<?xml version='1.0' encoding='utf-8'?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" version="3" category="std" docName="draft-ietf-uta-ciphersuites-in-sec-syslog-07" number="9662" ipr="trust200902" obsoletes="" updates="5425, 6012" submissionType="IETF" consensus="true" xml:lang="en" tocInclude="true" tocDepth="4" symRefs="true" sortRefs="true" prepTime="2024-10-07T11:06:21" indexInclude="true" scripts="Common,Latin">
  <link href="https://datatracker.ietf.org/doc/draft-ietf-uta-ciphersuites-in-sec-syslog-07" rel="prev"/>
  <link href="https://dx.doi.org/10.17487/rfc9662" rel="alternate"/>
  <link href="urn:issn:2070-1721" rel="alternate"/>
  <front>
    <title abbrev="Cipher Suites in Secure Syslog">Updates to the Cipher Suites in Secure Syslog</title>
    <seriesInfo name="RFC" value="9662" stream="IETF"/>
    <author fullname="Chris Lonvick" initials="C." surname="Lonvick">
      <address>
        <email>lonvick.ietf@gmail.com</email>
      </address>
    </author>
    <author fullname="Sean Turner" initials="S." surname="Turner">
      <organization showOnFrontPage="true">sn3rd</organization>
      <address>
        <email>sean@sn3rd.com</email>
      </address>
    </author>
    <author fullname="Joe Salowey" initials="J." surname="Salowey">
      <organization showOnFrontPage="true">Venafi</organization>
      <address>
        <email>joe@salowey.net</email>
      </address>
    </author>
    <date month="10" year="2024"/>
    <area>SEC</area>
    <workgroup>uts</workgroup>
    <keyword>syslog</keyword>
    <keyword>secure syslog</keyword>
    <keyword>TLS_RSA_WITH_AES_128_CBC_SHA</keyword>
    <keyword>TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256</keyword>
    <keyword>DTLS</keyword>
    <keyword>TLS</keyword>
    <keyword>cipher suite</keyword>
    <abstract pn="section-abstract">
      <t indent="0" pn="section-abstract-1">
   RFCs 5425 and 6012 describe using TLS and DTLS to securely 
   transport syslog messages.  This document updates the 
   cipher suites required by RFC 5245 (TLS 
   Transport Mapping for Syslog) and RFC 6012 
   (DTLS Transport Mapping for Syslog).  It also updates 
   the protocol recommended by RFC 6012 for secure datagram transport. 
      </t>
    </abstract>
    <boilerplate>
      <section anchor="status-of-memo" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.1">
        <name slugifiedName="name-status-of-this-memo">Status of This Memo</name>
        <t indent="0" pn="section-boilerplate.1-1">
            This is an Internet Standards Track document.
        </t>
        <t indent="0" pn="section-boilerplate.1-2">
            This document is a product of the Internet Engineering Task Force
            (IETF).  It represents the consensus of the IETF community.  It has
            received public review and has been approved for publication by
            the Internet Engineering Steering Group (IESG).  Further
            information on Internet Standards is available in Section 2 of 
            RFC 7841.
        </t>
        <t indent="0" pn="section-boilerplate.1-3">
            Information about the current status of this document, any
            errata, and how to provide feedback on it may be obtained at
            <eref target="https://www.rfc-editor.org/info/rfc9662" brackets="none"/>.
        </t>
      </section>
      <section anchor="copyright" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.2">
        <name slugifiedName="name-copyright-notice">Copyright Notice</name>
        <t indent="0" pn="section-boilerplate.2-1">
            Copyright (c) 2024 IETF Trust and the persons identified as the
            document authors. All rights reserved.
        </t>
        <t indent="0" pn="section-boilerplate.2-2">
            This document is subject to BCP 78 and the IETF Trust's Legal
            Provisions Relating to IETF Documents
            (<eref target="https://trustee.ietf.org/license-info" brackets="none"/>) in effect on the date of
            publication of this document. Please review these documents
            carefully, as they describe your rights and restrictions with
            respect to this document. Code Components extracted from this
            document must include Revised BSD License text as described in
            Section 4.e of the Trust Legal Provisions and are provided without
            warranty as described in the Revised BSD License.
        </t>
      </section>
    </boilerplate>
    <toc>
      <section anchor="toc" numbered="false" removeInRFC="false" toc="exclude" pn="section-toc.1">
        <name slugifiedName="name-table-of-contents">Table of Contents</name>
        <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1">
          <li pn="section-toc.1-1.1">
            <t indent="0" keepWithNext="true" pn="section-toc.1-1.1.1"><xref derivedContent="1" format="counter" sectionFormat="of" target="section-1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-introduction">Introduction</xref></t>
          </li>
          <li pn="section-toc.1-1.2">
            <t indent="0" keepWithNext="true" pn="section-toc.1-1.2.1"><xref derivedContent="2" format="counter" sectionFormat="of" target="section-2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-terminology">Terminology</xref></t>
          </li>
          <li pn="section-toc.1-1.3">
            <t indent="0" keepWithNext="true" pn="section-toc.1-1.3.1"><xref derivedContent="3" format="counter" sectionFormat="of" target="section-3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-support-for-updating">Support for Updating</xref></t>
          </li>
          <li pn="section-toc.1-1.4">
            <t indent="0" pn="section-toc.1-1.4.1"><xref derivedContent="4" format="counter" sectionFormat="of" target="section-4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-updates-to-rfc-5425">Updates to RFC 5425</xref></t>
          </li>
          <li pn="section-toc.1-1.5">
            <t indent="0" pn="section-toc.1-1.5.1"><xref derivedContent="5" format="counter" sectionFormat="of" target="section-5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-updates-to-rfc-6012">Updates to RFC 6012</xref></t>
          </li>
          <li pn="section-toc.1-1.6">
            <t indent="0" pn="section-toc.1-1.6.1"><xref derivedContent="6" format="counter" sectionFormat="of" target="section-6"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-early-data">Early Data</xref></t>
          </li>
          <li pn="section-toc.1-1.7">
            <t indent="0" pn="section-toc.1-1.7.1"><xref derivedContent="7" format="counter" sectionFormat="of" target="section-7"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-iana-considerations">IANA Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.8">
            <t indent="0" pn="section-toc.1-1.8.1"><xref derivedContent="8" format="counter" sectionFormat="of" target="section-8"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-security-considerations">Security Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.9">
            <t indent="0" pn="section-toc.1-1.9.1"><xref derivedContent="9" format="counter" sectionFormat="of" target="section-9"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-references">References</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.9.2">
              <li pn="section-toc.1-1.9.2.1">
                <t indent="0" pn="section-toc.1-1.9.2.1.1"><xref derivedContent="9.1" format="counter" sectionFormat="of" target="section-9.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-normative-references">Normative References</xref></t>
              </li>
              <li pn="section-toc.1-1.9.2.2">
                <t indent="0" pn="section-toc.1-1.9.2.2.1"><xref derivedContent="9.2" format="counter" sectionFormat="of" target="section-9.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-informative-references">Informative References</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.10">
            <t indent="0" pn="section-toc.1-1.10.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.a"/><xref derivedContent="" format="title" sectionFormat="of" target="name-acknowledgments">Acknowledgments</xref></t>
          </li>
          <li pn="section-toc.1-1.11">
            <t indent="0" pn="section-toc.1-1.11.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.b"/><xref derivedContent="" format="title" sectionFormat="of" target="name-authors-addresses">Authors' Addresses</xref></t>
          </li>
        </ul>
      </section>
    </toc>
  </front>
  <middle>
    <section numbered="true" toc="include" removeInRFC="false" pn="section-1">
      <name slugifiedName="name-introduction">Introduction</name>
      <t indent="0" pn="section-1-1">
   "Transport Layer Security (TLS) Transport Mapping for Syslog" <xref target="RFC5425" format="default" sectionFormat="of" derivedContent="RFC5425"/> and 
   "Datagram Transport Layer Security (DTLS) Transport Mapping for Syslog" <xref target="RFC6012" format="default" sectionFormat="of" derivedContent="RFC6012"/>
   describe using TLS and DTLS to securely transport syslog messages.  Both 
   of these specifications require the use of RSA-based certificates 
   and the use of TLS and DTLS versions that are not the most recent.
</t>
      <t indent="0" pn="section-1-2">
			<xref target="RFC5425" sectionFormat="of" section="4.2" format="default" derivedLink="https://rfc-editor.org/rfc/rfc5425#section-4.2" derivedContent="RFC5425"/> requires that implementations <bcp14>MUST</bcp14>
			support TLS 1.2 <xref target="RFC5246" format="default" sectionFormat="of" derivedContent="RFC5246"/> and are <bcp14>REQUIRED</bcp14> 
			to support the mandatory-to-implement cipher suite 
			TLS_RSA_WITH_AES_128_CBC_SHA. 
      </t>
      <t indent="0" pn="section-1-3">
			<xref target="RFC6012" sectionFormat="of" section="5.2" format="default" derivedLink="https://rfc-editor.org/rfc/rfc6012#section-5.2" derivedContent="RFC6012"/> requires that implementations "<bcp14>MUST</bcp14>" 
			support DTLS 1.0 <xref target="RFC4347" format="default" sectionFormat="of" derivedContent="RFC4347"/> and are also 
			"<bcp14>REQUIRED</bcp14>" to support the mandatory-to-implement cipher suite 
			TLS_RSA_WITH_AES_128_CBC_SHA.
      </t>
      <t indent="0" pn="section-1-4">
			The community is moving away from cipher suites that do not offer forward
			secrecy and towards more robust suites.
      </t>
      <t indent="0" pn="section-1-5">
			The DTLS 1.0 transport <xref target="RFC4347" format="default" sectionFormat="of" derivedContent="RFC4347"/> has been deprecated by 
			RFC 8996 <xref target="BCP195" format="default" sectionFormat="of" derivedContent="BCP195"/>, and the community is moving to DTLS 1.2 
			<xref target="RFC6347" format="default" sectionFormat="of" derivedContent="RFC6347"/> and DTLS 1.3 <xref target="RFC9147" format="default" sectionFormat="of" derivedContent="RFC9147"/>.
      </t>
      <t indent="0" pn="section-1-6">
			This document updates <xref target="RFC5425" format="default" sectionFormat="of" derivedContent="RFC5425"/> and <xref target="RFC6012" format="default" sectionFormat="of" derivedContent="RFC6012"/> 
			to prefer the use of TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 over the use of
			TLS_RSA_WITH_AES_128_CBC_SHA. 
      </t>
      <t indent="0" pn="section-1-7">
			This document also updates <xref target="RFC6012" format="default" sectionFormat="of" derivedContent="RFC6012"/> by recommending  
			a mandatory-to-implement secure datagram transport.
      </t>
    </section>
    <section anchor="terminology" numbered="true" toc="include" removeInRFC="false" pn="section-2">
      <name slugifiedName="name-terminology">Terminology</name>
      <t indent="0" pn="section-2-1">
    The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>",
    "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL NOT</bcp14>",
    "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>",
    "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
    "<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be
    interpreted as described in BCP 14 <xref target="RFC2119" format="default" sectionFormat="of" derivedContent="RFC2119"/> <xref target="RFC8174" format="default" sectionFormat="of" derivedContent="RFC8174"/> when, and only when, they appear in all capitals, as
    shown here.
      </t>
    </section>
    <section anchor="reasons" numbered="true" toc="include" removeInRFC="false" pn="section-3">
      <name slugifiedName="name-support-for-updating">Support for Updating</name>
      <t indent="0" pn="section-3-1">
			<xref target="I-D.ietf-tls-rfc8447bis" format="default" sectionFormat="of" derivedContent="RFC8447bis"/> generally reminds us that 
			cryptographic algorithms and parameters will be broken or weakened over time.  
			Blindly implementing the cryptographic algorithms listed in any specification 
			is not advised. Implementers and users need to check that the cryptographic 
			algorithms specified continue to provide the expected level of security.
      </t>
      <t indent="0" pn="section-3-2">
			As the Syslog Working Group determined, syslog clients and servers 
			<bcp14>MUST</bcp14> use certificates as defined in <xref target="RFC5280" format="default" sectionFormat="of" derivedContent="RFC5280"/>.
			Since both <xref target="RFC5425" format="default" sectionFormat="of" derivedContent="RFC5425"/> and <xref target="RFC6012" format="default" sectionFormat="of" derivedContent="RFC6012"/>
        <bcp14>REQUIRED</bcp14> the use of TLS_RSA_WITH_AES_128_CBC_SHA, it is very
			likely that RSA certificates have been implemented in devices adhering to
			those specifications. RFC 9325 <xref target="BCP195" format="default" sectionFormat="of" derivedContent="BCP195"/> notes that ECDHE cipher suites 
			exist for both RSA and ECDSA certificates, so moving to an ECDHE cipher suite 
			will not require replacing or moving away from any currently installed 
			RSA-based certificates.
      </t>
      <t indent="0" pn="section-3-3">
			<xref target="I-D.ietf-tls-deprecate-obsolete-kex" format="default" sectionFormat="of" derivedContent="DEPRECATE-KEX"/> documents that the
			cipher suite TLS_RSA_WITH_AES_128_CBC_SHA, along with some other cipher suites,
			may require mitigation techniques to achieve expected security, which may be 
			difficult to effectively implement. Along those lines, 

RFC 9325 <xref target="BCP195" format="default" sectionFormat="of" derivedContent="BCP195"/> notes that 
			TLS_RSA_WITH_AES_128_CBC_SHA does not provide forward secrecy, a feature that 
			is highly desirable in securing event messages. That document also goes on to 
			recommend TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 as a cipher suite that does 
			provide forward secrecy.
      </t>
      <t indent="0" pn="section-3-4">
 			As such, the community is moving away from algorithms that do not provide 
 			forward secrecy. For example, the International Electrotechnical Commission 
 			(IEC) has selected more robust suites such as 
 			TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, which is also listed as a 
 			currently <bcp14>RECOMMENDED</bcp14> algorithm in
			<xref target="I-D.ietf-tls-rfc8447bis" format="default" sectionFormat="of" derivedContent="RFC8447bis"/> for their deployments of
			secure syslog.
      </t>
      <t indent="0" pn="section-3-5">
			Additionally, RFC 8996 <xref target="BCP195" format="default" sectionFormat="of" derivedContent="BCP195"/> 
			deprecates the use 
			of DTLS 1.0 <xref target="RFC4347" format="default" sectionFormat="of" derivedContent="RFC4347"/>, which is the mandatory-to-implement 
			transport protocol per <xref target="RFC6012" format="default" sectionFormat="of" derivedContent="RFC6012"/>. Therefore, that transport
			protocol must be updated.
      </t>
      <t indent="0" pn="section-3-6">
			Finally, RFC 9325 <xref target="BCP195" format="default" sectionFormat="of" derivedContent="BCP195"/> provides 
			guidance on the support of TLS 1.3 <xref target="RFC8446" format="default" sectionFormat="of" derivedContent="RFC8446"/> and 
			DTLS 1.3 <xref target="RFC9147" format="default" sectionFormat="of" derivedContent="RFC9147"/>.
      </t>
      <t indent="0" pn="section-3-7">
			Therefore, to maintain interoperability across implementations, the mandatory-to-implement cipher suites listed in <xref target="RFC5425" format="default" sectionFormat="of" derivedContent="RFC5425"/> and 
			<xref target="RFC6012" format="default" sectionFormat="of" derivedContent="RFC6012"/> should be updated so that implementations of secure 
			syslog will still interoperate and provide an acceptable and expected level 
			of security. 
      </t>
      <t indent="0" pn="section-3-8">
			However, since there are many implementations of syslog using
			the cipher suites mandated by <xref target="RFC6012" format="default" sectionFormat="of" derivedContent="RFC6012"/>, a 
			sudden change is not desirable. To accommodate a migration path,
                        TLS_RSA_WITH_AES_128_CBC_SHA or
                        TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 may be used, but it
                        is <bcp14>REQUIRED</bcp14> that TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
                        be preferred. 
      </t>
    </section>
    <section anchor="updates5425" numbered="true" removeInRFC="false" toc="include" pn="section-4">
      <name slugifiedName="name-updates-to-rfc-5425">Updates to RFC 5425</name>
      <t indent="0" pn="section-4-1">
			The mandatory-to-implement cipher suites are <bcp14>REQUIRED</bcp14> 
			to be TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 and TLS_RSA_WITH_AES_128_CBC_SHA.
      </t>
      <t indent="0" pn="section-4-2">
			Implementations of <xref target="RFC5425" format="default" sectionFormat="of" derivedContent="RFC5425"/> <bcp14>SHOULD</bcp14> offer 
			TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 but <bcp14>MAY</bcp14> offer
			TLS_RSA_WITH_AES_128_CBC_SHA.
      </t>
      <t indent="0" pn="section-4-3">
			Implementations of <xref target="RFC5425" format="default" sectionFormat="of" derivedContent="RFC5425"/> <bcp14>MUST</bcp14> continue to 
			use TLS 1.2 <xref target="RFC5246" format="default" sectionFormat="of" derivedContent="RFC5246"/> as the mandatory-to-implement 
			transport protocol.
      </t>
      <t indent="0" pn="section-4-4">
			As per RFC 9325 <xref target="BCP195" format="default" sectionFormat="of" derivedContent="BCP195"/>, implementations of <xref target="RFC5425" format="default" sectionFormat="of" derivedContent="RFC5425"/>
        <bcp14>SHOULD</bcp14> support TLS 1.3 <xref target="RFC8446" format="default" sectionFormat="of" derivedContent="RFC8446"/> and, if 
			implemented, <bcp14>MUST</bcp14> prefer to negotiate TLS 1.3
			over earlier versions of TLS.
      </t>
    </section>
    <section anchor="updates6012" numbered="true" removeInRFC="false" toc="include" pn="section-5">
      <name slugifiedName="name-updates-to-rfc-6012">Updates to RFC 6012</name>
      <t indent="0" pn="section-5-1">
			The mandatory-to-implement cipher suites are <bcp14>REQUIRED</bcp14> to be 
			TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 and TLS_RSA_WITH_AES_128_CBC_SHA.
      </t>
      <t indent="0" pn="section-5-2">
			Implementations of <xref target="RFC6012" format="default" sectionFormat="of" derivedContent="RFC6012"/> <bcp14>SHOULD</bcp14> offer 
			TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 but <bcp14>MAY</bcp14> offer
			TLS_RSA_WITH_AES_128_CBC_SHA. 
      </t>
      <t indent="0" pn="section-5-3">
			As specified in RFCs 8996 and 9325 <xref target="BCP195" format="default" sectionFormat="of" derivedContent="BCP195"/>, implementations of 
			<xref target="RFC6012" format="default" sectionFormat="of" derivedContent="RFC6012"/> <bcp14>MUST NOT</bcp14> use DTLS 1.0 <xref target="RFC4347" format="default" sectionFormat="of" derivedContent="RFC4347"/>. 
			Implementations <bcp14>MUST</bcp14> use DTLS 1.2 <xref target="RFC6347" format="default" sectionFormat="of" derivedContent="RFC6347"/>.
      </t>
      <t indent="0" pn="section-5-4">
			DTLS 1.2 <xref target="RFC6347" format="default" sectionFormat="of" derivedContent="RFC6347"/> implementations <bcp14>SHOULD</bcp14> support 
			and prefer the mandatory-to-implement cipher suite 
			TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256.
      </t>
      <t indent="0" pn="section-5-5">
			As per RFC 9325 <xref target="BCP195" format="default" sectionFormat="of" derivedContent="BCP195"/>, implementations of <xref target="RFC6012" format="default" sectionFormat="of" derivedContent="RFC6012"/>
        <bcp14>SHOULD</bcp14> support DTLS 1.3 <xref target="RFC9147" format="default" sectionFormat="of" derivedContent="RFC9147"/> and, if 
			implemented, <bcp14>MUST</bcp14> prefer to negotiate DTLS version 1.3 over 
			earlier versions of DTLS.
      </t>
    </section>
    <section anchor="earlyData" numbered="true" removeInRFC="false" toc="include" pn="section-6">
      <name slugifiedName="name-early-data">Early Data</name>
      <t indent="0" pn="section-6-1">
			Early data (aka 0-RTT data) is a mechanism defined in TLS 1.3
			<xref target="RFC8446" format="default" sectionFormat="of" derivedContent="RFC8446"/> that allows a client to send data ("early data") as 
			part of the first flight of messages to a server. Early data is permitted by 
			TLS 1.3 when the client and server share a PSK, either obtained externally or 
			via a previous handshake. The client uses the PSK to authenticate the server 
			and to encrypt the early data.
      </t>
      <t indent="0" pn="section-6-2">
			As noted in <xref target="I-D.ietf-tls-rfc8446bis" sectionFormat="of" section="2.3" format="default" derivedLink="https://datatracker.ietf.org/doc/html/draft-ietf-tls-rfc8446bis-11#section-2.3" derivedContent="RFC8446bis"/>, the 
			security properties for early data are weaker than those for subsequent 
			TLS-protected data.  In particular, early data is not forward secret, and 
			there are no protections against the replay of early data between 
			connections. <xref target="I-D.ietf-tls-rfc8446bis" sectionFormat="of" section="E.5" format="default" derivedLink="https://datatracker.ietf.org/doc/html/draft-ietf-tls-rfc8446bis-11#appendix-E.5" derivedContent="RFC8446bis"/> 
			requires that applications not use early data without a profile that defines its 
			use. Because syslog does not support replay protection (see  
			<xref target="RFC5424" sectionFormat="of" section="8.4" format="default" derivedLink="https://rfc-editor.org/rfc/rfc5424#section-8.4" derivedContent="RFC5424"/>) and most implementations establish a long-lived 
			connection, this document specifies that implementations <bcp14>MUST NOT</bcp14> use early 
			data.
      </t>
    </section>
    <section anchor="IANA" numbered="true" toc="include" removeInRFC="false" pn="section-7">
      <name slugifiedName="name-iana-considerations">IANA Considerations</name>
      <t indent="0" pn="section-7-1">This document has no IANA actions.</t>
    </section>
    <section anchor="Security" numbered="true" toc="include" removeInRFC="false" pn="section-8">
      <name slugifiedName="name-security-considerations">Security Considerations</name>
      <t indent="0" pn="section-8-1">
			RFCs 8996 and 9325 <xref target="BCP195" format="default" sectionFormat="of" derivedContent="BCP195"/> deprecate an insecure DTLS transport protocol 
			from <xref target="RFC6012" format="default" sectionFormat="of" derivedContent="RFC6012"/> and deprecate insecure cipher suites from 
			<xref target="RFC5425" format="default" sectionFormat="of" derivedContent="RFC5425"/> and <xref target="RFC6012" format="default" sectionFormat="of" derivedContent="RFC6012"/>. However, the
			installed base of syslog implementations is not easily updated to 
			immediately adhere to those changes.
      </t>
      <t indent="0" pn="section-8-2">
			This document updates the mandatory-to-implement cipher suites to allow 
			for a migration from TLS_RSA_WITH_AES_128_CBC_SHA to
			TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 without deprecating the former.
			Implementations should prefer to use TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256.
      </t>
      <t indent="0" pn="section-8-3">
			If a device currently only has TLS_RSA_WITH_AES_128_CBC_SHA, an 
			administrator of the network should evaluate
			the conditions and determine if TLS_RSA_WITH_AES_128_CBC_SHA should be allowed
			so that syslog messages may continue to be delivered until the device is
			updated to have TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256.
      </t>
    </section>
  </middle>
  <back>
    <displayreference target="I-D.ietf-tls-rfc8447bis" to="RFC8447bis"/>
    <displayreference target="I-D.ietf-tls-deprecate-obsolete-kex" to="DEPRECATE-KEX"/>
    <displayreference target="I-D.ietf-tls-rfc8446bis" to="RFC8446bis"/>
    <references pn="section-9">
      <name slugifiedName="name-references">References</name>
      <references pn="section-9.1">
        <name slugifiedName="name-normative-references">Normative References</name>
        <referencegroup anchor="BCP195" target="https://www.rfc-editor.org/info/bcp195" derivedAnchor="BCP195">
          <reference anchor="RFC8996" target="https://www.rfc-editor.org/info/rfc8996" quoteTitle="true">
            <front>
              <title>Deprecating TLS 1.0 and TLS 1.1</title>
              <author fullname="K. Moriarty" initials="K." surname="Moriarty"/>
              <author fullname="S. Farrell" initials="S." surname="Farrell"/>
              <date month="March" year="2021"/>
              <abstract>
                <t indent="0">This document formally deprecates Transport Layer Security (TLS) versions 1.0 (RFC 2246) and 1.1 (RFC 4346). Accordingly, those documents have been moved to Historic status. These versions lack support for current and recommended cryptographic algorithms and mechanisms, and various government and industry profiles of applications using TLS now mandate avoiding these old TLS versions. TLS version 1.2 became the recommended version for IETF protocols in 2008 (subsequently being obsoleted by TLS version 1.3 in 2018), providing sufficient time to transition away from older versions. Removing support for older versions from implementations reduces the attack surface, reduces opportunity for misconfiguration, and streamlines library and product maintenance.</t>
                <t indent="0">This document also deprecates Datagram TLS (DTLS) version 1.0 (RFC 4347) but not DTLS version 1.2, and there is no DTLS version 1.1.</t>
                <t indent="0">This document updates many RFCs that normatively refer to TLS version 1.0 or TLS version 1.1, as described herein. This document also updates the best practices for TLS usage in RFC 7525; hence, it is part of BCP 195.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="195"/>
            <seriesInfo name="RFC" value="8996"/>
            <seriesInfo name="DOI" value="10.17487/RFC8996"/>
          </reference>
          <reference anchor="RFC9325" target="https://www.rfc-editor.org/info/rfc9325" quoteTitle="true">
            <front>
              <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
              <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
              <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
              <author fullname="T. Fossati" initials="T." surname="Fossati"/>
              <date month="November" year="2022"/>
              <abstract>
                <t indent="0">Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are used to protect data exchanged over a wide range of application protocols and can also form the basis for secure transport protocols. Over the years, the industry has witnessed several serious attacks on TLS and DTLS, including attacks on the most commonly used cipher suites and their modes of operation. This document provides the latest recommendations for ensuring the security of deployed services that use TLS and DTLS. These recommendations are applicable to the majority of use cases.</t>
                <t indent="0">RFC 7525, an earlier version of the TLS recommendations, was published when the industry was transitioning to TLS 1.2. Years later, this transition is largely complete, and TLS 1.3 is widely available. This document updates the guidance given the new environment and obsoletes RFC 7525. In addition, this document updates RFCs 5288 and 6066 in view of recent attacks.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="195"/>
            <seriesInfo name="RFC" value="9325"/>
            <seriesInfo name="DOI" value="10.17487/RFC9325"/>
          </reference>
        </referencegroup>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" quoteTitle="true" derivedAnchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t indent="0">In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC4347" target="https://www.rfc-editor.org/info/rfc4347" quoteTitle="true" derivedAnchor="RFC4347">
          <front>
            <title>Datagram Transport Layer Security</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2006"/>
            <abstract>
              <t indent="0">This document specifies Version 1.0 of the Datagram Transport Layer Security (DTLS) protocol. The DTLS protocol provides communications privacy for datagram protocols. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. The DTLS protocol is based on the Transport Layer Security (TLS) protocol and provides equivalent security guarantees. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4347"/>
          <seriesInfo name="DOI" value="10.17487/RFC4347"/>
        </reference>
        <reference anchor="RFC5246" target="https://www.rfc-editor.org/info/rfc5246" quoteTitle="true" derivedAnchor="RFC5246">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2008"/>
            <abstract>
              <t indent="0">This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="RFC5280" target="https://www.rfc-editor.org/info/rfc5280" quoteTitle="true" derivedAnchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t indent="0">This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC5424" target="https://www.rfc-editor.org/info/rfc5424" quoteTitle="true" derivedAnchor="RFC5424">
          <front>
            <title>The Syslog Protocol</title>
            <author fullname="R. Gerhards" initials="R." surname="Gerhards"/>
            <date month="March" year="2009"/>
            <abstract>
              <t indent="0">This document describes the syslog protocol, which is used to convey event notification messages. This protocol utilizes a layered architecture, which allows the use of any number of transport protocols for transmission of syslog messages. It also provides a message format that allows vendor-specific extensions to be provided in a structured way.</t>
              <t indent="0">This document has been written with the original design goals for traditional syslog in mind. The need for a new layered specification has arisen because standardization efforts for reliable and secure syslog extensions suffer from the lack of a Standards-Track and transport-independent RFC. Without this document, each other standard needs to define its own syslog packet format and transport mechanism, which over time will introduce subtle compatibility issues. This document tries to provide a foundation that syslog extensions can build on. This layered architecture approach also provides a solid basis that allows code to be written once for each syslog feature rather than once for each transport. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5424"/>
          <seriesInfo name="DOI" value="10.17487/RFC5424"/>
        </reference>
        <reference anchor="RFC5425" target="https://www.rfc-editor.org/info/rfc5425" quoteTitle="true" derivedAnchor="RFC5425">
          <front>
            <title>Transport Layer Security (TLS) Transport Mapping for Syslog</title>
            <author fullname="F. Miao" initials="F." role="editor" surname="Miao"/>
            <author fullname="Y. Ma" initials="Y." role="editor" surname="Ma"/>
            <author fullname="J. Salowey" initials="J." role="editor" surname="Salowey"/>
            <date month="March" year="2009"/>
            <abstract>
              <t indent="0">This document describes the use of Transport Layer Security (TLS) to provide a secure connection for the transport of syslog messages. This document describes the security threats to syslog and how TLS can be used to counter such threats. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5425"/>
          <seriesInfo name="DOI" value="10.17487/RFC5425"/>
        </reference>
        <reference anchor="RFC6012" target="https://www.rfc-editor.org/info/rfc6012" quoteTitle="true" derivedAnchor="RFC6012">
          <front>
            <title>Datagram Transport Layer Security (DTLS) Transport Mapping for Syslog</title>
            <author fullname="J. Salowey" initials="J." surname="Salowey"/>
            <author fullname="T. Petch" initials="T." surname="Petch"/>
            <author fullname="R. Gerhards" initials="R." surname="Gerhards"/>
            <author fullname="H. Feng" initials="H." surname="Feng"/>
            <date month="October" year="2010"/>
            <abstract>
              <t indent="0">This document describes the transport of syslog messages over the Datagram Transport Layer Security (DTLS) protocol. It provides a secure transport for syslog messages in cases where a connectionless transport is desired. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6012"/>
          <seriesInfo name="DOI" value="10.17487/RFC6012"/>
        </reference>
        <reference anchor="RFC6347" target="https://www.rfc-editor.org/info/rfc6347" quoteTitle="true" derivedAnchor="RFC6347">
          <front>
            <title>Datagram Transport Layer Security Version 1.2</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="January" year="2012"/>
            <abstract>
              <t indent="0">This document specifies version 1.2 of the Datagram Transport Layer Security (DTLS) protocol. The DTLS protocol provides communications privacy for datagram protocols. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. The DTLS protocol is based on the Transport Layer Security (TLS) protocol and provides equivalent security guarantees. Datagram semantics of the underlying transport are preserved by the DTLS protocol. This document updates DTLS 1.0 to work with TLS version 1.2. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6347"/>
          <seriesInfo name="DOI" value="10.17487/RFC6347"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" quoteTitle="true" derivedAnchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t indent="0">RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8446" target="https://www.rfc-editor.org/info/rfc8446" quoteTitle="true" derivedAnchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t indent="0">This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t indent="0">This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC9147" target="https://www.rfc-editor.org/info/rfc9147" quoteTitle="true" derivedAnchor="RFC9147">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t indent="0">This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t indent="0">The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t indent="0">This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
      </references>
      <references pn="section-9.2">
        <name slugifiedName="name-informative-references">Informative References</name>
        <reference anchor="I-D.ietf-tls-deprecate-obsolete-kex" target="https://datatracker.ietf.org/doc/html/draft-ietf-tls-deprecate-obsolete-kex-05" quoteTitle="true" derivedAnchor="DEPRECATE-KEX">
          <front>
            <title>Deprecating Obsolete Key Exchange Methods in TLS 1.2</title>
            <author initials="C." surname="Bartle" fullname="Carrick Bartle">
              <organization showOnFrontPage="true">Roblox</organization>
            </author>
            <author initials="N." surname="Aviram" fullname="Nimrod Aviram">
         </author>
            <date month="September" day="3" year="2024"/>
            <abstract>
              <t indent="0">   This document deprecates the use of RSA key exchange and Diffie
   Hellman over a finite field in TLS 1.2, and discourages the use of
   static elliptic curve Diffie Hellman cipher suites.

   Note that these prescriptions apply only to TLS 1.2 since TLS 1.0 and
   1.1 are deprecated by RFC 8996 and TLS 1.3 either does not use the
   affected algorithm or does not share the relevant configuration
   options.

   This document updates RFCs 9325, 4346, 5246, 4162, 6347, 5932, 5288,
   6209, 6367, 8422, 5289, 5469, 4785, 4279, 5487, 6655, and 7905.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-deprecate-obsolete-kex-05"/>
          <refcontent>Work in Progress</refcontent>
        </reference>
        <reference anchor="I-D.ietf-tls-rfc8446bis" target="https://datatracker.ietf.org/doc/html/draft-ietf-tls-rfc8446bis-11" quoteTitle="true" derivedAnchor="RFC8446bis">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author initials="E." surname="Rescorla" fullname="Eric Rescorla">
              <organization showOnFrontPage="true">Independent</organization>
            </author>
            <date month="September" day="14" year="2024"/>
            <abstract>
              <t indent="0">   This document specifies version 1.3 of the Transport Layer Security
   (TLS) protocol.  TLS allows client/server applications to communicate
   over the Internet in a way that is designed to prevent eavesdropping,
   tampering, and message forgery.

   This document updates RFCs 5705, 6066, 7627, and 8422 and obsoletes
   RFCs 5077, 5246, 6961, 8422, and 8446.  This document also specifies
   new requirements for TLS 1.2 implementations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8446bis-11"/>
          <refcontent>Work in Progress</refcontent>
        </reference>
        <reference anchor="I-D.ietf-tls-rfc8447bis" target="https://datatracker.ietf.org/doc/html/draft-ietf-tls-rfc8447bis-09" quoteTitle="true" derivedAnchor="RFC8447bis">
          <front>
            <title>IANA Registry Updates for TLS and DTLS</title>
            <author initials="J. A." surname="Salowey" fullname="Joseph A. Salowey">
              <organization showOnFrontPage="true">Venafi</organization>
            </author>
            <author initials="S." surname="Turner" fullname="Sean Turner">
              <organization showOnFrontPage="true">sn3rd</organization>
            </author>
            <date month="April" day="30" year="2024"/>
            <abstract>
              <t indent="0">   This document updates the changes to TLS and DTLS IANA registries
   made in RFC 8447.  It adds a new value "D" for discouraged to the
   recommended column of the selected TLS registries.

   This document updates the following RFCs: 3749, 5077, 4680, 5246,
   5705, 5878, 6520, 7301, and 8447.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8447bis-09"/>
          <refcontent>Work in Progress</refcontent>
        </reference>
      </references>
    </references>
    <section anchor="Acks" numbered="false" toc="include" removeInRFC="false" pn="section-appendix.a">
      <name slugifiedName="name-acknowledgments">Acknowledgments</name>
      <t indent="0" pn="section-appendix.a-1">The authors would like to thank <contact fullname="Arijit Kumar Bose"/>, <contact fullname="Steffen Fries"/>, and the 
			members of IEC TC57 WG15 for their review, comments, and suggestions. The
			authors would also like to thank <contact fullname="Tom Petch"/>, <contact fullname="Juergen Schoenwaelder"/>,  
			<contact fullname="Hannes Tschofenig"/>, <contact fullname="Viktor Dukhovni"/>, and the IESG members for their comments 
			and constructive feedback.
      </t>
    </section>
    <section anchor="authors-addresses" numbered="false" removeInRFC="false" toc="include" pn="section-appendix.b">
      <name slugifiedName="name-authors-addresses">Authors' Addresses</name>
      <author fullname="Chris Lonvick" initials="C." surname="Lonvick">
        <address>
          <email>lonvick.ietf@gmail.com</email>
        </address>
      </author>
      <author fullname="Sean Turner" initials="S." surname="Turner">
        <organization showOnFrontPage="true">sn3rd</organization>
        <address>
          <email>sean@sn3rd.com</email>
        </address>
      </author>
      <author fullname="Joe Salowey" initials="J." surname="Salowey">
        <organization showOnFrontPage="true">Venafi</organization>
        <address>
          <email>joe@salowey.net</email>
        </address>
      </author>
    </section>
  </back>
</rfc>
