Title
Transport Layer Security Fallback Profile
Description
This profile provides detailed information, guidance, and standardsto be used for the usage of Transport Layer Security version 1.2 (TLS 1.2) protocol to provide authentication, confidentiality and integrity services for protecting the communication between service providers and consumers.

Reference document

Org
FMN
Pubnum
Date
2023-10-16
Version
Title
FMN Spiral 5 Specification

Taxonomy

Standards

Obligation: MANDATORY, Lifecycle: CURRENT

TLS extensions Mandatory extensions Section 3 - Server Name Indication Extension Disallowed extensions Section 7 - Truncated HMAC

Obligation: MANDATORY, Lifecycle: CURRENT

Session Hash and Extended Master Secret Extension

Obligation: MANDATORY, Lifecycle: CURRENT

Negotiated Finite Field Diffie-Hellman Ephemeral Parameters Required curves secp256p1secp384p1

Obligation: MANDATORY, Lifecycle: CURRENT

Supported Elliptic Curves extension. Required extensions Section 5.1/5.2 - Supported Point Formats Required curves secp256r1secp384r1

Obligation: MANDATORY, Lifecycle: CURRENT

TLS 1.2 compression SHALL be disabled with the use of the "null" compression method.

Obligation: MANDATORY, Lifecycle: CURRENT

TLS 1.2 base standards. Mandatory extensions Section 7.4.1.4.1 - Signature Algorithms

Obligation: MANDATORY, Lifecycle: CURRENT

Transport Layer Security (TLS) Renegotiation Indication Extension Renegotiation shall only be initiated by the server.Implementation shall be compliant with RFC 9325.

Guidance

Certificate validation

  • Federated services that implement TLS shall perform certificate validation. Certificate validation shall include checking at least full certificate path validation, certificate validity period and certificate revocation status.
  • Federated services that implement TLS shall be able to check the revocation status of digital certificates through HTTP or OSCP endpoints.
  • If compliance and validation of Digital Certificates fail, TLS connections shall be terminated

Cipher suites

  • Implementations shall be configured to only use the following cipher suites

  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (Mandatory for RSA certificates)

  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Optional)

  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (Mandatory for ECC certificates)

  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (Optional)

  • If no cipher suite could be negotiated, TLS connections shall be terminated.

Maximum lifetime and session termination

  • The upper limit for the lifetime of a TLS session shall not exceed 48 hours.
  • When the TLS connection is closed, ephemeral keys shall be securily deleted.

Disallowed standards and extensions

  • SSL version 2.0, version 3.0 and TLS version 1.0 or 1.1
  • The Heart Beat Extension (RFC 6520
  • Encrypt-then-MAC extension (RFC 7366)

Status

URI

History

Flag Date RFC Version
added 2023-12-01 15-023 15
UUID
919659a5-7e80-4be2-b871-74d16d3e54f5

Utilization

This profile is used by the following profiles: