<?xml version="1.0" encoding="UTF-8"?><?rfc linefile="1:draft-elie-nntp-tls-recommendations.xml"?>
<!-- automatically generated by xml2rfc v1.36 on 2016-08-05T13:27:45Z -->
<?xml-stylesheet type='text/xsl' href='rfc2629.xslt' ?>
<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
<!--
--><!-- xml2rfc-processed-entity rfc2119 -->
<!--
--><!-- xml2rfc-processed-entity rfc3749 -->
<!--
--><!-- xml2rfc-processed-entity rfc3977 -->
<!--
--><!-- xml2rfc-processed-entity rfc4422 -->
<!--
--><!-- xml2rfc-processed-entity rfc4642 -->
<!--
--><!-- xml2rfc-processed-entity rfc4643 -->
<!--
--><!-- xml2rfc-processed-entity rfc5246 -->
<!--
--><!-- xml2rfc-processed-entity rfc5386 -->
<!--
--><!-- xml2rfc-processed-entity rfc5536 -->
<!--
--><!-- xml2rfc-processed-entity rfc5537 -->
<!--
--><!-- xml2rfc-processed-entity rfc7258 -->
<!--
--><!-- xml2rfc-processed-entity rfc7465 -->
<!--
--><!-- xml2rfc-processed-entity rfc7525 -->
<!--
--><!-- xml2rfc-processed-entity rfc7590 -->
]>
<?rfc toc="yes" ?>
<?rfc symrefs="yes" ?>
<?rfc sortrefs="yes"?>
<?rfc strict="yes" ?>
<?rfc rfcedstyle="yes" ?>
<rfc category="std" ipr="trust200902" updates="4642"
     docName="draft-elie-nntp-tls-recommendations-01">
<!--
ipr="full3978"
-->

<front>
<title abbrev="Use of TLS in NNTP">
   Use of Transport Layer Security (TLS)
   in&nbsp;the&nbsp;Network&nbsp;News&nbsp;Transfer&nbsp;Protocol (NNTP)
</title>

<author initials="J." surname="&#201;lie" fullname="Julien &#201;lie">
<organization/>
<address>
<postal>
<street>10 all&#233;e Clovis</street>
<code>93160</code>
<city>Noisy-le-Grand</city>
<country>France</country>
</postal>
<email>julien@trigofacile.com</email>
<uri>http://www.trigofacile.com/</uri>
</address>
</author>

<date month="August" year="2016"/>

<area>Applications</area>
<workgroup>Independent Submission</workgroup>

<keyword>NNTP</keyword>
<keyword>Usenet</keyword>
<keyword>NetNews</keyword>
<keyword>TLS</keyword>
<keyword>STARTTLS</keyword>

<abstract>

<t>This document provides recommendations for improving the security of
   the Network News Transfer Protocol (NNTP) when using Transport Layer
   Security (TLS).  It modernizes the NNTP usage of TLS to be consistent
   with TLS best current practices.  If approved, this document updates
   RFC 4642.</t>

</abstract>
</front>

<middle>
<section title="Introduction" anchor="intro">

<t>The Network News Transfer Protocol (NNTP) <xref target="RFC3977"/>
   has been using Transport Layer Security (TLS) <xref target="RFC5246"/>
   (along with its precursor, Secure Sockets Layer or SSL) since at
   least year 2000.  The use of TLS in NNTP was formalized in <xref
   target="RFC4642"/>, providing at the same time implementation
   recommendations.  In order to address the evolving threat model on
   the Internet today, this document provides stronger recommendations
   regarding that use.</t>

<t>In particular, this document updates <xref target="RFC4642"/> by
   specifying that NNTP implementations and deployments MUST follow
   the best current practices documented in the "Recommendations for
   Secure Use of TLS and DTLS" <xref target="RFC7525"/>.  This includes
   stronger recommendations regarding SSL/TLS protocol versions,
   fallback to lower versions, strict TLS, TLS-level compression,
   TLS session resumption, cipher suites, public key lengths, forward
   secrecy, and other aspects of using TLS with NNTP.</t>

<t>Notably, this document updates <xref target="RFC4642"/> in the
   following aspects:

<list style="symbols">

<t>NNTP implementations and deployments SHOULD disable TLS-level
   compression (Section 3.3 of <xref target="RFC7525"/>), thus no
   longer using TLS as a means to provide data compression (contrary
   to Abstract and Section 2.2.2 of <xref target="RFC4642"/>).</t>

<t>NNTP implementations and deployments SHOULD prefer strict TLS
   configuration (Section 3.2 of <xref target="RFC7525"/>), that is
   to say they SHOULD use TCP port 563 dedicated to NNTP over TLS, and
   begin the TLS negotiation immediately upon connection (contrary to
   a dynamic upgrade from unencrypted to TLS-protected traffic via the
   use of the STARTTLS command, as Section 1 of <xref target="RFC4642"/>
   was encouraging).  For the same reasons as those given in Appendix
   A of <xref target="MUA-STS"/> transposed to NNTP, strict TLS is the
   preferred way of using TLS with NNTP.</t>

<t>NNTP implementations and deployments MUST NOT negotiate RC4
   cipher suites (<xref target="RFC7465"/>) contrary to Section 5
   of <xref target="RFC4642"/> that REQUIRED them to implement the
   TLS_RSA_WITH_RC4_128_MD5 cipher suite so as to ensure that any two
   NNTP compliant implementations can be configured to interoperate.
   This document removes that requirement, so that NNTP client and
   server implementations follow the recommendations of Section 4.2.1
   of <xref target="RFC7525"/> instead.</t>

</list></t>

<section title="Conventions Used in This Document" anchor="conventions">

<t>Any term not defined in this document has the same meaning as it
   does in <xref target="RFC4642"/> or the NNTP core specification
   <xref target="RFC3977"/>.</t>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY",
   and "OPTIONAL" in this document are to be interpreted as described
   in <xref target="RFC2119"/>.</t>

</section> <!-- conventions -->
<section title="Author's Note" anchor="authorsnote">

<t>Please write the first letter of "Elie" and the penultimate letter
   of "allee" with an acute accent wherever possible -- they are
   respectively U+00C9 ("&amp;#201;" in XML) and U+00E9 ("&amp;#233;"
   in XML).  Also, the letters "ae" in "Baeuerle" should be written as
   an a-umlaut (U+00E4, "&amp;#228;" in XML).</t>

</section> <!-- authorsnote -->
</section> <!-- intro -->

<section title="Recommendations" anchor="recommendations">

<t>The best current practices documented in the "Recommendations for
   Secure Use of TLS and DTLS" <xref target="RFC7525"/> are included
   here by reference.  Therefore, NNTP implementations and deployments
   compliant with this document is REQUIRED to also comply with <xref
   target="RFC7525"/>.</t>

<t>Instead of repeating those recommendations here, this document mostly
   provides supplementary information regarding secure implementation
   and deployment of NNTP technologies.</t>

<section title="Compression" anchor="compression">

<t>NNTP supports the use of the COMPRESS command, defined in Section
   2.2 of <xref target="NNTP-COMPRESS"/>, to compress data between an
   NNTP client and server.  Although this NNTP extension might have
   slightly stronger security properties than TLS-level compression
   <xref target="RFC3749"/> (since NNTP compression can be activated
   after authentication has completed, thus reducing the chances that
   authentication credentials can be leaked via for instance a CRIME
   attack, as described in Section 2.6 of <xref target="CRIME"/>), this
   document neither encourages nor discourages use of NNTP COMPRESS
   extension.</t>

</section> <!-- compression -->

<section title="Protocol Versions and Cipher Suites" anchor="tlsversions">

<t>NNTP implementations of news servers are encouraged to support options
   to configure the minimal TLS protocol version to accept, and which
   cipher suites, signature algorithms or named groups (like elliptic
   curves) to use for incoming connections.  Additional options can
   naturally also be supported.  The goal is to enable administrators
   of news servers to easily and quickly strengthen security, if need
   be (for instance by rejecting cipher suites considered unsafe with
   regards to local policy).  News clients may also support similar
   options, either configurable by the user or enforced by the news
   reader.</t>

</section> <!-- tlsversions -->

<section title="Authenticated Connections" anchor="authconnections">

<t><xref target="RFC4642"/> already provides recommendations and
   requirements for certificate validation in the context of checking
   the client or the server's identity.</t>

<t>Wherever possible, it is best to prefer certificate-based authentication
   (along with SASL <xref target="RFC4422"/>), and ensure that:

<list style="symbols">
<t>Clients authenticate servers.</t>
<t>Servers authenticate clients.</t>
<t>Servers authenticate other peer servers.</t>
</list></t>
 
<t>This document does not mandate certificate-based authentication,
   although such authentication is strongly preferred.  As mentioned in
   Section 2.2.2 of <xref target="RFC4642"/>, the AUTHINFO SASL command
   (Section 2.4 of <xref target="RFC4643"/>) with the EXTERNAL mechanism
   (Appendix A of <xref target="RFC4422"/>) MAY be used to authenticate a
   client once its TLS credentials have been successfully exchanged.</t>

<t>Given the pervasiveness of eavesdropping <xref target="RFC7258"/>,
   even an encrypted but unauthenticated connection might be better
   than an unencrypted connection (this is similar to the
   "better-than-nothing security" approach for IPsec <xref
   target="RFC5386"/>).  Encrypted but unauthenticated connections
   include connections negotiated using anonymous Diffie&#8209;Hellman
   mechanisms or using self-signed certificates, among others.</t>

<t>When an NNTP server receives a Netnews article, it MAY add a
   &lt;diag&#8209;match&gt; (Section 3.1.5 of <xref target="RFC5536"/>),
   which appears as "!!" in the Path header field of that article, to
   indicate that it verified the identity of the client or peer server.
   This document encourages the construction of such Path header fields,
   as described in Section 3.2.1 of <xref target="RFC5537"/>.</t>

</section> <!-- authconnections -->

<section title="Human Factors" anchor="humanfactors">

<t>It is strongly encouraged that NNTP clients provide ways for end users
   (and that NNTP servers provide ways for administrators) to complete
   the following tasks:

<list style="symbols">
<t>Determine if a given incoming or outgoing connection is encrypted
   using a security layer (either using TLS or an SASL mechanism that
   negotiates a security layer).</t>
<t>Determine the version of TLS used for encryption of a given stream.</t>
<t>If authenticated encryption is used, determine how the connection
   was authenticated or verified.</t>
<t>Inspect the certificate offered by an NNTP server.</t>
<t>Determine the cipher suite used to encrypt a connection.</t>
<t>Be warned if the certificate changes for a given server.</t>
<t>Be warned if a given server stops advertising the STARTTLS capability
   label in response to the CAPABILITIES command (of course when a
   security layer is not already in place) whereas it advertised the
   STARTTLS capability label during the previous connection.</t>
<t>Be warned if a failure response to the STARTTLS command is received
   from the server whereas the STARTTLS capability label was advertised.</t>
</list></t>

<t>Note that the last two tasks cannot occur when strict TLS is used.</t>

</section> <!-- humanfactors -->

</section> <!-- recommendations -->


<section title="Security Considerations" anchor="security">

<t>Beyond the security considerations already described in <xref
   target="RFC4642"/> and <xref target="RFC7525"/>, the author wishes
   to add the following caveat when not using strict TLS.</t>

<t>NNTP servers need ensure that they are not vulnerable to the STARTTLS
   command injection vulnerability (CERT vulnerability ID #555316).
   Though this command MUST NOT be pipelined, an attacker could pipeline
   it.  Therefore, NNTP servers MUST discard any NNTP command received
   between the use of STARTTLS and the end of TLS negotiation.</t>

</section> <!-- security -->

<section title="IANA Considerations" anchor="iana">

<t>This document has no actions for IANA.</t>

</section> <!-- iana -->

</middle>


<back>
<references title="Normative References">
<?rfc linefile="1:http://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml"?>

<reference  anchor='RFC2119' target='http://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author initials='S.' surname='Bradner' fullname='S. Bradner'><organization /></author>
<date year='1997' month='March' />
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>
<?rfc linefile="298:draft-elie-nntp-tls-recommendations.xml"?>
<?rfc linefile="1:http://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.3977.xml"?>

<reference  anchor='RFC3977' target='http://www.rfc-editor.org/info/rfc3977'>
<front>
<title>Network News Transfer Protocol (NNTP)</title>
<author initials='C.' surname='Feather' fullname='C. Feather'><organization /></author>
<date year='2006' month='October' />
<abstract><t>The Network News Transfer Protocol (NNTP) has been in use in the Internet for a decade, and remains one of the most popular protocols (by volume) in use today.  This document is a replacement for RFC 977, and officially updates the protocol specification.  It clarifies some vagueness in RFC 977, includes some new base functionality, and provides a specific mechanism to add standardized extensions to NNTP.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='3977'/>
<seriesInfo name='DOI' value='10.17487/RFC3977'/>
</reference>
<?rfc linefile="299:draft-elie-nntp-tls-recommendations.xml"?>
<?rfc linefile="1:http://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4642.xml"?>

<reference  anchor='RFC4642' target='http://www.rfc-editor.org/info/rfc4642'>
<front>
<title>Using Transport Layer Security (TLS) with Network News Transfer Protocol (NNTP)</title>
<author initials='K.' surname='Murchison' fullname='K. Murchison'><organization /></author>
<author initials='J.' surname='Vinocur' fullname='J. Vinocur'><organization /></author>
<author initials='C.' surname='Newman' fullname='C. Newman'><organization /></author>
<date year='2006' month='October' />
<abstract><t>This memo defines an extension to the Network News Transfer Protocol (NNTP) that allows an NNTP client and server to use Transport Layer Security (TLS).  The primary goal is to provide encryption for single-link confidentiality purposes, but data integrity, (optional) certificate-based peer entity authentication, and (optional) data compression are also possible.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4642'/>
<seriesInfo name='DOI' value='10.17487/RFC4642'/>
</reference>
<?rfc linefile="300:draft-elie-nntp-tls-recommendations.xml"?>
</references> <!-- normative -->

<references title="Informative References">
<?rfc linefile="1:http://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.3749.xml"?>

<reference  anchor='RFC3749' target='http://www.rfc-editor.org/info/rfc3749'>
<front>
<title>Transport Layer Security Protocol Compression Methods</title>
<author initials='S.' surname='Hollenbeck' fullname='S. Hollenbeck'><organization /></author>
<date year='2004' month='May' />
<abstract><t>The Transport Layer Security (TLS) protocol (RFC 2246) includes features to negotiate selection of a lossless data compression method as part of the TLS Handshake Protocol and to then apply the algorithm associated with the selected method as part of the TLS Record Protocol.  TLS defines one standard compression method which specifies that data exchanged via the record protocol will not be compressed.  This document describes an additional compression method associated with a lossless data compression algorithm for use with TLS, and it describes a method for the specification of additional TLS compression methods.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='3749'/>
<seriesInfo name='DOI' value='10.17487/RFC3749'/>
</reference>
<?rfc linefile="304:draft-elie-nntp-tls-recommendations.xml"?>
<?rfc linefile="1:http://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4422.xml"?>

<reference  anchor='RFC4422' target='http://www.rfc-editor.org/info/rfc4422'>
<front>
<title>Simple Authentication and Security Layer (SASL)</title>
<author initials='A.' surname='Melnikov' fullname='A. Melnikov' role='editor'><organization /></author>
<author initials='K.' surname='Zeilenga' fullname='K. Zeilenga' role='editor'><organization /></author>
<date year='2006' month='June' />
<abstract><t>The Simple Authentication and Security Layer (SASL) is a framework for providing authentication and data security services in connection-oriented protocols via replaceable mechanisms.  It provides a structured interface between protocols and mechanisms.  The resulting framework allows new protocols to reuse existing mechanisms and allows old protocols to make use of new mechanisms.  The framework also provides a protocol for securing subsequent protocol exchanges within a data security layer.</t><t>This document describes how a SASL mechanism is structured, describes how protocols include support for SASL, and defines the protocol for carrying a data security layer over a connection.  In addition, this document defines one SASL mechanism, the EXTERNAL mechanism.</t><t>This document obsoletes RFC 2222.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4422'/>
<seriesInfo name='DOI' value='10.17487/RFC4422'/>
</reference>
<?rfc linefile="305:draft-elie-nntp-tls-recommendations.xml"?>
<?rfc linefile="1:http://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4643.xml"?>

<reference  anchor='RFC4643' target='http://www.rfc-editor.org/info/rfc4643'>
<front>
<title>Network News Transfer Protocol (NNTP) Extension for Authentication</title>
<author initials='J.' surname='Vinocur' fullname='J. Vinocur'><organization /></author>
<author initials='K.' surname='Murchison' fullname='K. Murchison'><organization /></author>
<date year='2006' month='October' />
<abstract><t>This document defines an extension to the Network News Transfer Protocol (NNTP) that allows a client to indicate an authentication mechanism to the server, to perform an authentication protocol exchange, and optionally to negotiate a security layer for subsequent protocol interactions during the remainder of an NNTP session.</t><t>This document updates and formalizes the AUTHINFO USER/PASS authentication method specified in RFC 2980 and deprecates the AUTHINFO SIMPLE and AUTHINFO GENERIC authentication methods. Additionally, this document defines a profile of the Simple Authentication and Security Layer (SASL) for NNTP.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4643'/>
<seriesInfo name='DOI' value='10.17487/RFC4643'/>
</reference>
<?rfc linefile="306:draft-elie-nntp-tls-recommendations.xml"?>
<?rfc linefile="1:http://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.5246.xml"?>

<reference  anchor='RFC5246' target='http://www.rfc-editor.org/info/rfc5246'>
<front>
<title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
<author initials='T.' surname='Dierks' fullname='T. Dierks'><organization /></author>
<author initials='E.' surname='Rescorla' fullname='E. Rescorla'><organization /></author>
<date year='2008' month='August' />
<abstract><t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol.  The TLS protocol provides communications security over the Internet.  The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5246'/>
<seriesInfo name='DOI' value='10.17487/RFC5246'/>
</reference>
<?rfc linefile="307:draft-elie-nntp-tls-recommendations.xml"?>
<?rfc linefile="1:http://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.5386.xml"?>

<reference  anchor='RFC5386' target='http://www.rfc-editor.org/info/rfc5386'>
<front>
<title>Better-Than-Nothing Security: An Unauthenticated Mode of IPsec</title>
<author initials='N.' surname='Williams' fullname='N. Williams'><organization /></author>
<author initials='M.' surname='Richardson' fullname='M. Richardson'><organization /></author>
<date year='2008' month='November' />
<abstract><t>This document specifies how to use the Internet Key Exchange (IKE) protocols, such as IKEv1 and IKEv2, to setup &quot;unauthenticated&quot; security associations (SAs) for use with the IPsec Encapsulating Security Payload (ESP) and the IPsec Authentication Header (AH).  No changes to IKEv2 bits-on-the-wire are required, but Peer Authorization Database (PAD) and Security Policy Database (SPD) extensions are specified.  Unauthenticated IPsec is herein referred to by its popular acronym, &quot;BTNS&quot; (Better-Than-Nothing Security).   [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5386'/>
<seriesInfo name='DOI' value='10.17487/RFC5386'/>
</reference>
<?rfc linefile="308:draft-elie-nntp-tls-recommendations.xml"?>
<?rfc linefile="1:http://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.5536.xml"?>

<reference  anchor='RFC5536' target='http://www.rfc-editor.org/info/rfc5536'>
<front>
<title>Netnews Article Format</title>
<author initials='K.' surname='Murchison' fullname='K. Murchison' role='editor'><organization /></author>
<author initials='C.' surname='Lindsey' fullname='C. Lindsey'><organization /></author>
<author initials='D.' surname='Kohn' fullname='D. Kohn'><organization /></author>
<date year='2009' month='November' />
<abstract><t>This document specifies the syntax of Netnews articles in the context of the Internet Message Format (RFC 5322) and Multipurpose Internet Mail Extensions (MIME) (RFC 2045).  This document obsoletes RFC 1036, providing an updated specification to reflect current practice and incorporating incremental changes specified in other documents.   [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5536'/>
<seriesInfo name='DOI' value='10.17487/RFC5536'/>
</reference>
<?rfc linefile="309:draft-elie-nntp-tls-recommendations.xml"?>
<?rfc linefile="1:http://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.5537.xml"?>

<reference  anchor='RFC5537' target='http://www.rfc-editor.org/info/rfc5537'>
<front>
<title>Netnews Architecture and Protocols</title>
<author initials='R.' surname='Allbery' fullname='R. Allbery' role='editor'><organization /></author>
<author initials='C.' surname='Lindsey' fullname='C. Lindsey'><organization /></author>
<date year='2009' month='November' />
<abstract><t>This document defines the architecture of Netnews systems and specifies the correct manipulation and interpretation of Netnews articles by software that originates, distributes, stores, and displays them.  It also specifies the requirements that must be met by any protocol used to transport and serve Netnews articles. [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5537'/>
<seriesInfo name='DOI' value='10.17487/RFC5537'/>
</reference>
<?rfc linefile="310:draft-elie-nntp-tls-recommendations.xml"?>
<?rfc linefile="1:http://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.7258.xml"?>

<reference  anchor='RFC7258' target='http://www.rfc-editor.org/info/rfc7258'>
<front>
<title>Pervasive Monitoring Is an Attack</title>
<author initials='S.' surname='Farrell' fullname='S. Farrell'><organization /></author>
<author initials='H.' surname='Tschofenig' fullname='H. Tschofenig'><organization /></author>
<date year='2014' month='May' />
<abstract><t>Pervasive monitoring is a technical attack that should be mitigated in the design of IETF protocols, where possible.</t></abstract>
</front>
<seriesInfo name='BCP' value='188'/>
<seriesInfo name='RFC' value='7258'/>
<seriesInfo name='DOI' value='10.17487/RFC7258'/>
</reference>
<?rfc linefile="311:draft-elie-nntp-tls-recommendations.xml"?>
<?rfc linefile="1:http://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.7465.xml"?>

<reference  anchor='RFC7465' target='http://www.rfc-editor.org/info/rfc7465'>
<front>
<title>Prohibiting RC4 Cipher Suites</title>
<author initials='A.' surname='Popov' fullname='A. Popov'><organization /></author>
<date year='2015' month='February' />
<abstract><t>This document requires that Transport Layer Security (TLS) clients and servers never negotiate the use of RC4 cipher suites when they establish connections.  This applies to all TLS versions.  This document updates RFCs 5246, 4346, and 2246.</t></abstract>
</front>
<seriesInfo name='RFC' value='7465'/>
<seriesInfo name='DOI' value='10.17487/RFC7465'/>
</reference>
<?rfc linefile="312:draft-elie-nntp-tls-recommendations.xml"?>
<?rfc linefile="1:http://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.7525.xml"?>

<reference  anchor='RFC7525' target='http://www.rfc-editor.org/info/rfc7525'>
<front>
<title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
<author initials='Y.' surname='Sheffer' fullname='Y. Sheffer'><organization /></author>
<author initials='R.' surname='Holz' fullname='R. Holz'><organization /></author>
<author initials='P.' surname='Saint-Andre' fullname='P. Saint-Andre'><organization /></author>
<date year='2015' month='May' />
<abstract><t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are widely used to protect data exchanged over application protocols such as HTTP, SMTP, IMAP, POP, SIP, and XMPP.  Over the last few years, several serious attacks on TLS have emerged, including attacks on its most commonly used cipher suites and their modes of operation.  This document provides recommendations for improving the security of deployed services that use TLS and DTLS. The recommendations are applicable to the majority of use cases.</t></abstract>
</front>
<seriesInfo name='BCP' value='195'/>
<seriesInfo name='RFC' value='7525'/>
<seriesInfo name='DOI' value='10.17487/RFC7525'/>
</reference>
<?rfc linefile="313:draft-elie-nntp-tls-recommendations.xml"?>
<?rfc linefile="1:http://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.7590.xml"?>

<reference  anchor='RFC7590' target='http://www.rfc-editor.org/info/rfc7590'>
<front>
<title>Use of Transport Layer Security (TLS) in the Extensible Messaging and Presence Protocol (XMPP)</title>
<author initials='P.' surname='Saint-Andre' fullname='P. Saint-Andre'><organization /></author>
<author initials='T.' surname='Alkemade' fullname='T. Alkemade'><organization /></author>
<date year='2015' month='June' />
<abstract><t>This document provides recommendations for the use of Transport Layer Security (TLS) in the Extensible Messaging and Presence Protocol (XMPP).  This document updates RFC 6120.</t></abstract>
</front>
<seriesInfo name='RFC' value='7590'/>
<seriesInfo name='DOI' value='10.17487/RFC7590'/>
</reference>
<?rfc linefile="314:draft-elie-nntp-tls-recommendations.xml"?>

<reference anchor="CRIME">
<front>
<title>The CRIME Attack</title>
<author initials="J." surname="Rizzo" fullname="Juliano Rizzo"/>
<author initials="T." surname="Duong" fullname="Thai Duong"/>
<date month="Ekoparty Security Conference," year="2012"/>
</front>
</reference>

<reference anchor="NNTP-COMPRESS">
<front>
<title>Network News Transfer Protocol (NNTP) Extension for Compression</title>
<author initials="K." surname="Murchison" fullname="Kenneth Murchison"/>
<author initials="J." surname="&#201;lie" fullname="Julien &#201;lie"/>
<date month="June" year="2016"/>
</front>
<format type="HTML" target="https://tools.ietf.org/html/draft-murchison-nntp-compress-05"/>
</reference>

<reference anchor="MUA-STS">
<front>
<title>Mail User Agent Strict Transport Security (MUA-STS)</title>
<author initials="K." surname="Moore" fullname="Keith Moore"/>
<author initials="C." surname="Newman" fullname="Chris Newman"/>
<date month="July" year="2016"/>
</front>
<format type="HTML" target="https://tools.ietf.org/html/draft-ietf-uta-email-deep-05"/>
</reference>

</references> <!-- informative -->

<section title="Changes to RFC 4642" anchor="changes">

<t>This section lists detailed changes this document applies to <xref
   target="RFC4642"/>.</t>

<t>The second sentence in the Abstract of <xref target="RFC4642"/>
   is replaced with the following text:

<list>
<t>The primary goal is to provide encryption for single-link
   confidentiality purposes, but data integrity, and (optional)
   certificate-based peer entity authentication are also possible.</t>
</list></t>

<t>The third and fourth paragraphs in Section 1 of <xref
   target="RFC4642"/> are replaced with the following text:

<list>
<t>TCP port 563 is dedicated to NNTP over TLS, and registered in the
   IANA Service Name and Transport Protocol Port Number Registry for
   that usage.  NNTP implementations using TCP port 563 begin the
   TLS negotiation immediately upon connection and then continue with
   the initial steps of an NNTP session.  This use of strict TLS on a
   separate port is the preferred way of using TLS with NNTP.</t>

<t>As some existing implementations negotiate TLS via a dynamic upgrade
   from unencrypted to TLS-protected traffic during an NNTP session,
   this specification formalizes the STARTTLS command in use for that
   purpose.  However, as already mentioned above, implementations SHOULD
   use strict TLS on a separate port.</t>
</list></t>

<t>The second sentence of the first paragraph in Section 2.2.2 of <xref
   target="RFC4642"/> is replaced with the following text:

<list>
<t>The STARTTLS command is usually used to initiate session security,
   although it can also be used for client and/or server certificate
   authentication.</t>
</list></t>

<t>The third paragraph in Section 5 of <xref target="RFC4642"/>
   is removed.  Consequently, NNTP no longer requires to implement
   any cipher suites, other than those prescribed by TLS <xref
   target="RFC5246"/> and Section 4.2.1 of <xref target="RFC7525"/>.</t>

</section> <!-- changes -->

<section title="Implementation Notes" anchor="implementationnotes">

<t>Some governments enforce legislation prohibiting the export of strong
   cryptographic technologies.  Nothing in this document ought to be
   taken as advice to violate such prohibitions.</t>

</section> <!-- implementationnotes -->

<section title="Acknowledgements" anchor="acknowledgements">

<t>This document draws heavily on ideas in <xref target="RFC7590"/>
   by Peter Saint&#8209;Andre and Thijs Alkemade, and a large portion of this
   text was borrowed from that specification.</t>

<t>The author would like to thank the following individuals for
   contributing their ideas and support for writing this specification:
   Michael B&#228;uerle, Richard Kettlewell, and Chris Newman.</t>

</section> <!-- acknowledgements -->

<section title="Document History (to be removed by RFC Editor before
                publication)" anchor="history">

<section title="Changes since -00">
<t><list style="symbols">
<t>Clarify in the introduction of <xref target="recommendations"/>
   that NNTP implementations compliant with this document are REQUIRED
   to also comply with <xref target="RFC7525"/>.</t>
<t>Improve the wording of <xref target="tlsversions"/> to mention that
   configuration is primarily intended for news servers.  Also, be more
   consistent in the options to accept, and include signature algorithms
   and named groups.</t>
</list></t>
</section>

</section> <!-- history -->

<section title="Issues to Address" anchor="issues">

<t><list style="symbols">

<t>Should the paragraph starting with "Servers MUST be able to understand
   backwards-compatible TLS Client Hello messages" in Section 2.2.2 of
   <xref target="RFC4642"/> remain as-is or should it be modernized
   with another wording?  (And which one?  or is it already done by
   the reference to <xref target="RFC7525"/>?)</t>

<t>Should the paragraphs in Section 5 of <xref target="RFC4642"/> dealing
   with how the client checks the server hostname and the binding between
   the identity of servers and the public keys presented be modernized?
   (Obsolete them in favour of RFC 6125 for instance?  or maybe <xref
   target="RFC7525"/> is enough as it also points to RFC 6125)</t>

<t>Regarding peering between mode-switching news servers, should
   something specific be added?  NNTP has port 119, and NNTP over TLS
   has port 563.  NNSP has port 433 but no dedicated port for TLS.
   Shouldn't a port for NNSP over TLS be registered?  Otherwise,
   both reading and peering are supposed to use port 563, which may
   be inconvenient.  We could then recommend the use of stunnel with
   TCP wrappers, or an equivalent mechanism, listening to that new
   separate port for mode-switching news servers that do not natively
   support TLS for peering.</t>

</list></t>

</section> <!-- issues -->

</back>
</rfc>
