- Title
- Transport Layer Security Fallback Profile
- Description
- This profile provides detailed information, guidance, and standardsto be used for the usage of Transport Layer Security version 1.2 (TLS 1.2) protocol to provide authentication, confidentiality and integrity services for protecting the communication between service providers and consumers.
Taxonomy
Standards
Guidance
Certificate validation
- Federated services that implement TLS shall perform certificate validation. Certificate validation shall include checking at least full certificate path validation, certificate validity period and certificate revocation status.
- Federated services that implement TLS shall be able to check the revocation status of digital certificates through HTTP or OSCP endpoints.
- If compliance and validation of Digital Certificates fail, TLS connections shall be terminated
Cipher suites
-
Implementations shall be configured to only use the following cipher suites
-
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (Mandatory for RSA certificates)
-
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Optional)
-
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (Mandatory for ECC certificates)
-
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (Optional)
-
If no cipher suite could be negotiated, TLS connections shall be terminated.
Maximum lifetime and session termination
- The upper limit for the lifetime of a TLS session shall not exceed 48 hours.
- When the TLS connection is closed, ephemeral keys shall be securily deleted.
Disallowed standards and extensions
- SSL version 2.0, version 3.0 and TLS version 1.0 or 1.1
- The Heart Beat Extension (RFC 6520
- Encrypt-then-MAC extension (RFC 7366)