<?xml version="1.0" encoding="UTF-8"?>

<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">

<rfc xmlns:xi="http://www.w3.org/2001/XInclude" docName="draft-ietf-tls-oldversions-deprecate-12" number="8996" ipr="trust200902" updates="3261, 3329, 3436, 3470, 3501, 3552, 3568, 3656, 3749, 3767, 3856, 3871, 3887, 3903, 3943, 3983, 4097, 4111,&zwsp; 4162, 4168, 4217, 4235, 4261, 4279, 4497, 4513, 4531, 4540, 4582, 4616, 4642, 4680, 4681, 4712, 4732, 4743,&zwsp; 4744, 4785, 4791, 4823, 4851, 4964, 4975, 4976, 4992, 5018, 5019, 5023, 5024, 5049, 5054, 5091, 5158, 5216,&zwsp; 5238, 5263, 5281, 5364, 5415, 5422, 5456, 5734, 5878, 5953, 6012, 6042, 6083, 6084, 6176, 6347, 6353, 6367,&zwsp; 6460, 6614, 6739, 6749, 6750, 7030, 7465, 7525, 7562, 7568, 8261, 8422" obsoletes="5469, 7507" submissionType="IETF" category="bcp" consensus="true" xml:lang="en" tocInclude="true" symRefs="true" sortRefs="true"
version="3">

  <!-- xml2rfc v2v3 conversion 3.5.0 -->
  <front>
    <title abbrev="Deprecating TLS 1.0 and TLS 1.1">Deprecating TLS 1.0 and
    TLS 1.1</title>
    <seriesInfo name="RFC" value="8996"/>
    <seriesInfo name="BCP" value="195"/>
    <author fullname="Kathleen Moriarty" initials="K" surname="Moriarty">
      <organization abbrev="CIS">Center for Internet Security (CIS)</organization>
      <address>
        <postal>
          <street/>
          <city>East Greenbush</city>
	  <region>NY</region>
          <country>United States of America</country>
        </postal>
        <email>Kathleen.Moriarty.ietf@gmail.com</email>
      </address>
    </author>
    <author fullname="Stephen Farrell" initials="S." surname="Farrell">
      <organization>Trinity College Dublin</organization>
      <address>
        <postal>
          <street/>
          <city>Dublin</city>
          <region/>
          <code>2</code>
          <country>Ireland</country>
        </postal>
        <phone>+353-1-896-2354</phone>
        <email>stephen.farrell@cs.tcd.ie</email>
      </address>
    </author>
    <date month="March" year="2021"/>
    <area>Security Area</area>
    <workgroup>Internet Engineering Task Force</workgroup>
    <keyword>TLS</keyword>
    <keyword>deprecate</keyword>
    <keyword>TLSv1.0</keyword>
    <keyword>TLSv1.1</keyword>
    <abstract>
      <t>

            This document formally deprecates Transport Layer
            Security (TLS) versions 1.0 (RFC 2246) and 1.1 (RFC 4346).
            Accordingly, those documents have been moved
            to Historic status. These versions lack support for current
            and recommended cryptographic algorithms and mechanisms, and
            various government and industry profiles of applications using
            TLS now mandate avoiding these old TLS versions. TLS version 1.2
            became the recommended version for IETF protocols in 2008
            (subsequently being obsoleted by TLS version 1.3 in 2018), providing
            sufficient time to transition away from older versions.
            Removing support for older versions from implementations reduces the
            attack surface, reduces opportunity for misconfiguration, and
            streamlines library and product maintenance.
      </t>
      <t>This document also deprecates Datagram TLS (DTLS) version 1.0 
      (RFC 4347) but not DTLS version 1.2, and there is no DTLS
      version 1.1.</t>
      <t>This document updates many RFCs that normatively refer to TLS version 1.0 or
      TLS version 1.1, as described herein. This document also updates the best
      practices for TLS usage in RFC 7525; hence, it is part of BCP 195.</t>
    </abstract>
  </front>
  <middle>
    <section numbered="true" toc="default">
      <name>Introduction</name>
      <t>Transport Layer Security (TLS) versions 1.0 <xref target="RFC2246" format="default"/>
      and 1.1 <xref target="RFC4346" format="default"/> were superseded by TLS 1.2 <xref target="RFC5246" format="default"/> in 2008, which has now itself been superseded by
      TLS 1.3 <xref target="RFC8446" format="default"/>. Datagram Transport Layer Security
      (DTLS) version 1.0 <xref target="RFC4347" format="default"/> was superseded by DTLS 1.2
      <xref target="RFC6347" format="default"/> in 2012.  Therefore, it is timely to further
          deprecate TLS 1.0, TLS 1.1, and DTLS 1.0.
      Accordingly, the aforementioned documents have been moved to Historic status.</t>
      <t>Technical reasons for deprecating these versions include:</t>
      <ul spacing="compact">
        <li>They require the implementation of older cipher suites that are no
          longer desirable for cryptographic reasons, e.g., TLS 1.0 makes
          TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA mandatory to implement.</li>
        <li>There is a lack of support for current recommended cipher suites, especially
          authenticated encryption with associated data (AEAD) ciphers, 
	  which were not supported prior to TLS 1.2. Note that
          registry entries for no-longer-desirable ciphersuites remain in the
          registries, but many TLS registries were updated by <xref 
	  target="RFC8447" format="default"/>, which indicates that such entries are not
          recommended by the IETF.</li>
        <li>The integrity of the handshake depends on SHA-1 hash.</li>
        <li>The authentication of the peers depends on SHA-1 signatures.</li>
        <li>Support for four TLS protocol versions increases the likelihood of
          misconfiguration.</li>
        <li>At least one widely used library has plans to drop TLS 1.1 and
          TLS 1.0 support in upcoming releases; products using such libraries
          would need to use older versions of the libraries to support TLS 1.0
          and TLS 1.1, which is clearly undesirable.</li>
      </ul>
      <t>Deprecation of these versions is intended to assist developers as
      additional justification to no longer support older (D)TLS versions and to
      migrate to a minimum of (D)TLS 1.2. Deprecation also assists product teams
      with phasing out support for the older versions, to reduce the attack
      surface and the scope of maintenance for protocols in their
      offerings.</t>
      <section anchor="updates" numbered="true" toc="default">
        <name>RFCs Updated</name>
        <t>This document updates the following RFCs that normatively reference
        TLS 1.0, TLS 1.1, or DTLS 1.0. The update is to obsolete usage of
        these older versions. Fallback to these versions is prohibited
        through this update. Specific references to mandatory minimum protocol
        versions of TLS 1.0 or TLS 1.1 are replaced by TLS 1.2, and references
        to minimum protocol version DTLS 1.0 are replaced by DTLS 1.2.
        Statements that "TLS 1.0 is the most widely deployed version and will
        provide the broadest interoperability" are removed without
        replacement.</t>
	<t>
          <xref target="RFC3261" format="default"/>
          <xref target="RFC3329" format="default"/>
          <xref target="RFC3436" format="default"/>
          <xref target="RFC3470" format="default"/>
          <xref target="RFC3501" format="default"/>
          <xref target="RFC3552" format="default"/>
          <xref target="RFC3568" format="default"/>
          <xref target="RFC3656" format="default"/>
          <xref target="RFC3749" format="default"/>
          <xref target="RFC3767" format="default"/>
          <xref target="RFC3856" format="default"/>
          <xref target="RFC3871" format="default"/>
          <xref target="RFC3887" format="default"/>
          <xref target="RFC3903" format="default"/>
          <xref target="RFC3943" format="default"/>
          <xref target="RFC3983" format="default"/>
          <xref target="RFC4097" format="default"/>
          <xref target="RFC4111" format="default"/>
          <xref target="RFC4162" format="default"/>
          <xref target="RFC4168" format="default"/>
          <xref target="RFC4217" format="default"/>
          <xref target="RFC4235" format="default"/>
          <xref target="RFC4261" format="default"/>
          <xref target="RFC4279" format="default"/>
          <xref target="RFC4497" format="default"/>
          <xref target="RFC4513" format="default"/>
          <xref target="RFC4531" format="default"/>
          <xref target="RFC4540" format="default"/>
          <xref target="RFC4582" format="default"/>
          <xref target="RFC4616" format="default"/>
          <xref target="RFC4642" format="default"/>
          <xref target="RFC4680" format="default"/>
          <xref target="RFC4681" format="default"/>
          <xref target="RFC4712" format="default"/>
          <xref target="RFC4732" format="default"/>
          <xref target="RFC4785" format="default"/>
          <xref target="RFC4791" format="default"/>
          <xref target="RFC4823" format="default"/>
          <xref target="RFC4851" format="default"/>
          <xref target="RFC4964" format="default"/>
          <xref target="RFC4975" format="default"/>
          <xref target="RFC4976" format="default"/>
          <xref target="RFC4992" format="default"/>
          <xref target="RFC5018" format="default"/>
          <xref target="RFC5019" format="default"/>
          <xref target="RFC5023" format="default"/>
          <xref target="RFC5024" format="default"/>
          <xref target="RFC5049" format="default"/>
          <xref target="RFC5054" format="default"/>
          <xref target="RFC5091" format="default"/>
	  <xref target="RFC5158" format="default"/>
          <xref target="RFC5216" format="default"/>
          <xref target="RFC5238" format="default"/>
          <xref target="RFC5263" format="default"/>
          <xref target="RFC5281" format="default"/>
          <xref target="RFC5364" format="default"/>
          <xref target="RFC5415" format="default"/>
          <xref target="RFC5422" format="default"/>
          <xref target="RFC5456" format="default"/>
          <xref target="RFC5734" format="default"/>
          <xref target="RFC5878" format="default"/>
          <xref target="RFC6012" format="default"/>
          <xref target="RFC6042" format="default"/>
          <xref target="RFC6083" format="default"/>
          <xref target="RFC6084" format="default"/>
          <xref target="RFC6176" format="default"/>
          <xref target="RFC6353" format="default"/>
          <xref target="RFC6367" format="default"/>
          <xref target="RFC6739" format="default"/>
          <xref target="RFC6749" format="default"/>
          <xref target="RFC6750" format="default"/>
          <xref target="RFC7030" format="default"/>
          <xref target="RFC7465" format="default"/>
          <xref target="RFC7525" format="default"/>
          <xref target="RFC7562" format="default"/>
          <xref target="RFC7568" format="default"/>
          <xref target="RFC8261" format="default"/>
          <xref target="RFC8422" format="default"/>
	</t>
        <t>The status of <xref target="RFC7562" format="default"/>, <xref target="RFC6042" format="default"/>,
		<xref target="RFC5456" format="default"/>, <xref target="RFC5024" format="default"/>,
		<xref target="RFC4540" format="default"/>, and <xref target="RFC3656" format="default"/> will be
		updated with permission of the Independent Submissions Editor.
        </t>
        <t>In addition, these RFCs normatively refer to TLS 1.0 or TLS 1.1 and
        have already been obsoleted; they are still listed here and marked as
        updated by this document in order to reiterate that any usage of the
            obsolete protocol should use modern TLS: 
	        <xref target="RFC3316" format="default"/>,
	        <xref target="RFC3489" format="default"/>, 
	        <xref target="RFC3546" format="default"/>,
	        <xref target="RFC3588" format="default"/>, 
                <xref target="RFC3734" format="default"/>, 
		<xref target="RFC3920" format="default"/>, 
		<xref target="RFC4132" format="default"/>, 
		<xref target="RFC4244" format="default"/>,
		<xref target="RFC4347" format="default"/>,
		<xref target="RFC4366" format="default"/>, 
		<xref target="RFC4492" format="default"/>,
		<xref target="RFC4507" format="default"/>,
		<xref target="RFC4572" format="default"/>,
		<xref target="RFC4582" format="default"/>, 
		<xref target="RFC4934" format="default"/>,
		<xref target="RFC5077" format="default"/>, 
		<xref target="RFC5081" format="default"/>, 
		<xref target="RFC5101" format="default"/>, and
		<xref target="RFC5953" format="default"/>.</t>
        <t>Note that <xref target="RFC4642" format="default"/> has already been
        updated by <xref target="RFC8143" format="default"/>, which makes an overlapping, but
        not quite identical, update as this document.</t>
        <t><xref target="RFC6614" format="default"/> has a requirement for TLS 1.1 or later, although it
            only makes an informative reference to <xref target="RFC4346" format="default"/>.
            This requirement is updated to be for TLS 1.2 or later.</t>
        <t><xref target="RFC6460" format="default"/>, <xref target="RFC4744" format="default"/>, and <xref target="RFC4743" format="default"/>
	are already Historic; they are still listed here and marked as
        updated by this document in order to reiterate that any usage of the
        obsolete protocol should use modern TLS.</t>
        <t>This document updates DTLS <xref target="RFC6347" format="default"/>.  <xref target="RFC6347" format="default"/> had allowed for negotiating the use of DTLS 1.0,
        which is now forbidden.</t>
        <t>The DES and International Data Encryption Algorithm (IDEA) cipher suites 
	specified in <xref
	target="RFC5469" format="default"/> were specifically removed from TLS 1.2 by
        <xref target="RFC5246" format="default"/>; since the only versions of TLS for which
        their usage is defined are now Historic, <xref target="RFC5469" format="default"/> has been
        moved to Historic as well.</t>
        <t>The version-fallback Signaling Cipher Suite Value specified in
        <xref target="RFC7507" format="default"/> was defined to detect when a given client
        and server negotiate a lower version of (D)TLS than their highest
        shared version.  TLS 1.3 (<xref target="RFC8446" format="default"/>) incorporates a
        different mechanism that achieves this purpose, via sentinel values in
        the ServerHello.Random field.  With (D)TLS versions prior to 1.2 fully
        deprecated, the only way for (D)TLS implementations to negotiate a
        lower version than their highest shared version would be to negotiate
        (D)TLS 1.2 while supporting (D)TLS 1.3; supporting (D)TLS 1.3 implies
        support for the ServerHello.Random mechanism.  Accordingly, the
        functionality from <xref target="RFC7507" format="default"/> has been superseded, and
        this document marks it as Obsolete.</t>
      </section>
      <section numbered="true" toc="default">
        <name>Terminology</name>
        <t>
    The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
    NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
    "<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
    described in BCP&nbsp;14 <xref target="RFC2119"/> <xref target="RFC8174"/> 
    when, and only when, they appear in all capitals, as shown here.
        </t>
      </section>
    </section>
    <section numbered="true" toc="default" anchor="support">
      <name>Support for Deprecation</name>
      <t>Specific details on attacks against TLS 1.0 and TLS 1.1, as well as
      their mitigations, are provided in <xref target="NIST800-52r2" format="default"/>,
      <xref target="RFC7457" format="default"/>, and other
      RFCs referenced therein. Although mitigations for the current known
      vulnerabilities have been developed, any future issues discovered in old
      protocol versions might not be mitigated in older library versions when
      newer library versions do not support those old protocols.</t>
      <t>For example, NIST has provided the following rationale, copied with
      permission from Section 1.1, "History of TLS", of <xref target="NIST800-52r2" format="default"></xref>: 
      </t>
<blockquote>
        <t>TLS 1.1, specified in RFC 4346 [24], was developed to
          address weaknesses discovered in TLS 1.0, primarily in the areas of
          initialization vector selection and padding error processing.
          Initialization vectors were made explicit to prevent a certain class
          of attacks on the Cipher Block Chaining (CBC) mode of operation used
          by TLS. The handling of padding errors was altered to treat a
          padding error as a bad message authentication code rather than a
          decryption failure. In addition, the TLS 1.1 RFC acknowledges
          attacks on CBC mode that rely on the time to compute the message
          authentication code (MAC). The TLS 1.1 specification states that to
          defend against such attacks, an implementation must process records
          in the same manner regardless of whether padding errors exist.
          Further implementation considerations for CBC modes (which were not
          included in RFC 4346 [24]) are discussed in
          Section 3.3.2.</t>
        <t>TLS 1.2, specified in RFC 5246 [25], made
          several cryptographic enhancements, particularly in the area of hash
          functions, with the ability to use or specify the SHA-2 family of
          algorithms for hash, MAC, and Pseudorandom Function (PRF)
          computations. TLS 1.2 also adds authenticated encryption with
          associated data (AEAD) cipher suites.</t>
        <t>TLS 1.3, specified in RFC 8446 [57],
          represents a significant change to TLS that aims to address threats
          that have arisen over the years.  Among the changes are a new handshake protocol, a new key derivation process that uses the HMAC-based Extract-and-Expand Key Derivation Function (HKDF) [37], and the removal of cipher suites that use RSA key transport or static Diffie-Hellman ( DH) [sic] key exchanges, the CBC mode of operation, or SHA-1. Many extensions defined for use with TLS 1.2 and previous versions cannot be used with TLS 1.3.</t>
	</blockquote>
    </section>
    <section numbered="true" toc="default" anchor="sha-1">
      <name>SHA-1 Usage Problematic in TLS 1.0 and TLS 1.1</name>
      <t>The integrity of both TLS 1.0 and TLS 1.1 depends on a running SHA-1
      hash of the exchanged messages. This makes it possible to perform a
      downgrade attack on the handshake by an attacker able to perform 2<sup>77</sup>
      operations, well below the acceptable modern security margin.</t>
      <t>Similarly, the authentication of the handshake depends on signatures
      made using a SHA-1 hash or a concatenation of MD5 and SHA-1
      hashes that is not appreciably stronger than a SHA-1 hash, allowing the attacker to impersonate a server when it is able to
      break the severely weakened SHA-1 hash.</t>
      <t>Neither TLS 1.0 nor TLS 1.1 allows the peers to select a stronger hash
      for signatures in the ServerKeyExchange or CertificateVerify messages,
      making the only upgrade path the use of a newer protocol version.</t>
      <t>See <xref target="Bhargavan2016" format="default"/> for additional details.</t>
    </section>
    <section numbered="true" toc="default">
      <name>Do Not Use TLS 1.0</name>
      <t>TLS 1.0 <bcp14>MUST NOT</bcp14> be used.
      Negotiation of TLS 1.0 from any version of TLS <bcp14>MUST NOT</bcp14> be
      permitted.</t>
      <t>Any other version of TLS is more secure than TLS 1.0. While TLS 1.0 can be
      configured to prevent some types of interception, using the highest version
      available is preferred.</t>
      <t>Pragmatically, clients <bcp14>MUST NOT</bcp14> send a ClientHello with
      ClientHello.client_version set to {03,01}.&nbsp; Similarly, servers <bcp14>MUST NOT</bcp14>
      send a ServerHello with ServerHello.server_version set to {03,01}.&nbsp; Any
      party receiving a Hello message with the protocol version set to {03,01}
      <bcp14>MUST</bcp14> respond with a "protocol_version" alert message and close the
      connection.</t>
      <t>Historically, TLS specifications were not clear on what the record
      layer version number (TLSPlaintext.version) could contain when sending
      a ClientHello message. <xref target="RFC5246" sectionFormat="of" section="E"/> notes that TLSPlaintext.version
      could be selected to maximize interoperability, though no definitive
      value is identified as ideal. That guidance is still applicable;
      therefore, TLS servers <bcp14>MUST</bcp14> accept any value {03,XX} (including {03,00})
      as the record layer version number for ClientHello, but they <bcp14>MUST NOT</bcp14>
      negotiate TLS 1.0.</t>
    </section>
    <section numbered="true" toc="default">
      <name>Do Not Use TLS 1.1</name>
      <t>TLS 1.1 <bcp14>MUST NOT</bcp14> be used. Negotiation of TLS 1.1 from any version of
      TLS <bcp14>MUST NOT</bcp14> be permitted.</t>
      <t>Pragmatically, clients <bcp14>MUST NOT</bcp14> send a ClientHello with
      ClientHello.client_version set to {03,02}.&nbsp; Similarly, servers <bcp14>MUST NOT</bcp14>
      send a ServerHello with ServerHello.server_version set to {03,02}.&nbsp; Any
      party receiving a Hello message with the protocol version set to {03,02}
      <bcp14>MUST</bcp14> respond with a "protocol_version" alert message and close the
      connection.</t>
      <t>Any newer version of TLS is more secure than TLS 1.1. While TLS 1.1 can be
      configured to prevent some types of interception, using the highest version
      available is preferred. Support for TLS 1.1 is dwindling in libraries
      and will impact security going forward if mitigations for attacks cannot
      be easily addressed and supported in older libraries.</t>
      <t>Historically, TLS specifications were not clear on what the record
      layer version number (TLSPlaintext.version) could contain when sending
      a ClientHello message. <xref target="RFC5246" sectionFormat="of" section="E"/> notes that TLSPlaintext.version
      could be selected to maximize interoperability, though no definitive
      value is identified as ideal. That guidance is still applicable;
      therefore, TLS servers <bcp14>MUST</bcp14> accept any value {03,XX} (including {03,00})
      as the record layer version number for ClientHello, but they <bcp14>MUST NOT</bcp14>
      negotiate TLS 1.1.</t>
    </section>
    <section numbered="true" toc="default">
      <name>Updates to RFC 7525</name>
      <t><xref target="RFC7525" format="default">"Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)"</xref>  is BCP 195, which is the
      most recent Best Current Practice for implementing TLS and was based on
      TLS 1.2. At the time of publication, TLS 1.0 and TLS 1.1 had not yet
      been deprecated. As such, BCP 195 is called out specifically to
      update text implementing the deprecation recommendations of this
      document.</t>
      <t>This document updates <xref target="RFC7525" sectionFormat="of" section="3.1.1"/> by
      changing <bcp14>SHOULD NOT</bcp14> to <bcp14>MUST NOT</bcp14> as follows:</t>
      <ul spacing="normal">
        <li>
          <t>Implementations <bcp14>MUST NOT</bcp14> negotiate TLS version 1.0 <xref
	  target="RFC2246" format="default"/>.</t>
          <t> Rationale: TLS 1.0
          (published in 1999) does not support many modern, strong cipher
          suites. In addition, TLS 1.0 lacks a per-record Initialization
          Vector (IV) for CBC-based cipher suites and does not warn against
          common padding errors. </t>
        </li>
        <li>
          <t>Implementations <bcp14>MUST NOT</bcp14> negotiate TLS version 1.1 <xref
	  target="RFC4346" format="default"/>. </t>
          <t> Rationale: TLS 1.1
          (published in 2006) is a security improvement over TLS 1.0 but still
          does not support certain stronger cipher suites.</t>
        </li>
      </ul>
      <t>This document updates <xref target="RFC7525" sectionFormat="of" section="3.1.2"/> by
      changing <bcp14>SHOULD NOT</bcp14> to <bcp14>MUST NOT</bcp14> and adding a reference to RFC 6347 as follows:</t>
      <ul spacing="normal">
        <li>
          <t>Implementations <bcp14>MUST NOT</bcp14> negotiate DTLS version 1.0 <xref
	  target="RFC4347" format="default"/> <xref target="RFC6347" format="default"/>. </t>
          <t> Version 1.0 of DTLS correlates to version 1.1 of
          TLS (see above).</t>
        </li>
      </ul>
    </section>
    <section numbered="true" toc="default">
      <name>Operational Considerations</name>
      <t>
	
            This document is part of BCP 195 and, as such, reflects the
            understanding of the IETF (at the time of this document's publication) as to the
            best practices for TLS and DTLS usage.
      </t>
      <t>
            Though TLS 1.1 has been obsolete since the publication of <xref 
	    target="RFC5246" format="default"/>
            in 2008, and DTLS 1.0 has been obsolete since the publication of <xref 
	    target="RFC6347" format="default"/> in 2012, there may remain some 
	    systems in operation that do not
            support (D)TLS 1.2 or higher. Adopting the practices recommended by
            this document for any systems that need to communicate with the
            aforementioned class of systems will cause failure to interoperate.
            However, disregarding the recommendations of this document in order
            to continue to interoperate with the aforementioned class of systems
            incurs some amount of risk. The nature of the risks incurred by
            operating in contravention to the recommendations of this document
            are discussed in Sections <xref target="support" format="counter"/> and 
	    <xref target="sha-1" format="counter"/>, and knowledge of those risks
            should be used along with any potential mitigating factors and the
            risks inherent to updating the systems in question when deciding how
            quickly to adopt the recommendations specified in this document.
      </t>
    </section>
    <section numbered="true" toc="default">
      <name>Security Considerations</name>
      <t>This document deprecates two older TLS protocol versions and one older
      DTLS protocol version for security
      reasons already described. The attack surface is reduced when there are
      a smaller number of supported protocols and fallback options are
      removed.</t>
    </section>

    <section numbered="true" toc="default">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.2246.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4346.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.7525.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8422.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.7568.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.7562.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.7507.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.7465.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.7030.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.6750.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.6749.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.6739.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.6353.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.6367.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.6176.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.6042.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.5953.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.5878.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.5734.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.5469.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.5422.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.5364.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.5281.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.5263.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.5238.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.5216.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.5158.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.5091.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.5054.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.5049.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.5024.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.5023.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.5019.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.5018.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4992.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4976.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4975.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4964.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4851.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4823.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4791.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4785.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4744.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4743.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4732.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4712.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4681.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4680.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4642.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4616.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4582.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4540.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4531.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4513.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4497.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4279.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4261.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4235.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4217.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4168.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4162.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4111.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4097.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.3983.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.3943.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.3903.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.3887.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.3871.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.3856.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.3767.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.3749.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.3656.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.3568.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.3552.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.3501.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.3470.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.3436.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.3329.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.3261.xml"/>
      </references>
      <references>
        <name>Informative References</name>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.7457.xml"/>
      <reference anchor="NIST800-52r2" target="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-52r2.pdf">
          <front>
            <title>Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations NIST SP800-52r2</title>
            <author>
              <organization>National Institute of Standards and
            Technology</organization>
            </author>
            <date month="August" year="2019"/>
          </front>
	  <seriesInfo name="DOI" value="10.6028/NIST.SP.800-52r2"/>
        </reference>
      <reference anchor="Bhargavan2016" target="https://www.mitls.org/downloads/transcript-collisions.pdf">
          <front>
            <title>Transcript Collision Attacks: Breaking Authentication in TLS,
          IKE, and SSH</title>
            <author fullname="Karthikeyan Bhargavan" initials="K." surname="Bhargavan">
              <organization>INRIA</organization>
            </author>
            <author fullname="Gaetan Leuren" initials="G." surname="Leuren">
              <organization>INRIA</organization>
            </author>
            <date month="February" year="2016"/>
          </front>
	  <seriesInfo name="DOI" value="10.14722/ndss.2016.23418"/>
        </reference>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.5246.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.6347.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.6460.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.6084.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.6083.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.6012.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.5456.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.5415.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8143.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8261.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8446.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8447.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.5101.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.5081.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.5077.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4934.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4572.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4507.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4492.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4366.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4347.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4244.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4132.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.3920.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.3734.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.3588.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.3546.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.3489.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.3316.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.6614.xml"/>
      </references>
    </references>
    <section numbered="false" toc="default">
      <name>Acknowledgements</name>
      <t>Thanks to those that provided usage data and reviewed and/or improved
          this document, including: <contact fullname="Michael Ackermann"/>, <contact 
	  fullname="David Benjamin"/>, <contact fullname="David Black"/>, 
        <contact fullname="Deborah Brungard"/>, <contact fullname="Alan DeKok"/>, <contact
	fullname="Viktor Dukhovni"/>, <contact fullname="Julien Élie"/>,
        <contact fullname="Adrian Farrelll"/>, <contact fullname="Gary Gapinski"/>, <contact
	fullname="Alessandro Ghedini"/>, <contact fullname="Peter
        Gutmann"/>, <contact fullname="Jeremy Harris"/>, <contact fullname="Nick Hilliard"/>,
	<contact fullname="James Hodgkinson"/>, <contact fullname="Russ Housley"/>, <contact
	fullname="Hubert Kario"/>, <contact
	  fullname="Benjamin Kaduk"/>, <contact fullname="John Klensin"/>, 
          <contact fullname="Watson Ladd"/>, <contact fullname="Eliot Lear"/>, <contact
	  fullname="Ted Lemon"/>,
	  <contact fullname="John Mattsson"/>, <contact fullname="Keith Moore"/>, <contact
	  fullname="Tom
        Petch"/>, <contact fullname="Eric Mill"/>, <contact fullname="Yoav Nir"/>, <contact
	fullname="Andrei
	Popov"/>, <contact fullname="Michael Richardson"/>, <contact fullname="Eric
        Rescorla"/>, <contact fullname="Rich Salz"/>, <contact fullname="Mohit Sethi"/>, <contact
	fullname="Yaron Sheffer"/>, <contact fullname="Rob Sayre"/>,
        <contact fullname="Robert Sparks"/>, <contact fullname="Barbara Stark"/>, <contact
	fullname="Martin Thomson"/>, <contact fullname="Sean Turner"/>,
        <contact fullname="Loganaden Velvindron"/>, <contact fullname="Jakub Wilk"/>, and <contact
	fullname="Christopher Wood"/>.
      </t>
    </section>
  </back>
</rfc>
