<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 3.0.2) -->
<?rfc strict="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<?rfc iprnotified="no"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-mattsson-tls-psk-ke-dont-dont-dont-02" category="info" submissionType="IETF" tocDepth="3" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.15.3 -->
  <front>
    <title abbrev="psk_ke don't don't don't">Key Exchange Without Forward Secrecy is NOT RECOMMENDED</title>
    <seriesInfo name="Internet-Draft" value="draft-mattsson-tls-psk-ke-dont-dont-dont-02"/>
    <author initials="J." surname="Preuß Mattsson" fullname="John Preuß Mattsson">
      <organization abbrev="Ericsson">Ericsson AB</organization>
      <address>
        <postal>
          <street>SE-164 80 Stockholm</street>
          <country>Sweden</country>
        </postal>
        <email>john.mattsson@ericsson.com</email>
      </address>
    </author>
    <date year="2022" month="December" day="30"/>
    <area/>
    <workgroup/>
    <keyword/>
    <abstract>
      <t>Massive pervasive monitoring attacks using key exfiltration and made possible by key exchange without forward secrecy has been reported. If key exchange without Diffie-Hellman is used, static exfiltration of the long-term authentication keys enables passive attackers to compromise all past and future connections. Malicious actors can get access to long-term keys in different ways: physical attacks, hacking, social engineering attacks, espionage, or by simply demanding access to keying material with or without a court order. Exfiltration attacks are a major cybersecurity threat. The use of psk_ke is not following zero trust principles and governments have already made deadlines for its deprecation. This document updates the IANA PskKeyExchangeMode registry by setting the "Recommended" value for psk_ke to "N".</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-mattsson-tls-psk-ke-dont-dont-dont/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Transport Layer Security (tls) Working Group mailing list (<eref target="mailto:tls@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tls/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tls/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/emanjon/draft-mattsson-tls-psk-ke-dont-dont-dont"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>Key exchange without forward secrecy enables passive monitoring <xref target="RFC7258"/>. Massive pervasive monitoring attacks using key exfiltration and made possible by key exchange without forward secrecy has been reported <xref target="Heist"/>, and many more have likely happened without ever being reported.  If key exchange without Diffie-Hellman is used, access to the long-term authentication keys enables passive attackers to compromise all past and future connections. Malicious actors can get access to long-term keys in different ways: physical attacks, hacking, social engineering attacks, espionage, or by simply demanding access to keying material with or without a court order. Exfiltration attacks are a major cybersecurity threat <xref target="Exfiltration"/>.</t>
      <t>All cipher suites without forward secrecy has been marked as NOT RECOMMENDED in TLS 1.2 <xref target="RFC8447"/>, and static RSA and DH are forbidden in TLS 1.3 <xref target="RFC8446"/>. A large number of TLS profiles forbid the use of key exchange without Diffie-Hellman <xref target="RFC9113"/> <xref target="ANSSI-TLS"/> <xref target="T3GPP.33.210"/>.</t>
      <ul spacing="normal">
        <li>ANSSI states that for all versions of TLS: "The perfect forward secrecy property must be ensured" <xref target="ANSSI-TLS"/>.</li>
        <li>The general 3GPP TLS profile follows <xref target="RFC9113"/> and states: "Only cipher suites with AEAD (e.g., GCM) and PFS (e.g.  ECDHE, DHE) shall be supported" <xref target="T3GPP.33.210"/>.</li>
      </ul>
      <t>Unfortunately TLS 1.3 allows key exchange without forward secrecy in both full handshakes and resumption handshakes with psk_ke. As stated in <xref target="RFC8446"/>, psk_ke does not fulfill one of the fundamental TLS 1.3 security properties, namely "Forward secret with respect to long-term keys".  When the PSK is a group key, which is now formally allowed in TLS 1.3 <xref target="RFC9257"/>, psk_ke fails yet another one of the fundamental TLS 1.3 security properties, namely "Secrecy of the session keys" <xref target="Akhmetzyanova"/> <xref target="RFC9257"/>. PSK authentication has yet another big inherent weakness as it often does not provide "Protection of endpoint identities".  It could be argued that PSK authentication should be not recommended solely based on this significant privacy weakness. The 3GPP radio access network that to a large degree relies on PSK are fixing the vulnerabilities by augmenting PSK with ECIES and ECDHE, see Annex C of <xref target="T3GPP.33.501"/> and <xref target="I-D.ietf-emu-aka-pfs"/>.</t>
      <t>Together with rsa_pkcs1, psk_ke is one of the bad apples in the TLS 1.3 fruit basket.  Organizations like BSI <xref target="BSI"/> has already produced recommendations regarding its deprecation.</t>
      <ul spacing="normal">
        <li>BSI states regarding psk_ke that "This mode should only be used in special applications after consultation of an expert." and has set a deadline that use is only allowed until 2026.</li>
      </ul>
      <t>Two essential zero trust principles are to assume that breach is inevitable or has likely already occurred <xref target="NSA-ZT"/>, and to minimize impact when breach occur <xref target="NIST-ZT"/>. One type of breach is key compromise or key exfiltration. Different types of exfiltration is defined and discussed in <xref target="RFC7624"/>. Static exfiltration where the keys are transferred once has a lower risk profile than dynamic exfiltration where keying material or content is transferred to the attacker frequently. Forcing an attacker to do dynamic exfiltration should be considered best practice. This significantly increases the risk of discovery for the attacker.</t>
      <t>One way to force an attacker to do dynamic exfiltration is to frequently rerun ephemeral Diffie-Hellman. For IPsec, ANSSI <xref target="ANSSI-PFS"/> recommends enforcing periodic rekeying with ephemeral Diffie-Hellman, e.g., every hour and every 100 GB of data, in order to limit the impact of a key compromise. This should be considered best practice for all protocols and systems. The Double Ratchet Algorithm in the Signal protocol <xref target="Signal"/> enables very frequent use of ephemeral Diffie-Hellman. The practice of frequently rerunning ephemeral Diffie-Hellman follows directly from zero trust principles.</t>
      <t>In TLS 1.3, the application_traffic_secret can be rekeyed using key_update, a resumption handshake, or a full handshake. The term forward secrecy is not very specific, and it is often better to talk about the property that compromise of key A does not lead to compromise of key B. <xref target="fig-impact"/> illustrates the impact of some examples of static key exfiltration when psk_ke, key_update, and (ec)dhe are used for rekeying.  Each time period T<contact fullname="ᵢ"/> uses a single application_traffic_secret. <contact fullname="✘"/> means that the attacker has access to the application_traffic_secret in that time period and can passively eavesdrop on the communication. <contact fullname="✔"/> means that the attacker does not have access to the application_traffic_secret. Exfiltration and frequently rerunning EC(DHE) is discussed in Appendix F of <xref target="I-D.ietf-tls-rfc8446bis"/>.</t>
      <figure anchor="fig-impact">
        <name>Impact of static key exfiltration in time period T3 when psk_ke, key_update, and (ec)dhe are used.</name>
        <artset>
          <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="400" width="544" viewBox="0 0 544 400" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px">
              <path d="M 8,64 L 8,96" fill="none" stroke="black"/>
              <path d="M 8,192 L 8,224" fill="none" stroke="black"/>
              <path d="M 8,320 L 8,352" fill="none" stroke="black"/>
              <path d="M 56,64 L 56,96" fill="none" stroke="black"/>
              <path d="M 56,192 L 56,224" fill="none" stroke="black"/>
              <path d="M 56,320 L 56,352" fill="none" stroke="black"/>
              <path d="M 104,64 L 104,96" fill="none" stroke="black"/>
              <path d="M 104,192 L 104,224" fill="none" stroke="black"/>
              <path d="M 104,320 L 104,352" fill="none" stroke="black"/>
              <path d="M 152,64 L 152,96" fill="none" stroke="black"/>
              <path d="M 152,192 L 152,224" fill="none" stroke="black"/>
              <path d="M 152,320 L 152,352" fill="none" stroke="black"/>
              <path d="M 200,64 L 200,96" fill="none" stroke="black"/>
              <path d="M 200,192 L 200,224" fill="none" stroke="black"/>
              <path d="M 200,320 L 200,352" fill="none" stroke="black"/>
              <path d="M 248,64 L 248,96" fill="none" stroke="black"/>
              <path d="M 248,192 L 248,224" fill="none" stroke="black"/>
              <path d="M 248,320 L 248,352" fill="none" stroke="black"/>
              <path d="M 296,64 L 296,96" fill="none" stroke="black"/>
              <path d="M 296,192 L 296,224" fill="none" stroke="black"/>
              <path d="M 296,320 L 296,352" fill="none" stroke="black"/>
              <path d="M 344,64 L 344,96" fill="none" stroke="black"/>
              <path d="M 344,192 L 344,224" fill="none" stroke="black"/>
              <path d="M 344,320 L 344,352" fill="none" stroke="black"/>
              <path d="M 392,64 L 392,96" fill="none" stroke="black"/>
              <path d="M 392,192 L 392,224" fill="none" stroke="black"/>
              <path d="M 392,320 L 392,352" fill="none" stroke="black"/>
              <path d="M 440,64 L 440,96" fill="none" stroke="black"/>
              <path d="M 440,192 L 440,224" fill="none" stroke="black"/>
              <path d="M 440,320 L 440,352" fill="none" stroke="black"/>
              <path d="M 488,64 L 488,96" fill="none" stroke="black"/>
              <path d="M 488,192 L 488,224" fill="none" stroke="black"/>
              <path d="M 488,320 L 488,352" fill="none" stroke="black"/>
              <path d="M 536,64 L 536,96" fill="none" stroke="black"/>
              <path d="M 536,192 L 536,224" fill="none" stroke="black"/>
              <path d="M 536,320 L 536,352" fill="none" stroke="black"/>
              <path d="M 8,64 L 392,64" fill="none" stroke="black"/>
              <path d="M 440,64 L 536,64" fill="none" stroke="black"/>
              <path d="M 8,96 L 392,96" fill="none" stroke="black"/>
              <path d="M 440,96 L 536,96" fill="none" stroke="black"/>
              <path d="M 16,128 L 528,128" fill="none" stroke="black"/>
              <path d="M 8,192 L 392,192" fill="none" stroke="black"/>
              <path d="M 440,192 L 536,192" fill="none" stroke="black"/>
              <path d="M 8,224 L 392,224" fill="none" stroke="black"/>
              <path d="M 440,224 L 536,224" fill="none" stroke="black"/>
              <path d="M 160,256 L 528,256" fill="none" stroke="black"/>
              <path d="M 8,320 L 392,320" fill="none" stroke="black"/>
              <path d="M 440,320 L 536,320" fill="none" stroke="black"/>
              <path d="M 8,352 L 392,352" fill="none" stroke="black"/>
              <path d="M 440,352 L 536,352" fill="none" stroke="black"/>
              <path d="M 160,384 L 192,384" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="536,256 524,250.4 524,261.6" fill="black" transform="rotate(0,528,256)"/>
              <polygon class="arrowhead" points="536,128 524,122.4 524,133.6" fill="black" transform="rotate(0,528,128)"/>
              <polygon class="arrowhead" points="200,384 188,378.4 188,389.6" fill="black" transform="rotate(0,192,384)"/>
              <polygon class="arrowhead" points="168,384 156,378.4 156,389.6" fill="black" transform="rotate(180,160,384)"/>
              <polygon class="arrowhead" points="168,256 156,250.4 156,261.6" fill="black" transform="rotate(180,160,256)"/>
              <polygon class="arrowhead" points="24,128 12,122.4 12,133.6" fill="black" transform="rotate(180,16,128)"/>
              <g class="text">
                <text x="44" y="36">rekeying</text>
                <text x="100" y="36">with</text>
                <text x="148" y="36">psk_ke</text>
                <text x="36" y="52">static</text>
                <text x="116" y="52">exfiltration</text>
                <text x="180" y="52">of</text>
                <text x="208" y="52">psk</text>
                <text x="236" y="52">in</text>
                <text x="264" y="52">T₃:</text>
                <text x="32" y="84">✘</text>
                <text x="80" y="84">✘</text>
                <text x="128" y="84">✘</text>
                <text x="176" y="84">✘</text>
                <text x="224" y="84">✘</text>
                <text x="272" y="84">✘</text>
                <text x="320" y="84">✘</text>
                <text x="368" y="84">✘</text>
                <text x="416" y="84">...</text>
                <text x="464" y="84">✘</text>
                <text x="512" y="84">✘</text>
                <text x="36" y="116">T₀</text>
                <text x="84" y="116">T₁</text>
                <text x="132" y="116">T₂</text>
                <text x="180" y="116">T₃</text>
                <text x="228" y="116">T₄</text>
                <text x="276" y="116">T₅</text>
                <text x="324" y="116">T₆</text>
                <text x="372" y="116">T₇</text>
                <text x="416" y="116">...</text>
                <text x="468" y="116">Tₙ₋₁</text>
                <text x="516" y="116">Tₙ</text>
                <text x="44" y="164">rekeying</text>
                <text x="100" y="164">with</text>
                <text x="164" y="164">key_update</text>
                <text x="36" y="180">static</text>
                <text x="116" y="180">exfiltration</text>
                <text x="180" y="180">of</text>
                <text x="300" y="180">application_traffic_secret</text>
                <text x="420" y="180">in</text>
                <text x="448" y="180">T₃:</text>
                <text x="32" y="212">✔</text>
                <text x="80" y="212">✔</text>
                <text x="128" y="212">✔</text>
                <text x="176" y="212">✘</text>
                <text x="224" y="212">✘</text>
                <text x="272" y="212">✘</text>
                <text x="320" y="212">✘</text>
                <text x="368" y="212">✘</text>
                <text x="416" y="212">...</text>
                <text x="464" y="212">✘</text>
                <text x="512" y="212">✘</text>
                <text x="36" y="244">T₀</text>
                <text x="84" y="244">T₁</text>
                <text x="132" y="244">T₂</text>
                <text x="180" y="244">T₃</text>
                <text x="228" y="244">T₄</text>
                <text x="276" y="244">T₅</text>
                <text x="324" y="244">T₆</text>
                <text x="372" y="244">T₇</text>
                <text x="416" y="244">...</text>
                <text x="468" y="244">Tₙ₋₁</text>
                <text x="516" y="244">Tₙ</text>
                <text x="44" y="292">rekeying</text>
                <text x="100" y="292">with</text>
                <text x="152" y="292">(ec)dhe</text>
                <text x="36" y="308">static</text>
                <text x="116" y="308">exfiltration</text>
                <text x="180" y="308">of</text>
                <text x="208" y="308">all</text>
                <text x="244" y="308">keys</text>
                <text x="276" y="308">in</text>
                <text x="304" y="308">T₃:</text>
                <text x="32" y="340">✔</text>
                <text x="80" y="340">✔</text>
                <text x="128" y="340">✔</text>
                <text x="176" y="340">✘</text>
                <text x="224" y="340">✔</text>
                <text x="272" y="340">✔</text>
                <text x="320" y="340">✔</text>
                <text x="368" y="340">✔</text>
                <text x="416" y="340">...</text>
                <text x="464" y="340">✔</text>
                <text x="512" y="340">✔</text>
                <text x="36" y="372">T₀</text>
                <text x="84" y="372">T₁</text>
                <text x="132" y="372">T₂</text>
                <text x="180" y="372">T₃</text>
                <text x="228" y="372">T₄</text>
                <text x="276" y="372">T₅</text>
                <text x="324" y="372">T₆</text>
                <text x="372" y="372">T₇</text>
                <text x="416" y="372">...</text>
                <text x="468" y="372">Tₙ₋₁</text>
                <text x="516" y="372">Tₙ</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art" align="center"><![CDATA[
 rekeying with psk_ke
 static exfiltration of psk in T₃:
+-----+-----+-----+-----+-----+-----+-----+-----+     +-----+-----+
|  ✘  |  ✘  |  ✘  |  ✘  |  ✘  |  ✘  |  ✘  |  ✘  | ... |  ✘  |  ✘  |
+-----+-----+-----+-----+-----+-----+-----+-----+     +-----+-----+
   T₀    T₁    T₂    T₃    T₄    T₅    T₆    T₇   ...   Tₙ₋₁   Tₙ
 <--------------------------------------------------------------->

 rekeying with key_update
 static exfiltration of application_traffic_secret in T₃:
+-----+-----+-----+-----+-----+-----+-----+-----+     +-----+-----+
|  ✔  |  ✔  |  ✔  |  ✘  |  ✘  |  ✘  |  ✘  |  ✘  | ... |  ✘  |  ✘  |
+-----+-----+-----+-----+-----+-----+-----+-----+     +-----+-----+
   T₀    T₁    T₂    T₃    T₄    T₅    T₆    T₇   ...   Tₙ₋₁   Tₙ
                   <--------------------------------------------->

 rekeying with (ec)dhe
 static exfiltration of all keys in T₃:
+-----+-----+-----+-----+-----+-----+-----+-----+     +-----+-----+
|  ✔  |  ✔  |  ✔  |  ✘  |  ✔  |  ✔  |  ✔  |  ✔  | ... |  ✔  |  ✔  |
+-----+-----+-----+-----+-----+-----+-----+-----+     +-----+-----+
   T₀    T₁    T₂    T₃    T₄    T₅    T₆    T₇   ...   Tₙ₋₁   Tₙ
                   <--->
]]></artwork>
        </artset>
      </figure>
      <t>With modern algorithms like x25519 <xref target="RFC7748"/>, ephemeral Diffie-Hellman introduces negligible overhead. The public keys are 32 bytes long and the operations takes 63 microseconds per endpoint on a single core AMD Ryzen 9 5950X <xref target="eBACS-DH"/>. Ephemeral key exchange with the quantum-restistant algorithm Kyber that NIST will standardize is even faster, especially for the TLS server <xref target="eBACS-KEM"/>.</t>
      <t>Unfortunately, psk_ke is marked as "Recommended" in the IANA PskKeyExchangeMode registry. This may severely weaken security in deployments following the "Recommended" column.  Introducing TLS 1.3 in 3GPP had the unfortunate and surprising effect of drastically lowering the minimum security when TLS is used with PSK authentication.  Some companies in 3GPP have been unwilling to mark psk_ke as not recommended as it is so clearly marked as "Recommended" by the IETF. By labeling psk_ke as "Recommended", IETF is legitimizing and implicitly promoting bad security practice.</t>
      <t>This document updates the PskKeyExchangeMode registry under the Transport Layer Security (TLS) Parameters heading.  For psk_ke the "Recommended" value has been set to "N".</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to update the PskKeyExchangeMode registry under the Transport Layer Security (TLS) Parameters heading.  For psk_ke the "Recommended" value has been set to "N".</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8446" target="https://www.rfc-editor.org/info/rfc8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8447" target="https://www.rfc-editor.org/info/rfc8447">
          <front>
            <title>IANA Registry Updates for TLS and DTLS</title>
            <author fullname="J. Salowey" initials="J." surname="Salowey">
              <organization/>
            </author>
            <author fullname="S. Turner" initials="S." surname="Turner">
              <organization/>
            </author>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document describes a number of changes to TLS and DTLS IANA registries that range from adding notes to the registry all the way to changing the registration policy.  These changes were mostly motivated by WG review of the TLS- and DTLS-related registries undertaken as part of the TLS 1.3 development process.</t>
              <t>This document updates the following RFCs: 3749, 5077, 4680, 5246, 5705, 5878, 6520, and 7301.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8447"/>
          <seriesInfo name="DOI" value="10.17487/RFC8447"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC7258" target="https://www.rfc-editor.org/info/rfc7258">
          <front>
            <title>Pervasive Monitoring Is an Attack</title>
            <author fullname="S. Farrell" initials="S." surname="Farrell">
              <organization/>
            </author>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig">
              <organization/>
            </author>
            <date month="May" year="2014"/>
            <abstract>
              <t>Pervasive monitoring is a technical attack that should be mitigated in the design of IETF protocols, where possible.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="188"/>
          <seriesInfo name="RFC" value="7258"/>
          <seriesInfo name="DOI" value="10.17487/RFC7258"/>
        </reference>
        <reference anchor="RFC7624" target="https://www.rfc-editor.org/info/rfc7624">
          <front>
            <title>Confidentiality in the Face of Pervasive Surveillance: A Threat Model and Problem Statement</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes">
              <organization/>
            </author>
            <author fullname="B. Schneier" initials="B." surname="Schneier">
              <organization/>
            </author>
            <author fullname="C. Jennings" initials="C." surname="Jennings">
              <organization/>
            </author>
            <author fullname="T. Hardie" initials="T." surname="Hardie">
              <organization/>
            </author>
            <author fullname="B. Trammell" initials="B." surname="Trammell">
              <organization/>
            </author>
            <author fullname="C. Huitema" initials="C." surname="Huitema">
              <organization/>
            </author>
            <author fullname="D. Borkmann" initials="D." surname="Borkmann">
              <organization/>
            </author>
            <date month="August" year="2015"/>
            <abstract>
              <t>Since the initial revelations of pervasive surveillance in 2013, several classes of attacks on Internet communications have been discovered.  In this document, we develop a threat model that describes these attacks on Internet confidentiality.  We assume an attacker that is interested in undetected, indiscriminate eavesdropping.  The threat model is based on published, verified attacks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7624"/>
          <seriesInfo name="DOI" value="10.17487/RFC7624"/>
        </reference>
        <reference anchor="RFC7748" target="https://www.rfc-editor.org/info/rfc7748">
          <front>
            <title>Elliptic Curves for Security</title>
            <author fullname="A. Langley" initials="A." surname="Langley">
              <organization/>
            </author>
            <author fullname="M. Hamburg" initials="M." surname="Hamburg">
              <organization/>
            </author>
            <author fullname="S. Turner" initials="S." surname="Turner">
              <organization/>
            </author>
            <date month="January" year="2016"/>
            <abstract>
              <t>This memo specifies two elliptic curves over prime fields that offer a high level of practical security in cryptographic applications, including Transport Layer Security (TLS).  These curves are intended to operate at the ~128-bit and ~224-bit security level, respectively, and are generated deterministically based on a list of required properties.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7748"/>
          <seriesInfo name="DOI" value="10.17487/RFC7748"/>
        </reference>
        <reference anchor="RFC9113" target="https://www.rfc-editor.org/info/rfc9113">
          <front>
            <title>HTTP/2</title>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson">
              <organization/>
            </author>
            <author fullname="C. Benfield" initials="C." role="editor" surname="Benfield">
              <organization/>
            </author>
            <date month="June" year="2022"/>
            <abstract>
              <t>This specification describes an optimized expression of the semantics of the Hypertext Transfer Protocol (HTTP), referred to as HTTP version 2 (HTTP/2). HTTP/2 enables a more efficient use of network resources and a reduced latency by introducing field compression and allowing multiple concurrent exchanges on the same connection.</t>
              <t>This document obsoletes RFCs 7540 and 8740.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9113"/>
          <seriesInfo name="DOI" value="10.17487/RFC9113"/>
        </reference>
        <reference anchor="RFC9257" target="https://www.rfc-editor.org/info/rfc9257">
          <front>
            <title>Guidance for External Pre-Shared Key (PSK) Usage in TLS</title>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <author fullname="J. Hoyland" initials="J." surname="Hoyland">
              <organization/>
            </author>
            <author fullname="M. Sethi" initials="M." surname="Sethi">
              <organization/>
            </author>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood">
              <organization/>
            </author>
            <date month="July" year="2022"/>
            <abstract>
              <t>This document provides usage guidance for external Pre-Shared Keys (PSKs) in Transport Layer Security (TLS) 1.3 as defined in RFC 8446. It lists TLS security properties provided by PSKs under certain assumptions, then it demonstrates how violations of these assumptions lead to attacks. Advice for applications to help meet these assumptions is provided. This document also discusses PSK use cases and provisioning processes. Finally, it lists the privacy and security properties that are not provided by TLS 1.3 when external PSKs are used.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9257"/>
          <seriesInfo name="DOI" value="10.17487/RFC9257"/>
        </reference>
        <reference anchor="I-D.ietf-emu-aka-pfs" target="https://www.ietf.org/archive/id/draft-ietf-emu-aka-pfs-08.txt">
          <front>
            <title>Forward Secrecy for the Extensible Authentication Protocol Method for Authentication and Key Agreement (EAP-AKA' FS)</title>
            <author fullname="Jari Arkko" initials="J." surname="Arkko">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Karl Norrman" initials="K." surname="Norrman">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Vesa Torvinen" initials="V." surname="Torvinen">
              <organization>Ericsson</organization>
            </author>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson</organization>
            </author>
            <date day="23" month="October" year="2022"/>
            <abstract>
              <t>   Many different attacks have been reported as part of revelations
   associated with pervasive surveillance.  Some of the reported attacks
   involved compromising the smart card supply chain, such as attacking
   SIM card manufacturers and operators in an effort to compromise
   shared secrets stored on these cards.  Since the publication of those
   reports, manufacturing and provisioning processes have gained much
   scrutiny and have improved.  However, the danger of resourceful
   attackers for these systems is still a concern.  Always assuming
   breach such as key compromise and minimizing the impact of breach are
   essential zero-trust principles.

   This specification updates RFC 9048, the EAP-AKA' authentication
   method, with an optional extension.  Similarly, this specification
   also updates the earlier version of the EAP-AKA' specification in RFC
   5448.  The extension, when negotiated, provides Forward Secrecy for
   the session key generated as a part of the authentication run in EAP-
   AKA'.  This prevents an attacker who has gained access to the long-
   term pre-shared secret in a SIM card from being able to decrypt any
   past communications.  In addition, if the attacker stays merely a
   passive eavesdropper, the extension prevents attacks against future
   sessions.  This forces attackers to use active attacks instead.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-emu-aka-pfs-08"/>
        </reference>
        <reference anchor="I-D.ietf-tls-rfc8446bis" target="https://www.ietf.org/archive/id/draft-ietf-tls-rfc8446bis-05.txt">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Mozilla</organization>
            </author>
            <date day="24" month="October" year="2022"/>
            <abstract>
              <t>   This document specifies version 1.3 of the Transport Layer Security
   (TLS) protocol.  TLS allows client/server applications to communicate
   over the Internet in a way that is designed to prevent eavesdropping,
   tampering, and message forgery.

   This document updates RFCs 5705, 6066, 7627, and 8422 and obsoletes
   RFCs 5077, 5246, 6961, and 8446.  This document also specifies new
   requirements for TLS 1.2 implementations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8446bis-05"/>
        </reference>
        <reference anchor="ANSSI-TLS" target="https://www.ssi.gouv.fr/uploads/2017/02/security-recommendations-for-tls_v1.1.pdf">
          <front>
            <title>Security Recommendations for TLS</title>
            <author initials="" surname="Agence nationale de la sécurité des systèmes d'information">
              <organization/>
            </author>
            <date year="2017" month="January"/>
          </front>
        </reference>
        <reference anchor="ANSSI-PFS" target="https://www.ssi.gouv.fr/uploads/2015/09/NT_IPsec_EN.pdf">
          <front>
            <title>Recommendations for securing networks with IPsec</title>
            <author initials="" surname="Agence nationale de la sécurité des systèmes d'information">
              <organization/>
            </author>
            <date year="2015" month="August"/>
          </front>
        </reference>
        <reference anchor="BSI" target="https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/TechGuidelines/TG02102/BSI-TR-02102-2.pdf">
          <front>
            <title>Technical Guideline TR-02102-2 Cryptographic Mechanisms: Recommendations and Key Lengths Part 2 – Use of Transport Layer Security (TLS)</title>
            <author initials="" surname="Bundesamt für Sicherheit in der Informationstechnik">
              <organization/>
            </author>
            <date year="2022" month="February"/>
          </front>
        </reference>
        <reference anchor="NSA-ZT" target="https://media.defense.gov/2021/Feb/25/2002588479/-1/-1/0/CSI_EMBRACING_ZT_SECURITY_MODEL_UOO115131-21.PDF">
          <front>
            <title>Embracing a Zero Trust Security Model</title>
            <author initials="" surname="National Security Agency">
              <organization/>
            </author>
            <date year="2021" month="February"/>
          </front>
        </reference>
        <reference anchor="NIST-ZT" target="https://www.nccoe.nist.gov/sites/default/files/2022-12/zta-nist-sp-1800-35b-preliminary-draft-2.pdf">
          <front>
            <title>Implementing a Zero Trust Architecture</title>
            <author initials="" surname="National Institute of Standards and Technology">
              <organization/>
            </author>
            <date year="2022" month="December"/>
          </front>
        </reference>
        <reference anchor="Heist" target="https://theintercept.com/2015/02/19/great-sim-heist/">
          <front>
            <title>How Spies Stole the Keys to the Encryption Castle</title>
            <author initials="" surname="The Intercept">
              <organization/>
            </author>
            <date year="2015" month="February"/>
          </front>
        </reference>
        <reference anchor="T3GPP.33.210" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=2279">
          <front>
            <title>TS 33.210 Network Domain Security (NDS); IP network layer security</title>
            <author initials="" surname="3GPP">
              <organization/>
            </author>
            <date year="2022" month="September"/>
          </front>
        </reference>
        <reference anchor="T3GPP.33.501" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3169">
          <front>
            <title>TS 33.501 Security architecture and procedures for 5G System</title>
            <author initials="" surname="3GPP">
              <organization/>
            </author>
            <date year="2022" month="September"/>
          </front>
        </reference>
        <reference anchor="Signal" target="https://signal.org/docs/specifications/doubleratchet/">
          <front>
            <title>The Double Ratchet Algorithm</title>
            <author initials="" surname="Signal">
              <organization/>
            </author>
            <date year="2016" month="November"/>
          </front>
        </reference>
        <reference anchor="eBACS-DH" target="https://bench.cr.yp.to/results-dh.html">
          <front>
            <title>Measurements of public-key Diffie–Hellman secret-sharing systems, indexed by machine</title>
            <author initials="" surname="eBACS: ECRYPT Benchmarking of Cryptographic Systems">
              <organization/>
            </author>
            <date year="2022" month="December"/>
          </front>
        </reference>
        <reference anchor="eBACS-KEM" target="https://bench.cr.yp.to/results-kem.html">
          <front>
            <title>Measurements of key-encapsulation mechanisms, indexed by machine</title>
            <author initials="" surname="eBACS: ECRYPT Benchmarking of Cryptographic Systems">
              <organization/>
            </author>
            <date year="2022" month="December"/>
          </front>
        </reference>
        <reference anchor="Akhmetzyanova" target="https://eprint.iacr.org/2019/421.pdf">
          <front>
            <title>Continuing to reflect on TLS 1.3 with external PSK</title>
            <author initials="L." surname="Akhmetzyanova">
              <organization/>
            </author>
            <author initials="E." surname="Alekseev">
              <organization/>
            </author>
            <author initials="E." surname="Smyshlyaeva">
              <organization/>
            </author>
            <author initials="A." surname="Sokolov">
              <organization/>
            </author>
            <date year="2019" month="April"/>
          </front>
        </reference>
        <reference anchor="Exfiltration" target="https://blog.apnic.net/2022/03/31/how-to-detect-and-prevent-common-data-exfiltration-attacks/">
          <front>
            <title>How to: Detect and prevent common data exfiltration attacks</title>
            <author initials="" surname="APNIC">
              <organization/>
            </author>
            <date year="2022" month="March"/>
          </front>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>The authors want to thank <contact fullname="Ari Keränen"/> for his valuable comments and feedback.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
