<?xml version='1.0' encoding='utf-8'?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" version="3" category="bcp" consensus="true" docName="draft-ietf-curdle-rc4-die-die-die-18" indexInclude="true" ipr="trust200902" number="8758" prepTime="2020-04-28T16:37:46" scripts="Common,Latin" sortRefs="true" submissionType="IETF" symRefs="true" tocDepth="4" tocInclude="true" updates="4253" xml:lang="en">
  <link href="https://datatracker.ietf.org/doc/draft-ietf-curdle-rc4-die-die-die-18" rel="prev"/>
  <link href="https://dx.doi.org/10.17487/rfc8758" rel="alternate"/>
  <link href="urn:issn:2070-1721" rel="alternate"/>
  <front>
    <title abbrev="Deprecating RC4 in SSH">Deprecating RC4 in Secure Shell (SSH)</title>
    <seriesInfo name="RFC" value="8758" stream="IETF"/>
    <seriesInfo name="BCP" value="227" stream="IETF"/>
    <author fullname="Loganaden Velvindron" initials="L." surname="Velvindron">
      <organization showOnFrontPage="true">cyberstorm.mu</organization>
      <address>
        <postal>
          <street/>
          <city/>
          <region/>
          <code/>
          <country>Mauritius</country>
        </postal>
        <phone/>
        <email>logan@cyberstorm.mu</email>
      </address>
    </author>
    <date month="04" year="2020"/>
    <area>Security</area>
    <workgroup>curdle</workgroup>
    <abstract pn="section-abstract">
      <t pn="section-abstract-1">This document deprecates RC4 in Secure Shell (SSH).  Therefore, this
   document formally moves RFC 4345 to Historic status.
      </t>
    </abstract>
    <boilerplate>
      <section anchor="status-of-memo" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.1">
        <name slugifiedName="name-status-of-this-memo">Status of This Memo</name>
        <t pn="section-boilerplate.1-1">
            This memo documents an Internet Best Current Practice.
        </t>
        <t pn="section-boilerplate.1-2">
            This document is a product of the Internet Engineering Task Force
            (IETF).  It represents the consensus of the IETF community.  It has
            received public review and has been approved for publication by
            the Internet Engineering Steering Group (IESG).  Further information
            on BCPs is available in Section 2 of RFC 7841.
        </t>
        <t pn="section-boilerplate.1-3">
            Information about the current status of this document, any
            errata, and how to provide feedback on it may be obtained at
            <eref target="https://www.rfc-editor.org/info/rfc8758" brackets="none"/>.
        </t>
      </section>
      <section anchor="copyright" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.2">
        <name slugifiedName="name-copyright-notice">Copyright Notice</name>
        <t pn="section-boilerplate.2-1">
            Copyright (c) 2020 IETF Trust and the persons identified as the
            document authors. All rights reserved.
        </t>
        <t pn="section-boilerplate.2-2">
            This document is subject to BCP 78 and the IETF Trust's Legal
            Provisions Relating to IETF Documents
            (<eref target="https://trustee.ietf.org/license-info" brackets="none"/>) in effect on the date of
            publication of this document. Please review these documents
            carefully, as they describe your rights and restrictions with
            respect to this document. Code Components extracted from this
            document must include Simplified BSD License text as described in
            Section 4.e of the Trust Legal Provisions and are provided without
            warranty as described in the Simplified BSD License.
        </t>
      </section>
    </boilerplate>
    <toc>
      <section anchor="toc" numbered="false" removeInRFC="false" toc="exclude" pn="section-toc.1">
        <name slugifiedName="name-table-of-contents">Table of Contents</name>
        <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1">
          <li pn="section-toc.1-1.1">
            <t keepWithNext="true" pn="section-toc.1-1.1.1"><xref derivedContent="1" format="counter" sectionFormat="of" target="section-1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-introduction">Introduction</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.1.2">
              <li pn="section-toc.1-1.1.2.1">
                <t keepWithNext="true" pn="section-toc.1-1.1.2.1.1"><xref derivedContent="1.1" format="counter" sectionFormat="of" target="section-1.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-requirements-language">Requirements Language</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.2">
            <t keepWithNext="true" pn="section-toc.1-1.2.1"><xref derivedContent="2" format="counter" sectionFormat="of" target="section-2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-updates-to-rfc-4253">Updates to RFC 4253</xref></t>
          </li>
          <li pn="section-toc.1-1.3">
            <t pn="section-toc.1-1.3.1"><xref derivedContent="3" format="counter" sectionFormat="of" target="section-3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-iana-considerations">IANA Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.4">
            <t pn="section-toc.1-1.4.1"><xref derivedContent="4" format="counter" sectionFormat="of" target="section-4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-security-considerations">Security Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.5">
            <t pn="section-toc.1-1.5.1"><xref derivedContent="5" format="counter" sectionFormat="of" target="section-5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-references">References</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.5.2">
              <li pn="section-toc.1-1.5.2.1">
                <t pn="section-toc.1-1.5.2.1.1"><xref derivedContent="5.1" format="counter" sectionFormat="of" target="section-5.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-normative-references">Normative References</xref></t>
              </li>
              <li pn="section-toc.1-1.5.2.2">
                <t pn="section-toc.1-1.5.2.2.1"><xref derivedContent="5.2" format="counter" sectionFormat="of" target="section-5.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-informative-references">Informative References</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.6">
            <t pn="section-toc.1-1.6.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.a"/><xref derivedContent="" format="title" sectionFormat="of" target="name-acknowledgements">Acknowledgements</xref></t>
          </li>
          <li pn="section-toc.1-1.7">
            <t pn="section-toc.1-1.7.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.b"/><xref derivedContent="" format="title" sectionFormat="of" target="name-authors-address">Author's Address</xref></t>
          </li>
        </ul>
      </section>
    </toc>
  </front>
  <middle>
    <section numbered="true" toc="include" removeInRFC="false" pn="section-1">
      <name slugifiedName="name-introduction">Introduction</name>
      <t pn="section-1-1">The usage of RC4 suites (also designated as "arcfour") for SSH is
      specified in <xref target="RFC4253" format="default" sectionFormat="of" derivedContent="RFC4253"/> and <xref target="RFC4345" format="default" sectionFormat="of" derivedContent="RFC4345"/>. 
     <xref target="RFC4253" format="default" sectionFormat="of" derivedContent="RFC4253"/> specifies the allocation of the "arcfour" cipher for SSH. <xref target="RFC4345" format="default" sectionFormat="of" derivedContent="RFC4345"/> specifies and allocates
     the "arcfour128" and "arcfour256" ciphers for SSH. 
     RC4 encryption has known weaknesses <xref target="RFC7465" format="default" sectionFormat="of" derivedContent="RFC7465"/> <xref target="RFC8429" format="default" sectionFormat="of" derivedContent="RFC8429"/>; therefore,
     this document starts the deprecation process for their use in Secure Shell
     (SSH) <xref target="RFC4253" format="default" sectionFormat="of" derivedContent="RFC4253"/>. Accordingly, <xref target="RFC4253" format="default" sectionFormat="of" derivedContent="RFC4253"/> is 
     updated to note the deprecation of the RC4 ciphers, and <xref target="RFC4345" format="default" sectionFormat="of" derivedContent="RFC4345"/> is moved to Historic status, as all ciphers
      it specifies <bcp14>MUST NOT</bcp14> be used.  </t>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-1.1">
        <name slugifiedName="name-requirements-language">Requirements Language</name>
        <t pn="section-1.1-1">
    The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>",
    "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>",
    "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
    "<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are
    to be interpreted as described in BCP 14 <xref target="RFC2119" format="default" sectionFormat="of" derivedContent="RFC2119"/>
          <xref target="RFC8174" format="default" sectionFormat="of" derivedContent="RFC8174"/> 
    when, and only when, they appear in all capitals, as shown here.
        </t>
      </section>
    </section>
    <section numbered="true" toc="include" removeInRFC="false" pn="section-2">
      <name slugifiedName="name-updates-to-rfc-4253">Updates to RFC 4253</name>
      <t pn="section-2-1">
<xref target="RFC4253" format="default" sectionFormat="of" derivedContent="RFC4253"/> is updated to prohibit arcfour's use in SSH.
<xref target="RFC4253" sectionFormat="comma" section="6.3" format="default" derivedLink="https://rfc-editor.org/rfc/rfc4253#section-6.3" derivedContent="RFC4253"/> allocates the
"arcfour" cipher by defining a list of defined ciphers in which the "arcfour"
cipher appears as optional, as shown in <xref target="OPTIONAL" format="default" sectionFormat="of" derivedContent="Table 1"/>.
</t>
      <table align="center" anchor="OPTIONAL" pn="table-1">
        <tbody>
          <tr>
            <td align="left" colspan="1" rowspan="1">arcfour</td>
            <td align="left" colspan="1" rowspan="1">
              <bcp14>OPTIONAL</bcp14></td>
            <td align="left" colspan="1" rowspan="1">the ARCFOUR stream cipher with a 128-bit key</td>
          </tr>
        </tbody>
      </table>
      <t pn="section-2-3">
This document updates the status of the "arcfour" ciphers in the list
found in <xref target="RFC4253" sectionFormat="comma" section="6.3" format="default" derivedLink="https://rfc-editor.org/rfc/rfc4253#section-6.3" derivedContent="RFC4253"/> by moving it
from <bcp14>OPTIONAL</bcp14> to <bcp14>MUST NOT</bcp14>. 
</t>
      <table align="center" pn="table-2">
        <tbody>
          <tr>
            <td align="left" colspan="1" rowspan="1"> arcfour </td>
            <td align="left" colspan="1" rowspan="1">
              <bcp14>MUST NOT</bcp14> </td>
            <td align="left" colspan="1" rowspan="1"> the ARCFOUR stream cipher with a 128-bit key</td>
          </tr>
        </tbody>
      </table>
      <t pn="section-2-5">
<xref target="RFC4253" format="default" sectionFormat="of" derivedContent="RFC4253"/> defines the "arcfour" ciphers with
the following text: 
</t>
      <blockquote pn="section-2-6">
   The "arcfour" cipher is the Arcfour stream cipher with 128-bit keys. The
   Arcfour cipher is believed to be compatible with the RC4 cipher <xref target="SCHNEIER" format="default" sectionFormat="of" derivedContent="SCHNEIER"/>.  Arcfour (and RC4) has problems with weak keys, and
   should be used with caution.</blockquote>
      <t pn="section-2-7">
This document updates <xref target="RFC4253" sectionFormat="comma" section="6.3" format="default" derivedLink="https://rfc-editor.org/rfc/rfc4253#section-6.3" derivedContent="RFC4253"/> by replacing the text above with the following text:
</t>
      <blockquote pn="section-2-8">
  The "arcfour" cipher is the Arcfour stream cipher with 128-bit keys.
   The Arcfour cipher is compatible with the RC4 cipher
   <xref target="SCHNEIER" format="default" sectionFormat="of" derivedContent="SCHNEIER"/>.  Arcfour (and RC4) has known weaknesses <xref target="RFC7465" format="default" sectionFormat="of" derivedContent="RFC7465"/> <xref target="RFC8429" format="default" sectionFormat="of" derivedContent="RFC8429"/> and
   <bcp14>MUST NOT</bcp14> be used.
</blockquote>
    </section>
    <section numbered="true" toc="include" removeInRFC="false" pn="section-3">
      <name slugifiedName="name-iana-considerations">IANA Considerations</name>
      <t pn="section-3-1">The IANA has updated the "Encryption Algorithm Names"
      subregistry in the "Secure Shell (SSH) Protocol Parameters" registry <xref target="IANA" format="default" sectionFormat="of" derivedContent="IANA"/>. The registration procedure is IETF
      review, which is achieved by this document. The registry has been
      updated as follows:</t>
      <table align="center" pn="table-3">
        <thead>
          <tr>
            <th align="left" colspan="1" rowspan="1">Encryption Algorithm Name</th>
            <th align="left" colspan="1" rowspan="1">Reference</th>
            <th align="left" colspan="1" rowspan="1">Note</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left" colspan="1" rowspan="1">arcfour</td>
            <td align="left" colspan="1" rowspan="1">RFC 8758</td>
            <td align="left" colspan="1" rowspan="1">HISTORIC</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">arcfour128 </td>
            <td align="left" colspan="1" rowspan="1">RFC 8758</td>
            <td align="left" colspan="1" rowspan="1">HISTORIC</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">arcfour256 </td>
            <td align="left" colspan="1" rowspan="1">RFC 8758</td>
            <td align="left" colspan="1" rowspan="1">HISTORIC</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="Security" numbered="true" toc="include" removeInRFC="false" pn="section-4">
      <name slugifiedName="name-security-considerations">Security Considerations</name>
      <t pn="section-4-1">This document only prohibits the use of RC4 in SSH; it introduces no
   new security considerations.</t>
    </section>
  </middle>
  <back>
    <references pn="section-5">
      <name slugifiedName="name-references">References</name>
      <references pn="section-5.1">
        <name slugifiedName="name-normative-references">Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" quoteTitle="true" derivedAnchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author initials="S." surname="Bradner" fullname="S. Bradner">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="1997" month="March"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" quoteTitle="true" derivedAnchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author initials="B." surname="Leiba" fullname="B. Leiba">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2017" month="May"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references pn="section-5.2">
        <name slugifiedName="name-informative-references">Informative References</name>
        <reference anchor="IANA" target="https://www.iana.org/assignments/ssh-parameters" quoteTitle="true" derivedAnchor="IANA">
          <front>
            <title>Secure Shell (SSH) Protocol Parameters</title>
            <author/>
          </front>
        </reference>
        <reference anchor="RFC4253" target="https://www.rfc-editor.org/info/rfc4253" quoteTitle="true" derivedAnchor="RFC4253">
          <front>
            <title>The Secure Shell (SSH) Transport Layer Protocol</title>
            <author initials="T." surname="Ylonen" fullname="T. Ylonen">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="C." surname="Lonvick" fullname="C. Lonvick" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2006" month="January"/>
            <abstract>
              <t>The Secure Shell (SSH) is a protocol for secure remote login and other secure network services over an insecure network.</t>
              <t>This document describes the SSH transport layer protocol, which typically runs on top of TCP/IP.  The protocol can be used as a basis for a number of secure network services.  It provides strong encryption, server authentication, and integrity protection.  It may also provide compression.</t>
              <t>Key exchange method, public key algorithm, symmetric encryption algorithm, message authentication algorithm, and hash algorithm are all negotiated.</t>
              <t>This document also describes the Diffie-Hellman key exchange method and the minimal set of algorithms that are needed to implement the SSH transport layer protocol.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4253"/>
          <seriesInfo name="DOI" value="10.17487/RFC4253"/>
        </reference>
        <reference anchor="RFC4345" target="https://www.rfc-editor.org/info/rfc4345" quoteTitle="true" derivedAnchor="RFC4345">
          <front>
            <title>Improved Arcfour Modes for the Secure Shell (SSH) Transport Layer Protocol</title>
            <author initials="B." surname="Harris" fullname="B. Harris">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2006" month="January"/>
            <abstract>
              <t>This document specifies methods of using the Arcfour cipher in the Secure Shell (SSH) protocol that mitigate the weakness of the cipher's key-scheduling algorithm.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4345"/>
          <seriesInfo name="DOI" value="10.17487/RFC4345"/>
        </reference>
        <reference anchor="RFC7465" target="https://www.rfc-editor.org/info/rfc7465" quoteTitle="true" derivedAnchor="RFC7465">
          <front>
            <title>Prohibiting RC4 Cipher Suites</title>
            <author initials="A." surname="Popov" fullname="A. Popov">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2015" month="February"/>
            <abstract>
              <t>This document requires that Transport Layer Security (TLS) clients and servers never negotiate the use of RC4 cipher suites when they establish connections.  This applies to all TLS versions.  This document updates RFCs 5246, 4346, and 2246.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7465"/>
          <seriesInfo name="DOI" value="10.17487/RFC7465"/>
        </reference>
        <reference anchor="RFC8429" target="https://www.rfc-editor.org/info/rfc8429" quoteTitle="true" derivedAnchor="RFC8429">
          <front>
            <title>Deprecate Triple-DES (3DES) and RC4 in Kerberos</title>
            <author initials="B." surname="Kaduk" fullname="B. Kaduk">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="M." surname="Short" fullname="M. Short">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2018" month="October"/>
            <abstract>
              <t>The triple-DES (3DES) and RC4 encryption types are steadily weakening in cryptographic strength, and the deprecation process should begin for their use in Kerberos.  Accordingly, RFC 4757 has been moved to Historic status, as none of the encryption types it specifies should be used, and RFC 3961 has been updated to note the deprecation of the triple-DES encryption types.  RFC 4120 is likewise updated to remove the recommendation to implement triple-DES encryption and checksum types.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="218"/>
          <seriesInfo name="RFC" value="8429"/>
          <seriesInfo name="DOI" value="10.17487/RFC8429"/>
        </reference>
        <reference anchor="SCHNEIER" target="" quoteTitle="true" derivedAnchor="SCHNEIER">
          <front>
            <title>Applied Cryptography Second Edition: Protocols, Algorithms, and Source in Code in C</title>
            <seriesInfo name="John Wiley and Sons" value="New York, NY"/>
            <author initials="B." surname="Schneier" fullname="Bruce Schneier">
              <organization showOnFrontPage="true"/>
            </author>
            <date month="" year="1996"/>
          </front>
        </reference>
      </references>
    </references>
    <section anchor="Acknowledgements" numbered="false" toc="include" removeInRFC="false" pn="section-appendix.a">
      <name slugifiedName="name-acknowledgements">Acknowledgements</name>
      <t pn="section-appendix.a-1">The author would like to thank <contact fullname="Eric Rescorla"/>,
      <contact fullname="Daniel Migault"/>, and <contact fullname="Rich Salz"/>.</t>
    </section>
    <section anchor="authors-addresses" numbered="false" removeInRFC="false" toc="include" pn="section-appendix.b">
      <name slugifiedName="name-authors-address">Author's Address</name>
      <author fullname="Loganaden Velvindron" initials="L." surname="Velvindron">
        <organization showOnFrontPage="true">cyberstorm.mu</organization>
        <address>
          <postal>
            <street/>
            <city/>
            <region/>
            <code/>
            <country>Mauritius</country>
          </postal>
          <phone/>
          <email>logan@cyberstorm.mu</email>
        </address>
      </author>
    </section>
  </back>
</rfc>
