@@ -2165,13 +2165,13 @@
eliminate the security and availability threats related to CCM_8 while retaining
interoperability with the larger ecosystem.¶
In order to ameliorate the situation, this document RECOMMENDS that
-implementations support the following two ciphersuites:¶
+implementations support the following two ciphersuites for TLS 1.3:
¶
and offer them as their first choice. These ciphersuites provide
@@ -2184,16 +2184,16 @@
Section 7.2.1 of [RFC9325] related to deterministic nonce generation
apply. In addition, the integrity limits on key usage detailed in Section 4.4 of [RFC9325] also apply.¶
Table 1 summarizes the recommendations regarding ciphersuites:¶
-
+
Table 1:
-Ciphersuite requirements
+TLS 1.3 Ciphersuite Requirements
Ciphersuite |
- Requirement |
+ MTI Requirement |
@@ -2205,13 +2205,13 @@
- TLS_ECDHE_ECDSA_WITH_AES_128_CCM
+ TLS_AES_128_CCM
|
SHOULD+ |
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
+ TLS_AES_128_GCM_SHA256
|
SHOULD+ |
diff --git a/draft-ietf-uta-tls13-iot-profile.txt b/draft-ietf-uta-tls13-iot-profile.txt
index b4f1bc9..6f9b981 100644
--- a/draft-ietf-uta-tls13-iot-profile.txt
+++ b/draft-ietf-uta-tls13-iot-profile.txt
@@ -6,9 +6,9 @@ UTA H. Tschofenig
Internet-Draft H-BRS
Updates: 7925 (if approved) T. Fossati
Intended status: Standards Track Linaro
-Expires: 19 June 2025 M. Richardson
+Expires: 20 June 2025 M. Richardson
Sandelman Software Works
- 16 December 2024
+ 17 December 2024
TLS/DTLS 1.3 Profiles for the Internet of Things
@@ -43,7 +43,7 @@ Status of This Memo
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
- This Internet-Draft will expire on 19 June 2025.
+ This Internet-Draft will expire on 20 June 2025.
Copyright Notice
@@ -893,10 +893,10 @@ Table of Contents
to CCM_8 while retaining interoperability with the larger ecosystem.
In order to ameliorate the situation, this document RECOMMENDS that
- implementations support the following two ciphersuites:
+ implementations support the following two ciphersuites for TLS 1.3:
- * TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
- * TLS_ECDHE_ECDSA_WITH_AES_128_CCM
+ * TLS_AES_128_GCM_SHA256
+ * TLS_AES_128_CCM
and offer them as their first choice. These ciphersuites provide
confidentiality and integrity limits that are considered acceptable
@@ -913,17 +913,17 @@ Table of Contents
Table 1 summarizes the recommendations regarding ciphersuites:
- +=========================================+=============+
- | Ciphersuite | Requirement |
- +=========================================+=============+
- | TLS_AES_128_CCM_8_SHA256 | MUST- |
- +-----------------------------------------+-------------+
- | TLS_ECDHE_ECDSA_WITH_AES_128_CCM | SHOULD+ |
- +-----------------------------------------+-------------+
- | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 | SHOULD+ |
- +-----------------------------------------+-------------+
-
- Table 1: Ciphersuite requirements
+ +==========================+=================+
+ | Ciphersuite | MTI Requirement |
+ +==========================+=================+
+ | TLS_AES_128_CCM_8_SHA256 | MUST- |
+ +--------------------------+-----------------+
+ | TLS_AES_128_CCM | SHOULD+ |
+ +--------------------------+-----------------+
+ | TLS_AES_128_GCM_SHA256 | SHOULD+ |
+ +--------------------------+-----------------+
+
+ Table 1: TLS 1.3 Ciphersuite Requirements
19. Fault Attacks on Deterministic Signature Schemes
diff --git a/index.html b/index.html
index 8d9d975..3e72f56 100644
--- a/index.html
+++ b/index.html
@@ -37,7 +37,7 @@
TLS/DTLS 1.3 IoT Profiles |
plain text |
- same as master |
+ diff with master |