<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.2.12 -->
<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc-ext html-pretty-print="prettyprint https://cdn.rawgit.com/google/code-prettify/master/loader/run_prettify.js"?>
<rfc xmlns:x="http://purl.org/net/xml2rfc/ext"
     category="std"
     docName="draft-ietf-httpbis-http2-tls13-03"
     ipr="trust200902"
     submissionType="IETF"
     updates="7540">
   <x:feedback template="mailto:quic@ietf.org?subject={docname},%20%22{section}%22\&amp;amp;body=%3c{ref}%3e:"/>
   <front>
      <title>Using TLS 1.3 with HTTP/2</title>
      <author fullname="David Benjamin" initials="D." surname="Benjamin">
         <organization>Google LLC</organization>
         <address>
            <email>davidben@google.com</email>
         </address>
      </author>
      <date day="17" month="October" year="2019"/>
      <area>Applications and Real-Time</area>
      <workgroup>HTTP</workgroup>
      <abstract>
         <t>This document updates RFC 7540 by forbidding TLS 1.3 post-handshake authentication, as an analog to the existing TLS 1.2 renegotiation restriction.</t>
      </abstract>
      <note title="Note to Readers">
         <t>
            <spanx>RFC EDITOR: please remove this section before publication</spanx>
         </t>
         <t>Discussion of this draft takes place on the HTTP working group mailing list (ietf-http-wg@w3.org), which is archived at <eref target="https://lists.w3.org/Archives/Public/ietf-http-wg/">https://lists.w3.org/Archives/Public/ietf-http-wg/</eref>.</t>
         <t>Working Group information can be found at <eref target="https://httpwg.org/">https://httpwg.org/</eref>; source code and issues list for this draft can be found at <eref target="https://github.com/httpwg/http-extensions/labels/http2-tls13">https://github.com/httpwg/http-extensions/labels/http2-tls13</eref>.</t>
      </note>
   </front>
   <middle>
      <section anchor="introduction" title="Introduction">
         <t>TLS 1.2 <xref target="RFC5246"/> and earlier support renegotiation, a mechanism for changing parameters and keys partway through a connection. This was sometimes used to implement reactive client authentication in HTTP/1.1 <xref target="RFC7230"/>, where the server decides whether to request a client certificate based on the HTTP request.</t>
         <t>HTTP/2 <xref target="RFC7540"/> multiplexes multiple HTTP requests over a single connection, which is incompatible with the mechanism above. Clients cannot correlate the certificate request with the HTTP request which triggered it. Thus, <xref target="RFC7540" x:fmt="of" x:sec="9.2.1"/> forbids renegotiation.</t>
         <t>TLS 1.3 <xref target="RFC8446"/> updates TLS 1.2 to remove renegotiation in favor of separate post-handshake authentication and key update mechanisms. The former shares the same problems with multiplexed protocols, but the prohibition in <xref target="RFC7540"/> only applies to TLS 1.2 renegotiation.</t>
         <t>This document updates HTTP/2 to similarly forbid TLS 1.3 post-handshake authentication.</t>
      </section>
      <section anchor="requirements-language" title="Requirements Language">
         <t>The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”, “MAY”, and “OPTIONAL” in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/>
            <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>
      </section>
      <section anchor="post-handshake-authentication-in-http2"
               title="Post-Handshake Authentication in HTTP/2">
         <t>HTTP/2 servers MUST NOT send post-handshake TLS 1.3 CertificateRequest messages. HTTP/2 clients MUST treat such messages as connection errors (see <xref target="RFC7540" x:fmt="of" x:sec="5.4.1"/>) of type PROTOCOL_ERROR.</t>
         <t>
            <xref target="RFC7540"/> permitted renegotiation before the HTTP/2 connection preface to provide confidentiality of the client certificate. TLS 1.3 encrypts the client certificate in the initial handshake, so this is no longer necessary. HTTP/2 servers MUST NOT send post-handshake TLS 1.3 CertificateRequest messages before the connection preface.</t>
         <t>The above applies even if the client offered the <spanx style="verb">post_handshake_auth</spanx> TLS extension. This extension is advertised independently of the selected ALPN protocol <xref target="RFC7301"/>, so it is not sufficient to resolve the conflict with HTTP/2. HTTP/2 clients that also offer other ALPN protocols, notably HTTP/1.1, in a TLS ClientHello MAY include the <spanx style="verb">post_handshake_auth</spanx> extension to support those other protocols. This does not indicate support in HTTP/2.</t>
      </section>
      <section anchor="other-post-handshake-tls-messages-in-http2"
               title="Other Post-Handshake TLS Messages in HTTP/2">
         <t>
            <xref target="RFC8446"/> defines two other messages that are exchanged after the handshake is complete, KeyUpdate and NewSessionTicket.</t>
         <t>KeyUpdate messages only affect TLS itself and do not require any interaction with the application protocol. HTTP/2 implementations MUST support key updates when TLS 1.3 is negotiated.</t>
         <t>NewSessionTicket messages are also permitted. Though these interact with HTTP when early data is enabled, these interactions are defined in <xref target="RFC8470"/> and allowed for in the design of HTTP/2.</t>
         <t>Unless the use of a new type of TLS message depends on an interaction with the application-layer protocol, that TLS message can be sent after the handshake completes.</t>
      </section>
      <section anchor="security-considerations" title="Security Considerations">
         <t>This document resolves a compatibility concern between HTTP/2 and TLS 1.3 when supporting post-handshake authentication with HTTP/1.1. This lowers the barrier for deploying TLS 1.3, a major security improvement over TLS 1.2.</t>
      </section>
      <section anchor="iana-considerations" title="IANA Considerations">
         <t>This document has no IANA actions.</t>
      </section>
   </middle>
   <back>
      <references title="Normative References">
         <reference anchor="RFC2119">
            <front>
               <title>Key words for use in RFCs to Indicate Requirement Levels</title>
               <author fullname="S. Bradner" initials="S." surname="Bradner"/>
               <date month="March" year="1997"/>
            </front>
            <seriesInfo name="BCP" value="14"/>
            <seriesInfo name="RFC" value="2119"/>
            <seriesInfo name="DOI" value="10.17487/RFC2119"/>
         </reference>
         <reference anchor="RFC5246">
            <front>
               <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
               <author fullname="T. Dierks" initials="T." surname="Dierks"/>
               <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
               <date month="August" year="2008"/>
            </front>
            <seriesInfo name="RFC" value="5246"/>
            <seriesInfo name="DOI" value="10.17487/RFC5246"/>
         </reference>
         <reference anchor="RFC7230">
            <front>
               <title>Hypertext Transfer Protocol (HTTP/1.1): Message Syntax and Routing</title>
               <author fullname="R. Fielding"
                       initials="R."
                       role="editor"
                       surname="Fielding"/>
               <author fullname="J. Reschke"
                       initials="J."
                       role="editor"
                       surname="Reschke"/>
               <date month="June" year="2014"/>
            </front>
            <seriesInfo name="RFC" value="7230"/>
            <seriesInfo name="DOI" value="10.17487/RFC7230"/>
         </reference>
         <reference anchor="RFC7301">
            <front>
               <title>Transport Layer Security (TLS) Application-Layer Protocol Negotiation Extension</title>
               <author fullname="S. Friedl" initials="S." surname="Friedl"/>
               <author fullname="A. Popov" initials="A." surname="Popov"/>
               <author fullname="A. Langley" initials="A." surname="Langley"/>
               <author fullname="E. Stephan" initials="E." surname="Stephan"/>
               <date month="July" year="2014"/>
            </front>
            <seriesInfo name="RFC" value="7301"/>
            <seriesInfo name="DOI" value="10.17487/RFC7301"/>
         </reference>
         <reference anchor="RFC7540">
            <front>
               <title>Hypertext Transfer Protocol Version 2 (HTTP/2)</title>
               <author fullname="M. Belshe" initials="M." surname="Belshe"/>
               <author fullname="R. Peon" initials="R." surname="Peon"/>
               <author fullname="M. Thomson"
                       initials="M."
                       role="editor"
                       surname="Thomson"/>
               <date month="May" year="2015"/>
            </front>
            <seriesInfo name="RFC" value="7540"/>
            <seriesInfo name="DOI" value="10.17487/RFC7540"/>
         </reference>
         <reference anchor="RFC8446">
            <front>
               <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
               <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
               <date month="August" year="2018"/>
            </front>
            <seriesInfo name="RFC" value="8446"/>
            <seriesInfo name="DOI" value="10.17487/RFC8446"/>
         </reference>
         <reference anchor="RFC8174">
            <front>
               <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
               <author fullname="B. Leiba" initials="B." surname="Leiba"/>
               <date month="May" year="2017"/>
            </front>
            <seriesInfo name="BCP" value="14"/>
            <seriesInfo name="RFC" value="8174"/>
            <seriesInfo name="DOI" value="10.17487/RFC8174"/>
         </reference>
      </references>
      <references title="Informative References">
         <reference anchor="RFC8470">
            <front>
               <title>Using Early Data in HTTP</title>
               <author fullname="M. Thomson" initials="M." surname="Thomson"/>
               <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
               <author fullname="W. Tarreau" initials="W." surname="Tarreau"/>
               <date month="September" year="2018"/>
            </front>
            <seriesInfo name="RFC" value="8470"/>
            <seriesInfo name="DOI" value="10.17487/RFC8470"/>
         </reference>
      </references>
   </back>
</rfc>
