<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-tsvwg-sctp-dtls-chunk-00" category="std" consensus="true" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.0 -->
  <front>
    <title abbrev="SCTP DTLS Chunk">Stream Control Transmission Protocol (SCTP) DTLS Chunk</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-tsvwg-sctp-dtls-chunk-00"/>
    <author initials="M." surname="Westerlund" fullname="Magnus Westerlund">
      <organization>Ericsson</organization>
      <address>
        <email>magnus.westerlund@ericsson.com</email>
      </address>
    </author>
    <author initials="J." surname="Preuß Mattsson" fullname="John Preuß Mattsson">
      <organization>Ericsson</organization>
      <address>
        <email>john.mattsson@ericsson.com</email>
      </address>
    </author>
    <author initials="C." surname="Porfiri" fullname="Claudio Porfiri">
      <organization>Ericsson</organization>
      <address>
        <email>claudio.porfiri@ericsson.com</email>
      </address>
    </author>
    <author initials="M." surname="Tüxen" fullname="Michael Tüxen">
      <organization abbrev="Münster Univ. of Appl. Sciences">Münster University of Applied Sciences</organization>
      <address>
        <postal>
          <street>Stegerwaldstrasse 39</street>
          <city>Steinfurt</city>
          <code>48565</code>
          <country>Germany</country>
        </postal>
        <email>tuexen@fh-muenster.de</email>
      </address>
    </author>
    <date year="2025" month="August" day="27"/>
    <area>Transport</area>
    <workgroup>TSVWG</workgroup>
    <abstract>
      <?line 89?>

<t>This document describes a method for adding Cryptographic protection
to the Stream Control Transmission Protocol (SCTP). The SCTP DTLS
chunk defined in this document is intended to enable communications
privacy for applications that use SCTP as their transport protocol and
allows applications to communicate in a way that is designed to
prevent eavesdropping and detect tampering or message forgery.</t>
      <t>Applications using SCTP DTLS chunk can use all transport
features provided by SCTP and its extensions but with some limitations.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-tsvwg-sctp-dtls-chunk/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Transport Area Working Group (tsvwg) Working Group mailing list (<eref target="mailto:tsvwg@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tsvwg/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tsvwg/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/gloinul/draft-westerlund-tsvwg-sctp-DTLS-chunk"/>.</t>
    </note>
  </front>
  <middle>
    <?line 101?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This document defines a DTLS chunk for the Stream Control
   Transmission Protocol (SCTP), as defined in <xref target="RFC9260"/>.</t>
      <t>This specification defines the actual DTLS chunk, how to enable
   its usage, how it interacts with the SCTP association establishment
   to enable endpoint authentication, key-establishment, and key
   updates.</t>
      <t>The DTLS chunk is designed to enable mutual
   authentication of endpoints, data confidentiality, data origin
   authentication, data integrity protection, and data replay
   protection for SCTP packets after the SCTP association has been
   established. It is dependent on a key management function that is
   defined separately to achieve all these capabilities. The
   key management function uses an API to provision the SCTP
   association's DTLS chunk protection with key-material to enable and
   rekey the protection operations.</t>
      <t>Applications using SCTP DTLS chunk can use most transport features
   provided by SCTP and its extensions. However, there can be some
   limitations or additional requirements for them to function such as
   those noted for SCTP restart and use of Dynamic Address
   Reconfiguration, see <xref target="sec-asconf"/> and <xref target="sec-restart"/>. Due to its
   level of integration as discussed in next section it will provide
   its security functions on all content of the SCTP packet, and will
   thus not impact the potential to utilize any SCTP functionalities
   or extensions that are possible to use between two SCTP peers with
   full security and SCTP association state.</t>
      <t>DTLS is considered version 1.3 as specified in <xref target="RFC9147"/> whereas
   other versions are explicitly not part of this document.</t>
    </section>
    <section anchor="conventions">
      <name>Conventions</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
<?line -6?>
      </t>
    </section>
    <section anchor="overview">
      <name>Overview</name>
      <section anchor="protocol-overview">
        <name>Protocol Overview</name>
        <t>The DTLS chunk can be used for secure and confidential transfer of
SCTP packets. This is implemented inside the SCTP protocol.
Once an SCTP packet has been received and the SCTP common header has
been used to identify the SCTP association, the DTLS chunk is processed by
the Chunk Protection Operator that will perform replay protection, decrypt,
verify authenticity, and if the DTLS chunk is successfully processed provides
the protected SCTP chunks for further processing.
<xref target="sctp-DTLS-chunk-layering"/> illustrates the DTLS chunk processing in regard
to SCTP and the Upper Layer Protocol (ULP) using DTLS 1.3 for key management.</t>
        <figure anchor="sctp-DTLS-chunk-layering">
          <name>DTLS Chunk Layering in Regard to SCTP and ULP</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="656" width="440" viewBox="0 0 440 656" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,464" fill="none" stroke="black"/>
                <path d="M 8,560 L 8,640" fill="none" stroke="black"/>
                <path d="M 72,472 L 72,512" fill="none" stroke="black"/>
                <path d="M 96,512 L 96,552" fill="none" stroke="black"/>
                <path d="M 136,32 L 136,464" fill="none" stroke="black"/>
                <path d="M 152,32 L 152,464" fill="none" stroke="black"/>
                <path d="M 168,80 L 168,416" fill="none" stroke="black"/>
                <path d="M 176,576 L 176,624" fill="none" stroke="black"/>
                <path d="M 192,64 L 192,96" fill="none" stroke="black"/>
                <path d="M 192,128 L 192,160" fill="none" stroke="black"/>
                <path d="M 192,400 L 192,448" fill="none" stroke="black"/>
                <path d="M 216,176 L 216,336" fill="none" stroke="black"/>
                <path d="M 232,336 L 232,368" fill="none" stroke="black"/>
                <path d="M 248,176 L 248,336" fill="none" stroke="black"/>
                <path d="M 264,176 L 264,336" fill="none" stroke="black"/>
                <path d="M 280,336 L 280,400" fill="none" stroke="black"/>
                <path d="M 288,472 L 288,512" fill="none" stroke="black"/>
                <path d="M 296,176 L 296,336" fill="none" stroke="black"/>
                <path d="M 352,576 L 352,624" fill="none" stroke="black"/>
                <path d="M 368,64 L 368,96" fill="none" stroke="black"/>
                <path d="M 368,128 L 368,160" fill="none" stroke="black"/>
                <path d="M 368,400 L 368,448" fill="none" stroke="black"/>
                <path d="M 392,80 L 392,592" fill="none" stroke="black"/>
                <path d="M 408,32 L 408,464" fill="none" stroke="black"/>
                <path d="M 408,560 L 408,640" fill="none" stroke="black"/>
                <path d="M 8,32 L 136,32" fill="none" stroke="black"/>
                <path d="M 152,32 L 408,32" fill="none" stroke="black"/>
                <path d="M 192,64 L 368,64" fill="none" stroke="black"/>
                <path d="M 168,80 L 184,80" fill="none" stroke="black"/>
                <path d="M 368,80 L 392,80" fill="none" stroke="black"/>
                <path d="M 192,96 L 368,96" fill="none" stroke="black"/>
                <path d="M 192,128 L 368,128" fill="none" stroke="black"/>
                <path d="M 168,144 L 192,144" fill="none" stroke="black"/>
                <path d="M 192,160 L 368,160" fill="none" stroke="black"/>
                <path d="M 216,176 L 248,176" fill="none" stroke="black"/>
                <path d="M 264,176 L 296,176" fill="none" stroke="black"/>
                <path d="M 216,336 L 248,336" fill="none" stroke="black"/>
                <path d="M 264,336 L 296,336" fill="none" stroke="black"/>
                <path d="M 232,368 L 312,368" fill="none" stroke="black"/>
                <path d="M 192,400 L 368,400" fill="none" stroke="black"/>
                <path d="M 168,416 L 184,416" fill="none" stroke="black"/>
                <path d="M 192,448 L 368,448" fill="none" stroke="black"/>
                <path d="M 8,464 L 136,464" fill="none" stroke="black"/>
                <path d="M 152,464 L 408,464" fill="none" stroke="black"/>
                <path d="M 72,512 L 288,512" fill="none" stroke="black"/>
                <path d="M 8,560 L 408,560" fill="none" stroke="black"/>
                <path d="M 176,576 L 352,576" fill="none" stroke="black"/>
                <path d="M 360,592 L 392,592" fill="none" stroke="black"/>
                <path d="M 176,624 L 352,624" fill="none" stroke="black"/>
                <path d="M 8,640 L 408,640" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="400,552 388,546.4 388,557.6" fill="black" transform="rotate(90,392,552)"/>
                <polygon class="arrowhead" points="368,592 356,586.4 356,597.6" fill="black" transform="rotate(180,360,592)"/>
                <polygon class="arrowhead" points="296,472 284,466.4 284,477.6" fill="black" transform="rotate(270,288,472)"/>
                <polygon class="arrowhead" points="192,416 180,410.4 180,421.6" fill="black" transform="rotate(0,184,416)"/>
                <polygon class="arrowhead" points="192,80 180,74.4 180,85.6" fill="black" transform="rotate(0,184,80)"/>
                <polygon class="arrowhead" points="104,552 92,546.4 92,557.6" fill="black" transform="rotate(90,96,552)"/>
                <polygon class="arrowhead" points="80,472 68,466.4 68,477.6" fill="black" transform="rotate(270,72,472)"/>
                <g class="text">
                  <text x="72" y="52">ULP</text>
                  <text x="268" y="52">DTLS</text>
                  <text x="304" y="52">1.3</text>
                  <text x="240" y="84">Key</text>
                  <text x="292" y="84">Exporter</text>
                  <text x="240" y="148">Key</text>
                  <text x="300" y="148">Management</text>
                  <text x="232" y="196">H</text>
                  <text x="232" y="212">a</text>
                  <text x="184" y="228">k</text>
                  <text x="232" y="228">n</text>
                  <text x="280" y="228">A</text>
                  <text x="376" y="228">k</text>
                  <text x="184" y="244">e</text>
                  <text x="232" y="244">d</text>
                  <text x="280" y="244">l</text>
                  <text x="376" y="244">e</text>
                  <text x="184" y="260">y</text>
                  <text x="232" y="260">s</text>
                  <text x="280" y="260">e</text>
                  <text x="344" y="260">...</text>
                  <text x="376" y="260">y</text>
                  <text x="184" y="276">s</text>
                  <text x="232" y="276">h</text>
                  <text x="280" y="276">r</text>
                  <text x="376" y="276">s</text>
                  <text x="232" y="292">a</text>
                  <text x="280" y="292">t</text>
                  <text x="232" y="308">k</text>
                  <text x="232" y="324">e</text>
                  <text x="324" y="372">..</text>
                  <text x="224" y="388">ContentType</text>
                  <text x="284" y="420">Record</text>
                  <text x="244" y="436">Protection</text>
                  <text x="324" y="436">Operator</text>
                  <text x="420" y="516">keys</text>
                  <text x="68" y="532">PPID</text>
                  <text x="92" y="596">SCTP</text>
                  <text x="272" y="596">Chunk</text>
                  <text x="228" y="612">Protection</text>
                  <text x="308" y="612">Operator</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+---------------+ +-------------------------------+
|      ULP      | |            DTLS 1.3           |
|               | |    +---------------------+    |
|               | | +->+    Key Exporter     +--+ |
|               | | |  +---------------------+  | |
|               | | |                           | |
|               | | |  +---------------------+  | |
|               | | +--+    Key Management   +  | |
|               | | |  +---------------------+  | |
|               | | |     +---+ +---+           | |
|               | | |     | H | |   |           | |
|               | | |     | a | |   |           | |
|               | | | k   | n | | A |         k | |
|               | | | e   | d | | l |         e | |
|               | | | y   | s | | e |    ...  y | |
|               | | | s   | h | | r |         s | |
|               | | |     | a | | t |           | |
|               | | |     | k | |   |           | |
|               | | |     | e | |   |           | |
|               | | |     +-+-+ +-+-+           | |
|               | | |       |     |             | |
|               | | |       +-----+---...       | |
|               | | | ContentType |             | |
|               | | |  +----------+----------+  | |
|               | | +->|        Record       |  | |
|               | |    | Protection Operator |  | |
+               | |    +----------+----------+  | |
+-------+-------+ +-----------------------------+-+
        ^                          ^            |
        |                          |            |
        +--+-----------------------+            | keys
      PPID |                                    |
           V                                    V
+-----------------------------------------------+-+
|                    +---------------------+    | |
|        SCTP        |         Chunk       |<---+ |
|                    | Protection Operator |      |
|                    +---------------------+      |
+-------------------------------------------------+
]]></artwork>
          </artset>
        </figure>
        <t>In the outgoing direction, once the SCTP stack has created the
unprotected SCTP packet containing control and/or DATA chunks,
SCTP chunks will be processed by the Chunk Protection Operator to be
protected. The result of this computation is a DTLS 1.3 record
encapsulated in a SCTP chunk which is named the DTLS chunk.</t>
        <t>The Chunk Protection Operator performs protection operations on all
chunks of an SCTP packet. Information protection is kept during the lifetime of
the association and no information is sent unprotected except the
initial SCTP handshake, any initial key-management traffic, the SCTP
common header, the SCTP DTLS chunk header, and the SHUTDOWN-COMPLETE
chunk.</t>
        <t>The support of the DTLS chunk and the key-management method to use is
negotiated by the peers at the setup of the SCTP association using a
new parameter. Key management and application traffic is multiplexed
using the PPID. The dedicated PPID 4242 is defined for use by key
management for DTLS chunk. The key management function uses an API to
key the Chunk protection operation function. Usage of the DTLS 1.3
handshake for initial mutual authentication and key establishment as
well as periodic re-authentication and rekeying with Diffe-Hellman of
the DTLS chunk protection is defined in separate documents,
e.g. <xref target="I-D.westerlund-tsvwg-sctp-DTLS-handshake"/>. To prevent
downgrade attacks of the key-management negotiation the key-management
should implement specific procedures when deriving keys.</t>
        <t>When the endpoint authentication and key establishment has been
completed, the association is considered to be secured and the ULP is
informed about that. From this time on it's possible for the ULPs to
exchange data securely with its peer.</t>
        <t>A DTLS chunk will never be retransmitted, retransmission is implemented
by SCTP endpoint at chunk level as specified in <xref target="RFC9260"/>. DTLS replay
protection will be used to suppress duplicated DTLS chunks.</t>
      </section>
      <section anchor="DTLS-engines">
        <name>DTLS Considerations</name>
        <t>The DTLS Chunk architecture splits DTLS 1.3 as shown in
<xref target="sctp-DTLS-chunk-layering"/>, where the Key Management functionality
is done at DTLS 1.3 block level, acting as a parallel User Level Protocol
and a Chunk Protection Operator functionality inside the SCTP
Protocol Stack.</t>
        <t>Key Management is the set of data and procedures that take care of key
distribution, verification, and update, DTLS connection setup, update and
maintenance.</t>
        <t>Chunk Protection Operator functionality is the set of data and procedures
taking care of User Data encryption into DTLS Record and DTLS record
decryption into User Data.</t>
        <t>DTLS 1.3 operations requires to directly handshake messages with the
remote peer for connection setup and other features, this kind of
handshake is part of the Key Management functionality.  Key Management
function achieves these features behaving as a user of the SCTP
association.  Key Management sends and receives its own data via the
SCTP User Level interface.  Key Management's own data are
distinguished from any other data by means of a dedicated PPID using
the value 4242 (see <xref target="iana-payload-protection-id"/>).</t>
        <t>Once Key Management has established a DTLS 1.3 connection, it can
derive primary and restart keys and set the Chunk Protection Operator
for SCTP Packet Payload encryption/decryption via an API to create the
necessary DTLS key contexts. Both a DTLS Key context for normal use
(primary) and a DTLS Key context for SCTP association restart needs to
be created.</t>
        <t>In this document we use the terms DTLS Key context for indicating a
Key and IV, produced by the key-management, and all relevant data that
needs to be provided to the Chunk Protection Operator for DTLS encryption
and decryption.  DTLS Key context includes Keys and IV for sending and
receiving, replay window, last used sequence number. Each DTLS key
context is associated with a four-value tuple identifying the context,
consisting of SCTP Association, the restart indicator, the DTLS
Connection ID (if used), and the DTLS epoch.</t>
        <t>Support of DTLS Connection ID in the DTLS Record layer used in the
DTLS Chunk is OPTIONAL, and negotiated using the key-management
function.</t>
        <t>The first established DTLS key context for any SCTP association and DTLS
connection ID (if used) SHALL use epoch=3. This ensures that the
epoch of the DTLS key context will normally match the epoch of
a DTLS key-management connection.</t>
      </section>
      <section anchor="buffering">
        <name>SCTP DTLS Chunk Buffering and Flow Control</name>
        <t>DTLS 1.3 operations and SCTP are asynchronous, meaning that the
Chunk Protection Operator may deliver the decrypted SCTP Payload to the SCTP
endpoint without respecting the reception order.  It's up to SCTP
endpoint to reorder the chunks in the reception buffer and to take
care of the flow control according to what specified in
<xref target="RFC9260"/>. From SCTP perspective the DTLS chunk processing is part
of the transport network.</t>
        <t>Even though the above allows the implementors to adopt a
multithreading design of the Chunk Protection Operators, the actual
implementation should consider that out-of-order handling of SCTP
chunks is not desired and may cause false congestion signals and
trigger retransmissions.</t>
      </section>
      <section anchor="pmtu">
        <name>PMTU Considerations</name>
        <t>The addition of the DTLS chunk to SCTP reduces the room for payload,
due to the size of the DTLS chunk header, padding, and the AEAD
authentication tag.  Thus, the SCTP layer creating the plain text
payload needs to know about the overhead to adjust its target payload
size appropriately.</t>
        <t>A path MTU discovery function in SCTP will need to know the actual
sent and received size of packets for the SCTP packets. This to
correctly handle PMTUD probe packets.</t>
        <t>From SCTP perspective, if there is a maximum size of plain text data
that can be protected by the Chunk Protection Operator that must be
communicated to SCTP. As such a limit will limit the PMTU for SCTP to
the maximum plain text plus DTLS chunk and algorithm overhead plus
the SCTP common header.</t>
      </section>
      <section anchor="congestion">
        <name>Congestion Control Considerations</name>
        <t>The SCTP mechanism for handling congestion control does depend on
successful data transfer for enlarging or reducing the congestion
window CWND (see <xref target="RFC9260"/> Section 7.2).</t>
        <t>It may happen that Chunk Protection Operator discards packets due to replay
protection, or integrity errors depending on network induced bit
errors or malicious modifications. As those packets do not represent
what the peer sent, it is acceptable to ignore them, although in-situ
modification on the path of a packet resulting in discarding due to
integrity failure will leave a gap, but has to be accepted as part of
the path behavior.</t>
        <t>The Chunk Protection Operator will not interfere with the SCTP congestion
control mechanism, this basically means that from SCTP perspective
the congestion control is exactly the same as how specified
in <xref target="RFC9260"/>.</t>
      </section>
      <section anchor="icmp">
        <name>ICMP Considerations</name>
        <t>The SCTP implementation will be responsible for handling ICMP messages
and their validation as specified in <xref target="RFC9260"/> Section 10. This
means that the ICMP validation needs to be done in relation to the
actual sent SCTP packets with the DTLS chunk and not the unprotected
payload.</t>
      </section>
      <section anchor="multipath">
        <name>Path Selection Considerations</name>
        <t>When an Association is multihomed there are multiple paths between
Endpoints.  The selection of the specific path to be used at a certain
time belongs to SCTP protocol that will decide according to
<xref target="RFC9260"/>.  The Chunk Protection Operator shall not influence the path
selection algorithm, actually the Chunk Protection Operator will not even
know what path is being used.</t>
        <t>The Replay window for the DTLS Sequence Number will need to take into
account that heartbeat (HB) chunks are sent concurrently over all
paths in multihomed Associations, thus it needs to be large enough to
accommodate latency differences.</t>
      </section>
      <section anchor="sec-asconf">
        <name>Dynamic Address Reconfiguration Considerations</name>
        <t>When using Dynamic Address Reconfiguration <xref target="RFC5061"/> in an SCTP
association using DTLS Chunk the ASCONF chunk is protected, thus it
needs to be unprotected first, furthermore it MAY come from an unknown
IP Address.  In order to properly address the ASCONF chunk to the
relevant Association for being unprotected, Destination Address,
Source, Destination ports and VTag shall be used. If the combination
of those parameters is not unique the implementor MAY choose to send
the DTLS Chunk to all Associations that fit with the parameters in
order to find the right one. The association will attempt
de-protection operations on the DTLS chunk, and if that is successful
the ASCONF chunk can be processed. Note that trial decoding should
have a limit in number of tried contexts to prevent denial of service
attacks on the endpoint.</t>
        <t>The section 4.1.1 of <xref target="RFC5061"/> specifies that ASCONF message are
required to be sent authenticated with SCTP-AUTH <xref target="RFC4895"/>.  For
SCTP associations using DTLS Chunk this results in the use of
redundant mechanism for Authentication with both SCTP-AUTH and the
DTLS Chunk. We recommend to amend <xref target="RFC5061"/> for including DTLS
Chunks as Authentication mechanism for ASCONF chunks.</t>
      </section>
      <section anchor="sec-restart">
        <name>SCTP Restart Considerations</name>
        <t>This section deals with the handling of an unexpected INIT chunk
during an Association lifetime as described in Section 5.2 of <xref target="RFC9260"/>
with the purpose of achieving a Restart of the current Association,
thus implementing SCTP Restart.</t>
        <t>This specification doesn't support SCTP Restart as described in
<xref target="RFC9260"/>; when unexpected INIT chunk is received unprotected, it
SHALL be silently discarded to prevent denial of service attacks on
the ongoing association.</t>
        <t>All implementations SHALL support receiving and processing unexpected
INIT chunks protected by DTLS Chunk as described in
<xref target="protected-restart"/>. This as has minimal implementation burden
as it only requires handling the restart DTLS Key Context and detect
DTLS Chunks indicating the restart.</t>
        <t>When the upper layer protocols require support of SCTP Restart, as in
case of 3GPP NG-C protocol <xref target="ETSI-TS-38.413"/>, the endpoint needs to
support also initiating protected SCTP Restart procedure described in
<xref target="protected-restart"/>. Implementing initiating protected restart
procedure is RECOMMENDED, however not required as persistent secure
storage of the restart DTLS Key Context is needed.</t>
        <t>The cases where one of the SCTP Endpoints only implements initiating
legacy SCTP Restart are described in <xref target="sctp-rest-comp"/>.</t>
        <section anchor="protected-restart">
          <name>Protected SCTP Restart</name>
          <t>The protected SCTP Restart procedure keeps the security
characteristics of an SCTP Association using DTLS Chunk.</t>
          <t>In protected SCTP Restart, INIT chunks are sent encrypted
using DTLS Chunks.</t>
          <t>In order to support protected SCTP Restart, the SCTP Endpoints shall allocate
and maintain dedicated Restart DTLS Key contexts, SCTP packets
protected by these contexts will be identified in the DTLS chunk with
the R (Restart) bit set (see <xref target="DTLS-chunk"/>).  Both SCTP Endpoints
needs to ensure that Restart DTLS key contexts is preserved for
supporting the protected SCTP Restart use case.</t>
          <t>In order for the protected SCTP endpoint to be available for protected SCTP
Restart purposes, the DTLS chunk needs access to a DTLS Key context for
this SCTP association that needs to be kept in a well-known state so
that both SCTP Endpoints are aware of the DTLS sequence numbers and
replay window, i.e. initialized but never used. An SCTP Endpoint SHALL
NEVER use the SCTP Restart DTLS Key for any other use case than SCTP
association restart.</t>
          <t>An SCTP endpoint wanting to be able to initiate a protected SCTP
restart needs to store securely and persistent the restart Keys, DTLS
connection ID (if used) and related DTLS epoch, indexed so that when
performing a restart with the peer node it had a protected SCTP
association which can identify the right restart Key and DTLS epoch and
initialize the restart DTLS Key Context for when restarting the SCTP
association. The keys, DTLS connection ID, and epoch needs to be stored
secure and persistently so that they survive the events that are
causing protected SCTP Restart procedure to be used, for instance a
crash of the SCTP stack. The security considerations for persistent
secure storage of keying materials is further discussed in
<xref target="sec-considertation-storage"/>.</t>
          <t>The SCTP Restart handshakes INIT, INIT-ACK, COOCKIE-ECHO, COOKIE-ACK
exactly as in legacy SCTP Restart case; these Chunks SHALL be
sent as DTLS chunk protected using the restart DTLS key context.</t>
          <t>A DTLS Chunk using the restart DTLS key context is identified by
having the R bit (Restart Indicator) set in the DTLS Chunk (see
<xref target="sctp-DTLS-chunk-newchunk-crypt-struct"/>).  There's exactly one
active Restart DTLS Context at a time, the newest. However, a crash at
the time having completed the key-management exchange but failing to
commit the DTLS Key Context to persistent secure storage could result
in loss of the latest DTLS Key Context. Therefore, the endpoints
SHOULD retain the old restart DTLS key context until it the
key-management confirms the new ones are committed to secure storage.
This can for example be ensure that at key-changes signals to
terminate the old DTLS Key Contexts (including the restart) is never
sent until the new restart DTLS Key Context has been committed to
storage.</t>
          <figure anchor="DTLS-chunk-restart">
            <name>Handshake of SCTP Restart for DTLS in SCTP</name>
            <artset>
              <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="192" width="504" viewBox="0 0 504 192" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                  <path d="M 40,48 L 40,160" fill="none" stroke="black"/>
                  <path d="M 408,48 L 408,160" fill="none" stroke="black"/>
                  <path d="M 440,64 L 440,144" fill="none" stroke="black"/>
                  <path d="M 40,64 L 136,64" fill="none" stroke="black"/>
                  <path d="M 288,64 L 400,64" fill="none" stroke="black"/>
                  <path d="M 48,80 L 120,80" fill="none" stroke="black"/>
                  <path d="M 304,80 L 408,80" fill="none" stroke="black"/>
                  <path d="M 440,80 L 496,80" fill="none" stroke="black"/>
                  <path d="M 40,128 L 112,128" fill="none" stroke="black"/>
                  <path d="M 320,128 L 400,128" fill="none" stroke="black"/>
                  <path d="M 48,144 L 112,144" fill="none" stroke="black"/>
                  <path d="M 312,144 L 408,144" fill="none" stroke="black"/>
                  <path d="M 440,144 L 496,144" fill="none" stroke="black"/>
                  <path d="M 424,48 C 432.83064,48 440,55.16936 440,64" fill="none" stroke="black"/>
                  <path d="M 424,160 C 432.83064,160 440,152.83064 440,144" fill="none" stroke="black"/>
                  <polygon class="arrowhead" points="408,128 396,122.4 396,133.6" fill="black" transform="rotate(0,400,128)"/>
                  <polygon class="arrowhead" points="408,64 396,58.4 396,69.6" fill="black" transform="rotate(0,400,64)"/>
                  <polygon class="arrowhead" points="56,144 44,138.4 44,149.6" fill="black" transform="rotate(180,48,144)"/>
                  <polygon class="arrowhead" points="56,80 44,74.4 44,85.6" fill="black" transform="rotate(180,48,80)"/>
                  <g class="text">
                    <text x="40" y="36">Initiator</text>
                    <text x="408" y="36">Responder</text>
                    <text x="160" y="68">[DTLS</text>
                    <text x="236" y="68">CHUNK(INIT)]</text>
                    <text x="144" y="84">[DTLS</text>
                    <text x="236" y="84">CHUNK(INIT-ACK)]</text>
                    <text x="472" y="100">Using</text>
                    <text x="468" y="116">SCTP</text>
                    <text x="136" y="132">[DTLS</text>
                    <text x="212" y="132">CHUNK(COOKIE</text>
                    <text x="292" y="132">ECHO)]</text>
                    <text x="476" y="132">Chunks</text>
                    <text x="136" y="148">[DTLS</text>
                    <text x="212" y="148">CHUNK(COOKIE</text>
                    <text x="288" y="148">ACK)]</text>
                  </g>
                </svg>
              </artwork>
              <artwork type="ascii-art" align="center"><![CDATA[
Initiator                                     Responder
    |                                             | -.
    +------------[DTLS CHUNK(INIT)]-------------->|   |
    |<---------[DTLS CHUNK(INIT-ACK)]-------------+   +-------
    |                                             |   | Using
    |                                             |   | SCTP
    +---------[DTLS CHUNK(COOKIE ECHO)]---------->|   | Chunks
    |<--------[DTLS CHUNK(COOKIE ACK)]------------+   +-------
    |                                             | -'

]]></artwork>
            </artset>
          </figure>
          <t>The <xref target="DTLS-chunk-restart"/> shows how the control chunks being
used for SCTP Association Restart are transported within DTLS in SCTP.</t>
          <t>The transport of INIT, INIT-ACK COOCKIE-ECHO, COOCKIE-ACK by means of
DTLS chunk ensures that the peer requesting the restart has been
previously validated and the SCTP state machine after having reached
ESTABLISHED state moves automatically to PROTECTED state.</t>
          <t>A restarted SCTP Association SHALL continue to use the Restart DTLS Key Context,
for User Traffic until a new primary DTLS Key Context will be available. The
implementors SHOULD initiate a new DTLS keying as soon as possible,
and derive the primary and restart keys so that the time when no
Restart DTLS Key Context is available is kept to a minimum. Note that another
restart attempt prior to having created new restart DTLS Key context
for the new SCTP association will result in the endpoints being unable
to restart the SCTP association.</t>
          <t>After restart the next primary DTLS key context SHALL use epoch=3,
i.e. the epoch value is reset. Note that if the restart epoch used
also was 3 when not using any DTLS connection ID, then the
installation of the new restart DTLS key context needs to be done with
some care to avoid dropping valid packets. After having derived new
primary DTLS Key Context the endpoint installs the primary DTLS Key Context first,
and start using it. The new restart DTLS Key Context is only installed
after any old in-flight restart packets will have been received.</t>
        </section>
        <section anchor="sctp-rest-comp">
          <name>Compatibility with Legacy SCTP Restart</name>
          <t>An SCTP Endpoint supporting only legacy SCTP Restart and involved
in an SCTP Association using DTLS Chunks SHOULD NOT attempt to
restart the Association using unprotected INIT chunk. The effect
will be that the restart initiator will have its packet being dropped
until the peer nodes times out the SCTP Association from lack
of any response from the restarting node.</t>
          <t>An SCTP Endpoint supporting only legacy SCTP Restart and involved
in an SCTP Association using DTLS Chunks, when receiving an INIT
chunk protected by DTLS chunk as described in <xref target="protected-restart"/>,
thus having the R bit (Restart Indicator) set in the DTLS Chunk (see
<xref target="sctp-DTLS-chunk-newchunk-crypt-struct"/>), will silently discard it.</t>
          <t>Since an SCTP Endpoint supporting only legacy SCTP Restart and involved
in an SCTP Association using DTLS Chunks cannot use SCTP Restart
legacy procedure, in case of need to restart the Association
it SHOULD keep on retrying initiating a new Association
until the remote SCTP Endpoint have closed the existing Association
(i.e. due to timeout) and will accept a new one.
As alternative, depending on the Use Case and the Upper Layer protocol,
it MAY use a different SCTP Source port number so that the peer SCTP Endpoint
will accept the initiation of the new Association while still supervising
the old one.</t>
        </section>
      </section>
    </section>
    <section anchor="new-parameter-type">
      <name>New Parameter Type</name>
      <t>This section defines the new parameter type that will be used to
negotiate the use of the DTLS 1.3 chunk during association setup, its
keying method and indicate preference in relation to different keying
and other security solutions. <xref target="sctp-DTLS-chunk-init-parameter"/>
illustrates the new parameter type.</t>
      <table anchor="sctp-DTLS-chunk-init-parameter">
        <name>New INIT/INIT-ACK Parameter</name>
        <thead>
          <tr>
            <th align="right">Parameter Type</th>
            <th align="left">Parameter Name</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="right">0x80xx</td>
            <td align="left">DTLS 1.3 Chunk Protected Association</td>
          </tr>
        </tbody>
      </table>
      <t>Note that the parameter format requires the receiver to ignore the
parameter and continue processing if the parameter is not understood.
This is accomplished (as described in <xref target="RFC9260"/>, Section 3.2.1.)  by
the use of the upper bits of the parameter type.</t>
      <section anchor="protectedassoc-parameter">
        <name>DTLS 1.3 Chunk Protected Association</name>
        <t>This parameter is used to the request and acknowledge of support of
DTLS 1.3 Chunk during INIT/INIT-ACK handshake and indicate preference
for keying and the preference order between multiple security
solutions (if supported).</t>
        <figure anchor="sctp-DTLS-chunk-init-options">
          <name>Protected Association Parameter</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="208" width="528" viewBox="0 0 528 208" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,64 L 8,128" fill="none" stroke="black"/>
                <path d="M 8,160 L 8,192" fill="none" stroke="black"/>
                <path d="M 264,64 L 264,128" fill="none" stroke="black"/>
                <path d="M 264,160 L 264,192" fill="none" stroke="black"/>
                <path d="M 520,64 L 520,128" fill="none" stroke="black"/>
                <path d="M 520,160 L 520,192" fill="none" stroke="black"/>
                <path d="M 8,64 L 520,64" fill="none" stroke="black"/>
                <path d="M 8,96 L 520,96" fill="none" stroke="black"/>
                <path d="M 8,128 L 520,128" fill="none" stroke="black"/>
                <path d="M 8,160 L 520,160" fill="none" stroke="black"/>
                <path d="M 8,192 L 520,192" fill="none" stroke="black"/>
                <g class="text">
                  <text x="16" y="36">0</text>
                  <text x="176" y="36">1</text>
                  <text x="336" y="36">2</text>
                  <text x="496" y="36">3</text>
                  <text x="16" y="52">0</text>
                  <text x="32" y="52">1</text>
                  <text x="48" y="52">2</text>
                  <text x="64" y="52">3</text>
                  <text x="80" y="52">4</text>
                  <text x="96" y="52">5</text>
                  <text x="112" y="52">6</text>
                  <text x="128" y="52">7</text>
                  <text x="144" y="52">8</text>
                  <text x="160" y="52">9</text>
                  <text x="176" y="52">0</text>
                  <text x="192" y="52">1</text>
                  <text x="208" y="52">2</text>
                  <text x="224" y="52">3</text>
                  <text x="240" y="52">4</text>
                  <text x="256" y="52">5</text>
                  <text x="272" y="52">6</text>
                  <text x="288" y="52">7</text>
                  <text x="304" y="52">8</text>
                  <text x="320" y="52">9</text>
                  <text x="336" y="52">0</text>
                  <text x="352" y="52">1</text>
                  <text x="368" y="52">2</text>
                  <text x="384" y="52">3</text>
                  <text x="400" y="52">4</text>
                  <text x="416" y="52">5</text>
                  <text x="432" y="52">6</text>
                  <text x="448" y="52">7</text>
                  <text x="464" y="52">8</text>
                  <text x="480" y="52">9</text>
                  <text x="496" y="52">0</text>
                  <text x="512" y="52">1</text>
                  <text x="80" y="84">Parameter</text>
                  <text x="140" y="84">Type</text>
                  <text x="168" y="84">=</text>
                  <text x="204" y="84">0x80XX</text>
                  <text x="360" y="84">Parameter</text>
                  <text x="428" y="84">Length</text>
                  <text x="68" y="116">Protection</text>
                  <text x="148" y="116">Solution</text>
                  <text x="196" y="116">#1</text>
                  <text x="324" y="116">Protection</text>
                  <text x="404" y="116">Solution</text>
                  <text x="452" y="116">#2</text>
                  <text x="8" y="148">:</text>
                  <text x="60" y="148">Protection</text>
                  <text x="144" y="148">Solutions</text>
                  <text x="520" y="148">:</text>
                  <text x="60" y="180">Protection</text>
                  <text x="140" y="180">Solution</text>
                  <text x="188" y="180">#N</text>
                  <text x="304" y="180">Padding</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|    Parameter Type = 0x80XX    |       Parameter Length        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Protection Solution #1       |  Protection Solution #2       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
: Protection Solutions                                          :
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Protection Solution #N        | Padding                       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
          </artset>
        </figure>
        <dl newline="true">
          <dt>Parameter Type: 16 bits (unsigned integer)</dt>
          <dd>
            <t>This value MUST be set to 0x80XX.</t>
          </dd>
          <dt>Parameter Length: 16 bits (unsigned integer)</dt>
          <dd>
            <t>This value holds the length of the parameter, which will be the
number of Protection Solution fields (N) times two plus 4 and, if N
is odd, plus 2 bytes of padding.</t>
          </dd>
          <dt>Protection Solution fields: one or more 16-bit SCTP Protection Solution Identifiers:</dt>
          <dd>
            <t>Each Protection Solution Identifier (<xref target="IANA-Protection-Solution-ID"/>)
is a 16-bit unsigned integer value indicting a Protection
Solution. Protection solutions include both DTLS Chunk based, where
a solution combines the DTLS chunk with a key-management solution,
or non DTLS Chunk based security solution. The Protection Solutions
are listed in descending order of preference, i.e. the first listed
in the parameter is the most preferred and the last the least
preferred by the sender in the INIT chunk. In the INIT-ACK chunk the
endpoint includes all of the offered solutions which it supports and
lists the selected one first. Including its decreasing preference on
the additional Protection Solutions.</t>
          </dd>
        </dl>
        <t>Padding: If the number of included Protection solutions is odd the
parameter MUST be padded with two zero (0) bytes of padding to make
the parameter 32-bit aligned.</t>
        <t>RFC-Editor Note: Please replace 0x08XX with the actual parameter type
value assigned by IANA and then remove this note.</t>
      </section>
    </section>
    <section anchor="new-chunk-type">
      <name>New Chunk Type</name>
      <section anchor="DTLS-chunk">
        <name>DTLS Chunk (DTLS)</name>
        <t>This section defines the new chunk type that will be used to
transport the DTLS 1.3 record containing protected SCTP payload.
<xref target="sctp-DTLS-chunk-newchunk-crypt"/> illustrates the new chunk type.</t>
        <table anchor="sctp-DTLS-chunk-newchunk-crypt">
          <name>DTLS Chunk Type</name>
          <thead>
            <tr>
              <th align="right">Chunk Type</th>
              <th align="left">Chunk Name</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="right">0x4X</td>
              <td align="left">DTLS Chunk (DTLS)</td>
            </tr>
          </tbody>
        </table>
        <t>RFC-Editor Note: Please replace 0x4x with the actual chunk type value
assigned by IANA and then remove this note.</t>
        <t>It should be noted that the DTLS chunk format requires the receiver
stop processing this SCTP packet, discard the unrecognized chunk and
all further chunks, and report the unrecognized chunk in an ERROR
chunk using the 'Unrecognized Chunk Type' error cause.  This is
accomplished (as described in <xref target="RFC9260"/> Section 3.2.) by the use of
the upper bits of the chunk type.</t>
        <t>The DTLS chunk is used to hold the DTLS 1.3 record with the protected
payload of a plain text SCTP packet without the SCTP common header.</t>
        <figure anchor="sctp-DTLS-chunk-newchunk-crypt-struct">
          <name>DTLS Chunk Structure</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="208" width="528" viewBox="0 0 528 208" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,64 L 8,192" fill="none" stroke="black"/>
                <path d="M 136,64 L 136,96" fill="none" stroke="black"/>
                <path d="M 248,64 L 248,96" fill="none" stroke="black"/>
                <path d="M 264,64 L 264,96" fill="none" stroke="black"/>
                <path d="M 264,160 L 264,192" fill="none" stroke="black"/>
                <path d="M 520,64 L 520,192" fill="none" stroke="black"/>
                <path d="M 8,64 L 520,64" fill="none" stroke="black"/>
                <path d="M 8,96 L 520,96" fill="none" stroke="black"/>
                <path d="M 264,160 L 520,160" fill="none" stroke="black"/>
                <path d="M 8,192 L 520,192" fill="none" stroke="black"/>
                <g class="text">
                  <text x="16" y="36">0</text>
                  <text x="176" y="36">1</text>
                  <text x="336" y="36">2</text>
                  <text x="496" y="36">3</text>
                  <text x="16" y="52">0</text>
                  <text x="32" y="52">1</text>
                  <text x="48" y="52">2</text>
                  <text x="64" y="52">3</text>
                  <text x="80" y="52">4</text>
                  <text x="96" y="52">5</text>
                  <text x="112" y="52">6</text>
                  <text x="128" y="52">7</text>
                  <text x="144" y="52">8</text>
                  <text x="160" y="52">9</text>
                  <text x="176" y="52">0</text>
                  <text x="192" y="52">1</text>
                  <text x="208" y="52">2</text>
                  <text x="224" y="52">3</text>
                  <text x="240" y="52">4</text>
                  <text x="256" y="52">5</text>
                  <text x="272" y="52">6</text>
                  <text x="288" y="52">7</text>
                  <text x="304" y="52">8</text>
                  <text x="320" y="52">9</text>
                  <text x="336" y="52">0</text>
                  <text x="352" y="52">1</text>
                  <text x="368" y="52">2</text>
                  <text x="384" y="52">3</text>
                  <text x="400" y="52">4</text>
                  <text x="416" y="52">5</text>
                  <text x="432" y="52">6</text>
                  <text x="448" y="52">7</text>
                  <text x="464" y="52">8</text>
                  <text x="480" y="52">9</text>
                  <text x="496" y="52">0</text>
                  <text x="512" y="52">1</text>
                  <text x="36" y="84">Type</text>
                  <text x="64" y="84">=</text>
                  <text x="92" y="84">0x4x</text>
                  <text x="180" y="84">reserved</text>
                  <text x="256" y="84">R</text>
                  <text x="360" y="84">Chunk</text>
                  <text x="412" y="84">Length</text>
                  <text x="264" y="132">Payload</text>
                  <text x="384" y="180">Padding</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type = 0x4x   | reserved    |R|         Chunk Length          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
|                            Payload                            |
|                                                               |
|                               +-------------------------------+
|                               |           Padding             |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
          </artset>
        </figure>
        <dl>
          <dt>reserved: 7 bits</dt>
          <dd>
            <t>Reserved bits for future use. Sender MUST set these bits to 0 and
MUST be ignored on reception.</t>
          </dd>
          <dt>R: 1 bit (boolean)</dt>
          <dd>
            <t>Restart indicator. If this bit is set this DTLS chunk is protected
with by a Restart DTLS Key context.</t>
          </dd>
          <dt>Chunk Length: 16 bits (unsigned integer)</dt>
          <dd>
            <t>This value holds the length of the Payload in bytes plus 4.</t>
          </dd>
          <dt>Payload: variable length</dt>
          <dd>
            <t>This holds the DTLSCiphertext as specified in DTLS 1.3 <xref target="RFC9147"/>.</t>
          </dd>
          <dt>Padding: 0, 8, 16, or 24 bits</dt>
          <dd>
            <t>If the length of the Payload is not a multiple of 4 bytes, the sender
MUST pad the chunk with all zero bytes to make the chunk 32-bit
aligned.  The Padding MUST NOT be longer than 3 bytes and it MUST
be ignored by the receiver.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="error_handling">
      <name>Error Handling</name>
      <t>This specification introduces a new set of error causes that are to be
used when SCTP endpoint detects a faulty condition. The special case is
when the error is detected by the DTLS 1.3 Protection that may provide
additional information.</t>
      <section anchor="enoprotected">
        <name>Mandatory Protected Association Parameter Missing</name>
        <t>When an initiator SCTP endpoint sends an INIT chunk that doesn't
contain the DTLS 1.3 Chunk Protected Association or other protection
solutions towards an SCTP endpoint that only accepts protected
associations, the responder endpoint SHALL raise a Missing Mandatory
Parameter error. The ERROR chunk will contain the cause code 'Missing
Mandatory Parameter' (2) (see <xref target="RFC9260"/> Section 3.3.10.7) and the
DTLS 1.3 chunk protected association parameter identifier
<xref target="protectedassoc-parameter"/> in the missing param Information
field. It may also include additional parameters representing other
supported protection mechanisms that are acceptable per endpoint
security policy.</t>
        <figure anchor="sctp-DTLS-init-chunk-missing-protected">
          <name>ERROR Missing Protected Association Parameter</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="208" width="528" viewBox="0 0 528 208" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,64 L 8,192" fill="none" stroke="black"/>
                <path d="M 264,64 L 264,96" fill="none" stroke="black"/>
                <path d="M 264,128 L 264,192" fill="none" stroke="black"/>
                <path d="M 520,64 L 520,192" fill="none" stroke="black"/>
                <path d="M 8,64 L 520,64" fill="none" stroke="black"/>
                <path d="M 8,96 L 520,96" fill="none" stroke="black"/>
                <path d="M 8,128 L 520,128" fill="none" stroke="black"/>
                <path d="M 8,160 L 520,160" fill="none" stroke="black"/>
                <path d="M 8,192 L 520,192" fill="none" stroke="black"/>
                <g class="text">
                  <text x="16" y="36">0</text>
                  <text x="176" y="36">1</text>
                  <text x="336" y="36">2</text>
                  <text x="496" y="36">3</text>
                  <text x="16" y="52">0</text>
                  <text x="32" y="52">1</text>
                  <text x="48" y="52">2</text>
                  <text x="64" y="52">3</text>
                  <text x="80" y="52">4</text>
                  <text x="96" y="52">5</text>
                  <text x="112" y="52">6</text>
                  <text x="128" y="52">7</text>
                  <text x="144" y="52">8</text>
                  <text x="160" y="52">9</text>
                  <text x="176" y="52">0</text>
                  <text x="192" y="52">1</text>
                  <text x="208" y="52">2</text>
                  <text x="224" y="52">3</text>
                  <text x="240" y="52">4</text>
                  <text x="256" y="52">5</text>
                  <text x="272" y="52">6</text>
                  <text x="288" y="52">7</text>
                  <text x="304" y="52">8</text>
                  <text x="320" y="52">9</text>
                  <text x="336" y="52">0</text>
                  <text x="352" y="52">1</text>
                  <text x="368" y="52">2</text>
                  <text x="384" y="52">3</text>
                  <text x="400" y="52">4</text>
                  <text x="416" y="52">5</text>
                  <text x="432" y="52">6</text>
                  <text x="448" y="52">7</text>
                  <text x="464" y="52">8</text>
                  <text x="480" y="52">9</text>
                  <text x="496" y="52">0</text>
                  <text x="512" y="52">1</text>
                  <text x="96" y="84">Cause</text>
                  <text x="140" y="84">Code</text>
                  <text x="168" y="84">=</text>
                  <text x="184" y="84">2</text>
                  <text x="360" y="84">Cause</text>
                  <text x="412" y="84">Length</text>
                  <text x="172" y="116">Number</text>
                  <text x="212" y="116">of</text>
                  <text x="256" y="116">missing</text>
                  <text x="316" y="116">params</text>
                  <text x="352" y="116">=</text>
                  <text x="368" y="116">N</text>
                  <text x="44" y="148">DTLS</text>
                  <text x="80" y="148">1.3</text>
                  <text x="120" y="148">Chunk</text>
                  <text x="184" y="148">Protected</text>
                  <text x="240" y="148">Asc</text>
                  <text x="336" y="148">Missing</text>
                  <text x="392" y="148">Param</text>
                  <text x="436" y="148">Type</text>
                  <text x="468" y="148">#2</text>
                  <text x="72" y="180">Missing</text>
                  <text x="128" y="180">Param</text>
                  <text x="172" y="180">Type</text>
                  <text x="212" y="180">#N-1</text>
                  <text x="336" y="180">Missing</text>
                  <text x="392" y="180">Param</text>
                  <text x="436" y="180">Type</text>
                  <text x="468" y="180">#N</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|        Cause Code = 2         |         Cause Length          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                 Number of missing params = N                  |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  DTLS 1.3 Chunk Protected Asc |     Missing Param Type #2     |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|    Missing Param Type #N-1    |     Missing Param Type #N     |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
          </artset>
        </figure>
        <t>Note: Cause Length in bytes is equal to following with the number of
missing parameters as N: 8 + N * 2 according to <xref target="RFC9260"/>, section
3.3.10.2. Also the Protection Association ID may be present in any of
the N missing params, no order implied by the example in
<xref target="sctp-DTLS-init-chunk-missing-protected"/>.</t>
      </section>
      <section anchor="eprotect">
        <name>Error in DTLS Chunk</name>
        <t>A new Error Type is defined for the DTLS Chunk, it's used for any
error related to the DTLS chunk's protection mechanism described in
this document and has a structure that allows detailed information to
be added as extra causes.</t>
        <t>This specification describes some of the causes whilst the key
establishment specification MAY add further causes.</t>
        <t>When detecting an error, SCTP will send an ABORT chunk containing
the relevant Error Type and Causes.</t>
        <figure anchor="sctp-eprotect-error-structure">
          <name>Error in DTLS Chunk Cause Format</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="176" width="528" viewBox="0 0 528 176" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,64 L 8,160" fill="none" stroke="black"/>
                <path d="M 264,64 L 264,160" fill="none" stroke="black"/>
                <path d="M 520,64 L 520,160" fill="none" stroke="black"/>
                <path d="M 8,64 L 520,64" fill="none" stroke="black"/>
                <path d="M 8,96 L 520,96" fill="none" stroke="black"/>
                <path d="M 8,128 L 520,128" fill="none" stroke="black"/>
                <path d="M 8,160 L 520,160" fill="none" stroke="black"/>
                <g class="text">
                  <text x="16" y="36">0</text>
                  <text x="176" y="36">1</text>
                  <text x="336" y="36">2</text>
                  <text x="496" y="36">3</text>
                  <text x="16" y="52">0</text>
                  <text x="32" y="52">1</text>
                  <text x="48" y="52">2</text>
                  <text x="64" y="52">3</text>
                  <text x="80" y="52">4</text>
                  <text x="96" y="52">5</text>
                  <text x="112" y="52">6</text>
                  <text x="128" y="52">7</text>
                  <text x="144" y="52">8</text>
                  <text x="160" y="52">9</text>
                  <text x="176" y="52">0</text>
                  <text x="192" y="52">1</text>
                  <text x="208" y="52">2</text>
                  <text x="224" y="52">3</text>
                  <text x="240" y="52">4</text>
                  <text x="256" y="52">5</text>
                  <text x="272" y="52">6</text>
                  <text x="288" y="52">7</text>
                  <text x="304" y="52">8</text>
                  <text x="320" y="52">9</text>
                  <text x="336" y="52">0</text>
                  <text x="352" y="52">1</text>
                  <text x="368" y="52">2</text>
                  <text x="384" y="52">3</text>
                  <text x="400" y="52">4</text>
                  <text x="416" y="52">5</text>
                  <text x="432" y="52">6</text>
                  <text x="448" y="52">7</text>
                  <text x="464" y="52">8</text>
                  <text x="480" y="52">9</text>
                  <text x="496" y="52">0</text>
                  <text x="512" y="52">1</text>
                  <text x="72" y="84">Cause</text>
                  <text x="116" y="84">Code</text>
                  <text x="144" y="84">=</text>
                  <text x="172" y="84">TBA9</text>
                  <text x="360" y="84">Cause</text>
                  <text x="412" y="84">Length</text>
                  <text x="104" y="116">Extra</text>
                  <text x="152" y="116">Cause</text>
                  <text x="188" y="116">#1</text>
                  <text x="360" y="116">Extra</text>
                  <text x="408" y="116">Cause</text>
                  <text x="444" y="116">#2</text>
                  <text x="96" y="148">Extra</text>
                  <text x="144" y="148">Cause</text>
                  <text x="188" y="148">#N-1</text>
                  <text x="360" y="148">Extra</text>
                  <text x="408" y="148">Cause</text>
                  <text x="444" y="148">#N</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|     Cause Code = TBA9         |         Cause Length          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|         Extra Cause #1        |         Extra Cause #2        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|        Extra Cause #N-1       |         Extra Cause #N        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
          </artset>
        </figure>
        <dl newline="true">
          <dt>Cause Code: 16 bits (unsigned integer)</dt>
          <dd>
            <t>The SCTP Error Chunk Cause Code indicating "Error in Protection" is TBA9.</t>
          </dd>
          <dt>Cause Length: 16 bits (unsigned integer)</dt>
          <dd>
            <t>Is for N extra Causes equal to  4 + N * 2</t>
          </dd>
          <dt>Extra Cause: 16 bits (unsigned integer)</dt>
          <dd>
            <t>Each Extra Cause indicate an additional piece of information as part
of the error. There MAY be zero to as many as can fit in the extra
cause field in the ERROR Chunk (A maximum of 32764).</t>
          </dd>
        </dl>
        <t>Editor's Note: Please replace TBA9 above with what is assigned by IANA.</t>
        <t>Below a number of defined Error Causes (Extra Cause above) are
defined, additional causes can be registered with IANA following the
rules in <xref target="IANA-Extra-Cause"/>.</t>
        <section anchor="enocommonpsi">
          <name>No Common Protection Solution</name>
          <t>If the responder to do not support any of the protection solutions
offered by the association initiator in the Protection Soluiton
Parameters <xref target="sctp-DTLS-chunk-init-options"/> SCTP will send an ABORT
chunk in response to the INIT chunk (Section 5.1 of <xref target="RFC9260"/>,
including the error cause "Error in DTLS Chunk" <xref target="eprotect"/> and
containing the Extra Cause "No Common Protection Solution".</t>
        </section>
      </section>
      <section anchor="eengine">
        <name>Critical Error from DTLS</name>
        <t>The Chunk Protection Operator MAY inform local SCTP endpoint about errors.
When an Error in the DTLS 1.3 compromises the protection mechanism,
the Chunk Protection Operator may stop processing data altogether, thus the
local SCTP endpoint will not be able to send or receive any chunk for
the specified Association.  This will cause the SCTP Association to be
closed by legacy timer-based mechanism. Since the Association
protection is compromised no further data will be sent and the remote
peer will also experience timeout on the Association.</t>
      </section>
      <section anchor="non-critical-errors">
        <name>Non-critical Error in the Protection</name>
        <t>A non-critical error in Chunk Protection Operator means that the
Chunk Protection Operator is capable of recovering without the need
of the whole SCTP Association to be re-established.</t>
        <t>From SCTP perspective, a non-critical error will be perceived
as a temporary problem in the transport and will be handled
with retransmissions and SACKS according to <xref target="RFC9260"/>.</t>
        <t>When the Chunk Protection Operator will experience a non-critical error,
an ABORT chunk SHALL NOT be sent.</t>
      </section>
    </section>
    <section anchor="procedures">
      <name>Procedures</name>
      <section anchor="establishment-procedure">
        <name>Establishment of a Protected Association</name>
        <t>An SCTP Endpoint acting as initiator willing to create a DTLS 1.3
chunk protected association shall send to the remote peer an INIT
chunk containing the DTLS 1.3 Chunk Protected Association parameter
(see <xref target="protectedassoc-parameter"/>) indicating supported and preferred
key-management solutions (see
<xref target="sctp-DTLS-chunk-init-options"/>).</t>
        <t>An SCTP Endpoint acting as responder, when receiving an INIT chunk
with DTLS 1.3 Chunk Protected Association parameter, will reply with
INIT-ACK with its own DTLS 1.3 Chunk Protected Association parameter
containing the selected protection solution out of the set of supported
ones. In case there are no common set of supported solutions that are
accepted by the responder, and the endpoints policy require secured
association it SHALL reply with an ABORT chunk, include the error
cause "Error in DTLS Chunk" <xref target="eprotect"/> and containing the Extra
Cause "No Common Protection Solution" <xref target="enocommonpsi"/>. Otherwise, the
responder MAY send an INIT-ACK without the DTLS 1.3 Chunk Protected
Association parameter to indicate it is willing to create a session
without security.</t>
        <t>Additionally, an SCTP Endpoint acting as responder willing to support
only protected associations shall consider an INIT chunk not containing
the DTLS 1.3 Chunk Protected Association parameter or another
Protection Solution accepted by own security policy solution as an error,
thus it will reply with an ABORT chunk according to what specified in
<xref target="enoprotected"/> indicating that for this endpoint mandatory DTLS 1.3
Chunk Protected Association parameter is missing.</t>
        <t>When initiator and responder have agreed on a DTLS Chunk protected
association by means of handshaking INIT/INIT-ACK the SCTP association
establishment continues until it has reached the ESTABLISHED state.</t>
        <t>When the SCTP session has been established follow the process defined
by the selected key-management solution for establishing DTLS Key Contexts
and installing them.</t>
        <section anchor="offering-multiple-security-solutions">
          <name>Offering Multiple Security Solutions</name>
          <t>An initiator of an SCTP association may want to offer multiple
different key-management solutions for DTLS Chunk or in combination
with other security solutions in addition to DTLS 1.3 chunks for the
SCTP association. This can be done but need to consider the downgrade
attack risks (see <xref target="Downgrade-Attacks"/>).</t>
          <t>The initiator MAY include in its INIT additional security solutions
that are compatible to offer in parallel with DTLS 1.3 Chunks. This
may include SCTP-AUTH <xref target="I-D.ietf-tsvwg-rfc4895-bis"/>. This will result
in that a number of different SCTP parameters may be included that are
not possible to use simultaneously. Instead the responder needs to parse
these parameters to figure out which sets of solutions that are
offered that the implementation support, and apply its security
policies to select the most appropriate. For example an offer of DTLS
1.3 Chunks and SCTP-AUTH, could be interpreted as three different
solutions with different properties, namely DTLS 1.3 Chunks,
DTLS/SCTP <xref target="RFC6083"/>, and SCTP-AUTH <xref target="I-D.ietf-tsvwg-rfc4895-bis"/> only.
However, here the DTLS 1.3 Chunk Protected Association Parameter can
indicate both preference and which of the solutions that are desired.</t>
          <t>The responder selects one or possibly more of compatible security
solutions that can be used simultaneously and include them in the
response (INIT-ACK). If DTLS 1.3 chunks was selected and the
Key-Management method follows the recommendation for down-grade
prevention the endpoints can know that down-grade did not happen.</t>
        </section>
      </section>
      <section anchor="termination-procedure">
        <name>Termination of a Protected Association</name>
        <t>Besides the procedures for terminating an association explained in
<xref target="RFC9260"/>, DTLS 1.3 SHALL ask SCTP endpoint for terminating an
association when having an internal error or by detecting a security
violation.  During the termination procedure all Control Chunks SHALL
be protected except SHUTDOWN-COMPLETE. The internal design of
Protection Engines and their capability is out of the scope of the
current document.</t>
      </section>
      <section anchor="key-management-considerations">
        <name>Considerations on Key Management</name>
        <t>It is up to the upper layer to manage the keys for the DTLS chunk.
One example of such a in-band DTLS key management is
<xref target="I-D.westerlund-tsvwg-sctp-DTLS-handshake"/>.
The key management SHOULD use a dedicated PPID to ensure that the
user messages are handled by the appropriate layer.</t>
        <t>When performing key management, the keys for receiving SHOULD be installed
before the corresponding send keys at the peer. For mitigating downgrade
attacks the key derivation MUST include the protection solution Identifiers
that were sent and received.</t>
        <t>The communication is only protected after both sides have configured the keys
for sending and both sides have enforced the protection.</t>
        <t>To prevent downgrade attacks the key-management methods SHOULD include
in its input to key derivation the offered list in priority order of
protections solutions from the SCTP associations INIT chunk's DTLS 1.3
Chunk Protected Association parameter. By both peers including the
sent and received list, respectively, in the key derivation any
downgrade will result in a key-missmatch between the SCTP assocation
initiator and responder, resulting in the SCTP assocation failing
after having installed key contexts, thus preventing any down-grade
attempt to weaking the security. Methods not including the list of
offered protection solutions will enable a downgrade to such a
key-management method.</t>
      </section>
    </section>
    <section anchor="dtls-chunk-handling">
      <name>DTLS Chunk Handling</name>
      <t>The DTLS chunk MUST NOT be bundled with any other chunk.
In particular, it MUST be the first chunk.</t>
      <figure anchor="sctp-DTLS-encrypt-chunk-states-1">
        <name>Unprotected SCTP Packet</name>
        <artset>
          <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="208" width="528" viewBox="0 0 528 208" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,64 L 8,192" fill="none" stroke="black"/>
              <path d="M 520,64 L 520,192" fill="none" stroke="black"/>
              <path d="M 8,64 L 520,64" fill="none" stroke="black"/>
              <path d="M 8,96 L 520,96" fill="none" stroke="black"/>
              <path d="M 8,128 L 520,128" fill="none" stroke="black"/>
              <path d="M 8,160 L 520,160" fill="none" stroke="black"/>
              <path d="M 8,192 L 520,192" fill="none" stroke="black"/>
              <g class="text">
                <text x="16" y="36">0</text>
                <text x="176" y="36">1</text>
                <text x="336" y="36">2</text>
                <text x="496" y="36">3</text>
                <text x="16" y="52">0</text>
                <text x="32" y="52">1</text>
                <text x="48" y="52">2</text>
                <text x="64" y="52">3</text>
                <text x="80" y="52">4</text>
                <text x="96" y="52">5</text>
                <text x="112" y="52">6</text>
                <text x="128" y="52">7</text>
                <text x="144" y="52">8</text>
                <text x="160" y="52">9</text>
                <text x="176" y="52">0</text>
                <text x="192" y="52">1</text>
                <text x="208" y="52">2</text>
                <text x="224" y="52">3</text>
                <text x="240" y="52">4</text>
                <text x="256" y="52">5</text>
                <text x="272" y="52">6</text>
                <text x="288" y="52">7</text>
                <text x="304" y="52">8</text>
                <text x="320" y="52">9</text>
                <text x="336" y="52">0</text>
                <text x="352" y="52">1</text>
                <text x="368" y="52">2</text>
                <text x="384" y="52">3</text>
                <text x="400" y="52">4</text>
                <text x="416" y="52">5</text>
                <text x="432" y="52">6</text>
                <text x="448" y="52">7</text>
                <text x="464" y="52">8</text>
                <text x="480" y="52">9</text>
                <text x="496" y="52">0</text>
                <text x="512" y="52">1</text>
                <text x="236" y="84">Common</text>
                <text x="292" y="84">Header</text>
                <text x="248" y="116">Chunk</text>
                <text x="284" y="116">#1</text>
                <text x="240" y="148">.</text>
                <text x="256" y="148">.</text>
                <text x="272" y="148">.</text>
                <text x="248" y="180">Chunk</text>
                <text x="284" y="180">#n</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art" align="center"><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                         Common Header                         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           Chunk #1                            |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                            . . .                              |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           Chunk #n                            |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </artset>
      </figure>
      <t>The diagram shown in <xref target="sctp-DTLS-encrypt-chunk-states-1"/> describes
the structure of an unprotected SCTP packet as described in <xref target="RFC9260"/>.</t>
      <figure anchor="sctp-DTLS-encrypt-chunk-states-2">
        <name>Protected SCTP Packets</name>
        <artset>
          <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="144" width="528" viewBox="0 0 528 144" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,64 L 8,128" fill="none" stroke="black"/>
              <path d="M 520,64 L 520,128" fill="none" stroke="black"/>
              <path d="M 8,64 L 520,64" fill="none" stroke="black"/>
              <path d="M 8,96 L 520,96" fill="none" stroke="black"/>
              <path d="M 8,128 L 520,128" fill="none" stroke="black"/>
              <g class="text">
                <text x="16" y="36">0</text>
                <text x="176" y="36">1</text>
                <text x="336" y="36">2</text>
                <text x="496" y="36">3</text>
                <text x="16" y="52">0</text>
                <text x="32" y="52">1</text>
                <text x="48" y="52">2</text>
                <text x="64" y="52">3</text>
                <text x="80" y="52">4</text>
                <text x="96" y="52">5</text>
                <text x="112" y="52">6</text>
                <text x="128" y="52">7</text>
                <text x="144" y="52">8</text>
                <text x="160" y="52">9</text>
                <text x="176" y="52">0</text>
                <text x="192" y="52">1</text>
                <text x="208" y="52">2</text>
                <text x="224" y="52">3</text>
                <text x="240" y="52">4</text>
                <text x="256" y="52">5</text>
                <text x="272" y="52">6</text>
                <text x="288" y="52">7</text>
                <text x="304" y="52">8</text>
                <text x="320" y="52">9</text>
                <text x="336" y="52">0</text>
                <text x="352" y="52">1</text>
                <text x="368" y="52">2</text>
                <text x="384" y="52">3</text>
                <text x="400" y="52">4</text>
                <text x="416" y="52">5</text>
                <text x="432" y="52">6</text>
                <text x="448" y="52">7</text>
                <text x="464" y="52">8</text>
                <text x="480" y="52">9</text>
                <text x="496" y="52">0</text>
                <text x="512" y="52">1</text>
                <text x="236" y="84">Common</text>
                <text x="292" y="84">Header</text>
                <text x="236" y="116">DTLS</text>
                <text x="280" y="116">Chunk</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art" align="center"><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                         Common Header                         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                          DTLS Chunk                           |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </artset>
      </figure>
      <t>The diagram shown in <xref target="sctp-DTLS-encrypt-chunk-states-2"/> describes
the structure of a protected SCTP packet being sent.
Such packets are built with the SCTP common header.
Only one DTLS chunk can be sent in a SCTP packet.</t>
      <section anchor="dtls-chunk-sending">
        <name>Sending of DTLS Chunks</name>
        <t>When the credentials for sending DTLS chunks have been configured by the
application, all SCTP packets are sent with a DTLS chunk.</t>
        <t>When an SCTP packet needs to be sent, the sequence of chunks is used
as DTLSInnerPlaintext.content and DTLSInnerPlaintext.type is set to
application_data. Then the DTLSCiphertext is computed and used as the
payload of the DTLS chunk. Finally the SCTP common header is prepended.</t>
        <t>When the DTLS chunk is used, the DTLS chunk header and the overhead of DTLS
has to be considered to ensure that the final SCTP packet does not exceed
the PMTU.</t>
      </section>
      <section anchor="dtls-chunk-receiving">
        <name>Receiving of DTLS Chunks</name>
        <t>When an SCTP packet containing a DTLS chunk bundled with any other
chunk is received, the packet MUST be silently discarded.</t>
        <t>After the application has restricted the SCTP packet handling to protected
SCTP packets only, a SCTP packet not containing a DTLS chunk MUST be
silently discarded.</t>
        <t>When processing the payload of the DTLS chunk (i.e. the DTLSCiphertest),
the Restart flag in addition to the unified_hdr is used to find the keys for
processing the encrypted_record.</t>
        <t>After the encrypted_record has been verified and decrypted, the
corresponding chunks (the DTLSInnerPlaintext.content) are processed as
defined in the corresponding specifications.</t>
      </section>
    </section>
    <section anchor="abstract-api">
      <name>Abstract API</name>
      <t>This section describes an abstract API that is needed between a key
establishment part and the DTLS 1.3 protection chunk. This is an
example API and there are alternative implementations.</t>
      <t>This API enables the cryptographical protection operations by setting
client/server write key and IV for primary and restart DTLS key
context. The key is the primary cryptograpical key used by the cipher
suit for DTLS record protection (Section 5.2 of <xref target="RFC8446"/>. The
initilization vector (IV) is cryptographical random material used to
XOR with the sequence number to create the nonce per Section 5.3 of
<xref target="RFC8446"/>.</t>
      <section anchor="cipher-suit-capabilities">
        <name>Cipher Suit Capabilities</name>
        <t>The key-management function needs to know which cipher suits defined
for usage with DTLS 1.3 that are supported by the DTLS chunk and its
protection operations block. All TLS cipher suit that are defined are
listed in the TLS cipher suit registry <xref target="TLS-CIPHER-SUITS"/> at IANA
and are identified by a 2-byte value. Thus this needs to return a list
of all supported cipher suits to the higher layer.</t>
        <t>Request : Get Cipher Suits</t>
        <t>Parameters : none</t>
        <t>Reply   : Cipher Suits</t>
        <t>Parameters : list of cipher suits</t>
      </section>
      <section anchor="establish-client-write-keying-material">
        <name>Establish Client Write Keying Material</name>
        <t>The DTLS Chunk can use one of out of multiple sets of cipher suit and
corresponding key materials.</t>
        <t>The following information needs to be provided when setting Client Write (transmit) Keying material:</t>
        <t>Request : Establish Client Write Key and IV</t>
        <t>Parameters :</t>
        <ul spacing="normal">
          <li>
            <dl>
              <dt>SCTP Association:</dt>
              <dd>
                <t>Reference to the relevant SCTP association to set the keying material for.</t>
              </dd>
            </dl>
          </li>
          <li>
            <dl>
              <dt>Restart indication:</dt>
              <dd>
                <t>A bit indicating whether the Key is for restart purposes</t>
              </dd>
            </dl>
          </li>
          <li>
            <t>DTLS Connection ID: : If DTLS connection ID (CID) has been negotiated by
the key-management its field length and value are include. The field length
can be set to zero (0) to indicate that CID is not used.</t>
          </li>
          <li>
            <dl>
              <dt>DTLS Epoch:</dt>
              <dd>
                <t>The DTLS epoch these keys are valid for. Note that Epoch lower than
3 are not expected as they are used during DTLS handshake.</t>
              </dd>
            </dl>
          </li>
          <li>
            <dl>
              <dt>Cipher Suit:</dt>
              <dd>
                <t>2 bytes cipher suit identification for the DTLS 1.3 Cipher suit used
to identify the DTLS AEAD algorithm to perform the DTLS record protection.
The cipher suite is fixed for a (SCTP Association, Key) pair.</t>
              </dd>
            </dl>
          </li>
          <li>
            <dl>
              <dt>Write Key and IV:</dt>
              <dd>
                <t>The cipher suit specific binary object containing all necessary
information for protection operations. The secret will used by the DTLS 1.3 client to
encrypt the record. Binary arbitrary long object depending on the
cipher suit used.</t>
              </dd>
            </dl>
          </li>
        </ul>
        <t>Reply : Established or Failed</t>
      </section>
      <section anchor="establish-server-write-keying-material">
        <name>Establish Server Write Keying Material</name>
        <t>The DTLS Chunk can use one of out of multiple sets of cipher suit and
corresponding key materials.</t>
        <t>The following information needs to be provided when setting Server Write (transmit) Keying material:</t>
        <t>Request : Establish Server Write Key and IV</t>
        <t>Parameters :</t>
        <ul spacing="normal">
          <li>
            <dl>
              <dt>SCTP Association:</dt>
              <dd>
                <t>Reference to the relevant SCTP association to set the keying material for.</t>
              </dd>
            </dl>
          </li>
          <li>
            <dl>
              <dt>Restart indication:</dt>
              <dd>
                <t>A bit indicating whether the Key is for restart purposes</t>
              </dd>
            </dl>
          </li>
          <li>
            <t>DTLS Connection ID: : If DTLS connection ID (CID) has been negotiated by
the key-management its field length and value are include. The field length
can be set to zero (0) to indicate that CID is not used.</t>
          </li>
          <li>
            <dl>
              <dt>DTLS Epoch:</dt>
              <dd>
                <t>The DTLS epoch these keys are valid for. Note that Epoch lower than
3 are note expected as they are used during DTLS handshake.</t>
              </dd>
            </dl>
          </li>
          <li>
            <dl>
              <dt>Cipher Suit:</dt>
              <dd>
                <t>2 bytes cipher suit identification for the DTLS 1.3 Cipher suit used
to identify the DTLS AEAD algorithm to perform the DTLS record protection.
The cipher suite is fixed for a (SCTP Association, Key) pair.</t>
              </dd>
            </dl>
          </li>
          <li>
            <dl>
              <dt>Write Key and IV:</dt>
              <dd>
                <t>The cipher suit specific binary object containing all necessary
information for protection operations. The secret will used by the DTLS 1.3 client to
encrypt the record. Binary arbitrary long object depending on the
cipher suit used.</t>
              </dd>
            </dl>
          </li>
        </ul>
        <t>Reply : Established or Failed</t>
      </section>
      <section anchor="destroy-client-write-keying-material">
        <name>Destroy Client Write Keying Material</name>
        <t>A function to destroy the Client Write (transmit) keying material for a given epoch for a given
Key for a given SCTP Association.</t>
        <t>Request : Destroy client write key and IV</t>
        <t>Parameters :</t>
        <ul spacing="normal">
          <li>
            <t>SCTP Association</t>
          </li>
          <li>
            <t>Restart indication</t>
          </li>
          <li>
            <t>DTLS CID</t>
          </li>
          <li>
            <t>DTLS Epoch</t>
          </li>
        </ul>
        <t>Reply: Destroyed</t>
        <t>Parameters : true or false</t>
      </section>
      <section anchor="destroy-server-write-keying-material">
        <name>Destroy Server Write Keying Material</name>
        <t>A function to destroy the Server Write (transmit) keying material for a given epoch for a given
Key for a given SCTP Association.</t>
        <t>Request : Destroy server write key and IV</t>
        <t>Parameters :</t>
        <ul spacing="normal">
          <li>
            <t>SCTP Association</t>
          </li>
          <li>
            <t>Restart indication</t>
          </li>
          <li>
            <t>DTLS CID</t>
          </li>
          <li>
            <t>DTLS Epoch</t>
          </li>
        </ul>
        <t>Reply: Destroyed</t>
        <t>Parameters : true or false</t>
      </section>
      <section anchor="set-key-to-use">
        <name>Set Key to Use</name>
        <t>Set which key to use to protect the future SCTP packets sent by the
SCTP Association.</t>
        <t>Request : Set Key used</t>
        <t>Parameters :</t>
        <ul spacing="normal">
          <li>
            <t>SCTP Association</t>
          </li>
          <li>
            <t>Restart indication</t>
          </li>
          <li>
            <t>DTLS CID</t>
          </li>
          <li>
            <t>DTLS Epoch</t>
          </li>
        </ul>
        <t>Reply: Key set</t>
        <t>Parameters : true or false</t>
      </section>
      <section anchor="require-protected-sctp-packets">
        <name>Require Protected SCTP Packets</name>
        <t>A function to configure an SCTP association to require that normal
SCTP packets must be protected in a DTLS Chunk going forward.</t>
        <t>Parameters:</t>
        <ul spacing="normal">
          <li>
            <t>SCTP Association</t>
          </li>
        </ul>
        <t>Reply: Acknowledgement</t>
      </section>
      <section anchor="get-q">
        <name>Get q</name>
        <t>Get q, the number of protected messages (AEAD encryption invocations) for
a given epoch.</t>
        <t>Request : Get q</t>
        <t>Parameters :</t>
        <ul spacing="normal">
          <li>
            <t>SCTP Association</t>
          </li>
          <li>
            <t>Restart indication</t>
          </li>
          <li>
            <t>DTLS CID</t>
          </li>
          <li>
            <t>DTLS Epoch</t>
          </li>
        </ul>
        <t>Reply: q</t>
        <t>Parameters : non-negative integer</t>
      </section>
      <section anchor="get-v">
        <name>Get v</name>
        <t>Get v, the number of attacker forgery attempts
(failed AEAD decryption invocations) for a given epoch.</t>
        <t>Request : Get v</t>
        <t>Parameters :</t>
        <ul spacing="normal">
          <li>
            <t>SCTP Association</t>
          </li>
          <li>
            <t>Restart indication</t>
          </li>
          <li>
            <t>DTLS CID</t>
          </li>
          <li>
            <t>DTLS Epoch</t>
          </li>
        </ul>
        <t>Reply: v</t>
        <t>Parameters : non-negative integer</t>
      </section>
      <section anchor="configure-replay-protection">
        <name>Configure Replay Protection</name>
        <t>The DTLS replay protection in this usage is expected to be fairly
robust. Its depth of handling is related to maximum network path
reordering that the receiver expects to see during the SCTP
association. However as the actual reordering in number of packets are
a combination of how delayed one packet may be compared to another
times the actual packet rate this can grow for some applications and
may need to be tuned. Thus, having the potential for setting this a
more suitable value depending on the use case should be considered.</t>
        <t>Note this sets this configuration to be used across any DTLS key
context for a given SCTP Association and primary/restart usages.</t>
        <t>Request : Configure Replay Protection</t>
        <t>Parameters :</t>
        <ul spacing="normal">
          <li>
            <t>SCTP Association</t>
          </li>
          <li>
            <t>Restart indication</t>
          </li>
          <li>
            <t>Configuration parameters</t>
          </li>
        </ul>
        <t>Reply: Replay Protection Configured</t>
        <t>Parameters : true or false</t>
      </section>
    </section>
    <section anchor="socket-api">
      <name>Socket API Considerations</name>
      <t>This section describes how the socket API defined in <xref target="RFC6458"/> needs to be
extended to provide a way for the application to control the usage of the
DTLS chunk.</t>
      <t>A 'Socket API Considerations' section is contained in all SCTP-related
specifications published after <xref target="RFC6458"/> describing an extension for which
implementations using the socket API as specified in <xref target="RFC6458"/> would require
some extension of the socket API.
Please note that this section is informational only.</t>
      <t>A socket API implementation based on <xref target="RFC6458"/> is extended by supporting
several new IPPROTO_SCTP-level socket options and a new flag for recvmsg().</t>
      <section anchor="a-new-flag-for-recvmsg-msgprotected">
        <name>A New Flag for recvmsg() (MSG_PROTECTED)</name>
        <t>This flag is returned by recvmsg() in msg_flags for all user messages for
which all DATA chunks where received in protected SCTP packets.
This also means that if sctp_recvv() is used, MSG_PROTECTED is returned in
the *flags argument.</t>
      </section>
      <section anchor="get-the-supported-cipher-suits-sctpdtlssupportedciphersuits">
        <name>Get the Supported Cipher Suits (SCTP_DTLS_SUPPORTED_CIPHER_SUITS)</name>
      </section>
      <section anchor="get-or-set-the-local-protection-method-identifiers-sctpdtlslocalpmids">
        <name>Get or Set the Local Protection Method Identifiers (SCTP_DTLS_LOCAL_PMIDS)</name>
      </section>
      <section anchor="get-the-remote-protection-method-identifiers-sctpdtlsremotepmids">
        <name>Get the Remote Protection Method Identifiers (SCTP_DTLS_REMOTE_PMIDS)</name>
      </section>
      <section anchor="set-the-sender-keys-sctpdtlssetsendkeys">
        <name>Set the Sender Keys (SCTP_DTLS_SET_SEND_KEYS)</name>
      </section>
      <section anchor="add-receive-keys-sctpdtlsaddrecvkeys">
        <name>Add Receive Keys (SCTP_DTLS_ADD_RECV_KEYS)</name>
      </section>
      <section anchor="delete-receive-keys-sctpdtlsdelrecvkeys">
        <name>Delete Receive Keys (SCTP_DTLS_DEL_RECV_KEYS)</name>
      </section>
      <section anchor="enforce-protection-sctpdtlsenforceprotection">
        <name>Enforce Protection (SCTP_DTLS_ENFORCE_PROTECTION)</name>
      </section>
      <section anchor="get-statistic-counters-sctpdtlsstats">
        <name>Get Statistic Counters (SCTP_DTLS_STATS)</name>
      </section>
    </section>
    <section anchor="implementation-considerations">
      <name>Implementation Considerations</name>
      <section anchor="privacy-padding-of-sctp-packets">
        <name>Privacy Padding of SCTP Packets</name>
        <t>To reduce the potential information leakage from packet size
variations one may select to pad the SCTP Packets to uniform packet
sizes. This size may be either the maximum used, or in block sized
increments. However, the padding needs to be done inside of the
encryption envelope.</t>
        <t>Both SCTP and DTLS contains mechanisms to pad SCTP payloads, and DTLS
records respectively. If padding of SCTP packets are desired to hide
actual message sizes it RECOMMEDED to use the SCTP Padding Chunk
<xref target="RFC4820"/> to generate a consistent SCTP payload size. Support of
this chunk is only required on the sender side, any SCTP receiver will
safely ignore the PAD Chunk. However, if the PAD chunk is not
supported DTLS padding MAY be used.</t>
        <t>It needs to be noted that independent if SCTP padding or DTLS padding
is used the padding is not taken into account by the SCTP congestion
control. Extensive use of padding has potential for worsen congestion
situations as the SCTP association will consume more bandwidth than
its derived share by the congestion control.</t>
        <t>The use of SCTP PAD chunk is recommended as it at least can enable
future extension or SCTP implementation that account also for the
padding. Use of DTLS padding hides this packet expansion from SCTP.</t>
      </section>
    </section>
    <section anchor="IANA-Consideration">
      <name>IANA Considerations</name>
      <t>This document defines two new registries in the Stream Control
Transmission Protocol (SCTP) Parameters group that IANA
maintains. Theses registries are for the extra cause codes for
protection related errors and the Protection Options identifiers for
the PVALID chunk. It also adds registry entries into several other
registries in the Stream Control Transmission Protocol (SCTP)
Parameters group:</t>
      <ul spacing="normal">
        <li>
          <t>One new SCTP Chunk Types</t>
        </li>
        <li>
          <t>One new SCTP Chunk Parameter Type</t>
        </li>
        <li>
          <t>One new SCTP Error Cause Code</t>
        </li>
      </ul>
      <t>And finally the update of one registered SCTP Payload Protocol
Identifier.</t>
      <section anchor="IANA-Extra-Cause">
        <name>Protection Error Cause Codes Registry</name>
        <t>IANA is requested to create a new registry called "Protection Error
Cause Codes". This registry is part of the Stream Control Transmission
Protocol (SCTP) Parameters grouping.</t>
        <t>The purpose of this registry is to enable identification of different
protection related errors when using DTLS chunk and a protection
engine.  Entries in the registry requires a Meaning, a reference to
the specification defining the error, and a contact. Each entry will
be assigned by IANA a unique 16-bit unsigned integer
identifier. Values 0-65534 are available for assignment. Value 65535
is reserved for future extension. The proposed general form of the
registry is depicted below in <xref target="iana-protection-error-cause"/>.</t>
        <table anchor="iana-protection-error-cause">
          <name>Protection Error Cause Code</name>
          <thead>
            <tr>
              <th align="right">Cause Code</th>
              <th align="left">Meaning</th>
              <th align="left">Reference</th>
              <th align="left">Contact</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="right">0</td>
              <td align="left">No Common Protection Solution</td>
              <td align="left">RFC-To-Be</td>
              <td align="left">Authors</td>
            </tr>
            <tr>
              <td align="right">1-65534</td>
              <td align="left">Available for Assignment</td>
              <td align="left">RFC-To-Be</td>
              <td align="left">Authors</td>
            </tr>
            <tr>
              <td align="right">65535</td>
              <td align="left">Reserved</td>
              <td align="left">RFC-To-Be</td>
              <td align="left">Authors</td>
            </tr>
          </tbody>
        </table>
        <t>New entries are registered following the Specification Required policy
as defined by <xref target="RFC8126"/>.</t>
      </section>
      <section anchor="IANA-Protection-Solution-ID">
        <name>SCTP Protection Solution Identifiers</name>
        <t>IANA is requested to create a new registry called "SCTP Protection
Solutions". This registry is part of the of the Stream
Control Transmission Protocol (SCTP) Parameters grouping.</t>
        <t>The purpose of this registry is to assign Protection Solution
Identifier for any security solution that is either using the DTLS
Chunk combined with a key-management method, offered as an alternative
to DTLS chunk, or themselves want to use the PVALID message mechanism
to detect downgrade attacks. Any security solution that is offered
through a parameter exchange during the SCTP handshake are potential
to be included here.</t>
        <t>Each entry will be assigned a 16-bit unsigned integer value from the suitable range.</t>
        <table anchor="iana-psi">
          <name>PVALID Protection Solution Identifiers</name>
          <thead>
            <tr>
              <th align="right">Identifier</th>
              <th align="left">Solution Name</th>
              <th align="left">Reference</th>
              <th align="left">Contact</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="right">0</td>
              <td align="left">DTLS 1.3 Chunk with Pre-</td>
              <td align="left">RFC-TBD</td>
              <td align="left">Draft Authors</td>
            </tr>
            <tr>
              <td align="right">1-4095</td>
              <td align="left">Available for Assignment using Specification Required policy</td>
              <td align="left"> </td>
              <td align="left"> </td>
            </tr>
            <tr>
              <td align="right">4096-65535</td>
              <td align="left">Available for Assignment using First Come, First Served policy</td>
              <td align="left"> </td>
              <td align="left"> </td>
            </tr>
          </tbody>
        </table>
        <t>New entries in the range 0-4095 are registered following the Specification Required policy
as defined by <xref target="RFC8126"/>.  New entries in the range 4096-65535 are first come, first served.</t>
      </section>
      <section anchor="sctp-chunk-type">
        <name>SCTP Chunk Type</name>
        <t>In the Stream Control Transmission Protocol (SCTP) Parameters group's
"Chunk Types" registry, IANA is requested to add the one new entry
depicted below in in <xref target="iana-chunk-types"/> with a reference to this
document. The registry at time of writing was available at:
https://www.iana.org/assignments/sctp-parameters/sctp-parameters.xhtml#sctp-parameters-1</t>
        <table anchor="iana-chunk-types">
          <name>New Chunk Type Registered</name>
          <thead>
            <tr>
              <th align="right">ID Value</th>
              <th align="left">Chunk Type</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="right">TBA6</td>
              <td align="left">DTLS Chunk (DTLS)</td>
              <td align="left">RFC-To-Be</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="sctp-chunk-parameter-types">
        <name>SCTP Chunk Parameter Types</name>
        <t>In the Stream Control Transmission Protocol (SCTP) Parameters group's
"Chunk Parameter Types" registry, IANA is requested to add the new
entry depicted below in in <xref target="iana-chunk-parameter-types"/> with a
reference to this document. The registry at time of writing was
available at:
https://www.iana.org/assignments/sctp-parameters/sctp-parameters.xhtml#sctp-parameters-2</t>
        <table anchor="iana-chunk-parameter-types">
          <name>New Chunk Type Parameters Registered</name>
          <thead>
            <tr>
              <th align="right">ID Value</th>
              <th align="left">Chunk Parameter Type</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="right">TBA8</td>
              <td align="left">DTLS 1.3 Chunk Protected Association</td>
              <td align="left">RFC-To-Be</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="sctp-error-cause-codes">
        <name>SCTP Error Cause Codes</name>
        <t>In the Stream Control Transmission Protocol (SCTP) Parameters group's
"Error Cause Codes" registry, IANA is requested to add the new
entry depicted below in in <xref target="iana-error-cause-codes"/> with a
reference to this document. The registry at time of writing was
available at:
https://www.iana.org/assignments/sctp-parameters/sctp-parameters.xhtml#sctp-parameters-24</t>
        <table anchor="iana-error-cause-codes">
          <name>Error Cause Codes Parameters Registered</name>
          <thead>
            <tr>
              <th align="right">ID Value</th>
              <th align="left">Error Cause Codes</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="right">TBA9</td>
              <td align="left">DTLS Chunk Error</td>
              <td align="left">RFC-To-Be</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="sec-iana-ppid">
        <name>SCTP Payload Protocol Identifier</name>
        <t>In the Stream Control Transmission Protocol (SCTP) Parameters group's
"Payload Protocol Identifiers" registry, IANA is requested to update the
entry depicted below in in <xref target="iana-payload-protection-id"/> with a
reference to this document. The registry at time of writing was
available at:
https://www.iana.org/assignments/sctp-parameters/sctp-parameters.xhtml#sctp-parameters-25</t>
        <table anchor="iana-payload-protection-id">
          <name>Protection Operator Protocol Identifier Registered</name>
          <thead>
            <tr>
              <th align="right">ID Value</th>
              <th align="left">SCTP Payload Protocol Identifier</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="right">4242</td>
              <td align="left">DTLS Chunk Key-Management Messages</td>
              <td align="left">RFC-To-Be</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
    <section anchor="Security-Considerations">
      <name>Security Considerations</name>
      <t>All the security and privacy considerations of the security protocol
used as the Chunk Protection Operator applies.</t>
      <t>DTLS replay protection MUST NOT be turned off.</t>
      <section anchor="privacy-considerations">
        <name>Privacy Considerations</name>
        <t>Use of the SCTP DTLS chunk provides privacy to SCTP by protecting user
data and much of the SCTP control signaling. The SCTP association is
identifiable based on the 5-tuple where the destination IP and
port are fixed for each direction. Advanced privacy features such
as changing DTLS Connection ID and sequence number encryption might
therefore have limited effect.</t>
      </section>
      <section anchor="aead-limit-considerations">
        <name>AEAD Limit Considerations</name>
        <t>Section 4.5.3 of <xref target="RFC9147"/> defines limits on the number of records
q that can be protected using the same key as well as limits on the
number of received packets v that fail authentication with each key.
To adhere to these limits the key management function can
periodically poll the DTLS protection operation function to see
when a limit have been reached or is closed to being reached.
Instead of periodic polling, a callback can be used.</t>
      </section>
      <section anchor="Downgrade-Attacks">
        <name>Downgrade Attacks</name>
        <t>As long as the Key-management include the ordered list of protection
solutions indicators present in the parameter part of the INIT chunk
for the SCTP Association in its key-derivation the association will be
protected from down-grade.</t>
        <t>In case any key-management do not include the parameter content in
its key-derivation down-grade might be possible if that key-management
method is selected. It is up to endpoint policies to determine
which protection it deems necessary against down-grade attacks.</t>
      </section>
      <section anchor="sec-considertation-storage">
        <name>Persistent Secure Storage of Restart Key Context</name>
        <t>The Restart DTLS Key Context needs to be stored securely and persistent. Securely
as access to this security context may enable an attacker to perform a restart,
resulting a denial of service on the existing SCTP Association. It can also
give the attacker access to the ULP. Thus the storage needs to provide at least
as strong resistant against exfiltration as the main DTLS Key Context store.</t>
        <t>When it comes to how to realize persistent storage that is highly
dependent on the ULP and how it can utilize restarted SCTP
Associations. One way can be to have an actual secure persistent storage
solution accessible to the endpoint. In other use cases the persistence part
might be accomplished be keeping the current restart DTLS Key Context with
the ULP State if that is sufficiently secure.</t>
      </section>
    </section>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors thank Hannes Tschofenig and Tirumaleswar Reddy for their
participation in the design team and their contributions to this document.
We also like to thank Amanda Baber with IANA for feedback on our IANA registry.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC4820" target="https://www.rfc-editor.org/info/rfc4820" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4820.xml">
          <front>
            <title>Padding Chunk and Parameter for the Stream Control Transmission Protocol (SCTP)</title>
            <author fullname="M. Tuexen" initials="M." surname="Tuexen"/>
            <author fullname="R. Stewart" initials="R." surname="Stewart"/>
            <author fullname="P. Lei" initials="P." surname="Lei"/>
            <date month="March" year="2007"/>
            <abstract>
              <t>This document defines a padding chunk and a padding parameter and describes the required receiver side procedures. The padding chunk is used to pad a Stream Control Transmission Protocol (SCTP) packet to an arbitrary size. The padding parameter is used to pad an SCTP INIT chunk to an arbitrary size. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4820"/>
          <seriesInfo name="DOI" value="10.17487/RFC4820"/>
        </reference>
        <reference anchor="RFC4895" target="https://www.rfc-editor.org/info/rfc4895" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4895.xml">
          <front>
            <title>Authenticated Chunks for the Stream Control Transmission Protocol (SCTP)</title>
            <author fullname="M. Tuexen" initials="M." surname="Tuexen"/>
            <author fullname="R. Stewart" initials="R." surname="Stewart"/>
            <author fullname="P. Lei" initials="P." surname="Lei"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2007"/>
            <abstract>
              <t>This document describes a new chunk type, several parameters, and procedures for the Stream Control Transmission Protocol (SCTP). This new chunk type can be used to authenticate SCTP chunks by using shared keys between the sender and receiver. The new parameters are used to establish the shared keys. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4895"/>
          <seriesInfo name="DOI" value="10.17487/RFC4895"/>
        </reference>
        <reference anchor="RFC5061" target="https://www.rfc-editor.org/info/rfc5061" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5061.xml">
          <front>
            <title>Stream Control Transmission Protocol (SCTP) Dynamic Address Reconfiguration</title>
            <author fullname="R. Stewart" initials="R." surname="Stewart"/>
            <author fullname="Q. Xie" initials="Q." surname="Xie"/>
            <author fullname="M. Tuexen" initials="M." surname="Tuexen"/>
            <author fullname="S. Maruyama" initials="S." surname="Maruyama"/>
            <author fullname="M. Kozuka" initials="M." surname="Kozuka"/>
            <date month="September" year="2007"/>
            <abstract>
              <t>A local host may have multiple points of attachment to the Internet, giving it a degree of fault tolerance from hardware failures. Stream Control Transmission Protocol (SCTP) (RFC 4960) was developed to take full advantage of such a multi-homed host to provide a fast failover and association survivability in the face of such hardware failures. This document describes an extension to SCTP that will allow an SCTP stack to dynamically add an IP address to an SCTP association, dynamically delete an IP address from an SCTP association, and to request to set the primary address the peer will use when sending to an endpoint. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5061"/>
          <seriesInfo name="DOI" value="10.17487/RFC5061"/>
        </reference>
        <reference anchor="RFC6083" target="https://www.rfc-editor.org/info/rfc6083" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6083.xml">
          <front>
            <title>Datagram Transport Layer Security (DTLS) for Stream Control Transmission Protocol (SCTP)</title>
            <author fullname="M. Tuexen" initials="M." surname="Tuexen"/>
            <author fullname="R. Seggelmann" initials="R." surname="Seggelmann"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="January" year="2011"/>
            <abstract>
              <t>This document describes the usage of the Datagram Transport Layer Security (DTLS) protocol over the Stream Control Transmission Protocol (SCTP).</t>
              <t>DTLS over SCTP provides communications privacy for applications that use SCTP as their transport protocol and allows client/server applications to communicate in a way that is designed to prevent eavesdropping and detect tampering or message forgery.</t>
              <t>Applications using DTLS over SCTP can use almost all transport features provided by SCTP and its extensions. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6083"/>
          <seriesInfo name="DOI" value="10.17487/RFC6083"/>
        </reference>
        <reference anchor="RFC8126" target="https://www.rfc-editor.org/info/rfc8126" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8126.xml">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC9147" target="https://www.rfc-editor.org/info/rfc9147" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9147.xml">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="RFC9260" target="https://www.rfc-editor.org/info/rfc9260" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9260.xml">
          <front>
            <title>Stream Control Transmission Protocol</title>
            <author fullname="R. Stewart" initials="R." surname="Stewart"/>
            <author fullname="M. Tüxen" initials="M." surname="Tüxen"/>
            <author fullname="K. Nielsen" initials="K." surname="Nielsen"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>This document describes the Stream Control Transmission Protocol (SCTP) and obsoletes RFC 4960. It incorporates the specification of the chunk flags registry from RFC 6096 and the specification of the I bit of DATA chunks from RFC 7053. Therefore, RFCs 6096 and 7053 are also obsoleted by this document. In addition, RFCs 4460 and 8540, which describe errata for SCTP, are obsoleted by this document.</t>
              <t>SCTP was originally designed to transport Public Switched Telephone Network (PSTN) signaling messages over IP networks. It is also suited to be used for other applications, for example, WebRTC.</t>
              <t>SCTP is a reliable transport protocol operating on top of a connectionless packet network, such as IP. It offers the following services to its users:</t>
              <t>The design of SCTP includes appropriate congestion avoidance behavior and resistance to flooding and masquerade attacks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9260"/>
          <seriesInfo name="DOI" value="10.17487/RFC9260"/>
        </reference>
        <reference anchor="TLS-CIPHER-SUITS" target="https://www.iana.org/assignments/tls-parameters/tls-parameters.xhtml#tls-parameters-4">
          <front>
            <title>TLS Cipher Suites</title>
            <author>
              <organization/>
            </author>
            <date year="2023" month="November"/>
          </front>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC6458" target="https://www.rfc-editor.org/info/rfc6458" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6458.xml">
          <front>
            <title>Sockets API Extensions for the Stream Control Transmission Protocol (SCTP)</title>
            <author fullname="R. Stewart" initials="R." surname="Stewart"/>
            <author fullname="M. Tuexen" initials="M." surname="Tuexen"/>
            <author fullname="K. Poon" initials="K." surname="Poon"/>
            <author fullname="P. Lei" initials="P." surname="Lei"/>
            <author fullname="V. Yasevich" initials="V." surname="Yasevich"/>
            <date month="December" year="2011"/>
            <abstract>
              <t>This document describes a mapping of the Stream Control Transmission Protocol (SCTP) into a sockets API. The benefits of this mapping include compatibility for TCP applications, access to new SCTP features, and a consolidated error and event notification scheme. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6458"/>
          <seriesInfo name="DOI" value="10.17487/RFC6458"/>
        </reference>
        <reference anchor="RFC8446" target="https://www.rfc-editor.org/info/rfc8446" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8446.xml">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="I-D.ietf-tsvwg-rfc4895-bis" target="https://datatracker.ietf.org/doc/html/draft-ietf-tsvwg-rfc4895-bis-05" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-tsvwg-rfc4895-bis.xml">
          <front>
            <title>Authenticated Chunks for the Stream Control Transmission Protocol (SCTP)</title>
            <author fullname="Michael Tüxen" initials="M." surname="Tüxen">
              <organization>Münster Univ. of Applied Sciences</organization>
            </author>
            <author fullname="Randall R. Stewart" initials="R. R." surname="Stewart"/>
            <author fullname="Peter Lei" initials="P." surname="Lei">
              <organization>Netflix, Inc.</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig"/>
            <date day="21" month="April" year="2025"/>
            <abstract>
              <t>This document describes a new chunk type, several parameters, and procedures for the Stream Control Transmission Protocol (SCTP). This new chunk type can be used to authenticate SCTP chunks by using shared keys between the sender and receiver. The new parameters are used to establish the shared keys. This document obsoletes RFC 4895.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tsvwg-rfc4895-bis-05"/>
        </reference>
        <reference anchor="I-D.westerlund-tsvwg-sctp-DTLS-handshake" target="https://datatracker.ietf.org/doc/draft-westerlund-tsvwg-sctp-dtls-handshake/">
          <front>
            <title>Datagram Transport Layer Security (DTLS) in the Stream Control Transmission Protocol (SCTP) DTLS Chunk</title>
            <author initials="M." surname="Westerlund" fullname="Magnus Westerlund">
              <organization>Ericsson</organization>
            </author>
            <author initials="J." surname="Preuß Mattsson" fullname="John Preuß Mattsson">
              <organization>Ericsson</organization>
            </author>
            <author initials="C." surname="Porfiri" fullname="Claudio Porfiri">
              <organization>Ericsson</organization>
            </author>
            <date year="2025" month="July"/>
          </front>
        </reference>
        <reference anchor="ETSI-TS-38.413" target="https://www.etsi.org/deliver/etsi_ts/138400_138499/138413/18.05.00_60/ts_138413v180500p.pdf">
          <front>
            <title>NG Application Protocol (NGAP) version 18.5.0 Release 18</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
