Datagram Transport Layer Security
Datagram Transport Layer Security (DTLS) is a communications protocol providing security to datagram-based applications by allowing them to communicate in a way designed[1][2] to prevent eavesdropping, tampering, or message forgery. The DTLS protocol is based on the stream-oriented Transport Layer Security (TLS) protocol and is intended to provide similar security guarantees. The DTLS protocol datagram preserves the semantics of the underlying transport—the application does not suffer from the delays associated with stream protocols, but because it uses UDP or SCTP, the application has to deal with packet reordering, loss of datagram and data larger than the size of a datagram network packet. Because DTLS uses UDP or SCTP rather than TCP, it avoids the "TCP meltdown problem",[3][4] when being used to create a VPN tunnel.
Definition
The following documents define DTLS:
- RFC 9147 for use with User Datagram Protocol (UDP),
- RFC 5238 for use with Datagram Congestion Control Protocol (DCCP),
- RFC 5415 for use with Control And Provisioning of Wireless Access Points (CAPWAP),
- RFC 6083 for use with Stream Control Transmission Protocol (SCTP) encapsulation,
- RFC 5764 for use with Secure Real-time Transport Protocol (SRTP) subsequently called DTLS-SRTP in a draft with Secure Real-Time Transport Control Protocol (SRTCP).[5]
DTLS 1.0 is based on TLS 1.1, DTLS 1.2 is based on TLS 1.2, and DTLS 1.3 is based on TLS 1.3. There is no DTLS 1.1 because this version-number was skipped in order to harmonize version numbers with TLS.[2] Like previous DTLS versions, DTLS 1.3 is intended to provide "equivalent security guarantees [to TLS 1.3] with the exception of order protection/non-replayability".[6]
Implementations
Libraries
Implementation | DTLS 1.0[1] | DTLS 1.2[2] |
---|---|---|
Botan | Yes | Yes |
cryptlib | No | No |
GnuTLS | Yes | Yes |
Java Secure Socket Extension | Yes | Yes |
LibreSSL | Yes | Yes[7] |
libsystools[8] | Yes | No |
MatrixSSL | Yes | Yes |
mbed TLS (previously PolarSSL) | Yes[9] | Yes[9] |
Network Security Services | Yes[10] | Yes[11] |
OpenSSL | Yes | Yes[12] |
PyDTLS[13][14] | Yes | Yes |
Python3-dtls[15][16] | Yes | Yes |
RSA BSAFE | No | No |
s2n | No | No |
Schannel XP/2003, Vista/2008 | No | No |
Schannel 7/2008R2, 8/2012, 8.1/2012R2, 10 | Yes[17] | No[17] |
Schannel 10 (1607), 2016 | Yes | Yes[18] |
Secure Transport OS X 10.2–10.7 / iOS 1–4 | No | No |
Secure Transport OS X 10.8–10.10 / iOS 5–8 | Yes[19] | No |
SharkSSL | No | No |
tinydtls [20] | No | Yes |
Waher.Security.DTLS [21] | No | Yes |
wolfSSL (previously CyaSSL) | Yes | Yes |
@nodertc/dtls [22][23] | No | Yes |
java-dtls[24] | Yes | Yes |
pion/dtls[25] (Go) | No | Yes |
californium/scandium[26] (Java) | No | Yes |
SNF4J[27] (Java) | Yes | Yes |
Implementation | DTLS 1.0 | DTLS 1.2 |
Applications
- Cisco AnyConnect VPN Client uses TLS and invented DTLS based VPN.[28]
- OpenConnect is an open source AnyConnect-compatible client and ocserv server that supports (D)TLS.[29]
- Cisco InterCloud Fabric uses DTLS to form a tunnel between private and public/provider compute environments[30]
- ZScaler tunnel 2.0 uses DTLS for tunneling [31]
- F5 Networks Edge VPN Client uses TLS and DTLS[32]
- Citrix Systems NetScaler uses DTLS to secure UDP[33]
- Web browsers: Google Chrome, Opera and Firefox support DTLS-SRTP[34] for WebRTC. Firefox 86 and onward does not support DTLS 1.0.[35]
Vulnerabilities
In February 2013 two researchers from Royal Holloway, University of London discovered a timing attack[36] which allowed them to recover (parts of the) plaintext from a DTLS connection using the OpenSSL or GnuTLS implementation of DTLS when Cipher Block Chaining mode encryption was used.
See also
References
- Rescorla, Eric; Modadugu, Nagendra (April 2006). Datagram Transport Layer Security. doi:10.17487/RFC4347. RFC 4347.
- Rescorla, Eric; Modadugu, Nagendra (January 2012). Datagram Transport Layer Security Version 1.2. doi:10.17487/RFC6347. RFC 6347.
- Titz, Olaf (2001-04-23). "Why TCP Over TCP Is A Bad Idea". Retrieved 2015-10-17.
- Honda, Osamu; Ohsaki, Hiroyuki; Imase, Makoto; Ishizuka, Mika; Murayama, Junichi (October 2005). "Understanding TCP over TCP: effects of TCP tunneling on end-to-end throughput and latency". In Atiquzzaman, Mohammed; Balandin, Sergey I (eds.). Performance, Quality of Service, and Control of Next-Generation Communication and Sensor Networks III. Vol. 6011. Bibcode:2005SPIE.6011..138H. CiteSeerX 10.1.1.78.5815. doi:10.1117/12.630496. S2CID 8945952.
- Peck, M.; Igoe, K. (2012-09-25). "Suite B Profile for Datagram Transport Layer Security / Secure Real-time Transport Protocol (DTLS-SRTP)". IETF.
- "The Datagram Transport Layer Security (DTLS) Protocol Version 1.3".
- "LibreSSL 3.3.2 Release Notes". The OpenBSD Project. 2021-05-01. Retrieved 2021-06-13.
- Julien Kauffmann. "libsystools: A TLS/DTLS open source library for Windows/Linux using OpenSSL". SourceForge.
- "mbed TLS 2.0.0 released". ARM. 2015-07-13. Retrieved 2015-08-25.
- "NSS 3.14 release notes". Mozilla Developer Network. Mozilla. Archived from the original on 2013-01-17. Retrieved 2012-10-27.
- "NSS 3.16.2 release notes". Mozilla Developer Network. Mozilla. 2014-06-30. Retrieved 2014-06-30.
- "As of version 1.0.2". The OpenSSL Project. The OpenSSL Project. 2015-01-22. Archived from the original on 2014-09-04. Retrieved 2015-01-26.
- Ray Brown. "pydtls - Datagram Transport Layer Security for Python". GitHub.
- Ray Brown. "DTLS for Python". Python Software Foundation.
- Ray Brown/Mobius Software LTD. "pydtls - Datagram Transport Layer Security for Python". GitHub.
- Ray Brown/Mobius Software LTD. "DTLS for Python3 Based on PyDTLS". Python Software Foundation.
- "An update is available that adds support for DTLS in Windows 7 SP1 and Windows Server 2008 R2 SP1". Microsoft. Retrieved 13 November 2012.
- Justinha. "TLS (Schannel SSP) changes in Windows 10 and Windows Server 2016". docs.microsoft.com. Retrieved 2017-09-01.
- "Technical Note TN2287: iOS 5 and TLS 1.2 Interoperability Issues". iOS Developer Library. Apple Inc. Retrieved 2012-05-03.
- Olaf Bergmann. "tinydtls". Eclipse Foundation.
- Peter Waher. "Waher.Security.DTLS". Waher Data AB.
- Dmitriy Tsvettsikh. "Secure UDP communications using DTLS in pure js". GitHub.
- Dmitriy Tsvettsikh. "DTLS in pure js". npm.
- Mobius Software LTD. "Non blocking Java DTLS Implementation based on BouncyCastle and Netty". Mobius Software LTD.
- Sean DuBois. "pion/dtls: DTLS 1.2 Server/Client implementation for Go". GitHub.
- "californium/scandium: DTLS 1.2 Server/Client implementation for java and coap. Includes connection id extension". Eclipse Foundation.
- SNF4J.ORG. "Simple Network Framework for Java (SNF4J)". GitHub.
- "AnyConnect FAQ: tunnels, reconnect behavior, and the inactivity timer". Cisco. Retrieved 26 February 2017.
- "OpenConnect". OpenConnect. Retrieved 26 February 2017.
- "Cisco InterCloud Architectural Overview" (PDF). Cisco Systems.
- "ZScaler ZTNA 2.0 Tunnel". ZScaler.
- "f5 Datagram Transport Layer Security (DTLS)". f5 Networks.
- "Configuring a DTLS Virtual Server". Citrix Systems.
- "WebRTC Interop Notes". Archived from the original on 2013-05-11.
- "Firefox 86.0, See All New Features, Updates and Fixes". Mozilla. 2021-02-23. Archived from the original on 2021-02-22. Retrieved 2021-02-23.
From Firefox 86 onward, DTLS 1.0 is no longer supported for establishing WebRTC's PeerConnections. All WebRTC services need to support DTLS 1.2 from now on as the minimum version.
- "Plaintext-Recovery Attacks Against Datagram TLS" (PDF).
External links
- "Transport Layer Security (tls) - Charter". IETF.
- Modadugu, Nagendra; Rescorla, Eric (2003-11-21). "The Design and Implementation of Datagram TLS" (PDF). Stanford Crypto Group. Retrieved 2013-03-17.
- AlFardan, Nadhem J.; Paterson, Kenneth G. "Plaintext-Recovery Attacks Against Datagram TLS" (PDF). Retrieved 2013-11-25.
- Gibson, Steve; Laporte, Leo (2012-11-28). "Datagram Transport Layer Security". Security Now 380. Retrieved 2013-03-17. Skip to 1:07:14.
- Robin Seggelmann's Sample Code: echo, character generator, and discard client/servers.
- The Illustrated DTLS Connection