Dear TLS Working Group,

We would like to share a new individual draft, "Certificate Update in TLS
1.3" (draft-rosomakho-tls-cert-update). This document specifies a
lightweight extension and two post-handshake messages that allow TLS peers
to provide renewed certificates on an active TLS 1.3, DTLS 1.3 or QUIC
connection without requiring session termination and re-estabilshment. We
see this proposal as highly complementary to the Extended Key Update draft

There is a growing set of use cases that rely on long-lived TLS or QUIC
sessions, including IoT communications, VPN tunnels such as MASQUE
CONNECT-IP, and carrier signaling. In these settings, tearing down a
connection to share an updated certificate can be costly and disruptive. At
the same time, there is a strong trend towards shorter certificate
lifetimes, which creates a tension between security and operational
continuity.

This mechanism enables both peers to provide updated certificates
mid-session using Exported Authenticators. The specification defines tight
constraints on updated certificates to ensure that such updates do not
alter the logical identity of the peer or result in unintended
authentication or authorization changes at the application layer.

We believe this solution addresses limitation of alternative approaches:
- Relying solely on initial authentication becomes increasingly problematic
as sessions grow longer.
- Using application logic to detect certificate expiration and terminate
sessions is fragile and cumbersome.
- Updating higher-layer protocols to handle signaling certificate updates
uniformly is infeasible and potentially disruptive.

We do not expect this mechanism to be useful for short-lived session such
as typical web browsing when TLS sessions are significantly shorter than
typical certificate lifetime.

It would be great to hear feedback on the proposal in general as well as
design specifics.

Best Regards,
Yaroslav and Tiru


---------- Forwarded message ---------
A new version of Internet-Draft draft-rosomakho-tls-cert-update-00.txt has
been successfully submitted by Yaroslav Rosomakho and posted to the
IETF repository.

Name:     draft-rosomakho-tls-cert-update
Revision: 00
Title:    Certificate Update in TLS 1.3
Date:     2025-06-20
Group:    Individual Submission
Pages:    14
URL:
https://www.ietf.org/archive/id/draft-rosomakho-tls-cert-update-00.txt
Status:   https://datatracker.ietf.org/doc/draft-rosomakho-tls-cert-update/
HTML:
https://www.ietf.org/archive/id/draft-rosomakho-tls-cert-update-00.html
HTMLized:
https://datatracker.ietf.org/doc/html/draft-rosomakho-tls-cert-update


Abstract:

   This document defines a mechanism that enables TLS 1.3 endpoints to
   update their certificates during the lifetime of a connection using
   Exported Authenticators.  A new extension is introduced to negotiate
   support for certificate update at handshake time.  When negotiated,
   either endpoint can provide a post-handshake authenticator containing
   an updated certificate, delivered via a new handshake message.  This
   mechanism allows long-lived TLS connections to remain valid across
   certificate rotations without requiring session termination.



The IETF Secretariat

-- 


This communication (including any attachments) is intended for the sole 
use of the intended recipient and may contain confidential, non-public, 
and/or privileged material. Use, distribution, or reproduction of this 
communication by unintended recipients is not authorized. If you received 
this communication in error, please immediately notify the sender and then 
delete all copies of this communication from your system.
_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to