<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.2 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-pce-pceps-tls13-02" category="std" consensus="true" submissionType="IETF" updates="8253" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.2 -->
  <front>
    <title abbrev="Updates for PCEPS">Updates for PCEPS: TLS Connection Establishment Restrictions</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-pce-pceps-tls13-02"/>
    <author initials="D." surname="Dhody" fullname="Dhruv Dhody">
      <organization>Huawei</organization>
      <address>
        <email>dhruv.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="S." surname="Turner" fullname="Sean Turner">
      <organization>sn3rd</organization>
      <address>
        <email>sean@sn3rd.com</email>
      </address>
    </author>
    <author initials="R." surname="Housley" fullname="Russ Housley">
      <organization abbrev="Vigil Security">Vigil Security, LLC</organization>
      <address>
        <postal>
          <street>516 Dranesville Road</street>
          <city>Herndon, VA</city>
          <code>20170</code>
          <country>US</country>
        </postal>
        <email>housley@vigilsec.com</email>
      </address>
    </author>
    <date year="2023" month="November" day="05"/>
    <area>Routing</area>
    <workgroup>Path Computation Element</workgroup>
    <keyword>PCEP</keyword>
    <keyword>PCEPS</keyword>
    <keyword>TLS 1.3</keyword>
    <keyword>TLS 1.2</keyword>
    <keyword>Early Data</keyword>
    <keyword>0-RTT</keyword>
    <abstract>
      <?line 48?>

<t>Section 3.4 of RFC 8253 specifies TLS connection establishment restrictions
for PCEPS; PCEPS refers to usage of TLS to provide a secure transport for
PCEP (Path Computation Element Communication Protocol).  This document adds
restrictions to specify what PCEPS implementations do if a PCEPS supports
more than one version of the TLS protocol and to restrict the use of
TLS 1.3’s early data.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-pce-pceps-tls13/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Path Computation Element Working Group mailing list (<eref target="mailto:pce@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/pce/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/pce/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-wg-pce/draft-ietf-pce-pceps-tls13"/>.</t>
    </note>
  </front>
  <middle>
    <?line 58?>

<section anchor="introduction">
      <name>Introduction</name>
      <t><xref section="3.4" sectionFormat="of" target="RFC8253"/> specifies TLS connection establishment
restrictions for PCEPS; PCEPS refers to usage of TLS to
provide a secure transport for PCEP (Path Computation Element
Communication Protocol) <xref target="RFC5440"/>.  This document adds restrictions to specify
what PCEPS implementations do if they support more than one version of
the TLS protocol, e.g., TLS 1.2 <xref target="RFC5246"/> and
TLS 1.3 <xref target="I-D.ietf-tls-rfc8446bis"/>, and to restrict the use of
TLS 1.3’s early data, which is also known as 0-RTT data. All other
provisions set forth in <xref target="RFC8253"/> are unchanged, including connection
initiation, message framing, connection closure, certificate validation,
peer identity, and failure handling.</t>
      <aside>
        <t>Editor's Note: The reference to <xref target="I-D.ietf-tls-rfc8446bis"/> could
  be changed to RFC 8446 incase the progress of the bis draft is
  slower than the progression of this document.</t>
      </aside>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="tls-connection-establishment-restrictions">
      <name>TLS Connection Establishment Restrictions</name>
      <t><xref section="3.4" sectionFormat="of" target="RFC8253"/> Step 1 includes restrictions on PCEPS TLS connection
establishment. This document adds the following restrictions:</t>
      <ul spacing="normal">
        <li>
          <t>Implementations that support multiple versions of the TLS protocol <bcp14>MUST</bcp14>
prefer to negotiate the latest version of the TLS protocol.</t>
        </li>
        <li>
          <t>PCEPS implementations that support TLS 1.3 or later <bcp14>MUST NOT</bcp14> use early data.</t>
        </li>
      </ul>
      <dl>
        <dt>NOTE:</dt>
        <dd>
          <t>Early data (aka 0-RTT data) is a mechanism defined in TLS 1.3
<xref target="I-D.ietf-tls-rfc8446bis"/> that allows a client to send data ("early
data") as part of the first flight of messages to a server.  Note
that TLS 1.3 can be used without early data as per Appendix F.5 of
<xref target="I-D.ietf-tls-rfc8446bis"/>.  In fact, early data is permitted by TLS
1.3 only when the client and server share a Pre-Shared Key (PSK),
either obtained externally or via a previous handshake.  The client
uses the PSK to authenticate the server and to encrypt the early
data.</t>
        </dd>
        <dt>NOTE:</dt>
        <dd>
          <t>As noted in <xref section="2.3" sectionFormat="of" target="I-D.ietf-tls-rfc8446bis"/>, the security
properties for early data are weaker than those for subsequent TLS-
protected data.  In particular, early data is not forward secret, and
there is no protection against the replay of early data between
connections.  <xref section="E.5" sectionFormat="of" target="I-D.ietf-tls-rfc8446bis"/> requires
applications not use early data without a profile that defines its
use.</t>
        </dd>
      </dl>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The Security Considerations of PCEP <xref target="RFC5440"/>, <xref target="RFC8231"/>, <xref target="RFC8253"/>,
<xref target="RFC8281"/>, and <xref target="RFC8283"/>; TLS 1.2 <xref target="RFC5246"/>; TLS 1.3 <xref target="I-D.ietf-tls-rfc8446bis"/>,
and; <xref target="RFC9325"/> apply here as well.</t>
      <t>The Path Computation Element (PCE) defined in <xref target="RFC4655"/> is an entity
that is capable of computing a network path or route based on a
network graph, and applying computational constraints.  A Path
Computation Client (PCC) may make requests to a PCE for paths to be
computed. PCEP is the communication protocol between a PCC and PCE and is
defined in <xref target="RFC5440"/>. Stateful PCE <xref target="RFC8231"/> specifies a set of extensions to PCEP to
enable control of TE-LSPs by a PCE that retains the state of the LSPs
provisioned in the network (a stateful PCE).  <xref target="RFC8281"/> describes the
setup, maintenance, and teardown of LSPs initiated by a stateful PCE
without the need for local configuration on the PCC, thus allowing
for a dynamic network that is centrally controlled.  <xref target="RFC8283"/>
introduces the architecture for PCE as a central controller</t>
      <t>TLS mutual authentication is used to ensure that only authorized users
and systems are able to send and receive PCEP messages. To this end,
neither the PCC nor the PCE should establish a PCEPS with TLS connection
with an unknown, unexpected, or incorrectly identified peer; see
<xref section="3.5" sectionFormat="of" target="RFC5440"/>. If deployments make use of a trusted list of
Certification Authority (CA) certificates <xref target="RFC5280"/>, then the listed
CAs should only issue certificates to parties that are authorized to
access the PCE. Doing otherwise will allow certificates that were issued
for other purposes to be inappropriately accepted by a PCE.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>There are no IANA considerations.</t>
    </section>
    <section anchor="implementation-status">
      <name>Implementation Status</name>
      <aside>
        <t>Note to the RFC Editor - remove this section before publication, as
  well as remove the reference to RFC 7942.</t>
      </aside>
      <t>This section records the status of known implementations of the
protocol defined by this specification at the time of posting of this
Internet-Draft, and is based on a proposal described in <xref target="RFC7942"/>.
The description of implementations in this section is intended to
assist the IETF in its decision processes in progressing drafts to
RFCs.  Please note that the listing of any individual implementation
here does not imply endorsement by the IETF.  Furthermore, no effort
has been spent to verify the information presented here that was
supplied by IETF contributors.  This is not intended as, and must not
be construed to be, a catalogue of available implementations or their
features.  Readers are advised to note that other implementations may
exist.</t>
      <t>According to <xref target="RFC7942"/>, "this will allow reviewers and working groups
to assign due consideration to documents that have the benefit of
running code, which may serve as evidence of valuable experimentation
and feedback that have made the implemented protocols more mature.
It is up to the individual working groups to use this information as
they see fit".</t>
      <t>At the time of posting the -02 version of this document, there are no
known implementations of this mechanism.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8253">
          <front>
            <title>PCEPS: Usage of TLS to Provide a Secure Transport for the Path Computation Element Communication Protocol (PCEP)</title>
            <author fullname="D. Lopez" initials="D." surname="Lopez"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="D. Dhody" initials="D." surname="Dhody"/>
            <date month="October" year="2017"/>
            <abstract>
              <t>The Path Computation Element Communication Protocol (PCEP) defines the mechanisms for the communication between a Path Computation Client (PCC) and a Path Computation Element (PCE), or among PCEs. This document describes PCEPS -- the usage of Transport Layer Security (TLS) to provide a secure transport for PCEP. The additional security mechanisms are provided by the transport protocol supporting PCEP; therefore, they do not affect the flexibility and extensibility of PCEP.</t>
              <t>This document updates RFC 5440 in regards to the PCEP initialization phase procedures.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8253"/>
          <seriesInfo name="DOI" value="10.17487/RFC8253"/>
        </reference>
        <reference anchor="RFC5440">
          <front>
            <title>Path Computation Element (PCE) Communication Protocol (PCEP)</title>
            <author fullname="JP. Vasseur" initials="JP." role="editor" surname="Vasseur"/>
            <author fullname="JL. Le Roux" initials="JL." role="editor" surname="Le Roux"/>
            <date month="March" year="2009"/>
            <abstract>
              <t>This document specifies the Path Computation Element (PCE) Communication Protocol (PCEP) for communications between a Path Computation Client (PCC) and a PCE, or between two PCEs. Such interactions include path computation requests and path computation replies as well as notifications of specific states related to the use of a PCE in the context of Multiprotocol Label Switching (MPLS) and Generalized MPLS (GMPLS) Traffic Engineering. PCEP is designed to be flexible and extensible so as to easily allow for the addition of further messages and objects, should further requirements be expressed in the future. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5440"/>
          <seriesInfo name="DOI" value="10.17487/RFC5440"/>
        </reference>
        <reference anchor="RFC5246">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="I-D.ietf-tls-rfc8446bis">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Windy Hill Systems, LLC</organization>
            </author>
            <date day="7" month="July" year="2023"/>
            <abstract>
              <t>   This document specifies version 1.3 of the Transport Layer Security
   (TLS) protocol.  TLS allows client/server applications to communicate
   over the Internet in a way that is designed to prevent eavesdropping,
   tampering, and message forgery.

   This document updates RFCs 5705, 6066, 7627, and 8422 and obsoletes
   RFCs 5077, 5246, 6961, and 8446.  This document also specifies new
   requirements for TLS 1.2 implementations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8446bis-09"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC9325">
          <front>
            <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="November" year="2022"/>
            <abstract>
              <t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are used to protect data exchanged over a wide range of application protocols and can also form the basis for secure transport protocols. Over the years, the industry has witnessed several serious attacks on TLS and DTLS, including attacks on the most commonly used cipher suites and their modes of operation. This document provides the latest recommendations for ensuring the security of deployed services that use TLS and DTLS. These recommendations are applicable to the majority of use cases.</t>
              <t>RFC 7525, an earlier version of the TLS recommendations, was published when the industry was transitioning to TLS 1.2. Years later, this transition is largely complete, and TLS 1.3 is widely available. This document updates the guidance given the new environment and obsoletes RFC 7525. In addition, this document updates RFCs 5288 and 6066 in view of recent attacks.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="195"/>
          <seriesInfo name="RFC" value="9325"/>
          <seriesInfo name="DOI" value="10.17487/RFC9325"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8231">
          <front>
            <title>Path Computation Element Communication Protocol (PCEP) Extensions for Stateful PCE</title>
            <author fullname="E. Crabbe" initials="E." surname="Crabbe"/>
            <author fullname="I. Minei" initials="I." surname="Minei"/>
            <author fullname="J. Medved" initials="J." surname="Medved"/>
            <author fullname="R. Varga" initials="R." surname="Varga"/>
            <date month="September" year="2017"/>
            <abstract>
              <t>The Path Computation Element Communication Protocol (PCEP) provides mechanisms for Path Computation Elements (PCEs) to perform path computations in response to Path Computation Client (PCC) requests.</t>
              <t>Although PCEP explicitly makes no assumptions regarding the information available to the PCE, it also makes no provisions for PCE control of timing and sequence of path computations within and across PCEP sessions. This document describes a set of extensions to PCEP to enable stateful control of MPLS-TE and GMPLS Label Switched Paths (LSPs) via PCEP.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8231"/>
          <seriesInfo name="DOI" value="10.17487/RFC8231"/>
        </reference>
        <reference anchor="RFC8281">
          <front>
            <title>Path Computation Element Communication Protocol (PCEP) Extensions for PCE-Initiated LSP Setup in a Stateful PCE Model</title>
            <author fullname="E. Crabbe" initials="E." surname="Crabbe"/>
            <author fullname="I. Minei" initials="I." surname="Minei"/>
            <author fullname="S. Sivabalan" initials="S." surname="Sivabalan"/>
            <author fullname="R. Varga" initials="R." surname="Varga"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>The Path Computation Element Communication Protocol (PCEP) provides mechanisms for Path Computation Elements (PCEs) to perform path computations in response to Path Computation Client (PCC) requests.</t>
              <t>The extensions for stateful PCE provide active control of Multiprotocol Label Switching (MPLS) Traffic Engineering Label Switched Paths (TE LSPs) via PCEP, for a model where the PCC delegates control over one or more locally configured LSPs to the PCE. This document describes the creation and deletion of PCE-initiated LSPs under the stateful PCE model.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8281"/>
          <seriesInfo name="DOI" value="10.17487/RFC8281"/>
        </reference>
        <reference anchor="RFC8283">
          <front>
            <title>An Architecture for Use of PCE and the PCE Communication Protocol (PCEP) in a Network with Central Control</title>
            <author fullname="A. Farrel" initials="A." role="editor" surname="Farrel"/>
            <author fullname="Q. Zhao" initials="Q." role="editor" surname="Zhao"/>
            <author fullname="Z. Li" initials="Z." surname="Li"/>
            <author fullname="C. Zhou" initials="C." surname="Zhou"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>The Path Computation Element (PCE) is a core component of Software- Defined Networking (SDN) systems. It can compute optimal paths for traffic across a network and can also update the paths to reflect changes in the network or traffic demands.</t>
              <t>PCE was developed to derive paths for MPLS Label Switched Paths (LSPs), which are supplied to the head end of the LSP using the Path Computation Element Communication Protocol (PCEP).</t>
              <t>SDN has a broader applicability than signaled MPLS traffic-engineered (TE) networks, and the PCE may be used to determine paths in a range of use cases including static LSPs, segment routing, Service Function Chaining (SFC), and most forms of a routed or switched network. It is, therefore, reasonable to consider PCEP as a control protocol for use in these environments to allow the PCE to be fully enabled as a central controller.</t>
              <t>This document briefly introduces the architecture for PCE as a central controller, examines the motivations and applicability for PCEP as a control protocol in this environment, and introduces the implications for the protocol. A PCE-based central controller can simplify the processing of a distributed control plane by blending it with elements of SDN and without necessarily completely replacing it.</t>
              <t>This document does not describe use cases in detail and does not define protocol extensions: that work is left for other documents.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8283"/>
          <seriesInfo name="DOI" value="10.17487/RFC8283"/>
        </reference>
        <reference anchor="RFC4655">
          <front>
            <title>A Path Computation Element (PCE)-Based Architecture</title>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <author fullname="J.-P. Vasseur" initials="J.-P." surname="Vasseur"/>
            <author fullname="J. Ash" initials="J." surname="Ash"/>
            <date month="August" year="2006"/>
            <abstract>
              <t>Constraint-based path computation is a fundamental building block for traffic engineering systems such as Multiprotocol Label Switching (MPLS) and Generalized Multiprotocol Label Switching (GMPLS) networks. Path computation in large, multi-domain, multi-region, or multi-layer networks is complex and may require special computational components and cooperation between the different network domains.</t>
              <t>This document specifies the architecture for a Path Computation Element (PCE)-based model to address this problem space. This document does not attempt to provide a detailed description of all the architectural components, but rather it describes a set of building blocks for the PCE architecture from which solutions may be constructed. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4655"/>
          <seriesInfo name="DOI" value="10.17487/RFC4655"/>
        </reference>
        <reference anchor="RFC7942">
          <front>
            <title>Improving Awareness of Running Code: The Implementation Status Section</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>This document describes a simple process that allows authors of Internet-Drafts to record the status of known implementations by including an Implementation Status section. This will allow reviewers and working groups to assign due consideration to documents that have the benefit of running code, which may serve as evidence of valuable experimentation and feedback that have made the implemented protocols more mature.</t>
              <t>This process is not mandatory. Authors of Internet-Drafts are encouraged to consider using the process for their documents, and working groups are invited to think about applying the process to all of their protocol specifications. This document obsoletes RFC 6982, advancing it to a Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="205"/>
          <seriesInfo name="RFC" value="7942"/>
          <seriesInfo name="DOI" value="10.17487/RFC7942"/>
        </reference>
      </references>
    </references>
    <?line 199?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We would like to thank Adrian Farrel, Stephane Litkowski, Cheng Li, and
Andrew Stone for their review.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
