<?xml version='1.0' encoding='ascii'?>
<!DOCTYPE rfc SYSTEM "rfc2629.dtd">
<?rfc toc="yes" ?>
<?rfc symrefs="yes" ?>
<?rfc sortrefs="yes" ?>
<?rfc comments="yes" ?>
<?rfc inline="yes" ?>
<?rfc strict="yes" ?>
<?rfc rfcedstyle="yes" ?>
<rfc category="std" ipr="trust200902" updates="4642" docName="draft-elie-nntp-tls-recommendations-04" obsoletes="" submissionType="IETF" xml:lang="en">
  <front>
    <title abbrev="Use of TLS in NNTP">Use of Transport Layer Security (TLS) in&#160;the&#160;Network&#160;News&#160;Transfer&#160;Protocol (NNTP) </title>
    <author initials="J." surname="&#201;lie" fullname="Julien &#201;lie">
      <organization/>
      <address>
        <postal>
          <street>10 all&#233;e Clovis</street>
          <code>93160</code>
          <city>Noisy-le-Grand</city>
          <country>France</country>
        </postal>
        <email>julien@trigofacile.com</email>
        <uri>http://www.trigofacile.com/</uri>
      </address>
    </author>
    <date month="January" year="2017"/>
    <area>Applications</area>
    <workgroup>Independent Submission</workgroup>
    <keyword>NNTP</keyword>
    <keyword>Usenet</keyword>
    <keyword>NetNews</keyword>
    <keyword>TLS</keyword>
    <keyword>STARTTLS</keyword>
    <abstract>
      <t>This document provides recommendations for improving the security of the Network News Transfer Protocol (NNTP) when using Transport Layer Security (TLS).  It modernizes the NNTP usage of TLS to be consistent with TLS best current practices.  If approved, this document updates RFC 4642.</t>
    </abstract>
  </front>
  <middle>
    <section title="Introduction" anchor="intro" toc="default">
      <t>The Network News Transfer Protocol (NNTP) <xref target="RFC3977" pageno="false" format="default"/> has been using Transport Layer Security (TLS) <xref target="RFC5246" pageno="false" format="default"/> (along with its precursor, Secure Sockets Layer or SSL) since at least year 2000.  The use of TLS in NNTP was formalized in <xref target="RFC4642" pageno="false" format="default"/>, providing at the same time implementation recommendations.  In order to address the evolving threat model on the Internet today, this document provides stronger recommendations regarding that use.</t>
      <t>In particular, this document updates <xref target="RFC4642" pageno="false" format="default"/> by specifying that NNTP implementations and deployments MUST follow the best current practices documented in the "Recommendations for Secure Use of TLS and DTLS" <xref target="RFC7525" pageno="false" format="default"/>.  This includes stronger recommendations regarding SSL/TLS protocol versions, fallback to lower versions, TLS negotiation, TLS-level compression, TLS session resumption, cipher suites, public key lengths, forward secrecy, hostname validation, certificate verification, and other aspects of using TLS with NNTP.</t>
      <t>
        <cref anchor="Q1">For RFC Editor:  Throughout the document, should [RFC7525] be referenced as [BCP195] or [RFC7525]?  Same question for other BCP documents.</cref>
      </t>
      <t>
        <cref anchor="Q2">For RFC Editor:  Throughout the document, the references to [MUA-STS] (draft-ietf-uta-email-deep) and [NNTP-COMPRESS] (draft-murchison-nntp-compress) should be referenced as their equivalent [RFCxxxx], once published.</cref>
      </t>
      <section title="Conventions Used in This Document" anchor="conventions" toc="default">
        <t>Any term not defined in this document has the same meaning as it does in <xref target="RFC4642" pageno="false" format="default"/> or the NNTP core specification <xref target="RFC3977" pageno="false" format="default"/>.</t>
        <t>When this document uses the terms "implicit TLS", it refers to TLS negotiation immediately upon connection on a separate port.</t>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in <xref target="RFC2119" pageno="false" format="default"/>.</t>
      </section>
      <!--conventions -->
      <section title="Author's Note" anchor="authorsnote" toc="default">
        <t>Please write the first letter of "Elie" with an acute accent wherever possible -- it is U+00C9 ("&amp;#201;" in XML).  The third letter of "Stephane" and the penultimate letter of "allee" similarly have an acute accent (U+00E9, "&amp;#233;" in XML).  Also, the letters "ae" in "Baeuerle" should be written as an a-umlaut (U+00E4, "&amp;#228;" in XML).</t>
      </section>
      <!--authorsnote -->
    </section>
    <!--intro -->
    <section title="Updates/Changes to RFC 4642" anchor="changes" toc="default">
      <t>This document updates <xref target="RFC4642" pageno="false" format="default"/> in the following aspects: <list style="symbols"><t>NNTP implementations and deployments SHOULD disable TLS-level compression (Section 3.3 of <xref target="RFC7525" pageno="false" format="default"/>), thus no longer using TLS as a means to provide data compression (contrary to Abstract and Section 2.2.2 of <xref target="RFC4642" pageno="false" format="default"/>).</t><t>NNTP implementations and deployments SHOULD prefer implicit TLS and therefore use strict TLS configuration (Section 3.2 of <xref target="RFC7525" pageno="false" format="default"/>), that is to say they SHOULD use a port dedicated to NNTP over TLS, and begin the TLS negotiation immediately upon connection (contrary to a dynamic upgrade from unencrypted to TLS-protected traffic via the use of the STARTTLS command, as Section 1 of <xref target="RFC4642" pageno="false" format="default"/> was encouraging).  For the same reasons, transposed to NNTP, as those given in Appendix A of <xref target="MUA-STS" pageno="false" format="default"/> (whose one of the authors was also one of the authors of <xref target="RFC4642" pageno="false" format="default"/>), implicit TLS is the preferred way of using TLS with NNTP.</t><t>NNTP implementations and deployments MUST NOT negotiate RC4 cipher suites (<xref target="RFC7465" pageno="false" format="default"/>) contrary to Section 5 of <xref target="RFC4642" pageno="false" format="default"/> that REQUIRED them to implement the TLS_RSA_WITH_RC4_128_MD5 cipher suite so as to ensure that any two NNTP compliant implementations can be configured to interoperate.  This document removes that requirement, so that NNTP client and server implementations follow the recommendations given in Sections 4.2 and 4.2.1 of <xref target="RFC7525" pageno="false" format="default"/> instead.  The mandatory-to-implement cipher(s) suite(s) depend on the TLS protocol version.  For instance, when TLS 1.2 is used, the TLS_RSA_WITH_AES_128_CBC_SHA cipher suite MUST be implemented (Section 9 of <xref target="RFC5246" pageno="false" format="default"/>).</t><t>NNTP implementations and deployments MUST support the Server Name Indication (SNI) extension defined in Section 3 of <xref target="RFC6066" pageno="false" format="default"/>, contrary to Section 2.2.2 of <xref target="RFC4642" pageno="false" format="default"/> for which it was only a SHOULD.  All clients and servers known by multiple names MUST support the SNI extension, in conformance with Section 3.6 of <xref target="RFC7525" pageno="false" format="default"/>.</t><t>NNTP implementations and deployments MUST follow the rules and guidelines defined in <xref target="RFC6125" pageno="false" format="default"/> and <xref target="RFC5280" pageno="false" format="default"/> for hostname validation and certificate verification.  Part of Section 5 of <xref target="RFC4642" pageno="false" format="default"/> is therefore rationalized in favour of following those two documents.</t></list></t>
      <t><xref target="detailed-changes" pageno="false" format="default"/> of this document gives detailed changes with regards to the wording of <xref target="RFC4642" pageno="false" format="default"/>.</t>
    </section>
    <!--changes -->
    <section title="Recommendations" anchor="recommendations" toc="default">
      <t>The best current practices documented in the "Recommendations for Secure Use of TLS and DTLS" <xref target="RFC7525" pageno="false" format="default"/> are included here by reference.  Therefore, NNTP implementations and deployments compliant with this document are REQUIRED to also comply with <xref target="RFC7525" pageno="false" format="default"/>.</t>
      <t>Instead of repeating those recommendations here, this document mostly provides supplementary information regarding secure implementation and deployment of NNTP technologies.</t>
      <section title="Compression" anchor="compression" toc="default">
        <t>NNTP supports the use of the COMPRESS command, defined in Section 2.2 of <xref target="NNTP-COMPRESS" pageno="false" format="default"/>, to compress data between an NNTP client and server.  Although this NNTP extension might have slightly stronger security properties than TLS-level compression <xref target="RFC3749" pageno="false" format="default"/> (since NNTP compression can be activated after authentication has completed, thus reducing the chances that authentication credentials can be leaked via for instance a CRIME attack, as described in Section 2.6 of <xref target="CRIME" pageno="false" format="default"/>), this document neither encourages nor discourages the use of the NNTP COMPRESS extension.</t>
      </section>
      <!--compression -->
      <section title="Protocol Versions and Security Preferences" anchor="tlsversions" toc="default">
        <t>NNTP implementations of news servers are encouraged to support options to configure the minimal TLS protocol version to accept, and which cipher suites, signature algorithms or groups (like elliptic curves) to use for incoming connections.  Additional options can naturally also be supported.  The goal is to enable administrators of news servers to easily and quickly strengthen security, if need be (for instance by rejecting cipher suites considered unsafe with regards to local policy).</t>
        <t>News clients may also support similar options, either configurable by the user or enforced by the news reader.</t>
      </section>
      <!--tlsversions -->
      <section title="Server Name Indication" anchor="sni" toc="default">
        <t>The TLS extension for Server Name Indication (SNI) defined in Section 3 of <xref target="RFC6066" pageno="false" format="default"/> MUST be implemented by all news clients.  It also MUST be implemented by any news server that is known by multiple names.  (Otherwise, it is not possible for a server with several hostnames to present the correct certificate to the client.)</t>
      </section>
      <!--sni -->
      <section title="Prevention of SSL Stripping" anchor="sslstripping" toc="default">
        <t>In order to help prevent SSL Stripping attacks (Section 2.1 of <xref target="RFC7457" pageno="false" format="default"/>), NNTP implementations and deployments are encouraged to follow the recommendations provided in Section 3.2 of <xref target="RFC7525" pageno="false" format="default"/>.  Notably, in case implicit TLS is not used, news clients SHOULD attempt to negotiate TLS even if the server does not advertise the STARTTLS capability label in response to the CAPABILITIES command (Section 2.1 of <xref target="RFC4642" pageno="false" format="default"/>).</t>
      </section>
      <!--sslstripping -->
      <section title="Authenticated Connections" anchor="authconnections" toc="default">
        <t><xref target="RFC4642" pageno="false" format="default"/> already provides recommendations and requirements for certificate validation in the context of checking the client or the server's identity.  Those requirements are strengthened by <xref target="certverif" pageno="false" format="default"/> of this document.</t>
        <t>Wherever possible, it is best to prefer certificate-based authentication (along with SASL <xref target="RFC4422" pageno="false" format="default"/>), and ensure that: <list style="symbols"><t>Clients authenticate servers.</t><t>Servers authenticate clients.</t><t>Servers authenticate other peer servers.</t></list></t>
        <t>This document does not mandate certificate-based authentication, although such authentication is strongly preferred.  As mentioned in Section 2.2.2 of <xref target="RFC4642" pageno="false" format="default"/>, the AUTHINFO SASL command (Section 2.4 of <xref target="RFC4643" pageno="false" format="default"/>) with the EXTERNAL mechanism (Appendix A of <xref target="RFC4422" pageno="false" format="default"/>) MAY be used to authenticate a client once its TLS credentials have been successfully exchanged.</t>
        <t>Given the pervasiveness of eavesdropping <xref target="RFC7258" pageno="false" format="default"/>, even an encrypted but unauthenticated connection might be better than an unencrypted connection (this is similar to the "better-than-nothing security" approach for IPsec <xref target="RFC5386" pageno="false" format="default"/>).  Encrypted but unauthenticated connections include connections negotiated using anonymous Diffie&#8209;Hellman mechanisms or using self-signed certificates, among others.</t>
        <t>Note: when an NNTP server receives a Netnews article, it MAY add a &lt;diag&#8209;match&gt; (Section 3.1.5 of <xref target="RFC5536" pageno="false" format="default"/>), which appears as "!!" in the Path header field of that article, to indicate that it verified the identity of the client or peer server.  This document encourages the construction of such Path header fields, as described in Section 3.2.1 of <xref target="RFC5537" pageno="false" format="default"/>.</t>
      </section>
      <!--authconnections -->
      <section title="Human Factors" anchor="humanfactors" toc="default">
        <t>It is strongly encouraged that NNTP clients provide ways for end users (and that NNTP servers provide ways for administrators) to complete at least the following tasks: <list style="symbols"><t>Determine if a given incoming or outgoing connection is encrypted using a security layer (either using TLS or an SASL mechanism that negotiates a security layer).</t><t>Determine the version of TLS used for encryption of a given stream.</t><t>If authenticated encryption is used, determine how the connection was authenticated or verified.</t><t>Inspect the certificate offered by an NNTP server.</t><t>Determine the cipher suite used to encrypt a connection.</t><t>Be warned if the certificate changes for a given server.</t><t>When a security layer is not already in place, be warned if a given server stops advertising the STARTTLS capability label in response to the CAPABILITIES command (Section 2.1 of <xref target="RFC4642" pageno="false" format="default"/>) whereas it advertised the STARTTLS capability label during any previous connection within a (possibly configurable) time frame.  (Otherwise, a human might not see the warning the first time, and the warning would disappear immediately after that.)</t><t>Be warned if a failure response to the STARTTLS command is received from the server whereas the STARTTLS capability label was advertised.</t></list></t>
        <t>Note that the last two tasks cannot occur when implicit TLS is used, and that the penultimate task helps prevent an attack known as SSL Stripping (Section 2.1 of <xref target="RFC7457" pageno="false" format="default"/>).</t>
      </section>
      <!--humanfactors -->
    </section>
    <!--recommendations -->
    <section title="Security Considerations" anchor="security" toc="default">
      <t>Beyond the security considerations already described in <xref target="RFC4642" pageno="false" format="default"/>, <xref target="RFC6125" pageno="false" format="default"/> and <xref target="RFC7525" pageno="false" format="default"/>, the author wishes to add the following caveat when not using implicit TLS.</t>
      <t>NNTP servers need ensure that they are not vulnerable to the STARTTLS command injection vulnerability (Section 2.2 of <xref target="RFC7457" pageno="false" format="default"/>).  Though this command MUST NOT be pipelined, an attacker could pipeline it.  Therefore, NNTP servers MUST discard any NNTP command received between the use of STARTTLS and the end of TLS negotiation.</t>
    </section>
    <!--security -->
    <section title="IANA Considerations" anchor="iana" toc="default">
      <t>This document does not change the formal definition of the STARTTLS extension (Section 6 of <xref target="RFC4642" pageno="false" format="default"/>).  Nonetheless, as implementations of the STARTTLS extension should follow this document, IANA will add its reference to the existing STARTTLS label in the NNTP capability labels registry contained in the Network News Transfer Protocol (NNTP) Parameters registry:</t>
      <texttable title="" suppress-title="false" align="center" style="full">
        <ttcol align="left">Label</ttcol>
        <ttcol align="left">Meaning</ttcol>
        <ttcol align="left">Reference</ttcol>
        <c>STARTTLS</c>
        <c>Transport layer security</c>
        <c>[RFC4642][RFC-to-be]</c>
      </texttable>
    </section>
    <!--iana -->
  </middle>
  <back>
    <references title="Normative References"><reference anchor="RFC2119" target="http://www.rfc-editor.org/info/rfc2119"><front><title>Key words for use in RFCs to Indicate Requirement Levels</title><author initials="S." surname="Bradner" fullname="S. Bradner"><organization/></author><date year="1997" month="March"/><abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract></front><seriesInfo name="BCP" value="14"/><seriesInfo name="RFC" value="2119"/><seriesInfo name="DOI" value="10.17487/RFC2119"/></reference> <reference anchor="RFC3977" target="http://www.rfc-editor.org/info/rfc3977"><front><title>Network News Transfer Protocol (NNTP)</title><author initials="C." surname="Feather" fullname="C. Feather"><organization/></author><date year="2006" month="October"/><abstract><t>The Network News Transfer Protocol (NNTP) has been in use in the Internet for a decade, and remains one of the most popular protocols (by volume) in use today.  This document is a replacement for RFC 977, and officially updates the protocol specification.  It clarifies some vagueness in RFC 977, includes some new base functionality, and provides a specific mechanism to add standardized extensions to NNTP.  [STANDARDS-TRACK]</t></abstract></front><seriesInfo name="RFC" value="3977"/><seriesInfo name="DOI" value="10.17487/RFC3977"/></reference> <reference anchor="RFC4642" target="http://www.rfc-editor.org/info/rfc4642"><front><title>Using Transport Layer Security (TLS) with Network News Transfer Protocol (NNTP)</title><author initials="K." surname="Murchison" fullname="K. Murchison"><organization/></author><author initials="J." surname="Vinocur" fullname="J. Vinocur"><organization/></author><author initials="C." surname="Newman" fullname="C. Newman"><organization/></author><date year="2006" month="October"/><abstract><t>This memo defines an extension to the Network News Transfer Protocol (NNTP) that allows an NNTP client and server to use Transport Layer Security (TLS).  The primary goal is to provide encryption for single-link confidentiality purposes, but data integrity, (optional) certificate-based peer entity authentication, and (optional) data compression are also possible.  [STANDARDS-TRACK]</t></abstract></front><seriesInfo name="RFC" value="4642"/><seriesInfo name="DOI" value="10.17487/RFC4642"/></reference> <reference anchor="RFC5246" target="http://www.rfc-editor.org/info/rfc5246"><front><title>The Transport Layer Security (TLS) Protocol Version 1.2</title><author initials="T." surname="Dierks" fullname="T. Dierks"><organization/></author><author initials="E." surname="Rescorla" fullname="E. Rescorla"><organization/></author><date year="2008" month="August"/><abstract><t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol.  The TLS protocol provides communications security over the Internet.  The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.  [STANDARDS-TRACK]</t></abstract></front><seriesInfo name="RFC" value="5246"/><seriesInfo name="DOI" value="10.17487/RFC5246"/></reference> <reference anchor="RFC5280" target="http://www.rfc-editor.org/info/rfc5280"><front><title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title><author initials="D." surname="Cooper" fullname="D. Cooper"><organization/></author><author initials="S." surname="Santesson" fullname="S. Santesson"><organization/></author><author initials="S." surname="Farrell" fullname="S. Farrell"><organization/></author><author initials="S." surname="Boeyen" fullname="S. Boeyen"><organization/></author><author initials="R." surname="Housley" fullname="R. Housley"><organization/></author><author initials="W." surname="Polk" fullname="W. Polk"><organization/></author><date year="2008" month="May"/><abstract><t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet.  An overview of this approach and model is provided as an introduction.  The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms.  Standard certificate extensions are described and two Internet-specific extensions are defined.  A set of required certificate extensions is specified.  The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions.  An algorithm for X.509 certification path validation is described.  An ASN.1 module and examples are provided in the appendices.  [STANDARDS-TRACK]</t></abstract></front><seriesInfo name="RFC" value="5280"/><seriesInfo name="DOI" value="10.17487/RFC5280"/></reference> <reference anchor="RFC6066" target="http://www.rfc-editor.org/info/rfc6066"><front><title>Transport Layer Security (TLS) Extensions: Extension Definitions</title><author initials="D." surname="Eastlake 3rd" fullname="D. Eastlake 3rd"><organization/></author><date year="2011" month="January"/><abstract><t>This document provides specifications for existing TLS extensions.  It is a companion document for RFC 5246, "The Transport Layer Security (TLS) Protocol Version 1.2".  The extensions specified are server_name, max_fragment_length, client_certificate_url, trusted_ca_keys, truncated_hmac, and status_request.  [STANDARDS-TRACK]</t></abstract></front><seriesInfo name="RFC" value="6066"/><seriesInfo name="DOI" value="10.17487/RFC6066"/></reference> <reference anchor="RFC6125" target="http://www.rfc-editor.org/info/rfc6125"><front><title>Representation and Verification of Domain-Based Application Service Identity within Internet Public Key Infrastructure Using X.509 (PKIX) Certificates in the Context of Transport Layer Security (TLS)</title><author initials="P." surname="Saint-Andre" fullname="P. Saint-Andre"><organization/></author><author initials="J." surname="Hodges" fullname="J. Hodges"><organization/></author><date year="2011" month="March"/><abstract><t>Many application technologies enable secure communication between two entities by means of Internet Public Key Infrastructure Using X.509 (PKIX) certificates in the context of Transport Layer Security (TLS). This document specifies procedures for representing and verifying the identity of application services in such interactions.   [STANDARDS-TRACK]</t></abstract></front><seriesInfo name="RFC" value="6125"/><seriesInfo name="DOI" value="10.17487/RFC6125"/></reference> <reference anchor="RFC7525" target="http://www.rfc-editor.org/info/rfc7525"><front><title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title><author initials="Y." surname="Sheffer" fullname="Y. Sheffer"><organization/></author><author initials="R." surname="Holz" fullname="R. Holz"><organization/></author><author initials="P." surname="Saint-Andre" fullname="P. Saint-Andre"><organization/></author><date year="2015" month="May"/><abstract><t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are widely used to protect data exchanged over application protocols such as HTTP, SMTP, IMAP, POP, SIP, and XMPP.  Over the last few years, several serious attacks on TLS have emerged, including attacks on its most commonly used cipher suites and their modes of operation.  This document provides recommendations for improving the security of deployed services that use TLS and DTLS. The recommendations are applicable to the majority of use cases.</t></abstract></front><seriesInfo name="BCP" value="195"/><seriesInfo name="RFC" value="7525"/><seriesInfo name="DOI" value="10.17487/RFC7525"/></reference> </references>
    <!--normative -->
    <references title="Informative References"><reference anchor="RFC3749" target="http://www.rfc-editor.org/info/rfc3749"><front><title>Transport Layer Security Protocol Compression Methods</title><author initials="S." surname="Hollenbeck" fullname="S. Hollenbeck"><organization/></author><date year="2004" month="May"/><abstract><t>The Transport Layer Security (TLS) protocol (RFC 2246) includes features to negotiate selection of a lossless data compression method as part of the TLS Handshake Protocol and to then apply the algorithm associated with the selected method as part of the TLS Record Protocol.  TLS defines one standard compression method which specifies that data exchanged via the record protocol will not be compressed.  This document describes an additional compression method associated with a lossless data compression algorithm for use with TLS, and it describes a method for the specification of additional TLS compression methods.  [STANDARDS-TRACK]</t></abstract></front><seriesInfo name="RFC" value="3749"/><seriesInfo name="DOI" value="10.17487/RFC3749"/></reference> <reference anchor="RFC4301" target="http://www.rfc-editor.org/info/rfc4301"><front><title>Security Architecture for the Internet Protocol</title><author initials="S." surname="Kent" fullname="S. Kent"><organization/></author><author initials="K." surname="Seo" fullname="K. Seo"><organization/></author><date year="2005" month="December"/><abstract><t>This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer.  This document obsoletes RFC 2401 (November 1998).  [STANDARDS-TRACK]</t></abstract></front><seriesInfo name="RFC" value="4301"/><seriesInfo name="DOI" value="10.17487/RFC4301"/></reference> <reference anchor="RFC4422" target="http://www.rfc-editor.org/info/rfc4422"><front><title>Simple Authentication and Security Layer (SASL)</title><author initials="A." surname="Melnikov" fullname="A. Melnikov" role="editor"><organization/></author><author initials="K." surname="Zeilenga" fullname="K. Zeilenga" role="editor"><organization/></author><date year="2006" month="June"/><abstract><t>The Simple Authentication and Security Layer (SASL) is a framework for providing authentication and data security services in connection-oriented protocols via replaceable mechanisms.  It provides a structured interface between protocols and mechanisms.  The resulting framework allows new protocols to reuse existing mechanisms and allows old protocols to make use of new mechanisms.  The framework also provides a protocol for securing subsequent protocol exchanges within a data security layer.</t><t>This document describes how a SASL mechanism is structured, describes how protocols include support for SASL, and defines the protocol for carrying a data security layer over a connection.  In addition, this document defines one SASL mechanism, the EXTERNAL mechanism.</t><t>This document obsoletes RFC 2222.  [STANDARDS-TRACK]</t></abstract></front><seriesInfo name="RFC" value="4422"/><seriesInfo name="DOI" value="10.17487/RFC4422"/></reference> <reference anchor="RFC4643" target="http://www.rfc-editor.org/info/rfc4643"><front><title>Network News Transfer Protocol (NNTP) Extension for Authentication</title><author initials="J." surname="Vinocur" fullname="J. Vinocur"><organization/></author><author initials="K." surname="Murchison" fullname="K. Murchison"><organization/></author><date year="2006" month="October"/><abstract><t>This document defines an extension to the Network News Transfer Protocol (NNTP) that allows a client to indicate an authentication mechanism to the server, to perform an authentication protocol exchange, and optionally to negotiate a security layer for subsequent protocol interactions during the remainder of an NNTP session.</t><t>This document updates and formalizes the AUTHINFO USER/PASS authentication method specified in RFC 2980 and deprecates the AUTHINFO SIMPLE and AUTHINFO GENERIC authentication methods. Additionally, this document defines a profile of the Simple Authentication and Security Layer (SASL) for NNTP.  [STANDARDS-TRACK]</t></abstract></front><seriesInfo name="RFC" value="4643"/><seriesInfo name="DOI" value="10.17487/RFC4643"/></reference> <reference anchor="RFC5386" target="http://www.rfc-editor.org/info/rfc5386"><front><title>Better-Than-Nothing Security: An Unauthenticated Mode of IPsec</title><author initials="N." surname="Williams" fullname="N. Williams"><organization/></author><author initials="M." surname="Richardson" fullname="M. Richardson"><organization/></author><date year="2008" month="November"/><abstract><t>This document specifies how to use the Internet Key Exchange (IKE) protocols, such as IKEv1 and IKEv2, to setup "unauthenticated" security associations (SAs) for use with the IPsec Encapsulating Security Payload (ESP) and the IPsec Authentication Header (AH).  No changes to IKEv2 bits-on-the-wire are required, but Peer Authorization Database (PAD) and Security Policy Database (SPD) extensions are specified.  Unauthenticated IPsec is herein referred to by its popular acronym, "BTNS" (Better-Than-Nothing Security).   [STANDARDS-TRACK]</t></abstract></front><seriesInfo name="RFC" value="5386"/><seriesInfo name="DOI" value="10.17487/RFC5386"/></reference> <reference anchor="RFC5536" target="http://www.rfc-editor.org/info/rfc5536"><front><title>Netnews Article Format</title><author initials="K." surname="Murchison" fullname="K. Murchison" role="editor"><organization/></author><author initials="C." surname="Lindsey" fullname="C. Lindsey"><organization/></author><author initials="D." surname="Kohn" fullname="D. Kohn"><organization/></author><date year="2009" month="November"/><abstract><t>This document specifies the syntax of Netnews articles in the context of the Internet Message Format (RFC 5322) and Multipurpose Internet Mail Extensions (MIME) (RFC 2045).  This document obsoletes RFC 1036, providing an updated specification to reflect current practice and incorporating incremental changes specified in other documents.   [STANDARDS-TRACK]</t></abstract></front><seriesInfo name="RFC" value="5536"/><seriesInfo name="DOI" value="10.17487/RFC5536"/></reference> <reference anchor="RFC5537" target="http://www.rfc-editor.org/info/rfc5537"><front><title>Netnews Architecture and Protocols</title><author initials="R." surname="Allbery" fullname="R. Allbery" role="editor"><organization/></author><author initials="C." surname="Lindsey" fullname="C. Lindsey"><organization/></author><date year="2009" month="November"/><abstract><t>This document defines the architecture of Netnews systems and specifies the correct manipulation and interpretation of Netnews articles by software that originates, distributes, stores, and displays them.  It also specifies the requirements that must be met by any protocol used to transport and serve Netnews articles. [STANDARDS-TRACK]</t></abstract></front><seriesInfo name="RFC" value="5537"/><seriesInfo name="DOI" value="10.17487/RFC5537"/></reference> <reference anchor="RFC7258" target="http://www.rfc-editor.org/info/rfc7258"><front><title>Pervasive Monitoring Is an Attack</title><author initials="S." surname="Farrell" fullname="S. Farrell"><organization/></author><author initials="H." surname="Tschofenig" fullname="H. Tschofenig"><organization/></author><date year="2014" month="May"/><abstract><t>Pervasive monitoring is a technical attack that should be mitigated in the design of IETF protocols, where possible.</t></abstract></front><seriesInfo name="BCP" value="188"/><seriesInfo name="RFC" value="7258"/><seriesInfo name="DOI" value="10.17487/RFC7258"/></reference> <reference anchor="RFC7457" target="http://www.rfc-editor.org/info/rfc7457"><front><title>Summarizing Known Attacks on Transport Layer Security (TLS) and Datagram TLS (DTLS)</title><author initials="Y." surname="Sheffer" fullname="Y. Sheffer"><organization/></author><author initials="R." surname="Holz" fullname="R. Holz"><organization/></author><author initials="P." surname="Saint-Andre" fullname="P. Saint-Andre"><organization/></author><date year="2015" month="February"/><abstract><t>Over the last few years, there have been several serious attacks on Transport Layer Security (TLS), including attacks on its most commonly used ciphers and modes of operation.  This document summarizes these attacks, with the goal of motivating generic and protocol-specific recommendations on the usage of TLS and Datagram TLS (DTLS).</t></abstract></front><seriesInfo name="RFC" value="7457"/><seriesInfo name="DOI" value="10.17487/RFC7457"/></reference> <reference anchor="RFC7465" target="http://www.rfc-editor.org/info/rfc7465"><front><title>Prohibiting RC4 Cipher Suites</title><author initials="A." surname="Popov" fullname="A. Popov"><organization/></author><date year="2015" month="February"/><abstract><t>This document requires that Transport Layer Security (TLS) clients and servers never negotiate the use of RC4 cipher suites when they establish connections.  This applies to all TLS versions.  This document updates RFCs 5246, 4346, and 2246.</t></abstract></front><seriesInfo name="RFC" value="7465"/><seriesInfo name="DOI" value="10.17487/RFC7465"/></reference> <reference anchor="RFC7590" target="http://www.rfc-editor.org/info/rfc7590"><front><title>Use of Transport Layer Security (TLS) in the Extensible Messaging and Presence Protocol (XMPP)</title><author initials="P." surname="Saint-Andre" fullname="P. Saint-Andre"><organization/></author><author initials="T." surname="Alkemade" fullname="T. Alkemade"><organization/></author><date year="2015" month="June"/><abstract><t>This document provides recommendations for the use of Transport Layer Security (TLS) in the Extensible Messaging and Presence Protocol (XMPP).  This document updates RFC 6120.</t></abstract></front><seriesInfo name="RFC" value="7590"/><seriesInfo name="DOI" value="10.17487/RFC7590"/></reference> <reference anchor="CRIME"><front><title>The CRIME Attack</title><author initials="J." surname="Rizzo" fullname="Juliano Rizzo"/><author initials="T." surname="Duong" fullname="Thai Duong"/><date month="Ekoparty Security Conference," year="2012"/></front></reference><reference anchor="NNTP-COMPRESS"><front><title>Network News Transfer Protocol (NNTP) Extension for Compression</title><author initials="K." surname="Murchison" fullname="Kenneth Murchison"/><author initials="J." surname="&#201;lie" fullname="Julien &#201;lie"/><date month="October" year="2016"/></front><format type="HTML" target="https://tools.ietf.org/html/draft-murchison-nntp-compress-06"/></reference><reference anchor="MUA-STS"><front><title>Mail User Agent Strict Transport Security (MUA-STS)</title><author initials="K." surname="Moore" fullname="Keith Moore"/><author initials="C." surname="Newman" fullname="Chris Newman"/><date month="July" year="2016"/></front><format type="HTML" target="https://tools.ietf.org/html/draft-ietf-uta-email-deep-05"/></reference></references>
    <!--informative -->
    <section title="Detailed Changes to RFC 4642" anchor="detailed-changes" toc="default">
      <t>This section lists detailed changes this document applies to <xref target="RFC4642" pageno="false" format="default"/>.</t>
      <section title="Related to TLS-level Compression" toc="default">
        <t>The second sentence in the Abstract of <xref target="RFC4642" pageno="false" format="default"/> is replaced with the following text: <list><t>The primary goal is to provide encryption for single-link confidentiality purposes, but data integrity, and (optional) certificate-based peer entity authentication are also possible.</t></list></t>
        <t>The second sentence of the first paragraph in Section 2.2.2 of <xref target="RFC4642" pageno="false" format="default"/> is replaced with the following text: <list><t>The STARTTLS command is usually used to initiate session security, although it can also be used for client and/or server certificate authentication.</t></list></t>
      </section>
      <section title="Related to Implicit TLS" toc="default">
        <t>The third and fourth paragraphs in Section 1 of <xref target="RFC4642" pageno="false" format="default"/> are replaced with the following text: <list><t>TCP port 563 is dedicated to NNTP over TLS, and registered in the IANA Service Name and Transport Protocol Port Number Registry for that usage.  NNTP implementations using TCP port 563 begin the TLS negotiation immediately upon connection and then continue with the initial steps of an NNTP session.  This immediate TLS negotiation on a separate port (referred to in this document as "implicit TLS") is the preferred way of using TLS with NNTP.</t><t>If a host wishes to offer separate servers for transit and reading clients (Section 3.4.1 of [NNTP]), TCP port 563 SHOULD be used for implicit TLS with the reading server, and an unused port of its choice different than TCP port 433 SHOULD be used for implicit TLS with the transit server.  The ports used for implicit TLS should be clearly communicated to the clients, and specifically that no plain-text communication occurs before the TLS session is negotiated.</t><t>As some existing implementations negotiate TLS via a dynamic upgrade from unencrypted to TLS-protected traffic during an NNTP session on well-known TCP ports 119 or 433, this specification formalizes the STARTTLS command in use for that purpose.  However, as already mentioned above, implementations SHOULD use implicit TLS on a separate port.</t><t>Note: a common alternative to protect NNTP exchanges with transit servers that do not implement TLS is the use of IPsec with encryption <xref target="RFC4301" pageno="false" format="default"/>.</t></list></t>
        <t>An additional informative reference to <xref target="RFC4301" pageno="false" format="default"/> is therefore added to Section 7.2 of <xref target="RFC4642" pageno="false" format="default"/>.</t>
      </section>
      <section title="Related to RC4 Cipher Suites" toc="default">
        <t>The third paragraph in Section 5 of <xref target="RFC4642" pageno="false" format="default"/> is removed.  Consequently, NNTP no longer requires to implement any cipher suites, other than those prescribed by TLS (Section 9 of <xref target="RFC5246" pageno="false" format="default"/>) and Sections 4.2 and 4.2.1 of <xref target="RFC7525" pageno="false" format="default"/>.</t>
      </section>
      <section title="Related to Server Name Indication" toc="default">
        <t>The last two sentences of the seventh paragraph in Section 2.2.2 of <xref target="RFC4642" pageno="false" format="default"/> are removed.  Section 3.6 of <xref target="RFC7525" pageno="false" format="default"/> apply.</t>
      </section>
      <section title="Related to Certificate Verification" anchor="certverif" toc="default">
        <t>The text between "During the TLS negotiation" and "identity bindings)." in Section 5 of <xref target="RFC4642" pageno="false" format="default"/> is replaced with the following text: <list><t>During TLS negotiation, the client MUST verify the server's identity in order to prevent man-in-the-middle attacks.  The client MUST follow the rules and guidelines defined in <xref target="RFC6125" pageno="false" format="default"/>, where the reference identifier MUST be the server hostname that the client used to open the connection, and that is also specified in the TLS "server_name" extension <xref target="RFC6066" pageno="false" format="default"/>.  The following NNTP-specific consideration applies:  DNS domain names in server certificates MAY contain the wildcard character "*" as the complete left-most label within the identifier.</t><t>If the match fails, the client MUST follow the recommendations in Section 6.6 of <xref target="RFC6125" pageno="false" format="default"/> regarding certificate pinning and fallback.</t><t>Beyond server identity checking, clients also MUST apply the procedures specified in <xref target="RFC5280" pageno="false" format="default"/> for general certificate validation (e.g., certificate integrity, signing, and path validation).</t></list></t>
        <t>Additional normative references to <xref target="RFC5280" pageno="false" format="default"/> (replacing [PKI-CERT] it obsoletes), <xref target="RFC6066" pageno="false" format="default"/>, and <xref target="RFC6125" pageno="false" format="default"/> are therefore added to Section 7.1 of <xref target="RFC4642" pageno="false" format="default"/>.</t>
      </section>
      <!--certverif -->
      <section title="Related to Other Obsolete Wording" toc="default">
        <t>The first two sentences of the seventh paragraph in Section 2.2.2 of <xref target="RFC4642" pageno="false" format="default"/> are removed.  There is no special requirement for NNTP with regards to TLS Client Hello messages.  Section 7.4.1.2 and Appendix E of <xref target="RFC5246" pageno="false" format="default"/> apply.</t>
      </section>
    </section>
    <!--detailed-changes -->
    <section title="Acknowledgments" anchor="acknowledgments" toc="default">
      <t>This document draws heavily on ideas in <xref target="RFC7590" pageno="false" format="default"/> by Peter Saint&#8209;Andre and Thijs Alkemade; a large portion of this text was borrowed from that specification.</t>
      <t>The author would like to thank the following individuals for contributing their ideas and support for writing this specification: Michael B&#228;uerle, St&#233;phane Bortzmeyer, Viktor Dukhovni, Sabahattin Gucukoglu, Richard Kettlewell, Jouni Korhonen, David Eric Mandelberg, Matija Nalis, Chris Newman, and Peter Saint&#8209;Andre.</t>
      <t>Many thanks to the Responsible Area Director, Alexey Melnikov, for reviewing and sponsoring this document.</t>
    </section>
    <!--acknowledgments -->
    <section title="Document History (to be removed by RFC Editor before                 publication)" anchor="history" toc="default">
      <section title="Changes since -03" toc="default">
        <t>
          <list style="symbols">
            <t>Improve wording to make clear that the server hostname that the client used to open the connection is the same as the one specified in the TLS "server_name" extension.</t>
            <t>Move <xref target="RFC5280" pageno="false" format="default"/>, <xref target="RFC6125" pageno="false" format="default"/> and <xref target="RFC7525" pageno="false" format="default"/> to normative references.</t>
            <t>In detailed changes of <xref target="RFC4642" pageno="false" format="default"/>, use [NNTP] instead of <xref target="RFC3977" pageno="false" format="default"/> as this RFC is referenced as [NNTP] in <xref target="RFC4642" pageno="false" format="default"/>.  Also mention obsolete [PKI-CERT].</t>
          </list>
        </t>
      </section>
      <section title="Changes since -02" toc="default">
        <t>
          <list style="symbols">
            <t>Use (and define) the "implicit TLS" terminology instead of "strict TLS".  The language in <xref target="RFC7525" pageno="false" format="default"/> is unfortunate since "strict TLS" is not clearly defined in that document, and the name suggests that it is an alternative to "opportunistic TLS", rather than an alternative to STARTTLS.  While STARTTLS is often used opportunistically, that is not always the case.</t>
            <t>Mention SSL Stripping in <xref target="humanfactors" pageno="false" format="default"/> with a reference to Section 2.1 of <xref target="RFC7457" pageno="false" format="default"/> because the intent of the related task may not have been clear enough.  Reported by Matija Nalis.</t>
            <t>Add <xref target="sslstripping" pageno="false" format="default"/> about how to prevent SSL stripping, notably by an attempt to negotiate TLS even if STARTTLS is not advertised, when implicit TLS is not used.</t>
            <t>Strengthen the requirements on hostname validation and certificate verification, by referencing <xref target="RFC6125" pageno="false" format="default"/> and <xref target="RFC5280" pageno="false" format="default"/>.</t>
            <t>Ask IANA to add this document to the NNTP capabilily labels registry.</t>
            <t>Reference the security considerations of <xref target="RFC6125" pageno="false" format="default"/>.</t>
            <t>Mention informative and normative references to add to <xref target="RFC4642" pageno="false" format="default"/>.</t>
          </list>
        </t>
      </section>
      <section title="Changes since -01" toc="default">
        <t>
          <list style="symbols">
            <t>Take into account all the remarks sent during IETF Last Call.</t>
            <t>Move the part about <xref target="RFC4642" pageno="false" format="default"/> from Introduction to a new dedicated Section named "Updates/Changes to RFC 4642" so as to make the document a bit more structured.</t>
            <t>The warning about lack of STARTTLS is expanded in scope to say "during any previous connection within a (possibly configurable) time frame" instead of "during the previous connection".</t>
            <t>Remove Appendix about export restrictions on crypto.  It is useless since RFC 2804.</t>
            <t>Add wording about the use of strict TLS for transit.  Mention the use of a port other than 433 for strict TLS between two peers, and add a note about a possible use of IPsec <xref target="RFC4301" pageno="false" format="default"/> for transit.  Do not only speak about port 563.</t>
            <t>Explicitly mention the mandatory-to-implement cipher suite for TLS 1.2.</t>
            <t>Do not keep the paragraph about TLS Client Hello messages and Server Name Indication (SNI) in <xref target="RFC4642" pageno="false" format="default"/>.  Support for SNI <xref target="RFC6066" pageno="false" format="default"/> is now a MUST, and not a SHOULD.</t>
            <t>Reference <xref target="RFC7457" pageno="false" format="default"/> for the STARTTLS command injection vulnerability.</t>
            <t>Add notes to RFC Editor to ask that [MUA-STS] and [NNTP-COMPRESS] references be changed to their [RFCxxxx] form, once published, and whether [BCP195] should be used instead of [RFC7525].</t>
            <t>Move <xref target="RFC5246" pageno="false" format="default"/> (TLS) to a normative reference.</t>
            <t>Minor other wording improvements.</t>
          </list>
        </t>
      </section>
      <section title="Changes since -00" toc="default">
        <t>
          <list style="symbols">
            <t>Clarify in the introduction of <xref target="recommendations" pageno="false" format="default"/> that NNTP implementations compliant with this document are REQUIRED to also comply with <xref target="RFC7525" pageno="false" format="default"/>.</t>
            <t>Improve the wording of <xref target="tlsversions" pageno="false" format="default"/> to mention that configuration is primarily intended for news servers.  Also, be more consistent in the options to accept, and include signature algorithms and named groups.</t>
          </list>
        </t>
      </section>
    </section>
    <!--history -->
  </back>
</rfc>
