<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.3.24 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc rfcedstyle="yes"?>
<?rfc toc="yes"?>
<?rfc tocindent="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc text-list-symbols="-o*+"?>
<?rfc docmapping="yes"?>

<rfc ipr="pre5378Trust200902" docName="draft-ietf-tls-dtls-rrc-03" category="std" updates="6347">

  <front>
    <title abbrev="DTLS Return Routability Check">Return Routability Check for DTLS 1.2 and DTLS 1.3</title>

    <author initials="H." surname="Tschofenig" fullname="Hannes Tschofenig" role="editor">
      <organization>Arm Limited</organization>
      <address>
        <email>hannes.tschofenig@arm.com</email>
      </address>
    </author>
    <author initials="T." surname="Fossati" fullname="Thomas Fossati" role="editor">
      <organization>Arm Limited</organization>
      <address>
        <email>thomas.fossati@arm.com</email>
      </address>
    </author>

    <date year="2021" month="December" day="21"/>

    <area>Security</area>
    <workgroup>TLS</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document specifies a return routability check for use in context of the
Connection ID (CID) construct for the Datagram Transport Layer Security (DTLS)
protocol versions 1.2 and 1.3.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>In “classical” DTLS, selecting a security context of an incoming DTLS record is
accomplished with the help of the 5-tuple, i.e. source IP address, source port,
transport protocol, destination IP address, and destination port.  Changes to
this 5 tuple can happen for a variety reasons over the lifetime of the DTLS
session.  In the IoT context, NAT rebinding is common with sleepy devices.
Other examples include end host mobility and multi-homing.  Without CID, if the
source IP address and/or source port changes during the lifetime of an ongoing
DTLS session then the receiver will be unable to locate the correct security
context.  As a result, the DTLS handshake has to be re-run.  Of course, it is
not necessary to re-run the full handshake if session resumption is supported
and negotiated.</t>

<t>A CID is an identifier carried in the record layer header of a DTLS datagram
that gives the receiver additional information for selecting the appropriate
security context.  The CID mechanism has been specified in
<xref target="I-D.ietf-tls-dtls-connection-id"/> for DTLS 1.2 and in
<xref target="I-D.ietf-tls-dtls13"/> for DTLS 1.3.</t>

<t>Section 6 of <xref target="I-D.ietf-tls-dtls-connection-id"/> describes how the use of CID
increases the attack surface by providing both on-path and off-path attackers
an opportunity for (D)DoS.  It then goes on describing the steps a DTLS
principal must take when a record with a CID is received that has a source
address (and/or port) different from the one currently associated with the DTLS
connection.  However, the actual mechanism for ensuring that the new peer
address is willing to receive and process DTLS records is left open.  This
document standardizes a return routability check (RRC) as part of the DTLS
protocol itself.</t>

<t>The return routability check is performed by the receiving peer before the
CID-to-IP address/port binding is updated in that peer’s session state
database.  This is done in order to provide more confidence to the receiving
peer that the sending peer is reachable at the indicated address and port.</t>

<t>Note however that, irrespective of CID, if RRC has been successfully negotiated
by the peers, path validation can be used at any time by either endpoint. For
instance, an endpoint might use RRC to check that a peer is still in possession
of its address after a period of quiescence.</t>

</section>
<section anchor="conventions-and-terminology" title="Conventions and Terminology">

<t>The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL
NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”,
“MAY”, and “OPTIONAL” in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<t>This document assumes familiarity with the CID format and protocol defined for
DTLS 1.2 <xref target="I-D.ietf-tls-dtls-connection-id"/> and for DTLS 1.3
<xref target="I-D.ietf-tls-dtls13"/>.  The presentation language used in this document is
described in Section 4 of <xref target="RFC8446"/>.</t>

<t>This document reuses the definition of “anti-amplification limit” from
<xref target="RFC9000"/> to mean three times the amount of data received from an
unvalidated address.  This includes all DTLS records originating from that
source address, excluding discarded ones.</t>

</section>
<section anchor="rrc-extension" title="RRC Extension">

<t>The use of RRC is negotiated via the <spanx style="verb">rrc</spanx> DTLS-only extension.  On connecting,
the client includes the <spanx style="verb">rrc</spanx> extension in its ClientHello if it wishes to use
RRC.  If the server is capable of meeting this requirement, it responds with a
<spanx style="verb">rrc</spanx> extension in its ServerHello.  The <spanx style="verb">extension_type</spanx> value for this
extension is TBD1 and the <spanx style="verb">extension_data</spanx> field of this extension is empty.
The client and server MUST NOT use RRC unless both sides have successfully
exchanged <spanx style="verb">rrc</spanx> extensions.</t>

<t>Note that the RRC extension applies to both DTLS 1.2 and DTLS 1.3.</t>

</section>
<section anchor="the-return-routability-check-message" title="The Return Routability Check Message">

<t>When a record with CID is received that has the source address of the enclosing
UDP datagram different from the one previously associated with that CID, the
receiver MUST NOT update its view of the peer’s IP address and port number with
the source specified in the UDP datagram before cryptographically validating
the enclosed record(s) but instead perform a return routability check.</t>

<figure><artwork><![CDATA[
enum {
    invalid(0),
    change_cipher_spec(20),
    alert(21),
    handshake(22),
    application_data(23),
    heartbeat(24),  /* RFC 6520 */
    return_routability_check(TBD2), /* NEW */
    (255)
} ContentType;

uint64 Cookie;

enum {
    path_challenge(0),
    path_response(1),
    reserved(2..255)
} rrc_msg_type;

struct {
    rrc_msg_type msg_type;
    select (return_routability_check.msg_type) {
        case path_challenge: Cookie;
        case path_response:  Cookie;
    };
} return_routability_check;
]]></artwork></figure>

<t>The newly introduced <spanx style="verb">return_routability_check</spanx> message contains a cookie.  The
cookie is a 8-byte field containing arbitrary data.</t>

<t>The <spanx style="verb">return_routability_check</spanx> message MUST be authenticated and encrypted using
the currently active security context.</t>

</section>
<section anchor="path-validation-procedure" title="Path Validation Procedure">

<t>The receiver that observes the peer’s address or port update MUST stop sending
any buffered application data (or limit the data sent to the unvalidated
address to the anti-amplification limit) and initiate the return routability
check that proceeds as follows:</t>

<t><list style="numbers">
  <t>An unpredictable cookie is placed in a <spanx style="verb">return_routability_check</spanx> message of
type path_challenge;</t>
  <t>The message is sent to the observed new address and a timer T (see
<xref target="timer-choice"/>) is started;</t>
  <t>The peer endpoint, after successfully verifying the received
<spanx style="verb">return_routability_check</spanx> message responds by echoing the cookie value in a
<spanx style="verb">return_routability_check</spanx> message of type path_response;</t>
  <t>When the initiator receives and verifies the <spanx style="verb">return_routability_check</spanx>
message contains the sent cookie, it updates the peer address binding;</t>
  <t>If T expires, or the address confirmation fails, the peer address binding is
not updated.</t>
</list></t>

<t>After this point, any pending send operation is resumed to the bound peer
address.</t>

<t><xref target="path-challenge-reqs"/> and <xref target="path-response-reqs"/> contain the requirements for
the initiator and responder roles, broken down per protocol phase.</t>

<section anchor="path-challenge-reqs" title=" Path Challenge Requirements">

<t><list style="symbols">
  <t>The initiator MAY send multiple <spanx style="verb">return_routability_check</spanx> messages of type
path_challenge to cater for packet loss on the probed path.
  <list style="symbols">
      <t>Each path_challenge SHOULD go into different transport packets.  (Note that
the DTLS implementation may not have control over the packetization done by
the transport layer.)</t>
      <t>The transmission of subsequent path_challenge messages SHOULD be paced to
decrease the chance of loss.</t>
      <t>Each path_challenge message MUST contain random data.</t>
    </list></t>
  <t>The initiator MAY use padding using the record padding mechanism available in
DTLS 1.3 (and in DTLS 1.2, when CID is enabled on the sending direction) up
to the anti-amplification limit to probe if the path MTU (PMTU) for the new
path is still acceptable.</t>
</list></t>

</section>
<section anchor="path-response-reqs" title="Path Response Requirements">

<t><list style="symbols">
  <t>The responder MUST NOT delay sending an elicited path_response message.</t>
  <t>The responder MUST send exactly one path_response messages for each received
path_request.</t>
  <t>The responder MUST send the path_response on the network path where the
corresponding path_challenge has been received, so that validation succeeds
only if the path is functional in both directions.
  <list style="symbols">
      <t>The initiator MUST NOT enforce this behaviour</t>
    </list></t>
  <t>The initiator MUST silently discard any invalid path_response it receives.</t>
</list></t>

<t>Note that RRC does not cater for PMTU discovery on the reverse path.  If the
responder wants to do PMTU discovery using RRC, it should initiate a new path
validation procedure.</t>

</section>
<section anchor="timer-choice" title="Timer Choice">

<t>When setting T, implementations are cautioned that the new path could have a
longer round-trip time (RTT) than the original.</t>

<t>In settings where there is external information about the RTT of the active
path, implementations SHOULD use T = 3xRTT.</t>

<t>If an implementation has no way to obtain information regarding the RTT of the
active path, a value of 1s SHOULD be used.</t>

<t>Profiles for specific deployment environments – for example, constrained
networks <xref target="I-D.ietf-uta-tls13-iot-profile"/> – MAY specify a different, more
suitable value.</t>

</section>
</section>
<section anchor="example" title="Example">

<t>The example TLS 1.3 handshake shown in <xref target="fig-handshake"/> shows a client
and a server negotiating the support for CID and for the RRC extension.</t>

<figure title="Message Flow for Full TLS Handshake" anchor="fig-handshake"><artwork><![CDATA[
       Client                                           Server

Key  ^ ClientHello
Exch | + key_share
     | + signature_algorithms
     | + rrc
     v + connection_id=empty
                               -------->
                                                  ServerHello  ^ Key
                                                 +  key_share  | Exch
                                          + connection_id=100  |
                                                        + rrc  v
                                        {EncryptedExtensions}  ^  Server
                                         {CertificateRequest}  v  Params
                                                {Certificate}  ^
                                          {CertificateVerify}  | Auth
                               <--------           {Finished}  v

     ^ {Certificate}
Auth | {CertificateVerify}
     v {Finished}              -------->
       [Application Data]      <------->  [Application Data]

              +  Indicates noteworthy extensions sent in the
                 previously noted message.

              *  Indicates optional or situation-dependent
                 messages/extensions that are not always sent.

              {} Indicates messages protected using keys
                 derived from a [sender]_handshake_traffic_secret.

              [] Indicates messages protected using keys
                 derived from [sender]_application_traffic_secret_N.
]]></artwork></figure>

<t>Once a connection has been established the client and the server
exchange application payloads protected by DTLS with an unilaterally used
CIDs. In our case, the client is requested to use CID 100 for records
sent to the server.</t>

<t>At some point in the communication interaction the IP address used by
the client changes and, thanks to the CID usage, the security context to
interpret the record is successfully located by the server.  However, the
server wants to test the reachability of the client at his new IP address.</t>

<figure title="Return Routability Example" anchor="fig-rrc-example"><artwork><![CDATA[
      Client                                             Server
      ------                                             ------

      Application Data            ========>
      <CID=100>
      Src-IP=A
      Dst-IP=Z
                                  <========        Application Data
                                                       Src-IP=Z
                                                       Dst-IP=A


                              <<------------->>
                              <<   Some      >>
                              <<   Time      >>
                              <<   Later     >>
                              <<------------->>


      Application Data            ========>
      <CID=100>
      Src-IP=B
      Dst-IP=Z

                                             <<< Unverified IP
                                                 Address B >>

                                  <--------  Return Routability Check
                                             path_challenge(cookie)
                                                    Src-IP=Z
                                                    Dst-IP=B

      Return Routability Check    -------->
      path_response(cookie)
      Src-IP=B
      Dst-IP=Z

                                             <<< IP Address B
                                                 Verified >>


                                  <========        Application Data
                                                       Src-IP=Z
                                                       Dst-IP=B
]]></artwork></figure>

</section>
<section anchor="security-and-privacy-considerations" title="Security and Privacy Considerations">

<t>Note that the return routability checks do not protect against flooding of
third-parties if the attacker is on-path, as the attacker can redirect the
return routability checks to the real peer (even if those datagrams are
cryptographically authenticated).  On-path adversaries can, in general, pose a
harm to connectivity.</t>

</section>
<section anchor="iana-considerations" title="IANA Considerations">

<t>IANA is requested to allocate an entry to the TLS <spanx style="verb">ContentType</spanx>
registry, for the <spanx style="verb">return_routability_check(TBD2)</spanx> defined in this document.
The <spanx style="verb">return_routability_check</spanx> content type is only applicable to DTLS 1.2 and
1.3.</t>

<t>IANA is requested to allocate the extension code point (TBD1) for the <spanx style="verb">rrc</spanx>
extension to the <spanx style="verb">TLS ExtensionType Values</spanx> registry as described in
<xref target="tbl-ext"/>.</t>

<texttable title="rrc entry in the TLS ExtensionType Values registry" anchor="tbl-ext">
      <ttcol align='left'>Value</ttcol>
      <ttcol align='left'>Extension Name</ttcol>
      <ttcol align='left'>TLS 1.3</ttcol>
      <ttcol align='left'>DTLS-Only</ttcol>
      <ttcol align='left'>Recommended</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>TBD1</c>
      <c>rrc</c>
      <c>CH, SH</c>
      <c>Y</c>
      <c>N</c>
      <c>RFC-THIS</c>
</texttable>

</section>
<section anchor="open-issues" title="Open Issues">

<t>Issues against this document are tracked at https://github.com/tlswg/dtls-rrc/issues</t>

</section>
<section anchor="acknowledgments" title="Acknowledgments">

<t>We would like to thank
Achim Kraus,
Hanno Becker,
Hanno Böck,
Manuel Pegourie-Gonnard,
Mohit Sahni and
Rich Salz
for their input to this document.</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>




<reference anchor="I-D.ietf-tls-dtls-connection-id">
   <front>
      <title>Connection Identifiers for DTLS 1.2</title>
      <author fullname="Eric Rescorla">
	 <organization>RTFM, Inc.</organization>
      </author>
      <author fullname="Hannes Tschofenig">
	 <organization>Arm Limited</organization>
      </author>
      <author fullname="Thomas Fossati">
	 <organization>Arm Limited</organization>
      </author>
      <author fullname="Achim Kraus">
	 <organization>Bosch.IO GmbH</organization>
      </author>
      <date month="June" day="22" year="2021" />
      <abstract>
	 <t>   This document specifies the Connection ID (CID) construct for the
   Datagram Transport Layer Security (DTLS) protocol version 1.2.

   A CID is an identifier carried in the record layer header that gives
   the recipient additional information for selecting the appropriate
   security association.  In &quot;classical&quot; DTLS, selecting a security
   association of an incoming DTLS record is accomplished with the help
   of the 5-tuple.  If the source IP address and/or source port changes
   during the lifetime of an ongoing DTLS session then the receiver will
   be unable to locate the correct security context.

   The new ciphertext record format with CID also provides content type
   encryption and record-layer padding.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-tls-dtls-connection-id-13" />
   <format type="TXT" target="https://www.ietf.org/archive/id/draft-ietf-tls-dtls-connection-id-13.txt" />
</reference>



<reference anchor="I-D.ietf-tls-dtls13">
<front>
<title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
<author initials='E' surname='Rescorla' fullname='Eric Rescorla'>
<organization />
</author>
<author initials='H' surname='Tschofenig' fullname='Hannes Tschofenig'>
<organization />
</author>
<author initials='N' surname='Modadugu' fullname='Nagendra Modadugu'>
<organization />
</author>
<date year='2021' month='April' day='30' />
<abstract><t>This document specifies Version 1.3 of the Datagram Transport Layer Security (DTLS) protocol.  DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t><t> The DTLS 1.3 protocol is intentionally based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection/non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t><t> This document obsoletes RFC 6347.</t></abstract>
</front>
<seriesInfo name='Internet-Draft' value='draft-ietf-tls-dtls13-43'/>
<format type='TXT' target='https://www.ietf.org/internet-drafts/draft-ietf-tls-dtls13-43.txt'/>
</reference>



<reference  anchor="RFC2119" target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author initials='S.' surname='Bradner' fullname='S. Bradner'><organization /></author>
<date year='1997' month='March' />
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference  anchor="RFC8174" target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author initials='B.' surname='Leiba' fullname='B. Leiba'><organization /></author>
<date year='2017' month='May' />
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>



<reference  anchor="RFC8446" target='https://www.rfc-editor.org/info/rfc8446'>
<front>
<title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
<author initials='E.' surname='Rescorla' fullname='E. Rescorla'><organization /></author>
<date year='2018' month='August' />
<abstract><t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t><t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t></abstract>
</front>
<seriesInfo name='RFC' value='8446'/>
<seriesInfo name='DOI' value='10.17487/RFC8446'/>
</reference>




    </references>

    <references title='Informative References'>





<reference  anchor="RFC9000" target='https://www.rfc-editor.org/info/rfc9000'>
<front>
<title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
<author initials='J.' surname='Iyengar' fullname='J. Iyengar' role='editor'><organization /></author>
<author initials='M.' surname='Thomson' fullname='M. Thomson' role='editor'><organization /></author>
<date year='2021' month='May' />
<abstract><t>This document defines the core of the QUIC transport protocol.  QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances.  Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t></abstract>
</front>
<seriesInfo name='RFC' value='9000'/>
<seriesInfo name='DOI' value='10.17487/RFC9000'/>
</reference>


<reference anchor="I-D.ietf-uta-tls13-iot-profile">
   <front>
      <title>TLS/DTLS 1.3 Profiles for the Internet of Things</title>
      <author fullname="Hannes Tschofenig">
	 <organization>Arm Limited</organization>
      </author>
      <author fullname="Thomas Fossati">
	 <organization>Arm Limited</organization>
      </author>
      <date month="October" day="25" year="2021" />
      <abstract>
	 <t>   This document is a companion to RFC 7925 and defines TLS/DTLS 1.3
   profiles for Internet of Things devices.  It also updates RFC 7925
   with regards to the X.509 certificate profile.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/thomas-fossati/draft-tls13-iot.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-uta-tls13-iot-profile-03" />
   <format type="TXT" target="https://www.ietf.org/archive/id/draft-ietf-uta-tls13-iot-profile-03.txt" />
</reference>




    </references>


<section anchor="history" title="History">

<t><cref>RFC EDITOR: PLEASE REMOVE THIS SECTION</cref></t>

<t>draft-ietf-tls-dtls-rrc-02</t>

<t><list style="symbols">
  <t>Undo the TLS flags extension for negotiating RRC, use a new extension type</t>
</list></t>

<t>draft-ietf-tls-dtls-rrc-01</t>

<t><list style="symbols">
  <t>Use the TLS flags extension for negotiating RRC</t>
  <t>Enhanced IANA consideration section</t>
  <t>Expanded example section</t>
  <t>Revamp message layout:
  <list style="symbols">
      <t>Use 8-byte fixed size cookies</t>
      <t>Explicitly separate path challenge from response</t>
    </list></t>
</list></t>

<t>draft-ietf-tls-dtls-rrc-00</t>

<t><list style="symbols">
  <t>Draft name changed after WG adoption</t>
</list></t>

<t>draft-tschofenig-tls-dtls-rrc-01</t>

<t><list style="symbols">
  <t>Removed text that overlapped with draft-ietf-tls-dtls-connection-id</t>
</list></t>

<t>draft-tschofenig-tls-dtls-rrc-00</t>

<t><list style="symbols">
  <t>Initial version</t>
</list></t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

