Title
Transport Layer Security Fallback Profile
Description
This profile provides detailed information, guidance, and standardsto be used for the usage of Transport Layer Security version 1.2 (TLS 1.2) protocol to provide authentication, confidentiality and integrity services for protecting the communication between service providers and consumers.

Reference document

Org
FMN
Pubnum
Date
2022-12-02
Version
Title
Proposed FMN Spiral 5 Specification

Taxonomy

Standards

Obligation: MANDATORY, Lifecycle: CANDIDATE

TLS 1.2 compression SHALL be disable with the use of the "null" compression method.

Obligation: MANDATORY, Lifecycle: CANDIDATE

TLS 1.2 base standards. Mandatory extensions Section 7.4.1.4.1 - Signature Algorithms

Obligation: MANDATORY, Lifecycle: CANDIDATE

Transport Layer Security (TLS) Renegotiation Indication Extension Renegotiation shall only be initiated by the server.Implementation shall be compliant with RFC 7525, section 3.5

Obligation: MANDATORY, Lifecycle: CANDIDATE

TLS extensions Mandatory extensions Section 3 - Server Name Indication Extension Disallowed extensions Section 7 - Truncated HMAC

Obligation: MANDATORY, Lifecycle: CANDIDATE

Session Hash and Extended Master Secret Extension

Obligation: MANDATORY, Lifecycle: CANDIDATE

Negotiated Finite Field Diffie-Hellman Ephemeral Parameters Required curves secp256p1secp384p1

Obligation: MANDATORY, Lifecycle: CANDIDATE

Supported Elliptic Curves extension. Required extensions Section 5.1/5.2 - Supported Point Formats Required curves secp256r1secp384r1

Guidance

Certificate validation

  • Federated services that implement TLS shall perform certificate validation. Certificate validation shall include checking at least full certificate path validation, certificate validity period and certificate revocation status.
  • Federated services that implement TLS shall be able to check the revocation status of digital certificates through HTTP or OSCP endpoints.
  • If compliance and validation of Digital Certificates fail, TLS connections shall be terminated

Cipher suites

  • Implementations shall be configured to only use the following cipher suites

  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (Mandatory for RSA certificates)

  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Optional)

  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (Mandatory for ECC certificates)

  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (Optional)

  • If no cipher suite could be negotiated, TLS connections shall be terminated.

Maximum lifetime and session termination

  • The upper limit for the lifetime of a TLS session shall not exceed 48 hours.
  • When the TLS connection is closed, ephemeral keys shall be securily deleted.

Disallowed standards and extensions

  • SSL version 2.0, version 3.0 and TLS version 1.0 or 1.1
  • The Heart Beat Extension (RFC 6520
  • Encrypt-then-MAC extension (RFC 7366)

Status

URI

History

Flag Date RFC Version
added 2023-01-23 14-32 15
UUID
20b90dd1-e1bd-4c3d-99b8-0eace176ebf8

Utilization

This profile is used by the following profiles: