BCP 195

RFC 9325

Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS), November 2022

File formats:

icon for HTML icon for text file icon for v3pdf icon for XML
Also available: XML file for editing
 
Status:
BEST CURRENT PRACTICE
Obsoletes:
RFC 7525
Updates:
RFC 5288, RFC 6066
Authors:
Y. Sheffer
P. Saint-Andre
T. Fossati
Stream:
IETF
Source:
uta (sec)

Cite this RFC: TXT  |  XML  |   BibTeX

DOI:  https://doi.org/10.17487/RFC9325

Discuss this RFC: Send questions or comments to the mailing list uta@ietf.org

Other actions: Submit Errata  |  Find IPR Disclosures from the IETF  |  View History of RFC 9325


Abstract

Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are used to protect data exchanged over a wide range of application protocols and can also form the basis for secure transport protocols. Over the years, the industry has witnessed several serious attacks on TLS and DTLS, including attacks on the most commonly used cipher suites and their modes of operation. This document provides the latest recommendations for ensuring the security of deployed services that use TLS and DTLS. These recommendations are applicable to the majority of use cases.

RFC 7525, an earlier version of the TLS recommendations, was published when the industry was transitioning to TLS 1.2. Years later, this transition is largely complete, and TLS 1.3 is widely available. This document updates the guidance given the new environment and obsoletes RFC 7525. In addition, this document updates RFCs 5288 and 6066 in view of recent attacks.


For the definition of Status, see RFC 2026.

For the definition of Stream, see RFC 8729.




Advanced Search