<?xml version='1.0' encoding='utf-8'?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" version="3" category="std" consensus="true" docName="draft-ietf-tls-md5-sha1-deprecate-09" indexInclude="true" ipr="trust200902" number="9155" prepTime="2021-12-20T09:02:28" scripts="Common,Latin" sortRefs="true" submissionType="IETF" symRefs="true" tocDepth="4" tocInclude="true" updates="5246" xml:lang="en">
  <link href="https://datatracker.ietf.org/doc/draft-ietf-tls-md5-sha1-deprecate-09" rel="prev"/>
  <link href="https://dx.doi.org/10.17487/rfc9155" rel="alternate"/>
  <link href="urn:issn:2070-1721" rel="alternate"/>
  <front>
    <title abbrev="Signature Hashes in (D)TLS 1.2">Deprecating MD5 and SHA-1 Signature Hashes in TLS 1.2 and DTLS 1.2</title>
    <seriesInfo name="RFC" value="9155" stream="IETF"/>
    <author fullname="Loganaden Velvindron" initials="L." surname="Velvindron">
      <organization showOnFrontPage="true">cyberstorm.mu</organization>
      <address>
        <postal>
          <street/>
          <city>Rose Hill</city>
          <region/>
          <code/>
          <country>Mauritius</country>
        </postal>
        <phone>+230 59762817</phone>
        <email>logan@cyberstorm.mu</email>
      </address>
    </author>
    <author fullname="Kathleen Moriarty" initials="K." surname="Moriarty">
      <organization abbrev="CIS" showOnFrontPage="true">Center for Internet Security</organization>
      <address>
        <postal>
          <street/>
          <city>East Greenbush</city>
          <region>NY</region>
          <country>United States of America</country>
        </postal>
        <email>Kathleen.Moriarty.ietf@gmail.com</email>
      </address>
    </author>
    <author fullname="Alessandro Ghedini" initials="A." surname="Ghedini">
      <organization showOnFrontPage="true">Cloudflare Inc.</organization>
      <address>
        <email>alessandro@cloudflare.com</email>
      </address>
    </author>
    <date month="12" year="2021"/>
    <area>Security</area>
    <workgroup>TLS</workgroup>
    <keyword>tls</keyword>
    <abstract pn="section-abstract">
      <t indent="0" pn="section-abstract-1">
           The MD5 and SHA-1 hashing algorithms are increasingly vulnerable to attack, and this document deprecates their use in TLS 1.2 and DTLS 1.2 digital signatures.
        However, this document does not deprecate SHA-1 with Hashed Message Authentication Code (HMAC), as used in record protection. This document updates RFC 5246.
      </t>
    </abstract>
    <boilerplate>
      <section anchor="status-of-memo" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.1">
        <name slugifiedName="name-status-of-this-memo">Status of This Memo</name>
        <t indent="0" pn="section-boilerplate.1-1">
            This is an Internet Standards Track document.
        </t>
        <t indent="0" pn="section-boilerplate.1-2">
            This document is a product of the Internet Engineering Task Force
            (IETF).  It represents the consensus of the IETF community.  It has
            received public review and has been approved for publication by
            the Internet Engineering Steering Group (IESG).  Further
            information on Internet Standards is available in Section 2 of 
            RFC 7841.
        </t>
        <t indent="0" pn="section-boilerplate.1-3">
            Information about the current status of this document, any
            errata, and how to provide feedback on it may be obtained at
            <eref target="https://www.rfc-editor.org/info/rfc9155" brackets="none"/>.
        </t>
      </section>
      <section anchor="copyright" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.2">
        <name slugifiedName="name-copyright-notice">Copyright Notice</name>
        <t indent="0" pn="section-boilerplate.2-1">
            Copyright (c) 2021 IETF Trust and the persons identified as the
            document authors. All rights reserved.
        </t>
        <t indent="0" pn="section-boilerplate.2-2">
            This document is subject to BCP 78 and the IETF Trust's Legal
            Provisions Relating to IETF Documents
            (<eref target="https://trustee.ietf.org/license-info" brackets="none"/>) in effect on the date of
            publication of this document. Please review these documents
            carefully, as they describe your rights and restrictions with
            respect to this document. Code Components extracted from this
            document must include Revised BSD License text as described in
            Section 4.e of the Trust Legal Provisions and are provided without
            warranty as described in the Revised BSD License.
        </t>
      </section>
    </boilerplate>
    <toc>
      <section anchor="toc" numbered="false" removeInRFC="false" toc="exclude" pn="section-toc.1">
        <name slugifiedName="name-table-of-contents">Table of Contents</name>
        <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1">
          <li pn="section-toc.1-1.1">
            <t indent="0" keepWithNext="true" pn="section-toc.1-1.1.1"><xref derivedContent="1" format="counter" sectionFormat="of" target="section-1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-introduction">Introduction</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.1.2">
              <li pn="section-toc.1-1.1.2.1">
                <t indent="0" keepWithNext="true" pn="section-toc.1-1.1.2.1.1"><xref derivedContent="1.1" format="counter" sectionFormat="of" target="section-1.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-requirements-language">Requirements Language</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.2">
            <t indent="0" keepWithNext="true" pn="section-toc.1-1.2.1"><xref derivedContent="2" format="counter" sectionFormat="of" target="section-2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-signature-algorithms">Signature Algorithms</xref></t>
          </li>
          <li pn="section-toc.1-1.3">
            <t indent="0" pn="section-toc.1-1.3.1"><xref derivedContent="3" format="counter" sectionFormat="of" target="section-3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-certificate-request">Certificate Request</xref></t>
          </li>
          <li pn="section-toc.1-1.4">
            <t indent="0" pn="section-toc.1-1.4.1"><xref derivedContent="4" format="counter" sectionFormat="of" target="section-4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-server-key-exchange">Server Key Exchange</xref></t>
          </li>
          <li pn="section-toc.1-1.5">
            <t indent="0" pn="section-toc.1-1.5.1"><xref derivedContent="5" format="counter" sectionFormat="of" target="section-5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-certificate-verify">Certificate Verify</xref></t>
          </li>
          <li pn="section-toc.1-1.6">
            <t indent="0" pn="section-toc.1-1.6.1"><xref derivedContent="6" format="counter" sectionFormat="of" target="section-6"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-iana-considerations">IANA Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.7">
            <t indent="0" pn="section-toc.1-1.7.1"><xref derivedContent="7" format="counter" sectionFormat="of" target="section-7"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-security-considerations">Security Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.8">
            <t indent="0" pn="section-toc.1-1.8.1"><xref derivedContent="8" format="counter" sectionFormat="of" target="section-8"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-references">References</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.8.2">
              <li pn="section-toc.1-1.8.2.1">
                <t indent="0" pn="section-toc.1-1.8.2.1.1"><xref derivedContent="8.1" format="counter" sectionFormat="of" target="section-8.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-normative-references">Normative References</xref></t>
              </li>
              <li pn="section-toc.1-1.8.2.2">
                <t indent="0" pn="section-toc.1-1.8.2.2.1"><xref derivedContent="8.2" format="counter" sectionFormat="of" target="section-8.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-informative-references">Informative References</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.9">
            <t indent="0" pn="section-toc.1-1.9.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.a"/><xref derivedContent="" format="title" sectionFormat="of" target="name-acknowledgements">Acknowledgements</xref></t>
          </li>
          <li pn="section-toc.1-1.10">
            <t indent="0" pn="section-toc.1-1.10.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.b"/><xref derivedContent="" format="title" sectionFormat="of" target="name-authors-addresses">Authors' Addresses</xref></t>
          </li>
        </ul>
      </section>
    </toc>
  </front>
  <middle>
    <section numbered="true" toc="include" removeInRFC="false" pn="section-1">
      <name slugifiedName="name-introduction">Introduction</name>
      <t indent="0" pn="section-1-1">The usage of MD5 and SHA-1 for signature hashing in (D)TLS 1.2 is specified in <xref target="RFC5246" format="default" sectionFormat="of" derivedContent="RFC5246"/>. MD5 and SHA-1 have been proven to be insecure, 
     subject to collision attacks <xref target="Wang" format="default" sectionFormat="of" derivedContent="Wang"/>. In 2011, <xref target="RFC6151" format="default" sectionFormat="of" derivedContent="RFC6151"/> detailed the security considerations, including collision attacks 
     for MD5.
     NIST formally deprecated use of SHA-1 in 2011 
   <xref target="NISTSP800-131A-R2" format="default" sectionFormat="of" derivedContent="NISTSP800-131A-R2"/> and 
    disallowed its use for digital signatures at the end of 2013, based on both the attack described in <xref target="Wang" format="default" sectionFormat="of" derivedContent="Wang"/> and the 
    potential for brute-force attack.  In 2016, researchers from the National Institute for Research in Digital Science and Technology (INRIA) identified
    a new class of transcript collision attacks on TLS (and other protocols)
    that relies on efficient collision-finding algorithms on the underlying hash
    constructions <xref target="Transcript-Collision" format="default" sectionFormat="of" derivedContent="Transcript-Collision"/>.  Further, in 2017,
    researchers from Google and Centrum Wiskunde &amp; Informatica (CWI) Amsterdam 
    <xref target="SHA-1-Collision" format="default" sectionFormat="of" derivedContent="SHA-1-Collision"/> 
    proved SHA-1 collision attacks were practical.
     This document updates <xref target="RFC5246" format="default" sectionFormat="of" derivedContent="RFC5246"/> 
     in such a way that MD5 and SHA-1 <bcp14>MUST NOT</bcp14>
     be used for digital signatures.  However, this document does not deprecate SHA-1 with HMAC, as used in record protection.
     Note that the CA/Browser Forum (CABF) has also deprecated use of SHA-1 for use in certificate signatures <xref target="CABF" format="default" sectionFormat="of" derivedContent="CABF"/>.
</t>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-1.1">
        <name slugifiedName="name-requirements-language">Requirements Language</name>
        <t indent="0" pn="section-1.1-1">
    The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
    "<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
    described in BCP 14 <xref target="RFC2119" format="default" sectionFormat="of" derivedContent="RFC2119"/> <xref target="RFC8174" format="default" sectionFormat="of" derivedContent="RFC8174"/> 
    when, and only when, they appear in all capitals, as shown here.
        </t>
      </section>
    </section>
    <section anchor="Signature_algorithms" numbered="true" toc="include" removeInRFC="false" pn="section-2">
      <name slugifiedName="name-signature-algorithms">Signature Algorithms</name>
      <t indent="0" pn="section-2-1">
   Clients <bcp14>MUST</bcp14> include the signature_algorithms extension. Clients <bcp14>MUST NOT</bcp14> include MD5
   and SHA-1 in this extension.
      </t>
    </section>
    <section anchor="cert_requests" numbered="true" toc="include" removeInRFC="false" pn="section-3">
      <name slugifiedName="name-certificate-request">Certificate Request</name>
      <t indent="0" pn="section-3-1">
   Servers <bcp14>SHOULD NOT</bcp14> include MD5 and SHA-1 in CertificateRequest messages.  
      </t>
    </section>
    <section anchor="serverkeyexchange" numbered="true" toc="include" removeInRFC="false" pn="section-4">
      <name slugifiedName="name-server-key-exchange">Server Key Exchange</name>
      <t indent="0" pn="section-4-1">
   Servers <bcp14>MUST NOT</bcp14> include MD5 and SHA-1 in ServerKeyExchange 
   messages.  If the client receives a ServerKeyExchange message
   indicating MD5 or SHA-1, then it <bcp14>MUST</bcp14> abort the connection with
   an illegal_parameter alert. 
      </t>
    </section>
    <section anchor="CertificateVerify" numbered="true" toc="include" removeInRFC="false" pn="section-5">
      <name slugifiedName="name-certificate-verify">Certificate Verify</name>
      <t indent="0" pn="section-5-1">
   Clients <bcp14>MUST NOT</bcp14> include MD5 and SHA-1 in CertificateVerify messages. If a
   server receives a CertificateVerify message with MD5 or SHA-1, it <bcp14>MUST</bcp14>
   abort the connection with an illegal_parameter alert.
      </t>
    </section>
    <section anchor="IANA" numbered="true" toc="include" removeInRFC="false" pn="section-6">
      <name slugifiedName="name-iana-considerations">IANA Considerations</name>
      <t indent="0" pn="section-6-1">IANA has updated the "TLS SignatureScheme" registry by changing the recommended status of 
SHA-1-based signature schemes to "N" (not recommended), as defined by <xref target="RFC8447" format="default" sectionFormat="of" derivedContent="RFC8447"/>.  
The following entries have been updated; other entries in the registry remain the same.
</t>
      <table align="center" pn="table-1">
        <thead>
          <tr>
            <th align="center" colspan="1" rowspan="1">Value</th>
            <th align="center" colspan="1" rowspan="1">Description</th>
            <th align="center" colspan="1" rowspan="1">Recommended</th>
            <th align="center" colspan="1" rowspan="1">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="center" colspan="1" rowspan="1">0x0201</td>
            <td align="center" colspan="1" rowspan="1">rsa_pkcs1_sha1</td>
            <td align="center" colspan="1" rowspan="1">N</td>
            <td align="center" colspan="1" rowspan="1">
              <xref target="RFC8446" format="default" sectionFormat="of" derivedContent="RFC8446"/> [RFC9155]</td>
          </tr>
          <tr>
            <td align="center" colspan="1" rowspan="1">0x0203</td>
            <td align="center" colspan="1" rowspan="1">ecdsa_sha1</td>
            <td align="center" colspan="1" rowspan="1">N</td>
            <td align="center" colspan="1" rowspan="1">
              <xref target="RFC8446" format="default" sectionFormat="of" derivedContent="RFC8446"/> [RFC9155]</td>
          </tr>
        </tbody>
      </table>
      <t indent="0" pn="section-6-3">
IANA has also updated the reference for the "TLS SignatureAlgorithm" and "TLS
HashAlgorithm" registries to refer to this document in addition to RFCs 5246 and
8447.
</t>
    </section>
    <section anchor="Security" numbered="true" toc="include" removeInRFC="false" pn="section-7">
      <name slugifiedName="name-security-considerations">Security Considerations</name>
      <t indent="0" pn="section-7-1"> Concerns with (D)TLS 1.2 implementations falling back to SHA-1 is an issue. 
              This document updates the TLS 1.2 specification <xref target="RFC5246" format="default" sectionFormat="of" derivedContent="RFC5246"/> to deprecate support for MD5
              and SHA-1 for digital signatures. However, this document does not deprecate SHA-1 with HMAC, as used in record protection.
      </t>
    </section>
  </middle>
  <back>
    <references pn="section-8">
      <name slugifiedName="name-references">References</name>
      <references pn="section-8.1">
        <name slugifiedName="name-normative-references">Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" quoteTitle="true" derivedAnchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author initials="S." surname="Bradner" fullname="S. Bradner">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="1997" month="March"/>
            <abstract>
              <t indent="0">In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC5246" target="https://www.rfc-editor.org/info/rfc5246" quoteTitle="true" derivedAnchor="RFC5246">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author initials="T." surname="Dierks" fullname="T. Dierks">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="E." surname="Rescorla" fullname="E. Rescorla">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2008" month="August"/>
            <abstract>
              <t indent="0">This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol.  The TLS protocol provides communications security over the Internet.  The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" quoteTitle="true" derivedAnchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author initials="B." surname="Leiba" fullname="B. Leiba">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2017" month="May"/>
            <abstract>
              <t indent="0">RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8446" target="https://www.rfc-editor.org/info/rfc8446" quoteTitle="true" derivedAnchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author initials="E." surname="Rescorla" fullname="E. Rescorla">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2018" month="August"/>
            <abstract>
              <t indent="0">This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t indent="0">This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8447" target="https://www.rfc-editor.org/info/rfc8447" quoteTitle="true" derivedAnchor="RFC8447">
          <front>
            <title>IANA Registry Updates for TLS and DTLS</title>
            <author initials="J." surname="Salowey" fullname="J. Salowey">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S." surname="Turner" fullname="S. Turner">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2018" month="August"/>
            <abstract>
              <t indent="0">This document describes a number of changes to TLS and DTLS IANA registries that range from adding notes to the registry all the way to changing the registration policy.  These changes were mostly motivated by WG review of the TLS- and DTLS-related registries undertaken as part of the TLS 1.3 development process.</t>
              <t indent="0">This document updates the following RFCs: 3749, 5077, 4680, 5246, 5705, 5878, 6520, and 7301.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8447"/>
          <seriesInfo name="DOI" value="10.17487/RFC8447"/>
        </reference>
      </references>
      <references pn="section-8.2">
        <name slugifiedName="name-informative-references">Informative References</name>
        <reference anchor="CABF" target="https://cabforum.org/2014/10/16/ballot-118-sha-1-sunset/" quoteTitle="true" derivedAnchor="CABF">
          <front>
            <title>Ballot 118 -- SHA-1 Sunset (passed)</title>
            <author>
              <organization showOnFrontPage="true">CA/Browser Forum</organization>
            </author>
            <date year="2014" month="October"/>
          </front>
        </reference>
        <reference anchor="NISTSP800-131A-R2" target="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-131Ar2.pdf" quoteTitle="true" derivedAnchor="NISTSP800-131A-R2">
          <front>
            <title>Transitioning the Use of Cryptographic Algorithms and Key Lengths</title>
            <author initials="E." surname="Barker" fullname="Elaine Barker">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="A." surname="Roginsky" fullname="Allen Roginsky">
              <organization showOnFrontPage="true"/>
            </author>
            <date month="March" year="2019"/>
          </front>
          <seriesInfo name="NIST Special Publication" value="800-131A, Revision 2"/>
          <seriesInfo name="DOI" value="10.6028/NIST.SP.800-131Ar2"/>
        </reference>
        <reference anchor="RFC6151" target="https://www.rfc-editor.org/info/rfc6151" quoteTitle="true" derivedAnchor="RFC6151">
          <front>
            <title>Updated Security Considerations for the MD5 Message-Digest and the HMAC-MD5 Algorithms</title>
            <author initials="S." surname="Turner" fullname="S. Turner">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="L." surname="Chen" fullname="L. Chen">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2011" month="March"/>
            <abstract>
              <t indent="0">This document updates the security considerations for the MD5 message digest algorithm.  It also updates the security considerations for HMAC-MD5.  This document is not an Internet Standards Track  specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6151"/>
          <seriesInfo name="DOI" value="10.17487/RFC6151"/>
        </reference>
        <reference anchor="SHA-1-Collision" target="https://eprint.iacr.org/2017/190" quoteTitle="true" derivedAnchor="SHA-1-Collision">
          <front>
            <title>The First Collision for Full SHA-1</title>
            <author initials="M." surname="Stevens" fullname="Marc Stevens">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="E." surname="Bursztein" fullname="Elie Bursztein">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="P." surname="Karpman" fullname="Pierre Karpman">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="A." surname="Albertini" fullname="Ange Albertini">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="Y." surname="Markov" fullname="Yarik Markov">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2017"/>
          </front>
        </reference>
        <reference anchor="Transcript-Collision" target="https://hal.inria.fr/hal-01244855/document" quoteTitle="true" derivedAnchor="Transcript-Collision">
          <front>
            <title>Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH</title>
            <author initials="K." surname="Bhargavan" fullname="Karthikeyan Bhargavan">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="G." surname="Leurent" fullname="Gaetan Leurent">
              <organization showOnFrontPage="true"/>
            </author>
            <date month="February" year="2016"/>
          </front>
          <seriesInfo name="DOI" value="10.14722/ndss.2016.23418"/>
        </reference>
        <reference anchor="Wang" target="https://www.iacr.org/archive/crypto2005/36210017/36210017.pdf" quoteTitle="true" derivedAnchor="Wang">
          <front>
            <title>Finding Collisions in the Full SHA-1</title>
            <author initials="X." surname="Wang" fullname="Xiaoyun Wang">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="Y." surname="Yin" fullname="Yiqun Lisa Yin">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="H." surname="Yu" fullname="Hongbo Yu">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2005"/>
          </front>
          <seriesInfo name="DOI" value="10.1007/11535218_2"/>
        </reference>
      </references>
    </references>
    <section anchor="Acknowledgements" numbered="false" toc="include" removeInRFC="false" pn="section-appendix.a">
      <name slugifiedName="name-acknowledgements">Acknowledgements</name>
      <t indent="0" pn="section-appendix.a-1"> The authors would like to thank <contact fullname="Hubert Kario"/> for his help in writing the initial 
              draft version of this document. We are also grateful to <contact fullname="Daniel Migault"/>, <contact fullname="Martin Thomson"/>, <contact fullname="Sean Turner"/>, <contact fullname="Christopher Wood"/>, and <contact fullname="David Cooper"/>
             for their feedback.
      </t>
    </section>
    <section anchor="authors-addresses" numbered="false" removeInRFC="false" toc="include" pn="section-appendix.b">
      <name slugifiedName="name-authors-addresses">Authors' Addresses</name>
      <author fullname="Loganaden Velvindron" initials="L." surname="Velvindron">
        <organization showOnFrontPage="true">cyberstorm.mu</organization>
        <address>
          <postal>
            <street/>
            <city>Rose Hill</city>
            <region/>
            <code/>
            <country>Mauritius</country>
          </postal>
          <phone>+230 59762817</phone>
          <email>logan@cyberstorm.mu</email>
        </address>
      </author>
      <author fullname="Kathleen Moriarty" initials="K." surname="Moriarty">
        <organization abbrev="CIS" showOnFrontPage="true">Center for Internet Security</organization>
        <address>
          <postal>
            <street/>
            <city>East Greenbush</city>
            <region>NY</region>
            <country>United States of America</country>
          </postal>
          <email>Kathleen.Moriarty.ietf@gmail.com</email>
        </address>
      </author>
      <author fullname="Alessandro Ghedini" initials="A." surname="Ghedini">
        <organization showOnFrontPage="true">Cloudflare Inc.</organization>
        <address>
          <email>alessandro@cloudflare.com</email>
        </address>
      </author>
    </section>
  </back>
</rfc>
