets it sends for that connection after it receives the Retry packet. In response to processing an Initial containing a token, a server can either abort the connection or permit it to proceed. Retry packet. In response to processing an Initial containing a token that was provided in a Retry packet, a server cannot send another Retry packet; it can only refuse the connection or permit it to proceed. As long as it is not possible for an attacker to generate a valid token for its own address (see token-integrity) and the client is"}
{"_id":"doc-en-quicwg-base-drafts-843424fd7b97d5545ca29e0e8335043247da19057f2067943d75626d93fe23b5","title":"","text":"To avoid excessively small idle timeout periods, endpoints MUST increase the idle timeout period to be at least three times the current Probe Timeout (PTO). This allows for multiple PTOs to expire, and therefore multiple probes to be sent in the event of loss, prior to idle timeout. expire, and therefore multiple probes to be sent and lost, prior to idle timeout. 10.1.1."}
{"_id":"doc-en-quicwg-base-drafts-d8328efd746b8612d464978914a0c0032055c128d3dae0dce3bc494fcfa5b39e","title":"","text":"MAX_STREAMS frames; see frame-max-streams. Separate limits apply to unidirectional and bidirectional streams. If a max_streams transport parameter or MAX_STREAMS frame is received with a value greater than 2^60, this would allow a maximum stream ID that cannot be expressed as a variable-length integer; see integer- encoding. If either is received, the connection MUST be closed immediately with a connection error of type FRAME_ENCODING_ERROR; see immediate-close. If a max_streams transport parameter or a MAX_STREAMS frame is received with a value greater than 2^60, this would allow a maximum stream ID that cannot be expressed as a variable-length integer; see integer-encoding. If either is received, the connection MUST be closed immediately with a connection error of type TRANSPORT_PARAMETER_ERROR if the offending value was received in a transport parameter or of type FRAME_ENCODING_ERROR if it was received in a frame; see immediate-close. Endpoints MUST NOT exceed the limit set by their peer. An endpoint that receives a frame with a stream ID exceeding the limit it has"}
{"_id":"doc-en-quicwg-base-drafts-bd9d41c62ba050f79db0f6f8c8450b61add3472b1d3f425d9d0af9c6c9c042d3","title":"","text":"Clients SHOULD send a CANCEL_PUSH frame upon receipt of a PUSH_PROMISE frame carrying a request that is not cacheable, is not known to be safe, that indicates the presence of a request body, or for which it does not consider the server authoritative. for which it does not consider the server authoritative. Any corresponding responses MUST NOT be used or cached. Each pushed response is associated with one or more client requests. The push is associated with the request stream on which the"}
{"_id":"doc-en-quicwg-base-drafts-4d2488f6eff1094734167730a32fe37c2979cdcbf537119599a3baac526cb1f8","title":"","text":"served out of cache, overriding the actual representation that the authoritative tenant provides. Pushed responses for which an origin server is not authoritative (see connection-reuse) MUST NOT be used or cached. Clients are required to reject pushed responses for which an origin server is not authoritative; see server-push. 10.5."}
{"_id":"doc-en-quicwg-base-drafts-d7327a16000de5b56ab27ea19ed7e5d699931efcbdfa1ea142d9594d5be9c244","title":"","text":"21.6. An adversarial sender might intentionally send fragments of stream data in an attempt to cause disproportionate receive buffer memory commitment and/or creation of a large and inefficient data structure. An adversarial sender might intentionally not send portions of the stream data, causing the receiver to commit resources for the unsent data. This could cause a disproportionate receive buffer memory commitment and/or the creation of a large and inefficient data structure at the receiver. An adversarial receiver might intentionally not acknowledge packets containing stream data in an attempt to force the sender to store the"}
{"_id":"doc-en-quicwg-base-drafts-cb154a350368df017935ebf201ff0ef67e1fdc190300c13178307d3617d22c9b","title":"","text":"Using a value for \"N\" that is small, but at least 1 (for example, 1.25) ensures that variations in round-trip time do not result in under-utilization of the congestion window. Values of 'N' larger than 1 ultimately result in sending packets as acknowledgments are received rather than when timers fire, provided the congestion window is fully utilized and acknowledgments arrive at regular intervals. under-utilization of the congestion window. Practical considerations, such as packetization, scheduling delays, and computational efficiency, can cause a sender to deviate from this"}
{"_id":"doc-en-quicwg-base-drafts-8ebabc34fce599fe6868a6f9f3f4be0b4f1b71a31d98f7977e555e93c0675a7b","title":"","text":"If a path has been validated to support ECN (RFC3168, RFC8311), QUIC treats a Congestion Experienced (CE) codepoint in the IP header as a signal of congestion. This document specifies an endpoint's response when its peer receives packets with the ECN-CE codepoint. when the peer-reported ECN-CE count increases; see Section 13.4.2 of QUIC-TRANSPORT. 7.2."}
{"_id":"doc-en-quicwg-base-drafts-79a7a613b9d8036cff113783971073f4a4955a5980993904ee512eee6b4c5e7e","title":"","text":"the congestion window. The minimum congestion window is the smallest value the congestion window can decrease to as a response to loss, ECN-CE, or persistent congestion. The RECOMMENDED value is 2 * max_datagram_size. window can decrease to as a response to loss, increase in the peer- reported ECN-CE count, or persistent congestion. The RECOMMENDED value is 2 * max_datagram_size. 7.3."}
{"_id":"doc-en-quicwg-base-drafts-a68c03be5d2f153f020eaf30e60f80e0ed1e2c88e62a18eca80d3a089e2daa81","title":"","text":"increased in either slow start or congestion avoidance. This can happen due to insufficient application data or flow control limits. A sender MAY use the pipeACK method described in Section 4.3 of A sender can use the pipeACK method described in Section 4.3 of RFC7661 to determine if the congestion window is sufficiently utilized."}
{"_id":"doc-en-quicwg-base-drafts-a2da870355258fe3f28ef90bca247c3eeff4e42ea296c9f2fddcfe10f7d31c3b","title":"","text":"cause a sender to increase their send rate. This increase could result in congestion and loss. A sender MAY attempt to detect suppression of reports by marking occasional packets that they send with ECN-CE. If a packet sent with ECN-CE is not reported as having been CE marked when the packet is acknowledged, then the sender SHOULD disable ECN for that path. A sender can detect suppression of reports by marking occasional packets that it sends with an ECN-CE marking. If a packet sent with an ECN-CE marking is not reported as having been CE marked when the packet is acknowledged, then the sender can disable ECN for that path by not setting ECT codepoints in subsequent packets sent on that path RFC3168. Reporting additional ECN-CE markings will cause a sender to reduce their sending rate, which is similar in effect to advertising reduced"}
{"_id":"doc-en-quicwg-base-drafts-7c918ad9b6d3fb34b495b1bcb0729da561c1c2755d35d381a23cd2d2385ff89f","title":"","text":"packetization defines models for the transmission, retransmission, and acknowledgement of data, and packet-size specifies rules for managing the size of packets. datagram-size specifies rules for managing the size of datagrams carrying QUIC packets. Finally, encoding details of QUIC protocol elements are described in:"}
{"_id":"doc-en-quicwg-base-drafts-26d4ba548c8b1412d4337f14f9c1416740131f8e0a7a92391816d56a29e54c80","title":"","text":"14. The QUIC packet size includes the QUIC header and protected payload, but not the UDP or IP headers. A UDP datagram can include one or more QUIC packets. The datagram size refers to the total UDP payload size of a single UDP datagram carrying QUIC packets. The datagram size includes one or more QUIC packet headers and protected payloads, but not the UDP or IP headers. The maximum datagram size is defined as the largest size of UDP payload that can be sent across a network path using a single UDP datagram. QUIC depends upon a minimum IP packet size of at least 1280 bytes. This is the IPv6 minimum size (IPv6) and is also supported by most modern IPv4 networks. Assuming the minimum IP header size, this results in a QUIC maximum packet size of 1232 bytes for IPv6 and 1252 bytes for IPv4. modern IPv4 networks. Assuming the minimum IP header size of 40 bytes for IPv6 and 20 bytes for IPv4 and a UDP header size of 8 bytes, this results in a maximum datagram size of 1232 bytes for IPv6 and 1252 bytes for IPv4. The maximum datagram size MUST be at least 1200 bytes. The QUIC maximum packet size is the largest size of QUIC packet that can be sent across a network path using a single packet. Any maximum packet size larger than 1200 bytes can be discovered using Path Maximum Transmission Unit Discovery (PMTUD; see pmtud) or Datagram Packetization Layer PMTU Discovery (DPLPMTUD; see dplpmtud). Any maximum datagram size larger than 1200 bytes can be discovered using Path Maximum Transmission Unit Discovery (PMTUD; see pmtud) or Datagram Packetization Layer PMTU Discovery (DPLPMTUD; see dplpmtud). Enforcement of the max_udp_payload_size transport parameter (transport-parameter-definitions) might act as an additional limit on the maximum packet size. A sender can avoid exceeding this limit, the maximum datagram size. A sender can avoid exceeding this limit, once the value is known. However, prior to learning the value of the transport parameter, endpoints risk datagrams being lost if they send packets larger than the smallest allowed maximum packet size of 1200 bytes. datagrams larger than the smallest allowed maximum datagram size of 1200 bytes. UDP datagrams MUST NOT be fragmented at the IP layer. In IPv4 (IPv4), the DF bit MUST be set if possible, to prevent fragmentation"}
{"_id":"doc-en-quicwg-base-drafts-974e177c800c5cc23ed0b4505cf40888bd769bae4cbd56cc8934cd7c1bcfb1a2","title":"","text":"14.1. A client MUST expand the payload of all UDP datagrams carrying Initial packets to at least the smallest allowed maximum packet size (1200 bytes) by adding PADDING frames to the Initial packet or by coalescing the Initial packet; see packet-coalesce. Sending a UDP Initial packets to at least the smallest allowed maximum datagram size (1200 bytes) by adding PADDING frames to the Initial packet or by coalescing the Initial packet; see packet-coalesce. Sending a UDP datagram of this size ensures that the network path from the client to the server supports a reasonable Path Maximum Transmission Unit (PMTU). This also helps reduce the amplitude of amplification"}
{"_id":"doc-en-quicwg-base-drafts-de31c2b918bca542b2e3d8eb41543c4efff7178df60ab6159f9f932a81aac18a","title":"","text":"that it chooses. A server MUST discard an Initial packet that is carried in a UDP datagram with a payload that is less than the smallest allowed maximum packet size of 1200 bytes. A server MAY also immediately datagram with a payload that is smaller than the smallest allowed maximum datagram size of 1200 bytes. A server MAY also immediately close the connection by sending a CONNECTION_CLOSE frame with an error code of PROTOCOL_VIOLATION; see immediate-close-hs."}
{"_id":"doc-en-quicwg-base-drafts-71273b54ac18ccde2a30aa87d1c4d790b5f4b6d1c02d55461e84f2ece48753fe","title":"","text":"The Path Maximum Transmission Unit (PMTU) is the maximum size of the entire IP packet including the IP header, UDP header, and UDP payload. The UDP payload includes the QUIC packet header, protected payload, and any authentication fields. The PMTU can depend on path characteristics, and can therefore change over time. The largest UDP payload an endpoint sends at any given time is referred to as the endpoint's maximum packet size. payload. The UDP payload includes one or more QUIC packet headers and protected payloads. The PMTU can depend on path characteristics, and can therefore change over time. The largest UDP payload an endpoint sends at any given time is referred to as the endpoint's maximum datagram size. An endpoint SHOULD use DPLPMTUD (dplpmtud) or PMTUD (pmtud) to determine whether the path to a destination will support a desired maximum packet size without fragmentation. In the absence of these mechanisms, QUIC endpoints SHOULD NOT send IP packets larger than the smallest allowed maximum packet size. maximum datagram size without fragmentation. In the absence of these mechanisms, QUIC endpoints SHOULD NOT send datagrams larger than the smallest allowed maximum datagram size. Both DPLPMTUD and PMTUD send IP packets that are larger than the current maximum packet size, referred to as PMTU probes. All QUIC Both DPLPMTUD and PMTUD send datagrams that are larger than the current maximum datagram size, referred to as PMTU probes. All QUIC packets that are not sent in a PMTU probe SHOULD be sized to fit within the maximum packet size to avoid the packet being fragmented or dropped (RFC8085). within the maximum datagram size to avoid the datagram being fragmented or dropped (RFC8085). If a QUIC endpoint determines that the PMTU between any pair of local and remote IP addresses has fallen below the smallest allowed maximum packet size of 1200 bytes, it MUST immediately cease sending QUIC datagram size of 1200 bytes, it MUST immediately cease sending QUIC packets, except for those in PMTU probes or those containing CONNECTION_CLOSE frames, on the affected path. An endpoint MAY terminate the connection if an alternative path cannot be found. Each pair of local and remote addresses could have a different PMTU. QUIC implementations that implement any kind of PMTU discovery therefore SHOULD maintain a maximum packet size for each combination of local and remote IP addresses. therefore SHOULD maintain a maximum datagram size for each combination of local and remote IP addresses. A QUIC implementation MAY be more conservative in computing the maximum packet size to allow for unknown tunnel overheads or IP maximum datagram size to allow for unknown tunnel overheads or IP header options/extensions. 14.2.1. Path Maximum Transmission Unit Discovery (PMTUD; RFC1191, RFC8201) relies on reception of ICMP messages (e.g., IPv6 Packet Too Big messages) that indicate when a packet is dropped because it is larger than the local router MTU. DPLPMTUD can also optionally use these messages. This use of ICMP messages is potentially vulnerable to off-path attacks that successfully guess the addresses used on the messages) that indicate when an IP packet is dropped because it is larger than the local router MTU. DPLPMTUD can also optionally use these messages. This use of ICMP messages is potentially vulnerable to off-path attacks that successfully guess the addresses used on the path and reduce the PMTU to a bandwidth-inefficient value. An endpoint MUST ignore an ICMP message that claims the PMTU has decreased below the minimum QUIC packet size. decreased below QUIC's smallest allowed maximum datagram size. The requirements for generating ICMP (RFC1812, RFC4443) state that the quoted packet should contain as much of the original packet as"}
{"_id":"doc-en-quicwg-base-drafts-5e205b109044374f2bcc837f315e0c1a59a522ad661b927a5fc6e3195e51ea7b","title":"","text":"validation. An endpoint MUST NOT increase PMTU based on ICMP messages; see Section 3, clause 6 of DPLPMTUD. Any reduction in the QUIC maximum packet size in response to ICMP messages MAY be provisional until Section 3, clause 6 of DPLPMTUD. Any reduction in QUIC's maximum datagram size in response to ICMP messages MAY be provisional until QUIC's loss detection algorithm determines that the quoted packet has actually been lost."}
{"_id":"doc-en-quicwg-base-drafts-33e185655f262c323cdcc2503ee493693182774c2121f18d620afc10d92ce8ab","title":"","text":"PADDING frame implement \"Probing using padding data\", as defined in Section 4.1 of DPLPMTUD. Endpoints SHOULD set the initial value of BASE_PMTU (see Section 5.1 of DPLPMTUD) to be consistent with the minimum QUIC packet size. The MIN_PLPMTU is the same as the BASE_PMTU. Endpoints SHOULD set the initial value of BASE_PLPMTU (Section 5.1 of DPLPMTUD) to be consistent with QUIC's smallest allowed maximum datagram size. The MIN_PLPMTU is the same as the BASE_PLPMTU. QUIC endpoints implementing DPLPMTUD maintain a maximum packet size (DPLPMTUD MPS) for each combination of local and remote IP addresses. QUIC endpoints implementing DPLPMTUD maintain a DPLPMTUD Maximum Packet Size (MPS, Section 4.4 of DPLPMTUD) for each combination of local and remote IP addresses. This corresponds to the maximum datagram size. 14.3.1. From the perspective of DPLPMTUD, QUIC is an acknowledged packetization layer (PL). A sender can therefore enter the DPLPMTUD BASE state when the QUIC connection handshake has been completed. Packetization Layer (PL). A QUIC sender can therefore enter the DPLPMTUD BASE state (Section 5.2 of DPLPMTUD) when the QUIC connection handshake has been completed. 14.3.2. QUIC provides an acknowledged PL, therefore a sender does not implement the DPLPMTUD CONFIRMATION_TIMER while in the SEARCH_COMPLETE state; see Section 5.2 of DPLPMTUD. QUIC is an acknowledged PL, therefore a QUIC sender does not implement a DPLPMTUD CONFIRMATION_TIMER while in the SEARCH_COMPLETE state; see Section 5.2 of DPLPMTUD. 14.3.3."}
{"_id":"doc-en-quicwg-base-drafts-8ae7842aea07e6c1235051f19dc365f06058a6e435f4b6b9c33c7e0429c375a2","title":"","text":"PMTU probes are ack-eliciting packets. Endpoints could limit the content of PMTU probes to PING and PADDING frames as packets that are larger than the current maximum packet size are more likely to be dropped by the network. Loss of a QUIC packet that is carried in a PMTU probe is therefore not a reliable indication of congestion and SHOULD NOT trigger a congestion control reaction; see Section 3, Bullet 7 of DPLPMTUD. However, PMTU probes consume congestion window, which could delay subsequent transmission by an application. frames, since packets that are larger than the current maximum datagram size are more likely to be dropped by the network. Loss of a QUIC packet that is carried in a PMTU probe is therefore not a reliable indication of congestion and SHOULD NOT trigger a congestion control reaction; see Section 3, Bullet 7 of DPLPMTUD. However, PMTU probes consume congestion window, which could delay subsequent transmission by an application. 14.4.1."}
{"_id":"doc-en-quicwg-base-drafts-c3c55924d3cd27ae6d9aba6df70b41617bfdec1d20887850c0f43f36b90bd0f4","title":"","text":"This limit does act as an additional constraint on datagram size in the same way as the path MTU, but it is a property of the endpoint and not the path; see packet-size. It is expected that endpoint and not the path; see datagram-size. It is expected that this is the space an endpoint dedicates to holding incoming packets."}
{"_id":"doc-en-quicwg-base-drafts-a336bdd25ccd09484dffcc8c0af5bfe2c3cd1906a144943073e9152d0ea5072e","title":"","text":"tuple, as shown in transport-parameter-encoding-fig: The Transport Parameter Length field contains the length of the Transport Parameter Value field. Transport Parameter Value field in bytes. QUIC encodes transport parameters into a sequence of bytes, which is then included in the cryptographic handshake."}
{"_id":"doc-en-quicwg-base-drafts-c818ae44d6ea9ff098b0ef4150d9b372e37b881a450901ca10d8c58c1a6f70f5","title":"","text":"entity that receives an Initial packet from a client can recover the keys that will allow them to both read the contents of the packet and generate Initial packets that will be successfully authenticated at either endpoint. either endpoint. The AEAD also protects Initial packets against accidental modification. All other packets are protected with keys derived from the cryptographic handshake. The cryptographic handshake ensures that"}
{"_id":"doc-en-quicwg-base-drafts-a57535f54d478bea44554da947b7031d4cac88d5240d3422102a459f629cadbe","title":"","text":"the inclusion of uppercase field names, or the inclusion of invalid characters in field names or values the inclusion of invalid characters in field names or values. A request or response that includes a payload body can include a Content-Length header field. A request or response is also malformed"}
{"_id":"doc-en-quicwg-base-drafts-abfa961ec916963b9877e2872055dec9896dcea8281a7dc8583a3bcae4c187a7","title":"","text":"intermediary not acting as a tunnel) MUST NOT forward a malformed request or response. Malformed requests or responses that are detected MUST be treated as a stream error (errors) of type H3_GENERAL_PROTOCOL_ERROR. H3_MESSAGE_ERROR. For malformed requests, a server MAY send an HTTP response indicating the error prior to closing or resetting the stream. Clients MUST NOT"}
{"_id":"doc-en-quicwg-base-drafts-b95ba0203d416c9cd2bf11ff30780531e5132f2b1dd6d957f9d513c6e279050d","title":"","text":"The client's stream terminated without containing a fully-formed request. An HTTP message was malformed and cannot be processed. The TCP connection established in response to a CONNECT request was reset or abnormally closed."}
{"_id":"doc-en-quicwg-base-drafts-51e67f5097869a4eeedb0ec47e583b6ae6f179c55765ef1d30d2e1bc9b03e161","title":"","text":"The payload of this packet contains CRYPTO frames and could contain PING, PADDING, or ACK frames. Handshake packets MAY contain CONNECTION_CLOSE frames of type 0x1c. Endpoints MUST treat receipt of Handshake packets with other frames as a connection error. of Handshake packets with other frames as a connection error of type PROTOCOL_VIOLATION. Like Initial packets (see discard-initial), data in CRYPTO frames for Handshake packets is discarded - and no longer retransmitted - when"}
{"_id":"doc-en-quicwg-base-drafts-d497042e7fc2d663b66b83b6e7c15ae0e97c48e6297c5189d9e61d297231c979","title":"","text":"control across the entire connection, QUIC has the capability to improve the performance of HTTP compared to a TCP mapping. QUIC also incorporates TLS 1.3 (TLS13) at the transport layer, offering comparable security to running TLS over TCP, with the improved connection setup latency of TCP Fast Open (TFO). comparable confidentiality and integrity to running TLS over TCP, with the improved connection setup latency of TCP Fast Open (TFO). This document defines a mapping of HTTP semantics over the QUIC transport protocol, drawing heavily on the design of HTTP/2. While"}
{"_id":"doc-en-quicwg-base-drafts-058b930e63fe29d2753d8adee62d85ad7b9963c93281714cb939bde5a23ea81b","title":"","text":"The use of ALPN in the TLS and QUIC handshakes establishes the target application protocol before application-layer bytes are processed. Because all QUIC packets are encrypted, it is difficult for an attacker to control the plaintext bytes of an HTTP/3 connection, which could be used in a cross-protocol attack on a plaintext protocol. This ensures that endpoints have strong assurances that peers are using the same protocol. This does not guarantee protection from all cross-protocol attacks. Section 21.5 of QUIC-TRANSPORT describes some ways in which the plaintext of QUIC packets can be used to perform request forgery against endpoints that don't use authenticated transports. 10.3."}
{"_id":"doc-en-quicwg-base-drafts-a6478de046c62d6cdc85289b147be4cf7afdee0ceee1025009fc0e16ad57bdda","title":"","text":"A PATH_RESPONSE frame received on any network path validates the path on which the PATH_CHALLENGE was sent. If the PATH_CHALLENGE frame that resulted in successful path validation was sent in a datagram that was not expanded to at least 1200 bytes, the endpoint can regard the address as valid. The endpoint is then able to send more than three times the amount of If an endpoint sends a PATH_CHALLENGE frame in a datagram that is not expanded to at least 1200 bytes, and if the response to it validates the peer address, the path is validated but not the path MTU. As a result, the endpoint can now send more than three times the amount of data that has been received. However, the endpoint MUST initiate another path validation with an expanded datagram to verify that the path supports required MTU. path supports the required MTU. Receipt of an acknowledgment for a packet containing a PATH_CHALLENGE frame is not adequate validation, since the acknowledgment can be"}
{"_id":"doc-en-quicwg-base-drafts-4bed455383edbee3ee811d42263a413532486a14d33ca000779e7a27649c750a","title":"","text":"authenticated negotiation of an application protocol (TLS uses ALPN ALPN for this purpose) Endpoints can use packets sent during the handshake to test for Explicit Congestion Notification (ECN) support; see ecn. An endpoint verifies support for ECN by observing whether the ACK frames acknowledging the first packets it sends carry ECN counts, as described in ecn-validation. The CRYPTO frame can be sent in different packet number spaces (packet-numbers). The offsets used by CRYPTO frames to ensure ordered delivery of cryptographic handshake data start from zero in"}
{"_id":"doc-en-quicwg-base-drafts-5661fc4e12be28a72307466a288849d54aa18e687d1640c8fd8c62788aa361e0","title":"","text":"shown with a '*'. Once completed, endpoints are able to exchange application data. An endpoint validates support for Explicit Congestion Notification (ECN) by observing whether the ACK frames acknowledging the first packets it sends carry ECN counts, as described in ecn-validation. Endpoints can use packets sent during the handshake to test for Explicit Congestion Notification (ECN) support; see ecn. An endpoint validates support for ECN by observing whether the ACK frames acknowledging the first packets it sends carry ECN counts, as described in ecn-validation. Endpoints MUST explicitly negotiate an application protocol. This avoids situations where there is a disagreement about the protocol"}
{"_id":"doc-en-quicwg-base-drafts-637cd1fa6fcaf1f5d34d3c4a2418bb0ca948036eeeab34a23c3e7087ceede5a6","title":"","text":"A token allows a server to correlate activity between the connection where the token was issued and any connection where it is used. Clients that want to break continuity of identity with a server MAY Clients that want to break continuity of identity with a server can discard tokens provided using the NEW_TOKEN frame. In comparison, a token obtained in a Retry packet MUST be used immediately during the connection attempt and cannot be used in subsequent connection"}
{"_id":"doc-en-quicwg-base-drafts-3a07024e086b14b2434eff5be9fc6da570e031db9993a45c25ee23ad7a0c51d9","title":"","text":"The next bit (0x40) of byte 0 is set to 1. Packets containing a zero value for this bit are not valid packets in this version and MUST be discarded. MUST be discarded. A value of 1 for this bit allows QUIC to coexist with other protocols; see RFC7983. The next two bits (those with a mask of 0x30) of byte 0 contain a packet type. Packet types are listed in long-packet-types."}
{"_id":"doc-en-quicwg-base-drafts-21ae8610e4f4e5470b183b2cae411e5b71e48841c921ab9c4f6c361e5b167faa","title":"","text":"The next bit (0x40) of byte 0 is set to 1. Packets containing a zero value for this bit are not valid packets in this version and MUST be discarded. MUST be discarded. A value of 1 for this bit allows QUIC to coexist with other protocols; see RFC7983. The third most significant bit (0x20) of byte 0 is the latency spin bit, set as described in spin-bit."}
{"_id":"doc-en-quicwg-base-drafts-149d906d76194c92ba8bad0ac221930631be82cdb80bce26d3d45093448fb422","title":"","text":"newer encryption level are available. An endpoint cannot discard keys for a given encryption level unless it has both received and acknowledged all CRYPTO frames for that encryption level and when all CRYPTO frames for that encryption level have been acknowledged by its peer. However, this does not guarantee that no further packets will need to be received or sent at that it has received all the cryptographic handshake messages from its peer at that encryption level and its peer has done the same. Different methods for determining this are provided for Initial keys (discard-initial) and Handshake keys (discard-handshake). These methods do not prevent packets from being received or sent at that encryption level because a peer might not have received all the acknowledgments necessary to reach the same state. acknowledgments necessary. Though an endpoint might retain older keys, new data MUST be sent at the highest currently-available encryption level. Only ACK frames"}
{"_id":"doc-en-quicwg-base-drafts-f128f05717779beec122f04c6560d25de2a5dda9d4dff38e64dbf2b4fa04b859","title":"","text":"21.13. Deployments should limit the ability of an attacker to target a new connection to a particular server instance. This means that client- controlled fields, such as the initial Destination Connection ID used on Initial and 0-RTT packets SHOULD NOT be used by themselves to make routing decisions. Ideally, routing decisions are made independently of client-selected values; a Source Connection ID can be selected to route later packets to the same server. connection to a particular server instance. Ideally, routing decisions are made independently of client-selected values, including addresses. Once an instance is selected, a connection ID can be selected so that later packets are routed to the same instance. 21.14."}
{"_id":"doc-en-quicwg-base-drafts-016ef4c08ae62d0fb6bd10fdb8179c9f15cbc79b299d94e2c585731de5851ae7","title":"","text":"The endpoint uses RTT samples and peer-reported host delays (see Section 13.2 of QUIC-TRANSPORT) to generate a statistical description of the network path's RTT. An endpoint computes the following three values for each path: the minimum value observed over the lifetime of the path (min_rtt), an exponentially-weighted moving average (smoothed_rtt), and the mean deviation (referred to as \"variation\" in the rest of this document) in the observed RTT samples (rttvar). values for each path: the minimum value over a period of time (min_rtt), an exponentially-weighted moving average (smoothed_rtt), and the mean deviation (referred to as \"variation\" in the rest of this document) in the observed RTT samples (rttvar). 5.1."}
{"_id":"doc-en-quicwg-base-drafts-35f90a23ee1b788dbb4c736064b3d974cae43895e89af9d28a2ff7647648e901","title":"","text":"5.2. min_rtt is the sender's estimate of the minimum RTT observed for a given network path. In this document, min_rtt is used by loss detection to reject implausibly small rtt samples. given network path over a period of time. In this document, min_rtt is used by loss detection to reject implausibly small rtt samples. min_rtt MUST be set to the latest_rtt on the first RTT sample. min_rtt MUST be set to the lesser of min_rtt and latest_rtt (latest-"}
{"_id":"doc-en-quicwg-base-drafts-6e119d6cdd6b13a73c06393eec306ec7c0c1277f947d3e25ded56fc56de0de11","title":"","text":"in compliance with RFC6437, unless the local API does not allow setting IPv6 flow labels. The IPv6 flow label SHOULD be a pseudo-random function of the source and destination addresses, source and destination UDP ports, and the Destination Connection ID field. The flow label generation MUST be designed to minimize the chances of linkability with a previously used flow label, as a stable flow label would enable correlating activity on multiple paths; see migration-linkability. A possible implementation is to compute the flow label as a cryptographic hash function of the source and destination addresses, source and destination UDP ports, Destination Connection ID field, and a local secret. The flow label generation MUST be designed to minimize the chances of linkability with a previously used flow label, as a stable flow label would enable correlating activity on multiple paths; see migration- linkability. RFC6437 suggests deriving values using a pseudorandom function to generate flow labels. Including the Destination Connection ID field in addition to source and destination addresses when generating flow labels ensures that changes are synchronized with changes in other observable identifiers. A cryptographic hash function that combines these inputs with a local secret is one way this might be implemented. 10."}
{"_id":"doc-en-quicwg-base-drafts-24272cb2279b48134723c78ed7806bce5915d6bae83ea5e3d243b16c69fc413f","title":"","text":"QUIC begins every connection in slow start with the congestion window set to an initial value. Endpoints SHOULD use an initial congestion window of 10 times the maximum datagram size (max_datagram_size), limited to the larger of 14720 bytes or twice the maximum datagram size. This follows the analysis and recommendations in RFC6928, increasing the byte limit to account for the smaller 8-byte overhead of UDP compared to the 20-byte overhead for TCP. while limiting the window to the larger of 14720 bytes or twice the maximum datagram size. This follows the analysis and recommendations in RFC6928, increasing the byte limit to account for the smaller 8-byte overhead of UDP compared to the 20-byte overhead for TCP. If the maximum datagram size changes during the connection, the initial congestion window SHOULD be recalculated with the new size."}
{"_id":"doc-en-quicwg-base-drafts-7f89f82d089f1c2b80772a16a26f37555e009d64b43e8a582c7f1924a8abfc2e","title":"","text":"If the recipient permits the migration, it MUST send subsequent packets to the new peer address and MUST initiate path validation (migrate-validate) to verify the peer's ownership of the address if validation is not already underway. validation is not already underway. If the recipient has no unused connection IDs from the peer, it will not be able to send anything on the new path until the peer provides one; see migration-linkability. An endpoint only changes the address to which it sends packets in response to the highest-numbered non-probing packet. This ensures"}
{"_id":"doc-en-quicwg-base-drafts-a02e886d6d508d22eecbd326c28b61cd5bf6a66f558ac3f4345505bb2de3d83f","title":"","text":"SHOULD begin processing partial HTTP messages once enough of the message has been received to make progress. If a client-initiated stream terminates without enough of the HTTP message to provide a complete response, the server SHOULD abort its response with the error code H3_REQUEST_INCOMPLETE; see errors. complete response, the server SHOULD abort its response stream with the error code H3_REQUEST_INCOMPLETE; see errors. A server can send a complete response prior to the client sending an entire request if the response does not depend on any portion of the"}
{"_id":"doc-en-quicwg-base-drafts-4daf2fe8a3747739736feb83ccb8b0c7f5bd7eb931fcf0cb33ec6ac11883fbd1","title":"","text":"data received, as specified in Section 8.1 of QUIC-TRANSPORT. If no additional data can be sent, the server's PTO timer MUST NOT be armed until datagrams have been received from the client, because packets sent on PTO count against the anti-amplification limit. Note that the server could fail to validate the client's address even if 0-RTT is accepted. sent on PTO count against the anti-amplification limit. When the server receives a datagram from the client, the amplification limit is increased and the server resets the PTO timer. If the PTO timer is then set to a time in the past, it is executed immediately. Doing so avoids sending new 1-RTT packets prior to packets critical to the completion of the handshake. In particular, this can happen when 0-RTT is accepted but the server fails to validate the client's address. Since the server could be blocked until more datagrams are received from the client, it is the client's responsibility to send packets to"}
{"_id":"doc-en-quicwg-base-drafts-3a49a24251087b8d7aaa5cd04d8bfbcacf4d390896356fd1cb21bb42d499d283","title":"","text":"An endpoint MUST include the value from the Source Connection ID field of the packet it receives in the Destination Connection ID field. The value for Source Connection ID MUST be copied from the Destination Connection ID of the received packet, which is initially randomly selected by a client. Echoing both connection IDs gives clients some assurance that the server received the packet and that the Version Negotiation packet was not generated by an attacker that is unable to observe packets. field. The value for the Source Connection ID field MUST be copied from the Destination Connection ID field of the received packet, which is initially randomly selected by a client. Echoing both connection IDs gives clients some assurance that the server received the packet and that the Version Negotiation packet was not generated by an attacker that is unable to observe packets. An endpoint that receives a Version Negotiation packet might change the version that it decides to use for subsequent packets. The"}
{"_id":"doc-en-quicwg-base-drafts-910e6a888226dc768697b5e27e2bef54328139af29d9c66fc3c72392926c24b7","title":"","text":"The key words \"MUST\", \"MUST NOT\", \"REQUIRED\", \"SHALL\", \"SHALL NOT\", \"SHOULD\", \"SHOULD NOT\", \"RECOMMENDED\", \"NOT RECOMMENDED\", \"MAY\", and \"OPTIONAL\" in this document are to be interpreted as described in BCP 14 BCP14 when, and only when, they appear in all capitals, as shown here. 14 RFC2119 RFC8174 when, and only when, they appear in all capitals, as shown here. This document uses the variable-length integer encoding from QUIC- TRANSPORT."}
{"_id":"doc-en-quicwg-base-drafts-a21c0fc119602443e3d240a50b886c88d0cd81e4f4e91f8c21cbd3126ee74c2e","title":"","text":"The key words \"MUST\", \"MUST NOT\", \"REQUIRED\", \"SHALL\", \"SHALL NOT\", \"SHOULD\", \"SHOULD NOT\", \"RECOMMENDED\", \"NOT RECOMMENDED\", \"MAY\", and \"OPTIONAL\" in this document are to be interpreted as described in BCP 14 BCP14 when, and only when, they appear in all capitals, as shown here. 14 RFC2119 RFC8174 when, and only when, they appear in all capitals, as shown here. Definitions of terms that are used in this document:"}
{"_id":"doc-en-quicwg-base-drafts-8269e601921bd60072387fa3a5936c21d9f584187cfd67f5bad5303b20b1dd19","title":"","text":"The entries in iana-setting-table are registered by this document. For fomatting reasons, setting names can be abbreviated by removing the 'SETTING_' prefix. For formatting reasons, setting names can be abbreviated by removing the 'SETTINGS_' prefix. Each code of the format \"0x1f * N + 0x21\" for non-negative integer values of \"N\" (that is, 0x21, 0x40, ..., through 0x3ffffffffffffffe)"}
{"_id":"doc-en-quicwg-datagram-6a9df7927221b0c77025017e4f25a8ad802d451d3b975d759f4cc128a78f3712","title":"","text":"bytes. An endpoint that includes this parameter supports the DATAGRAM frame types and is willing to receive such frames on this connection. Endpoints MUST NOT send DATAGRAM frames until they have sent and received the max_datagram_frame_size transport parameter. Endpoints MUST NOT send DATAGRAM frames of size strictly larger than the value of max_datagram_frame_size the endpoint has received from its peer. An endpoint that receives a DATAGRAM frame when it has not sent the max_datagram_frame_size transport parameter MUST terminate the connection with error PROTOCOL_VIOLATION. An endpoint that receives a DATAGRAM frame that is strictly larger than the value it sent in its max_datagram_frame_size transport parameter MUST terminate the connection with error PROTOCOL_VIOLATION. Endpoints that wish to use DATAGRAM frames need to ensure they send a max_datagram_frame_size value sufficient to allow their peer to use them. It is RECOMMENDED to send the value 65536 in the max_datagram_frame_size transport parameter as that indicates to the peer that this endpoint will accept any DATAGRAM frame that fits inside a QUIC packet. received the max_datagram_frame_size transport parameter. Endpoints MUST NOT send DATAGRAM frames of size strictly larger than the value of max_datagram_frame_size the endpoint has received from its peer. An endpoint that receives a DATAGRAM frame when it has not sent the max_datagram_frame_size transport parameter MUST terminate the connection with error PROTOCOL_VIOLATION. An endpoint that receives a DATAGRAM frame that is strictly larger than the value it sent in its max_datagram_frame_size transport parameter MUST terminate the connection with error PROTOCOL_VIOLATION. Endpoints that wish to use DATAGRAM frames need to ensure they send a max_datagram_frame_size value sufficient to allow their peer to use them. It is RECOMMENDED to send the value 65536 in the max_datagram_frame_size transport parameter as that indicates to the peer that this endpoint will accept any DATAGRAM frame that fits inside a QUIC packet. The max_datagram_frame_size transport parameter is a unidirectional limit and indication of support of DATAGRAM frames. Application protocols that use DATAGRAM frames MAY choose to only negotiate and use them in a single direction. When clients use 0-RTT, they MAY store the value of the server's max_datagram_frame_size transport parameter. Doing so allows the"}
{"_id":"doc-en-quicwg-datagram-878cc76c41e7dc05a2312258739311c217be50fbf00a832bfd999fcd3dbbdedd","title":"","text":"to receiving packets that only contain DATAGRAM frames, since the timing of these acknowledgements is not used for loss recovery. As with any ack-eliciting frame, when a sender suspects that a packet containing only DATAGRAM frames has been lost, it MAY send probe packets to elicit a faster acknowledgement as described in Section 6.2.4 of RFC9002. If a sender detects that a packet containing a specific DATAGRAM frame might have been lost, the implementation MAY notify the application that it believes the datagram was lost."}
{"_id":"doc-en-ratelimit-headers-415bcffbc8332e69c68de411819e143ab90343dd99a3d45b75dad22b5b256397","title":"","text":"2.1. A quota policy is described in terms of service-limit and a time- window. It is an Item whose bare item is a service-limit, along with associated Parameters. A quota policy is maintained by a server to limit the activity (counted in quota units) of a given client over a period of time (known as the time-window) to a specified amount (known as the service-limit). The following parameters are defined in this specification: Quota policies can be advertised by servers (see ratelimit-policy- field), but they are not required to be, and more than one quota policy can affect a given request from a client to a server. The REQUIRED \"w\" parameter value conveys a time window value as defined in time-window. Other parameters are allowed and can be regarded as comments. They ought to be registered within the \"Hypertext Transfer Protocol (HTTP) RateLimit Parameters Registry\", as described in iana-ratelimit- A quota policy is expressed in Structured Fields STRUCTURED-FIELDS as an Integer that indicates the service limit with associated parameters. For example, a quota policy of 100 quota units per minute: The definition of a quota policy does not imply any specific distribution of quota units within the time window. If applicable, these details can be conveyed as extension parameters. The following Parameters are defined in this specification: For example, two quota policies containing further details via extension parameters: The REQUIRED \"w\" parameter value conveys a time window (time- window). To avoid clashes, implementers SHOULD prefix unregistered parameters with a vendor identifier, e.g. \"acme-policy\", \"acme-burst\". While it is useful to define a clear syntax and semantics even for custom parameters, it is important to note that user agents are not required to process quota policy information. For example, a quota policy of 100 quota units per minute is expressed as: 2.2. Other parameters are allowed and can be regarded as comments. Parameters for use by more than one implementation or service ought to be registered within the \"Hypertext Transfer Protocol (HTTP) RateLimit Parameters Registry\", as described in iana-ratelimit- parameters. Rate limit policies limit the number of acceptable requests within a given time interval, known as a time window. Implementation- or service-specific parameters SHOULD be prefixed parameters with a vendor identifier, e.g. \"acme-policy\", \"acme- burst\". The time window is a non-negative Integer value expressing that interval in seconds, similar to the \"delay-seconds\" rule defined in Section 10.2.3 of HTTP. Subsecond precision is not supported. 2.2. 2.3. The service limit is a non-negative Integer indicating the maximum amount of activity that the server is willing to accept from what it identifies as the client (e.g., based upon originating IP or user authentication) during a time-window. The service limit is associated with the maximum number of requests that the server is willing to accept from one or more clients on a given basis (originating IP, authenticated user, geographical, ..) during a time-window. The activity being limited is usually the HTTP requests made by the client; for example \"you can make 100 requests per minute\". However, a server might only rate limit some requests (based upon URI, method, user identity, etc.), and it might weigh requests differently. Therefore, quota policies are defined in terms of \"quota units\". Servers SHOULD document how they count quota units. The service limit is a non-negative Integer expressed in quota units. For example, a server could count requests like \"/books/{id}\" once, but count search requests like \"/books?author=WuMing\" twice. This might result in the following counters: The service limit SHOULD match the maximum number of acceptable requests. However, the service limit MAY differ from the total number of acceptable requests when weight mechanisms, bursts, or other server policies are implemented. Often, the service limit advertised will match the server's actual limit. However, it MAY differ when weight mechanisms, bursts, or other server policies are implemented. In that case the difference SHOULD be communicated using an extension or documented separately. If the service limit does not match the maximum number of acceptable requests the relation with that SHOULD be communicated out-of-band. 2.3. Example: A server could Quota policies limit the number of acceptable requests within a given time interval, known as a time window. count once requests like \"/books/{id}\" The time window is a non-negative Integer value expressing that interval in seconds, similar to the \"delay-seconds\" rule defined in Section 10.2.3 of HTTP. Subsecond precision is not supported. count twice search requests like \"/books?author=WuMing\" By default, a quota policy does not constrain the distribution of quota units within the time window. If necessary, these details can be conveyed as extension parameters. so that we have the following counters For example, two quota policies containing further details via extension parameters: 3."}
{"_id":"doc-en-ratelimit-headers-1d28aac180326a5108dd55fd47966baeb24a1b0507ad375314e20d53a90aff83","title":"","text":"header field names proliferates. Client applications interfacing with different servers may thus need to process different headers, or the very same application interface User Agents interfacing with different servers may thus need to process different headers, or the very same application interface that sits behind different reverse proxies may reply with different throttling headers."}
{"_id":"doc-en-ratelimit-headers-35932151995be6c63c2ce8a71ca938d7344aa2bda66825a013999b3cede0658a","title":"","text":"\"RateLimit-Reset\": containing the time remaining in the current window, specified in seconds. The behavior of \"RateLimit-Reset\" is compatible with the \"delta- The behavior of \"RateLimit-Reset\" is compatible with the \"delay- seconds\" notation of \"Retry-After\". The fields definition allows to describe complex policies, including"}
{"_id":"doc-en-ratelimit-headers-6d96de9158ef78060ded9bf6d713d6152699adfbe3e544ddb71d59b3ee461be3","title":"","text":"This specification does not cover the throttling scope, that may be the given resource-target, its parent path or the whole Origin RFC6454 section 7. (see Section 7 of RFC6454). The rate-limit headers may be returned in both Successful and non Successful responses. This specification does not cover whether"}
{"_id":"doc-en-ratelimit-headers-6819f6eab0df7d6f11232fe2f500cbc31b6cff24eef739c26d90980ab15665e4","title":"","text":"capitals, as shown here. This document uses the Augmented BNF defined in RFC5234 and updated by RFC7405 along with the \"#rule\" extension defined in Section 7 of MESSAGING. by RFC7405 along with the \"#rule\" extension defined in Section 5.6.1 of SEMANTICS. The term Origin is to be interpreted as described in RFC6454 section 7. The term Origin is to be interpreted as described in Section 7 of RFC6454. The \"delta-seconds\" rule is defined in CACHING section 1.2.1. The \"delay-seconds\" rule is defined in Section 10.2.4 of SEMANTICS. 2."}
{"_id":"doc-en-ratelimit-headers-2d67467a4972a36db8916c44a0f634ae59ba4c4b908a5d4cc4c8031a466d850e","title":"","text":"The header value is The delta-seconds format is used because: The delay-seconds format is used because: it does not rely on clock synchronization and is resilient to clock adjustment and clock skew between client and server (see SEMANTICS Section 4.1.1.1); Section 5.6.7 of SEMANTICS); it mitigates the risk related to thundering herd when too many clients are serviced with the same timestamp."}
{"_id":"doc-en-ratelimit-headers-9e701cff64f970c9ba2af62c619c42f9112595182cb7025b9a743a1192b94740","title":"","text":"5. This section documents the considerations advised in Section 15.3.3 This section documents the considerations advised in Section 16.3.3 of SEMANTICS. An intermediary that is not part of the originating service"}
{"_id":"doc-en-ratelimit-headers-d22c1cd59aea84973bb513161a757e5c5832c1c78be526445e2c67a99ba8ee98","title":"","text":"8.3.1. The server does not expose \"RateLimit-Remaining\" values, but resets the limit counter every second. The server does not expose \"RateLimit-Remaining\" values (for example, because the underlying counters are not available). Instead, it resets the limit counter every second. It communicates to the client the limit of 10 quota-units per second always returning the couple \"RateLimit-Limit\" and \"RateLimit-Reset\"."}
{"_id":"doc-en-ratelimit-headers-e466d94d3069710e91ba60a09e1cb5b017c6b434bf4dc7b20c63b99a1f9b283b","title":"","text":"quotas. This was partially addressed by the \"Retry-After\" header field defined in SEMANTICS to be returned in \"429 Too Many Requests\" (see STATUS429) or \"503 Service Unavailable\" responses. defined in SEMANTICS to be returned in 429 (Too Many Request) (see STATUS429) or 503 (Service Unavailable) responses. Widely deployed quota mechanisms limit the number of acceptable requests in a given time window, e.g. 10 requests per second;"}
{"_id":"doc-en-ratelimit-headers-af8750e217dd18938782b9662a39e7c733e876ef7825dadeac445a4cc47ad70b","title":"","text":"the current window; \"RateLimit-Reset\": containing the time remaining in the current window, specified in seconds. window, specified in seconds; \"RateLimit-Policy\": containing the quota policy information. The behavior of \"RateLimit-Reset\" is compatible with the \"delay- seconds\" notation of \"Retry-After\"."}
{"_id":"doc-en-ratelimit-headers-daead4076f125104f641bbd255997c6d3037152518fc6c47f78cc40d9746d20f","title":"","text":"The term Origin is to be interpreted as described in Section 7 of RFC6454. This specification uses Structured Fields SF to specify syntax. The terms sf-list, sf-item, sf-string, sf-token, sf-integer, bare- item and key refer to the structured types defined therein. This document uses the following terminology from Section 3 of SF to specify syntax and parsing: List, Item, String, Token and Integer together with the concept of bare item. 2."}
{"_id":"doc-en-ratelimit-headers-12a6985a6a4a3180102ae3c4de1f4721a5b8b9c95056372e34bdfc77b79be0ad","title":"","text":"A time window is expressed in seconds, using the following syntax: Where \"delay-seconds\" is a non-negative sf-integer compatible with the \"delay-seconds\" rule defined in Section 10.2.3 of SEMANTICS. Where \"delay-seconds\" is a non-negative Integer compatible with the \"delay-seconds\" rule defined in Section 10.2.3 of SEMANTICS. Subsecond precision is not supported."}
{"_id":"doc-en-ratelimit-headers-f6c2ebb69995703b8707aae18c2559cd71cb0f9304eccfe40fed2014c71280cd","title":"","text":"The \"service-limit\" is expressed in \"quota-units\" and has the following syntax: where \"quota-units\" is a non-negative sf-integer. where \"quota-units\" is a non-negative Integer. The \"service-limit\" SHOULD match the maximum number of acceptable requests."}
{"_id":"doc-en-ratelimit-headers-a198cc82d89cf7682100e1402ef8741a4143e6fd7095efc66a13e97106a28729","title":"","text":"available in that moment. Nonetheless servers MAY decide to send the \"RateLimit\" fields in a trailer section. To ease the migration from existing rate limit headers, a server SHOULD be able to provide the \"RateLimit-Limit\" field even without the optional \"quota-policy\" section. 3.1. Servers are not required to return \"RateLimit\" fields in every"}
{"_id":"doc-en-ratelimit-headers-afa48e5b8ea76dc7f0fdb9ee7761cfe8a9e336f2c3e0283607a3e4013a5de633","title":"","text":"fields only when a given quota is going to expire. Implementers concerned with response fields' size, might take into account their ratio with respect to the payload data, or use header- compression http features such as HPACK. account their ratio with respect to the content length, or use header-compression HTTP features such as HPACK. 4."}
{"_id":"doc-en-ratelimit-headers-1be99f2644bd14f78857ce9a8efe9b8c8cf897b80458d5a053d8fb3b391ca65e","title":"","text":"otherwise gathered metrics) to better estimate the \"RateLimit-Reset\" moment intended by the server. The \"quota-policy\" values and comments provided in \"RateLimit-Limit\" are informative and MAY be ignored. The details provided in \"RateLimit-Policy\" are informative and MAY be ignored. If a response contains both the \"RateLimit-Reset\" and \"Retry-After\" fields, \"Retry-After\" MUST take precedence and \"RateLimit-Reset\" MAY"}
{"_id":"doc-en-ratelimit-headers-d8ac61cb8b890cf24a7b1fc880de541a8f98c07d30fbc84d6c6893a0697b62a1","title":"","text":"If the client exceeds that limit, it MAY not be served. The field is a List Structured Field of positive length. The first member is named \"expiring-limit\" and its syntax is \"service-limit\", while the syntax of the other optional members is \"quota-policy\" The field is a non-negative Integer. Its value is named \"expiring- limit\". The \"expiring-limit\" value MUST be set to the \"service-limit\" that is closer to reach its limit. The \"quota-policy\" is defined in quota-policy, and its values are informative. A \"time-window\" associated to \"expiring-limit\" can be communicated via an optional \"quota-policy\" value, like shown in the following example If the \"expiring-limit\" is not associated to a \"time-window\", the \"time-window\" MUST either be: closer to reach its limit, and the associated \"time-window\" MUST either be: inferred by the value of \"RateLimit-Reset\" at the moment of the reset, or communicated out-of-band (e.g. in the documentation). The \"RateLimit-Policy\" field (see ratelimit-policy-field), might contain information on the associated \"time-window\". This field MUST NOT occur multiple times and can be sent in a trailer section. 5.2. The \"RateLimit-Policy\" response field indicates the \"quota\" associated to the client and its value is informative. The field is a non-empty List of quota policies (see quota-policy). A \"time-window\" associated to \"expiring-limit\" can be communicated via \"RateLimit-Policy\", like shown in the following example. Policies using multiple quota limits MAY be returned using multiple \"quota-policy\" items, like shown in the following two examples: This field MUST NOT occur multiple times and can be sent in a trailer section. 5.2. 5.3. The \"RateLimit-Remaining\" response field indicates the remaining \"quota-units\" defined in service-limit associated to the client. The field is an Integer Structured Field and its value is The field is a non-negative Integer expressed in \"quota-units\". This field MUST NOT occur multiple times and can be sent in a trailer section."}
{"_id":"doc-en-ratelimit-headers-7a3db0f6ab2cc9d13460e2c2f6d52c872190a85d9f24209c4dc73dff4848fca8","title":"","text":"One example of \"RateLimit-Remaining\" use is below. 5.3. The \"RateLimit-Reset\" response field indicates either 5.4. the number of seconds until the quota resets. The \"RateLimit-Reset\" response field indicates the number of seconds until the quota resets. The field is an Integer Structured Field and its value is The field is a non-negative Integer. The delay-seconds format is used because:"}
{"_id":"doc-en-resource-directory-b45dd9330408c9b436ad100103652398276e0f70025ba85894bd79c1eb39cbf1","title":"","text":"operations, and \"core.rd-group\" is used to discover the URI path for RD Group operations. Upon success, the response will contain a payload with a link format entry for each RD function discovered, indicating the URI path of the RD function returned and the corresponding Resource Type. When performing multicast discovery, the multicast IP address used will depend on the scope required and the multicast capabilities of the network. indicating the URI of the RD function returned and the corresponding Resource Type. When performing multicast discovery, the multicast IP address used will depend on the scope required and the multicast capabilities of the network. A Resource Directory MAY provide hints about the content-formats it supports in the links it exposes or registers, using the \"ct\" link"}
{"_id":"doc-en-resource-directory-819a94a598d7c15d9696d021d50ccb077b4ca95fe6f10a37994c2d36a996ed2a","title":"","text":"An RD implementation of this specification MUST support query filtering for the rt parameter as defined in RFC6690. While the link targets in this discovery step are often expressed in path-absolute form, this is not a requirement. Clients SHOULD therefore accept URIs of all schemes they support, both in absolute and relative forms, and not limit the set of discovered URIs to those hosted at the address used for URI discovery. The URI Discovery operation can yield multiple URIs of a particular resource type. The client may use any of the discovered addresses initially."}
{"_id":"doc-en-resource-directory-dc9288936e8f7c89f4aa4ac6c42704dbfd1aefd1985896e5e50dfd0950b4aca8","title":"","text":"on its configuration. The registration message is a list of links to registration resources of the endpoints that belong to that group. The endpoints MAY be hosted by a different RD than the the group hosting RD. In that case the endpoint link points to the registration resource on the other RD. of the endpoints that belong to that group. The registration resources MAY be located on different hosts than the group hosting RD. In that case the endpoint link points to the registration resource on the other RD. The commissioning tool SHOULD NOT attempt to enter a foreign registration in a group unless it found it in the group RD's lookup results, or has other reasons to assume that the foreign registration will be accepted. The commissioning tool SHOULD not send any target attributes with the links to the registration resources, and the resource directory"}
{"_id":"doc-en-resource-directory-3cf3e352428b71ee6b629665159e0d01640333aad7ccd2481f9b61a975d5a269","title":"","text":"does not need to make them accessible to clients. Clients SHOULD NOT attempt to dereference or manipulate them. A Resource Directory can report endpoints or groups in lookup that are not hosted at the same address. While the setup and management of such a distributed system is out of scope for this document, lookup clients MUST be prepared to see arbitrary URIs as registration or group resources in the results. 7.3. Using the Accept Option, the requester can control whether this list"}
{"_id":"doc-en-resource-directory-da76cdbcc4d6cbb553e3dd346a6756cc182aadfdb274d2beeae49ff112dcb430","title":"","text":"associated domain of the registration. A Context is a base URL that gives scheme and (typically) authority information about an Endpoint. The Context of an Endpoint is provided at registration time, and is used by the Resource Directory to resolve relative references inside the registration into absolute URIs. This is a distinct concept from the \"link context\" defined in RFC8288. A Context is a base URL that typically gives scheme and authority information about an Endpoint. The Context of an Endpoint is provided at registration time, and is used by the Resource Directory to resolve relative references inside the registration into absolute URIs. This is a distinct concept from the \"link context\" defined in RFC8288. The target of a link is the destination address (URI) of the link."}
{"_id":"doc-en-resource-directory-ddae560b8e4b3f5a6a537acd00b2e9fc5d90e8952942a99fe05cde37a39cb4c0","title":"","text":"one ep (endpoint with a unique name) one con (a string describing the scheme://authority part) one con (a string typically describing the scheme://authority part) one lt (lifetime),"}
{"_id":"doc-en-resource-directory-b2fb9cdbbee2d5027fe620cdbe80df3dba7d0ae86ce3e04cae42a750fb2df243","title":"","text":"Context (optional). This parameter sets the Default Base URI under which the request's links are to be interpreted. The specified URI MUST NOT have a path component of its own, but MUST be suitable as a base URI to resolve any relative specified URI typically does not have a path component of its own, and MUST be suitable as a base URI to resolve any relative references given in the registration. The parameter is therefore of the shape \"scheme://authority\" for HTTP and CoAP URIs. In the absence of this parameter the scheme of the protocol, source address and source port of the registration request are assumed. This parameter is mandatory when the directory is filled by a third party such as an commissioning tool. If the endpoint uses an ephemeral port to register with, it MUST include the con parameter in the registration to provide a valid network path. If the endpoint which is located behind a NAT gateway is registering with a Resource Directory which is on the network service side of the NAT gateway, the endpoint MUST use a persistent port for the outgoing registration in order to provide the NAT gateway with a valid network address for replies and incoming requests. therefore usually of the shape \"scheme://authority\" for HTTP and CoAP URIs. In the absence of this parameter the scheme of the protocol, source address and source port of the registration request are assumed. This parameter is mandatory when the directory is filled by a third party such as an commissioning tool. If the endpoint uses an ephemeral port to register with, it MUST include the con parameter in the registration to provide a valid network path. If the endpoint which is located behind a NAT gateway is registering with a Resource Directory which is on the network service side of the NAT gateway, the endpoint MUST use a persistent port for the outgoing registration in order to provide the NAT gateway with a valid network address for replies and incoming requests. Endpoints that register with a con that contains a path component need to carefully consider the rules of relative URI resolution. Typically, links submitted by such an endpoint are of the \"path-noscheme\" form. Additional registration attributes (optional). The endpoint can pass any parameter registered at iana-registry to the"}
{"_id":"doc-en-resource-directory-0fc817d1eb8919abeffece146efd7870dd98207f17c56efdf87b6f62b4ef7514","title":"","text":"[ The RFC editor is asked to replace MCD1 and MCD2 with the assigned addresses throughout the document. ] 9.6. IANA is asked to extend the reference for the \"core\" URI suffix in the \"Well-Known URIs\" registry to reference this document next to RFC6690, as this defines the resource's behavior for POST requests. 10. Two examples are presented: a Lighting Installation example in lt-ex"}
{"_id":"doc-en-resource-directory-8b26598f9f44218e8e2df725807e2d92c58c0b8640ea4f2fe37d622877986494","title":"","text":"The key words \"MUST\", \"MUST NOT\", \"REQUIRED\", \"SHALL\", \"SHALL NOT\", \"SHOULD\", \"SHOULD NOT\", \"RECOMMENDED\", \"NOT RECOMMENDED\", \"MAY\", and \"OPTIONAL\" in this document are to be interpreted as described in RFC2119. The term \"byte\" is used in its now customary sense as a synonym for \"octet\". \"OPTIONAL\" in this document are to be interpreted as described in BCP 14 RFC2119 RFC8174 when, and only when, they appear in all capitals, as shown here. The term \"byte\" is used in its now customary sense as a synonym for \"octet\". This specification requires readers to be familiar with all the terms and concepts that are discussed in RFC3986, RFC8288 and RFC6690."}
{"_id":"doc-en-resource-directory-27865bcee5f6c101fb60fe9f35ab0775c725a387a9dc2f0e05198ce969925476","title":"","text":"they do not limit what a server may respond under atypical circumstances. REST clients (registrant-EPs / CTs, lookup clients, RD servers during simple registrations) MUST be prepared to receive any unsuccessful code and act upon it according to its definition, options and/or payload to the best of their capabilities, falling back to failing the operation if recovery is not possible. In particular, they should retry the request upon 5.03 (Service Unavailable; 503 in HTTP) according to the Max-Age (Retry-After in HTTP) option, and fall back to link-format when receiving 4.15 (Unsupported Content-Format; 415 in HTTP). REST clients (registrant-EPs and CTs during registration and maintenance, lookup clients, RD servers during simple registrations) MUST be prepared to receive any unsuccessful code and act upon it according to its definition, options and/or payload to the best of their capabilities, falling back to failing the operation if recovery is not possible. In particular, they should retry the request upon 5.03 (Service Unavailable; 503 in HTTP) according to the Max-Age (Retry-After in HTTP) option, and fall back to link-format when receiving 4.15 (Unsupported Content-Format; 415 in HTTP). A resource directory MAY make the information submitted to it available to further directories, if it can ensure that a loop does"}
{"_id":"doc-en-resource-directory-2f03501c8ca3f207ae6c4f3af3bca8ddf3200e1f445853d561bc7d7ca2a87369","title":"","text":"8.1. An Endpoint (name, sector) pair is unique within the et of endpoints An Endpoint (name, sector) pair is unique within the set of endpoints registered by the RD. An Endpoint MUST NOT be identified by its protocol, port or IP address as these may change over the lifetime of an Endpoint."}
{"_id":"doc-en-resource-directory-9a04438bc5bbac275380042e2cfd5510cdffe1ab52311684fe38b8d33d479684","title":"","text":"IPv4 - \"all CoRE resource directories\" address MCD2 (suggestion: 224.0.1.189), from the \"IPv4 Multicast Address Space Registry\". As the address is used for discovery that may span beyond a single network, it has come from the Internetwork Control Block (224.0.1.x, RFC 5771). network, it has come from the Internetwork Control Block (224.0.1.x) RFC5771. IPv6 - \"all CoRE resource directories\" address MCD1 (suggestions FF0X::FE), from the \"IPv6 Multicast Address Space Registry\", in the"}
{"_id":"doc-en-resource-directory-efbea154ee7918929e677acad46a093155338bc6eaade5de82505ef8874afbea","title":"","text":"depending on their current availability and capabilities as well as application requirements, thus avoiding silo like solutions. One of the crucial enablers of such design is the ability to discover resources (machines -- endpoints) capable of providing required information at a given time or acting on instructions from the end users. resources (and thus the endpoints they are hosted on) capable of providing required information at a given time or acting on instructions from the end users. Imagine a scenario where endpoints installed on vehicles enable tracking of the position of these vehicles for fleet management"}
{"_id":"doc-en-resource-directory-ee62d9978eabb474262dc57dcdd2b79649997d1ff6d615e21d1d362e16b2ab27","title":"","text":"For cases where the device is not specifically configured with a way to find an RD, the network may want to provide a suitable default. If the address configuration of the network is performed via SLAAC, this is provided by the RDAO option rdao. The IPv6 Neighbor Discovery option RDAO rdao can do that. If the address configuration of the network is performed via DHCP, this could be provided via a DHCP option (no such option is defined at the time of writing). When DHCP is in use, this could be provided via a DHCP option (no such option is defined at the time of writing). Finally, if neither the device nor the network offers any specific configuration, the device may want to employ heuristics to find a"}
{"_id":"doc-en-resource-directory-7e2882f4bb9bb2b73927f17446a6ab16c0640b79727e28196416664b5239eb8a","title":"","text":"The First-Come-First-Remembered policy is added as an example and a potential default behavior. RD discovery: Drop the previously stated assumption that RDAO and any DHCP options would only be used together with SLAAC and DHCP for address configuration, respectivly. changes from -24 to -25 Large rework of section 7 (Security policies)"}
{"_id":"doc-en-resource-directory-65e2ff624908a91e0d8923793782f65a78c16c8207e17333928fc8dc00c435d1","title":"","text":"name and the same value, allowing for a trailing \"*\" wildcard operator as in Section 4.1 of RFC6690. Attributes that are defined as \"link-type\" match if the search value matches any of their values (see Section 4.1 of RFC6690; e.g. \"?if=core.s\" matches \";if=\"abc core.s\";\"). A resource link also matches a search criterion if its endpoint would match the criterion, and vice versa, an endpoint link matches a search criterion if any of its resource links matches it. (see Section 4.1 of RFC6690; e.g. \"?if=tag:example.net,2020:sensor\" matches \";if=\"example.regname tag:example.net,2020:sensor\";\"). A resource link also matches a search criterion if its endpoint would match the criterion, and vice versa, an endpoint link matches a search criterion if any of its resource links matches it. Note that \"href\" is a valid search criterion and matches target references. Like all search criteria, on a resource lookup it can"}
{"_id":"doc-en-resource-directory-4ad155a01eceee93130b31a0d0d2f64a823eafa97085729c6fb36d5f6622c29b","title":"","text":"identifiers; the precise semantics of such links are left to future specifications. The following example shows a client performing an endpoint type (et) lookup with the value oic.d.sensor (which is currently a registered rt value): The following example shows a client performing an endpoint lookup limited to endpoints of endpoint type \"tag:example.com,2020:platform\": 7."}
{"_id":"doc-en-resource-directory-31898271a5568e09ca0533c0247adcbf947d5a54e100f1582a0a91d53d85ed25","title":"","text":"is specified in the coap-group resource. The presence sensor can learn the presence of groups that support resources with rt=light in its own sector by sending the same request, as used by the luminary. The presence sensor learns the multicast address to use for sending messages to the luminaries. resources with rt=tag:example.com,2020:light in its own sector by sending the same request, as used by the luminary. The presence sensor learns the multicast address to use for sending messages to the luminaries. 10.2."}
{"_id":"doc-en-resource-directory-8a9caca9956fea0707ea9dc2ea7d75bb95d9ee4baecfda7cb64fd675b5eaefa3","title":"","text":"RDAO: Clarify that it is an option for RAs and not other ND messages. Examples: Use example URIs rather than unclear reg names (unless it's RFC6690 examples, which were kept for continuity) changes from -24 to -25 Large rework of section 7 (Security policies)"}
{"_id":"doc-en-resource-directory-eb8ae271fc947b65c39ca546ecf48da4f2188a5f1f1c9a49ae1475fd4e0a7891","title":"","text":"at the CoAP layer then it may be inclined to use the endpoint name for looking up what information to provision to the malicious device. Endpoint authentication needs to be checked independently of whether there are configured requirements on the credentials for a given endpoint name (secure-ep) or whether arbitrary names are accepted (arbitrary-ep). Endpoint authorization needs to be checked on registration and registration resource operations independently of whether there are configured requirements on the credentials for a given endpoint name (secure-ep) or whether arbitrary names are accepted (arbitrary-ep). Simple registration could be used to circumvent address-based access control: An attacker would send a simple registration request with"}
{"_id":"doc-en-resource-directory-45e142225426177ee801ba1ca6bc2d4048ca6e1f0a2a4bce50df392c51d096b6","title":"","text":"and its links. Commissioning Tool (CT) is a device that assists during the installation of the network by assigning values to parameters, naming endpoints and groups, or adapting the installation to the needs of the applications. Commissioning Tool (CT) is a device that assists during installation events by assigning values to parameters, naming endpoints and groups, or adapting the installation to the needs of the applications. Registrant-ep is the endpoint that is registered into the RD. The"}
{"_id":"doc-en-resource-directory-e139520071b657626a82eebe54b2e4bac7aa68610b7d165a3c6cb12bb6c810de","title":"","text":"any DHCP options would only be used together with SLAAC and DHCP for address configuration, respectivly. Terminology: Clarify that the CTs' installation events can occur multiple times. changes from -24 to -25 Large rework of section 7 (Security policies)"}
{"_id":"doc-en-resource-directory-91ebe39a1de927876ede061ffe709bd6eccfc7ac802bbff663c86b763245beb6","title":"","text":"resource returned by the initial registration operation. An update MAY update registration parameters like lifetime, base URI or others. Parameters that are not being changed SHOULD NOT be or others. Parameters that are not being changed should not be included in an update. Adding parameters that have not changed increases the size of the message but does not have any other implications. Parameters MUST be included as query parameters in an implications. Parameters are included as query parameters in an update operation as in registration. A registration update resets the timeout of the registration to the"}
{"_id":"doc-en-resource-directory-1f1202f7a8c39db2b185b49fbb43fdb705cd333632f694b649ef67231dff9113","title":"","text":"URIs and relative references, and not limit the set of discovered URIs to those hosted at the address used for URI discovery. With security policies where the client requires the RD to be authorized to act as an RD, that authorization may be limited to resources on which the authorized RD advertises the adequate resource types. Clients that have obtained links they can not rely on yet can repeat the URI discovery step at the /.well-known/core resource of the indicated host to obtain the resource type information from an authorized source. The URI Discovery operation can yield multiple URIs of a given resource type. The client of the RD can use any of the discovered addresses initially."}
{"_id":"doc-en-resource-directory-b8d4632b18dc2ef0342611a065bc598af50b5b28d87cafeb56dfc51732e0e9b8","title":"","text":"which the lookup client relies on the RD. To avoid the limitations, RD applications should consider prescribing that lookup clients only use the discovered information as hints, and describe which pieces of information need to be verified with the server because they impact the application's security. information need to be verified because they impact the application's security. A straightforward way to verify such information is to request it again from an authorized server, typically the one that hosts the target resource. That similar to what happens in discovery when the URI discovery step is repeated. 7.3."}
{"_id":"doc-en-resource-directory-75e119cadedc6bd291070aad7f2a6fea8a500d480f89ded9d801a4f25734cb03","title":"","text":"A web entity that stores information about web resources and implements the REST interfaces defined in this specification for discovery, for the creation, the maintenance and the removal of discovery, for the creation, maintenance and removal of registrations, and for lookup of the registered resources."}
{"_id":"doc-en-resource-directory-ffb9446ba48402f2506b57f2d2384442c00b67c0cf33fe6e1235bd38a00cb590","title":"","text":"format payload to register. The registrant-ep includes the same registration parameters in the POST request as it would per registration. The registration base URI of the registration is taken from the registrant-ep's network address (as is default with regular registrations). POST request as it would with a regular registration per registration. The registration base URI of the registration is taken from the registrant-ep's network address (as is default with regular registrations). Example request from registrant-EP to RD (unanswered until the next step):"}
{"_id":"doc-en-resource-directory-0694552030b606c3f8a05b1c93af7da602389deda0c3f4f4f5c92230fc4db753","title":"","text":"lookup clients may access the information. In this case, the endpoint (and not the lookup clients) needs to be careful to check the RD's authorization. careful to check the RD's authorization. The RD needs to check any lookup client's authorization before revealing information directly (in resource lookup) or indirectly (when using it to satisfy a resource lookup search criterion). 7.4."}
{"_id":"doc-en-resource-directory-d127e2b48a1276316d34e7fe140cd1d98b962290a5c213c62d1c9265b0e5af4f","title":"","text":"If the client's credentials indicate any subject name that is certified by any authority which the RD recognizes (which may be the system's trust anchor store), all those subject names are the system's trust anchor store), all such subject names are stored. With CWT or JWT based credentials (as common with ACE), the Subject (sub) claim is stored as a single name, if it exists. With X.509 certificates, the Common Name (CN) and the complete"}
{"_id":"doc-en-resource-directory-d33fe9e24c8df401f0313278596d7a958b65aa1d8a65ce3b03a431ff5a686f3a","title":"","text":"12. changes from -27 to -28 Security policies / link confidentiality: Point out the RD's obligations that follow from such a policy. Simple registration: clarify term \"regular registration\" by introducing it along with the reference to Wording fix in first-come-first-remembered Wording fixes in RD definition changes from -26 to -27 In general, this addresses the points that were pointed out in"}
{"_id":"doc-en-resource-directory-6190e910dc568d116931df04231ac4dff8a96dfb309dc82551e6d496cfdae53f","title":"","text":"operations on a registration. After the initial registration, the registering endpoint retains the returned location of the Registration Resource for further returned location of the registration resource for further operations, including refreshing the registration in order to extend the lifetime and \"keep-alive\" the registration. When the lifetime of the registration has expired, the RD SHOULD NOT respond to discovery queries concerning this endpoint. The RD SHOULD continue to provide access to the Registration Resource after a registration time-out access to the registration resource after a registration time-out occurs in order to enable the registering endpoint to eventually refresh the registration. The RD MAY eventually remove the registration resource for the purpose of garbage collection. If the Registration Resource is removed, the corresponding endpoint will registration resource is removed, the corresponding endpoint will need to be re-registered. The Registration Resource may also be used cancel the registration The registration resource may also be used cancel the registration using DELETE, and to perform further operations beyond the scope of this specification. Operations on the Registration Resource are sensitive to reordering; Operations on the registration resource are sensitive to reordering; freshness describes how order is restored. The operations on the Registration Resource are described below. The operations on the registration resource are described below. 5.3.1."}
{"_id":"doc-en-resource-directory-1009d401b67a8d1884ad3ca4c95725c34e8f130fc6e6cc68ee8ca8a7c2220a80","title":"","text":"victim's /.well-known/core content in the RD. Mitigation for this is recommended in simple. The Registration Resource path is visible to any client that is The registration resource path is visible to any client that is allowed endpoint lookup, and can be extracted by resource lookup clients as well. The same goes for registration attributes that are shown as target attributes or lookup attributes. The RD needs to consider this in the choice of Registration Resource paths, and consider this in the choice of registration resource paths, and administrators or endpoint in their choice of attributes. 8.3."}
{"_id":"doc-en-resource-directory-1ce532f3ad1712fd4a5243feee7b02274f6ca8adfd9dcbaa6ef443cbfc2ef940","title":"","text":"Wording fixes in RD definition Capitalization: Consistently using \"registration resource\" changes from -26 to -27 In general, this addresses the points that were pointed out in"}
{"_id":"doc-en-rfc-censorship-tech-6b8855efe0ca0722259b36b5cb164f328cfd8b5b0f758f0def864f4807137e9a","title":"","text":"the connection, the session is terminated. Trade-offs: RST Packet Injection has a few advantages that make it extremely popular is a censorship technique. RST Packet Injection is extremely popular as a censorship technique. RST Packet Injection is an out-of-band prevention mechanism, allowing the avoidance of the the QoS bottleneck one can encounter with inline techniques such as Packet Dropping. This out-of-band property allows a censor to"}
{"_id":"doc-en-rfc-censorship-tech-cc341d09bb22aa3e44adef71119e20f5959828e593954a083c28992a17f4a82b","title":"","text":"1. Censorship is where an entity in a position of power - such as a government, organization, or individual - supresses communication government, organization, or individual - suppresses communication that it considers objectionable, harmful, sensitive, politically incorrect or inconvenient. (While censors that engage in censorship or establish censorship regimes must do so through legal, military,"}
{"_id":"doc-en-rfc-censorship-tech-600bdc97e0dae81cb80b748ba5caa37e6c2def4db36ff4a230631d4e110c7166","title":"","text":"interference. Prescription is the process by which censors determine what types of material they should block, i.e. they decide to block a list of pornographic websites. Identification is the process by which censors classify specific traffic to be blocked or impaird, which censors classify specific traffic to be blocked or impaired, i.e. the censor blocks or impairs all webpages containing \"sex\" in the title or traffic to sex.com. Interference is the process by which the censor intercedes in communication and prevents access to"}
{"_id":"doc-en-rfc-censorship-tech-0aaae9f95b5517accf733ef2eb8be77316ba263d2b09989d19e20675aecc274e","title":"","text":"4.1. While other interference techniques outlined in this section mostly focus on blocking or preventing access to content, it can be an effective censorship strategy in some cases to not entirely block access to a given destination, or service but instead degrade the performance of the relevant network connection. The resulting user experience for a site or service under performance degradation can be so bad that users opt to use a different site, service, or method of communication, or may not engage in communication at all if there are no alternatives. Traffic shaping techniques that rate-limit the bandwidth available to certain types of traffic is one example of a performance degradation. Trade offs: While implementing a performance degradation will not always eliminate the ability of people to access a desire resource, it may force them to use other means of communication where censorship (or surveillance) is more easily accomplished. Empirical examples: Iran is known to shape the bandwidth available to HTTPS traffic to encourage unencrypted HTTP traffic Aryan-2012. 4.2. Packet dropping is a simple mechanism to prevent undesirable traffic. The censor identifies undesirable traffic and chooses to not properly forward any packets it sees associated with the traversing"}
{"_id":"doc-en-rfc-censorship-tech-5fdd797cced40107ea2bbe4bc5c0446542ea40e1b949b68dce5b7e6abf28659b","title":"","text":"uses Packet Dropping as the mechanisms for throttling SSH Aryan-2012. These are but two examples of a ubiquitous censorship practice. 4.2. 4.3. Packet injection, generally, refers to a man-in-the-middle (MITM) network interference technique that spoofs packets in an established"}
{"_id":"doc-en-rfc-censorship-tech-378f27239ae83d1ecbb54d77e6d1f25301ad74ba5a590023826ee8e3aa3dc17f","title":"","text":"interference is especially evident in the interruption of encrypted/ obfuscated protocols, such as those used by Tor Winter-2012. 4.3. 4.4. There are a variety of mechanisms that censors can use to block or filter access to content by altering responses from the DNS"}
{"_id":"doc-en-rfc-censorship-tech-995e421396c862956e8c18c61155f6768d728273cacdaf6973ce94ec5ca6ebf3","title":"","text":"TLDs as well, but only Iran has acted by blocking all Israeli (.il) domains Albert-2011. 4.4. 4.5. Distributed Denial of Service attacks are a common attack mechanism used by \"hacktivists\" and black-hat hackers, but censors have used"}
{"_id":"doc-en-rfc-censorship-tech-18e9f54a8121ddd7a462a407b9591e82ff1e4d55b8f399e94e9776dd74ba87f8","title":"","text":"comandeered those user agents to send DDoS traffic to various sites Marczak-2015. 4.5. 4.6. While it is perhaps the crudest of all censorship techniques, there is no more effective way of making sure undesirable information isn't"}
{"_id":"doc-en-rfc-censorship-tech-9c46713e5bacdd6ec162942ac694030ab337221a45292bfafe5e6ae2b0b40cbf","title":"","text":"can be physically seized or the hosting provider can be required to prevent access Anderson-2011. 6.4. In some countries, legal mechanisms exist where an individual can issue a legal request to a content host that requires the host to take down content. Examples include the voluntary systems employed by companies like Google to comply with \"Right to be Forgotten\" policies in the European Union Google-RTBF and the copyright-oriented notice and takedown regime of the United States Digital Millennium Copyright Act (DMCA) Section 512 DMLP-512. 7. This document benefited from discussions with Stephane Bortzmeyer,"}
{"_id":"doc-en-rfc5245bis-0dcf1fc6a739b848d34e6c4e2bfeae4c59642f1dc3f5e25f517a5dea9429aa4b","title":"","text":"13. During the gathering phase of ICE (sec-gathering) and while ICE is performing connectivity checks (sec-connectivity_check), an agent sends STUN and TURN transactions. These transactions are paced at a rate of one every Ta milliseconds, and utilize a specific RTO. This section describes how the values of Ta and RTO are computed. This computation depends on whether ICE is being used with a real-time media stream (such as RTP) or something else. When ICE is used for a stream with a known maximum bandwidth, the computation in sec-rtp- based MAY be followed to rate-control the ICE exchanges. For all other streams, the computation in sec-non-rtp MUST be followed. 13.1. The values of RTO and Ta change during the lifetime of ICE processing. One set of values applies during the gathering phase, and the other, for connectivity checks. The value of Ta SHOULD be configurable, and SHOULD have a default of: where k is the number of media streams. During the gathering phase, Ta is computed based on the number of media streams the agent has indicated in the candidate information, and the RTP packet size and RTP ptime are those of the most preferred codec for each media stream. Once the candidate exchange is completed, the agent recomputes Ta to pace the connectivity checks. In that case, the value of Ta is based on the number of media streams that will actually be used in the session, and the RTP packet size and RTP ptime are those of the most preferred codec with which the agent will send. In addition, the retransmission timer for the STUN transactions, RTO, defined in RFC5389, SHOULD be configurable and during the gathering phase, SHOULD have a default of: where the number of pairs refers to the number of pairs of candidates with STUN or TURN servers. For connectivity checks, RTO SHOULD be configurable and SHOULD have a default of: where Num-Waiting is the number of checks in the check list in the Waiting state, and Num-In-Progress is the number of checks in the In- Progress state. Note that the RTO will be different for each transaction as the number of checks in the Waiting and In-Progress states change. These formulas are aimed at causing STUN transactions to be paced at the same rate as media. This ensures that ICE will work properly under the same network conditions needed to support the media as well. See sec-pacing for additional discussion and motivations. Because of this pacing, it will take a certain amount of time to obtain all of the server reflexive and relayed candidates. Implementations should be aware of the time required to do this, and if the application requires a time budget, limit the number of candidates that are gathered. The formulas result in a behavior whereby an agent will send its first packet for every single connectivity check before performing a retransmit. This can be seen in the formulas for the RTO (which represents the retransmit interval). Those formulas scale with N, the number of checks to be performed. As a result of this, ICE maintains a nicely constant rate, but becomes more sensitive to During the ICE gathering phase (sec-gathering) and while ICE is performing connectivity checks (sec-connectivity_check), an agent triggers STUN and TURN transactions. These transactions are paced at a rate indicated by Ta, and the retransmission interval for each transaction is calculated based on the the retransmission timer for the STUN transactions (RTO) RFC5389. This section describes how the Ta and RTO values are computed during the ICE gathering pahse and while ICE is performing connectivity checks. NOTE: Previously, in RFC 5245, different formulas were defined for comupting Ta and RTO, depending on whether ICE was used for a real- time media stream (e.g. RTP) or not. The formulas below result in a behavior whereby an agent will send its first packet for every single connectivity check before performing a retransmit. This can be seen in the formulas for the RTO (which represents the retransmit interval). Those formulas scale with N, the number of checks to be performed. As a result of this, ICE maintains a nicely constant rate, but becomes more sensitive to packet loss. The loss of the first single packet for any connectivity check is likely to cause that pair to take a long time to be validated, and instead, a lower-priority check (but one for"}
{"_id":"doc-en-rfc5245bis-40745e68e043b3d49f692832e8bd3e4948a9c41253e7b9b48a286c60e4dcc567","title":"","text":"13.2. In cases where ICE is used to establish some kind of session that is not real time, and has no fixed rate associated with it that is known to work on the network in which ICE is deployed, Ta and RTO revert to more conservative values. Ta SHOULD be configurable, SHOULD have a default of 500 ms, and MUST NOT be configurable to be less than 500 ms. ICE agents SHOULD use the default Ta value, 50 ms, but MAY use another value based on the characteristics of the associated media. ICE agents MUST NOT use a Ta value smaller than 5 ms. If an ICE agent wants to use another Ta value than the default value, the agent MUST indicate the proposed value to its peer during the ICE exchange. Both agents MUST use the higher value of the proposed values. If an agent does not propose a value, the default value is used for that agent when comparing which value is higher. NOTE: sec-concheckbw shows examples of required bandwidth, using different Ta values. If other Ta value than the default is used, the agent MUST indicate the value it prefers to use in the ICE exchange. Both agents MUST use the higher out of the two proposed values. 13.3. In addition, the retransmission timer for the STUN transactions, RTO, SHOULD be configurable and during the gathering phase, SHOULD have a default of: During the ICE gathering phase, ICE agents SHOULD calculate the RTO value using the following formula: where the number of pairs refers to the number of pairs of candidates with STUN or TURN servers. For connectivity checks, ICE agents SHOULD calculate the RTO value using the following formula: For connectivity checks, RTO SHOULD be configurable and SHOULD have a default of: ICE agents MAY calculate the RTO value using other mechanisms than those described above. ICE agents MUST NOT use a RTO value smaller than 500 ms. 14."}
{"_id":"doc-en-rfc5245bis-c3ae229a4925bc9d4e3646c1c0736575193d0ec79e9b36d7931b664b9887453c","title":"","text":"In order to limit the attacks described in sec-ice-hammer, an ICE agent MUST limit the total number of connectivity checks the agent performs across all check lists to a specific value, and this value MUST be configurable. A default of 100 is RECOMMENDED. This limit is enforced by discarding the lower-priority candidate pairs until there are less than 100. It is RECOMMENDED that a lower value be utilized when possible, set to the maximum number of plausible checks that might be seen in an actual deployment configuration. The requirement for configuration is meant to provide a tool for fixing this value in the field if, once deployed, it is found to be problematic. performs across all check lists in the check list set. This is done by limiting the total number of candidate pairs in the check list set. The default limit of candidate pairs for the check list set is 100, but the value MUST be configurable. The limit is enforced by, within in each check list, discarding lower-priority candidate pairs until the total number of candidate pairs in the check list set is smaller than the limit value. The discarding SHOULD be done evenly so that the number of candidate pairs in each check list is reduced the same amount. It is RECOMMENDED that a lower limit value than the default is picked when possible, and that the value is set to the maximum number of plausible candidate pairs that might be created in an actual deployment configuration. The requirement for configuration is meant to provide a tool for fixing this value in the field if, once deployed, it is found to be problematic. 6.1.2.6."}
{"_id":"doc-en-rfc5245bis-8306b0b320014a202ef1dea6eb23474dc00b81b909f55932bfec4f83b359ce1b","title":"","text":"22. Following is the list of changes from RFC 5245 The purpose of this updated ICE specification is to: The specification was generalized to be more usable with any protocol and the parts that are specific to SIP and SDP were moved to a SIP/SDP usage document I-D.ietf-mmusic-ice-sip-sdp. Clarify procedures in RFC 5245. Default candidates, multiple components, ICE mismatch detection, subsequent offer/answer, and role conflict resolution were made optional since they are not needed with every protocol using ICE. Make technical changes, due to discovered flows in RFC 5245 and based on feedback from the community that has implemented and deployed ICE applications based on RFC 5245. With IPv6, the precedence rules of RFC 6724 are used instead of the obsoleted RFC 3483 and using address preferences provided by the host operating system is recommended. Make the procedures signaling protocol independent, by removing the SIP and SDP procedures. Procedures specific to a signaling protocol will be defined in separate usage documents. I-D.ietf- mmusic-ice-sip-sdp defines the ICE usage with SIP and SDP. Candidate gathering rules regarding loopback addresses and IPv6 addresses were clarified. The following technical changes have been done: Aggressive nomination removed. The procedures for calculating candidate pair states and scheduling connectivity checks modified. Procedures for calculation of Ta and RTO modified. Active check list and frozen check list definitions removed. 'ice2' ice option added. IPv6 considerations modified. Usage with no-op for keepalives, and keepalives with non-ICE peers, removed. "}
{"_id":"doc-en-rtcweb-overview-687fef92404f34cb1c20ce1e13c3866f417cd67f836bf46eece9d07337dcb70b","title":"","text":"identification systems (such as is served by telephone numbers or email addresses in other communications systems). Development of The Universal Solution has proved hard, however, for all the usual reasons. Development of The Universal Solution has, however, proved hard. The last few years have also seen a new platform rise for deployment of services: The browser-embedded application, or \"Web application\"."}
{"_id":"doc-en-rtcweb-overview-b074b2c7a0d003e97cf21987d904e556d6284b309f1167cdb028a43792a3a99e","title":"","text":"entities that handle the data, but do not modify it (such as TURN relays). It includes necessary functions for congestion control: When not to send data. It includes necessary functions for congestion control, retransmission, and in-order delivery. WebRTC endpoints MUST implement the transport protocols described in I-D.ietf-rtcweb-transports."}
{"_id":"doc-en-rtcweb-overview-2a69cc48d23dd025d2c8f4c37b396a6d1de4676dc4b3438624cd8c78ebc4682e","title":"","text":"multiple data channels between them. An implementation of the Interactive Connectivity Establishment (ICE) I-D.ietf-ice-rfc5245bis protocol. An ICE Agent may also be an SDP Agent, but there exist ICE Agents that do not use SDP (for instance those that use Jingle XEP-0166). (ICE) RFC5245 protocol. An ICE Agent may also be an SDP Agent, but there exist ICE Agents that do not use SDP (for instance those that use Jingle XEP-0166). Communication between multiple parties, where the expectation is that an action from one party can cause a reaction by another"}
{"_id":"doc-en-rtcweb-transport-dac30a07f79c066578bea7ddd146f096b7b5bc530b89ca80f528f7a03e8b7616","title":"","text":"browser MUST be able to communicate. When TURN is used, and the TURN server has IPv4 or IPv6 connectivity to the peer or its TURN server, candidates of the appropriate types MUST be supported. The \"Happy Eyeballs\" specification for ICE I- D.martinsen-mmusic-ice-dualstack-fairness SHOULD be supported. to the peer or the peer's TURN server, candidates of the appropriate types MUST be supported. The \"Happy Eyeballs\" specification for ICE I-D.ietf-mmusic-ice-dualstack-fairness SHOULD be supported. 3.3."}
{"_id":"doc-en-rtcweb-transport-23f5c09720f23e7d0e7f0a3e0ccb37bf4f71723d09123a89030b5f0ef4108aee","title":"","text":"establishing UDP relay candidates using TURN over TCP to connect to their respective relay servers. Third, using TCP only between the endpoint and its relay may result in less issues with TCP in regards to real-time constraints, e.g. due to head of line blocking. Third, using TCP between the client's TURN server and the peer may result in more performance problems than using UDP, e.g. due to head of line blocking. ICE-TCP candidates RFC6544 MUST be supported; this may allow applications to communicate to peers with public IP addresses across"}
{"_id":"doc-en-rtcweb-transport-6be0963561deaf58fe73d4e733af81c2dd68239c4e286840a78694e15d6b16af","title":"","text":"6. Security considerations are enumerated in I-D.ietf-rtcweb-security. RTCWEB security considerations are enumerated in I-D.ietf-rtcweb- security. Security considerations pertaining to the use of DSCP are enumerated in I-D.ietf-tsvwg-rtcweb-qos. "}
{"_id":"doc-en-rtcweb-transport-9cdd163308dc75fa067a039f4aaff56f4e2d7e89522d1bc12319d333f3f1a160","title":"","text":"UDP-blocking firewalls without using a TURN server. If TCP connections are used, RTP framing according to RFC4571 MUST be used, both for the RTP packets and for the DTLS packets used to carry data channels. used for all packets. This includes the RTP packets, DTLS packets used to carry data channels, and STUN connectivity check packets. The ALTERNATE-SERVER mechanism specified in RFC5389 (STUN) section 11 (300 Try Alternate) MUST be supported."}
{"_id":"doc-en-security-arch-3292e07041fb7aa8abe53779014b99662f0551dbcf4ec4ccdc28385b0b0ecc7e","title":"","text":"2. The key words \"MUST\", \"MUST NOT\", \"REQUIRED\", \"SHALL\", \"SHALL NOT\", \"SHOULD\", \"SHOULD NOT\", \"RECOMMENDED\", \"MAY\", and \"OPTIONAL\" in this document are to be interpreted as described in RFC2119. \"SHOULD\", \"SHOULD NOT\", \"RECOMMENDED\", \"NOT RECOMMENDED\", \"MAY\", and \"OPTIONAL\" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here. 3."}
{"_id":"doc-en-security-arch-876050727fb60de541bd643fb4479cf47a5a970204e79d55d622ad4c757095ed","title":"","text":"authoritative IdPs, thus allowing the user to instantly grasp that the call is being authenticated by Facebook, Google, etc. 6.4.4.1. Because a broad range of characters are permitted in identity strings, it may be possible for attackers to craft identities which are confusable with other identities (see RFC6943 for more on this topic). This is a problem with any identifier space of this type (e.g., e-mail addresses). Those minting identifers should avoid mixed scripts and similar confusable characters. Those presenting these identifiers to a user should consider highlighting cases of mixed script usage (see RFC5890, section 4.4). Other best practices are still in development. 6.4.5. A number of optional Web security features have the potential to"}
{"_id":"doc-en-senml-spec-ec640c26694bdb695bbe2b4c70340c1b9db6ad38d1fc977ab57ec3eb487928a0","title":"","text":"11.3. The following registrations are done following the procedure specified in RFC6838 and RFC7303. specified in RFC6838 and RFC7303. Clipboard formats are defined for the JSON and XML form of lists but do not make sense for streams or other formats. Note to RFC Editor - please remove this paragraph. Note that a request for media type review for senml+json was sent to the media-"}
{"_id":"doc-en-senml-spec-b70ea18299d9402745250cfe777fbf086ce4fefb8e86666e55d6d3c12735b492","title":"","text":"File extension(s): senml and sensml Windows Clipboard Name: \"JSON Sensor Measurement List\" for senml Macintosh file type code(s): none Macintosh Universal Type Identifier code: org.ietf.senml-json conforms to public.text for senml Person & email address to contact for further information: Cullen Jennings "}
{"_id":"doc-en-senml-spec-31bfd8c2c2571541b216ba730708b34cf22d1ae8fbd4ff5e9e4fdc029a98f949","title":"","text":"File extension(s): senmlx and sensmlx Windows Clipboard Name: \"XML Sensor Measurement List\" for senmlx Macintosh file type code(s): none Macintosh Universal Type Identifier code: org.ietf.senml-xml conforms to publc.xml for senmlx Person & email address to contact for further information: Cullen Jennings "}
{"_id":"doc-en-senml-spec-ead47835b7a020ee14f50af2f8862be4b420709be01308827afdeb92bec0e2c5","title":"","text":"IANA will create a registry of SenML unit symbols. The primary purpose of this registry is to make sure that symbols uniquely map to give type of measurement. Definitions for many of these units can be found in location such as NIST811 and BIPM. found in location such as NIST811 and BIPM. Units marked with an asterisk are NOT RECOMMENDED to be produced by new implementations, but are in active use and SHOULD be implemented by consumers that can use the related base units. Note 1: A value of 0.0 indicates the switch is off while 1.0 indicates on and 0.5 would be half on. indicates on and 0.5 would be half on. The preferred name of this unit is \"/\". For historical reasons, the name \"%\" is also provided for the same unit - but note that while that name strongly suggests a percentage (0..100) -- it is however NOT a percentage, but the absolute ratio! Note 2: Assumed to be in WGS84 unless another reference frame is known for the sensor."}
{"_id":"doc-en-senml-spec-549b1e72561d71ddcc8655fd4635652e9ff326c78372ffd8d88f828df89375b4","title":"","text":"single canonical representation outweighs the convenience of easy human representations or loss of precision in a conversion. Use of SI prefixes such as \"k\" before the unit is not allowed. Use of SI prefixes such as \"k\" before the unit is not recommended. Instead one can represent the value using scientific notation such a 1.2e3. TODO - Open Issue. Some people would like to have SI prefixes to improve human readability. a 1.2e3. The \"kg\" unit is exception to this rule since it is an SI base unit; the \"g\" unit is provided for legacy compatibility. For a given type of measurement, there will only be one unit type defined. So for length, meters are defined and other lengths such"}
{"_id":"doc-en-sframe-5d97f7977d448b908e0c8102b2f306f368260de791163eb0814f67db64cbb1bf","title":"","text":"extra cost. Adding a digital signature to each encrypted frame will be an overkill, instead we propose adding signature over N frames. Because some frames could be lost and never delivered, when the signature is sent, it will also send all the hashes it used to calculate the signature, and the recipient client will only use these hashes if they didn't receive the matching frame. For example Client A sends a signature every 5 frames, so it sends the signature and Hash(Frame1), ...,Hash(Frame5), client B received only frames 1,2,4 and 5. When B receives the signature and the hashes, it will compute the hashes of frames 1,2,4 and 5 locally and use the received Hash(Frame3) to verify the signature. It is up to the application to decide what to do when signature verification fails. The signature keys are exchanged out of band along the secret keys. overkill, instead we propose adding signature over multiple frames. The signature is calculated by contatenating the authentication tags of the frames that the sender wants to authenticate (in reverse sent order) and signing it with the signature key. Signature keys are exchanged out of band along the secret keys. The authentication tags for the previous frames covered by the signature and the signature itself will be appended at end of the frame, after the current frame authentication tag, in the same order that the signature was calculated, and the SFrame header metadata signature bit (S) will be set to 1. Note that the authentication tag for the current frame will only authenticate the SFrame header and the encrypted payload, ant not the signature nor the previous frames's authentication tags (N-1 to N-M) used to calculate the signature. The last byte (NUM) after the authentication tag list and before the signature indicates the number of the authentication tags from previous frames present in the current frame. All the authentications tags MUST have the same size, which MUST be equal to the authentication tag size of the current frame. The signature is fixed size depending on the signature algorithm used (for example, 64 bytes for Ed25519). The receiver has to keep track of all the frames received but yet not verified, by storing the authentication tags of each received frame. When a signature is received, the reciever will verify it with the signature key associated to the key id of the frame the singature was sent in. If the verification is sucessful, the received will mark the frames as authenticated and remove them from the list of the not verified frames. It is up to the application to decide what to do when signature verification fails. When using SVC, the hash will be calculated over all the frames of the different spatial layers within the same superframe/picture. However the SFU will be able to drop frames within the same stream (either spatial or temporal) to match target bitrate. If the signature is sent on a frame which layer that is dropped by the SFU, the receiver will not receive it and will not be able to perform the signature of the other received layers. An easy way of solving the issue would be to perform signature only on the base layer or take into consideration the frame dependency graph and send multiple signatures in parallel (each for a branch of the dependency graph). In case of simulcast or K-SVC, each spatial layer sould be authenticated with different signatures to prevent the SFU to discard frames with the signature info. In any case, it is possible that the frame with the signature is lost or the SFU drops it, so the receiver MUST be prepared to not receive a signature for a frame and remove it from the pending to be verified list after a timeout. 4."}
{"_id":"doc-en-smime-433233d5e300679df91280d718cb36ade90fd90e7f2d6ad92d7e457dc9570e34","title":"","text":"Modification of the ciphertext can go undetected if authentication is not also used, which is the case when sending EnvelopedData without wrapping it in SignedData or enclosing SignedData within it. wrapping it in SignedData or enclosing SignedData within it. This is one of the reasons for moving from EnvelopedData to AuthEnvelopedData as the authenticated encryption algorithms provide the authentication without needing the SignedData layer. If an implementation is concerned about compliance with National Institute of Standards and Technology (NIST) key size"}
{"_id":"doc-en-smime-31319e79bbd3d3b684e65575bb6e8cf87bacff834d9dbf324782ad1b42844b6b","title":"","text":"the fact that the CEK is going to be known to both parties. Thus the origination is always built on a presumption that \"I did not send this message to myself.\" All of the authenticated encryption algorithms in this document use counter mode for the encryption portion of the algorithm. This means that the length of the plain text will always be known as the cipher text length and the plain text length are always the same. This information can enable passive observers to infer information based solely on the length of the message. Applications for which this is a significant problem need to provide some type of padding algorithm so that the length of the message does not provide this information. "}
{"_id":"doc-en-sniencryption-1819fafe4d0ce18bb9fd998bc084aa148bad2ae69133303c531d3823dc3426be","title":"","text":"4- The multiplexed server establishes the connection to the protected service, thus revealing the identity of the service. One of the goals of SNI encryption is to prevent adversaries from knowing which Hidden Service the client is using. Successful replay attacks breaks that goal by allowing adversaries to discover that service. SNI encryption designs MUST mitigate this attack. 2.2."}
{"_id":"doc-en-sniencryption-4cd230cbcb2db312dd02d56295b814958440a615d328a7860717d7ff56696a98","title":"","text":"HTTPS, which effectively treats the Fronting Server as an HTTP Proxy. In this solution, the client establishes a TLS connection to the Fronting Server, and then issues an HTTP Connect request to the Hidden Server. This will effectively establish an end-to-end HTTPS over TLS connection between the client and the Hidden Server, mitigating the issues described in nocontextsharing. Hidden Server. This will establish an end-to-end HTTPS over TLS connection between the client and the Hidden Server, mitigating the issues described in nocontextsharing. The HTTPS in HTTPS solution requires double encryption of every packet. It also requires that the fronting server decrypts and relay"}
{"_id":"doc-en-sniencryption-01f0d2eefda510085885c073b4fe5392c3b26071a384915eebae3b36eadfaffd","title":"","text":"Antoine Delignaut-Lavaud. The delegation token design comes from many people, including Ben Schwartz and Rich Salz. Schwartz, Brian Sniffen and Rich Salz. 9. References"}
{"_id":"doc-en-stateless-085b1b6b10eab46c80bd6811cb9754d44277b2d223298d4a28cd5d65b648dbc0","title":"","text":"Transporting the state needed by a client to process a response as serialized state information in the token has several significant and non-obvious security and privacy implications that need to be mitigated; see serialized-state for recommendations. In addition to the format requirements outlined there, implementations need to ensure that they are not vulnerable to maliciously crafted, delayed, or replayed tokens. mitigated; see serialized-state for recommendations. In addition to the format requirements outlined there, implementations need to ensure that they are not vulnerable to maliciously crafted, delayed, or replayed tokens. It is generally expected that the use of encryption, integrity protection, and replay protection for serialized state is appropriate. In the absence of integrity and reply protection, an on-path attacker or rogue server/intermediary could return a state (either one modified in a reply, or an unsolicited one) that could alter the internal state of the client. It is this reason that at least the use of integrity protection on the token is always recommended. appropriate. In the absence of integrity and reply protection, an on-path attacker or rogue server/intermediary could return a state (either one modified in a reply, or an unsolicited one) that could alter the internal state of the client. It is this reason that at least the use of integrity protection on the token is always recommended. It maybe that in some very specific case, as a result of a careful and detailed analysis of any potential attacks, that there may be cases where such cryptographic protections do not add value. The authors of this document have not found such a use case as yet. RFC3610 with a 64-bit tag is RECOMMENDED, combined with a sequence number and a replay window. Where encryption is not needed, RFC6234, combined with a sequence number and a replay window, may be used. authors of this document have not found such a use case as yet, but this is a local decision. It should further be emphasized that the encrypted state is created by the sending node, and decrypted by the same node when receiving a response. The key is not shared with any other system. Therefore the choice of encryption scheme and the generation of the key for this system is purely a local matter. When encryption is used, the use of RFC3610 with a 64-bit tag is recommended, combined with a sequence number and a replay window. This choice is informed by available hardware acceleration of on many constrained systems. If a different algorithm is available accelerated on the sender, with similar strength, then it SHOULD be preferred. Where privacy of the state is not required, and encryption is not needed, RFC6234, combined with a sequence number and a replay window, may be used. This size of the replay window depends upon the number of outstanding requests that need to be outstanding. This can be determined from the rate at which new ones are made, and the expected duration in which responses are expected. For instance, given a CoAP ACK_TIMEOUT of 2s, and a request rate of 10 requests/second, any request that is not answered within 2s will be considered to have failed. Thus at most 20 request can be outstanding at a time, and any convenient replay window larger than 20 will work. As replay windows are often implemented with a sliding window and a bit, the use of a 32-bit window would be sufficient. For use cases where requests are being relayed from another node, the request rate may be estimated by the total link capacity allocated for that kind of traffic. An alternate view would consider how many IPv6 Neighbor Cache Entries (NCEs) the system can afford to allocate for this use. When using an encryption mode that depends on a nonce, such as AES- CCM, repeated use of the same nonce under the same key causes the cipher to fail catastrophically. If a nonce is ever used for more than one encryption operation with the same key, then the same key stream gets used to encrypt both plaintexts and the confidentiality guarantees are voided. Devices with low-quality entropy sources -- as is typical with constrained devices, which incidentally happen to be a natural candidate for the stateless mechanism described in this document -- need to carefully pick a nonce generation mechanism that provides the above uniqueness guarantee. Additionally, since it can be difficult to use AES-CCM securely when using statically configured keys, implementations should use RFC4107. cipher to fail catastrophically. If a nonce is ever used for more than one encryption operation with the same key, then the same key stream gets used to encrypt both plaintexts and the confidentiality guarantees are voided. Devices with low-quality entropy sources -- as is typical with constrained devices, which incidentally happen to be a natural candidate for the stateless mechanism described in this document -- need to carefully pick a nonce generation mechanism that provides the above uniqueness guarantee. RFC8613 appendix B.1.1 (\"Sender Sequence Number\") provides a model for how to maintain non-repeating nonces without causing excessive wear of flash. 6."}
{"_id":"doc-en-suit-firmware-encryption-e70d28a3d19eb283dfc5eb2170e823afaa5ce9e52a17e61426e320ceb1c5b301","title":"","text":"8. The ability to restart an interrupted firmware update is often a requirement for low-end IoT devices. To fulfill this requirement it is necessary to chunk a larger firmware image into blocks and to encrypt each block individually using a cipher that does not increase the size of the resulting ciphertext (i.e., by not adding an authentication tag after each encrypted block). Flash memory on microcontrollers is a type of non-volatile memory that erases data in units called blocks, pages or sectors and re- writes data at byte level (often 4-bytes). Flash memory is furthermore segmented into different memory regions, which store the bootloader, different versions of firmware images (in so-called slots), and configuration data. image-layout shows an example layout of a microcontroller flash area. The primary slot contains the firmware image to be executed by the bootloader, which is a common deployment on devices that do not offer the concept of position independent code. When the encrypted firmware image has been transferred to the device, it will typically be stored in a staging area. Then, the bootloader starts decrypting the downloaded image block-by-block and swaps it with the currently valid image. Note that the currently valid image is available in cleartext and hence it has to be re-encrypted before copying it to the staging area. it will typically be stored in a staging area, in the secondary slot in our example. At the next boot, the bootloader will recognize a new firmware image in the secondary slot and will start decrypting the downloaded image sector-by-sector and will swap it with the image found in the primary slot. The swap should only take place after the signature on the plaintext is verified. Note that the plaintext firmware image is available in the primary slot only after the swap has been completed, unless \"dummy decrypt\" is used to compute the hash over the plaintext prior to executing the decrypt operation during a swap. Dummy decryption here refers to the decryption of the firmware image found in the secondary slot sector-by-sector and computing a rolling hash over the resulting plaintext firmware image (also sector-by-sector) without performing the swap operation. While there are performance optimizations possible, such as conveying hashes for each sector in the manifest rather than a hash of the entire firmware image, such optimizations are not described in this specification. This approach of swapping the newly downloaded image with the previously valid image is often referred as A/B approach. A/B refers to the two storage areas, sometimes called slots, involved. Two slots are used to allow the update to be reversed in case the newly obtained firmware image fails to boot. This approach adds robustness to the firmware update procedure. to the two slots involved. Two slots are used to allow the update to be reversed in case the newly obtained firmware image fails to boot. This approach adds robustness to the firmware update procedure. Since the image in primary slot is available in cleartext it may need to re-encrypted it before copying it to the secondary slot. This may be necessary when the secondary slot has different access permissions or when the staging area is located in an off-chip flash memory and therefore more vulnerable to physical attacks. Note that this description assumes that the processor does not execute encrypted memory (i.e. using on-the-fly decryption in hardware). When an update gets aborted while the bootloader is decrypting the newly obtained image and swapping the blocks, the bootloader can restart where it left off. This technique again offers robustness. The ability to restart an interrupted firmware update is often a requirement for low-end IoT devices. To fulfill this requirement it is necessary to chunk a firmware image into sectors and to encrypt each sector individually using a cipher that does not increase the size of the resulting ciphertext (i.e., by not adding an authentication tag after each encrypted block). To accomplish this functionality, ciphers without integrity protection are used to encrypt the firmware image. Integrity protection for the firmware image is, however, important and therefore the image digest defined in I-D.ietf-suit-manifest MUST be When an update gets aborted while the bootloader is decrypting the newly obtained image and swapping the sectors, the bootloader can restart where it left off. This technique offers robustness and better performance. For this purpose ciphers without integrity protection are used to encrypt the firmware image. Integrity protection for the firmware image must, however, be provided and the the suit-parameter-image- digest, defined in Section 8.4.8.6 of I-D.ietf-suit-manifest, MUST be used. I-D.housley-cose-aes-ctr-and-cbc registers several ciphers that do not offer integrity protection. I-D.housley-cose-aes-ctr-and-cbc registers AES Counter mode (AES-CTR) and AES Cipher Block Chaining (AES-CBC) ciphers that do not offer integrity protection. These ciphers are useful for the use cases that require firmware encryption on IoT devices. For many other use cases where software packages, configuration information or personalization data needs to be encrypted, the use of Authenticated Encryption with Additional Data (AEAD) ciphers is preferred. The following sub-sections provide further information about the initialization vector (IV) selection for use with AES-CBC and AES-CTR in the firmware encryption context. An IV MUST NOTE be re-used when the same key is used. For this application, the IVs are not random but rather based on the slot/sector-combination in flash memory. The text below assumes that the block-size of AES is (much) smaller than sector size. The typical sector-size of flash memory is in the order of KiB. Hence, multiple AES blocks need to be decrypted until an entire sector is completed. 8.1. In AES-CBC a single IV is used for encryption of firmware belonging to a single sector since individual AES blocks are chained toghether, as shown in aes-cbc. The numbering of sectors in a slot MUST start with zero (0) and MUST increase by one with every sector till the end of the slot is reached. The IV follows this numbering. For example, let us assume the slot size of a specific flash controller on an IoT device is 64 KiB, the sector size 4096 bytes (4 KiB) and AES-128-CBC uses an AES-block size of 128 bit (16 bytes). Hence, sector 0 needs 4096/16=256 AES-128-CBC operations using IV 0. If the firmware image fills the entire slot then that slot contains 16 sectors, i.e. IVs ranging from 0 to 15. 8.2. Unlike AES-CBC, AES-CTR uses an IV per AES operation. Hence, when an image is encrypted using AES-CTR-128 or AES-CTR-256, the IV MUST start with zero (0) and MUST be incremented by one for each 16-byte plaintext block within the entire slot. Using the previous example with a slot size of 64 KiB, the sector size 4096 bytes and the AES plaintext block size of 16 byte requires IVs from 0 to 255 in the first sector and 16 * 256 IVs for the remaining sectors in the slot. The last IV used to encrypt data in the slot is therefore 9."}
{"_id":"doc-en-suit-firmware-encryption-a881b6027a28f26dddcc7614c1fdc6281914776a4d587c715eda87c2b6416a84","title":"","text":"a digital signature), multiple recipients, encryption of manifests (in comparison to firmware images).]] The following manifests examplify how to deliver the encrypted firmware and its encryption info to the Devices. The examples are signed using the following ECDSA secp256r1 key: The corresponding public key can be used to verify these examples: Each example uses SHA256 as the digest function. 9.1. Diagnostic notation of the SUIT Manifest: In hex: 10. The algorithms described in this document assume that the party"}
{"_id":"doc-en-tls-exported-authenticator-55a9b943b0ce94642c54e974b459962055f15dc2d5daaffa4ae076ed8152487d","title":"","text":"If an authenticator request is present, the extensions used to guide the construction of these messages are taken from the authenticator request. If the certificate_request_context from the authenticator request has already been used in the connection, then no authenticator should be constructed. If there is no authenticator request, the extensions are chosen from the TLS handshake. Only servers can provide an authenticator without a corresponding request. In such cases, ClientHello extensions are used to determine permissible extensions in the Certificate message. request. Unrecognized extensions MUST be ignored. If the certificate_request_context from the authenticator request has already been used in the connection, then no authenticator should be constructed. If there is no authenticator request, the extensions are chosen from the TLS handshake. Only servers can provide an authenticator without a corresponding request. In such cases, ClientHello extensions are used to determine permissible extensions in the Certificate message. 4.2.1."}
{"_id":"doc-en-tls-flags-5490cd6777e7c482e034037b795be0dc3312ec699f5ede9d0de692e21b7b4c7d","title":"","text":"A Flags Extension for TLS 1.3 draft-ietf-tls-tlsflags-09 draft-ietf-tls-tlsflags-10 Abstract"}
{"_id":"doc-en-tls-flags-74deb7165336c2c5aac978559d8fccf8355eb5311c35a6b7dc4249c365dad21e","title":"","text":"understands and supports the extension, but some extensions do not require this acknowledgement. For a flag that does require a response, the only proper response is the same flag in a flags extension. This extension MUST NOT be used to specify extensions where the response is a proper extension with content. A flag proposed by the client in ClientHello (CH) that requires acknowledgement SHOULD be acknowledged in either ServerHello (SH), in EncryptedExtensions (EE), in Certificate (CT), or in"}
{"_id":"doc-en-tls-subcerts-e103372ca91a1f0659b3046fc8e115b99f0c6fa37b4cf41026192c2908669600","title":"","text":"entire certificate and the delegated credential, cannot. Each delegated credential is bound to a specific signature algorithm for use use in the TLS handshake (RFC8446 section 4.2.3). This prevents them from being used with other, perhaps unintended signature algorithms. algorithm for use in the TLS handshake (RFC8446 section 4.2.3). This prevents them from being used with other, perhaps unintended signature algorithms. The signature algorithm bound to the delegated credential can be chosen independantly of the set of signature algorithms supported by the end-entity certificate. 3.2."}
{"_id":"doc-en-tls-subcerts-847b5128de6f6eebbbfc022f4c5fef20121501127df77365b0447508ca2e74a0","title":"","text":"The initiator uses information from the peer's certificate to verify the delegated credential and that the peer is asserting an expected identity, determining an authentication result for the peer.. peer. Peers accepting the delegated credential use it as the certificate key for the (D)TLS handshake."}
{"_id":"doc-en-tls13-spec-ebe2542938ef8f92855cee85814112e362d1bef35297045c9c14cb4be509180e","title":"","text":"the following additional information MUST be provisioned to both parties: The TLS version number for use with this PSK The cipher suite for use with this PSK The Application-Layer Protocol Negotiation (ALPN) protocol, if any"}
{"_id":"doc-en-tls13-spec-c38699feb5aa1a792a976a494a4f9c722923097ffe92191398abe18b134549e8","title":"","text":"draft-04 Renumber the new handshake messages to be somewhat more consistent with existing convention and to remove a duplicate registration. Remove renegotiation. draft-03"}
{"_id":"doc-en-tls13-spec-e73e836dc12bf6d6ee013db8d62b63b965af793963373abd334df79e7863b0b1","title":"","text":"\"pre_shared_key\" is REQUIRED for PSK key agreement. \"psk_key_exchange_modes\" is REQUIRED for PSK key agreement. A client is considered to be attempting to negotiate using this specification if the ClientHello contains a \"supported_versions\" extension with 0x0304 as the highest version number contained in its"}
{"_id":"doc-en-tls13-spec-e2263cdbd07eb281113ba5c1e4a2fde11148dffb10628a4545ef82f322c9dd52","title":"","text":"rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, and ed25519. TLS PskKeyExchangeMode Registry: Values with the first byte in the range 0-253 (decimal) are assigned via Specification Required RFC8126. Values with the first byte 254 or 255 (decimal) are reserved for Private Use RFC8126. This registry SHALL have a \"Recommended\" column. The registry [shall be/ has been] initially populated psk_ke (0) and psk_dhe_ke (1). Both SHALL be marked as \"Recommended\". "}
{"_id":"doc-en-tls13-spec-efed85904b3622687099ab782858fbdffb3974985e55b9426b579f443f04c2d6","title":"","text":"over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery. This document updates RFCs 4492, 5705, and 6066 and it obsoletes RFCs 5077, 5246, and 6961. 1. RFC EDITOR: PLEASE REMOVE THE FOLLOWING PARAGRAPH The source for this"}
{"_id":"doc-en-tls13-spec-db23a361ea51bfc2eae2c38f2d15240353fed06b758decc872e35e8ef136e861","title":"","text":"an editorial update. It contains updated text in areas which were found to be unclear as well as other editorial improvements. In addition, it removes the use of the term \"master\" as applied to secrets in favor of the term \"main\". secrets in favor of the term \"main\" or shorter names where no term was neccessary. 1.3."}
{"_id":"doc-en-tls13-spec-f9e2a820ad72552d81aee4f07edc42c2cb04aa04f827bbcadec9ba11a766cf1b","title":"","text":"depend on the ServerHello and therefore has weaker guarantees. This is especially relevant if the data is authenticated either with TLS client authentication or inside the application protocol. The same warnings apply to any use of the early_exporter_main_secret. The same warnings apply to any use of the early_exporter_secret. 0-RTT data cannot be duplicated within a connection (i.e., the server will not process the same data twice for the same connection), and an"}
{"_id":"doc-en-tls13-spec-bd5aec002b080826de59d4d3d6336fafb3ae0478bbc54e7860e3a36cd9876020","title":"","text":"At any time after the server has received the client Finished message, it MAY send a NewSessionTicket message. This message creates a unique association between the ticket value and a secret PSK derived from the resumption main secret (see cryptographic- PSK derived from the resumption secret (see cryptographic- computations). The client MAY use this PSK for future handshakes by including the"}
{"_id":"doc-en-tls13-spec-c17e961f8fed03e91db5ad0b3815c6a2eb275fc2fd86da7f55e7d34b1c22c78f","title":"","text":"server implementation declines all PSK identities with different SNI values, these two values are always the same. Note: Although the resumption main secret depends on the client's second flight, a server which does not request certificate-based client authentication MAY compute the remainder of the transcript Note: Although the resumption ecret depends on the client's second flight, a server which does not request certificate-based client authentication MAY compute the remainder of the transcript independently and then send a NewSessionTicket immediately upon sending its Finished rather than waiting for the client Finished. This might be appropriate in cases where the client is expected to"}
{"_id":"doc-en-tls13-spec-51b121a94679189413d38cdf71e94b344c326fe23c65f904e7a66c1ba41cf93a","title":"","text":"In this version of TLS 1.3, the two input secrets are: PSK (a pre-shared key established externally or derived from the resumption_main_secret value from a previous connection) resumption_secret value from a previous connection) (EC)DHE shared secret (ecdhe-shared-secret-calculation)"}
{"_id":"doc-en-tls13-spec-6b5827437eefefb4c6bd20e223f3848802590580e7ffee07f8bf9a4368fa03fb","title":"","text":"will still be HKDF-Extract(0, 0). For the computation of the binder_key, the label is \"ext binder\" for external PSKs (those provisioned outside of TLS) and \"res binder\" for resumption PSKs (those provisioned as the resumption main secret of a previous handshake). The different labels prevent the substitution of one type of PSK for the other. (those provisioned as the resumption secret of a previous handshake). The different labels prevent the substitution of one type of PSK for the other. There are multiple potential Early Secret values, depending on which PSK the server ultimately selects. The client will need to compute"}
{"_id":"doc-en-tls13-spec-a6d83d89f6c5bcd5956d8c6b2543cd4daf8e28e1d25fca4ab553d7d6d170e156","title":"","text":"The exporter value is computed as: Where Secret is either the early_exporter_main_secret or the exporter_main_secret. Implementations MUST use the exporter_main_secret unless explicitly specified by the application. The early_exporter_main_secret is defined for use in settings where an exporter is needed for 0-RTT data. A separate interface for the early exporter is RECOMMENDED; this avoids the exporter user accidentally using an early exporter when a regular one is desired or vice versa. Where Secret is either the early_exporter_secret or the exporter_secret. Implementations MUST use the exporter_secret unless explicitly specified by the application. The early_exporter_secret is defined for use in settings where an exporter is needed for 0-RTT data. A separate interface for the early exporter is RECOMMENDED; this avoids the exporter user accidentally using an early exporter when a regular one is desired or vice versa. If no context is provided, the context_value is zero length. Consequently, providing no context computes the same value as"}
{"_id":"doc-en-tls13-spec-ea40a841972d7597bde87b1559037297263fc958527370b64d7c19909a5be057","title":"","text":"an analysis of these limits under the assumption that the underlying primitive (AES or ChaCha20) has no weaknesses. Implementations SHOULD do a key update as described in key-update prior to reaching these limits. these limits. Note that it is not possible to perform a KeyUpdate for early data and therefore implementations SHOULD not exceed the limits when sending early data. For AES-GCM, up to 2^24.5 full-size records (about 24 million) may be encrypted on a given connection while keeping a safety margin of"}
{"_id":"doc-en-tls13-spec-df31732c69af939f9b7af5a38023a8b55868826e853fd7d2121b6368a6e40f36","title":"","text":"signature is represented as a DER-encoded X690 ECDSA-Sig-Value structure as defined in RFC4492. Indicates a signature algorithm using RSASSA-PSS RFC8017 with mask generation function 1. The digest used in the mask generation function and the digest being signed are both the corresponding hash algorithm as defined in SHS. The length of the Salt MUST be equal to the length of the output of the digest algorithm. If the public key is carried in an X.509 certificate, it MUST use the rsaEncryption OID RFC5280. Indicates a signature algorithm using RSASSA-PSS with a mask generation function of MGF1, as defined in RFC8017. The digest used in MGF1 and the digest being signed are both the corresponding hash algorithm as defined in SHS. The length of the Salt MUST be equal to the length of the output of the digest algorithm. If the public key is carried in an X.509 certificate, it MUST use the rsaEncryption OID RFC5280. Indicates a signature algorithm using EdDSA as defined in RFC8032 or its successors. Note that these correspond to the \"PureEdDSA\" algorithms and not the \"prehash\" variants. Indicates a signature algorithm using RSASSA-PSS RFC8017 with mask generation function 1. The digest used in the mask generation function and the digest being signed are both the corresponding hash algorithm as defined in SHS. The length of the Salt MUST be equal to the length of the digest algorithm. If the public key is carried in an X.509 certificate, it MUST use the RSASSA-PSS OID RFC5756. When used in certificate signatures, the algorithm parameters MUST be DER encoded. If the corresponding public key's parameters are present, then the parameters in the signature MUST be identical to those in the public key. Indicates a signature algorithm using RSASSA-PSS with a mask generation function of MGF1, as defined in RFC8017. The digest used in MGF1 and the digest being signed are both the corresponding hash algorithm as defined in SHS. The length of the Salt MUST be equal to the length of the digest algorithm. If the public key is carried in an X.509 certificate, it MUST use the RSASSA-PSS OID RFC5756. When used in certificate signatures, the algorithm parameters MUST be DER encoded. If the corresponding public key's parameters are present, then the parameters in the signature MUST be identical to those in the public key. Indicates algorithms which are being deprecated because they use algorithms with known weaknesses, specifically SHA-1 which is used"}
{"_id":"doc-en-tls13-spec-c9c6f431a94b439816a3a696af25ed7903f398a44f110ae058d22ba21dd8a744","title":"","text":"shown below. The derivation process is as follows, where L denotes the length of the underlying hash function for HKDF RFC5869. the underlying hash function for HKDF RFC5869. SS and ES denote the sources from the table above. Whilst SS and ES may be the same in some cases, the extracted xSS and xES will not. The traffic keys are computed from xSS, xES, and the master_secret as described in traffic-key-calculation below."}
{"_id":"doc-en-tls13-spec-dfbf54d85e4779130a0d17a10cda0439fadb6f94e1a0b1af54451511775e8101","title":"","text":"7.2.2. A conventional Diffie-Hellman computation is performed. The negotiated key (Z) is used as the shared_secret, and is used in the negotiated key (Z) is used as the shared secret, and is used in the key schedule as specified above. Leading bytes of Z that contain all zero bits are stripped before it is used as the input to HKDF."}
{"_id":"doc-en-tls13-spec-0a82e479bc7e8870d077a046f3fd6b1855178fcc9802117c87cbf4f9056beeed","title":"","text":"tls-resumption-psk shows a pair of handshakes in which the first establishes a PSK and the second uses it: Note that the client supplies a ClientKeyShare to the server as well, which allows the server to decline resumption and fall back to a full handshake. However, because the server is authenticating via a PSK, it does not send a Certificate or a CertificateVerify. PSK-based resumption cannot be used to provide a new ServerConfiguration. As the server is authenticating via a PSK, it does not send a Certificate or a CertificateVerify. PSK-based resumption cannot be used to provide a new ServerConfiguration. Note that the client supplies a ClientKeyShare to the server as well, which allows the server to decline resumption and fall back to a full handshake. The contents and significance of each message will be presented in detail in the following sections."}
{"_id":"doc-en-tls13-spec-2602403eeba2f3915fa96550387689c8d9f12bc099e0f8840d30d12e64c60767","title":"","text":"send a Certificate message and a CertificateVerify message, even if the \"known_configuration\" extension was used for this handshake, thus requiring a signature over the configuration before it can be used by the client. the client. Clients MUST not rely on the ServerConfiguration message until successfully receiving and processing the server's Certificate, CertificateVerify, and Finished. If there is a failure in processing those messages, the client MUST discard the ServerConfiguration. 6.3.8."}
{"_id":"doc-en-tls13-spec-8cdc297eaa4474dec2d030943f2d7db8f2ae68185d1679d5498895f8e429f881","title":"","text":"close a connection does not prohibit a session from being resumed. This message notifies the recipient that the sender will not send This alert notifies the recipient that the sender will not send any more messages on this connection. Any data received after a closure MUST be ignored. This message is sent by the client to indicate that all 0-RTT This alert is sent by the client to indicate that all 0-RTT application_data messages have been transmitted and that the next message will be handshake message protected with the 1-RTT handshake keys. This alert MUST be at the warning level. Servers MUST NOT send this message and clients receiving this message MUST MUST NOT send this alert and clients receiving this alert MUST terminate the connection with an \"unexpected_message\" alert. This message notifies the recipient that the sender is canceling the handshake for some reason unrelated to a protocol failure. If a user cancels an operation after the handshake is complete, just This alert notifies the recipient that the sender is canceling the handshake for some reason unrelated to a protocol failure. If a user cancels an operation after the handshake is complete, just closing the connection by sending a \"close_notify\" is more appropriate. This alert SHOULD be followed by a \"close_notify\". This alert is generally a warning."}
{"_id":"doc-en-tls13-spec-c68a7edcd73105962588a61336292cc6dcd7f495cdd9fdb6db320d464cd9e675","title":"","text":"ServerConfiguration format. The semantics of this message are to establish a shared state between the client and server for use with the \"known_configuration\" extension with the key specified in key and with the handshake the client and server for use with the \"early_data\" extension with the key specified in \"static_key_share\" and with the handshake parameters negotiated by this handshake. When the ServerConfiguration message is sent, the server MUST also send a Certificate message and a CertificateVerify message, even if the \"known_configuration\" extension was used for this handshake, thus the \"early_data\" extension was used for this handshake, thus requiring a signature over the configuration before it can be used by the client. Clients MUST NOT rely on the ServerConfiguration message until successfully receiving and processing the server's Certificate,"}
{"_id":"doc-en-tls13-spec-6ca1f66199db89b58a9be8a051f931e4defbf085ed88bae30f0c39950c226761","title":"","text":"\"supported_signature_algorithms\" value: %%% Signature Algorithm Extension enum { // RSASSA-PKCS-v1_5 algorithms. rsa_pkcs1_sha1 (0x0201), rsa_pkcs1_sha256 (0x0401), algorithms rsa_pkcs1_sha1 (0x0201), rsa_pkcs1_sha256 (0x0401), rsa_pkcs1_sha384 (0x0501), rsa_pkcs1_sha512 (0x0601), Note: This production is named \"SignatureScheme\" because there is"}
{"_id":"doc-en-tls13-spec-b973035a7a532d9021e030af0216ff49166fb408089ab8e871f8ac1495778e31","title":"","text":"described in Section 2.1 of RFC5116. The key is either the client_write_key or the server_write_key. The type field is identical to TLSPlaintext.type. The version field is identical to TLSPlaintext.version. The length (in bytes) of the following TLSCiphertext.fragment. The length MUST NOT exceed 2^14 + 2048. The AEAD encrypted form of TLSPlaintext.fragment. Each AEAD cipher suite MUST specify how the nonce supplied to the AEAD operation is constructed, and what is the length of the GenericAEADCipher.nonce_explicit part. In many cases, it is appropriate to use the partially implicit nonce technique described in Section 3.2.1 of RFC5116; with record_iv_length being the length of the explicit part. In this case, the implicit part SHOULD be derived from key_block as client_write_iv and server_write_iv (as described in key-calculation), and the explicit part is included in TLSCiphertext.nonce_explicit part. In many cases, it is appropriate to use the partially implicit nonce technique described in Section 3.2.1 of RFC5116; with record_iv_length being the length of the explicit part. In this case, the implicit part SHOULD be derived from key_block as client_write_iv and server_write_iv (as described in key-calculation), and the explicit part is included in GenericAEAEDCipher.nonce_explicit. The plaintext is the TLSPlaintext.fragment."}
{"_id":"doc-en-tls13-spec-50103028514ee9f4a7b101e77453ba97e0740e6ebffe47320c5553a7369bebb3","title":"","text":"The server's key exchange parameters. For non-anonymous key exchanges, a signature over the server's key exchange parameters. For non-anonymous key exchanges, a signature over the client and server hello random data and the server's key exchange parameters. If the client has offered the \"signature_algorithms\" extension, the signature algorithm and hash algorithm MUST be a pair listed in that"}
{"_id":"doc-en-tls13-spec-c1d0ba0f5f182c6dec0efd77165fdda96715522aa9e05d4db6120907f80fede4","title":"","text":"1.2. draft-14 - Allow cookies to be longer. draft-14 Allow cookies to be longer. draft-13"}
{"_id":"doc-en-tls13-spec-f295da1eb9ad28b59b94b68a0eac7679dbe838556eb3d947d111191ba5e41f17","title":"","text":"6. One of the content types supported by the TLS record layer is the alert type. Alert messages convey the severity of the message (warning or fatal) and a description of the alert. Alert messages with a level of fatal result in the immediate termination of the connection. Like other messages, alert messages are encrypted as alert type. Like other messages, alert messages are encrypted as specified by the current connection state. Alert messages convey the severity of the message (warning or fatal) and a description of the alert. Warning-level messages are used to indicate orderly closure of the connection (see closure-alerts). Upon receiving a warning-level alert, the TLS implementation SHOULD indicate end-of-data to the application and, if appropriate for the alert type, send a closure alert in response. Fatal-level messages are used to indicate abortive closure of the connection (See error-alerts). Upon receiving a fatal-level alert, the TLS implementation SHOULD indicate an error to the application and MUST NOT allow any further data to be sent or received on the connection. Servers and clients MUST forget keys and secrets associated with a failed connection. Stateful implementations of session tickets (as in many clients) SHOULD discard tickets associated with failed connections. All the alerts listed in error-alerts MUST be sent as fatal and MUST be treated as fatal regardless of the AlertLevel in the message. Unknown alert types MUST be treated as fatal. %%% Alert Messages 6.1."}
{"_id":"doc-en-tls13-spec-d52a1d0b8e125467bb6e2b76f1658ce882fe0796d2d815b59331747f107d262c","title":"","text":"6.2. Error handling in TLS is very simple. When an error is detected, the detecting party sends a message to its peer. Upon transmission or receipt of a fatal alert message, both parties immediately close the connection. Servers and clients MUST forget keys, and secrets associated with a failed connection. Stateful implementations of session tickets (as in many clients) SHOULD discard tickets associated with failed connections. Whenever an implementation encounters a condition which is defined as a fatal alert, it MUST send the appropriate alert prior to closing the connection. For all errors where an alert level is not explicitly specified, the sending party MAY determine at its discretion whether to treat this as a fatal error or not. If the implementation chooses to send an alert but intends to close the connection immediately afterwards, it MUST send that alert at the fatal alert level. If an alert with a level of warning is sent and received, generally the connection can continue normally. If the receiving party decides not to proceed with the connection (e.g., after having received a \"user_canceled\" alert that it is not willing to accept), it SHOULD send a fatal alert to terminate the connection. Given this, the sending peer cannot, in general, know how the receiving party will behave. Therefore, warning alerts are not very useful when the sending party wants to continue the connection, and thus are sometimes omitted. For example, if a party decides to accept an expired certificate (perhaps after confirming this with the user) and wants to continue the connection, it would not generally send a \"certificate_expired\" alert. Error handling in the TLS Handshake Protocol is very simple. When an error is detected, the detecting party sends a message to its peer. Upon transmission or receipt of a fatal alert message, both parties immediately close the connection. Whenever an implementation encounters a condition which is defined as a fatal alert, it MUST send the appropriate alert prior to closing the connection. The following error alerts are defined:"}
{"_id":"doc-en-tls13-spec-a39fe31ffef0b8507ac378bd886952655c165f8e4ffdce0a4de99f039c69b119","title":"","text":"Upon transmission or receipt of a fatal alert message, both parties immediately close the connection. Whenever an implementation encounters a condition which is defined as a fatal alert, it MUST send the appropriate alert prior to closing the connection. send the appropriate alert prior to closing the connection. All alerts defined in this section below, as well as all unknown alerts are universally considered fatal as of TLS 1.3 (see alert-protocol). The following error alerts are defined: An inappropriate message was received. This alert is always fatal and should never be observed in communication between proper implementations. An inappropriate message was received. This alert should never be observed in communication between proper implementations. This alert is returned if a record is received which cannot be deprotected. Because AEAD algorithms combine decryption and verification, this alert is used for all deprotection failures. This alert is always fatal and should never be observed in communication between proper implementations (except when messages were corrupted in the network). This alert should never be observed in communication between proper implementations, except when messages were corrupted in the network. A TLSCiphertext record was received that had a length more than 2^14 + 256 bytes, or a record decrypted to a TLSPlaintext record with more than 2^14 bytes. This alert is always fatal and should never be observed in communication between proper implementations (except when messages were corrupted in the network). with more than 2^14 bytes. This alert should never be observed in communication between proper implementations, except when messages were corrupted in the network. Reception of a \"handshake_failure\" alert message indicates that the sender was unable to negotiate an acceptable set of security parameters given the options available. This alert is always fatal. parameters given the options available. A certificate was corrupt, contained signatures that did not verify correctly, etc."}
{"_id":"doc-en-tls13-spec-126c35e4360b561b36bbcdf6e8923945c4bb75f3679ca46ac5159ee573e0bdff","title":"","text":"certificate, rendering it unacceptable. A field in the handshake was out of range or inconsistent with other fields. This alert is always fatal. other fields. A valid certificate chain or partial chain was received, but the certificate was not accepted because the CA certificate could not be located or couldn't be matched with a known, trusted CA. This alert is always fatal. be located or couldn't be matched with a known, trusted CA. A valid certificate or PSK was received, but when access control was applied, the sender decided not to proceed with negotiation. This alert is always fatal. A message could not be decoded because some field was out of the specified range or the length of the message was incorrect. This alert is always fatal and should never be observed in communication between proper implementations (except when messages were corrupted in the network). alert should never be observed in communication between proper implementations, except when messages were corrupted in the network. A handshake cryptographic operation failed, including being unable to correctly verify a signature or validate a Finished message. This alert is always fatal. The protocol version the peer has attempted to negotiate is recognized but not supported. (For example, old protocol versions might be avoided for security reasons.) This alert is always fatal. recognized but not supported. (see backward-compatibility) Returned instead of \"handshake_failure\" when a negotiation has failed specifically because the server requires ciphers more secure than those supported by the client. This alert is always fatal. secure than those supported by the client. An internal error unrelated to the peer or the correctness of the protocol (such as a memory allocation failure) makes it impossible to continue. This alert is always fatal. to continue. Sent by a server in response to an invalid connection retry attempt from a client. (see [RFC7507]) This alert is always fatal. attempt from a client. (see [RFC7507]) Sent by endpoints that receive a hello message not containing an extension that is mandatory to send for the offered TLS version. This message is always fatal. [[TODO: IANA Considerations.]] [[TODO: IANA Considerations.]] Sent by endpoints receiving any hello message containing an extension known to be prohibited for inclusion in the given hello message, including any extensions in a ServerHello not first offered in the corresponding ClientHello. This alert is always fatal. offered in the corresponding ClientHello. Sent by servers when unable to obtain a certificate from a URL provided by the client via the \"client_certificate_url\" extension"}
{"_id":"doc-en-tls13-spec-e8a40082030970791846eb2aa11b767f475bd4d2665f55cd27cea628aa6c562e","title":"","text":"Sent by servers when a retrieved object does not have the correct hash provided by the client via the \"client_certificate_url\" extension RFC6066. This alert is always fatal. extension RFC6066. Sent by servers when a PSK cipher suite is selected but no acceptable PSK identity is provided by the client. Sending this"}
{"_id":"doc-en-tls13-spec-d13d1c62d4d36cc6bc2e6b94f1975b1d1c10b38c62f3e9e1fbce2103eef2ef51","title":"","text":"RFC5705 defines keying material exporters for TLS in terms of the TLS PRF. This document replaces the PRF with HKDF, thus requiring a new construction. The exporter interface remains the same, however the value is computed as: construction. The exporter interface remains the same. If context is provided, the value is computed as: If no context is provided, the value is computed as: Note that providing no context computes the same value as providing an empty context. As of this document's publication, no allocated exporter label is used with both modes. Future specifications MUST NOT provide an empty context and no context with the same label and SHOULD provide a context, possibly empty, in all exporter computations. 8."}
{"_id":"doc-en-tls13-spec-c3900059468d947fc6fe6cfdef5c2d456abc9fd1950ed7618ccf14294d4a51db","title":"","text":"The key exchange and authentication modes this PSK is allowed to be used with The Application-Layer Protocol Negotiation (ALPN) label(s) The Application-Layer Protocol Negotiation (ALPN) protocol, if any is to be used The Server Name Indication (SNI), if any is to be used"}
{"_id":"doc-en-tls13-spec-eb0640b2835d9f4d0cb99da6752c639cd9268f8a1e370f5187cceec76de9fa54","title":"","text":"handshake but reject 0-RTT, and SHOULD NOT take any other action that assumes that this ClientHello is fresh. The parameters for the 0-RTT data (symmetric cipher suite, ALPN, etc.) are the same as those which were negotiated in the connection which established the PSK. The PSK used to encrypt the early data MUST be the first PSK listed in the client's \"pre_shared_key\" extension. The parameters for the 0-RTT data (symmetric cipher suite, ALPN protocol, etc.) are the same as those which were negotiated in the connection which established the PSK. The PSK used to encrypt the early data MUST be the first PSK listed in the client's \"pre_shared_key\" extension. 0-RTT messages sent in the first flight have the same content types as their corresponding messages sent in other flights (handshake,"}
{"_id":"doc-en-tls13-spec-bebed7524b700c9efeb98d69f5ad84da973d795b8afe00c1b48db1feabffcb5a","title":"","text":"with a HelloRetryRequest. A client MUST NOT include the \"early_data\" extension in its followup ClientHello. In order to accept early data, the server server MUST have accepted a PSK cipher suite and selected the the first key offered in the client's \"pre_shared_key\" extension. In addition, it MUST verify that the following values are consistent with those negotiated in the In order to accept early data, the server MUST have accepted a PSK cipher suite and selected the first key offered in the client's \"pre_shared_key\" extension. In addition, it MUST verify that the following values are consistent with those negotiated in the connection during which the ticket was established. The TLS version number, AEAD algorithm, and the hash for HKDF. The selected ALPN RFC7443 value, if any. The selected ALPN RFC7301 protocol, if any. Future extensions MUST define their interaction with 0-RTT."}
{"_id":"doc-en-tls13-spec-01d4412ac3d6564394d1c61c6367e0685ac9786660d92c28e29bdd7ffabae330","title":"","text":"application MAY opt to retransmit the data once the handshake has been completed. TLS stacks SHOULD not do this automatically and client applications MUST take care that the negotiated parameters are consistent with those it expected. For example, if the ALPN value has changed, it is likely unsafe to retransmit the original consistent with those it expected. For example, if the selected ALPN protocol has changed, it is likely unsafe to retransmit the original application layer data. 4.2.9.1."}
{"_id":"doc-en-tls13-spec-f4ad8daeabcfa4f0067d262e14f0edb1a5842f31c3dca0d067b070772cbbf699","title":"","text":"%%% Key Exchange Messages This field contains the version of TLS negotiated for this session. Servers MUST select the lower of the highest supported server version and the version offered by the client in the ClientHello. In particular, servers MUST accept ClientHello messages with versions higher than those supported and negotiate the highest mutually supported version. For this version of the specification, the version is 0x0304. (See backward-compatibility for details about backward compatibility.) session. Servers MUST select a version from the list in ClientHello.supported_versions extension. A client which receives a version that was not offered MUST abort the handshake. For this version of the specification, the version is 0x0304. (See backward-compatibility for details about backward compatibility.) This structure is generated by the server and MUST be generated independently of the ClientHello.random."}
{"_id":"doc-en-tls13-spec-b8d4a4f263f30aa3b8d3270c860e1f192b9537b2a45e3fd4590896eb48b32ca3","title":"","text":"otherwise, a TLS-compliant application MUST implement the TLS_AES_128_GCM_SHA256 cipher suite and SHOULD implement the TLS_AES_256_GCM_SHA384 and TLS_CHACHA20_POLY1305_SHA256 cipher suites. suites. (see cipher-suites) A TLS-compliant application MUST support digital signatures with rsa_pkcs1_sha256 (for certificates), rsa_pss_sha256 (for"}
{"_id":"doc-en-tls13-spec-9aa83ee9fcf477feab39165cc1bf45bb7a8943bf82a54f694f691412231b6d70","title":"","text":"Supported Versions (\"supported_versions\"; supported-versions) Cookie (\"cookie\"; cookie) Signature Algorithms (\"signature_algorithms\"; signature- algorithms)"}
{"_id":"doc-en-tls13-spec-4525fa0173d89a6e89567a3960ac90c4ccb5a95e4aeae8c80ed1f9b1d04312c0","title":"","text":"Pre-Shared Key (\"pre_shared_key\"; pre-shared-key-extension) Cookie (\"cookie\"; cookie) Server Name Indication (\"server_name\"; Section 3 of RFC6066) All implementations MUST send and use these extensions when offering"}
{"_id":"doc-en-tls13-spec-9935605e354945e2d00f3e6d4d736a730e97c09147026543652b66c8187746ef","title":"","text":"9. Security issues are discussed throughout this memo, especially in Appendices B, C, and D. implementation-notes, backward-compatibility, and security-analysis. 10."}
{"_id":"doc-en-tls13-spec-62ff4ce0775f44f895bc58829050fff78ab8915c04d62d3dcf80df2c81cba35b","title":"","text":"The client uses the \"signature_algorithms\" extension to indicate to the server which signature algorithms may be used in digital signatures. Clients which desire the server to authenticate via a certificate MUST send this extension. If a server is authenticating via a certificate and the client has not sent a signatures. Clients which desire the server to authenticate itself via a certificate MUST send this extension. If a server is authenticating via a certificate and the client has not sent a \"signature_algorithms\" extension then the server MUST abort the handshake with a \"missing_extension\" alert (see mti-extensions)."}
{"_id":"doc-en-tls13-spec-eed98e2ab9b92dd2c61bbef5184e24157d3d4383ad1e3f9d37ad1a46bf7d6f55","title":"","text":"prevents passive observers from correlating sessions unless tickets are reused. Note: because ticket lifetimes are restricted to a week, 32 bits is enough to represent any plausible age, even in milliseconds. External tickets SHOULD use an obfuscated_ticket_age of 0; servers MUST ignore this value for external tickets. in milliseconds. For identities established externally an obfuscated_ticket_age of 0 SHOULD be used, and servers MUST ignore the value. A list of the identities that the client is willing to negotiate with the server. If sent alongside the \"early_data\" extension"}
{"_id":"doc-en-tls13-spec-9fc3b57271713df295c3b17f0cb364dd501dd5e1775e8469f3a5cfb619eb413e","title":"","text":"length of the digest output. This codepoint is also defined for use with TLS 1.2. Indicates a signature algorithm using EdDSA as defined in I- D.irtf-cfrg-eddsa or its successors. Note that these correspond to the \"PureEdDSA\" algorithms and not the \"prehash\" variants. Indicates a signature algorithm using EdDSA as defined in RFC8032 or its successors. Note that these correspond to the \"PureEdDSA\" algorithms and not the \"prehash\" variants. rsa_pkcs1_sha1, dsa_sha1, and ecdsa_sha1 SHOULD NOT be offered. Clients offering these values for backwards compatibility MUST list"}
{"_id":"doc-en-tls13-spec-2d4368c77df012dd30099b54d2045d243bdffbdd10ecdc364505939722c6b7c8","title":"","text":"suites to the registry. The \"Value\" and \"Description\" columns are taken from the table. The \"DTLS-OK\" and \"Recommended\" columns are both marked as \"Yes\" for each new cipher suite. [[This assumes I- D.sandj-tls-iana-registry-updates has been applied.]] D.ietf-tls-iana-registry-updates has been applied.]] TLS ContentType Registry: Future values are allocated via Standards Action RFC5226."}
{"_id":"doc-en-tls13-spec-dd9ed453ac677f6c5e7f4223a5ead72bc403bad2784d8a1d51cecf96d72cb958","title":"","text":"\"encrypted_extensions\", \"end_of_early_data\", \"key_update\", and \"handshake_hash\" values. This document also uses a registry originally created in RFC4366. IANA has updated it to reference this document. The registry and its allocation policy is listed below: This document also uses the TLS ExtensionType Registry originally created in RFC4366. IANA has updated it to reference this document. The registry and its allocation policy is listed below: IANA [SHALL update/has updated] this registry to include the \"key_share\", \"pre_shared_key\", \"psk_key_exchange_modes\","}
{"_id":"doc-en-tls13-spec-2ee21283474cdc231f5339f60def22cdf44086ed65e3ad102d742ea83dc54a18","title":"","text":"authorities). Servers which are authenticating with a PSK MUST NOT send the CertificateRequest message. CertificateRequest message in the main handshake, though they MAY send it in post-handshake authentication (see post-handshake- authentication) provided that the client has sent the \"post_handshake_auth\" extension (see post_handshake_auth). 4.3.2.1."}
{"_id":"doc-en-trickle-8e1b7decc4c202ce7bc7b01f62f0c4eb4863703b1f06dde90b800b378298c950","title":"","text":"candidates, such as STUN and TURN. All of the candidates sent within an ICE session; these are the candidates that are associated with a local/remote ufrag pair (which will change on ICE restart, if any). candidates that are associated with a specific local/remote ufrag pair (which will change on ICE restart, if any occurs). Any session-related (as opposed to candidate-related) attributes required to configure an ICE agent. These include but are not"}
{"_id":"doc-en-trickle-37e344c974186d6206e4eef4ccce624931cbe6acccf222d6613323218c49e906","title":"","text":"Once the candidate has been sent to the remote party, the agent checks if any remote candidates are currently known for this same stream. If not, the new candidate will simply be added to the list of local candidates. stream and component. If not, the new candidate will simply be added to the list of local candidates. Otherwise, if the agent has already learned of one or more remote candidates for this stream and component, it will begin pairing the"}
{"_id":"doc-en-using-github-bdca05d3d69bfcaa6d1001c5d18ca97ca1d76911f0d787bf880e52ba32609ea6","title":"","text":"The use of source control improves traceability and visibility of changes. Issue tracking can be used to manage open issues and provide a record of their resolution. Pull requests allow for better engagement on technical and edditorial changes, and encourage engagement on technical and editorial changes, and encourage contributions from a larger set of contributors. Using GitHub can also broaden the community of contributors for a specification."}
{"_id":"doc-en-using-github-3758af1a3cbd3307528fec546f6f96f9a97bfba5e836cced1c378c66e04969ef","title":"","text":"Working Groups might integrate the capabilities provided by GitHub into their processes for developing Internet-Drafts. This document is meant as an supplement to existing Working Group This document is meant as a supplement to existing Working Group practices. It provides guidance to Working Group chairs and participants on how they can best use GitHub within the framework established RFC 2418 RFC2418. The small number of rules in this established by RFC 2418 RFC2418. The small number of rules in this document are there to ensure common usage patterns between working groups and to avoid issues that have been encountered in the past. A companion document, GH-CONFIG, describes administrative processes that supports the practices described in this document. that support the practices described in this document. 1.1."}
{"_id":"doc-en-using-github-fa971fad9f9b3a3d3f74eefa9c222c6520f2d82692392152d2f9525efc11664f","title":"","text":"the only possible choice for hosting. There are other services that host revision control repositories and provide similar additional features to GitHub. For instance, BitBucket [4], or GitLab [5] provide a similar feature set. In additional to a hosted service, provide a similar feature set. In addition to a hosted service, software for custom installations exists. This document concentrates primarily on GitHub as it has a large and"}
{"_id":"doc-en-using-github-2bb9252f248680fd0e7de44c167db8e77f2e1c52def351238bbe164613797d5d","title":"","text":"3. A Working Group Chairs are responsible for determining how to best Working Group Chairs are responsible for determining how to best accomplish the Charter in an open and transparent fashion. The Working Group Chairs are responsible for determining if there is interest in using GitHub and making a consensus call to determine if a the proposed policy and use is acceptable. the proposed policy and use is acceptable. Chairs MUST involve Area Directors any decision to use GitHub for anything more than managing of drafts. Chairs MUST involve Area Directors in any decision to use GitHub for anything more than managing drafts. While a document editor can still use GitHub independently for documents that they edit, even if the working group does not"}
{"_id":"doc-en-using-github-7274a955b7bd849074c2ff4368cebc2ceb4f60dbf34df85b4fcf9fed9842f0a4","title":"","text":"multiple documents. Maintaining multiple documents in the same repository can add overheads that negatively affect individual documents. For instance, overhead that negatively affects individual documents. For instance, issues might require additional markings to identify the document that they affect. Also, because editors all have write access to the repository, managing the set of people with write access to a larger"}
{"_id":"doc-en-using-github-302069bd201b214d240e8d4bd8a179f9da246904b68ae1b7c558c99f02961ef2","title":"","text":"One common practice is to use these continuous integration services to build a text or HTML version of a document. This is then published to GitHub Pages, which allows users to view a version of the most recent revision of a document. Including prominent link to this version of the document (such as in the README) makes it easier for new contributors to find a readable copy of the most recent version of a draft. the most recent revision of a document. Including a prominent link to this version of the document (such as in the README) makes it easier for new contributors to find a readable copy of the most recent version of a draft. Continuous integration can also validate pull requests and other changes for errors. The most basic check is whether the source file can be transformed successful into a valid Internet-Draft. For can be transformed successfully into a valid Internet-Draft. For example, this might include checking that XML source is syntactically correct. For documents that use formal languages a part of specifications, such as schema or source code, a continuous integration system might also be used to validate any formal language that the document contains. Tests for any source code that the document contains might be run, or examples might be checked for correctness. For a document that use formal languages as part of the specification, such as schema or source code, a continuous integration system might also be used to validate any formal language that the document contains. Tests for any source code that the document contains might be run, or examples might be checked for correctness. 8."}
{"_id":"doc-en-using-github-1b7faddb264984c48cd3fbb97ef8b15775b1ca3cf451914a2d9e1b3af1bf00fb","title":"","text":"If a contributor makes a comment that raises what you believe to be a new issue, create an issue for them. If the issue has an obvious solution, consider creating a pull request. It doesn't matter what venue the issue was raised in, email, issue discussion, a pull request review, capturing issues quickly ensures that problems become visible and can be tracked. venue the issue was raised in (e.g., email, issue discussion, a pull request review); capturing issues quickly ensures that problems become visible and can be tracked. This takes a little more effort, but these simple steps can help encourage contributions, which will ultimately improve the quality of"}
{"_id":"doc-en-using-github-b4d76c9167491d244b9746df9a8b9d698c699549cf58ee8e1790cf21fec6b459","title":"","text":"Group will rely upon. features contains a more thorough discussion on the different features that can be used. Once a document is published in a repository on GitHub, many features like pull requests, issue tracking or the wiki can be individually disabled. If specific features are not used by the Working Group in the development of the document, disabling those features avoids creating confusion in the wider community about what can be used. 3.2. Working Group Chairs that decide to use GitHub MUST inform their"}
{"_id":"doc-en-using-github-e62965a14345f83089c802bc55bbed9ab9a37f004af9dec1d38dfd73c2b78294","title":"","text":"that new contributors need. A link to the CONTRIBUTING file from the README is advised. The set of GitHub features (features) that the Working Group relies upon need to be clearly documented in policies. This document provides some guidance on potential policies and how those might be applied. Features that the Working Group does not rely upon SHOULD be made available to document editors. Editors are then able to use these features for their own purposes. For example, though the Working Group might not formally use issues to track items that require further discussion in order to reach consensus, keeping the issue tracker available to editors can be valuable. Working Group policies need to be set with the goal of improving transparency, participation, and ultimately the quality of the consensus behind documents. At times, it might be appropriate to impose some limitations on what document editors are able to do in order to serve these goals. Chairs SHOULD periodically consult with document editors to ensure that policies are effective and not unjustifiably constraining progress. 3.3. New repositories can be created within the Working Group organization"}
{"_id":"doc-en-using-github-4a369db628952eebcffdfd9ae29d4dab577ddbd19b26f743f911a2c809fdb8ee","title":"","text":"sufficient, though it might be helpful to occasionally remind new contributors of these guidelines. A choice to use GitHub is similar to the formation of a design team (see Section 6.5 of RFC2418) provided that the work uses a public repository. That is, the output of any activity using GitHub needs to be taken to the Working Group mailing list and subject to approval, rejection, or modification by the Working Group as with any other input. Working Group Chairs are responsible for ensuring that any policy they adopt is enforced and maintained."}
{"_id":"doc-en-using-github-288a1727005d79a2f0c76e77d8cbc0019bda0439aaa4736444a023146ebd9f71","title":"","text":"documents they edit but preserves the need for contributors to understand their obligations with respect to IETF processes. Work done in GitHub has no special status. The output of any activity using GitHub needs to be taken to the Working Group and is subject to approval, rejection, or modification by the Working Group as with any other input. 3.2. New repositories can be created within the Working Group organization"}
{"_id":"doc-en-vulnerability-scenario-f1192a3a3eaa88bbba4a34b5c934a1d77529fad62a77a102bc8d295985f38e7e","title":"","text":"discovered. Such elements may include classes of data, major roles, and role interactions. This scenario also informs protocol and data model development in support of vulnerability assessment, as part of overall posture assessment. Vulnerability discovery, disclosure, and publication is out of scope. overall posture assessment (see implementation-examples for examples of solutions that support this scenario). Vulnerability discovery, disclosure, publication, and prioritization is out of scope. However, given the importance of prioritization in an enterprise's vulnerability assessment process, it is discussed in priority. Information on how the scenario aligns with SACM and other existing work is discussed in sacm-usage-scenarios through alignment-with- other-existing-works. 2."}
{"_id":"doc-en-vulnerability-scenario-a133380daf85c153d542dfbdaaf6e89ef4611b96764e4828ca584f7706123c7d","title":"","text":"data, and vulnerability assessment results. The enterprise has a procedure for reassessment of endpoints at some point after initial assessment. some point after initial assessment (see continuous-vulnerability- assessment for more information). 4."}
{"_id":"doc-en-vulnerability-scenario-728013a66c8d72dd82f5c689995c467b4f6d9e4f921cba6ccac104c994b71c1b","title":"","text":"performed on an ongoing basis, resulting in routine, or even event- driven, collection of basic endpoint information. See \"Data Attribute Tables and Definitions\" for information-specific details. See data-attribute-table for information-specific details. 4.2."}
{"_id":"doc-en-vulnerability-scenario-e8a9c423f03f9379b44e9cfd8c903b23f91964d92722bb970ded5d2cae88cf87","title":"","text":"processing of vulnerability description data is expected to trigger the vulnerability assessment. See \"Data Attribute Tables and Definitions\" for information-specific details. See data-attribute-table for information-specific details. 5."}
{"_id":"doc-en-vulnerability-scenario-4c70e634b049db4ca7ba370f923114d92855cbc88b5aaf28226d93efcbd7d250","title":"","text":"capability can be pushed to the vulnerability assessment capability by the endpoint whenever that information changes. See \"Data Attribute Tables and Definitions\" for information-specific details. See data-attribute-table for information-specific details. 6."}
{"_id":"doc-en-vulnerability-scenario-0166efe6ee47c548374262cb7c5d0afad2cc79563276ea0432abbedce42cd4ee","title":"","text":"with sufficient context, so that appropriate action can be taken. Vulnerability assessment results are ideally stored for later use. See \"Data Attribute Tables and Definitions\" for information-specific details. See data-attribute-table for information-specific details. 7."}
{"_id":"doc-en-webpush-protocol-b6f926cddd6180e413e2a00c8e8b6bcd6b6d1f1466b8991f334dd860895a30d7","title":"","text":"value MUST be less than or equal to the value provided by the application server. 6.3. A push message that has been stored by the push service can be replaced with new content. If the user agent is offline during the time that the push messages are sent, updating a push message avoids the situation where obsolete or redundant messages are sent to the user agent. Only push messages that have been assigned a topic can be updated. A push message with a topic replaces any outstanding push message with an identical topic. A push message topic is a string. A topic is carried in a Topic header field. A topic is used to correlate push messages sent to the same subscription, it does not convey any other semantics. The grammar for the Topic header field uses the \"token\" and \"quoted- string\" rules defined in RFC7230. Any double quotes from the \"quoted-string\" form are removed before comparing topics for equality. For use with this protocol, the Topic header field MUST be restricted to no more than 32 characters from the URL- and filename-safe base64 set [RFC4648]. A push service that receives a request with a Token header field that does not meet these constraints SHOULD return an HTTP 400 (Bad Request) status code to an application server. A push message request creates a new push message resource, but simultaneously deletes any existing message resource that has a matching topic. In effect, the information that is stored for the push message is updated, but a new resource is created to avoid problems with in flight acknowledgments for the old message. The push service MAY suppress acknowledgement receipts for the replaced message. This mechanism doesn't allow for stored push messages to be deleted. An application server can remove a push message using a DELETE request to the push message URL. A push message with a topic that has a zero or absent time-to-live will cause a stored message with the same topic to be removed as well as not being stored itself, but the push service will attempt to forward the updated message to the user agent. A push message with a topic that is not shared by an outstanding message to the same subscription is stored or delivered as normal. The value of the Topic header field MUST NOT be forwarded to user agents. Its value is not encrypted or authenticated. 7. A user agent requests the delivery of new push messages by making a"}
{"_id":"doc-en-webpush-protocol-a2a56fc55ece3ca2be032c146b49ab217df14a6e5d19f991f08935bf7d704ac0","title":"","text":"entities that are authorized to send messages on the channel. The push service does not require access to this public key. The Topic header field exposes information that allows more granular correlation of push messages on the same subject. This might be used to aid traffic analysis of push messages by the push service. 9.2. Push message confidentiality does not ensure that the identity of who"}
{"_id":"doc-en-webpush-protocol-eb0bebbe75c3f8d2bcb77e4967fb04b2a4ee330a37cc5ba2e1edac64edb52615","title":"","text":"push messages to the user agent. Flow control SHOULD be used to limit the state commitment for delivery of large messages. 5.1. A push service can improve the reliability of push message delivery considerably by storing push messages for a period. User agents are often only intermittendly connected, and so benefit from having short term message storage at the push service. Delaying delivery might also be used to batch communication with the user agent, thereby conserving radio resources. Some push messages are not useful once a certain period of time elapses. Delivery of messages after they have ceased to be relevant is wasteful. For example, if the push message contains a call notification, receiving a message after the caller has abandoned the call is of no value; the application at the user agent is forced to suppress the message so that it does not generate a useless alert. An application server can use the TTL header field to limit the time that a push message is retained by a push service. The TTL header field contains a value in seconds that describes how long a push message is retained by the push service. Once the TTL period elapses, the push service MUST remove the push message and cease any attempt to deliver it to the user agent. A push service might retain values for a short duration after the TTL period to account for time accounting errors in processing. For instance, distributing a push message within a server cluster might accrue errors due to clock variation, or processing and transit delays. A push service is not obligated to account for time spent by the application server in sending a push message to the push service, or delays incurred while sending a push message to the user agent. An application server needs to account for transit delays in selecting a TTL header field value. Absence of the TTL header field is interpreted as equivalent to a zero value. Push messages with a zero TTL indicate that storage is not needed and that the message can be dropped if the user agent isn't immediately available to receive the message. Push messages with a zero TTL can be delivered very efficiently. A push service MAY choose to retain a push message for a shorter duration than that requested. It indicates this by including a TTL header field in the response that includes the actual TTL. This TTL value MUST be less than or equal to the value provided by the application server. 6. A user agent requests the delivery of new push messages by making a"}
{"_id":"doc-en-webpush-protocol-bf9d030c3d3789c1d81626c2304089a52f8218dad262b8d3d39ce2d8a6417125","title":"","text":"7.2. Push services typically store messages for some time to allow for limited recovery from transient faults. If a push message is stored, but not delivered, the push service can indicate the probable duration of storage by including expiration information in the response to the push request. Storage of push messages based on the TTL header field comprises a potentially significant amount of storage for a push service. A push service is not obligated to store messages indefinitely. A push service is able to indicate how long it intends to retain a message to an application server using the TTL header field (see ttl). A push service is not obligated to store messages indefinitely. If a user agent is not actively monitoring for push messages, those messages can be lost or overridden by newer messages on the same subscription. A user agent that does not actively monitor for push messages will not receive messages that expire during that interval. Push messages that were stored and not delivered to a user agent are Push messages that are stored and not delivered to a user agent are delivered when the user agent recommences monitoring. Stored push messages SHOULD include a Last-Modified header field (see Section 2.2 of RFC7232) indicating when delivery was requested by an application"}
{"_id":"doc-en-webpush-protocol-49bba45b7ac8753625c65d4f44682f0122cef4b02af725d027b9dd1dc96ec314","title":"","text":"Push services might need to limit the size and number of stored push messages to avoid overloading. In addition to using the 413 (Payload Too Large) status code for too large push messages, a push service MAY expire push messages prior to any advertised expiration time. MAY expire push messages prior to any advertised expiration time. A push service can reduce the impact push message retention by reducing the time-to-live of push messages. 7.3."}
{"_id":"doc-en-webpush-protocol-23b9a91d56df39bd3ed5aad1b6928d4d7296124ca8abe3958cef735667dac950","title":"","text":"9. This protocol defines new HTTP header fields in iana.header.fields. New link relation types are identified using the URNs defined in iana.urns. 9.1. HTTP header fields are registered within the \"Message Headers\" registry maintained at . This document defines the following HTTP header fields, so their associated registry entries shall be added according to the permanent registrations below (see RFC3864): The change controller is: \"IETF (iesg@ietf.org) - Internet Engineering Task Force\". 9.2. This document registers three URNs for use in identifying link relation types. These are added to a new \"Web Push Identifiers\" registry according to the procedures in Section 4 of RFC3553; the"}
{"_id":"doc-en-webpush-protocol-5f07b9cdc757842dafee076f40b83e1c3284358b3ec1ef1f434954f169e1943f","title":"","text":"(this document) Martin Thomson (martin.thomson@gmail) or the Web Push WG (webpush@ietf.org) The Web Push WG (webpush@ietf.org) urn:ietf:params:push:reg"}
{"_id":"doc-en-webpush-protocol-6dd535c33772f3ef6c282f547766393b4fb3354a2c35a4ff88742781cfab33c0","title":"","text":"(this document) Martin Thomson (martin.thomson@gmail) or the Web Push WG (webpush@ietf.org) The Web Push WG (webpush@ietf.org) urn:ietf:params:push:sub"}
{"_id":"doc-en-webpush-protocol-a75d891a40a3ffc8dc7c01c144c9e2399a694943295a7534fbe33f7246954080","title":"","text":"(this document) Martin Thomson (martin.thomson@gmail) or the Web Push WG (webpush@ietf.org) The Web Push WG (webpush@ietf.org) "}
{"_id":"doc-en-webpush-protocol-6cc4018688df66b15399452148372fd5988a43445b690a3028e3447f1ce75631","title":"","text":"monitor for new push messages. Requesting the delivery of events is particularly important for the Web Push API. The subscription, management and monitoring functions W3C Push API. The subscription, management and monitoring functions are currently fulfilled by proprietary protocols; these are adequate, but do not offer any of the advantages that standardization affords."}
{"_id":"doc-en-webpush-protocol-f6f768ae258be08af19e781246f7c7455fe8a945c400c08e98246925e30add97","title":"","text":"scheme. This provides confidentiality and integrity protection for subscriptions and push messages from external parties. Applications using this protocol MUST use mechanisms that provide confidentiality, integrity and data origin authentication. The application server sending the push message and the application on the user agent that receives it are frequently just different instances of the same application, so no standardized protocol is needed to establish a proper security context. The distribution of subscription information from the user agent to its application server also offers a convenient medium for key agreement. 8.1. The protection afforded by TLS does not protect content from the push service. Without additional safeguards, a push service is able to see and modify the content of the messages. Applications are able to provide additional confidentiality, integrity or authentication mechanisms within the push message itself. The application server sending the push message and the application on the user agent that receives it are frequently just different instances of the same application, so no standardized protocol is needed to establish a proper security context. The process of providing the application server with subscription information provides a convenient medium for key agreement. The Web Push API codifies this practice by requiring that each push subscription created by the browser be bound to a browser generated encryption key. Pushed messages are authenticated and decrypted by the browser before delivery to applications. This scheme ensures that the push service is unable to examine the contents of push messages. The public key for a subscription ensures that applications using that subscription can identify messages from unknown sources and discard them. This depends on the public key only being disclosed to entities that are authorized to send messages on the channel. The push service does not require access to this public key. service. Without additional safeguards, a push service can inspect and modify the message content. For its requirements, the API has adopted I-D.ietf-webpush-encryption to secure the content of messages from the push service. Other scenarios can be addressed by similar policies. The Topic header field exposes information that allows more granular correlation of push messages on the same subject. This might be used"}
{"_id":"doc-en-webpush-protocol-7532641cff539417e6140592adfddbf9bd52da5b6728f8b27524673392888e88","title":"","text":"8.4. Discarding unwanted messages at the user agent based on message authentication doesn't protect against a denial of service attack on the user agent. Even a relatively small volume of push messages can cause battery-powered devices to exhaust power reserves. A user agent can control where valid push messages originate by limiting the distribution of push URIs to authorized application servers. Ensuring that push URIs are hard to guess ensures that only application servers that have received a push URI can use it. Push messages that are not successfully authenticated by the user agent will not be delivered, but this can present a denial of service risk. Even a relatively small volume of push messages can cause battery-powered devices to exhaust power reserves. An application can limit where valid push messages can originate by limiting the distribution of push URIs to authorized entities. Ensuring that push URIs are hard to guess ensures that only application servers that have been given a push URI can use it. To address this case, the API has adopted I-D.ietf-webpush-vapid, which allows a user agent to restrict a subscription to a specific application server. The push service can then identity and reject unwanted messages without contacting the user agent. A malicious application with a valid push URI could use the greater resources of a push service to mount a denial of service attack on a"}
{"_id":"doc-en-webpush-protocol-4f0d2d39fe9b396b8676d2b1a248a9c426797ab3d3ef8eacc6084f63957b48ed","title":"","text":"A push service or user agent MAY also delete that receive too many push messages. End-to-end confidentiality mechanisms, such as those in API, prevent an entity with a valid push message subscription URI from learning the contents of push messages. Push messages that are not successfully authenticated will not be delivered by the API, but this can present a denial of service risk. Conversely, a push service is also able to deny service to user agents. Intentional failure to deliver messages is difficult to distinguish from faults, which might occur due to transient network errors, interruptions in user agent availability, or genuine service outages. A push service is also able to deny service to user agents. Intentional failure to deliver messages is difficult to distinguish from faults, which might occur due to transient network errors, interruptions in user agent availability, or genuine service outages. 8.5. Server request logs can reveal subscription-related URIs. Acquiring a push message subscription URI enables the receipt of messages or deletion of the subscription. Acquiring a push URI permits the sending of push messages. Logging could also reveal relationships between different subscription-related URIs for the same user agent. Encrypted message contents are not revealed to the push service. Limitations on log retention and strong access control mechanisms can ensure that URIs are not learned by unauthorized entities. Server request logs can reveal subscription-related URIs or relationships between subscription-related URIs for the same user agent. Limitations on log retention and strong access control mechanisms can ensure that URIs are not revealed to unauthorized entities. 9."}
{"_id":"doc-en-webpush-vapid-7c88f898379e94eba6f7be6660820913a0efa9d8291a68471ca735fffc428644","title":"","text":"2. Application servers that wish to self-identity generate and maintain Application servers that wish to self-identify generate and maintain a signing key pair. This key pair MUST be usable with elliptic curve digital signature (ECDSA) over the P-256 curve FIPS186. Use of this key when sending push messages establishes an identity for the"}
{"_id":"doc-en-webpush-vapid-72b541c110a95717832f0ebeef4542f844ef2c5106b40c0a6feffd537037af7d","title":"","text":"2.1. If the application server wishes to provide contact details it MAY include an \"sub\" (Subject) claim in the JWT. The \"sub\" claim SHOULD include a \"sub\" (Subject) claim in the JWT. The \"sub\" claim SHOULD include a contact URI for the application server as either a \"mailto:\" (email) RFC6068 or an \"https:\" RFC2818 URI."}
{"_id":"doc-en-webpush-vapid-9b66b26868b8e03a90ff7dc8361f0508725925203505479d7dfe0f90f1602a9c","title":"","text":"An application server requests the delivery of a push message as described in I-D.ietf-webpush-protocol. If the application server wishes to self-identify, it includes an Authorization header field with credentials that use the \"WebPush\" authentication scheme auth and a Crypto-Key header field that includes its public key key. with credentials that use the \"WebPush\" authentication scheme (auth) and a Crypto-Key header field that includes its public key (key). Note that the header fields shown in ex-push don't include line wrapping. Extra whitespace is added to meet formatting constraints."}
{"_id":"doc-en-webrtc-http-ingest-protocol-b6ceb3c8d376b885dc7e1693c4f0c70cfe9ebe1ab0981e9094178d74b772ceb5","title":"","text":"clients and media servers, WHIP imposes the following restrictions regarding WebRTC usage: Bothe the WHIP client and the media server SHALL use SDP bundle RFC8843. The SDP offer created by the WHIP client must include the bundle-only attribute in all m-lines as per RFC8843. Also, RTCP muxing SHALL be supported by both the WHIP client and the media server. Both the the WHIP client and the WHIP endpoint SHALL use SDP bundle RFC8843. Each \"m=\" section MUST be part of a single BUNDLE group. Hence, when a WHIP client sends an SDP offer, it MUST include a \"bundle-only\" attribute in each bundled \"m=\" section. The WHIP client and the Media Server MUST support multiplexed media associated with the BUNDLE group as per RFC8843 section 9. In addition, per RFC8843 the WHIP client and Media Server will use RTP/RTCP multiplexing for all bundled media. The WHIP client and media server SHOULD include the \"rtcp-mux-only\" attribute in each bundled \"m=\" sections. When a WHIP client sends an SDP offer, it SHOULD insert an SDP \"setup\" attribute with an \"actpass\" attribute value, as defined in"}
{"_id":"doc-en-webrtc-http-ingest-protocol-c0909a94a6119884c31dc833ec9bb3a2ec1eaad4fe5d8c4cf8e6615e601d0525","title":"","text":"server configuration on the responses to OPTIONS request sent to the WHIP endpoint URL before the POST request is sent. NOTE: Depending on the ICE Agent implementation, the WHIP client may need to call the setConfiguration method before calling the setLocalDespcription method with the local SDP offer in order to avoid having to perform an ICE restart for applying the updated STUN/ TURN server configuration on the next ICE gathering phase. The generation of the TURN server credentials may require performing a request to an external provider, which can both add latency to the OPTION request processing and increase the processing required to"}